Search results for: religion architecture
1225 Spatial Evaluations of Haskoy: The Emperial Village
Authors: Yasemin Filiz-Kuruel, Emine Koseoglu
Abstract:
This study aims to evaluate Haskoy district of Beyoglu town of Istanbul. Haskoy is located in Halic region, between Kasimpasa district and Kagithane district. After the conquest of Istanbul, Fatih Sultan Mehmet (the Conqueror) set up his tent here. Therefore, the area gets its name as Haskoy, 'imperial village' that means a village which is special for Sultan. Today, there are shipyard and ateliers in variable sizes in Haskoy. In this study, the legibility of Haskoy streets is investigated comparatively. As a research method, semantic differential scale is used. The photos of the streets, which contain specific criteria, are chosen. The questionnaire is directed to first and third grade architecture students. The spatial evaluation of Haskoy streets is done through the survey.Keywords: Haskoy, legibility, semantic differential scale, urban streets
Procedia PDF Downloads 5671224 A Common Automated Programming Platform for Knowledge Based Software Engineering
Authors: Ivan Stanev, Maria Koleva
Abstract:
A common platform for automated programming (CPAP) is defined in details. Two versions of CPAP are described: Cloud-based (including the set of components for classic programming, and the set of components for combined programming) and KBASE based (including the set of components for automated programming, and the set of components for ontology programming). Four KBASE products (module for automated programming of robots, intelligent product manual, intelligent document display, and intelligent form generator) are analyzed and CPAP contributions to automated programming are presented.Keywords: automated programming, cloud computing, knowledge based software engineering, service oriented architecture
Procedia PDF Downloads 3441223 Cultural Routes: A Study of Anatolian Seljuks Madrasahs
Authors: Zeynep İnan Ocak, Gülsün Tanyeli
Abstract:
One of the most important architectural types of Islamic architecture is madrasah used as educational institutions, hospital or observatory. This type of buildings has one or two storeys, central open or closed courtyards, four iwans and students cells located among the iwans. The main characteristic of the designs featured in the portals. The Islamic art features and adornments are seen well on these buildings made of stone. The earliest examples date to late 12th century in Anatolia after the Battle of Manzikert. Under the Seljuks rule over the one thousand facilities were built in 12th and 13th centuries and there are one hundred thirty five madrasah in total list. But today no all of them are conserved only forty percent are remained. The Seljuks madrasah located in many Anatolian were registered as immovable cultural property in several times by Turkish Culture and Tourism Ministry. The first Turkish buildings inscribed on the World Heritage List are the Great Mosque and Hospital of Divriği in 1985. Also the nominated site named as Anatolian Seljuks Madrasah is in the tentative list of UNESCO World Heritage in 2014. The property is composed some of notable madrasah such as İnce Minareli Madrasah and Karatay Madrasah in Konya; Çifte Madrasah and Sahibiye Madrasah in Kayseri; Buruciye Madrasah, Çifte Minareli Madrasah and Gök Madrasah in Sivas; Çifte Minareli Madrasah and Yakutiye Madrasah in Erzurum; Cacabey Madrasah in Kirşehir. Certainly the advantage of tourism is important for conducting the preservation of heritage. It offers much kind of cultural heritage products by means of visiting monuments. In spite of advantage of tourism, it can be the negative effects of tourism on sites and places of cultural significance. While assisting and guiding the conservation works of madrasah, it should be get reference to international charters and other doctrinal texts about the relation between heritage and tourism. Thereby the monuments will be conserved in good condition promoting by tourism. It should be plan a project about the correlation of visitors and heritage to focus on theme of Seljuks architecture. This study aims to set out the principles about the conservation of madrasah as world heritage taking advantages of tourism. The madrasah as a heritage should be evaluated not only a monument but also cultural route. So the cultural route for madrasah is determined by means of a journey through space and time, how the heritage of the different Anatolian cities. Also the cultural route is created visiting both the madrasah and the other medieval structures. In this study, the route, the principles, relation of tourism are represented considering the conservation of Seljuks madrasah.Keywords: architectural heritage, cultural routes, Seljuks madrasah, Anatolia
Procedia PDF Downloads 2871222 Stock Movement Prediction Using Price Factor and Deep Learning
Abstract:
The development of machine learning methods and techniques has opened doors for investigation in many areas such as medicines, economics, finance, etc. One active research area involving machine learning is stock market prediction. This research paper tries to consider multiple techniques and methods for stock movement prediction using historical price or price factors. The paper explores the effectiveness of some deep learning frameworks for forecasting stock. Moreover, an architecture (TimeStock) is proposed which takes the representation of time into account apart from the price information itself. Our model achieves a promising result that shows a potential approach for the stock movement prediction problem.Keywords: classification, machine learning, time representation, stock prediction
Procedia PDF Downloads 1471221 Enhancement of Environmental Security by the Application of Wireless Sensor Network in Nigeria
Authors: Ahmadu Girgiri, Lawan Gana Ali, Mamman M. Baba
Abstract:
Environmental security clearly articulates the perfections and developments of various communities around the world irrespective of the region, culture, religion or social inclination. Although, the present state of insecurity has become serious issue devastating the peace, unity, stability and progress of man and his physical environment particularly in developing countries. Recently, measure of security and it management in Nigeria has been a bottle-neck to the effectiveness and advancement of various sectors that include; business, education, social relations, politics and above all an economy. Several measures have been considered on mitigating environment insecurity such as surveillance, demarcation, security personnel empowerment and the likes, but still the issue remains disturbing. In this paper, we present the application of new technology that contributes to the improvement of security surveillance known as “Wireless Sensor Network (WSN)”. The system is new, smart and emerging technology that provides monitoring, detection and aggregation of information using sensor nodes and wireless network. WSN detects, monitors and stores information or activities in the deployed area such as schools, environment, business centers, public squares, industries, and outskirts and transmit to end users. This will reduce the cost of security funding and eases security surveillance depending on the nature and the requirement of the deployment.Keywords: application, environment, insecurity, sensor, wireless sensor network
Procedia PDF Downloads 2631220 Fiqh Al Aqalliyat (Jurisprude for Muslim Minorities): An Emerging Discourse for Western Minorities
Authors: Sana Tahzeeb
Abstract:
Role of Muslim minority in a democratic state has been the most debatable as well as attractive issue in the writings of the contemporary Muslim scholars, never discussed in the classical Islamic literature of history. Islam as a dominant religion has been the issue of academic discussions in the entire classical literature of Islamic jurisprudence the division of world into Dar al-Islam (abode of Islam), Dar al-Harb (abode of war) has been the main division on the basis of which Islam’s relation with the remaining world were defined and formulated. Now living in a global society the classical division of territories seems to be irrelevant. The new division of the same became necessary in the present situation particularly in view of the pluralistic society and need of power sharing in non-Muslim countries. It is important to note that a number of Muslim scholars of modern period examined this problem and other issues of Muslim minorities from legal point of view. Fiqh al-Aqalliyat is a newly developed discipline of Islamic jurisprudence. The rationale for this development is that there are so many issues of the Muslim minorities particularly in the European countries which are required to be discussed and examined juridically by Muslim jurists and scholars. There was also need for reinterpreting the term Dar al-Harb and relevance of its applicability to the west. The present paper shed a light on these emerging trends in Islamic world.Keywords: fiqh al Aqalliyat, Muslim minorities, Europe, Islam
Procedia PDF Downloads 3681219 A Three Tier Secure KQML Interface with Novel Performatives
Authors: Dimple Juneja, Aarti Singh, Renu Hooda
Abstract:
Knowledge Query Manipulation Language (KQML) and FIPA ACL are two prime communication languages existing in multi agent systems (MAS). Both languages are more or less similar in terms of semantics (based on speech act theory) and offer cutting edge competition while establishing agent communication across Internet. In contrast to the fact that software agents operating on the internet are required to be more safeguarded from their counter-peer, both protocols lack security performatives. The paper proposes a three tier security interface with few novel security related performatives enhancing the basic architecture of KQML. The three levels are attestation, certification and trust establishment which enforces a tight security and hence reduces the security breeches.Keywords: multiagent systems, KQML, FIPA ACL, performatives
Procedia PDF Downloads 4111218 Facial Emotion Recognition Using Deep Learning
Authors: Ashutosh Mishra, Nikhil Goyal
Abstract:
A 3D facial emotion recognition model based on deep learning is proposed in this paper. Two convolution layers and a pooling layer are employed in the deep learning architecture. After the convolution process, the pooling is finished. The probabilities for various classes of human faces are calculated using the sigmoid activation function. To verify the efficiency of deep learning-based systems, a set of faces. The Kaggle dataset is used to verify the accuracy of a deep learning-based face recognition model. The model's accuracy is about 65 percent, which is lower than that of other facial expression recognition techniques. Despite significant gains in representation precision due to the nonlinearity of profound image representations.Keywords: facial recognition, computational intelligence, convolutional neural network, depth map
Procedia PDF Downloads 2311217 The Significance of Oranyan Festival among the Oyo Yoruba
Authors: Emmanuel Bole Akinpelu
Abstract:
Festival is a social event that takes place every year which showcase culture and other social activities that usually take place in an environment or town. However, Oranyan Festival is an annual event organized and celebrated in Oyo town in honor of Oranyan the great who is reputed to be the overall head of the Kings of the Yoruba. This event is attended by people from all works of life. The Oyos are used to celebrating various cultural festivals; like Ogun, Oya, Sango, Egungun, Obatala and others. However, Oranyan festival in Oyo is a recent development in honour of Oranyan. He was said to be powerful and an embodiment of a unique cultural tradition. The study examined the significance of the festival to the Oyo Yoruba group. Oyo Yoruba cultural heritage include; Ewi, Ijala, Traditional food ‘Amala and Gbegiri’, Ekun Iyawo, (Bridal Chants), Traditional Music, Traditional Dance, Traditional Game ‘Ayo Olopon’ Eke (Traditional wrestling) and others. Data for this work was gathered through archival sources as journals and relevant publications on the various Oyo Yoruba Traditional Art and Culture. The study is of the opinion that the festival has influence over the religion, Political, economic and other aspects of the modern day traditions. The study also revealed that Oranyan Festival made people to have a better understanding of their rich Cultural Heritage and promoted unity among all and sundry. It also promotes peace among the people. Conclusively, it promotes the rich Cultural Heritage of Oyo Yoruba’s both within and outside NIGERIA and the world at large.Keywords: Yoruba Oyo, arts and culture, Oranyan, festival
Procedia PDF Downloads 3041216 Challenges of Implementing Zero Trust Security Based on NIST SP 800-207
Authors: Mazhar Hamayun
Abstract:
Organizations need to take a holistic approach to their Zero Trust strategic and tactical security needs. This includes using a framework-agnostic model that will ensure all enterprise resources are being accessed securely, regardless of their location. Such can be achieved through the implementation of a security posture, monitoring the posture, and adjusting the posture through the Identify, Detect, Protect, Respond, and Recover Methods, The target audience of this document includes those involved in the management and operational functions of risk, information security, and information technology. This audience consists of the chief information security officer, chief information officer, chief technology officer, and those leading digital transformation initiatives where Zero Trust methods can help protect an organization’s data assets.Keywords: ZTNA, zerotrust architecture, microsegmentation, NIST SP 800-207
Procedia PDF Downloads 871215 Queer Social Realism and Architecture in British Cinema: Tenement Housing, Unions and the Affective Body
Authors: Christopher Pullen
Abstract:
This paper explores the significance of British cinema in the late 1950s and early 1960s as offering a renaissance of realist discourse, in the representation of everyday social issues. Offering a rejection of Hollywood cinema and the superficially of the middle classes, these ‘kitchen sink dramas’ often set within modest and sometimes squalid domestic and social environments, focused on the political struggle of the disenfranchised examining poverty, the oppressed and the outsider. While films like Look Back in Anger and Room at the Top looked primarily at male heterosexual subjectivity, films like A Taste of Honey and Victim focused on female and queer male narratives. Framing the urban landscape as a discursive architectural arena, representing basic living conditions and threatening social worlds, these iconic films established new storytelling processes for the outsider. This paper examines this historical context foregrounding the contemporary films Beautiful Thing (Hettie Macdonald, 1996), Weekend (Andrew Haigh, 2011) and Pride (Marcus Warchus, 2014), while employing the process of textual analysis in relation to theories of affect, defined by writers such as Lisa U. Marks and Sara Ahmed. Considering both romance narratives and public demonstrations of unity, where the queer ‘affective’ body is placed within architectural and social space, Beautiful Thing tells the story of gay male teenagers falling in love despite oppression from family and school, Weekend examines a one-night stand between young gay men and the unlikeliness of commitment, but the drive for sensitivity, and Pride foregrounds an historical relationship between queer youth activists and the miner’s union, who were on strike between 1984-5. These films frame the queer ‘affective’ body within politicized public space, evident in lower class men’s working clubs, tenement housing and brutal modernist tower blocks, focusing on architectural features such as windows, doorways and staircases, relating temporality, desire and change. Through such an examination a hidden history of gay male performativity is revealed, framing the potential of contemporary cinema to focus on the context of the outsider in encouraging social change.Keywords: queer, affect, cinema, architecture, life chances
Procedia PDF Downloads 3581214 E-Service and the Nigerian Banking Sector: A Review of ATM Architecture and Operations
Authors: Bashir Aliyu Yauri, Rufai Aliyu Yauri
Abstract:
With the introduction of cash-less society policy by the Central Bank of Nigeria, the concept of e-banking services has experienced a significant improvement over the years. Today quite a number of people are embracing e-banking activities especially ATM, thereby moving away from the conventional banking system. This paper presents a review of the underlying Architectural Layout of Intra-Bank and Inter-Bank ATM connectivity in Nigeria. The paper further investigates and discusses factors affecting the Intra-Bank and Inter-Bank ATM connectivity in Nigeria. And as well possible solutions to these factors affecting ATM Connectivity and Operations are proposed.Keywords: architectural layout, automated teller machine, e-services, postilion
Procedia PDF Downloads 6341213 Complex Event Processing System Based on the Extended ECA Rule
Authors: Kwan Hee Han, Jun Woo Lee, Sung Moon Bae, Twae Kyung Park
Abstract:
ECA (Event-Condition-Action) languages are largely adopted for event processing since they are an intuitive and powerful paradigm for programming reactive systems. However, there are some limitations about ECA rules for processing of complex events such as coupling of event producer and consumer. The objective of this paper is to propose an ECA rule pattern to improve the current limitations of ECA rule, and to develop a prototype system. In this paper, conventional ECA rule is separated into 3 parts and each part is extended to meet the requirements of CEP. Finally, event processing logic is established by combining the relevant elements of 3 parts. The usability of proposed extended ECA rule is validated by a test scenario in this study.Keywords: complex event processing, ECA rule, Event processing system, event-driven architecture, internet of things
Procedia PDF Downloads 5301212 Security Issues in Long Term Evolution-Based Vehicle-To-Everything Communication Networks
Authors: Mujahid Muhammad, Paul Kearney, Adel Aneiba
Abstract:
The ability for vehicles to communicate with other vehicles (V2V), the physical (V2I) and network (V2N) infrastructures, pedestrians (V2P), etc. – collectively known as V2X (Vehicle to Everything) – will enable a broad and growing set of applications and services within the intelligent transport domain for improving road safety, alleviate traffic congestion and support autonomous driving. The telecommunication research and industry communities and standardization bodies (notably 3GPP) has finally approved in Release 14, cellular communications connectivity to support V2X communication (known as LTE – V2X). LTE – V2X system will combine simultaneous connectivity across existing LTE network infrastructures via LTE-Uu interface and direct device-to-device (D2D) communications. In order for V2X services to function effectively, a robust security mechanism is needed to ensure legal and safe interaction among authenticated V2X entities in the LTE-based V2X architecture. The characteristics of vehicular networks, and the nature of most V2X applications, which involve human safety makes it significant to protect V2X messages from attacks that can result in catastrophically wrong decisions/actions include ones affecting road safety. Attack vectors include impersonation attacks, modification, masquerading, replay, MiM attacks, and Sybil attacks. In this paper, we focus our attention on LTE-based V2X security and access control mechanisms. The current LTE-A security framework provides its own access authentication scheme, the AKA protocol for mutual authentication and other essential cryptographic operations between UEs and the network. V2N systems can leverage this protocol to achieve mutual authentication between vehicles and the mobile core network. However, this protocol experiences technical challenges, such as high signaling overhead, lack of synchronization, handover delay and potential control plane signaling overloads, as well as privacy preservation issues, which cannot satisfy the adequate security requirements for majority of LTE-based V2X services. This paper examines these challenges and points to possible ways by which they can be addressed. One possible solution, is the implementation of the distributed peer-to-peer LTE security mechanism based on the Bitcoin/Namecoin framework, to allow for security operations with minimal overhead cost, which is desirable for V2X services. The proposed architecture can ensure fast, secure and robust V2X services under LTE network while meeting V2X security requirements.Keywords: authentication, long term evolution, security, vehicle-to-everything
Procedia PDF Downloads 1671211 Specification of Requirements to Ensure Proper Implementation of Security Policies in Cloud-Based Multi-Tenant Systems
Authors: Rebecca Zahra, Joseph G. Vella, Ernest Cachia
Abstract:
The notion of cloud computing is rapidly gaining ground in the IT industry and is appealing mostly due to making computing more adaptable and expedient whilst diminishing the total cost of ownership. This paper focuses on the software as a service (SaaS) architecture of cloud computing which is used for the outsourcing of databases with their associated business processes. One approach for offering SaaS is basing the system’s architecture on multi-tenancy. Multi-tenancy allows multiple tenants (users) to make use of the same single application instance. Their requests and configurations might then differ according to specific requirements met through tenant customisation through the software. Despite the known advantages, companies still feel uneasy to opt for the multi-tenancy with data security being a principle concern. The fact that multiple tenants, possibly competitors, would have their data located on the same server process and share the same database tables heighten the fear of unauthorised access. Security is a vital aspect which needs to be considered by application developers, database administrators, data owners and end users. This is further complicated in cloud-based multi-tenant system where boundaries must be established between tenants and additional access control models must be in place to prevent unauthorised cross-tenant access to data. Moreover, when altering the database state, the transactions need to strictly adhere to the tenant’s known business processes. This paper focuses on the fact that security in cloud databases should not be considered as an isolated issue. Rather it should be included in the initial phases of the database design and monitored continuously throughout the whole development process. This paper aims to identify a number of the most common security risks and threats specifically in the area of multi-tenant cloud systems. Issues and bottlenecks relating to security risks in cloud databases are surveyed. Some techniques which might be utilised to overcome them are then listed and evaluated. After a description and evaluation of the main security threats, this paper produces a list of software requirements to ensure that proper security policies are implemented by a software development team when designing and implementing a multi-tenant based SaaS. This would then assist the cloud service providers to define, implement, and manage security policies as per tenant customisation requirements whilst assuring security for the customers’ data.Keywords: cloud computing, data management, multi-tenancy, requirements, security
Procedia PDF Downloads 1561210 Managing Cognitive Load in Accounting: An Analysis of Three Instructional Designs in Financial Accounting
Authors: Seedwell Sithole
Abstract:
One of the persistent problems in accounting education is how to effectively support students’ learning. A promising technique to this issue is to investigate the extent that learning is determined by the design of instructional material. This study examines the academic performance of students using three instructional designs in financial accounting. Student’s performance scores and reported mental effort ratings were used to determine the instructional effectiveness. The findings of this study show that accounting students prefer graph and text designs that are integrated. The results suggest that spatially separated graph and text presentations in accounting should be reorganized to align with the requirements of human cognitive architecture.Keywords: accounting, cognitive load, education, instructional preferences, students
Procedia PDF Downloads 1511209 Arabic Literature as a Tool for Educational Transformation in Nigeria
Authors: Abdulfatah A Raji
Abstract:
This paper started with the definitions of literature, Arabic literature, transformation and went further to highlight the components of educational transformation. The general history of Arabic literature was discussed with focus on how it undergoes some transformations from pre-Islamic period through Quranic era, Abbasid literature to renaissance period in which the modernization of Arabic literature started in Egypt. It also traces the spread of Arabic literature in Nigeria from the pre-colonial era during the Kanuri rulers to Jihad of Usman Dan Fodio and the development of literature which manifested to the Teacher’s Colleges and Bayero University in Northern Nigeria. Also, the establishment of primary and post-primary schools by Muslim organizations in many cities and towns of the Western part of Nigeria. Literary criticism was also discussed in line with Arabic literature. Poetry work of eminent poets were cited to show its importance in line with educational transformation in Nigerian literature and lessons from the cited Arabic poetry works were also highlighted to include: motivation to behave well and to tolerate others, better spirits of interaction, love and co-existence among different sexes, religion etc. All these can help in developing a better educational transformation in Nigeria which can in turn help in how to conduct researches for national development. The paper recommended compulsory Arabic literature at all levels of the nations’ educational system as well as publication of Arabic books and journals to encourage peace in this era of conflicts and further transform Nigeria’s educational system for better.Keywords: Arabic, literature, peace, development, Nigeria
Procedia PDF Downloads 4751208 An Informative Marketing Platform: Methodology and Architecture
Authors: Martina Marinelli, Samanta Vellante, Francesco Pilotti, Daniele Di Valerio, Gaetanino Paolone
Abstract:
Any development in web marketing technology requires changes in information engineering to identify instruments and techniques suitable for the production of software applications for informative marketing. Moreover, for large web solutions, designing an interface that enables human interactions is a complex process that must bridge between informative marketing requirements and the developed solution. A user-friendly interface in web marketing applications is crucial for a successful business. The paper introduces mkInfo - a software platform that implements informative marketing. Informative marketing is a new interpretation of marketing which places the information at the center of every marketing action. The creative team includes software engineering researchers who have recently authored an article on automatic code generation. The authors have created the mkInfo software platform to generate informative marketing web applications. For each web application, it is possible to automatically implement an opt in page, a landing page, a sales page, and a thank you page: one only needs to insert the content. mkInfo implements an autoresponder to send mail according to a predetermined schedule. The mkInfo platform also includes e-commerce for a product or service. The stakeholder can access any opt-in page and get basic information about a product or service. If he wants to know more, he will need to provide an e-mail address to access a landing page that will generate an e-mail sequence. It will provide him with complete information about the product or the service. From this point on, the stakeholder becomes a user and is now able to purchase the product or related services through the mkInfo platform. This paper suggests a possible definition for Informative Marketing, illustrates its basic principles, and finally details the mkInfo platform that implements it. This paper also offers some Informative Marketing models, which are implemented in the mkInfo platform. Informative marketing can be applied to products or services. It is necessary to realize a web application for each product or service. The mkInfo platform enables the product or the service producer to send information concerning a specific product or service to all stakeholders. In conclusion, the technical contributions of this paper are: a different interpretation of marketing based on information; a modular architecture for web applications, particularly for one with standard features such as information storage, exchange, and delivery; multiple models to implement informative marketing; a software platform enabling the implementation of such models in a web application. Future research aims to enable stakeholders to provide information about a product or a service so that the information gathered about a product or a service includes both the producer’s and the stakeholders' point of view. The purpose is to create an all-inclusive management system of the knowledge regarding a specific product or service: a system that includes everything about the product or service and is able to address even unexpected questions.Keywords: informative marketing, opt in page, software platform, web application
Procedia PDF Downloads 1271207 The Lightener of Love, the World Peace
Authors: Abdul Razzaq Azad, Muhammad Asad Razzaq
Abstract:
The current study reveals that Muslim society losing their basics concepts of courtesy which are the part of Islam. It is known that Muslims played a key role for providing piece in society throughout the history. Humanities always accept the changes through time, ideologies, ethics and traditions, various religious changes, culture, social behaviors and social problems, attitudes, political situations, literature, historical stress, economic clashes, wars and daily routine’s life. It also observed that religious people have their mind set due to their different religious teachings. All the religions have their different religious teachings which have different approaches for their followers. All the religions have same lesson of peace and prosperity. After 09/11 the entire scenario changed, even tried to connect terrorism and extremism with Islam and Muslims. It created a gap among religions and there was not attempt to use for reducing that gap. There were many meetings called at different places of religious scholars in different countries, but not able to get acceptable results. It also created a gap within the country in different religious sects. In the last 15 years there were14000 people have been killed from different religious incidents and even in different sects’ activities. The current study based on survey from 25 Imams and 10 Khatibs from South Punjab. The results show that they knew the word interfaith harmony and the role of Imams and Khatibs for peace in the inter-religious societies.Keywords: Islam, peace religion, terrorism, extremism, freedom, peace, prosperity and society
Procedia PDF Downloads 4951206 The Use of Indicators to Evaluate Minor Heritage Areas in a City
Authors: J. L. Oliver, T. Agryzkov, L. Tortosa, J. F. Vicent, J. Santacruz
Abstract:
This paper aims to demonstrate how a system of indicators can be used in order to evaluate some heritage areas which can be understood as minor ones. We mean by that those urban areas with high heritage interest from an academical point of view, but never properly valued. The reasons for this situation may be diverse, either they are not old enough, or they may show the modest architecture, the fact is these areas have not been considered deserving of protection, as the historical ones. As a result of this reality, they usually show now a very degraded urban space, which in addition contribute to accelerate a process of deterioration. Using a technic well known in urban design, we propose here a system of indicators for patrimonial purposes, as a tool to identify and quantify the heritage value of these kinds of areas. As a case study, we apply this system in some part of the City of Quito (El Ecuador).Keywords: heritage cities, indicators, spatial analysis, historic sites
Procedia PDF Downloads 2431205 Women Domestic Violence in Nepalese Society: A Case Study of Armala Village Development Committee, Kaski
Authors: Rajani Bogati, Gopini Pathak
Abstract:
Women living in husband’s home (second home) after getting married is a common culture in Nepalese society. Most of the marriages are arranged between the mutual understandings of their parents as per their cultural practice. Culturally, arranged marriage system protects women in the society. Even though, women domestic violence is also still alive in the society. It depends upon the family class, ethnicity, caste, religion etc. Lower class (poor) family always try to get marriage from the higher class (rich) family of girl and also try to send their girl in higher class family. This study analysis the freedom of women of Armala Village Development Committee, Kaski district on the base of the family class of girl where she born (First home). 88% women are getting more respect in their second home if their family class of first home and second homes are same. They feel more comfortable and freedom in their second home. 79% of Women are suffering from domestic violence while the marriage between the boys from higher class and the girls from lower class. But less than 10% women are getting distress from violence if the marriage is accompanied between the girls from higher class and the boys from lower class. Less domestic violence is seem where the both families are educated, even though they are from different class. This study recommends that the society should be educated first to reduce women domestic violence.Keywords: arranged marriage, women, family class, domestic violence
Procedia PDF Downloads 3221204 Investigating the Relationship between Bank and Cloud Provider
Authors: Hatim Elhag
Abstract:
Banking and Financial Service Institutions are possibly the most advanced in terms of technology adoption and use it as a key differentiator. With high levels of business process automation, maturity in the functional portfolio, straight through processing and proven technology outsourcing benefits, Banking sector stand to benefit significantly from Cloud computing capabilities. Additionally, with complex Compliance and Regulatory policies, combined with expansive products and geography coverage, the business impact is even greater. While the benefits are exponential, there are also significant challenges in adopting this model– including Legal, Security, Performance, Reliability, Transformation complexity, Operating control and Governance and most importantly proof for the promised cost benefits. However, new architecture designed should be implemented to align this approach.Keywords: security, cloud, banking sector, cloud computing
Procedia PDF Downloads 4991203 The Unique Journeys from Different Pasts to Multiple Presents in the Work of the Pritzker Prize Laureates of 2010-2020
Authors: Christakis Chatzichristou Kyriakos Miltiadou, Konstantinos Gounaridis
Abstract:
The paper discusses how the Pritzker Prize Laureates of the last decade themselves identify the various ways different aspects or interpretations of the past have influenced their design methodologies. As the recipients of what is considered to be the most prestigious award in architecture, these architects are worth examining not only because of their exemplary work but also because of the strong influence they have on architectural culture in general. Rather than attempting to interpret their projects, the methodology chosen focuses on what the architects themselves have to say on the subject. The research aims at, and, as the tabular form of the findings shows, also succeeds in revealing the numerous and diverse ways different aspects of what is termed as the Past can potentially enrich contemporary design practices.Keywords: design methodology, Pritzker Prize Laureates, past, culture, tradition
Procedia PDF Downloads 451202 Research on the Evolution of Public Space in Tourism-Oriented Traditional Rural Settlements
Authors: Yu Zhang, Mingxue Lang, Li Dong
Abstract:
The hundreds of years of slow succession of living environment in rural area is a crucial carrier of China’s long history of culture and national wisdom. In recent years, the space evolution of traditional rural settlements has been promoted by the intervention of tourism development, among which the public architecture and outdoor activity areas together served as the major places for villagers, and tourists’ social activities are an important characterization for settlement spatial evolution. Traditional public space upgrade and layout study of new public space can effectively promote the tourism industry development of traditional rural settlements. This article takes Qi County, one China Traditional Culture Village as the exemplification and uses the technology of Remote Sensing (RS), Geographic Information System (GIS) and Space Syntax, studies the evolution features of public space of tourism-oriented traditional rural settlements in four steps. First, acquire the 2003 and 2016 image data of Qi County, using the remote sensing application EDRAS8.6. Second, vectorize the basic maps of Qi County including its land use map with the application of ArcGIS 9.3 meanwhile, associating with architectural and site information concluded from field research. Third, analyze the accessibility and connectivity of the inner space of settlements using space syntax; run cross-correlation with the public space data of 2003 and 2016. Finally, summarize the evolution law of the public space of settlements; study the upgrade pattern of traditional public space and location plan for new public space. Major findings of this paper including: first, location layout of traditional public space has a larger association with the calculation results of space syntax and further confirmed the objective value of space syntax in expressing the space and social relations. Second, the intervention of tourism development generates remarkable impact on public space location of tradition rural settlements. Third, traditional public space produces the symbols of both strengthening and decline and forms a diversified upgrade pattern for the purpose of meeting the different tourism functional needs. Finally, space syntax provides an objective basis for location plan of new public space that meets the needs of tourism service. Tourism development has a significant impact on the evolution of public space of traditional rural settlements. Two types of public space, architecture, and site are both with changes seen from the perspective of quantity, location, dimension and function after the intervention of tourism development. Function upgrade of traditional public space and scientific layout of new public space are two important ways in achieving the goal of sustainable development of tourism-oriented traditional rural settlements.Keywords: public space evolution, Qi county, space syntax, tourism oriented, traditional rural settlements
Procedia PDF Downloads 3411201 Hydrogen: Contention-Aware Hybrid Memory Management for Heterogeneous CPU-GPU Architectures
Authors: Yiwei Li, Mingyu Gao
Abstract:
Integrating hybrid memories with heterogeneous processors could leverage heterogeneity in both compute and memory domains for better system efficiency. To ensure performance isolation, we introduce Hydrogen, a hardware architecture to optimize the allocation of hybrid memory resources to heterogeneous CPU-GPU systems. Hydrogen supports efficient capacity and bandwidth partitioning between CPUs and GPUs in both memory tiers. We propose decoupled memory channel mapping and token-based data migration throttling to enable flexible partitioning. We also support epoch-based online search for optimized configurations and lightweight reconfiguration with reduced data movements. Hydrogen significantly outperforms existing designs by 1.21x on average and up to 1.31x.Keywords: hybrid memory, heterogeneous systems, dram cache, graphics processing units
Procedia PDF Downloads 971200 Athena Parthenos: Athenian Cultural Imperialism and the Patriarchy
Authors: Kaia Brose
Abstract:
The Parthenon occupies a dominating position on top of the ancient Acropolis of Athens, giving the Greek world a clear view of the ancient city’s patron goddess, Athena. The technically refined nature of the fifth century B.C. temple, combined with the colossal statue of Athena Parthenos, has been considered a monumental tribute to Athenian hubris. The Parthenon specifically calls on Athena’s main personage as a goddess who creates and advances culture, a notion the Athenians specifically portray in her epithet as a parthenos or a virgin. This paper builds off of the modern research of R. F. Hooker, C. J. Herington and Susan Deacy, who discuss the evolution of Athena and distinguishes the significance of the Parthenos epithet attached to Athena on the Acropolis. The use of Parthenos suggests the Athenians intentionally portrayed a virginal Athena to reaffirm the presence of the patriarchy within the Greek world of the fifth century, specifically seen in the scene of Athena’s birth on the Parthenon. The suggestive subjugation of Athena to the patriarchy serves to establish a patriarchal presence within the Acropolis while simultaneously exposing the rise of Athenian hubris following the Persian War. Various elements of the Parthenon, from its pediments to the monumental statue inside, show Athena as a goddess reduced to mere womanhood in the presence of the patriarchy, a function that emphasizes the Athenian hubris displayed throughout the Parthenon.Keywords: ancient history, greek mythology, women studies, religion
Procedia PDF Downloads 2411199 On-Chip Aging Sensor Circuit Based on Phase Locked Loop Circuit
Authors: Ararat Khachatryan, Davit Mirzoyan
Abstract:
In sub micrometer technology, the aging phenomenon starts to have a significant impact on the reliability of integrated circuits by bringing performance degradation. For that reason, it is important to have a capability to evaluate the aging effects accurately. This paper presents an accurate aging measurement approach based on phase-locked loop (PLL) and voltage-controlled oscillator (VCO) circuit. The architecture is rejecting the circuit self-aging effect from the characteristics of PLL, which is generating the frequency without any aging phenomena affects. The aging monitor is implemented in low power 32 nm CMOS technology, and occupies a pretty small area. Aging simulation results show that the proposed aging measurement circuit improves accuracy by about 2.8% at high temperature and 19.6% at high voltage.Keywords: aging effect, HCI, NBTI, nanoscale
Procedia PDF Downloads 3591198 Taking Sides: The Frames of Online Media on the Bilateral Relationship between Moslem Countries (Malaysia and Indonesia)
Authors: Gatut Priyowidodo, I. I. Indrayani
Abstract:
The relations between Indonesia and Malaysia are always full of colors. Indonesia is always known as old brother of Malaysia since it has similar history, religion also socio culturally. Some decades show that the declination of relationship the both countries. Another time, as ASEAN members the two countries devotes their nationalities to purify their collective identities as Eastern. The objective of the research is to extricate the construction of Kompas online and Utusan online toward news coverage of the borders dispute between Indonesia-Malaysia in 2010. This research is proposed to examine central issues which reported by Kompas online and Utusan online consistently. As a media industry, Kompas coverage dominates circulation nationally. Kompas.com was the pioneer of online news in Indonesia and born in reformation era. Utusan is prominent media industry in Malaysia that conducted by UMNO as the ruling party in Malaysia for some periods. The method used in this research is framing method by Robert N. Entman’s which consists of four steps identification: defining problem, diagnosing causes, moral judgment and a treatment recommendation. This research found that Kompas news covered the border dispute must be negotiated as recognition of Indonesia dignity. In contrary, Utusan’s spectacle focused on the Indonesia demonstrans anarchism during the dispute.Keywords: online media, media construction, the border dispute, Indonesia-Malaysia’s bilateral relations
Procedia PDF Downloads 3411197 The Voyage of Adolfo Caminha to the USA: The Discourse about Americanism in Brazil in the Late Nineteenth Century
Authors: Maxwel F. Silva, José Geraldo Pedrosa
Abstract:
This paper is a study about the voyage of Adolfo Caminha to the USA in the late nineteenth century described in “No país dos ianques”. The hypothesis is that the USA constitutes a civilizing reference that moves away from Europe. The Americanism expression it means that the Yankees have invented a new repertoire through which built a new idea of civilization. The base is European, but your architecture is new. This paper is not concerned with the meanings and uses of the Americanism expression among the Yankees, but with the ways in which the America were understood by otherness, especially in the late nineteenth and early twentieth century. In this way, this study discusses the concept of Americanism in the thought of Adolfo Caminha and it is relation with the Brazil in the late nineteenth century, especially in questions about democracy, liberty and progress.Keywords: Adolfo Caminha, Americanism, discourse, voyage
Procedia PDF Downloads 5521196 Analysis and Design Modeling for Next Generation Network Intrusion Detection and Prevention System
Authors: Nareshkumar Harale, B. B. Meshram
Abstract:
The continued exponential growth of successful cyber intrusions against today’s businesses has made it abundantly clear that traditional perimeter security measures are no longer adequate and effective. We evolved the network trust architecture from trust-untrust to Zero-Trust, With Zero Trust, essential security capabilities are deployed in a way that provides policy enforcement and protection for all users, devices, applications, data resources, and the communications traffic between them, regardless of their location. Information exchange over the Internet, in spite of inclusion of advanced security controls, is always under innovative, inventive and prone to cyberattacks. TCP/IP protocol stack, the adapted standard for communication over network, suffers from inherent design vulnerabilities such as communication and session management protocols, routing protocols and security protocols are the major cause of major attacks. With the explosion of cyber security threats, such as viruses, worms, rootkits, malwares, Denial of Service attacks, accomplishing efficient and effective intrusion detection and prevention is become crucial and challenging too. In this paper, we propose a design and analysis model for next generation network intrusion detection and protection system as part of layered security strategy. The proposed system design provides intrusion detection for wide range of attacks with layered architecture and framework. The proposed network intrusion classification framework deals with cyberattacks on standard TCP/IP protocol, routing protocols and security protocols. It thereby forms the basis for detection of attack classes and applies signature based matching for known cyberattacks and data mining based machine learning approaches for unknown cyberattacks. Our proposed implemented software can effectively detect attacks even when malicious connections are hidden within normal events. The unsupervised learning algorithm applied to network audit data trails results in unknown intrusion detection. Association rule mining algorithms generate new rules from collected audit trail data resulting in increased intrusion prevention though integrated firewall systems. Intrusion response mechanisms can be initiated in real-time thereby minimizing the impact of network intrusions. Finally, we have shown that our approach can be validated and how the analysis results can be used for detecting and protection from the new network anomalies.Keywords: network intrusion detection, network intrusion prevention, association rule mining, system analysis and design
Procedia PDF Downloads 227