Search results for: role theory
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 13782

Search results for: role theory

12522 Zakariya Multaniand and his Role in the Spread of Islam and Suhrawardiyya in the Subcontinent

Authors: Mahdi Momeni

Abstract:

The arrival of Mysticism to the subcontinent can be generally divided into two periods. The first period, was the Sporadic arrival of Sufis whom were traveling to the subcontinent according to the tradition of disquisition and the second period was; when the Sufi dynasties were sending missionaries and caliphs to guide and promote people from different direction to that land. Among the Sufi dynasty that entered to India in the thirteenth century, two dynasties of Chishti and Suhrawardîya were more successful than other Sufi dynasties. And thus they are very important in the spread of Islam and Mysticism to the subcontinent. Suhrawardiyya dynasty was founded by Sheikh Ziauddin Abu Najib Suhrawardi and was developed and spread by his nephew Sheikh Shahabuddin Suhrawardi Abo hafs Omar. Sheikh Shahabuddin sent many Caliphs and missionaries to India. Among these missionaries were People like Sultan Sakhi Sarwar, Seyyed Noureddin Mobarak Ghaznavi, Sheikh Jalal al-din Tabrizi and Sheikh Zakariya Multani. Since Suhrawardiyya doctrine relies on Asceticism and Sharia, so one of the important elements among Suhrawardiyya missionaries was inviting people to Islam. Accordingly Sheikh Shahab Caliphs had a great role in the spread of Islam and Mysticism in different territories, especially India. Such that it can be pointed out is the the role of Sheikh Baha-ud-din Zakariya Multani, the founder of Suhrawardiyya Dynasty in India. Sheikh Zakaria Multani after working in three areas, establishing monasteries, training managers, having numerous trips to different places, participating to social affairs provided the spread of Islam and Mysticism in subcontinent. This paper studies his role and actions in the subcontinent.

Keywords: islam, sufism, Suhrawardiyya, subcontinent, Multan

Procedia PDF Downloads 479
12521 Reframing Service Sector Privatisation Quality Conception with the Theory of Deferred Action

Authors: Mukunda Bastola, Frank Nyame-Asiamah

Abstract:

Economics explanation for privatisation, drawing on neo-liberal market structures and technical efficiency principles has failed to address social imbalance and, distribute the efficiency benefits accrued from privatisation equitably among service users and different classes of people in society. Stakeholders’ interest, which cover ethical values and changing human needs are ignored due to shareholders’ profit maximising strategy with higher service charges. The consequence of these is that, the existing justifications for privatisation have fallen short of customer quality expectations because the underlying plan-based models fail to account for the nuances of customer expectations. We draw on the theory of deferred action to develop a context-based privatisation model, the deferred-based privatisation model, to explain how privatisation could be strategised for the emergent reality of the wider stakeholders’ interests and everyday quality demands of customers which are unpredictable.

Keywords: privatisation, service quality, shareholders, deferred action, deferred-based privatisation model

Procedia PDF Downloads 255
12520 Sororicide in the Forbidden City: Women Oppressing Each Other in the Chinese TV Drama “The Legend of Zhen Huan”

Authors: Muriel Canas-Walker

Abstract:

The 2012 TV series "The Legend of Zhen Huan" is one of the most popular and influential historical dramas on Chinese television and is regularly discussed on Chinese social media such as Weibo. Set in the Qing dynasty, the 76 episodes series features palace intrigues focused on female characters. In the Forbidden City, concubines must survive the cruelty of an extreme polygamy system, constantly competing against each other. The patriarchal oppression of the women sequestred in the harem relies on fierce female competition and does not leave much room for compassion. Using Michel Foucault’s theory of power, feminist theories, and visual anthropology, this paper analyzes the complex relationships between the female characters, from their rise to power to their fall from grace, from alliances to betrayals, from sorority to sororicide. This analysis aims to understand what makes this series particularly popular with young female audiences in China and explain its importance in Chinese media.

Keywords: Chinese TV Drama, feminism, popular culture, Theory of Power

Procedia PDF Downloads 155
12519 Understanding Cyber Kill Chains: Optimal Allocation of Monitoring Resources Using Cooperative Game Theory

Authors: Roy. H. A. Lindelauf

Abstract:

Cyberattacks are complex processes consisting of multiple interwoven tasks conducted by a set of agents. Interdictions and defenses against such attacks often rely on cyber kill chain (CKC) models. A CKC is a framework that tries to capture the actions taken by a cyber attacker. There exists a growing body of literature on CKCs. Most of this work either a) describes the CKC with respect to one or more specific cyberattacks or b) discusses the tools and technologies used by the attacker at each stage of the CKC. Defenders, facing scarce resources, have to decide where to allocate their resources given the CKC and partial knowledge on the tools and techniques attackers use. In this presentation CKCs are analyzed through the lens of covert projects, i.e., interrelated tasks that have to be conducted by agents (human and/or computer) with the aim of going undetected. Various aspects of covert project models have been studied abundantly in the operations research and game theory domain, think of resource-limited interdiction actions that maximally delay completion times of a weapons project for instance. This presentation has investigated both cooperative and non-cooperative game theoretic covert project models and elucidated their relation to CKC modelling. To view a CKC as a covert project each step in the CKC is broken down into tasks and there are players of which each one is capable of executing a subset of the tasks. Additionally, task inter-dependencies are represented by a schedule. Using multi-glove cooperative games it is shown how a defender can optimize the allocation of his scarce resources (what, where and how to monitor) against an attacker scheduling a CKC. This study presents and compares several cooperative game theoretic solution concepts as metrics for assigning resources to the monitoring of agents.

Keywords: cyber defense, cyber kill chain, game theory, information warfare techniques

Procedia PDF Downloads 127
12518 The Role of Online Videos in Undergraduate Casual-Leisure Information Behaviors

Authors: Nei-Ching Yeh

Abstract:

This study describes undergraduate casual-leisure information behaviors relevant to online videos. Diaries and in-depth interviews were used to collect data. Twenty-four undergraduates participated in this study (9 men, 15 women; all were aged 18–22 years). This study presents a model of casual-leisure information behaviors and contributes new insights into user experience in casual-leisure settings, such as online video programs, with implications for other information domains.

Keywords: casual-leisure information behaviors, information behavior, online videos, role

Procedia PDF Downloads 292
12517 Nonlinear Modelling of Sloshing Waves and Solitary Waves in Shallow Basins

Authors: Mohammad R. Jalali, Mohammad M. Jalali

Abstract:

The earliest theories of sloshing waves and solitary waves based on potential theory idealisations and irrotational flow have been extended to be applicable to more realistic domains. To this end, the computational fluid dynamics (CFD) methods are widely used. Three-dimensional CFD methods such as Navier-Stokes solvers with volume of fluid treatment of the free surface and Navier-Stokes solvers with mappings of the free surface inherently impose high computational expense; therefore, considerable effort has gone into developing depth-averaged approaches. Examples of such approaches include Green–Naghdi (GN) equations. In Cartesian system, GN velocity profile depends on horizontal directions, x-direction and y-direction. The effect of vertical direction (z-direction) is also taken into consideration by applying weighting function in approximation. GN theory considers the effect of vertical acceleration and the consequent non-hydrostatic pressure. Moreover, in GN theory, the flow is rotational. The present study illustrates the application of GN equations to propagation of sloshing waves and solitary waves. For this purpose, GN equations solver is verified for the benchmark tests of Gaussian hump sloshing and solitary wave propagation in shallow basins. Analysis of the free surface sloshing of even harmonic components of an initial Gaussian hump demonstrates that the GN model gives predictions in satisfactory agreement with the linear analytical solutions. Discrepancies between the GN predictions and the linear analytical solutions arise from the effect of wave nonlinearities arising from the wave amplitude itself and wave-wave interactions. Numerically predicted solitary wave propagation indicates that the GN model produces simulations in good agreement with the analytical solution of the linearised wave theory. Comparison between the GN model numerical prediction and the result from perturbation analysis confirms that nonlinear interaction between solitary wave and a solid wall is satisfactorilly modelled. Moreover, solitary wave propagation at an angle to the x-axis and the interaction of solitary waves with each other are conducted to validate the developed model.

Keywords: Green–Naghdi equations, nonlinearity, numerical prediction, sloshing waves, solitary waves

Procedia PDF Downloads 268
12516 The Public Policy of Energy Subsidies Reform in Egypt

Authors: Doaa Nounou

Abstract:

This research examines the public policy energy subsidies reform efforts in Egypt since 2014. Egypt’s widely used energy subsidies have been controversial since they were first introduced, as they inadequately target the poorest part of the population. Also, their effect on economic development and democratic transition became very challenging in recent years. This research argues that although subsidy reform is a highly politicalized issue in democratizing countries, there are still a number of pragmatic public policies that can be applied to make the subsidy system function more efficiently and at the same time decrease inequality which could facilitate a more orderly and peaceful transition to democracy. Therefore, this research attempts to study the role of the executive branch in reforming the subsidy programmes to support the poor and bring about structural changes to achieve social justice and economic growth. This research also attempts to analyze the role of the military and civil society in reforming the subsidy system. Moreover, it attempts to discuss the role of the state media in social mobilization to rationalize consumption and its contribution to subsidies reform.

Keywords: subsidies, public policy, political economy, democratization, equality

Procedia PDF Downloads 193
12515 The Effects of Cost-Sharing Contracts on the Costs and Operations of E-Commerce Supply Chains

Authors: Sahani Rathnasiri, Pritee Ray, Sardar M. N. Isalm, Carlos A. Vega-Mejia

Abstract:

This study develops a cooperative game theory-based cost-sharing contract model for a business to consumer (B2C) e-commerce supply chain to minimize the overall supply chain costs and the individual costs within an information asymmetry scenario. The objective of this study is to address the issues of strategic interactions among the key players of the e-commerce supply chain operation, which impedes the optimal operational outcomes. Game theory has been included in the field of supply chain management to resolve strategic decision-making issues; however, most of the studies are limited only to two-echelons of the supply chains. Multi-echelon supply chain optimizations based on game-theoretic models are less explored in the previous literature. This study adopts a cooperative game model to focus on the common payoff of operations and addresses the issues of information asymmetry and coordination of a three-echelon e-commerce supply chain. The cost-sharing contract model integrates operational features such as production, inventory management and distribution with the contract related constraints. The outcomes of the model highlight the importance of maintaining lower operational costs by all players to obtain benefits from the cost-sharing contract. Further, the cost-sharing contract ensures true cost revelation, and hence eliminates the information asymmetry issues among the players. Comparing the results of the contract model with the de-centralized e-commerce supply chain operation further emphasizes that the cost-sharing contract derives Pareto-improved outcomes and minimizes the costs of overall e-commerce supply chain operation.

Keywords: cooperative game theory, cost-sharing contract, e-commerce supply chain, information asymmetry

Procedia PDF Downloads 108
12514 Sensor Fault-Tolerant Model Predictive Control for Linear Parameter Varying Systems

Authors: Yushuai Wang, Feng Xu, Junbo Tan, Xueqian Wang, Bin Liang

Abstract:

In this paper, a sensor fault-tolerant control (FTC) scheme using robust model predictive control (RMPC) and set theoretic fault detection and isolation (FDI) is extended to linear parameter varying (LPV) systems. First, a group of set-valued observers are designed for passive fault detection (FD) and the observer gains are obtained through minimizing the size of invariant set of state estimation-error dynamics. Second, an input set for fault isolation (FI) is designed offline through set theory for actively isolating faults after FD. Third, an RMPC controller based on state estimation for LPV systems is designed to control the system in the presence of disturbance and measurement noise and tolerate faults. Besides, an FTC algorithm is proposed to maintain the plant operate in the corresponding mode when the fault occurs. Finally, a numerical example is used to show the effectiveness of the proposed results.

Keywords: fault detection, linear parameter varying, model predictive control, set theory

Procedia PDF Downloads 228
12513 Game-Theory-Based on Downlink Spectrum Allocation in Two-Tier Networks

Authors: Yu Zhang, Ye Tian, Fang Ye Yixuan Kang

Abstract:

The capacity of conventional cellular networks has reached its upper bound and it can be well handled by introducing femtocells with low-cost and easy-to-deploy. Spectrum interference issue becomes more critical in peace with the value-added multimedia services growing up increasingly in two-tier cellular networks. Spectrum allocation is one of effective methods in interference mitigation technology. This paper proposes a game-theory-based on OFDMA downlink spectrum allocation aiming at reducing co-channel interference in two-tier femtocell networks. The framework is formulated as a non-cooperative game, wherein the femto base stations are players and frequency channels available are strategies. The scheme takes full account of competitive behavior and fairness among stations. In addition, the utility function reflects the interference from the standpoint of channels essentially. This work focuses on co-channel interference and puts forward a negative logarithm interference function on distance weight ratio aiming at suppressing co-channel interference in the same layer network. This scenario is more suitable for actual network deployment and the system possesses high robustness. According to the proposed mechanism, interference exists only when players employ the same channel for data communication. This paper focuses on implementing spectrum allocation in a distributed fashion. Numerical results show that signal to interference and noise ratio can be obviously improved through the spectrum allocation scheme and the users quality of service in downlink can be satisfied. Besides, the average spectrum efficiency in cellular network can be significantly promoted as simulations results shown.

Keywords: femtocell networks, game theory, interference mitigation, spectrum allocation

Procedia PDF Downloads 140
12512 The Teacher’s Role in Generating and Maintaining the Motivation of Adult Learners of English: A Mixed Methods Study in Hungarian Corporate Contexts

Authors: Csaba Kalman

Abstract:

In spite of the existence of numerous second language (L2) motivation theories, the teacher’s role in motivating learners has remained an under-researched niche to this day. If we narrow down our focus on the teacher’s role on motivating adult learners of English in an English as a Foreign Language (EFL) context in corporate environments, empirical research is practically non-existent. This study fills the above research niche by exploring the most motivating aspects of the teacher’s personality, behaviour, and teaching practices that affect adult learners’ L2 motivation in corporate contexts in Hungary. The study was conducted in a wide range of industries in 18 organisations that employ over 250 people in Hungary. In order to triangulate the research, 21 human resources managers, 18 language teachers, and 466 adult learners of English were involved in the investigation by participating in interview studies, and quantitative questionnaire studies that measured ten scales related to the teacher’s role, as well as two criterion measure scales of intrinsic and extrinsic motivation. The qualitative data were analysed using a template organising style, while descriptive, inferential statistics, as well as multivariate statistical techniques, such as correlation and regression analyses, were used for analysing the quantitative data. The results showed that certain aspects of the teacher’s personality (thoroughness, enthusiasm, credibility, and flexibility), as well as preparedness, incorporating English for Specific Purposes (ESP) in the syllabus, and focusing on the present, proved to be the most salient aspects of the teacher’s motivating influence. The regression analyses conducted with the criterion measure scales revealed that 22% of the variance in learners’ intrinsic motivation could be explained by the teacher’s preparedness and appearance, and 23% of the variance in learners’ extrinsic motivation could be attributed to the teacher’s personal branding and incorporating ESP in the syllabus. The findings confirm the pivotal role teachers play in motivating L2 learners independent of the context they teach in; and, at the same time, call for further research so that we can better conceptualise the motivating influence of L2 teachers.

Keywords: adult learners, corporate contexts, motivation, teacher’s role

Procedia PDF Downloads 88
12511 The Role of Tax Management Components in Creating Value or Increasing Risk of Tehran Stock Exchange Firms

Authors: Fereshteh Darash

Abstract:

Reflective tax management corresponds to the Agency Theory since it determines the motivation of managers for tax management actions and short-term and long-term consequences. Therefore, selection of tax strategy contributes to the tax and financial position of the firm in the future. The aim of the present research is to evaluate the effect of tax management components on risk-taking of firms listed in Tehran stock exchange by using regression analysis method. Results show that tax effective rate, tax risk and tax planning have no significant effect on the firm's future risk. Results suggest that stakeholders assess the effective tax rate and delay in tax payment in line with their benefits. They tend to accept the higher risk cost for reduction of tax payments and benefits of higher liquidity in current period. Hence, effective tax rate and tax risk have no significant effect on future risk of the firm. Moreover, tax planning yields no information regarding the predictability of the future profits and as a result, it has no significant effect on the future risk of the firm since specific goals of financial reporting are in priority for the stakeholders and regardless of the firm’s data analysis, they take investment decisions and they less intend to purchase the stocks in a rational manner.

Keywords: tax management, tax effective rate, tax risk, tax planning, firm risk

Procedia PDF Downloads 113
12510 Study of the Buckling of Sandwich Beams Consider Stretching Effect

Authors: R. Bennai, H. Ait Atmane, H. Fourne, B. Ayache

Abstract:

In this work, an analytical approach using a refined theory of hyperbolic shear deformation of a beam was developed to study the buckling of graduated sandwiches beams under different boundary conditions. The effects of transverse shear strains and the transverse normal deformation are considered. The constituent materials of the beam are supposed gradually variable depending on the height direction based on a simple power distribution law in terms of the volume fractions of the constituents; the two materials with which we worked are metals and ceramics. The core layer is taken homogeneous and made of an isotropic material; while the banks layers consist of functionally graded materials with a homogeneous fraction compared to the middle layer. In the end, illustrative examples are presented to show the effects of changes in different parameters such as (material graduation, the stretching effect of the thickness, boundary conditions and thickness ratio-length) on the vibration free of an FGM sandwich beams.

Keywords: FGM materials, refined shear deformation theory, stretching effect, buckling

Procedia PDF Downloads 164
12509 Refined Procedures for Second Order Asymptotic Theory

Authors: Gubhinder Kundhi, Paul Rilstone

Abstract:

Refined procedures for higher-order asymptotic theory for non-linear models are developed. These include a new method for deriving stochastic expansions of arbitrary order, new methods for evaluating the moments of polynomials of sample averages, a new method for deriving the approximate moments of the stochastic expansions; an application of these techniques to gather improved inferences with the weak instruments problem is considered. It is well established that Instrumental Variable (IV) estimators in the presence of weak instruments can be poorly behaved, in particular, be quite biased in finite samples. In our application, finite sample approximations to the distributions of these estimators are obtained using Edgeworth and Saddlepoint expansions. Departures from normality of the distributions of these estimators are analyzed using higher order analytical corrections in these expansions. In a Monte-Carlo experiment, the performance of these expansions is compared to the first order approximation and other methods commonly used in finite samples such as the bootstrap.

Keywords: edgeworth expansions, higher order asymptotics, saddlepoint expansions, weak instruments

Procedia PDF Downloads 266
12508 Health Percentage Evaluation for Satellite Electrical Power System Based on Linear Stresses Accumulation Damage Theory

Authors: Lin Wenli, Fu Linchun, Zhang Yi, Wu Ming

Abstract:

To meet the demands of long-life and high-intelligence for satellites, the electrical power system should be provided with self-health condition evaluation capability. Any over-stress events in operations should be recorded. Based on Linear stresses accumulation damage theory, accumulative damage analysis was performed on thermal-mechanical-electrical united stresses for three components including the solar array, the batteries and the power conditioning unit. Then an overall health percentage evaluation model for satellite electrical power system was built. To obtain the accurate quantity for system health percentage, an automatic feedback closed-loop correction method for all coefficients in the evaluation model was present. The evaluation outputs could be referred as taking earlier fault-forecast and interventions for Ground Control Center or Satellites self.

Keywords: satellite electrical power system, health percentage, linear stresses accumulation damage, evaluation model

Procedia PDF Downloads 379
12507 Origin of Hydrogen Bonding: Natural Bond Orbital Electron Donor-Acceptor Interactions

Authors: Mohamed Ayoub

Abstract:

We perform computational investigation using density functional theory, B3LYP with aug-cc-pVTZ basis set followed by natural bond orbital analysis (NBO), which provides best single “natural Lewis structure” (NLS) representation of chosen wavefunction (Ψ) with natural resonance theory (NRT) to provide an analysis of molecular electron density in terms of resonance structures (RS) and weights (w). We selected for the study a wide range of gas phase dimers (B…HA), with hydrogen bond dissociation energies (ΔEB…H) that span more than two orders of magnitude. We demonstrate that charge transfer from a donor Lewis-type NBO (nB:) to an acceptor non-Lewis-type NBO (σHA*) is the primary cause for H-bonding not classical electrostatic (dipole-dipole or ionic). We provide a variety of structure, and spectroscopic descriptors to support the conclusion, such as IR frequency shift (ΔνHA), H-bond penetration distance (ΔRB..H), bond order (bB..H), charge-transfer (CTB→HA) and the corresponding donor-acceptor stabilization energy (ΔE(2)).

Keywords: natural bond orbital, hydrogen bonding, electron donor, electron acceptor

Procedia PDF Downloads 418
12506 Drug Delivery of Cyclophosphamide Functionalized Zigzag (8,0) CNT, Armchair (4,4) CNT, and Nanocone Complexes in Water

Authors: Morteza Keshavarz

Abstract:

In this work, using density functional theory (DFT) thermodynamic stability and quantum molecular descriptors of cyclophoshphamide (an anticancer drug)-functionalized zigzag (8,0) CNT, armchair (4,4) CNT and nanocone complexes in water, for two attachment namely the sidewall and tip, is considered. Calculation of the total electronic energy (Et) and binding energy (Eb) of all complexes indicates that the most thermodynamic stability belongs to the sidewall-attachment of cyclophosphamide into functional nanocone. On the other hand, results from chemical hardness show that drug-functionalized zigzag (8,0) and armchair (4,4) complexes in the tip-attachment configuration possess the smallest and greatest chemical hardness, respectively. By computing the solvation energy, it is found that the solution of the drug and all complexes are spontaneous in water. Furthermore, chirality, type of nanovector (nanotube or nanocone), or attachment configuration have no effects on solvation energy of complexes.

Keywords: carbon nanotube, drug delivery, cyclophosphamide drug, density functional theory (DFT)

Procedia PDF Downloads 343
12505 Social and Digital Transformation of the Saudi Education System: A Cyberconflict Analysis

Authors: Mai Alshareef

Abstract:

The Saudi government considers the modernisation of the education system as a critical component of the national development plan, Saudi Vision 2030; however, this sudden reform creates tension amongst Saudis. This study examines first the reflection of the social and digital education reform on stakeholders and the general Saudi public, and second, the influence of information and communication technologies (ICTs) on the ethnoreligious conflict in Saudi Arabia. This study employs Cyberconflict theory to examine conflicts in the real world and cyberspace. The findings are based on a qualitative case study methodology that uses netnography, an analysis of 3,750 Twitter posts and semi-structural interviews with 30 individuals, including key actors in the Saudi education sector and Twitter activists during 2019\2020. The methods utilised are guided by thematic analysis to map an understanding of factors that influence societal conflicts in Saudi Arabia, which in this case include religious, national, and gender identity. Elements of Cyberconflict theory are used to better understand how conflicting groups build their identities in connection to their ethnic/religious/cultural differences and competing national identities. The findings correspond to the ethnoreligious components of the Cyberconflict theory. Twitter became a battleground for liberals, conservatives, the Saudi public and elites, and it is used in a novel way to influence public opinion and to challenge the media monopoly. Opposing groups relied heavily on a discourse of exclusion and inclusion and showed ethnic and religious affiliations, national identity, and chauvinism. The findings add to existing knowledge in the cyberconflict field of study, and they also reveal outcomes that are critical to the Saudi Arabian national context.

Keywords: education, cyberconflict, Twitter, national identity

Procedia PDF Downloads 164
12504 Evaluation of Teaching Team Stress Factors in Two Engineering Education Programs

Authors: Kari Bjorn

Abstract:

Team learning has been studied and modeled as double loop model and its variations. Also, metacognition has been suggested as a concept to describe the nature of team learning to be more than a simple sum of individual learning of the team members. Team learning has a positive correlation with both individual motivation of its members, as well as the collective factors within the team. Team learning of previously very independent members of two teaching teams is analyzed. Applied Science Universities are training future professionals with ever more diversified and multidisciplinary skills. The size of the units of teaching and learning are increasingly larger for several reasons. First, multi-disciplinary skill development requires more active learning and richer learning environments and learning experiences. This occurs on students teams. Secondly, teaching of multidisciplinary skills requires a multidisciplinary and team-based teaching from the teachers as well. Team formation phases have been identifies and widely accepted. Team role stress has been analyzed in project teams. Projects typically have a well-defined goal and organization. This paper explores team stress of two teacher teams in a parallel running two course units in engineering education. The first is an Industrial Automation Technology and the second is Development of Medical Devices. The courses have a separate student group, and they are in different campuses. Both are run in parallel within 8 week time. Both of them are taught by a group of four teachers with several years of teaching experience, but individually. The team role stress scale items - the survey is done to both teaching groups at the beginning of the course and at the end of the course. The inventory of questions covers the factors of ambiguity, conflict, quantitative role overload and qualitative role overload. Some comparison to the study on project teams can be drawn. Team development stage of the two teaching groups is different. Relating the team role stress factors to the development stage of the group can reveal the potential of management actions to promote team building and to understand the maturity of functional and well-established teams. Mature teams indicate higher job satisfaction and deliver higher performance. Especially, teaching teams who deliver highly intangible results of learning outcome are sensitive to issues in the job satisfaction and team conflicts. Because team teaching is increasing, the paper provides a review of the relevant theories and initial comparative and longitudinal results of the team role stress factors applied to teaching teams.

Keywords: engineering education, stress, team role, team teaching

Procedia PDF Downloads 205
12503 Role of Moderate Intensity Exercises in the Amelioration of Oxidant-Antioxidant Status and the Levels of Inflammatory Cytokines in Rheumatoid Arthritis Patients

Authors: Somaiya Mateen, Shagufta Moin, Abdul Qayyum, Atif Zafar

Abstract:

Cytokines and reactive species play an important role in the pathophysiology of rheumatoid arthritis (RA). This study was done to determine the levels of reactive oxygen and nitrogen species (ROS and RNS), inflammatory cytokines and the markers of protein, DNA and lipid oxidation in the blood of RA patients, with the aim to study the antioxidant and anti-inflammatory role of moderate intensity exercises in the management of RA. RA patients were subdivided into two groups- first group (n=30) received treatment with conventional RA drugs while the second group (n=30) received moderate exercise therapy along with the conventional drugs for a period of 12 weeks. The levels of ROS, RNS, inflammatory cytokines and markers of biomolecule oxidation were monitored before and after 12 weeks of treatment. RA patients showed a marked increase in the levels of ROS, RNS, inflammatory cytokines, lipid, protein and DNA oxidation as compared to the healthy controls. These parameters were ameliorated after treatment with drugs alone and exercise combined with drugs, with the amelioration being more significant in patients given drugs along with the moderate intensity exercise treatment. In conclusion, the role of ROS, RNS and inflammatory cytokines in the pathogenesis of RA has been confirmed by this study. These may also serve as potential biomarker for assessing the disease severity. Finally, the addition of moderate intensity exercises in the management of RA may be of great value.

Keywords: rheumatoid arthritis, reactive oxygen species, inflammatory cytokines, moderate intensity exercises

Procedia PDF Downloads 311
12502 The Role of the State Budget: An Evaluation of Public Expenditures and Taxes in Turkey

Authors: Erdal Eroğlu, Özhan Çetinkaya

Abstract:

The purpose of this paper is to show how state plays a regulatory role in the relations of distribution by analyzing tax and expenditure in Turkey. This paper has two main arguments. First, state intervenes in economic and social life via budget policies and steers the relations of distribution within the scope of the reproduction of the capital accumulation and legitimacy. Secondly, a great amount of public expenditure benefits capital owners while state gains its tax income mainly from low and middle income groups.

Keywords: distribution, public expenditure, state budget, taxes

Procedia PDF Downloads 508
12501 Hsa-miR-139-5p Acts as a Tumor Suppressor by Targeting C-Met in Non-Small Cell Lung Cancer

Authors: Chengcao Sun, Shujun Li, Cuili Yang, Yongyong Xi, Liang Wang, Feng Zhang, Dejia Li

Abstract:

Hsa-miRNA-139-5p (miR-139-5p) has recently been discovered having anticancer efficacy in different organs. However, the role of miR-139-5p on lung cancer is still ambiguous. In this study, we investigated the role of miR-139-5p on development of lung cancer. Results indicated miR-139-5p was significantly down-regulated in primary tumor tissues and very low levels were found in a non-small cell lung cancer (NSCLC) cell lines. Ectopic expression of miR-139-5p in NSCLC cell lines significantly suppressed cell growth through inhibition of cyclin D1 and up-regulation of p57(Kip2). In addition, miR-139-5p induced apoptosis, as indicated by up-regulation of key apoptosis gene cleaved caspase-3, and down-regulation of anti-apoptosis gene Bcl2. Moreover, miR-139-5p inhibited cellular metastasis through inhibition of matrix metalloproteinases (MMP)-7 and MMP-9. Further, oncogene c-Met was revealed to be a putative target of miR-139-5p, which was inversely correlated with miR-139-5p expression. Taken together, our results demonstrated that miR-139-5p plays a pivotal role in lung cancer through inhibiting cell proliferation, metastasis, and promoting apoptosis by targeting oncogenic c-Met.

Keywords: hsa-miRNA-139-5p (miR-139-5p), c-Met, non-small cell lung cancer (NSCLC), proliferation, apoptosis

Procedia PDF Downloads 322
12500 Using Axiomatic Design for Developing a Framework of Manufacturing Cloud Service Composition in the Equilibrium State

Authors: Ehsan Vaziri Goodarzi, Mahmood Houshmand, Omid Fatahi Valilai, Vahidreza Ghezavati, Shahrooz Bamdad

Abstract:

One important paradigm of industry 4.0 is Cloud Manufacturing (CM). In CM everything is considered as a service, therefore, the CM platform should consider all service provider's capabilities and tries to integrate services in an equilibrium state. This research develops a framework for implementing manufacturing cloud service composition in the equilibrium state. The developed framework using well-known tools called axiomatic design (AD) and game theory. The research has investigated the factors for forming equilibrium for measures of the manufacturing cloud service composition. Functional requirements (FRs) represent the measures of manufacturing cloud service composition in the equilibrium state. These FRs satisfied by related Design Parameters (DPs). The FRs and DPs are defined by considering the game theory, QoS, consumer needs, parallel and cooperative services. Ultimately, four FRs and DPs represent the framework. To insure the validity of the framework, the authors have used the first AD’s independent axiom.

Keywords: axiomatic design, manufacturing cloud service composition, cloud manufacturing, industry 4.0

Procedia PDF Downloads 160
12499 Spin-Polarized Structural, Electronic, and Magnetic Properties of Co and Mn-Doped CdTe in Zinc-Blende Phase

Authors: A.Zitouni, S.Bentata, B.Bouadjemi, T.Lantri, W. Benstaali, Z.Aziz, S.Cherid, A. Sefir

Abstract:

Structural, electronic, and magnetic properties of Co and Mn-doped CdTe have been studied by employing the full potential linear augmented plane waves (FP-LAPW) method within the spin-polarized density functional theory (DFT). The electronic exchange-correlation energy is described by generalized gradient approximation (GGA) as exchange–correlation (XC) potential. We have calculated the lattice parameters, bulk modulii and the first pressure derivatives of the bulk modulii, spin-polarized band structures, and total and local densities of states. The value of calculated magnetic moment per Co and Mn impurity atoms is found to be 2.21 µB for CdCoTe and 3.20 µB for CdMnTe. The calculated densities of states presented in this study identify the half-metallic of Co and Mn-doped CdTe.

Keywords: electronic structure, density functional theory, band structures, half-metallic, magnetic moment

Procedia PDF Downloads 445
12498 Factors of Social Network Platform Usage and Privacy Risk: A Unified Theory of Acceptance and Use of Technology2 Model

Authors: Wang Xue, Fan Liwei

Abstract:

The trust and use of social network platforms by users are instrumental factors that contribute to the platform’s sustainable development. Studying the influential factors of the use of social network platforms is beneficial for developing and maintaining a large user base. This study constructed an extended unified theory of acceptance and use of technology (UTAUT2) moderating model with perceived privacy risks to analyze the factors affecting the trust and use of social network platforms. 444 participants completed our 35 surveys, and we verified the survey results by structural equation model. Empirical results reveal the influencing factors that affect the trust and use of social network platforms, and the extended UTAUT2 model with perceived privacy risks increases the applicability of UTAUT2 in social network scenarios. Social networking platforms can increase their use rate by increasing the economics, functionality, entertainment, and privacy security of the platform.

Keywords: perceived privacy risk, social network, trust, use, UTAUT2 model

Procedia PDF Downloads 73
12497 Acceptance of Health Information Application in Smart National Identity Card (SNIC) Using a New I-P Framework

Authors: Ismail Bile Hassan, Masrah Azrifah Azmi Murad

Abstract:

This study discovers a novel framework of individual level technology adoption known as I-P (Individual- Privacy) towards Smart National Identity Card health information application. Many countries introduced smart national identity card (SNIC) with various applications such as health information application embedded inside it. However, the degree to which citizens accept and use some of the embedded applications in smart national identity remains unknown to many governments and application providers as well. Moreover, the previous studies revealed that the factors of trust, perceived risk, privacy concern and perceived credibility need to be incorporated into more comprehensive models such as extended Unified Theory of Acceptance and Use of Technology known as UTAUT2. UTAUT2 is a mainly widespread and leading theory existing in the information system literature up to now. This research identifies factors affecting the citizens’ behavioural intention to use health information application embedded in SNIC and extends better understanding on the relevant factors that the government and the application providers would need to consider in predicting citizens’ new technology acceptance in the future. We propose a conceptual framework by combining the UTAUT2 and Privacy Calculus Model constructs and also adding perceived credibility as a new variable. The proposed framework may provide assistance to any government planning, decision, and policy makers involving e-government projects. The empirical study may be conducted in the future to provide proof and empirically validate this I-P framework.

Keywords: unified theory of acceptance and use of technology (UTAUT) model, UTAUT2 model, smart national identity card (SNIC), health information application, privacy calculus model (PCM)

Procedia PDF Downloads 449
12496 United against Drugs: Divergent Counternarcotic Strategies of US Government Agencies in Afghanistan

Authors: Anthony George Armiger II

Abstract:

This paper focuses on the counternarcotic strategies of US government agencies in Afghanistan from 2001-2014. Despite a heavy US presence in the country, Afghanistan currently accounts for 80% of opium production worldwide and remains a key contributor to the global drug market. This paper argues that the divergent counternarcotic strategies of various US government agencies on the ground in Afghanistan are a product of the organizational differences amongst those agencies and that those differences can challenge the implementation of counternarcotics policies in Afghanistan. To gain a more in-depth perspective, this paper analyzes the counternarcotic strategies of two US government agencies in Afghanistan; the United States Department of Defense (DoD) and the Drug Enforcement Administration (DEA). Utilizing the framework of the organizational behavior model of organizational theory, this paper will highlight the varying organizational interests, opinions, standard operating procedures, and routines of both of the government agencies. The paper concludes with implications on counternarcotics, as well as the counterinsurgency in Afghanistan and provides recommendations for future research on foreign policy and counternarcotics.

Keywords: Afghanistan, drug policy, organizational theory, United States foreign policy

Procedia PDF Downloads 359
12495 Hybrid Knowledge Approach for Determining Health Care Provider Specialty from Patient Diagnoses

Authors: Erin Lynne Plettenberg, Jeremy Vickery

Abstract:

In an access-control situation, the role of a user determines whether a data request is appropriate. This paper combines vetted web mining and logic modeling to build a lightweight system for determining the role of a health care provider based only on their prior authorized requests. The model identifies provider roles with 100% recall from very little data. This shows the value of vetted web mining in AI systems, and suggests the impact of the ICD classification on medical practice.

Keywords: electronic medical records, information extraction, logic modeling, ontology, vetted web mining

Procedia PDF Downloads 158
12494 Movement Optimization of Robotic Arm Movement Using Soft Computing

Authors: V. K. Banga

Abstract:

Robots are now playing a very promising role in industries. Robots are commonly used in applications in repeated operations or where operation by human is either risky or not feasible. In most of the industrial applications, robotic arm manipulators are widely used. Robotic arm manipulator with two link or three link structures is commonly used due to their low degrees-of-freedom (DOF) movement. As the DOF of robotic arm increased, complexity increases. Instrumentation involved with robotics plays very important role in order to interact with outer environment. In this work, optimal control for movement of various DOFs of robotic arm using various soft computing techniques has been presented. We have discussed about different robotic structures having various DOF robotics arm movement. Further stress is on kinematics of the arm structures i.e. forward kinematics and inverse kinematics. Trajectory planning of robotic arms using soft computing techniques is demonstrating the flexibility of this technique. The performance is optimized for all possible input values and results in optimized movement as resultant output. In conclusion, soft computing has been playing very important role for achieving optimized movement of robotic arm. It also requires very limited knowledge of the system to implement soft computing techniques.

Keywords: artificial intelligence, kinematics, robotic arm, neural networks, fuzzy logic

Procedia PDF Downloads 275
12493 Applying Theory of Self-Efficacy in Intelligent Transportation Systems by Potential Usage of Vehicle as a Sensor

Authors: Aby Nesan Raj, Sumil K. Raj, Sumesh Jayan

Abstract:

The objective of the study is to formulate a self-regulation model that shall enhance the usage of Intelligent Transportation Systems by understanding the theory of self-efficacy. The core logic of the self-regulation model shall monitor driver's behavior based on the situations related to the various sources of Self Efficacy like enactive mastery, vicarious experience, verbal persuasion and physiological arousal in addition to the vehicle data. For this study, four different vehicle data, speed, drowsiness, diagnostic data and surround camera views are considered. This data shall be given to the self-regulation model for evaluation. The oddness, which is the output of self-regulation model, shall feed to Intelligent Transportation Systems where appropriate actions are being taken. These actions include warning to the user as well as the input to the related transportation systems. It is also observed that the usage of vehicle as a sensor reduces the wastage of resource utilization or duplication. Altogether, this approach enhances the intelligence of the transportation systems especially in safety, productivity and environmental performance.

Keywords: emergency management, intelligent transportation system, self-efficacy, traffic management

Procedia PDF Downloads 228