Search results for: heritage sharing
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1887

Search results for: heritage sharing

867 African Horse Sickness a Possible Threat to Horses in Al-Baha

Authors: Ghanem Al-Ghamdi

Abstract:

African Horse Sickness causes significant challenges to horse practitioners and owners in Africa and possibly in certain locations in the Arab Pensila. The aim of this work was to observe a hot spot of epidemic in Al-Baha, Southwestern of Saudi Arabia that could be AHS. A five year-old horse farm that had eight horses with no history of clinical problems was visited in late October 2014. In August 2014, horses showed clinical signs of severe pain, congestion of mucus membranes, foam oozing of the nose, recumbency, difficult breath and ultimately death. The course of the disease averaged 2 days. The farm had no previous history of this episode. Other animals including camel, sheep reside the same farm sharing feeding and water sources however no obvious similar clinical problems were noticed among the two species. Five horses showed the clinical disease and all horses were lost. Veterinary help was not available for diagnosis or treatment. A follow up visit to the farm after one year indicated that the three remaining horses were healthy but were relocated to a different facility out the Al-Baha Region. The most likely cause of such clinical problem is African Horse Sickness, however clinical exam and sampling of other horses in the region is absolute must as well as examining arthropods.

Keywords: African horse sickness, horses, Al-Baha, Saudi Arabia

Procedia PDF Downloads 347
866 The Use of Digital Stories in the Development of Critical Literacy

Authors: Victoria Zenotz

Abstract:

For Fairclough (1989) critical literacy is a tool to enable readers and writers to build up meaning in discourse. More recently other authors (Leu et al., 2004) have included the new technology context in their definition of literacy. In their view being literate nowadays means to “successfully use and adapt to the rapidly changing information and communication technologies and contexts that continuously emerge in our world and influence all areas of our personal and professional lives.” (Leu et al., 2004: 1570). In this presentation the concept of critical literacy will be related to the creation of digital stories. In the first part of the presentation concepts such as literacy and critical literacy are examined. We consider that real social practices will help learners may improve their literacy level. Accordingly, we show some research, which was conducted at a secondary school in the north of Spain (2013-2014), to illustrate how the “writing” of digital stories may contribute to the development of critical literacy. The use of several instruments allowed the collection of data at the different stages of their creative process including watching and commenting models for digital stories, planning a storyboard, creating and selecting images, adding voices and background sounds, editing and sharing the final product. The results offer some valuable insights into learners’ literacy progress.

Keywords: literacy, computer assisted language learning, esl

Procedia PDF Downloads 397
865 Biodiversity Conservation: A Path to a Healthy Afghanistan

Authors: Nadir Sidiqi

Abstract:

Biodiversity conservation is humanity’s building block to sustain lives - ultimately allowing all living and nonliving creatures to interact in a balanced proportion. Humanity’s challenge in the 21st century is to maintain biodiversity without harming the natural habitat of plants, animals and beneficial microorganisms. There are many good reasons to consider why biodiversity is important to every nation around the world, especially for a nation like Afghanistan. One of the major values of biodiversity is its economic value: biodiversity provides goods and services to the Afghan nation directly through links and components such as the maintenance of traditional crops, medicine, fruits, animals, grazing, fuel, timber, harvesting, fishing, hunting and related supplies. Biodiversity is the variety of the living components, such as humans, plants, animals, and microorganisms, and nonliving components interaction, including air, water, sunlight, soil, humidity and environmental factors in an area. There are many ways of gauging the value of biodiversity. As an ecosystem, biodiversity includes such benefits as soil fertility, erosion control, crop pollination, crop rotation, and pest control. The conservation of biodiversity is crucial for these benefits, which would be impossible to replace. Biodiversity conservation also has heritage values; this wealth of genetic diversity provides backup to rural people living close together.

Keywords: Afghanistan, biodiversity, conservation, economy, environment

Procedia PDF Downloads 526
864 Polarity Classification of Social Media Comments in Turkish

Authors: Migena Ceyhan, Zeynep Orhan, Dimitrios Karras

Abstract:

People in modern societies are continuously sharing their experiences, emotions, and thoughts in different areas of life. The information reaches almost everyone in real-time and can have an important impact in shaping people’s way of living. This phenomenon is very well recognized and advantageously used by the market representatives, trying to earn the most from this means. Given the abundance of information, people and organizations are looking for efficient tools that filter the countless data into important information, ready to analyze. This paper is a modest contribution in this field, describing the process of automatically classifying social media comments in the Turkish language into positive or negative. Once data is gathered and preprocessed, feature sets of selected single words or groups of words are build according to the characteristics of language used in the texts. These features are used later to train, and test a system according to different machine learning algorithms (Naïve Bayes, Sequential Minimal Optimization, J48, and Bayesian Linear Regression). The resultant high accuracies can be important feedback for decision-makers to improve the business strategies accordingly.

Keywords: feature selection, machine learning, natural language processing, sentiment analysis, social media reviews

Procedia PDF Downloads 145
863 The Results of Research Based-Learning for Developing the Learning and Innovation Skills of Undergraduate Students

Authors: Jatuphum Ketchatturat

Abstract:

The objective of this research was to study the learning and innovation skills of undergraduate students after Research-Based Learning had been applied. Eighty research participants were selected from undergraduate students enrolled in Educational Research Program using the Purposive Sampling Method. Research Methodology was Descriptive Research, the research took one semester to complete. The research instruments consisted of (1) Research Skill Assessment Form, (2) Research Quality Assessment Form, (3) Scale of learning and innovation skills 25 items. The quantitative data were analysed using descriptive statistics including, frequency, percentage, average and standard deviation. The qualitative data were analyzed using content analysis. The research results were (1) The students were able to conduct research that focused on educational research, which has a fair to the excellent level of standards of a research learning outcome, research skills, and research quality. The student’s learning and innovation skills have relating to research skills and research quality. (2) The findings found that the students have been developed to be learning and innovation skills such as systematic thinking, analytical thinking, critical thinking, creative problem solving, collaborative, research-creation, communication, and knowledge and experience sharing to friends, community and society.

Keywords: learning and innovation skills, research based learning, research skills, undergraduate students

Procedia PDF Downloads 178
862 The Role of Facades in Conserving the Image of the City

Authors: Hemadri Raut

Abstract:

The city is a blend of the possible interactions of the built form, open spaces and their spatial organization layout in a geographical area to obtain an integrated pattern and environment with building facades being a dominant figure in the body of a city. Façades of each city have their own inherent properties responsive to the human behaviour, weather conditions, safety factors, material availability and composition along with the necessary aesthetics in coordination with adjacent building facades. Cities experience a huge transformation in the culture, lifestyle; socioeconomic conditions and technology nowadays because of the increasing population, urban sprawl, industrialization, contemporary architectural style, post-disaster consequences, war reconstructions, etc. This leads to the loss of the actual identity and architectural character of the city which in turn induces chaos and turbulence in the city. This paper attempts to identify and learn from the traditional elements that would make us more aware of the unique identity of the local communities in a city. It further studies the architectural style, color, shape, and design techniques through the case studies of contextual cities. The work focuses on the observation and transformation of the image of the city through these considerations in the designing of the facades to achieve the reconciliation of the people with urban spaces.

Keywords: building facades, city, community, heritage, identity, transformation, urban

Procedia PDF Downloads 214
861 Knowledge Management Factors Affecting the Level of Commitment

Authors: Abbas Keramati, Abtin Boostani, Mohammad Jamal Sadeghi

Abstract:

This paper examines the influence of knowledge management factors on organizational commitment for employees in the oil and gas drilling industry of Iran. We determine what knowledge factors have the greatest impact on the personnel loyalty and commitment to the organization using collected data from a survey of over 300 full-time personnel working in three large companies active in oil and gas drilling industry of Iran. To specify the effect of knowledge factors in the organizational commitment of the personnel in the studied organizations, the Principal Component Analysis (PCA) is used. Findings of our study show that the factors such as knowledge and expertise, in-service training, the knowledge value and the application of individuals’ knowledge in the organization as the factor “learning and perception of personnel from the value of knowledge within the organization” has the greatest impact on the organizational commitment. After this factor, “existence of knowledge and knowledge sharing environment in the organization”; “existence of potential knowledge exchanging in the organization”; and “organizational knowledge level” factors have the most impact on the organizational commitment of personnel, respectively.

Keywords: drilling industry, knowledge management, organizational commitment, loyalty, principle component analysis

Procedia PDF Downloads 351
860 A Qualitative Exploration of the Strategic Management of Employee Resistance to Organisational Change

Authors: Muneeb Banday, Anukriti Dixit

Abstract:

Change in organizations is viewed as a conversion process of the organizational functioning. One of the crucial elements of this conversion process is the employee resistance to organizational change. The existing literature on change resistance has generally treated resistance as a barrier or an opportunity for successful implementation of change. However, there is little empirical research exploring how resistance to change is managed. This may be partially due to difficulty in getting information on resistance to change. The top management does not divulge such information to avoid negative evaluation whereas employees face huge risk in sharing information related to resistance. The focus of the study is to understand how the organization under study dealt with the employee resistance to change. The conversion process is a story of how the organization went from one stage to another. We used narrative approach to change. Data was collected data through company visits and interviews. The interviews were transcribed, coded, and themes were identified. We focused on the strands that left huge scope for alternative interpretations than the dominant narrative of change prevalent in the organization. The study reveals that the top management strategically uses the legitimacy of leadership, roles of key employees, and rationality of change to manage resistance.

Keywords: employee resistance, legitimacy of leadership, narrative analysis, organisational change

Procedia PDF Downloads 270
859 Examining the Relationship Between Traditional Property Rights and Online Intellectual Property Rights in the Digital Age

Authors: Luljeta Plakolli-Kasumi

Abstract:

In the digital age, the relationship between traditional property rights and online intellectual property rights is becoming increasingly complex. On the one hand, the internet and advancements in technology have allowed for the widespread distribution and use of digital content, making it easier for individuals and businesses to access and share information. On the other hand, the rise of digital piracy and illegal file-sharing has led to increased concerns about the protection of intellectual property rights. This paper aims to examine the relationship between traditional property rights and online intellectual property rights in the digital age by analyzing the current legal frameworks, key challenges and controversies that arise, and potential solutions for addressing these issues. The paper will look at how traditional property rights concepts such as ownership and possession are being applied in the online context and how they intersect with new and evolving forms of intellectual property such as digital downloads, streaming services, and online content creation. It will also discuss the tension between the need for strong intellectual property protection to encourage creativity and innovation and the public interest in promoting access to information and knowledge. Ultimately, the paper will explore how the legal system can adapt to better balance the interests of property owners, creators, and users in the digital age.

Keywords: intellectual property, traditional property, digital age, digital content

Procedia PDF Downloads 90
858 A Preliminary Study Examining the Effect of Tourism as Perceived by Locals: From Perspective of Conservative of Research Theory

Authors: Ali Ahmad AlGassim

Abstract:

The objective of this study is to explore the local community perceptions toward the impact of tourism from the COR theory perspective. The current study used qualitative methods and purposive sampling to engage informants. Data was collected using an online survey with closed-ended and open-ended questions from 57 informants living in Al-Jufa Village, and then data was analysed using content analysis. The findings showed that COR theory help explains the residents’ perception of the threat and stress of losing resources. The findings showed the residents feel stressed about losing resources, such as lands, houses, heritage, sociocultural and Islamic values, as well as job and investment opportunities if the village is developed for tourism. Findings also present that one group of residents declared rejections and aiming to resist the development if it takes place, and they will not allowing foreigners to come and live in the village. The findings also show that this stress and strain can be alleviated by allowing residents to participate in the development. Finally, the residents of Al-Juhfa showed a high level of feeling of ownership towards their resources.

Keywords: perception of threat, effect of tourism, COR theory, local community, impact of tourism, Saudi Arabia

Procedia PDF Downloads 264
857 Rural Tourism as a Development Strategy in Communities of the Sierra Gorda of Querétaro

Authors: Eduardo Ruiz-Corzo, Luis Rodrigo Valencia Perez, Jorge Francisco Barragan Lopez

Abstract:

The article shows the pressing conditions of marginalization prevailing in the Sierra Gorda, in the northern state of Queretaro, so it is essential to identify business options that generate a complementary source of income in a sustainable manner, in accordance with the fact that the area is a Biosphere Reserve by UNESCO. In this sense, the study identifies the enormous scenic richness of the area, the growing demand for leisure activities of the urban centers and the multifunctionality that adds, in a complementary way, the traditional activities that up to now have achieved the quality of life levels. From the application of the 43 interviews and 183 surveys, confirms the fact that the post-visit perception exceeds the expectations of the visitors emerges and affirms that the image that has been projected is attractive and timely. In order to understand how the current model of tourism promoted in the region is working, there is a need to evaluate it in a theoretical-methodological framework considering sustainable development assumptions. In order to determine the degree of contribution to business development, strengthening of social capital, and enjoyment and appreciation of cultural and natural heritage in the region.

Keywords: marginalization, rural tourism, multifunctionality, sustainability, revenue

Procedia PDF Downloads 145
856 'Sextually' Active: Teens, 'Sexting' and Gendered Double Standards in the Digital Age

Authors: Annalise Weckesser, Alex Wade, Clara Joergensen, Jerome Turner

Abstract:

Introduction: Digital mobile technologies afford Generation M a number of opportunities in terms of communication, creativity and connectivity in their social interactions. Yet these young people’s use of such technologies is often the source of moral panic with accordant social anxiety especially prevalent in media representations of teen ‘sexting,’ or the sending of sexually explicit images via smartphones. Thus far, most responses to youth sexting have largely been ineffective or unjust with adult authorities sometimes blaming victims of non-consensual sexting, using child pornography laws to paradoxically criminalise those they are designed to protect, and/or advising teenagers to simply abstain from the practice. Prevention strategies are further skewed, with sex education initiatives often targeted at girls, implying that they shoulder the responsibility of minimising the risks associated with sexting (e.g. revenge porn and sexual predation). Purpose of Study: Despite increasing public interest and concern about ‘teen sexting,’ there remains a dearth of research with young people regarding their experiences of navigating sex and relationships in the current digital media landscape. Furthermore, young people's views on sexting are rarely solicited in the policy and educational strategies aimed at them. To address this research-policy-education gap, an interdisciplinary team of four researchers (from anthropology, media, sociology and education) have undertaken a peer-to-peer research project to co-create a sexual health intervention. Methods: In the winter of 2015-2016, the research team conducted serial group interviews with four cohorts of students (aged 13 to 15) from a secondary school in the West Midlands, UK. To facilitate open dialogue, girls and boys were interviewed separately, and each group consisted of no more than four pupils. The team employed a range of participatory techniques to elicit young people’s views on sexting, its consequences, and its interventions. A final focus group session was conducted with all 14 male and female participants to explore developing a peer-to-peer ‘safe sexting’ education intervention. Findings: This presentation will highlight the ongoing, ‘old school’ sexual double standards at work within this new digital frontier. In the sharing of ‘nudes’ (teens’ preferred term to ‘sexting’) via social media apps (e.g. Snapchat and WhatsApp), girls felt sharing images was inherently risky and feared being blamed and ‘slut-shamed.’ In contrast, boys were seen to gain in social status if they accumulated nudes of female peers. Further, if boys had nudes of themselves shared without consent, they felt they were expected to simply ‘tough it out.’ The presentation will also explore what forms of supports teens desire to help them in their day-to-day navigation of these digitally mediated, heteronormative performances of teen femininity and masculinity expected of them. Conclusion: This is the first research project, within UK, conducted with rather than about teens and the phenomenon of sexting. It marks a timely and important contribution to the nascent, but growing body of knowledge on gender, sexual politics and the digital mobility of sexual images created by and circulated amongst young people.

Keywords: teens, sexting, gender, sexual politics

Procedia PDF Downloads 237
855 A Self-Coexistence Strategy for Spectrum Allocation Using Selfish and Unselfish Game Models in Cognitive Radio Networks

Authors: Noel Jeygar Robert, V. K.Vidya

Abstract:

Cognitive radio is a software-defined radio technology that allows cognitive users to operate on the vacant bands of spectrum allocated to licensed users. Cognitive radio plays a vital role in the efficient utilization of wireless radio spectrum available between cognitive users and licensed users without making any interference to licensed users. The spectrum allocation followed by spectrum sharing is done in a fashion where a cognitive user has to wait until spectrum holes are identified and allocated when the licensed user moves out of his own allocated spectrum. In this paper, we propose a self –coexistence strategy using bargaining and Cournot game model for achieving spectrum allocation in cognitive radio networks. The game-theoretic model analyses the behaviour of cognitive users in both cooperative and non-cooperative scenarios and provides an equilibrium level of spectrum allocation. Game-theoretic models such as bargaining game model and Cournot game model produce a balanced distribution of spectrum resources and energy consumption. Simulation results show that both game theories achieve better performance compared to other popular techniques

Keywords: cognitive radio, game theory, bargaining game, Cournot game

Procedia PDF Downloads 295
854 A New Method to Winner Determination for Economic Resource Allocation in Cloud Computing Systems

Authors: Ebrahim Behrouzian Nejad, Rezvan Alipoor Sabzevari

Abstract:

Cloud computing systems are large-scale distributed systems, so that they focus more on large scale resource sharing, cooperation of several organizations and their use in new applications. One of the main challenges in this realm is resource allocation. There are many different ways to resource allocation in cloud computing. One of the common methods to resource allocation are economic methods. Among these methods, the auction-based method has greater prominence compared with Fixed-Price method. The double combinatorial auction is one of the proper ways of resource allocation in cloud computing. This method includes two phases: winner determination and resource allocation. In this paper a new method has been presented to determine winner in double combinatorial auction-based resource allocation using Imperialist Competitive Algorithm (ICA). The experimental results show that in our new proposed the number of winner users is higher than genetic algorithm. On other hand, in proposed algorithm, the number of winner providers is higher in genetic algorithm.

Keywords: cloud computing, resource allocation, double auction, winner determination

Procedia PDF Downloads 357
853 Bamboo Resilience: Mentoring Asian Students to Develop their Self-Leadership via Online Seminars

Authors: Tam Nguyen

Abstract:

Self-leadership is strongly tied to the ability to be resilient in the face of adversity. This study aims to demonstrate how a strategy based on a culturally relevant "bamboo metaphor" enables Asian students to cross cultural boundaries and to engage in online discussions to unlock their self-leadership potential. Asian students are influenced to varying degrees by the Confucian heritage culture, which educates students to respect authority, maintain harmony, and avoid public confrontations. This has a significant impact on the cultural readiness of Asian students to express their development as self-leaders. In this research project, researchers as mentors individually assist students, cultivate cognitive progress, encourage and personally ask students to join a process of mentorship program. This study analyzes and interprets the data from a large online seminar in Ho Chi Minh City, Vietnam, where students were trained in self-leadership skills. Focus-group interviews were implemented among 90 students in the program. Findings reveal the emotional needs of Asian students and suggest a cognitive model for developing students' self-awareness, self-confidence, and self-efficacy. The research results are anticipated to be applicable to a broader Asian population with a comparable cultural environment to Vietnam.

Keywords: self-leadership, bamboo resilience, cognitive modeling, Asian culture

Procedia PDF Downloads 87
852 An Automatic Model Transformation Methodology Based on Semantic and Syntactic Comparisons and the Granularity Issue Involved

Authors: Tiexin Wang, Sebastien Truptil, Frederick Benaben

Abstract:

Model transformation, as a pivotal aspect of Model-driven engineering, attracts more and more attentions both from researchers and practitioners. Many domains (enterprise engineering, software engineering, knowledge engineering, etc.) use model transformation principles and practices to serve to their domain specific problems; furthermore, model transformation could also be used to fulfill the gap between different domains: by sharing and exchanging knowledge. Since model transformation has been widely used, there comes new requirement on it: effectively and efficiently define the transformation process and reduce manual effort that involved in. This paper presents an automatic model transformation methodology based on semantic and syntactic comparisons, and focuses particularly on granularity issue that existed in transformation process. Comparing to the traditional model transformation methodologies, this methodology serves to a general purpose: cross-domain methodology. Semantic and syntactic checking measurements are combined into a refined transformation process, which solves the granularity issue. Moreover, semantic and syntactic comparisons are supported by software tool; manual effort is replaced in this way.

Keywords: automatic model transformation, granularity issue, model-driven engineering, semantic and syntactic comparisons

Procedia PDF Downloads 394
851 An Overview of Privacy and Security Issues in Social Networks

Authors: Mohamad Ibrahim Al Ladan

Abstract:

Social networks, such as Facebook, Myspace, LinkedIn, Google+, and Twitter have experienced exponential growth and a remarkable adoption rate in recent years. They provide attractive means of online social interactions and communications with family, friends, and colleagues from around the corner or across the globe, and they have become an important part of daily digital interactions for more than one and a half billion users around the world. The various personal information sharing practices that social network providers encourage have led to their success as innovative social interaction platforms. However, these practices have resulted in ample concerns with respect to privacy and security from different stakeholders. Addressing these privacy and security concerns in social networks is a must for these networks to be sustainable. Existing security and privacy tools may not be enough to address existing concerns. Some guidelines should be followed to protect users from the existing risks. In this paper, we have investigated and discussed the various privacy and security issues and concerns pertaining to social networks. Moreover, we have classified these privacy and security issues and presented a thorough discussion of the implications of these issues and concerns on the future of the social networks. In addition, we have presented a set of guidelines as precaution measures that users can consider to address these issues and concerns.

Keywords: social networks privacy issues, social networks security issues, social networks privacy precautions measures, social networks security precautions measures

Procedia PDF Downloads 303
850 Rejuvenating Cultural Energy: Forging Pathways to Alternative Ecological and Development Paradigms

Authors: Aldrin R. Logdat

Abstract:

The insights and wisdom of the Alangan Mangyans offer valuable guidance for developing alternative ecological and development frameworks. Their reverence for the sacredness of the land, rooted in their traditional cosmology, guides their harmonious relationship with nature. Through their practice of swidden farming, ecosystem preservation takes precedence as they carefully manage agricultural activities and allow for forest regeneration. This approach aligns with natural processes, reflecting their profound understanding of the natural world. Similar to early advocates like Aldo Leopold, the emphasis is on shifting our perception of land from a commodity to a community. The indigenous wisdom of the Alangan Mangyans provides practical and sustainable approaches to preserving the interdependence of the biotic community and ecosystems. By integrating their cultural heritage, we can transcend the prevailing anthropocentric mindset and foster a meaningful and sustainable connection with nature. The revitalization of cultural energy and the embrace of alternative frameworks require learning from indigenous peoples like the Alangan Mangyans, where reverence for the land and the recognition of the interconnectedness between humanity and nature are prioritized. This paves the way for a future where harmony with nature and the well-being of the Earth community prevail.

Keywords: Alangan Mangyans, ecological frameworks, sacredness of the land, cultural energy

Procedia PDF Downloads 100
849 Self-Disclosure of Location: Influences of Personality Traits, Intrinsic Motivations and Extrinsic Motivations

Authors: Chechen Liao, Sheng Yi Lin

Abstract:

With the popularity of smartphone usage and the flourish of social networks, many people began to use the 'check-in' functions to share their location information and days of live and self-disclosure. In order to increase exposure and awareness, some stores provide discounts and other benefits to attract consumers to 'check-in' in their stores. The purpose of this study was to investigate whether personality traits, intrinsic motivations, extrinsic motivations, and privacy concerns would affect self-disclosure of location for consumers. Research data were collected from 407 individuals that have used Facebook check-in in Taiwan. This study used SmartPLS 2.0 structural equation modeling to validate the model. The results show that information sharing, information storage, enjoyment, self-presentation, get a feedback, economic reward, and keep up with trends had significant positive effects on self-disclosure. While extroversion and openness to use have significant positive effects on self-disclosure, conscientiousness and privacy concerns have significant negative effects on self-disclosure. The results of the study provide academic and practical implications for the future growth of location-based self-disclosure.

Keywords: check-in, extrinsic motivation, intrinsic motivation, personality trait, self-disclosure

Procedia PDF Downloads 170
848 Documentation of Traditional Knowledge on Wild Medicinal Plants of Egypt

Authors: Nahla S. Abdel-Azim, Khaled A. Shams, Elsayed A. Omer, Mahmoud M. Sakr

Abstract:

Medicinal plants play a significant role in the health care system in Egypt. Knowledge developed over the years by people is mostly unrecorded and orally passes on from one generation to the next. This knowledge is facing the danger of becoming extinct. Therefore there is an urgent need to document the medicinal and aromatic plants associated with traditional knowledge. The Egyptian Encyclopedia of wild medicinal plants (EEWMP) is the first attempt to collect most of the basic elements of the medicinal plant resources of Egypt and their traditional uses. It includes scientific data on about 500 medicinal plants in the form of monographs. Each monograph contains all available information and scientific data on the selected species including the following: names, description, distribution, parts used, habitat, conservational status, active or major chemical constituents, folk medicinal uses and heritage resources, pharmacological and biological activities, authentication, pharmaceutical products, and cultivation. The DNA bar-coding is also included (when available). A brief Arabic summary is given for every monograph. This work revealed the diversity in plant parts used in the treatment of different ailments. In addition, the traditional knowledge gathered can be considered a good starting point for effective in situ and ex-situ conservation of endangered plant species.

Keywords: encyclopedia, medicinal plant, traditional medicine, wild flora

Procedia PDF Downloads 212
847 Interaction with Earth’s Surface in Remote Sensing

Authors: Spoorthi Sripad

Abstract:

Remote sensing is a powerful tool for acquiring information about the Earth's surface without direct contact, relying on the interaction of electromagnetic radiation with various materials and features. This paper explores the fundamental principle of "Interaction with Earth's Surface" in remote sensing, shedding light on the intricate processes that occur when electromagnetic waves encounter different surfaces. The absorption, reflection, and transmission of radiation generate distinct spectral signatures, allowing for the identification and classification of surface materials. The paper delves into the significance of the visible, infrared, and thermal infrared regions of the electromagnetic spectrum, highlighting how their unique interactions contribute to a wealth of applications, from land cover classification to environmental monitoring. The discussion encompasses the types of sensors and platforms used to capture these interactions, including multispectral and hyperspectral imaging systems. By examining real-world applications, such as land cover classification and environmental monitoring, the paper underscores the critical role of understanding the interaction with the Earth's surface for accurate and meaningful interpretation of remote sensing data.

Keywords: remote sensing, earth's surface interaction, electromagnetic radiation, spectral signatures, land cover classification, archeology and cultural heritage preservation

Procedia PDF Downloads 56
846 Horizontal Cooperative Game Theory in Hotel Revenue Management

Authors: Ririh Rahma Ratinghayu, Jayu Pramudya, Nur Aini Masruroh, Shi-Woei Lin

Abstract:

This research studies pricing strategy in cooperative setting of hotel duopoly selling perishable product under fixed capacity constraint by using the perspective of managers. In hotel revenue management, competitor’s average room rate and occupancy rate should be taken into manager’s consideration in determining pricing strategy to generate optimum revenue. This information is not provided by business intelligence or available in competitor’s website. Thus, Information Sharing (IS) among players might result in improved performance of pricing strategy. IS is widely adopted in the logistics industry, but IS within hospitality industry has not been well-studied. This research put IS as one of cooperative game schemes, besides Mutual Price Setting (MPS) scheme. In off-peak season, hotel manager arranges pricing strategy to offer promotion package and various kinds of discounts up to 60% of full-price to attract customers. Competitor selling homogenous product will react the same, then triggers a price war. Price war which generates lower revenue may be avoided by creating collaboration in pricing strategy to optimize payoff for both players. In MPS cooperative game, players collaborate to set a room rate applied for both players. Cooperative game may avoid unfavorable players’ payoff caused by price war. Researches on horizontal cooperative game in logistics show better performance and payoff for the players, however, horizontal cooperative game in hotel revenue management has not been demonstrated. This paper aims to develop hotel revenue management models under duopoly cooperative schemes (IS & MPS), which are compared to models under non-cooperative scheme too. Each scheme has five models, Capacity Allocation Model; Demand Model; Revenue Model; Optimal Price Model; and Equilibrium Price Model. Capacity Allocation Model and Demand Model employs self-hotel and competitor’s full and discount price as predictors under non-linear relation. Optimal price is obtained by assuming revenue maximization motive. Equilibrium price is observed by interacting self-hotel’s and competitor’s optimal price under reaction equation. Equilibrium is analyzed using game theory approach. The sequence applies for three schemes. MPS Scheme differently aims to optimize total players’ payoff. The case study in which theoretical models are applied observes two hotels offering homogenous product in Indonesia during a year. The Capacity Allocation, Demand, and Revenue Models are built using multiple regression and statistically tested for validation. Case study data confirms that price behaves within demand model in a non-linear manner. IS Models can represent the actual demand and revenue data better than Non-IS Models. Furthermore, IS enables hotels to earn significantly higher revenue. Thus, duopoly hotel players in general, might have reasonable incentives to share information horizontally. During off-peak season, MPS Models are able to predict the optimal equal price for both hotels. However, Nash equilibrium may not always exist depending on actual payoff of adhering or betraying mutual agreement. To optimize performance, horizontal cooperative game may be chosen over non-cooperative game. Mathematical models can be used to detect collusion among business players. Empirical testing can be used as policy input for market regulator in preventing unethical business practices potentially harming society welfare.

Keywords: horizontal cooperative game theory, hotel revenue management, information sharing, mutual price setting

Procedia PDF Downloads 288
845 Evaluation of the Sustainability of Greek Vernacular Architecture in Different Climate Zones: Architectural Typology and Building Physics

Authors: Christina Kalogirou

Abstract:

Investigating the integration of bioclimatic design into vernacular architecture could lead to interesting results regarding the preservation of cultural heritage while enhancing the energy efficiency of historic buildings. Furthermore, these recognized principles and systems of bioclimatic design in vernacular settlements could be applied to modern architecture and thus to new buildings in such areas. This study introduces an approach to categorizing distinct technologies and design principles of bioclimatic design based on a thoughtful approach to various climatic zones and environment in Greece (mountainous areas, islands and lowlands). For this purpose, various types of dwellings are evaluated for their response to climate, regarding the layout of the buildings (orientation, floor plans’ shape, semi-open spaces), the site planning, the openings (size, position, protection), the building envelope (walls: construction materials-thickness, roof construction detailing) and the migratory living pattern according to seasonal needs. As a result, various passive design principles (that could be adapted to current architectural practice in such areas, in order to optimize the relationship between site, building, climate and energy efficiency) are proposed.

Keywords: bioclimatic design, buildings physics, climatic zones, energy efficiency, vernacular architecture

Procedia PDF Downloads 384
844 Juniperus thurefera Multiplication Tests by Cauttigs in Aures, Algeria

Authors: N. Khater, S. A. Menina, H. Benbouza

Abstract:

Juniperus thurefera is an endemic cupressacée constitutes a forest cover in the mountains of Aures (Algeria). It is a heritage and important ecological richness but continues to decline, highly endangered species in danger of extinction, these populations show significant originality due to climatic conditions of the environment, because of its strength and extraordinary vitality, made a powerful but fragile and unique ecosystem in which natural regeneration by seed is almost absent in Algeria. Because of the quality of seeds that are either dormant or affected at the tree and the ground level by a large number of pests and parasites, which will lead to the total disappearance of this species and consequently leading to the biodiversity. View the ecological and socio- economic interest presented by this case, it deserves to be preserved and produced in large quantities in this respect. The present work aims to try to regenerate the Juniperus thurefera via vegetative propagation. We studied the potential of cuttings to form adventitious roots and buds. Cuttings were taken from young subjects from 5 to 20 years treated with indole butyric acid (AIB) and planted out-inside perlite under atomizer whose temperature and light are controlled. Results indicated that the percentage of developing buds on cuttings is better than the rooting ones.

Keywords: Juniperus thurefera, indole butyric acid, cutting, buds, rooting

Procedia PDF Downloads 270
843 Attitude towards the Consumption of Social Media: Analyzing Young Consumers’ Travel Behavior

Authors: Farzana Sharmin, Mohammad Tipu Sultan, Benqian Li

Abstract:

Advancement of new media technology and consumption of social media have altered the way of communication in the tourism industry, mostly for consumers’ travel planning, online purchase, and experience sharing activity. There is an accelerating trend among young consumers’ to utilize this new media technology. This paper aims to analyze the attitude of young consumers’ about social media use for travel purposes. The convenience random sample method used to collect data from an urban area of Shanghai (China), consists of 225 young consumers’. This survey identified behavioral determinants of social media consumption by the extended theory of planned behavior (TPB). The instrument developed support on previous research to test hypotheses. The results of structural analyses indicate that attitude towards the use of social media is affected by external factors such as availability and accessibility of technology. In addition, subjective norm and perceived behavioral control have partially influenced the attitude of respondents’. The results of this study could help to improve social media travel marketing and promotional strategies for respective groups.

Keywords: social media, theory of planned behavior, travel behavior, young consumer

Procedia PDF Downloads 192
842 The Use of Hedging Devices in Studens’ Oral Presentation

Authors: Siti Navila

Abstract:

Hedging as a kind of pragmatic competence is an essential part in achieving the goal in communication, especially in academic discourse where the process of sharing knowledge among academic community takes place. Academic discourse demands an appropriateness and modesty of an author or speaker in stating arguments, to name but few, by considering the politeness, being cautious and tentative, and differentiating personal opinions and facts in which these aspects can be achieved through hedging. This study was conducted to find the hedging devices used by students as well as to analyze how they use them in their oral presentation. Some oral presentations from English Department students of the State University of Jakarta on their Academic Presentation course final test were recorded and explored formally and functionally. It was found that the most frequent hedging devices used by students were shields from all hedging devices that students commonly used when they showed suggestion, stated claims, showed opinion to provide possible but still valid answer, and offered the appropriate solution. The researcher suggests that hedging can be familiarized in learning, since potential conflicts that is likely to occur while delivering ideas in academic contexts such as disagreement, criticism, and personal judgment can be reduced with the use of hedging. It will also benefit students in achieving the academic competence with an ability to demonstrate their ideas appropriately and more acceptable in academic discourse.

Keywords: academic discourse, hedging, hedging devices, lexical hedges, Meyer classification

Procedia PDF Downloads 460
841 Reinvestment of the Urban Context in Historic Cities: The Case Study of El Sheikh Kandil Street, Rosetta, Egypt

Authors: Riham A. Ragheb, Ingy M. Naguib

Abstract:

Conservation and urban investment are a prerequisite to improve the quality of life. Since the historic street is a part of the economic system, it should be able to play an important role in the city development by upgrading all services, public open spaces and reuse of historical buildings and sites. Furthermore, historical conservation enriches the political, economic, social, cultural and functional aspects of the site. Rosetta has been selected as an area of study because it has a unique character due to its possession of a variety of monuments and historical buildings. The aim of this research is to analyze the existing situation of an historic street named El Sheikh Kandil, to be able to identify the potentials and problems. The paper gives a proposal for the redesign and reinvestment of the street and the reuse for the historical buildings to serve the community, users and visitors. Then, it concludes with recommendations to improve quality of life through the rehabilitation of the historical buildings and strengthening of the cultural and historical identity of the street. Rosetta city can benefit from these development proposals by preserving and revitalizing its unique character which leads to tourism development and benefits from the new investments.

Keywords: adaptive reuse, heritage street, historic investment, restoration, urban design

Procedia PDF Downloads 177
840 Reliability Analysis of Computer Centre at Yobe State University Using LRU Algorithm

Authors: V. V. Singh, Yusuf Ibrahim Gwanda, Rajesh Prasad

Abstract:

In this paper, we focus on the reliability and performance analysis of Computer Centre (CC) at Yobe State University, Damaturu, Nigeria. The CC consists of three servers: one database mail server, one redundant and one for sharing with the client computers in the CC (called as a local server). Observing the different possibilities of the functioning of the CC, the analysis has been done to evaluate the various popular measures of reliability such as availability, reliability, mean time to failure (MTTF), profit analysis due to the operation of the system. The system can ultimately fail due to the failure of router, redundant server before repairing the mail server and switch failure. The system can also partially fail when a local server fails. The failed devices have restored according to Least Recently Used (LRU) techniques. The system can also fail entirely due to a cooling failure of the server, electricity failure or some natural calamity like earthquake, fire tsunami, etc. All the failure rates are assumed to be constant and follow exponential time distribution, while the repair follows two types of distributions: i.e. general and Gumbel-Hougaard family copula distribution.

Keywords: reliability, availability Gumbel-Hougaard family copula, MTTF, internet data centre

Procedia PDF Downloads 529
839 Cultural Entanglements in the Urban Fabric: A Case of Festivals in Old Dhaka and its Impacts

Authors: Khandoker Upama Kabir, Mohammad Fuhad Anwar Sinha

Abstract:

Dhaka, the capital of Bangladesh, is known not only for its fast growing economy, lively atmosphere, rich history, and culture but is also known for having a reputation of being a vastly populated city. The historic city centre of Dhaka (currently known as Puran Dhaka or Old Dhaka) which was conceived around the Pre-Mughal era and holds a lot of history and heritage of the region. This historic site has further been neglected, and most of the urban development has been done without integrating this part of the city into the plans. As a result, the festivals that take place traditionally throughout the year in this area create a greater impact on the urban fabric of the whole city. These festivals generate a huge amount of visitors and play a huge role in shaping the identity of the people. This paper will attempt to look at the importance of these traditions, the way these festivals are influencing the urban life of the community, and whether or not it has any significant effect on the economy. Through the use of both primary and secondary sources and SWOT analysis, this paper will attempt to identify the issues faced during these festivals. This paper will also try to suggest some basic remedies based on general comparisons between case studies of similar festivals celebrated globally and how these countries are dealing with such issues while also promoting tourism.

Keywords: urban fabric, festivals, cultural celebration, impact, historic city centre urban memory, mega events

Procedia PDF Downloads 149
838 Sharing Experience in Authentic Learning for Mobile Security

Authors: Kai Qian, Lixin Tao

Abstract:

Mobile devices such as smartphones are getting more and more popular in our daily lives. The security vulnerability and threat attacks become a very emerging and important research and education topic in computing security discipline. There is a need to have an innovative mobile security hands-on laboratory to provide students with real world relevant mobile threat analysis and protection experience. This paper presents an authentic teaching and learning mobile security approach with smartphone devices which covers most important mobile threats in most aspects of mobile security. Each lab focuses on one type of mobile threats, such as mobile messaging threat, and conveys the threat analysis and protection in multiple ways, including lectures and tutorials, multimedia or app-based demonstration for threats analysis, and mobile app development for threat protections. This authentic learning approach is affordable and easily-adoptable which immerse students in a real world relevant learning environment with real devices. This approach can also be applied to many other mobile related courses such as mobile Java programming, database, network, and any security relevant courses so that can learn concepts and principles better with the hands-on authentic learning experience.

Keywords: mobile computing, Android, network, security, labware

Procedia PDF Downloads 405