Search results for: Sangam text and trade
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 2251

Search results for: Sangam text and trade

901 Analysis of Facial Expressions with Amazon Rekognition

Authors: Kashika P. H.

Abstract:

The development of computer vision systems has been greatly aided by the efficient and precise detection of images and videos. Although the ability to recognize and comprehend images is a strength of the human brain, employing technology to tackle this issue is exceedingly challenging. In the past few years, the use of Deep Learning algorithms to treat object detection has dramatically expanded. One of the key issues in the realm of image recognition is the recognition and detection of certain notable people from randomly acquired photographs. Face recognition uses a way to identify, assess, and compare faces for a variety of purposes, including user identification, user counting, and classification. With the aid of an accessible deep learning-based API, this article intends to recognize various faces of people and their facial descriptors more accurately. The purpose of this study is to locate suitable individuals and deliver accurate information about them by using the Amazon Rekognition system to identify a specific human from a vast image dataset. We have chosen the Amazon Rekognition system, which allows for more accurate face analysis, face comparison, and face search, to tackle this difficulty.

Keywords: Amazon rekognition, API, deep learning, computer vision, face detection, text detection

Procedia PDF Downloads 104
900 The Prostitute’s Body in Diasporic Space: Sexualized China and Chineseness in Yu Dafu’s Sinking and Yan Geling’s The Lost Daughter of Happiness

Authors: Haizhi Wu

Abstract:

Sexualization brings together the interdependent experiences of prostitution and diaspora, establishing a masculine structure where a female’s body mediates the hegemony and sexuality of men from different races. Between eroticism and homesickness, writers of the Chinese diaspora develop sensual approaches to reflect on the diasporic experience and sexual frustration. Noticeably, Yu Dafu in Sinking and Yan Geling in The Lost Daughter of Happiness both take an interest in sexual encounters between an immature teen client and an erotically powerful prostitute in Japan or America, both countries considered colonizers in Chinese history. Both are utilizing the metaphor of body-space interplay to hint at the out-of-text transnational interactions, two writers, however, present distinct understandings of their bond with history and memory of the semi-colonial, semi-feudal China. Examining prostitutes’ bodies in multi-layer diasporic spaces, the central analysis of this essay works on the sexual, colonial, and historical representations of this bodily symbol and the prostitution’s engagement in negotiating with diaspora and “Chineseness”.

Keywords: Chineseness, diasporic spaces, prostitutes’ bodies, sexualization

Procedia PDF Downloads 108
899 Technology Transfer and FDI: Some Lessons for Tunisia

Authors: Assaad Ghazouani, Hedia Teraoui

Abstract:

The purpose of this article is to try to see if the FDI actually contributes to technology transfer in Tunisia or are there other sources that can guarantee this transfer? The answer to this problem was gradual as we followed an approach using economic theory, the reality of Tunisia and econometric and statistical tools. We examined the relationship between technology transfer and FDI in Tunisia over a period of 40 years from 1970 to 2010. We estimated in two stages: first, a growth equation, then we have learned from this regression residue (proxy technology), secondly, we regressed on European FDI, exports of manufactures, imports of goods from the European Union in addition to other variables to test the robustness of the results and describing the level of infrastructure in the country. It follows from our study that technology transfer does not originate primarily and exclusively in the FDI and the latter is econometrically weakly with technology transfer and spill over effect of FDI does not seem to occur according to our results. However, the relationship between technology transfer and imports is negative and significant. Although this result is cons-intuitive, is recurrent in the literature of panel data. It has also given rise to intense debate on the microeconomic modelling as well as on the empirical applications. Technology transfer through trade or foreign investment has become a catalyst for growth recognized by numerous empirical studies in particular. However, the relationship technology transfer FDI is more complex than it appears. This complexity is due, primarily, but not exclusively to the close link between FDI and the characteristics of the host country. This is essentially the host's responsibility to establish general conditions, transparent and conducive to investment, and to strengthen human and institutional capacity necessary for foreign capital flows that can have real effects on growth.

Keywords: technology transfer, foreign direct investment, economics, finance

Procedia PDF Downloads 320
898 Surgical Site Infections Post Ventriculoperitoneal (VP) Shunting: A Matched Healthcare Cost and Length of Stay Study

Authors: Issa M. Hweidi, Saba W. Al-Ibraheem

Abstract:

This study aimed to assess the increased hospital length of stay and healthcare costs associated with SSIs among ventriculoperitoneal shunting surgery patients in Jordan. This study adopted a retrospective and nested 1:1 matched case-control design. A non-probability convenient sample of 48 VP shunt patients was recruited for the purpose of the study. The targeted groups of the study basically used to cross-match the variables investigated to minimize the risk of confounding. Information was extracted from the text of patients' electronic health records. As compared to the non-SSI group, the SSI group had an extra mean healthcare cost of $13,696.53 (p=0.001) and longer hospital length of stay (22.64 mean additional days). Furthermore, Acinetobacter baumannii and Klebsiella pneumonia were identified as being the most predominant causative agents of SSIs. The results of this study may provide baseline data for national and regional benchmarking to evaluate the quality of care provided to likewise patients. Adherence to infection control strategies and protocols considering new surveillance methods of SSIs is encouraged.

Keywords: ventriculoperitoneal shunt, health care cost, length of stay, neurosurgery, surgical site infections

Procedia PDF Downloads 75
897 Structural Performance Evaluation of Segmented Wind Turbine Blade Through Finite Element Simulation

Authors: Chandrashekhar Bhat, Dilifa Jossley Noronha, Faber A. Saldana

Abstract:

Transportation of long turbine blades from one place to another is a difficult process. Hence a feasibility study of modularization of wind turbine blade was taken from structural standpoint through finite element analysis. Initially, a non-segmented blade is modeled and its structural behavior is evaluated to serve as reference. The resonant, static bending and fatigue tests are simulated in accordance with IEC61400-23 standard for comparison purpose. The non-segmented test blade is separated at suitable location based on trade off studies and the segments are joined with an innovative double strap bonded joint configuration. The adhesive joint is modeled by adopting cohesive zone modeling approach in ANSYS. The developed blade model is analyzed for its structural response through simulation. Performances of both the blades are found to be similar, which indicates that, efficient segmentation of the long blade is possible which facilitates easy transportation of the blades and on site reassembling. The location selected for segmentation and adopted joint configuration has resulted in an efficient segmented blade model which proves the methodology adopted for segmentation was quite effective. The developed segmented blade appears to be the viable alternative considering its structural response specifically in fatigue within considered assumptions.

Keywords: modularization, fatigue, cohesive zone modeling, wind turbine blade

Procedia PDF Downloads 448
896 Dysphemism vs Euphemism in a South African Soap Opera: The Case of the Queen

Authors: Maropeng Maponya, Mawethu Nhlabathi

Abstract:

Euphemistic expressions, as part of showing respect and ubuntu, are naturally embedded in the African Languages. These expressions are solely used to soothe the impact which dysphemistic words may have on an individual or the society at large. Conversely, the script producers of one of the well-known soap operas in South Africa, The Queen–Mzansi, seem to have turned a blind eye on that, mostly when they use dysphemistic reference to human genitals. As a result, such practice tends to deteriorate the ethicality of the African languages and the beliefs held by African society in general. They also give less meaning to the promotion of African language concepts. This paper is aimed at explaining and analyzing the impact of dysphemism on language growth, basing the argument on the fact that subtitled texts in the soap opera never reflect the actual dysphemistic sourced text uttered by the character/s. This is a clear indication that the production crew of this soap opera is aware of the impact that these utterances may have on society, yet they do not mind the characters saying them as is in African Languages whilst euphemizing them through English subtitles. The paper adopted a descriptive qualitative method with an embedded case study in it, whereby dysphemistic clips from three characters of the soap opera were selected and analyzed.

Keywords: euphemism, dysphemism, soap opera, The Queen

Procedia PDF Downloads 146
895 Cloud-Based Multiresolution Geodata Cube for Efficient Raster Data Visualization and Analysis

Authors: Lassi Lehto, Jaakko Kahkonen, Juha Oksanen, Tapani Sarjakoski

Abstract:

The use of raster-formatted data sets in geospatial analysis is increasing rapidly. At the same time, geographic data are being introduced into disciplines outside the traditional domain of geoinformatics, like climate change, intelligent transport, and immigration studies. These developments call for better methods to deliver raster geodata in an efficient and easy-to-use manner. Data cube technologies have traditionally been used in the geospatial domain for managing Earth Observation data sets that have strict requirements for effective handling of time series. The same approach and methodologies can also be applied in managing other types of geospatial data sets. A cloud service-based geodata cube, called GeoCubes Finland, has been developed to support online delivery and analysis of most important geospatial data sets with national coverage. The main target group of the service is the academic research institutes in the country. The most significant aspects of the GeoCubes data repository include the use of multiple resolution levels, cloud-optimized file structure, and a customized, flexible content access API. Input data sets are pre-processed while being ingested into the repository to bring them into a harmonized form in aspects like georeferencing, sampling resolutions, spatial subdivision, and value encoding. All the resolution levels are created using an appropriate generalization method, selected depending on the nature of the source data set. Multiple pre-processed resolutions enable new kinds of online analysis approaches to be introduced. Analysis processes based on interactive visual exploration can be effectively carried out, as the level of resolution most close to the visual scale can always be used. In the same way, statistical analysis can be carried out on resolution levels that best reflect the scale of the phenomenon being studied. Access times remain close to constant, independent of the scale applied in the application. The cloud service-based approach, applied in the GeoCubes Finland repository, enables analysis operations to be performed on the server platform, thus making high-performance computing facilities easily accessible. The developed GeoCubes API supports this kind of approach for online analysis. The use of cloud-optimized file structures in data storage enables the fast extraction of subareas. The access API allows for the use of vector-formatted administrative areas and user-defined polygons as definitions of subareas for data retrieval. Administrative areas of the country in four levels are available readily from the GeoCubes platform. In addition to direct delivery of raster data, the service also supports the so-called virtual file format, in which only a small text file is first downloaded. The text file contains links to the raster content on the service platform. The actual raster data is downloaded on demand, from the spatial area and resolution level required in each stage of the application. By the geodata cube approach, pre-harmonized geospatial data sets are made accessible to new categories of inexperienced users in an easy-to-use manner. At the same time, the multiresolution nature of the GeoCubes repository facilitates expert users to introduce new kinds of interactive online analysis operations.

Keywords: cloud service, geodata cube, multiresolution, raster geodata

Procedia PDF Downloads 135
894 Economic Valuation of Environmental Services Sustained by Flamboyant Park in Goiania-Go, Brazil

Authors: Brenda R. Berca, Jessica S. Vieira, Lucas G. Candido, Matheus C. Ferreira, Paulo S. A. Lopes Filho, Rafaella O. Baracho

Abstract:

This study aims to estimate the economic value environmental services sustained by Flamboyant Lourival Louza Municipal Park in Goiânia, Goiás, Brazil. The Flamboyant Park is one of the most relevant urban parks, and it is located near a stadium, a shopping center, and two supercenters. In order to define the methods used for the valuation of Flamboyant Park, the first step was carrying out bibliographical research with the view to better understand which method is most feasible to valuate the Park. Thus, the following direct methods were selected: travel cost, hedonic pricing, and contingent valuation. In addition, an indirect method (replacement cost) was applied at Flamboyant Park. The second step was creating and applying two surveys. The first survey aimed at the visitors of the park, addressing socio-economic issues, the use of the Park, as well as its importance and the willingness the visitors, had to pay for its existence. The second survey was destined to the existing trade in the Park, in order to collect data regarding the profits obtained by them. In the end, the characterization of the profile of the visitors and the application of the methods of contingent valuation, travel cost, replacement cost and hedonic pricing were obtained, thus monetarily valuing the various ecosystem services sustained by the park. Some services were not valued due to difficulties encountered during the process.

Keywords: contingent valuation, ecosystem services, economic environmental valuation, hedonic pricing, travel cost

Procedia PDF Downloads 226
893 Exploring Syntactic and Semantic Features for Text-Based Authorship Attribution

Authors: Haiyan Wu, Ying Liu, Shaoyun Shi

Abstract:

Authorship attribution is to extract features to identify authors of anonymous documents. Many previous works on authorship attribution focus on statistical style features (e.g., sentence/word length), content features (e.g., frequent words, n-grams). Modeling these features by regression or some transparent machine learning methods gives a portrait of the authors' writing style. But these methods do not capture the syntactic (e.g., dependency relationship) or semantic (e.g., topics) information. In recent years, some researchers model syntactic trees or latent semantic information by neural networks. However, few works take them together. Besides, predictions by neural networks are difficult to explain, which is vital in authorship attribution tasks. In this paper, we not only utilize the statistical style and content features but also take advantage of both syntactic and semantic features. Different from an end-to-end neural model, feature selection and prediction are two steps in our method. An attentive n-gram network is utilized to select useful features, and logistic regression is applied to give prediction and understandable representation of writing style. Experiments show that our extracted features can improve the state-of-the-art methods on three benchmark datasets.

Keywords: authorship attribution, attention mechanism, syntactic feature, feature extraction

Procedia PDF Downloads 136
892 A Comparison of the First Language Vocabulary Used by Indonesian Year 4 Students and the Vocabulary Taught to Them in English Language Textbooks

Authors: Fitria Ningsih

Abstract:

This study concerns on the process of making corpus obtained from Indonesian year 4 students’ free writing compared to the vocabulary taught in English language textbooks. 369 students’ sample writings from 19 public elementary schools in Malang, East Java, Indonesia and 5 selected English textbooks were analyzed through corpus in linguistics method using AdTAT -the Adelaide Text Analysis Tool- program. The findings produced wordlists of the top 100 words most frequently used by students and the top 100 words given in English textbooks. There was a 45% match between the two lists. Furthermore, the classifications of the top 100 most frequent words from the two corpora based on part of speech found that both the Indonesian and English languages employed a similar use of nouns, verbs, adjectives, and prepositions. Moreover, to see the contextualizing the vocabulary of learning materials towards the students’ need, a depth-analysis dealing with the content and the cultural views from the vocabulary taught in the textbooks was discussed through the criteria developed from the checklist. Lastly, further suggestions are addressed to language teachers to understand the students’ background such as recognizing the basic words students acquire before teaching them new vocabulary in order to achieve successful learning of the target language.

Keywords: corpus, frequency, English, Indonesian, linguistics, textbooks, vocabulary, wordlists, writing

Procedia PDF Downloads 187
891 African Traders Beyond China: Delving Into Their Entrepreneurial Activities Following COVID-19

Authors: Phillip Thebe

Abstract:

African traders in China have generated magnanimous attention from scholars because of their choices to take short-term trips to Guangzhou and other places in search of cheaper products taking advantage of the status of China as a "global manufacturing hub". Nevertheless, their activities only gained traction at the turn of the millennium, with their presence in China incrementally dwindling over the next two decades. Now, with the devastating effects of COVID-19, their journeys have had to be totally cut short by unending lockdowns and stiff migration rules due to China's zero-tolerance of COVID-19 policy. This unfortunate yet untimely occurrence has left many scholars wondering if this marks the end of African traders in China and, indeed, the end of their business careers. Between March and September 2022, 20 traders were followed back to Africa, Zimbabwe, to find out what they are doing after having been shut out of China. Data was collected through ethnographic immersion and purposive in-depth interviewing in and around the city of Bulawayo. Snowballing was employed to reach out to the traders until a saturation point was reached and interview transcripts were filed for analysis. The findings revealed that some still trading online in China, report different opinions and feelings about doing business during COVID-19. Others have left the Chinese marketplace, now pursuing European industries in Turkey and other places. Others are still getting Chinese goods but in African countries such as Tanzania, Mozambique, South Africa, and Botswana. Some are now into the second-hand clothing trade, whereas others have stopped doing business to pursue other life-course interests. These and other issues are addressed in this paper from the anthropology of migration and globalization perspectives.

Keywords: entrepreneurship, African traders, China, COVID-19, Africans in China

Procedia PDF Downloads 93
890 Distributed Processing for Content Based Lecture Video Retrieval on Hadoop Framework

Authors: U. S. N. Raju, Kothuri Sai Kiran, Meena G. Kamal, Vinay Nikhil Pabba, Suresh Kanaparthi

Abstract:

There is huge amount of lecture video data available for public use, and many more lecture videos are being created and uploaded every day. Searching for videos on required topics from this huge database is a challenging task. Therefore, an efficient method for video retrieval is needed. An approach for automated video indexing and video search in large lecture video archives is presented. As the amount of video lecture data is huge, it is very inefficient to do the processing in a centralized computation framework. Hence, Hadoop Framework for distributed computing for Big Video Data is used. First, step in the process is automatic video segmentation and key-frame detection to offer a visual guideline for the video content navigation. In the next step, we extract textual metadata by applying video Optical Character Recognition (OCR) technology on key-frames. The OCR and detected slide text line types are adopted for keyword extraction, by which both video- and segment-level keywords are extracted for content-based video browsing and search. The performance of the indexing process can be improved for a large database by using distributed computing on Hadoop framework.

Keywords: video lectures, big video data, video retrieval, hadoop

Procedia PDF Downloads 533
889 Smartphone Photography in Urban China

Authors: Wen Zhang

Abstract:

The smartphone plays a significant role in media convergence, and smartphone photography is reconstructing the way we communicate and think. This article aims to explore the smartphone photography practices of urban Chinese smartphone users and images produced by smartphones from a techno-cultural perspective. The analysis consists of two types of data: One is a semi-structured interview of 21 participants, and the other consists of the images created by the participants. The findings are organised in two parts. The first part summarises the current tendencies of capturing, editing, sharing and archiving digital images via smartphones. The second part shows that food and selfie/anti-selfie are the preferred subjects of smartphone photographic images from a technical and multi-purpose perspective and demonstrates that screenshots and image texts are new genres of non-photographic images that are frequently made by smartphones, which contributes to improving operational efficiency, disseminating information and sharing knowledge. The analyses illustrate the positive impacts between smartphones and photography enthusiasm and practices based on the diffusion of innovation theory, which also makes us rethink the value of photographs and the practice of ‘photographic seeing’ from the screen itself.

Keywords: digital photography, image-text, media convergence, photographic- seeing, selfie/anti-selfie, smartphone, technological innovation

Procedia PDF Downloads 354
888 Study of Sustainability Indicators in a Milk Production Process

Authors: E. Lacasa, J. L. Santolaya, I. Millán

Abstract:

The progress toward sustainability implies maintaining and preferably improving both, human and ecosystem well-being, according to a triple bottom line that includes the environmental, economic and social dimensions. The life cycle assessment (LCA) is a method applicable to all production sectors that aims to quantify the environmental pressures and the benefits related to goods and services, as well as the trade-offs and the scope for improving areas of the production process. While using LCA to measure the environmental dimension of sustainability is widespread, similar approaches for the economic and the social dimensions still have limited application worldwide and there is a need for consistent and robust methods and indicators. This paper focuses on the milk production process and presents the analysis of the flows exchanged by an industrial installation through accounting all the energy and material inputs and the associated emissions and waste outputs at this stage of its life cycle. The functional unit is one litre of milk produced. Different metrics and indicators are used to assess the three dimensions of sustainability. Metrics considered useful to assess the production activities are the total water and energy consumptions and the milk production volume of each cow. The global warming, the value added and the working hours are indicators used to measure each sustainability dimension. The study is performed with two types of feeding of the cows, which includes a change in percentages of components as well. Nutritional composition of the milk obtained is almost kept. It is observed that environmental and social improvements involve high economic costs.

Keywords: milk production, sustainability, indicators, life cycle assessment

Procedia PDF Downloads 435
887 System-Wide Impact of Energy Efficiency in the Industry Sector: A Comparative Study between Canada and Denmark

Authors: M. Baldini, H. K. Jacobsen, M. Jaccard

Abstract:

In light of the international efforts to comply with the Paris agreement and emission targets for future energy systems, Denmark and Canada are among the front-runner countries dealing with climate change. The experiences in the energy sector have seen both countries coping with trade-offs between investments in renewable energy technologies and energy efficiency, thus tackling the climate issue from the supply and demand side respectively. On the demand side, the industrial sector is going through a remarkable transformation, with implementation of energy efficiency measures, change of input fuel for end-use processes and forecasted electrification as main features under the spotlight. By looking at Canada and Denmark's experiences as pathfinders on the demand and supply approach to climate change, it is possible to obtain valuable experience that may be applied to other countries aiming at the same goal. This paper presents a comparative study on industrial energy efficiency between Canada and Denmark. The study focuses on technologies and system options, policy design and implementation and modelling methodologies when implementing industrial energy savings in optimization models in comparison to simulation models. The study identifies gaps and junctures in the approach towards climate change actions and, learning from each other, lessen the differences to further foster the adoption of energy efficiency measurements in the industrial sector, aiming at reducing energy consumption and, consequently, CO₂ emissions.

Keywords: industrial energy efficiency, comparative study, CO₂ reduction, energy system modelling

Procedia PDF Downloads 172
886 Tibyan Automated Arabic Correction Using Machine-Learning in Detecting Syntactical Mistakes

Authors: Ashwag O. Maghraby, Nida N. Khan, Hosnia A. Ahmed, Ghufran N. Brohi, Hind F. Assouli, Jawaher S. Melibari

Abstract:

The Arabic language is one of the most important languages. Learning it is so important for many people around the world because of its religious and economic importance and the real challenge lies in practicing it without grammatical or syntactical mistakes. This research focused on detecting and correcting the syntactic mistakes of Arabic syntax according to their position in the sentence and focused on two of the main syntactical rules in Arabic: Dual and Plural. It analyzes each sentence in the text, using Stanford CoreNLP morphological analyzer and machine-learning approach in order to detect the syntactical mistakes and then correct it. A prototype of the proposed system was implemented and evaluated. It uses support vector machine (SVM) algorithm to detect Arabic grammatical errors and correct them using the rule-based approach. The prototype system has a far accuracy 81%. In general, it shows a set of useful grammatical suggestions that the user may forget about while writing due to lack of familiarity with grammar or as a result of the speed of writing such as alerting the user when using a plural term to indicate one person.

Keywords: Arabic language acquisition and learning, natural language processing, morphological analyzer, part-of-speech

Procedia PDF Downloads 152
885 Effects of Closed-Caption Programs on EFL Learners' Listening Comprehension and Vocabulary Learning

Authors: Bahman Gorjian

Abstract:

This study investigated the effects of closed-captioning on vocabulary learning and listening comprehension of English-language movies. Captioning is thus an effective language-learning tool for persons learning English as a second language. Because students may learn a foreign language "passively," utilizing subtitles on television could make learning English enjoyable for them. Closed captioning is an electrical technique that converts spoken words from a television program's audio into written text that mimics subtitles in another language. The findings of this study showed the importance of using closed-captioning software when learning a foreign language. As a result, these must be considered when teaching EFL/ESL. The influence of watching movies with closed captions on vocabulary and hearing is compared in this study. This goal can be reached by employing a closed-captioned movie as a teaching tool in the classroom. This research was critical because it demonstrates the advantages of closed-captioning programs in EFL classrooms for both teachers and students. The study's findings assisted teachers in better understanding how to employ closed captioning as a teaching tool in the classroom. The effects will be seen as even more significant for language learners who use the method.

Keywords: closed-captions, listening, comprehension, vcabulary

Procedia PDF Downloads 89
884 Randomness in Cybertext: A Study on Computer-Generated Poetry from the Perspective of Semiotics

Authors: Hongliang Zhang

Abstract:

The use of chance procedures and randomizers in poetry-writing can be traced back to surrealist works, which, by appealing to Sigmund Freud's theories, were still logocentrism. In the 1960s, random permutation and combination were extensively used by the Oulipo, John Cage and Jackson Mac Low, which further deconstructed the metaphysical presence of writing. Today, the randomly-generated digital poetry has emerged as a genre of cybertext which should be co-authored by readers. At the same time, the classical theories have now been updated by cybernetics and media theories. N· Katherine Hayles put forward the concept of ‘the floating signifiers’ by Jacques Lacan to be the ‘the flickering signifiers’ , arguing that the technology per se has become a part of the textual production. This paper makes a historical review of the computer-generated poetry in the perspective of semiotics, emphasizing that the randomly-generated digital poetry which hands over the dual tasks of both interpretation and writing to the readers demonstrates the intervention of media technology in literature. With the participation of computerized algorithm and programming languages, poems randomly generated by computers have not only blurred the boundary between encoder and decoder, but also raises the issue of human-machine. It is also a significant feature of the cybertext that the productive process of the text is full of randomness.

Keywords: cybertext, digital poetry, poetry generator, semiotics

Procedia PDF Downloads 175
883 Supply Chain Coordination under Carbon Trading Mechanism in Case of Conflict

Authors: Fuqiang Wang, Jun Liu, Liyan Cai

Abstract:

This paper investigates the coordination of the conflicting two-stage low carbon supply chain consisting of upstream and downstream manufacturers. The conflict means that the upstream manufacturer takes action for carbon emissions reduction under carbon trading mechanism while the downstream manufacturer’s production cost rises. It assumes for the Stackelberg game that the upstream manufacturer plays as a leader and the downstream manufacturer does as a follower. Four kinds of the situation of decentralized decision making, centralized decision-making, the production cost sharing contract and the carbon emissions reduction revenue sharing contract under decentralized decision making are considered. The backward induction approach is adopted to solve the game. The results show that the more intense the conflict is, the lower the efficiency of carbon emissions reduction and the higher the retail price is. The optimal investment of the decentralized supply chain under the two contracts is unchanged and still lower than that of the centralized supply chain. Both the production cost sharing contract and the carbon emissions reduction revenue sharing contract cannot coordinate the supply chain, because that the sharing cost or carbon emissions reduction sharing revenue will transfer through the wholesale price mechanism. As a result, it requires more complicated contract forms to coordinate such a supply chain.

Keywords: cap-and-trade mechanism, carbon emissions reduction, conflict, supply chain coordination

Procedia PDF Downloads 340
882 Human Security: The Boko Haram Menace in Northern Nigeria in the 21st Century

Authors: Jimoh Yusuf Amuda

Abstract:

Human security is a great panacea for sustainable development of world societies. Today the whole globe cum human species is living in nightmares of insecurity. This is due to acts of terrorism by various terrorists’ organization worldwide. The situation is on the increase daily. The number of lives and properties lost to religious insurgency cannot be quantifiably analyzed. It is on this note that this paper examine the book haram menace in northern Nigerian vis-à-vis it’s threat to the existence of human lives. The methodology applied for this research is the multi-disciplinary approach, the use journal articles, news papers, magazines, oral interview. Field trips to areas of terrorist attack and the use of text books. The following recommendations were made base on the findings. First of all the Nigerian government should declare total war on the book haram terrorist, then secondly the source of armament coming to this terrorist should be blocked, thirdly the European world should also place an arms embargo on terrorist source arms demands, also security agencies-police, the military, immigration, customs, state security service should work hand-in-hand, in a security tight measures to reduce the penetration of insurgent into the society.

Keywords: human, insecurity, security, terrorism

Procedia PDF Downloads 341
881 Tussle of Intellectual Property Rights and Privacy Laws with Reference to Artificial Intelligence

Authors: Lipsa Dash, Gyanendra Sahu

Abstract:

Intelligence is the cornerstone of humans, and now they have created a counterpart of themselves artificially. Our understanding of the word intelligence is a very perspective based and mostly superior understanding of what we read, write, perceive and understand the adversities around better. A wide range of industrial sectors have also started involving the technology to perceive, reason and act. Similarly, intellectual property is the product of human intelligence and creativity. The World Intellectual Property Organisation is currently working on technology trends across the globe, and AI tops the list in the digital frontier that will have a profound impact on the world, transforming the way we live and work. Coming to Intellectual Property, patents and creations of the AI’s itself have constantly been in question. This paper explores whether AI’s can fit in the flexibilities of Trade Related Intellectual Property Studies and gaps in the existing IP laws or rthere is a need of amendment to include them in the ambit. The researcher also explores the right of AI’s who create things out of their intelligence and whether they could qualify to be legal persons making the other laws applicable on them. Differentiation between AI creations and human creations are explored in the paper, and the need of amendments to determine authorship, ownership, inventorship, protection, and identification of beneficiary for remuneration or even for determining liability. The humans and humanoids are all indulged in matters related to Privacy, and that attracts another constitutional legal issue to be addressed. The authors will be focusing on the legal conundrums of AI, transhumanism, and the Internet of things.

Keywords: artificial intelligence, humanoids, healthcare, privacy, legal conundrums, transhumanism

Procedia PDF Downloads 125
880 The Right to Engage in Collective Bargaining in South Africa: An Exploratory Analysis

Authors: Koboro J. Selala

Abstract:

Whilst the system of collective bargaining is well-researched in South Africa, recent studies reveal that this is an area of law and practice that is poorly understood. Despite the growing attention being paid by most scholars to the role of collective bargaining in the labour relations system, only a handful of the studies have considered collective bargaining as a mechanism of dispute resolution. The purpose of this paper is to provide a critical analysis of the current understanding of the right to engage in collective bargaining in South Africa to assess the extent to which collective bargaining is used to resolve labour disputes. The overall objective is to offer a deeper understanding of the role of collective bargaining in dispute resolution process within the South African constitutional labour law context. To this end, the paper examines the applicable legal framework of collective bargaining to address two fundamental questions that are critical to the proper understanding of the functioning of the South African collective labour dispute resolution system. The first concerns the extent to which the current South African legislative framework supports the fundamental labour rights entrenched in the Constitution of the Republic of South Africa. The second addresses the role of trade unions in collective dispute resolution processes and the extent to which they can best utilize collective bargaining to resolve labour disputes. Finally, the paper discusses the general implications of the findings to stimulate further research and to enhance the constitutional development of collective labour rights in South Africa.

Keywords: collective bargaining, constitution, freedom of association, labour relations act

Procedia PDF Downloads 324
879 Access to Apprenticeships and the Impact of Individual and School Level Characteristics

Authors: Marianne Dæhlen

Abstract:

Periods of apprenticeships are characteristic of many vocational educational training (VET) systems. In many countries, becoming a skilled worker implies that the journey starts with an application for apprenticeships at a company or another relevant training establishment. In Norway, where this study is conducted, VET students start their journey with two years of school-based training before applying for two years of apprenticeship. Previous research has shown that access to apprenticeships differs by family background (socio-economic, immigrant, etc.), gender, school grades, and region. The question we raise in this study is whether the status, reputation, or position of the vocational school contributes to VET students’ access to apprenticeships. Data and methods: Register data containing information about schools’ and VET students’ characteristics will be analyzed in multilevel regression analyses. At the school level, the data will contain information on school size, shares of immigrants and/or share of male/female students, and grade requirements for admission. At the VET-student level, the register contains information on e.g., gender, school grades, educational program/trade, obtaining apprenticeship or not. The data set comprises about 3,000 students. Results: The register data is expected to be received in November 2024 and consequently, any results are not present at the point of this call. The planned article is part of a larger research project granted from the Norwegian Research Council and will, accordingly to the plan, start up in December 2024.

Keywords: apprenticeships, VET-students’ characteristics, vocational schools, quantitative methods

Procedia PDF Downloads 9
878 From Cultural Diversity to Cultural Diplomacy: The Practice of Normative Power Europe

Authors: Tzuli Lin

Abstract:

This paper aims to explore that the EU and Member State (UK) converges on cultural diplomacy to constitute an influential European external relations. It will address the development of EU cultural diplomacy and practice at Member state level. It also discusses the EU and Member States suffering in cultural resource overlapped. In contrast to the literature on the EU external relations, studies of the cultural dimension are rare. Thus, this paper will utilise the broad policy papers to explore how the cultural diversity among the Member States and the EU has a constructive progress at European level but not at Member State level. It can be argued that cultural component is the pivotal strategy for the stagnated EU external relations since the Euro crisis. The EU recognises that if it wants to promote the trade relations from the inside of Europe to outside, it requires the broad culture context among its traditional diplomacy, which brings the cultural component into a significant role. Even though in the area of Member State level, they share the fundamental value and idea, it does not elaborate Member States regarding the EU as a representative of European cultural diplomacy. In theory and practice, the discourse of Normative Power Europe (NPE) can be the analytic framework to construct the research of cultural diplomacy in Europe. NPE is an idea of the EU’s global role and spreading its norms to others. Moreover, Member States’ national interest has supreme priority rather than the EU. Therefore, this paper will utilise the UK as a case study to explore that cultural diplomacy shows fragmentation at European level. In the result, this paper will illustrate that the EU and the UK have mutual recognised each other as a partner not a leader.

Keywords: EU cultural diplomacy, cultural policy, cultural diversity, normative power

Procedia PDF Downloads 314
877 Revival of Old Silk Route and New Maritime Route: An Opportunity for India or Hidden Geopolitics of China

Authors: Geetanjali Sharma

Abstract:

There are always provincial variations which deserve more detailed treatment. Before the arrival of modern era, geography and cultural homogeneity were determining factors of human habitat and migration. Boundaries as if we see them, did not exist earlier. The connectivity of the world was also different as of now. The reinforcement of the old silk route will improve economic cooperation and connectivity between Asian, European and African countries, but obviously, it is designed to improve China’s geopolitical and geostrategic position in the world. The paper is based on the secondary sources of data. Analytical and historical approach has been used to clarify the ties between the old silk routes and new One-Belt-One-Road initiative China. The paper begins with an explanation of the historical background of the old Silk Route, its origin and development, trailed by an analysis of latest declarations by the Chinese leaders to revive it. It also discusses the impacts of this initiative on India’s economy and cultural exchange between associated regions. Lastly, the paper sums up the findings and suggestions for keeping a balance between the security and economic relationship between the countries. It concludes that the silk route is an effort in commencing a ‘grand strategy’ for global trade and cooperation with hidden objectives of China to increase the investment of China in other continents as well. The revival of silk route may prove to be a very helpful in reinforcing cooperation and raising it to a new level of economic establishments. However, China has yet to promote the much-needed political and strategic trust.

Keywords: OBOR (One-Belt-One-Road), geopolitics, economic relation, security concerns

Procedia PDF Downloads 286
876 An Efficient Discrete Chaos in Generalized Logistic Maps with Applications in Image Encryption

Authors: Ashish Ashish

Abstract:

In the last few decades, the discrete chaos of difference equations has gained a massive attention of academicians and scholars due to its tremendous applications in each and every branch of science, such as cryptography, traffic control models, secure communications, weather forecasting, and engineering. In this article, a generalized logistic discrete map is established and discrete chaos is reported through period doubling bifurcation, period three orbit and Lyapunov exponent. It is interesting to see that the generalized logistic map exhibits superior chaos due to the presence of an extra degree of freedom of an ordered parameter. The period doubling bifurcation and Lyapunov exponent are demonstrated for some particular values of parameter and the discrete chaos is determined in the sense of Devaney's definition of chaos theoretically as well as numerically. Moreover, the study discusses an extended chaos based image encryption and decryption scheme in cryptography using this novel system. Surprisingly, a larger key space for coding and more sensitive dependence on initial conditions are examined for encryption and decryption of text messages, images and videos which secure the system strongly from external cyber attacks, coding attacks, statistic attacks and differential attacks.

Keywords: chaos, period-doubling, logistic map, Lyapunov exponent, image encryption

Procedia PDF Downloads 151
875 Value of Willingness to Pay for a Quality-Adjusted Life Years Gained in Iran; A Modified Chained-Approach

Authors: Seyedeh-Fariba Jahanbin, Hasan Yusefzadeh, Bahram Nabilou, Cyrus Alinia, Cyrus Alinia

Abstract:

Background: Due to the lack of a constant Willingness to Pay per one additional Quality Adjusted Life Years gained based on the preferences of Iran’s general public, the cost-efectiveness of health system interventions is unclear and making it challenging to apply economic evaluation to health resources priority setting. Methods: We have measured this cost-efectiveness threshold with the participation of 2854 individuals from fve provinces, each representing an income quintile, using a modifed Time Trade-Of-based Chained-Approach. In this online-based empirical survey, to extract the health utility value, participants were randomly assigned to one of two green (21121) and yellow (22222) health scenarios designed based on the earlier validated EQ-5D-3L questionnaire. Results: Across the two health state versions, mean values for one QALY gain (rounded) ranged from $6740-$7400 and $6480-$7120, respectively, for aggregate and trimmed models, which are equivalent to 1.35-1.18 times of the GDP per capita. Log-linear Multivariate OLS regression analysis confrmed that respondents were more likely to pay if their income, disutility, and education level were higher than their counterparts. Conclusions: In the health system of Iran, any intervention that is with the incremental cost-efectiveness ratio, equal to and less than 7402.12 USD, will be considered cost-efective.

Keywords: willingness to Pay, QALY, chained-approach, cost-efectiveness threshold, Iran

Procedia PDF Downloads 85
874 Artificial Intelligent-Based Approaches for Task ‎Offloading, ‎Resource ‎Allocation and Service ‎Placement of ‎Internet of Things ‎Applications: State of the Art

Authors: Fatima Z. Cherhabil, Mammar Sedrati, Sonia-Sabrina Bendib‎

Abstract:

In order to support the continued growth, critical latency of ‎IoT ‎applications, and ‎various obstacles of traditional data centers, ‎mobile edge ‎computing (MEC) has ‎emerged as a promising solution that extends cloud data-processing and decision-making to edge devices. ‎By adopting a MEC structure, IoT applications could be executed ‎locally, on ‎an edge server, different fog nodes, or distant cloud ‎data centers. However, we are ‎often ‎faced with wanting to optimize conflicting criteria such as ‎minimizing energy ‎consumption of limited local capabilities (in terms of CPU, RAM, storage, bandwidth) of mobile edge ‎devices and trying to ‎keep ‎high performance (reducing ‎response time, increasing throughput and service availability) ‎at the same ‎time‎. Achieving one goal may affect the other, making task offloading (TO), ‎resource allocation (RA), and service placement (SP) complex ‎processes. ‎It is a nontrivial multi-objective optimization ‎problem ‎to study the trade-off between conflicting criteria. ‎The paper provides a survey on different TO, SP, and RA recent multi-‎objective optimization (MOO) approaches used in edge computing environments, particularly artificial intelligent (AI) ones, to satisfy various objectives, constraints, and dynamic conditions related to IoT applications‎.

Keywords: mobile edge computing, multi-objective optimization, artificial ‎intelligence ‎approaches, task offloading, resource allocation, ‎ service placement

Procedia PDF Downloads 115
873 A Comparative Evaluation of Cognitive Load Management: Case Study of Postgraduate Business Students

Authors: Kavita Goel, Donald Winchester

Abstract:

In a world of information overload and work complexities, academics often struggle to create an online instructional environment enabling efficient and effective student learning. Research has established that students’ learning styles are different, some learn faster when taught using audio and visual methods. Attributes like prior knowledge and mental effort affect their learning. ‘Cognitive load theory’, opines learners have limited processing capacity. Cognitive load depends on the learner’s prior knowledge, the complexity of content and tasks, and instructional environment. Hence, the proper allocation of cognitive resources is critical for students’ learning. Consequently, a lecturer needs to understand the limits and strengths of the human learning processes, various learning styles of students, and accommodate these requirements while designing online assessments. As acknowledged in the cognitive load theory literature, visual and auditory explanations of worked examples potentially lead to a reduction of cognitive load (effort) and increased facilitation of learning when compared to conventional sequential text problem solving. This will help learner to utilize both subcomponents of their working memory. Instructional design changes were introduced at the case site for the delivery of the postgraduate business subjects. To make effective use of auditory and visual modalities, video recorded lectures, and key concept webinars were delivered to students. Videos were prepared to free up student limited working memory from irrelevant mental effort as all elements in a visual screening can be viewed simultaneously, processed quickly, and facilitates greater psychological processing efficiency. Most case study students in the postgraduate programs are adults, working full-time at higher management levels, and studying part-time. Their learning style and needs are different from other tertiary students. The purpose of the audio and visual interventions was to lower the students cognitive load and provide an online environment supportive to their efficient learning. These changes were expected to impact the student’s learning experience, their academic performance and retention favourably. This paper posits that these changes to instruction design facilitates students to integrate new knowledge into their long-term memory. A mixed methods case study methodology was used in this investigation. Primary data were collected from interviews and survey(s) of students and academics. Secondary data were collected from the organisation’s databases and reports. Some evidence was found that the academic performance of students does improve when new instructional design changes are introduced although not statistically significant. However, the overall grade distribution of student’s academic performance has changed and skewed higher which shows deeper understanding of the content. It was identified from feedback received from students that recorded webinars served as better learning aids than material with text alone, especially with more complex content. The recorded webinars on the subject content and assessments provides flexibility to students to access this material any time from repositories, many times, and this enhances students learning style. Visual and audio information enters student’s working memory more effectively. Also as each assessment included the application of the concepts, conceptual knowledge interacted with the pre-existing schema in the long-term memory and lowered student’s cognitive load.

Keywords: cognitive load theory, learning style, instructional environment, working memory

Procedia PDF Downloads 145
872 Digital Privacy Legislation Awareness

Authors: Henry Foulds, Magda Huisman, Gunther R. Drevin

Abstract:

Privacy is regarded as a fundamental human right and it is clear that the study of digital privacy is an important field. Digital privacy is influenced by new and constantly evolving technologies and this continuous change makes it hard to create legislation to protect people’s privacy from being exploited by misuse of these technologies.

This study aims to benefit digital privacy legislation efforts by evaluating the awareness and perceived importance of digital privacy legislation among computer science students. The chosen fixed variables for the population are study year and gamer classification.

The use of location based services in mobile applications and games are a concern for digital privacy. For this reason the study focused on computer science students as they have a high likelihood to use and develop this type of software. Surveys were used to evaluate awareness and perceived importance of digital privacy legislation.

The results of the study show that privacy legislation and awareness of privacy legislation are important to people. The perception of the importance of privacy legislation increases with academic experience. Awareness of privacy legislation increases from non-gamers to pro gamers. 

Keywords: digital privacy, legislation awareness, gaming, privacy legislation

Procedia PDF Downloads 355