Search results for: unusual uses task
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 2327

Search results for: unusual uses task

1457 Working Conditions, Motivation and Job Performance of Hotel Workers

Authors: Thushel Jayaweera

Abstract:

In performance evaluation literature, there has been no investigation indicating the impact of job characteristics, working conditions and motivation on the job performance among the hotel workers in Britain. This study tested the relationship between working conditions (physical and psychosocial working conditions) and job performance (task and contextual performance) with motivators (e.g. recognition, achievement, the work itself, the possibility for growth and work significance) as the mediating variable. A total of 254 hotel workers in 25 hotels in Bristol, United Kingdom participated in this study. Working conditions influenced job performance and motivation moderated the relationship between working conditions and job performance. Poor workplace conditions resulted in decreasing employee performance. The results point to the importance of motivators among hotel workers and highlighted that work be designed to provide recognition and sense of autonomy on the job to enhance job performance of the hotel workers. These findings have implications for organizational interventions aimed at increasing employee job performance.

Keywords: hotel workers, working conditions, motivation, job characteristics, job performance

Procedia PDF Downloads 598
1456 Identifying Promoters and Their Types Based on a Two-Layer Approach

Authors: Bin Liu

Abstract:

Prokaryotic promoter, consisted of two short DNA sequences located at in -35 and -10 positions, is responsible for controlling the initiation and expression of gene expression. Different types of promoters have different functions, and their consensus sequences are similar. In addition, their consensus sequences may be different for the same type of promoter, which poses difficulties for promoter identification. Unfortunately, all existing computational methods treat promoter identification as a binary classification task and can only identify whether a query sequence belongs to a specific promoter type. It is desired to develop computational methods for effectively identifying promoters and their types. Here, a two-layer predictor is proposed to try to deal with the problem. The first layer is designed to predict whether a given sequence is a promoter and the second layer predicts the type of promoter that is judged as a promoter. Meanwhile, we also analyze the importance of feature and sequence conversation in two aspects: promoter identification and promoter type identification. To the best knowledge of ours, it is the first computational predictor to detect promoters and their types.

Keywords: promoter, promoter type, random forest, sequence information

Procedia PDF Downloads 184
1455 Response of Solar Updraft Power Plants Incorporating Material Nonlinearity

Authors: Areeg Shermaddo

Abstract:

Solar updraft power plants (SUPP) provide a great potential for green and environmentally friendly renewable power generation. An up to 1000 m high chimney represents one of the major parts of each SUPP, which consist of the main shell structure and the stiffening rings. Including the nonlinear material behavior in a simulation of the chimney is computationally a demanding task. However, allowing the formation of cracking in concrete leads to a more economical design of the structure. In this work, an FE model of a SUPP is presented incorporating the nonlinear material behavior. The effect of wind loading intensity on the structural response is explored. Furthermore, the influence of the stiffness of the ring beams on the global behavior is as well investigated. The obtained results indicate that the minimum reinforcement is capable of carrying the tensile stresses provided that the ring beams are rather stiff.

Keywords: ABAQUS, nonlinear analysis, ring beams, SUPP

Procedia PDF Downloads 216
1454 Commodifying Things Past: Comparative Study of Heritage Tourism Practices in Montenegro and Serbia

Authors: Jovana Vukcevic, Sanja Pekovic, Djurdjica Perovic, Tatjana Stanovcic

Abstract:

This paper presents a critical inquiry into the role of uncomfortable heritage in nation branding with the particular focus on the specificities of the politics of memory, forgetting and revisionism in the post-communist post-Yugoslavia. It addresses legacies of unwanted, ambivalent or unacknowledged past and different strategies employed by the former-Yugoslav states and private actors in “rebranding” their heritage, ensuring its preservation, but re-contextualizing the narrative of the past through contemporary tourism practices. It questions the interplay between nostalgia, heritage and market, and the role of heritage in polishing the history of totalitarian and authoritarian regimes in the Balkans. It argues that in post-socialist Yugoslavia, the necessity to limit correlations with former ideology and the use of the commercial brush in shaping a marketable version of the past instigated the emergence of the profit-oriented heritage practices. Building on that argument, the paper addresses these issues as “commodification” and “disneyfication” of Balkans’ ambivalent heritage, contributing to the analysis of changing forms of memorialisation and heritagization practices in Europe. It questions the process of ‘coming to terms with the past’ through marketable forms of heritage tourism, fetching the boundary between market-driven nostalgia and state-imposed heritage policies. In order to analyse plurality of ways of dealing with controversial, ambivalent and unwanted heritage of dictatorships in the Balkans, the paper considers two prominent examples of heritage commodification in Serbia and Montenegro, and the re-appropriations of those narratives for the nation branding purposes. The first one is the story of the Tito’s Blue Train, the landmark of the socialist past and the symbol of Yugoslavia which has nowadays being used for birthday parties and marriage celebrations, while the second emphasises the unusual business arrangement turning the fortress Mamula, former concentration camp through the Second World War, into a luxurious Mediterranean resort. Questioning how the ‘uneasy’ past was acknowledged and embedded into the official heritage institutions and tourism practices, study examines the changing relation towards the legacies of dictatorships, inviting us to rethink the economic models of the things past. Analysis of these processes should contribute to better understanding of the new mnemonics strategies and (converging?) ways of ‘doing’ past in Europe.

Keywords: commodification, heritage tourism, totalitarianism, Serbia, Montenegro

Procedia PDF Downloads 252
1453 Management and Agreement Protocol in Computer Security

Authors: Abdulameer K. Hussain

Abstract:

When dealing with a cryptographic system we note that there are many activities performed by parties of this cryptographic system and the most prominent of these activities is the process of agreement between the parties involved in the cryptographic system on how to deal and perform the cryptographic system tasks to be more secure, more confident and reliable. The most common agreement among parties is a key agreement and other types of agreements. Despite the fact that there is an attempt from some quarters to find other effective agreement methods but these methods are limited to the traditional agreements. This paper presents different parameters to perform more effectively the task of the agreement, including the key alternative, the agreement on the encryption method used and the agreement to prevent the denial of the services. To manage and achieve these goals, this method proposes the existence of an control and monitoring entity to manage these agreements by collecting different statistical information of the opinions of the authorized parties in the cryptographic system. These statistics help this entity to take the proper decision about the agreement factors. This entity is called Agreement Manager (AM).

Keywords: agreement parameters, key agreement, key exchange, security management

Procedia PDF Downloads 421
1452 An Efficient Algorithm for Global Alignment of Protein-Protein Interaction Networks

Authors: Duc Dong Do, Ngoc Ha Tran, Thanh Hai Dang, Cao Cuong Dang, Xuan Huan Hoang

Abstract:

Global aligning two protein-protein interaction networks is an essentially important task in bioinformatics/computational biology field of study. It is a challenging and widely studied research topic in recent years. Accurately aligned networks allow us to identify functional modules of proteins and/ororthologous proteins from which unknown functions of a protein can be inferred. We here introduce a novel efficient heuristic global network alignment algorithm called FASTAn, including two phases: the first to construct an initial alignment and the second to improve such alignment by exerting a local optimization repeated procedure. The experimental results demonstrated that FASTAn outperformed the state-of-the-art global network alignment algorithm namely SPINAL in terms of both commonly used objective scores and the run-time.

Keywords: FASTAn, Heuristic algorithm, biological network alignment, protein-protein interaction networks

Procedia PDF Downloads 604
1451 Facial Emotion Recognition with Convolutional Neural Network Based Architecture

Authors: Koray U. Erbas

Abstract:

Neural networks are appealing for many applications since they are able to learn complex non-linear relationships between input and output data. As the number of neurons and layers in a neural network increase, it is possible to represent more complex relationships with automatically extracted features. Nowadays Deep Neural Networks (DNNs) are widely used in Computer Vision problems such as; classification, object detection, segmentation image editing etc. In this work, Facial Emotion Recognition task is performed by proposed Convolutional Neural Network (CNN)-based DNN architecture using FER2013 Dataset. Moreover, the effects of different hyperparameters (activation function, kernel size, initializer, batch size and network size) are investigated and ablation study results for Pooling Layer, Dropout and Batch Normalization are presented.

Keywords: convolutional neural network, deep learning, deep learning based FER, facial emotion recognition

Procedia PDF Downloads 274
1450 Hand Detection and Recognition for Malay Sign Language

Authors: Mohd Noah A. Rahman, Afzaal H. Seyal, Norhafilah Bara

Abstract:

Developing a software application using an interface with computers and peripheral devices using gestures of human body such as hand movements keeps growing in interest. A review on this hand gesture detection and recognition based on computer vision technique remains a very challenging task. This is to provide more natural, innovative and sophisticated way of non-verbal communication, such as sign language, in human computer interaction. Nevertheless, this paper explores hand detection and hand gesture recognition applying a vision based approach. The hand detection and recognition used skin color spaces such as HSV and YCrCb are applied. However, there are limitations that are needed to be considered. Almost all of skin color space models are sensitive to quickly changing or mixed lighting circumstances. There are certain restrictions in order for the hand recognition to give better results such as the distance of user’s hand to the webcam and the posture and size of the hand.

Keywords: hand detection, hand gesture, hand recognition, sign language

Procedia PDF Downloads 306
1449 [Keynote Talk]: Formal Specification and Description Language and Message Sequence Chart to Model and Validate Session Initiation Protocol Services

Authors: Sa’ed Abed, Mohammad H. Al Shayeji, Ovais Ahmed, Sahel Alouneh

Abstract:

Session Initiation Protocol (SIP) is a signaling layer protocol for building, adjusting and ending sessions among participants including Internet conferences, telephone calls and multimedia distribution. SIP facilitates user movement by proxying and forwarding requests to the present location of the user. In this paper, we provide a formal Specification and Description Language (SDL) and Message Sequence Chart (MSC) to model and define the Internet Engineering Task Force (IETF) SIP protocol and its sample services resulted from informal SIP specification. We create an “Abstract User Interface” using case analysis so that can be applied to identify SIP services more explicitly. The issued sample SIP features are then used as case scenarios; they are revised in MSCs format and validated to their corresponding SDL models.

Keywords: modeling, MSC, SDL, SIP, validating

Procedia PDF Downloads 210
1448 Consensus, Federalism and Inter-State Water Disputes in India

Authors: Amrisha Pandey

Abstract:

Indian constitution has distributed the powers to govern and legislate between the centre and the state governments based on the list of subject-matter provided in the seventh schedule. By that schedule, the states are authorized to regulate the water resource within their territory. However, the centre/union government is authorized to regulate the inter-state water disputes. The powers entrusted to the union government mainly deals with the sharing of river water which flows through the territory of two or more states. For that purpose, a provision enumerated in Article 262 of the Constitution of India which empowers the parliament to resolve any such inter-state river water dispute. Therefore, the parliament has enacted the - ‘Inter-State River Water Dispute Tribunal, Act’, which allows the central/union government to constitute the tribunal for the adjudication of the disputes and expressly bars the jurisdiction of the judiciary in the concerned matter. This arrangement was intended to resolve the dispute using political or diplomatic means, without deliberately interfering with the sovereign power of the states to govern the water resource. The situation in present context is complicated and sensitive. Due to the change in climatic conditions; increasing demand for the limited resource; and the advanced understanding of the freshwater cycle, which is missing from the existing legal regime. The obsolete legal and political tools, the existing legislative mechanism and the institutional units do not seem to accommodate the rising challenge to regulate the resource. Therefore, resulting in the rise of the politicization of the inter-state water disputes. Against this background, this paper will investigate the inter-state river water dispute in India and will critically analyze the ability of the existing constitutional, and institutional units involved in the task. Moreover, the competence of the tribunal as the adjudicating body in present context will be analyzed using the long ongoing inter-state water dispute in India – The Cauvery Water Dispute, as the case study. To conduct the task undertaken in this paper the doctrinal methodology of the research is adopted. The disputes will also be investigated through the lens of sovereignty, which is accorded to the states using the theory of ‘separation of power’ and the ‘grant of internal sovereignty’, to its federal units of governance. The issue of sovereignty in this paper is discussed in two ways: 1) as the responsibility of the state - to govern the resource; and 2) as the obligation of the state - to govern the resource, arising from the sovereign power of the state. Furthermore, the duality of the sovereign power coexists in this analysis; the overall sovereign authority of the nation-state, and the internal sovereignty of the states as its federal units of governance. As a result, this investigation will propose institutional, legislative and judicial reforms. Additionally, it will suggest certain amendments to the existing constitutional provisions in order to avoid the contradictions in their scope and meaning in the light of the advanced hydrological understanding.

Keywords: constitution of India, federalism, inter-state river water dispute tribunal of India, sovereignty

Procedia PDF Downloads 154
1447 A Semiparametric Approach to Estimate the Mode of Continuous Multivariate Data

Authors: Tiee-Jian Wu, Chih-Yuan Hsu

Abstract:

Mode estimation is an important task, because it has applications to data from a wide variety of sources. We propose a semi-parametric approach to estimate the mode of an unknown continuous multivariate density function. Our approach is based on a weighted average of a parametric density estimate using the Box-Cox transform and a non-parametric kernel density estimate. Our semi-parametric mode estimate improves both the parametric- and non-parametric- mode estimates. Specifically, our mode estimate solves the non-consistency problem of parametric mode estimates (at large sample sizes) and reduces the variability of non-parametric mode estimates (at small sample sizes). The performance of our method at practical sample sizes is demonstrated by simulation examples and two real examples from the fields of climatology and image recognition.

Keywords: Box-Cox transform, density estimation, mode seeking, semiparametric method

Procedia PDF Downloads 285
1446 Understanding the Safety Impacts of Imbalances in Truck Parking Supply and Demand

Authors: Rahil Saeedi

Abstract:

The imbalance in truck parking supply and demand can create important safety issues for truck drivers and the public. Research has shown that breaks at specific intervals can increase drivers’ alertness by reducing the monotony of the task. However, if fatigued truck drivers are unable to find a safe parking spot for rest, they may continue to drive or choose to park at remote and insecure areas or undesignated locations. All of these situations pose serious safety and security risks to truck drivers and other roadway users. This study uses 5-year truck crash data in Ohio to develop and test a framework for identifying crashes that happen as a result of imbalances in truck parking supply and demand. The societal impacts of these crashes are then interpreted as monetary values, calculated using the costs associated with various crash severity levels.

Keywords: truck parking, road safety, crash data, geofencing, driver fatigue, undesignated parking

Procedia PDF Downloads 167
1445 Pair Interaction in Transition-Metal Nanoparticles

Authors: Nikolay E. Dubinin

Abstract:

Pair-interaction approximations allow to consider a different states of condensed matter from a single position. At the same time, description of an effective pair interaction in transition metal is a hard task since the d-electron contribution to the potential energy in this case is non-pairwise in principle. There are a number of models for transition-metal effective pair potentials. Here we use the Wills-Harrison (WH) approach to calculate pair potentials for Fe, Co, and Ni in crystalline, liquid, and nano states. Last is especially interesting since nano particles of pure transition metals immobilized on the dielectric matrices are widely used in different fields of advanced technologies: as carriers and transmitters of information, as an effective catalytic materials, etc. It is found that the minimum of the pair potential is deeper and oscillations are stronger in nano crystalline state in comparison with the liquid and crystalline states for all metals under consideration.

Keywords: effective pair potential, nanocrystalline state, transition metal, Wills-Harrison approach

Procedia PDF Downloads 385
1444 Use of Sentiel-2 Data to Monitor Plant Density and Establishment Rate of Winter Wheat Fields

Authors: Bing-Bing E. Goh

Abstract:

Plant counting is a labour intensive and time-consuming task for the farmers. However, it is an important indicator for farmers to make decisions on subsequent field management. This study is to evaluate the potential of Sentinel-2 images using statistical analysis to retrieve information on plant density for monitoring, especially during critical period at the beginning of March. The model was calibrated with in-situ data from 19 winter wheat fields in Republic of Ireland during the crop growing season in 2019-2020. The model for plant density resulted in R2 = 0.77, RMSECV = 103 and NRMSE = 14%. This study has shown the potential of using Sentinel-2 to estimate plant density and quantify plant establishment to effectively monitor crop progress and to ensure proper field management.

Keywords: winter wheat, remote sensing, crop monitoring, multivariate analysis

Procedia PDF Downloads 161
1443 Conflicts Identification Approach among Stakeholders in Goal-Oriented Requirements Analysis

Authors: Muhammad Suhaib

Abstract:

Requirements Analysis are the most important part of software Engineering for both system application development, and project requirements. Conflicts often arise during the requirements gathering and analysis phase. This research aims to identify conflicts during the requirements gathering phase in software development life cycle, Research, Development, and Technology converted the world into a global village. During requirements elicitation/gathering phase it’s very difficult to understand the main objective of stakeholders, after completion of requirements elicitation task final results are used for Software Requirements Specification (SRS), SRS is the highly important outcome of the requirements analysis phase. this is the foundation between the developers and stakeholders or customers, proposed methodology will be helpful to identify those conflicts in a very easy manner during the initial phase of the project.

Keywords: goal oriented requirements analysis, conflicts identification model, requirements analysis, requirements engineering

Procedia PDF Downloads 134
1442 From Oral to Written: Translating the Dawot (Epic Poem), Revitalizing Appreciation for Indigenous Literature

Authors: Genevieve Jorolan-Quintero

Abstract:

The recording as well as the preservation of indigenous literature is an important task as it deals with a significant heritage of pre-colonial culture. The beliefs and traditions of a people are reflected in their oral narratives, such as the folk epic, which must be written down to insure their preservation. The epic poem for instance, known as dawot among the Mandaya, one of the indigenous communities in the southern region of the Philippines, narrates the customs, the ways of life, and the adventures of an ancient people. Nabayra, an expert on Philippine folkloric studies, stresses that still extant after centuries of unknown origin, the dawot was handed down to the magdadawot (bard) by word of mouth, forming the greatest bulk of Mandaya oral tradition. Unhampered by modern means of communication to distract her/him, the magdadawot has a sharp memory of the intricacies of the ancient art of chanting the panayday (verses) of the epic poem. The dawot has several hullubaton (episodes), each of which takes several nights to chant . The language used in these oral traditions is archaic Mandaya, no longer spoken or clearly understood by the present generation. There is urgency to the task of recording and writing down what remain of the epic poem since the singers and storytellers who have retained the memory and the skill of chanting and narrating the dawot and other forms of oral tradition in their original forms are getting fewer. The few who are gifted and skilled to transmit these ancient arts and wisdom are old and dying. Unlike the other Philippine epics (i.e. the Darangen, the Ulahingan, the Hinilawod, etc.), the Mandaya epic is yet to be recognized and given its rightful place among the recorded epics in Philippine Folk Literature. The general aim of this study was to put together and preserve an intangible heritage, the Mandaya hullubaton (episodes of the dawot), in order to preserve and promote appreciation for the oral traditions and cultural legacy of the Mandaya. It was able to record, transcribe, and translate four hullubaton of the folk epic into two languages, Visayan and English to insure understanding of their contents and significance among non-Mandaya audiences. Evident in the contents of the episodes are the cultural practices, ideals, life values, and traditions of the ancient Mandaya. While the conquests and adventures of the Mandaya heroes Lumungtad, Dilam, and Gambong highlight heroic virtues, the role of the Mandaya matriarch in family affairs is likewise stressed. The recording and the translation of the hullubaton and the dawot into commonly spoken languages will not only promote knowledge and understanding about their culture, but will also stimulate in the members of this cultural community a sense of pride for their literature and culture. Knowledge about indigenous cultural system and philosophy derived from their oral literature will serve as a springboard to further comparative researches dealing with indigenous mores and belief systems among the different tribes in the Philippines, in Asia, in Africa, and other countries in the world.

Keywords: Dawot, epic poem, Mandaya, Philippine folk literature

Procedia PDF Downloads 441
1441 The Algorithmic Dilemma: Virtue Development in the Midst of Role Conflict and Role Ambiguity in Platform Work

Authors: Thumesha Jayatilake

Abstract:

As platform work continues to proliferate, algorithmic management, which takes care of its operational role, poses complex challenges, including job satisfaction, worker involvement, ethical decision-making, and worker well-being. This conceptual paper scrutinizes how algorithmic management influences virtue development among platform workers, with an emphasis on the effects of role conflict and role ambiguity. Using an interdisciplinary approach, the research elucidates the complex relationship between algorithmic management systems and the ethical dimensions of work. The study also incorporates the interplay of human interaction and short-term task orientation, thus broadening the understanding of the impacts of algorithmic management on virtue development. The findings have significant implications for policymakers, academics, and industry practitioners, illuminating the ethical complexities presented by the use of algorithms in modern employment settings.

Keywords: algorithmic management, ethics, platform work, virtue

Procedia PDF Downloads 73
1440 Contribution to the Study of Automatic Epileptiform Pattern Recognition in Long Term EEG Signals

Authors: Christine F. Boos, Fernando M. Azevedo

Abstract:

Electroencephalogram (EEG) is a record of the electrical activity of the brain that has many applications, such as monitoring alertness, coma and brain death; locating damaged areas of the brain after head injury, stroke and tumor; monitoring anesthesia depth; researching physiology and sleep disorders; researching epilepsy and localizing the seizure focus. Epilepsy is a chronic condition, or a group of diseases of high prevalence, still poorly explained by science and whose diagnosis is still predominantly clinical. The EEG recording is considered an important test for epilepsy investigation and its visual analysis is very often applied for clinical confirmation of epilepsy diagnosis. Moreover, this EEG analysis can also be used to help define the types of epileptic syndrome, determine epileptiform zone, assist in the planning of drug treatment and provide additional information about the feasibility of surgical intervention. In the context of diagnosis confirmation the analysis is made using long term EEG recordings with at least 24 hours long and acquired by a minimum of 24 electrodes in which the neurophysiologists perform a thorough visual evaluation of EEG screens in search of specific electrographic patterns called epileptiform discharges. Considering that the EEG screens usually display 10 seconds of the recording, the neurophysiologist has to evaluate 360 screens per hour of EEG or a minimum of 8,640 screens per long term EEG recording. Analyzing thousands of EEG screens in search patterns that have a maximum duration of 200 ms is a very time consuming, complex and exhaustive task. Because of this, over the years several studies have proposed automated methodologies that could facilitate the neurophysiologists’ task of identifying epileptiform discharges and a large number of methodologies used neural networks for the pattern classification. One of the differences between all of these methodologies is the type of input stimuli presented to the networks, i.e., how the EEG signal is introduced in the network. Five types of input stimuli have been commonly found in literature: raw EEG signal, morphological descriptors (i.e. parameters related to the signal’s morphology), Fast Fourier Transform (FFT) spectrum, Short-Time Fourier Transform (STFT) spectrograms and Wavelet Transform features. This study evaluates the application of these five types of input stimuli and compares the classification results of neural networks that were implemented using each of these inputs. The performance of using raw signal varied between 43 and 84% efficiency. The results of FFT spectrum and STFT spectrograms were quite similar with average efficiency being 73 and 77%, respectively. The efficiency of Wavelet Transform features varied between 57 and 81% while the descriptors presented efficiency values between 62 and 93%. After simulations we could observe that the best results were achieved when either morphological descriptors or Wavelet features were used as input stimuli.

Keywords: Artificial neural network, electroencephalogram signal, pattern recognition, signal processing

Procedia PDF Downloads 528
1439 The Political Economy of Police Corruption in Nigeria

Authors: Tosin Osasona

Abstract:

The Nigeria Police Force bears the constitutional mandate as the primary policing agency for the protection of life and property within Nigeria; however, the police have an historical ill-reputation for corruption, ineptitude and impunity. Using the institutional theory of police as the framework of analysis, the paper argues that the performance of the police in Nigeria mirrors the dominant political, social and economic institutions and the structural environment of the Nigerian state. The article puts in perspective the deliberate political decision to underfund the police, leaving officers of the force the extra task of foraging for funds to undertake the duty that the Nigeria state primarily exists for; the article further explores the nexus between corruption in the police in Nigeria and the issue of funding. The article finds that the Nigerian state, by deliberately under-funding the police, while expecting the agency to perform its duties, has indirectly sanctioned the corruption of the force and approved the cooption of the institution of police and policing for private use in Nigeria.

Keywords: Police Corruption, Funding , Informal Taxation, POlice Checkpoint

Procedia PDF Downloads 160
1438 Using Multi-Arm Bandits to Optimize Game Play Metrics and Effective Game Design

Authors: Kenny Raharjo, Ramon Lawrence

Abstract:

Game designers have the challenging task of building games that engage players to spend their time and money on the game. There are an infinite number of game variations and design choices, and it is hard to systematically determine game design choices that will have positive experiences for players. In this work, we demonstrate how multi-arm bandits can be used to automatically explore game design variations to achieve improved player metrics. The advantage of multi-arm bandits is that they allow for continuous experimentation and variation, intrinsically converge to the best solution, and require no special infrastructure to use beyond allowing minor game variations to be deployed to users for evaluation. A user study confirms that applying multi-arm bandits was successful in determining the preferred game variation with highest play time metrics and can be a useful technique in a game designer's toolkit.

Keywords: game design, multi-arm bandit, design exploration and data mining, player metric optimization and analytics

Procedia PDF Downloads 510
1437 A Review of End-of-Term Oral Tests for English-Majored Students of HCMC Open University

Authors: Khoa K. Doan

Abstract:

Assessment plays an essential role in teaching and learning English as it aims to measure the learning outcomes. Designing appropriate test types and procedures for four skills, especially productive skills, is a very challenging task for teachers of English. The assessment scheme is supposed to provide precise measures and fair opportunities for students to demonstrate what they can do with their language skills. This involves content domains, measurement techniques, administrative feasibility, target populations, and potential sources of testing bias. Based on these elements, a review of end-of-term speaking tests for English-majored students at Ho Chi Minh City Open University (Viet Nam) was undertaken for the purpose of analyzing the strengths and limitations of the testing tool for the speaking assessment. It helped to identify what could be done to facilitate the process of teaching and learning in that context.

Keywords: assessment, oral tests, speaking, testing

Procedia PDF Downloads 320
1436 The Phenomenology in the Music of Debussy through Inspiration of Western and Oriental Culture

Authors: Yu-Shun Elisa Pong

Abstract:

Music aesthetics related to phenomenology is rarely discussed and still in the ascendant while multi-dimensional discourses of philosophy were emerged to be an important trend in the 20th century. In the present study, a basic theory of phenomenology from Edmund Husserl (1859-1938) is revealed and discussed followed by the introduction of intentionality concepts, eidetic reduction, horizon, world, and inter-subjectivity issues. Further, phenomenology of music and general art was brought to attention by the introduction of Roman Ingarden’s The Work of Music and the Problems of its Identity (1933) and Mikel Dufrenne’s The Phenomenology of Aesthetic Experience (1953). Finally, Debussy’s music will be analyzed and discussed from the perspective of phenomenology. Phenomenology is not so much a methodology or analytics rather than a common belief. That is, as much as possible to describe in detail the different human experience, relative to the object of purpose. Such idea has been practiced in various guises for centuries, only till the early 20th century Phenomenology was better refined through the works of Husserl, Heidegger, Sartre, Merleau-Ponty and others. Debussy was born in an age when the Western society began to accept the multi-cultural baptism. With his unusual sensitivity to the oriental culture, Debussy has presented considerable inspiration, absorption, and echo in his music works. In fact, his relationship with nature is far from echoing the idea of Chinese ancient literati and nature. Although he is not the first composer to associate music with human and nature, the unique quality and impact of his works enable him to become a significant figure in music aesthetics. Debussy’s music tried to develop a quality analogous of nature, and more importantly, based on vivid life experience and artistic transformation to achieve the realm of pure art. Such idea that life experience comes before artwork, either clear or vague, simple or complex, was later presented abstractly in his late works is still an interesting subject worth further discussion. Debussy’s music has existed for more than or close to a century. It has received musicology researcher’s attention as much as other important works in the history of Western music. Among the pluralistic discussion about Debussy’s art and ideas, phenomenological aesthetics has enlightened new ideas and view angles to relook his great works and even gave some previous arguments legitimacy. Overall, this article provides a new insight of Debussy’s music from phenomenological exploration and it is believed phenomenology would be an important pathway in the research of the music aesthetics.

Keywords: Debussy's music, music esthetics, oriental culture, phenomenology

Procedia PDF Downloads 275
1435 Palaeo-Environmental Reconstruction of the Wet Zone of Sri Lanka: A Zooarchaeological Perspective

Authors: Kalangi Rodrigo

Abstract:

Sri Lanka has been known as an island which has a diverse variety of prehistoric occupation among ecological zones. Defining the paleoecology of the past societies has been an archaeological thought developed in the 1960s. It is mainly concerned with the reconstruction from available geological and biological evidence of past biota, populations, communities, landscapes, environments, and ecosystems. Sri Lanka has dealt with this subject, and considerable research has been already undertaken. The fossil and material record of Sri Lanka’s Wet Zone tropical forests continues from c. 38,000–34,000 ybp. This early and persistent human fossil, technical, and cultural florescence, as well as a collection of well-preserved tropical-forest rock shelters with associated 'on-site' palaeoenvironmental records, makes Sri Lanka a central and unusual case study to determine the extent and strength of early human tropical forest encounters. Excavations carried out in prehistoric caves in the low country wet zone has shown that in the last 50,000 years, the temperature in the lowland rainforests has not exceeded 5°C. When taking Batadombalena alone, the entire seven layers have yielded an uninterrupted occupation of Acavus sp and Canerium zeylanicum, a plant that grows in the middle of the rainforest. Acavus, which is highly sensitive to rainforest ecosystems, has been well documented in many of the lowland caves, confirming that the wetland rainforest environment has remained intact at least for the last 50,000 years. If the dry and arid conditions in the upper hills regions affected the wet zone, the Tufted Gray Lunger (semnopithecus priam), must also meet with the prehistoric caves in the wet zone thrown over dry climate. However, the bones in the low country wet zone do not find any of the fragments belonging to Turfed Gray Lunger, and prehistoric human consumption is bestowed with purple-faced leaf monkey (Trachypithecus vetulus) and Toque Macaque (Macaca Sinica). The skeletal remains of Lyriocephalus scutatus, a full-time resident in rain forests, have also been recorded among lowland caves. But, in zoological terms, these remains may be the remains of the Barking deer (Muntiacus muntjak), which is currently found in the wet zone. For further investigations, the mtDNA test of genetic diversity (Bottleneck effect) and pollen study from lowland caves should determine whether the wet zone climate has persisted over the last 50,000 years, or whether the dry weather affected in the mountainous region has invaded the wet zone.

Keywords: paleoecology, prehistory, zooarchaeology, reconstruction, palaeo-climate

Procedia PDF Downloads 140
1434 Thinking Lean in ICU: A Time Motion Study Quantifying ICU Nurses’ Multitasking Time Allocation

Authors: Fatma Refaat Ahmed, Sally Mohamed Farghaly

Abstract:

Context: Intensive care unit (ICU) nurses often face pressure and constraints in their work, leading to the rationing of care when demands exceed available time and resources. Observations suggest that ICU nurses are frequently distracted from their core nursing roles by non-core tasks. This study aims to provide evidence on ICU nurses' multitasking activities and explore the association between nurses' personal and clinical characteristics and their time allocation. Research Aim: The aim of this study is to quantify the time spent by ICU nurses on multitasking activities and investigate the relationship between their personal and clinical characteristics and time allocation. Methodology: A self-observation form utilizing the "Diary" recording method was used to record the number of tasks performed by ICU nurses and the time allocated to each task category. Nurses also reported on the distractions encountered during their nursing activities. A convenience sample of 60 ICU nurses participated in the study, with each nurse observed for one nursing shift (6 hours), amounting to a total of 360 hours. The study was conducted in two ICUs within a university teaching hospital in Alexandria, Egypt. Findings: The results showed that ICU nurses completed 2,730 direct patient-related tasks and 1,037 indirect tasks during the 360-hour observation period. Nurses spent an average of 33.65 minutes on ventilator care-related tasks, 14.88 minutes on tube care-related tasks, and 10.77 minutes on inpatient care-related tasks. Additionally, nurses spent an average of 17.70 minutes on indirect care tasks per hour. The study identified correlations between nursing time and nurses' personal and clinical characteristics. Theoretical Importance: This study contributes to the existing research on ICU nurses' multitasking activities and their relationship with personal and clinical characteristics. The findings shed light on the significant time spent by ICU nurses on direct care for mechanically ventilated patients and the distractions that require attention from ICU managers. Data Collection: Data were collected using self-observation forms completed by participating ICU nurses. The forms recorded the number of tasks performed, the time allocated to each task category, and any distractions encountered during nursing activities. Analysis Procedures: The collected data were analyzed to quantify the time spent on different tasks by ICU nurses. Correlations were also examined between nursing time and nurses' personal and clinical characteristics. Question Addressed: This study addressed the question of how ICU nurses allocate their time across multitasking activities and whether there is an association between nurses' personal and clinical characteristics and time allocation. Conclusion: The findings of this study emphasize the need for a lean evaluation of ICU nurses' activities to identify and address potential gaps in patient care and distractions. Implementing lean techniques can improve efficiency, safety, clinical outcomes, and satisfaction for both patients and nurses, ultimately enhancing the quality of care and organizational performance in the ICU setting.

Keywords: motion study, ICU nurse, lean, nursing time, multitasking activities

Procedia PDF Downloads 68
1433 Partial Replacement of Lateritic Soil with Crushed Rock Sand (Stone Dust) in Compressed Earth Brick Production

Authors: A. M. Jungudo, M. A. Lasan

Abstract:

Affordable housing has long been one of the basic necessities of life to man. The ever rising prices of building materials are one of the major causes of housing shortage in many developing countries. Breaching the gap of housing needs in developing countries like Nigeria is an awaiting task longing for attention. This is due to lack of research in the development of local materials that will suit the troubled economies of these countries. The use of earth material to meet the housing needs is a sustainable option and its material is freely available universally. However, people are doubtful of using the earth material due to its modest outlook and uncertain durability. This research aims at enhancing the durability of Compressed Earth Bricks (CEBs) using stone dust as a stabilizer. The result indicates that partial replacement of lateritic soil with stone dust at 30% improves its compressive strength along with abrasive resistance.

Keywords: earth construction, durability, stone dust, sustainable

Procedia PDF Downloads 131
1432 An Efficient Data Mining Technique for Online Stores

Authors: Mohammed Al-Shalabi, Alaa Obeidat

Abstract:

In any food stores, some items will be expired or destroyed because the demand on these items is infrequent, so we need a system that can help the decision maker to make an offer on such items to improve the demand on the items by putting them with some other frequent item and decrease the price to avoid losses. The system generates hundreds or thousands of patterns (offers) for each low demand item, then it uses the association rules (support, confidence) to find the interesting patterns (the best offer to achieve the lowest losses). In this paper, we propose a data mining method for determining the best offer by merging the data mining techniques with the e-commerce strategy. The task is to build a model to predict the best offer. The goal is to maximize the profits of a store and avoid the loss of products. The idea in this paper is the using of the association rules in marketing with a combination with e-commerce.

Keywords: data mining, association rules, confidence, online stores

Procedia PDF Downloads 410
1431 Experimental and Numerical Analysis of a Historical Bell Tower

Authors: Milorad Pavlovic, Sebastiano Trevisani, Antonella Cecchi

Abstract:

In this paper, a procedure for the evaluation of seismic behavior of slender masonry structures (towers, bell towers, chimneys, minarets, etc.) is presented. The presented procedure is based on a full three-dimensional modal analyses and frequency measurements. As well-known, masonry is a composite material formed by bricks, or stone blocks, and mortar arranged more or less regularly and adopted for many centuries as structural material. Dynamic actions may represent the major risk of collapse of brickworks, and despite the progress achieved so far in science and mechanics; the assessment of their seismic performance remains a challenging task. Then, reliable physical and numerical models are worthy of recommendation. In this paper, attention is paid to the historical bell tower of the Basilica of Santa Maria Gloriosa dei Frari - usually called Frari - one of the greatest churches in Venice, Italy.

Keywords: bell tower, FEM, masonry, modal analysis, non-destructive testing

Procedia PDF Downloads 355
1430 A Taxonomy of Routing Protocols in Wireless Sensor Networks

Authors: A. Kardi, R. Zagrouba, M. Alqahtani

Abstract:

The Internet of Everything (IoE) presents today a very attractive and motivating field of research. It is basically based on Wireless Sensor Networks (WSNs) in which the routing task is the major analysis topic. In fact, it directly affects the effectiveness and the lifetime of the network. This paper, developed from recent works and based on extensive researches, proposes a taxonomy of routing protocols in WSNs. Our main contribution is that we propose a classification model based on nine classes namely application type, delivery mode, initiator of communication, network architecture, path establishment (route discovery), network topology (structure), protocol operation, next hop selection and latency-awareness and energy-efficient routing protocols. In order to provide a total classification pattern to serve as reference for network designers, each class is subdivided into possible subclasses, presented, and discussed using different parameters such as purposes and characteristics.

Keywords: routing, sensor, survey, wireless sensor networks, WSNs

Procedia PDF Downloads 182
1429 Deregulation of Thorium for Room Temperature Superconductivity

Authors: Dong Zhao

Abstract:

Abstract—Extensive research on obtaining applicable room temperature superconductors meets the major barrier, and the record Tc of 135 K achieved via cuprate has been idling for decades. Even though, the accomplishment of higher Tc than the cuprate was made through pressurizing certain compounds composed of light elements, such as for the LaH10 and for the metallic hydrogen. Room temperature superconductivity under ambient pressure is still the preferred approach and is believed to be the ultimate solution for many applications. While racing to find the breakthrough method to achieve this room temperature Tc milestone in superconducting research, a report stated a discovery of a possible high-temperature superconductor, i.e., the thorium sulfide ThS. Apparently, ThS’s Tc can be at room temperature or even higher. This is because ThS revealed an unusual property of the ‘coexistence of high electrical conductivity and diamagnetism’. Noticed that this property of coexistence of high electrical conductivity and diamagnetism is in line with superconductors, meaning ThS is also at its superconducting state. Surprisingly, ThS owns the property of superconductivity at least at room temperature and under atmosphere pressure. Further study of the ThS’s electrical and magnetic properties in comparison with thorium di-iodide ThI2 concluded its molecular configuration as [Th4+(e-)2]S. This means the ThS’s cation is composed of a [Th4+(e-)2]2+ cation core. It is noticed that this cation core is built by an oxidation state +4 of thorium atom plus an electron pair on this thorium atom that resulted in an oxidation state +2 of this [Th4+(e-)2]2+ cation core. This special construction of [Th4+(e-)2]2+ cation core may lead to the ThS’s room temperature superconductivity because of this characteristic electron lone pair residing on the thorium atom. Since the study of thorium chemistry was carried out in the period of before 1970s. the exploration about ThS’s possible room temperature superconductivity would require resynthesizing ThS. This re-preparation of ThS will provide the sample and enable professionals to verify the ThS’s room temperature superconductivity. Regrettably, the current regulation prevents almost everyone from getting access to thorium metal or thorium compounds due to the radioactive nature of thorium-232 (Th-232), even though the radioactive level of Th-232 is extremely low with its half-life of 14.05 billion years. Consequently, further confirmation of ThS’s high-temperature superconductivity through experiments will be impossible unless the use of corresponding thorium metal and related thorium compounds can be deregulated. This deregulation would allow researchers to obtain the necessary starting materials for the study of ThS. Hopefully, the confirmation of ThS’s room temperature superconductivity can not only establish a method to obtain applicable superconductors but also to pave the way for fully understanding the mechanism of superconductivity.

Keywords: co-existence of high electrical conductivity and diamagnetism, electron pairing and electron lone pair, room temperature superconductivity, the special molecular configuration of thorium sulfide ThS

Procedia PDF Downloads 50
1428 Four Phase Methodology for Developing Secure Software

Authors: Carlos Gonzalez-Flores, Ernesto Liñan-García

Abstract:

A simple and robust approach for developing secure software. A Four Phase methodology consists in developing the non-secure software in phase one, and for the next three phases, one phase for each of the secure developing types (i.e. self-protected software, secure code transformation, and the secure shield). Our methodology requires first the determination and understanding of the type of security level needed for the software. The methodology proposes the use of several teams to accomplish this task. One Software Engineering Developing Team, a Compiler Team, a Specification and Requirements Testing Team, and for each of the secure software developing types: three teams of Secure Software Developing, three teams of Code Breakers, and three teams of Intrusion Analysis. These teams will interact among each other and make decisions to provide a secure software code protected against a required level of intruder.

Keywords: secure software, four phases methodology, software engineering, code breakers, intrusion analysis

Procedia PDF Downloads 399