Search results for: RFID reader
164 Counterfeit Product Detection Using Block Chain
Authors: Sharanya C. H., Pragathi M., Vathsala R. S., Theja K. V., Yashaswini S.
Abstract:
Identifying counterfeit products have become increasingly important in the product manufacturing industries in recent decades. This current ongoing product issue of counterfeiting has an impact on company sales and profits. To address the aforementioned issue, a functional blockchain technology was implemented, which effectively prevents the product from being counterfeited. By utilizing the blockchain technology, consumers are no longer required to rely on third parties to determine the authenticity of the product being purchased. Blockchain is a distributed database that stores data records known as blocks and several databases known as chains across various networks. Counterfeit products are identified using a QR code reader, and the product's QR code is linked to the blockchain management system. It compares the unique code obtained from the customer to the stored unique code to determine whether or not the product is original.Keywords: blockchain, ethereum, QR code
Procedia PDF Downloads 177163 Influence of the Popular Literature on Consciousness of the Person
Authors: Alua Temirbolat, Sergei Kibalnik, Zhuldyz Essimova
Abstract:
The article is devoted to research of influence of the modern literature on the consciousness of the person. Tendencies and features of the progress of the historical-cultural and artistic process at the end of XX–the beginning of XXI centuries are considered. The object of the analysis is the popular literature which has found last decades greater popularity among readers of different generations. In the article, such genres, as melodramas, female, espionage, criminal, pink, costume-historical novels, thrillers, elements, a fantasy are considered. During research, specific features of the popular literature, its difference from works of classics is revealed. On specific examples, its negative and positive influence on consciousness, psychology of the reader is shown, its role and value in a modern society are defined.Keywords: the popular literature, the person, consciousness, a genre, psychology
Procedia PDF Downloads 299162 A Pragmatic Study of Falnama Texts Based on Critical Discourse Analysis Approach
Authors: Raziyeh Mashhadi Moghadam
Abstract:
Persian writings in the form of stories, scientific articles, historiographies, biographies, and philosophical, religious, and poetic arguments have established their presence in the past and present. Any piece of text is composed in a unique style depending on its content and subject. In this paper, a manuscript called Falnama of the Prophet is reviewed. Only a few scattered pages of this version are extant, and the author, using the name of twenty-four prophets, seeks to explore the presence and future of the reader. This version is analyzed based on Norman Fairclough’s Critical Discourse Analysis (CDA) approach to unravel the underlying processes in this type of manuscript. The spelling of some words and sentences is different from that of the new written Persian version.Keywords: application of Falnama texts, critical discourse analysis, Fairclough’s approach
Procedia PDF Downloads 109161 Analysis of Multilayer Neural Network Modeling and Long Short-Term Memory
Authors: Danilo López, Nelson Vera, Luis Pedraza
Abstract:
This paper analyzes fundamental ideas and concepts related to neural networks, which provide the reader a theoretical explanation of Long Short-Term Memory (LSTM) networks operation classified as Deep Learning Systems, and to explicitly present the mathematical development of Backward Pass equations of the LSTM network model. This mathematical modeling associated with software development will provide the necessary tools to develop an intelligent system capable of predicting the behavior of licensed users in wireless cognitive radio networks.Keywords: neural networks, multilayer perceptron, long short-term memory, recurrent neuronal network, mathematical analysis
Procedia PDF Downloads 420160 The Enzyme Inhibitory Potentials of Different Extracts from Linaria genistifolia subsp. genistifolia
Authors: Gokhan Zengin, Abdurrahman Aktumsek
Abstract:
The key enzyme inhibitory theory is one of the most accepted strategies in the treatment of global health problems including Alzheimer’s Disease and Diabetes mellitus. For this reason, the enzyme inhibitory potentials of different solvent extracts from Linaria genistifolia subsp. genistifolia were investigated against cholinesterase, and tyrosinase. The in vitro enzyme inhibitory potentials were measured with a microplate reader. The acetone and methanol extracts exhibited the strongest enzyme inhibitory effects on cholinesterase. However, the water extract was only active on tyrosinase. The results suggested that Linaria genistifolia subsp. genistifolia could be considered as a source of natural enzyme inhibitors for the treatment of major health problems.Keywords: enzyme inhibitors, cholinesterase, tyrosinase, linaria, Turkey
Procedia PDF Downloads 310159 Formalizing a Procedure for Generating Uncertain Resource Availability Assumptions Based on Real Time Logistic Data Capturing with Auto-ID Systems for Reactive Scheduling
Authors: Lars Laußat, Manfred Helmus, Kamil Szczesny, Markus König
Abstract:
As one result of the project “Reactive Construction Project Scheduling using Real Time Construction Logistic Data and Simulation”, a procedure for using data about uncertain resource availability assumptions in reactive scheduling processes has been developed. Prediction data about resource availability is generated in a formalized way using real-time monitoring data e.g. from auto-ID systems on the construction site and in the supply chains. The paper focuses on the formalization of the procedure for monitoring construction logistic processes, for the detection of disturbance and for generating of new and uncertain scheduling assumptions for the reactive resource constrained simulation procedure that is and will be further described in other papers.Keywords: auto-ID, construction logistic, fuzzy, monitoring, RFID, scheduling
Procedia PDF Downloads 513158 Reading Literature between Aesthetic Values and Ideology
Authors: Ahmed Hassan Sabra
Abstract:
Context: The research explores the impact of ideology on the aesthetic reading of literary texts. It aims to investigate how ideology affects the way in which readers interpret and appreciate literature. The study focuses on a selection of Arabic novels that have been subject to significant controversy among critics, with some praising their aesthetic value and others denouncing it. By analyzing this controversy, the research seeks to demonstrate the extent to which ideology influences aesthetic judgments in literary readings. Research Aim: The aim of this study is to examine the influence of ideology on the aesthetic reading of literary texts. It seeks to understand how the ideological perspective of readers shapes their interpretation and evaluation of literature. Methodology: The research adopts an aesthetic approach as the primary methodology for investigating the relationship between literary reading and ideological reception. By employing this approach, the study aims to uncover the intricate connections between aesthetics and ideology in the process of interpreting and appreciating literature. Findings: The research reveals that ideology cannot be separated from the aesthetic experience of reading literary texts. It argues that the ideological perspective of the reader significantly impacts their aesthetic judgments and interpretations. The differing viewpoints among critics regarding the aesthetic value of the selected Arabic novels highlight the influence of ideology on readers' assessments of artistic merit. Theoretical Importance: The study contributes to the understanding of the complex interplay between aesthetics and ideology in the realm of literary interpretation. It reinforces the notion that aesthetic judgments are not solely based on the intrinsic qualities of the text but are also shaped by the ideological framework of the reader. Data Collection: The research collects data by examining critical responses to a number of Arabic novels that have generated controversy. These responses include both positive and negative evaluations of the novels' aesthetic value. The research also considers the ideological positions and perspectives of the critics. Analysis Procedures: The collected data is analyzed using an aesthetic lens, taking into account the ideological viewpoints expressed in the critical responses. The analysis explores how these ideological perspectives influence the aesthetic judgments made by the critics. Questions Addressed: The research addresses the question of how ideology impacts the aesthetic reading of literary texts. It investigates the extent to which ideology shapes readers' interpretations and evaluations of literature, particularly in the case of controversial novels. Conclusion: The study concludes that ideology plays a significant role in the aesthetic reading of literary texts. It demonstrates that readers' ideological perspectives influence their interpretation and evaluation of a text's aesthetic value. The research highlights the interconnectedness of aesthetics and ideology in the process of literary reception, emphasizing the importance of considering the ideological framework of readers when analyzing the aesthetic qualities of literature.Keywords: novel, aesthetic, ideology, reading
Procedia PDF Downloads 73157 Technology Enhanced Learning Using Virtual and Augmented Realities: An Applied Method to Improve the Animation Teaching Delivery
Authors: Rosana Marar, Edward Jaser
Abstract:
This paper presents a software solution to enhance the content and presentation of graphic design and animation related textbooks. Using augmented and virtual reality concepts, a mobile application is developed to improve the static material found in books. This allows users to interact with animated examples and tutorials using their mobile phones and stereoscopic 3D viewers which will enhance information delivery. The application is tested on Google Cardboard with visual content in 3D space. Evaluation of the proposed application demonstrates that it improved the readability of static content and provided new experiences to the reader.Keywords: animation, augmented reality, google cardboard, interactive media, technology enhanced learning, virtual reality
Procedia PDF Downloads 181156 3D Printing Technology in Housing Projects Construction
Authors: Mohammed F. Haddad, Mohammad A. Albenayyan
Abstract:
Realistically, 3-D printing as a technology has not yet reached the required maturity level to handle construction housing projects for citizens on a country scale. However, potentially, it has all of the required elements for addressing this issue. There are two main high-level elements of this technology that need to be capitalized on in order for the technology to reach its full potential, technical and logistical. This paper aims to cover how 3-D printing can be a viable technical solution for housing projects and describe the impact of 3-D printing technical features on the logistical aspects of completing a housing project. Additionally, a perspective about 3-D printing in Saudi Arabia will be presented in order to give the reader an idea of where the kingdom stands in the deployment of this technology. Finally, a glimpse will be given regarding the potential utilization of this technology for space applications.Keywords: large-scale 3-D printing, additive manufacturing, D- shape, contour crafting
Procedia PDF Downloads 128155 Behavior of SPEC CPU2006 Based on Optimization Levels
Authors: Faisel Elramalli, Ibrahim Althomali Amjad Sabbagh, Dhananjay Tambe
Abstract:
SPEC CPU benchmarks are used to evaluate the performance of CPUs on computer systems. In our project we are going to use SPEC CPU suite that contains several benchmarks running on two different compilers gcc and icc in different optimizations levels to evaluate the performance of a CPU. The motivation of this project is to find out which compiler and in which optimization level makes the CPU reaches the best performance. The results of that evaluation will help users of these compilers to choose the best compiler and optimization level that perform efficiently for their work. In other words, it will give users the best performance of the CPU while doing their works. This project is interesting since it will provide the method used to measure the performance of CPU and how different optimization levels of compilers can help achieve a higher performance. Moreover, it will give a good understanding of how benchmarks are used to evaluate a CPU performance. For the reader, in reality SPEC CPU benchmarks are used to measure the performance of new released CPUs to be compared to other CPUs.Keywords: SPEC, CPU, GCC, ICC, copilers
Procedia PDF Downloads 485154 Addressing Security and Privacy Issues in a Smart Environment by Using Block-Chain as a Preemptive Technique
Authors: Shahbaz Pervez, Aljawharah Almuhana, Zahida Parveen, Samina Naz, Hira Tariq, Seyed Hosseini, Muhammad Awais Azam
Abstract:
With the latest development in the field of cutting-edge technologies, there is a rapid increase in the use of technology-oriented gadgets. In a recent scenario of the tech era, there is increasing demand to fulfill our day-to-day routine tasks with the help of technological gadgets. We are living in an era of technology where trends have been changing, and a race to introduce a new technology gadget has already begun. Smart cities are getting more popular with every passing day; city councils and governments are under enormous pressure to provide the latest services for their citizens and equip them with all the latest facilities. Thus, ultimately, they are going more into smart cities infrastructure building, providing services to their inhabitants with a single click from their smart devices. This trend is very exciting, but on the other hand, if some incident of security breach happens due to any weaker link, the results would be catastrophic. This paper addresses potential security and privacy breaches with a possible solution by using Blockchain technology in IoT enabled environment.Keywords: blockchain, cybersecurity, DDOS, intrusion detection, IoT, RFID, smart devices security, smart services
Procedia PDF Downloads 119153 An Efficient Digital Baseband ASIC for Wireless Biomedical Signals Monitoring
Authors: Kah-Hyong Chang, Xin Liu, Jia Hao Cheong, Saisundar Sankaranarayanan, Dexing Pang, Hongzhao Zheng
Abstract:
A digital baseband Application-Specific Integrated Circuit (ASIC) is developed for a microchip transponder to transmit signals and temperature levels from biomedical monitoring devices. The transmission protocol is adapted from the ISO/IEC 11784/85 standard. The module has a decimation filter that employs only a single adder-subtractor in its datapath. The filtered output is coded with cyclic redundancy check and transmitted through backscattering Load Shift Keying (LSK) modulation to a reader. Fabricated using the 0.18-μm CMOS technology, the module occupies 0.116 mm² in chip area (digital baseband: 0.060 mm², decimation filter: 0.056 mm²), and consumes a total of less than 0.9 μW of power (digital baseband: 0.75 μW, decimation filter: 0.14 μW).Keywords: biomedical sensor, decimation filter, radio frequency integrated circuit (RFIC) baseband, temperature sensor
Procedia PDF Downloads 396152 The Eloquent Importance of Knowing Fyodor Dostoevsky: An Understanding of The Dilettante
Authors: Ravi Teja Mandapaka
Abstract:
Literary assonance and lexical consonance have always put the readers pondering, shirking away, at times too, and beefing on the baffling question that hardly invited any answer. ‘Why should we read Fyodor Mikhailovich Dostoevsky today?’ Does he, during a surreal life beneath his bruised and broken soul, writhing in pain, toying with the affirmatives of pleasure in an innate way, draw the readers any sheath of support? Alexithymia has ruled the time and space for a quite a long time as many a reader spent more time than required on reading his works of art in literature. Do his swirling theories of deism and laconic gushiness when put in black and white push us towards reading the lost pieces of exuberant dilettantism? With a view of that, and a hallucinated panorama of another, its best to say, thoughts and droughts’ glorious uncertainties in literature have come forward towards putting the pen on the eloquent importance of knowing Fyodor Dostoevsky, the Socrates of Literature.Keywords: Dostoyevsky, dilettantism, gushiness, hallucinations, puissance
Procedia PDF Downloads 318151 Smart Lean Manufacturing in the Context of Industry 4.0: A Case Study
Authors: M. Ramadan, B. Salah
Abstract:
This paper introduces a framework to digitalize lean manufacturing tools to enhance smart lean-based manufacturing environments or Lean 4.0 manufacturing systems. The paper discusses the integration between lean tools and the powerful features of recent real-time data capturing systems with the help of Information and Communication Technologies (ICT) to develop an intelligent real-time monitoring and controlling system of production operations concerning lean targets. This integration is represented in the Lean 4.0 system called Dynamic Value Stream Mapping (DVSM). Moreover, the paper introduces the practice of Radio Frequency Identification (RFID) and ICT to smartly support lean tools and practices during daily production runs to keep the lean system alive and effective. This work introduces a practical description of how the lean method tools 5S, standardized work, and poka-yoke can be digitalized and smartly monitored and controlled through DVSM. A framework of the three tools has been discussed and put into practice in a German switchgear manufacturer.Keywords: lean manufacturing, Industry 4.0, radio frequency identification, value stream mapping
Procedia PDF Downloads 228150 Augmentation of Automatic Selective Door Operation systems with UWB positioning
Authors: John Chan, Jake Linnenbank, Gavin Caird
Abstract:
Automatic Selective Door Operation (ASDO) systems are increasingly used in railways to provide Correct Side Door Enable (CSDE) protection as well as to protect passenger doors opening off the platform where the train is longer than the platform, or in overshoot or undershoot scenarios. Such ASDO systems typically utilise trackside-installed RFID beacons, such as Eurobalises for odometry positioning purposes. Installing such trackside infrastructure may not be desirable or possible due to various factors such as conflict with existing infrastructure, potential damage from track tamping and jurisdiction constraints. Ultra-wideband (UWB) positioning technology could enable ASDO positioning requirements to be met without requiring installation of equipment directly on track since UWB technology can be installed on adjacent infrastructure such as on platforms. This paper will explore the feasibility of upgrading existing ASDO systems with UWB positioning technology, the feasibility of retrofitting UWB-enabled ASDO systems onto unfitted trains, and any other considerations relating to the use of UWB positioning for ASDO applications.Keywords: UWB, ASDO, automatic selective door operations, CSDE, correct side door enable
Procedia PDF Downloads 77149 Terrorism: A Threat in Constant Evolution Still Misunderstood
Authors: M. J. Gazapo Lapayese
Abstract:
It is a well-established fact that terrorism is one of the foremost threats to present-day international security. The creation of tools or mechanisms for confronting it in an effective and efficient manner will only be possible by way of an objective assessment of the phenomenon. In order to achieve this, this paper has the following three main objectives: Firstly, setting out to find the reasons that have prevented the establishment of a universally accepted definition of terrorism, and consequently trying to outline the main features defining the face of the terrorist threat in order to discover the fundamental goals of what is now a serious blight on world society. Secondly, trying to explain the differences between a terrorist movement and a terrorist organisation, and the reasons for which a terrorist movement can be led to transform itself into an organisation. After analysing these motivations and the characteristics of a terrorist organisation, an example of the latter will be succinctly analysed to help the reader understand the ideas expressed. Lastly, discovering and exposing the factors that can lead to the appearance of terrorist tendencies, and discussing the most efficient and effective responses that can be given to this global security threat.Keywords: responses, resilience, security, terrorism
Procedia PDF Downloads 452148 A Local Invariant Generalized Hough Transform Method for Integrated Circuit Visual Positioning
Authors: Wei Feilong
Abstract:
In this study, an local invariant generalized Houghtransform (LI-GHT) method is proposed for integrated circuit (IC) visual positioning. The original generalized Hough transform (GHT) is robust to external noise; however, it is not suitable for visual positioning of IC chips due to the four-dimensionality (4D) of parameter space which leads to the substantial storage requirement and high computational complexity. The proposed LI-GHT method can reduce the dimensionality of parameter space to 2D thanks to the rotational invariance of local invariant geometric feature and it can estimate the accuracy position and rotation angle of IC chips in real-time under noise and blur influence. The experiment results show that the proposed LI-GHT can estimate position and rotation angle of IC chips with high accuracy and fast speed. The proposed LI-GHT algorithm was implemented in IC visual positioning system of radio frequency identification (RFID) packaging equipment.Keywords: Integrated Circuit Visual Positioning, Generalized Hough Transform, Local invariant Generalized Hough Transform, ICpacking equipment
Procedia PDF Downloads 264147 The Effects of Information Technology in Urban Health
Authors: Safdari Reza, Zahmatkeshan Maryam, Goli Arji
Abstract:
Background and Aim: Urban health is one of the challenges of the 21st century. Rapid growth and expanding urbanization have implications for health. In this regard, information technology can remove a large number of modern cities’ problems. Therefore, the present article aims to study modern information technologies in the development of urban health. Materials and Methods:. This is a review article based on library research and Internet searches on valid websites such as Science Direct, Magiran, Springer and advanced searches in Google. Some 164 domestic and foreign texts were studied on such topics as the application of ICT tools including cell phones and wireless tools, GIS, and RFID in the field of urban health in 2011. Finally, 30 sources were used. Conclusion: Information and communication technologies play an important role in improving people's health and enhancing the quality of their lives. Effective utilization of information and communication technologies requires the identification of opportunities and constraints, and the formulation of appropriate planning principles with regard to social and economic factors together with preparing the technological, communication and telecommunications, legal and administrative infrastructures.Keywords: Urban Health, Information Technology, Information & Communication, Technology
Procedia PDF Downloads 463146 ‘Koha ILS Software’ Implementation in Academic Library Management: An Experience from University Libraries of Bangladesh
Authors: Md. Golam Mostafa
Abstract:
This paper describes the use of Koha open source library management software for information management in university libraries of Bangladesh. Manual record keeping is a time-consuming and tedious task, which may lead to errors frequently. To maintain the quality of services, any organization needs to manage with the help of a computerized system. The advent of information technology paved the way for library computerization. This paper has provided a short history as well as the present ongoing development of the library computerization system in Bangladesh, which has developed as a library management software Koha on the basis of research and development. Koha integrated library systems (ILS) software is very user friendly open source software. It refers to software in which the source code is freely available for others to view, amend, and adapt. Koha integrated library systems maintained by and used by libraries all over the world. In this context, this paper will analyze Koha library management software, which proves appropriate for the present necessities of library management in Bangladesh. At last, result from the study has been analyzed using different tables and graphs.Keywords: Koha Open Source Software, integrated library system, RFID facilities, university libraries, Bangladesh
Procedia PDF Downloads 125145 The Quantum Theory of Music and Languages
Authors: Mballa Abanda Serge, Henda Gnakate Biba, Romaric Guemno Kuate, Akono Rufine Nicole, Petfiang Sidonie, Bella Sidonie
Abstract:
The main hypotheses proposed around the definition of the syllable and of music, of the common origin of music and language, should lead the reader to reflect on the cross-cutting questions raised by the debate on the notion of universals in linguistics and musicology. These are objects of controversy, and there lies its interest: the debate raises questions that are at the heart of theories on language. It is an inventive, original and innovative research thesis. The main hypotheses proposed around the definition of the syllable and of music, of the common origin of music and language, should lead the reader to reflect on the cross-cutting questions raised by the debate on the notion of universals in linguistics and musicology. These are objects of controversy, and there lies its interest: the debate raises questions that are at the heart of theories on language. It is an inventive, original and innovative research thesis. A contribution to the theoretical, musicological, ethno musicological and linguistic conceptualization of languages, giving rise to the practice of interlocution between the social and cognitive sciences, the activities of artistic creation and the question of modeling in the human sciences: mathematics, computer science, translation automation and artificial intelligence. When you apply this theory to any text of a folksong of a world-tone language, you do not only piece together the exact melody, rhythm, and harmonies of that song as if you knew it in advance but also the exact speaking of this language. The author believes that the issue of the disappearance of tonal languages and their preservation has been structurally resolved, as well as one of the greatest cultural equations related to the composition and creation of tonal, polytonal and random music. The experimentation confirming the theorization, It designed a semi-digital, semi-analog application which translates the tonal languages of Africa (about 2,100 languages) into blues, jazz, world music, polyphonic music, tonal and anatonal music and deterministic and random music). To test this application, I use a music reading and writing software that allows me to collect the data extracted from my mother tongue, which is already modeled in the musical staves saved in the ethnographic (semiotic) dictionary for automatic translation ( volume 2 of the book). Translation is done (from writing to writing, from writing to speech and from writing to music). Mode of operation: you type a text on your computer, a structured song (chorus-verse), and you command the machine a melody of blues, jazz and world music or variety etc. The software runs, giving you the option to choose harmonies, and then you select your melody.Keywords: music, entanglement, langauge, science
Procedia PDF Downloads 80144 Academic Writing vs Creative Writing for Arabic Speaking Students
Authors: Yacoub Aljaffery
Abstract:
Many English writing instructors try to avoid creative writing in their classrooms thinking they need to teach essay rules and organization skills. They seem to forget that creative writing has do’s and don’ts as well. While academic writing is different from fiction writing in some important ways (although perhaps the boundaries are fruitfully blurring), there is much that can be writerly selves. The differences between creative writing and academic writing are that creative writing is written mainly to entertain with the creativity of the mind and academic writing is written mainly to inform in a formal manner or to incite the reader to make an action such as purchase the writer’s product. In this research paper, we are going to find out how could Arabic speaking students, who are learning academic writing in universities, benefit from creative writing such as literature, theatrical scripts, music, and poems. Since Arabic language is known as poetic language, students from this culture tend to like writing with creativity. We will investigate the positive influence of creative writing rules on academic essays and paragraphs in universities, and We will prove the importance of using creative writing activities in any academic writing classroom.Keywords: ESL teaching, motivation, teaching methods, academic writing , creative writing
Procedia PDF Downloads 554143 Saudi Arabia's Perspective over Worldwide Governance Indicators
Authors: Sultan S. Alsajjan
Abstract:
Understanding the public governance in Middle East's countries is one of the challenging matters for any researcher. The Middle East, for the last century, has been in fluctuated situations. Understating the public governance in Saudi Arabia is an extra challenge because Saudi Arabia has its unique culture and political system. The World Bank had launched 1996 Worldwide Governance Indicators. These indicators assist any country to rank its position in public governance how it is performing in this field. Saudi Arabia had ranked in some worldwide governance indicators at the bottom of indicators' list. For instance, according to the Worldwide Governance indicator (2018), Saudi Arabia had ranked in 192 out of 204 countries in 'Voice and Accountability Indicator'. In this paper, the reader will find in-depth analysis and evaluation of Saudi Arabia's positions in Worldwide Governance Indicators. Saudi Arabia had never considered the concept of public governance and worldwide governance indicators because of its economic situation, political characteristics, and social nature.Keywords: pubic governance, Middle East, Saudi Arabia, and worldwide governance indicators
Procedia PDF Downloads 249142 Imagology: The Study of Multicultural Imagery Reflected in the Heart of Elif Shafak’s 'The Bastard of Istanbul'
Authors: Mohammad Reza Haji Babai, Sepideh Ahmadkhan Beigi
Abstract:
Internationalization and modernization of the globe have played their roles in the process of cultural interaction between globalized societies and, consequently, found their way to the world of literature under the name of ‘imagology’. Imagology has made it possible for the reader to understand the author’s thoughts and judgments of others. The present research focuses on the intercultural images portrayed in the novel of a popular Turkish-French writer, Elif Shafak, about the lifestyle, traditions, habits, and social norms of Turkish, Americans, and Armenians. The novel seeks to articulate a more intricate multicultural memory of Turkishness by grieving over the Armenian massacre. This study finds that, as a mixture of multiple lifestyles and discourses, The Bastard of Istanbul reflects not only images of oriental culture but also occidental cultures. This means that the author has attempted to maintain selfhood through historical and cultural recollection, which resulted in constructing the self and another identity.Keywords: imagology, Elif Shafak, The Bastard of Istanbul, self-image, other-image
Procedia PDF Downloads 141141 Real-Time Mine Safety System with the Internet of Things
Authors: Şakir Bingöl, Bayram İslamoğlu, Ebubekir Furkan Tepeli, Fatih Mehmet Karakule, Fatih Küçük, Merve Sena Arpacık, Mustafa Taha Kabar, Muhammet Metin Molak, Osman Emre Turan, Ömer Faruk Yesir, Sıla İnanır
Abstract:
This study introduces an IoT-based real-time safety system for mining, addressing global safety challenges. The wearable device, seamlessly integrated into miners' jackets, employs LoRa technology for communication and offers real-time monitoring of vital health and environmental data. Unique features include an LCD panel for immediate information display and sound-based location tracking for emergency response. The methodology involves sensor integration, data transmission, and ethical testing. Validation confirms the system's effectiveness in diverse mining scenarios. The study calls for ongoing research to adapt the system to different mining contexts, emphasizing its potential to significantly enhance safety standards in the industry.Keywords: mining safety, internet of things, wearable technology, LoRa, RFID tracking, real-time safety system, safety alerts, safety measures
Procedia PDF Downloads 63140 Smart-Textile Containers for Urban Mobility
Authors: René Vieroth, Christian Dils, M. V. Krshiwoblozki, Christine Kallmayer, Martin Schneider-Ramelow, Klaus-Dieter Lang
Abstract:
Green urban mobility in commercial and private contexts is one of the great challenges for the continuously growing cities all over the world. Bicycle based solutions are already and since a long time the key to success. Modern developments like e-bikes and high-end cargo-bikes complement the portfolio. Weight, aerodynamic drag, and security for the transported goods are the key factors for working solutions. Recent achievements in the field of smart-textiles allowed the creation of a totally new generation of intelligent textile cargo containers, which fulfill those demands. The fusion of technical textiles, design and electrical engineering made it possible to create an ecological solution which is very near to become a product. This paper shows all the details of this solution that includes an especially developed sensor textile for cut detection, a protective textile layer for intrusion prevention, an universal-charging-unit for energy harvesting from diverse sources and a low-energy alarm system with GSM/GPRS connection, GPS location and RFID interface.Keywords: cargo-bike, cut-detection, e-bike, energy-harvesting, green urban mobility, logistics, smart-textiles, textile-integrity sensor
Procedia PDF Downloads 315139 Cultural References in Jean-François Menard's French Translation of Harry Potter a L'ecole Des Sorciers: An Analysis of the Translated Catchphrases and Spells and Cultural Elements
Authors: Brynn Patrice Fader
Abstract:
The objective of this research project is to assess the ways in which Jean-Francois Menards French translation Harry Potter a l'ecole des sorciers translates the cultural references from the original text JK Rowlings' Harry Potter and the Philosophers Stone. The method of this analysis is to focus on analyzing the reasons for and the ways in which Menard translates the spells and catchphrases throughout the novel and the effects that these choices have on the reader. While at times Menard resorts to the omission or manipulation and borrowing he also contrasts these techniques by transferring the cultural references using the direct translational approach. It appears that the translator resorts to techniques other than direct translation when it is necessary to ensure that the target audience will understand the events and conversations taking place.Keywords: cultural elements, direct translation, manipulation, omission
Procedia PDF Downloads 316138 Importance of Punctuation in Communicative Competence
Authors: Khayriniso Bakhtiyarovna Ganiyeva
Abstract:
The article explores the significance of punctuation in achieving communicative competence. It underscores that effective communication goes beyond simply using punctuation correctly. In the successful completion of a communicative activity, it is important not that the writer correctly uses punctuation marks but that he was able to achieve a goal aimed at expressing a certain meaning. The unanimity of the writer and the reader in the mutual understanding of the text is of primary importance. It should also be taken into account that situational communication provides special informative content and expressiveness of speech. Also, the norms of the situation are determined by the nature of the information in the text, and the punctuation marks expressed in accordance with the norm perform logical-semantic, highlighting expressive-emotional and signaling functions. It is a mistake to classify the signs subject to the norm of the situation as created by the author because they functionally reflect the general stylistic features of different texts. Such signs are among the common signs that are codified only by the semantics and structure of the created text.Keywords: communicative-pragmatic approach, expressiveness of speech, stylistic features, comparative analysis
Procedia PDF Downloads 55137 Enhancement of Transaction's Authentication for the Europay, MasterCard, and Visa Contactless Card Payments
Authors: Ossama Al-Maliki
Abstract:
Europay, MasterCard, and Visa (EMV) is one of the most popular payment protocol in the world. The EMV protocol supports Chip and PIN Transactions, Chip and Signature transactions, and Contactless transactions. This protocol suffers from tens of £ millions of lost per year due to many fraudulent payments. This is due to several reported vulnerable points in the protocols used for such payments that allow skimming, replay, cloning, Mole Point of Sale (POS), relay, and other attacks to be conducted. In this paper, we are focusing on the EMV contactless specification and we have proposed two proposal solutions to the addition of a localization factor to enhance the payment authentication of such transactions designed to prevent relay, cloning, and Mole-POS attacks. Our proposed solution is a back-end localization scheme to help the Issuer-Bank compare the location of the genuine cardholder in relation to the used POS. Our scheme uses 'something you have' which is the Cardholder Smartphone (CSP) to provide the location of the cardholder at the time of the transaction and without impacting the contactless payment time/protocol. The Issuer-bank obtain the CSP Location using tried and tested localization techniques, and independently of the cardholder. Both of our proposal solutions do not require infrastructure changes, and it uses existing EMV/SP protocol messages to communicate our scheme information.Keywords: NFC, RFID, contactless card, authentication, location, EMV
Procedia PDF Downloads 242136 Yu Kwang-Chung vs. Yu Kwang-Chung: Untranslatability as the Touchstone of a Poet
Authors: Min-Hua Wu
Abstract:
The untranslatability of an established poet’s tour de force is thoroughly explored by Matthew Arnold (1822-1888). In his On Translating Homer (1861), Arnold lists the four most striking poetic qualities of Homer, namely his rapidity, plainness and directness of style and diction, plainness and directness of ideas, and nobleness. He concludes that such celebrated English translators as Cowper, Pope, Chapman, and Mr. Newman are all doomed, due to their respective failure in rendering the totality of the four Homeric poetic qualities. Why poetic translation always amounts to being proven such a mission impossible for the translator? According to Arnold, it is because there constantly exists a mist interposed between the translator’s own literary self-obsession and the objective artistic qualities that reside in the work of the original author. Foregrounding such a seemingly empowering yet actually detrimental poetic mist, he explains why the aforementioned translators fail in their attempts to bring the Homeric charm to the British reader. Drawing on Arnold’s analytical study on Homeric translation, the research attempts to bring Yu Kwang-chung the poet vis-à-vis Yu Kwang-chung the translator, with an aim not so much to find any similar mist as revealed by Arnold between his Chinese poetry and English translation as to probe into a latent and veiled literary and lingual mist interposed between Chinese and English, if not between Chinese and English literatures. The major work studied and analyzed for this study is Yu’s own Chinese poetry and his own English translation collected in The Night Watchman: Yu Kwang-chung 1958-2004. The research argues that the following critical elements that characterizes Yu’s poetics are to a certain extent 'transformed,' if not 'lost,' in his English translation: a. the Chinese pictographic and ideographic unit terms which so unfailingly characterize the poet’s incredible creativity, allowing him to habitually and conveniently coin concrete textual images or word-scapes almost at his own will; b. the subtle wordplay and punning which appear at a reasonable frequency; c. the parallel contrastive repetitive syntactic structure within a single poetic line; d. the ambiguous and highly associative diction in the adjective and noun categories; e. the literary allusion that harks back to the old times of Chinese literature; f. the alliteration that adds rhythm and smoothness to the lines; g. the rhyming patterns that bring about impressive sonority and lingering echo to the ears of the reader; h. the grandeur-imposing and sublimity-arousing word-scaping which hinges on the employment of verbs; i. the meandering cultural heritage that embraces such elements as Chinese medicine and kung fu; and j. other features of the like. Once we appeal to the Arnoldian tribunal and resort to the strict standards of such a Victorian cultural and literary critic who insists 'to see the object as in itself it really is,' we may serve as a potential judge for the tug of war between Yu Kwang-chung the poet and Yu Kwang-chung the translator, a tug of war that will not merely broaden our understating of Chinese poetics but deepen our apprehension of Chinese-English translatology.Keywords: Yu Kwang-chung, The Night Watchman, poetry translation, Chinese-English translation, translation studies, Matthew Arnold
Procedia PDF Downloads 392135 Analysis of Digitized Stories Authored by a Struggling Grade 1 Reader
Authors: Daphne Dean C. Arenos, Glorificacion L. Quinopez
Abstract:
This study has been conducted to describe the digitized stories authored by a Grade 1 pupil struggling in reading. The main goal was to find out the effect of authoring digital stories on the reading skill of a grade 1 pupil in terms of vocabulary and sequencing skills. To be able to explicate the data collected, a case study approach has been chosen. This case study focused on a 6 years old Filipino child born and raised in Spain and has just transferred to a private school a year ago. The pupil’s struggles in reading, as well as her experiences with digitized stories, were further described. The findings revealed that authoring digital stories facilitate the reading progress of a struggling pupil. The presence of literary elements in the pupil’s stories built her vocabulary and sequencing skills. Hence, authoring digital stories serve as an appropriate and effective scaffold for struggling readers.Keywords: literary elements, reading skill, scaffold, sequencing skill, vocabulary
Procedia PDF Downloads 135