Search results for: modern Korean architecture
3014 Teaching the Binary System via Beautiful Facts from the Real Life
Authors: Salem Ben Said
Abstract:
In recent times the decimal number system to which we are accustomed has received serious competition from the binary number system. In this note, an approach is suggested to teaching and learning the binary number system using examples from the real world. More precisely, we will demonstrate the utility of the binary system in describing the optimal strategy to win the Chinese Nim game, and in telegraphy by decoding the hidden message on Perseverance’s Mars parachute written in the language of binary system. Finally, we will answer the question, “why do modern computers prefer the ternary number system instead of the binary system?”. All materials are provided in a format that is conductive to classroom presentation and discussion.Keywords: binary number system, Nim game, telegraphy, computers prefer the ternary system
Procedia PDF Downloads 1873013 Micro Plasma an Emerging Technology to Eradicate Pesticides from Food Surface
Authors: Muhammad Saiful Islam Khan, Yun Ji Kim
Abstract:
Organophosphorus pesticides (OPPs) have been widely used to replace more persistent organochlorine pesticides because OPPs are more soluble in water and decompose rapidly in aquatic systems. Extensive uses of OPPs in modern agriculture are the major cause of the contamination of surface water. Regardless of the advantages gained by the application of pesticides in modern agriculture, they are a threat to the public health environment. With the aim of reducing possible health threats, several physical and chemical treatment processes have been studied to eliminate biological and chemical poisons from food stuff. In the present study, a micro-plasma device was used to reduce pesticides from the surface of food stuff. Pesticide free food items chosen in this study were perilla leaf, tomato, broccoli and blueberry. To evaluate the removal efficiency of pesticides, different washing methods were followed such as soaking with water, washing with bubbling water, washing with plasma-treated water and washing with chlorine water. 2 mL of 2000 ppm pesticide samples, namely, diazinone and chlorpyrifos were individuality inoculated on food surface and was air dried for 2 hours before treated with plasma. Plasma treated water was used in two different manners one is plasma treated water with bubbling the other one is aerosolized plasma treated water. The removal efficiency of pesticides from food surface was studied using HPLC. Washing with plasma treated water, aerosolized plasma treated water and chlorine water shows minimum 72% to maximum 87 % reduction for 4 min treatment irrespective to the types of food items and the types of pesticides sample, in case of soaking and bubbling the reduction is 8% to 48%. Washing with plasma treated water, aerosolized plasma treated water and chlorine water shows somewhat similar reduction ability which is significantly higher comparing to the soaking and bubbling washing system. The temperature effect of the washing systems was also evaluated; three different temperatures were set for the experiment, such as 22°C, 10°C and 4°C. Decreasing temperature from 22°C to 10°C shows a higher reduction in the case of washing with plasma and aerosolized plasma treated water, whereas an opposite trend was observed for the washing with chlorine water. Further temperature reduction from 10°C to 4°C does not show any significant reduction of pesticides, except for the washing with chlorine water. Chlorine water treatment shows lesser pesticide reduction with the decrease in temperature. The color changes of the treated sample were measured immediately and after one week to evaluate if there is any effect of washing with plasma treated water and with chlorine water. No significant color changes were observed for either of the washing systems, except for broccoli washing with chlorine water.Keywords: chlorpyrifos, diazinone, pesticides, micro plasma
Procedia PDF Downloads 1873012 Cultural Routes: A Study of Anatolian Seljuks Madrasahs
Authors: Zeynep İnan Ocak, Gülsün Tanyeli
Abstract:
One of the most important architectural types of Islamic architecture is madrasah used as educational institutions, hospital or observatory. This type of buildings has one or two storeys, central open or closed courtyards, four iwans and students cells located among the iwans. The main characteristic of the designs featured in the portals. The Islamic art features and adornments are seen well on these buildings made of stone. The earliest examples date to late 12th century in Anatolia after the Battle of Manzikert. Under the Seljuks rule over the one thousand facilities were built in 12th and 13th centuries and there are one hundred thirty five madrasah in total list. But today no all of them are conserved only forty percent are remained. The Seljuks madrasah located in many Anatolian were registered as immovable cultural property in several times by Turkish Culture and Tourism Ministry. The first Turkish buildings inscribed on the World Heritage List are the Great Mosque and Hospital of Divriği in 1985. Also the nominated site named as Anatolian Seljuks Madrasah is in the tentative list of UNESCO World Heritage in 2014. The property is composed some of notable madrasah such as İnce Minareli Madrasah and Karatay Madrasah in Konya; Çifte Madrasah and Sahibiye Madrasah in Kayseri; Buruciye Madrasah, Çifte Minareli Madrasah and Gök Madrasah in Sivas; Çifte Minareli Madrasah and Yakutiye Madrasah in Erzurum; Cacabey Madrasah in Kirşehir. Certainly the advantage of tourism is important for conducting the preservation of heritage. It offers much kind of cultural heritage products by means of visiting monuments. In spite of advantage of tourism, it can be the negative effects of tourism on sites and places of cultural significance. While assisting and guiding the conservation works of madrasah, it should be get reference to international charters and other doctrinal texts about the relation between heritage and tourism. Thereby the monuments will be conserved in good condition promoting by tourism. It should be plan a project about the correlation of visitors and heritage to focus on theme of Seljuks architecture. This study aims to set out the principles about the conservation of madrasah as world heritage taking advantages of tourism. The madrasah as a heritage should be evaluated not only a monument but also cultural route. So the cultural route for madrasah is determined by means of a journey through space and time, how the heritage of the different Anatolian cities. Also the cultural route is created visiting both the madrasah and the other medieval structures. In this study, the route, the principles, relation of tourism are represented considering the conservation of Seljuks madrasah.Keywords: architectural heritage, cultural routes, Seljuks madrasah, Anatolia
Procedia PDF Downloads 2873011 Stock Movement Prediction Using Price Factor and Deep Learning
Abstract:
The development of machine learning methods and techniques has opened doors for investigation in many areas such as medicines, economics, finance, etc. One active research area involving machine learning is stock market prediction. This research paper tries to consider multiple techniques and methods for stock movement prediction using historical price or price factors. The paper explores the effectiveness of some deep learning frameworks for forecasting stock. Moreover, an architecture (TimeStock) is proposed which takes the representation of time into account apart from the price information itself. Our model achieves a promising result that shows a potential approach for the stock movement prediction problem.Keywords: classification, machine learning, time representation, stock prediction
Procedia PDF Downloads 1473010 A History of Knowledge Management: A Chronological Account from the 1970s to 2017
Authors: Alexslis N. Maindze
Abstract:
Knowledge management (KM) has become an imperative to modern business growth, competitive edge, and sustainability. Though there has been extensive research in the field, this literature overview showcases massive gaps that exist on the coverage of the field’s rich and fascinating history. Particularly, accounts of the history of KM are inconsistent and fragmentary in breadth and depth. This paper presents new insights into the history of KM from the early 70s when the actual coinage ‘knowledge management’ entered the literature. It reveals how knowledge over the years was shrouded in secrecy and subsumed by technology. It makes a clear distinction between the histories of the debate around knowledge and that of KM. The paper also finds a history of KM filled with skepticisms and engulfed by an ‘intellectual paradox’.Keywords: knowledge management history, secrecy, skepticism, intellectual paradox
Procedia PDF Downloads 2213009 Cloud Computing in Jordanian Libraries: An Overview
Authors: Mohammad A. Al-Madi, Nagham A. Al-Madi, Fanan A. Al-Madi
Abstract:
The current concept of the technology of cloud computing libraries has been increasing where users can store their data in a virtual space and can be retrieved from anywhere whilst using the network. By using cloud computing technology, industries and individuals save money, time, and space. Moreover, data and information about libraries can be placed in the cloud. This paper discusses the meaning of cloud computing along with its types. Further, the focus has been given to the application of cloud computing in modern libraries. Additionally, the advantages of cloud computing and the areas in which cloud computing be applied with current usage are discussed. Finally, the present situation of the Jordanian libraries is considered and discussed in further detail.Keywords: cloud computing, community cloud, hybrid cloud, private cloud, public cloud
Procedia PDF Downloads 2213008 Performance Comparison of Prim’s and Ant Colony Optimization Algorithm to Select Shortest Path in Case of Link Failure
Authors: Rimmy Yadav, Avtar Singh
Abstract:
—Ant Colony Optimization (ACO) is a promising modern approach to the unused combinatorial optimization. Here ACO is applied to finding the shortest during communication link failure. In this paper, the performances of the prim’s and ACO algorithm are made. By comparing the time complexity and program execution time as set of parameters, we demonstrate the pleasant performance of ACO in finding excellent solution to finding shortest path during communication link failure.Keywords: ant colony optimization, link failure, prim’s algorithm, shortest path
Procedia PDF Downloads 3993007 From Service to Ritual: Preliminary Development on Conceptual Framework for Designing Ritual
Authors: Yi-Jing Lee
Abstract:
Prior to the development of ritual design tool and framework, this paper establishes a systematic review on the studies related to ritual and ritual design across anthropology, consumer culture, marketing, and design. It is found that following symbolic anthropologists, the ethnographic approach was adapted by consumer culture researchers to study modern rituals and marketers to enhance consumption. In the domain of design, although there are already designers aware of the importance of ritualistic dimension of human interaction, there are little frameworks for conceptualizing and developing rituals. The conceptualized framework and developing tools is proposed and suggestions of applying it is made in the end of the paper.Keywords: ritual, ritual design, service design, symbolic interaction
Procedia PDF Downloads 1933006 Managing Core Competencies in Innovative Entrepreneurship: Theory and Practice
Authors: Olga Shvetsova
Abstract:
The research paper contains the different issues of competence management in innovation companies. The theoretical bases of human resources management and practical issues of innovative enterprises’ competitiveness are considered. The research is focused on the modern innovative enterprise management problems; it focuses on the effective management of the personnel of innovative enterprises on the basis of competence approach. The concept of core competence approach is discussed. The point of view, that the key competences of the company create the competitive advantages, support strategy development and protect business from external negative factors is considered. The used methodology is background research.Keywords: competence model, competitiveness, innovation management, implementation
Procedia PDF Downloads 3173005 Measurement of Intellectual Capital in an Algerian Company
Authors: S. Brahmi, S. Aitouche, M. D. Mouss
Abstract:
Every modern company should measure the value of its intellectual capital and to report to complement the traditional annual balance sheets. The purpose of this work is to measure the intellectual capital in an Algerian company (or production system) using the Weightless Wealth Tool Kit (WWTK). The results of the measurement of intellectual capital are supplemented by traditional financial ratios. The measurement was applied to the National Company of Wells Services (ENSP) in Hassi Messaoud city, in the south of Algeria. We calculated the intellectual capital (intangible resources) of the ENSP to help the organization to better capitalize on its potential of workers and their know-how. The intangible value of the ENSP is evaluated at 16,936,173,345 DA in 2015.Keywords: financial valuation, intangible capital, intellectual capital, intellectual capital measurement
Procedia PDF Downloads 2863004 A Three Tier Secure KQML Interface with Novel Performatives
Authors: Dimple Juneja, Aarti Singh, Renu Hooda
Abstract:
Knowledge Query Manipulation Language (KQML) and FIPA ACL are two prime communication languages existing in multi agent systems (MAS). Both languages are more or less similar in terms of semantics (based on speech act theory) and offer cutting edge competition while establishing agent communication across Internet. In contrast to the fact that software agents operating on the internet are required to be more safeguarded from their counter-peer, both protocols lack security performatives. The paper proposes a three tier security interface with few novel security related performatives enhancing the basic architecture of KQML. The three levels are attestation, certification and trust establishment which enforces a tight security and hence reduces the security breeches.Keywords: multiagent systems, KQML, FIPA ACL, performatives
Procedia PDF Downloads 4113003 Facial Emotion Recognition Using Deep Learning
Authors: Ashutosh Mishra, Nikhil Goyal
Abstract:
A 3D facial emotion recognition model based on deep learning is proposed in this paper. Two convolution layers and a pooling layer are employed in the deep learning architecture. After the convolution process, the pooling is finished. The probabilities for various classes of human faces are calculated using the sigmoid activation function. To verify the efficiency of deep learning-based systems, a set of faces. The Kaggle dataset is used to verify the accuracy of a deep learning-based face recognition model. The model's accuracy is about 65 percent, which is lower than that of other facial expression recognition techniques. Despite significant gains in representation precision due to the nonlinearity of profound image representations.Keywords: facial recognition, computational intelligence, convolutional neural network, depth map
Procedia PDF Downloads 2313002 Language Transfer in Graduate Candidates’ Essays
Authors: Erika Martínez Lugo
Abstract:
Candidates to some graduate studies are asked to write essays in English to prove their competence to write essays and to do it in English. In the present study, language transfer (LT) in 15 written essays is identified, documented, analyzed, and classified. The essays were written in 2019, and the graduate program is a Masters in Modern Languages in a North-Western Mexican city border with USA. This study is of interest since it is important to determine whether or not some errors have been fossilized and have become mistakes, or if it is part of the candidates’ interlanguage. The results show that most language transfer is negative and syntactic, where the influence of candidates L1 (Spanish) is evident in their use of L2 (English).Keywords: language transfer, cross-linguistic influence, interlanguage, error vs mistake
Procedia PDF Downloads 1773001 Challenges of Implementing Zero Trust Security Based on NIST SP 800-207
Authors: Mazhar Hamayun
Abstract:
Organizations need to take a holistic approach to their Zero Trust strategic and tactical security needs. This includes using a framework-agnostic model that will ensure all enterprise resources are being accessed securely, regardless of their location. Such can be achieved through the implementation of a security posture, monitoring the posture, and adjusting the posture through the Identify, Detect, Protect, Respond, and Recover Methods, The target audience of this document includes those involved in the management and operational functions of risk, information security, and information technology. This audience consists of the chief information security officer, chief information officer, chief technology officer, and those leading digital transformation initiatives where Zero Trust methods can help protect an organization’s data assets.Keywords: ZTNA, zerotrust architecture, microsegmentation, NIST SP 800-207
Procedia PDF Downloads 873000 Queer Social Realism and Architecture in British Cinema: Tenement Housing, Unions and the Affective Body
Authors: Christopher Pullen
Abstract:
This paper explores the significance of British cinema in the late 1950s and early 1960s as offering a renaissance of realist discourse, in the representation of everyday social issues. Offering a rejection of Hollywood cinema and the superficially of the middle classes, these ‘kitchen sink dramas’ often set within modest and sometimes squalid domestic and social environments, focused on the political struggle of the disenfranchised examining poverty, the oppressed and the outsider. While films like Look Back in Anger and Room at the Top looked primarily at male heterosexual subjectivity, films like A Taste of Honey and Victim focused on female and queer male narratives. Framing the urban landscape as a discursive architectural arena, representing basic living conditions and threatening social worlds, these iconic films established new storytelling processes for the outsider. This paper examines this historical context foregrounding the contemporary films Beautiful Thing (Hettie Macdonald, 1996), Weekend (Andrew Haigh, 2011) and Pride (Marcus Warchus, 2014), while employing the process of textual analysis in relation to theories of affect, defined by writers such as Lisa U. Marks and Sara Ahmed. Considering both romance narratives and public demonstrations of unity, where the queer ‘affective’ body is placed within architectural and social space, Beautiful Thing tells the story of gay male teenagers falling in love despite oppression from family and school, Weekend examines a one-night stand between young gay men and the unlikeliness of commitment, but the drive for sensitivity, and Pride foregrounds an historical relationship between queer youth activists and the miner’s union, who were on strike between 1984-5. These films frame the queer ‘affective’ body within politicized public space, evident in lower class men’s working clubs, tenement housing and brutal modernist tower blocks, focusing on architectural features such as windows, doorways and staircases, relating temporality, desire and change. Through such an examination a hidden history of gay male performativity is revealed, framing the potential of contemporary cinema to focus on the context of the outsider in encouraging social change.Keywords: queer, affect, cinema, architecture, life chances
Procedia PDF Downloads 3582999 Anti-Colitic and Anti-Inflammatory Effects of Lactobacillus sakei K040706 in Mice with Ulcerative Colitis
Authors: Seunghwan Seo, Woo-Seok Lee, Ji-Sun Shin, Young Kyoung Rhee, Chang-Won Cho, Hee-Do Hong, Kyung-Tae Lee
Abstract:
Doenjang, known as traditional Korean food, is product of a natural mixed fermentation process carried out by lactic acid bacteria (LAB). Lactobacillus sakei K040706 (K040706) has been accepted as the most populous LAB in over ripened doenjang. Recently, we reported the immunostimulatory effects of K040706 in RAW 264.7 macrophages and in a cyclophosphamide-induced mouse model. In this study, we investigated the ameliorative effects of K040706 in a dextran sulfate sodium (DSS)-induced colitis mouse model. We induced colitis using DSS in 5-week-ICR mice over 14 days with or without 0.1, 1 g/kg/day K040706 orally. The body weight, stool consistency, and gross bleeding were recorded for determination of the disease activity index (DAI). At the end of treatment, animals were sacrificed and colonic tissues were collected and subjected to histological experiments and myeloperoxidase (MPO) accumulation, cytokine determination, qRT-PCR and Western blot analysis. Results showed that K040706 significantly attenuated DSS-induced DAI score, shortening of colon length, enlargement of spleen and immune cell infiltrations into colonic tissues. Histological examinations indicated that K040706 suppressed edema, mucosal damage, and the loss of crypts induced by DSS. These results were correlated with the restoration of tight junction protein expression, such as, ZO-1 and occludin in K040706-treated mice. Moreover, K040706 reduced the abnormal secretions and mRNA expressions of pro-inflammatory mediators, such as nitric oxide (NO), tumor necrosis factor-α (TNF-α), interleukin-1β (IL-1β), and interleukin-6 (IL-6). DSS-induced mRNA expression of intercellular adhesion molecule (ICAM) and vascular cell adhesion molecule (VCAM) in colonic tissues was also downregulated by K040706 treatment. Furthermore, K040706 suppressed the protein and mRNA expression of toll-like receptor 4 (TLR4) and phosphorylation of NF-κB and signal transducer and activator of transcription 3 (STAT3). These results suggest that K040706 has an anti-colitic effect by inhibition of intestinal inflammatory responses in DSS-induced colitic mice.Keywords: Lactobacillus sakei, NF-κB, STAT3, ulcerative colitis
Procedia PDF Downloads 3252998 Reviving Customs: Examining the Vernacular Habitus in Modern Marathi Film via the Tamasha Genre
Authors: Amar Ramesh Wayal
Abstract:
Marathi cinema, an integral part of India’s diverse film industry, has significantly evolved in its storytelling and aesthetics, with the Tamasha genre being central to this evolution. Tamasha, a traditional form of Marathi theatre, features vibrant dance and music, especially the rhythmic and often suggestive musical genre, lavani. It gained cinematic prominence in the 1960s with Anant Mane’s Sangtye Aika (1959), which brought and popularized Tamasha to the silver screen, and V. Shantaram’s Pinjra (1972), an iconic Tamasha drama. Despite early success, Tamasha films declined in popularity until Natarang (2010) revitalized interest in this traditional form. This study examines the relevance and evolution of the Tamasha genre in Marathi cinema through contemporary films like Ek Hota Vidushak by Jabbar Patel (1992), Natarang (2010) by Ravi Jadhav, and Tamasha Live (2022) by Sanjay Jadhav. The selection of the films is based on their significant roles in the evolution of the Tamasha in Marathi cinema. Ek Hota Vidushak explores socio-political themes through Tamasha, Natarang depicts the struggles and emotional depth of Tamasha performers, and Tamasha Live integrates traditional Tamasha into modern cinema. By analysing films from different periods, this study highlights the genre’s reinterpretation and adaptation over time. The study employs a qualitative approach, utilizing textual analysis and cultural critique to examine the portrayal and evolution of Tamasha in selected films. It aims to illuminate the complex relationship between tradition and modernity in Marathi cinema through Foucauldian discourse analysis and Pierre Bourdieu’s concept of “vernacular habitus,” which refers to local, indigenous cultural spaces that shape people’s perceptions and expressions. By analyzing these films, the study seeks to understand how traditional cultural forms are integrated into contemporary cinematic narratives. However, this method has limitations, such as subjectivity in interpretation and the need for extensive contextual knowledge. Qualitative research can be subject to researcher bias, affecting analysis and conclusions. To mitigate this, this study maintains rigorous reflexivity and transparency regarding the researcher’s positionality. Furthermore, findings from specific film analyses may not be universally applicable to all Tamasha films or broader Marathi cinema. To enhance the study’s robustness, future research could incorporate comparative or quantitative data to complement qualitative insights. Despite these challenges, qualitative research is crucial for exploring cultural artifacts and their significance within specific contexts. By triangulating qualitative findings with diverse perspectives and acknowledging limitations, this study aims to provide a nuanced understanding of how Tamasha cinema preserves and revitalizes Maharashtra’s folk traditions while adapting them to contemporary contexts. Analyzing films by Jabbar Patel, Ravi Jadhav, and Sanjay Jadhav shows how these filmmakers balance traditional aesthetics with modern storytelling, bridging historical continuity with contemporary relevance. This study offers insights into how indigenous traditions like Tamasha continue to shape and define cinematic narratives in Maharashtra.Keywords: Marathi cinema, Tamasha genre, vernacular habitus, discourse analysis, cultural evolution
Procedia PDF Downloads 322997 E-Service and the Nigerian Banking Sector: A Review of ATM Architecture and Operations
Authors: Bashir Aliyu Yauri, Rufai Aliyu Yauri
Abstract:
With the introduction of cash-less society policy by the Central Bank of Nigeria, the concept of e-banking services has experienced a significant improvement over the years. Today quite a number of people are embracing e-banking activities especially ATM, thereby moving away from the conventional banking system. This paper presents a review of the underlying Architectural Layout of Intra-Bank and Inter-Bank ATM connectivity in Nigeria. The paper further investigates and discusses factors affecting the Intra-Bank and Inter-Bank ATM connectivity in Nigeria. And as well possible solutions to these factors affecting ATM Connectivity and Operations are proposed.Keywords: architectural layout, automated teller machine, e-services, postilion
Procedia PDF Downloads 6332996 Complex Event Processing System Based on the Extended ECA Rule
Authors: Kwan Hee Han, Jun Woo Lee, Sung Moon Bae, Twae Kyung Park
Abstract:
ECA (Event-Condition-Action) languages are largely adopted for event processing since they are an intuitive and powerful paradigm for programming reactive systems. However, there are some limitations about ECA rules for processing of complex events such as coupling of event producer and consumer. The objective of this paper is to propose an ECA rule pattern to improve the current limitations of ECA rule, and to develop a prototype system. In this paper, conventional ECA rule is separated into 3 parts and each part is extended to meet the requirements of CEP. Finally, event processing logic is established by combining the relevant elements of 3 parts. The usability of proposed extended ECA rule is validated by a test scenario in this study.Keywords: complex event processing, ECA rule, Event processing system, event-driven architecture, internet of things
Procedia PDF Downloads 5302995 Security Issues in Long Term Evolution-Based Vehicle-To-Everything Communication Networks
Authors: Mujahid Muhammad, Paul Kearney, Adel Aneiba
Abstract:
The ability for vehicles to communicate with other vehicles (V2V), the physical (V2I) and network (V2N) infrastructures, pedestrians (V2P), etc. – collectively known as V2X (Vehicle to Everything) – will enable a broad and growing set of applications and services within the intelligent transport domain for improving road safety, alleviate traffic congestion and support autonomous driving. The telecommunication research and industry communities and standardization bodies (notably 3GPP) has finally approved in Release 14, cellular communications connectivity to support V2X communication (known as LTE – V2X). LTE – V2X system will combine simultaneous connectivity across existing LTE network infrastructures via LTE-Uu interface and direct device-to-device (D2D) communications. In order for V2X services to function effectively, a robust security mechanism is needed to ensure legal and safe interaction among authenticated V2X entities in the LTE-based V2X architecture. The characteristics of vehicular networks, and the nature of most V2X applications, which involve human safety makes it significant to protect V2X messages from attacks that can result in catastrophically wrong decisions/actions include ones affecting road safety. Attack vectors include impersonation attacks, modification, masquerading, replay, MiM attacks, and Sybil attacks. In this paper, we focus our attention on LTE-based V2X security and access control mechanisms. The current LTE-A security framework provides its own access authentication scheme, the AKA protocol for mutual authentication and other essential cryptographic operations between UEs and the network. V2N systems can leverage this protocol to achieve mutual authentication between vehicles and the mobile core network. However, this protocol experiences technical challenges, such as high signaling overhead, lack of synchronization, handover delay and potential control plane signaling overloads, as well as privacy preservation issues, which cannot satisfy the adequate security requirements for majority of LTE-based V2X services. This paper examines these challenges and points to possible ways by which they can be addressed. One possible solution, is the implementation of the distributed peer-to-peer LTE security mechanism based on the Bitcoin/Namecoin framework, to allow for security operations with minimal overhead cost, which is desirable for V2X services. The proposed architecture can ensure fast, secure and robust V2X services under LTE network while meeting V2X security requirements.Keywords: authentication, long term evolution, security, vehicle-to-everything
Procedia PDF Downloads 1672994 Specification of Requirements to Ensure Proper Implementation of Security Policies in Cloud-Based Multi-Tenant Systems
Authors: Rebecca Zahra, Joseph G. Vella, Ernest Cachia
Abstract:
The notion of cloud computing is rapidly gaining ground in the IT industry and is appealing mostly due to making computing more adaptable and expedient whilst diminishing the total cost of ownership. This paper focuses on the software as a service (SaaS) architecture of cloud computing which is used for the outsourcing of databases with their associated business processes. One approach for offering SaaS is basing the system’s architecture on multi-tenancy. Multi-tenancy allows multiple tenants (users) to make use of the same single application instance. Their requests and configurations might then differ according to specific requirements met through tenant customisation through the software. Despite the known advantages, companies still feel uneasy to opt for the multi-tenancy with data security being a principle concern. The fact that multiple tenants, possibly competitors, would have their data located on the same server process and share the same database tables heighten the fear of unauthorised access. Security is a vital aspect which needs to be considered by application developers, database administrators, data owners and end users. This is further complicated in cloud-based multi-tenant system where boundaries must be established between tenants and additional access control models must be in place to prevent unauthorised cross-tenant access to data. Moreover, when altering the database state, the transactions need to strictly adhere to the tenant’s known business processes. This paper focuses on the fact that security in cloud databases should not be considered as an isolated issue. Rather it should be included in the initial phases of the database design and monitored continuously throughout the whole development process. This paper aims to identify a number of the most common security risks and threats specifically in the area of multi-tenant cloud systems. Issues and bottlenecks relating to security risks in cloud databases are surveyed. Some techniques which might be utilised to overcome them are then listed and evaluated. After a description and evaluation of the main security threats, this paper produces a list of software requirements to ensure that proper security policies are implemented by a software development team when designing and implementing a multi-tenant based SaaS. This would then assist the cloud service providers to define, implement, and manage security policies as per tenant customisation requirements whilst assuring security for the customers’ data.Keywords: cloud computing, data management, multi-tenancy, requirements, security
Procedia PDF Downloads 1562993 Managing Cognitive Load in Accounting: An Analysis of Three Instructional Designs in Financial Accounting
Authors: Seedwell Sithole
Abstract:
One of the persistent problems in accounting education is how to effectively support students’ learning. A promising technique to this issue is to investigate the extent that learning is determined by the design of instructional material. This study examines the academic performance of students using three instructional designs in financial accounting. Student’s performance scores and reported mental effort ratings were used to determine the instructional effectiveness. The findings of this study show that accounting students prefer graph and text designs that are integrated. The results suggest that spatially separated graph and text presentations in accounting should be reorganized to align with the requirements of human cognitive architecture.Keywords: accounting, cognitive load, education, instructional preferences, students
Procedia PDF Downloads 1512992 'Sex, Work and Sex-Work': The Clandestine Tale of a Tabooed Industry in Bangladesh
Authors: Parvez Sattar
Abstract:
There are around 150,000 female sex workers in Bangladesh, and the country hosts one of the largest brothels in the world. There are 20 brothel-villages in the country, of which 14 are recognized to be ‘official’, and at least 11 are currently operational. Although the national Constitution adopts a preventive policy against prostitution, law does not, as such, prohibit commercial sex work by an adult woman working in a brothel having made an affidavit in this regard. But, at the same time, the law renders at least some forms of floating and hotel based sex work illegal, while sex between males has been termed as sodomy and made culpable offence even on its own. All forms of sex works by MSM and Hijra are thus branded as criminal acts. Observations and findings drawn in this article are based on both primary and secondary sources collecting data from a series of field-based empirical studies conducted by the author through questionnaire survey, FGDs, key informant consultations and other PRA/PLA tools. General and specific conclusions have been based on analysis guided by international standards of human and labour rights approaches. It has been noted that neither the community attitudes nor the cultural mind-sets, or the State's institutional set up is supportive of the causes of sex workers engaged in the most exploitative forms of labour. Lack of respect for fundamental rights continues to diminish any chances of sex workers' reintegration to the mainstream of the society, perpetuates poverty, and increases their vulnerability to HIV/AIDS. To aggravate the scenario, the endemic practice of a complex debt-bondage masked by the so-called 'entry-cost' and ‘legal license’ to the industry is considered to be a somewhat accepted 'open secret' and that the police and administration keep their eyes off from such practices treating these as 'their internal affairs'. Often these practices are used by the Sardarni/Khala (landlady) and other 'managing' actors as the tool for further exploitation of the sex workers as well as a 'control strategy'. The paper concludes with the observation that the tabooed truths of commercial sex and sex workers are inherently embedded in the very factors that compel them into this endemically ostracised profession itself. While denial of both recognition and enjoyment of the fundamental human rights of sex workers is widespread, it is the same cycle of social vulnerability and economic exclusion that often confines these people within a continuous process of servitude and modern day slavery.Keywords: commercial sex work and human rights, Labor protection in sex industry, Prostitution Law in Bangladesh, Sex work as modern day slavery
Procedia PDF Downloads 1082991 An Informative Marketing Platform: Methodology and Architecture
Authors: Martina Marinelli, Samanta Vellante, Francesco Pilotti, Daniele Di Valerio, Gaetanino Paolone
Abstract:
Any development in web marketing technology requires changes in information engineering to identify instruments and techniques suitable for the production of software applications for informative marketing. Moreover, for large web solutions, designing an interface that enables human interactions is a complex process that must bridge between informative marketing requirements and the developed solution. A user-friendly interface in web marketing applications is crucial for a successful business. The paper introduces mkInfo - a software platform that implements informative marketing. Informative marketing is a new interpretation of marketing which places the information at the center of every marketing action. The creative team includes software engineering researchers who have recently authored an article on automatic code generation. The authors have created the mkInfo software platform to generate informative marketing web applications. For each web application, it is possible to automatically implement an opt in page, a landing page, a sales page, and a thank you page: one only needs to insert the content. mkInfo implements an autoresponder to send mail according to a predetermined schedule. The mkInfo platform also includes e-commerce for a product or service. The stakeholder can access any opt-in page and get basic information about a product or service. If he wants to know more, he will need to provide an e-mail address to access a landing page that will generate an e-mail sequence. It will provide him with complete information about the product or the service. From this point on, the stakeholder becomes a user and is now able to purchase the product or related services through the mkInfo platform. This paper suggests a possible definition for Informative Marketing, illustrates its basic principles, and finally details the mkInfo platform that implements it. This paper also offers some Informative Marketing models, which are implemented in the mkInfo platform. Informative marketing can be applied to products or services. It is necessary to realize a web application for each product or service. The mkInfo platform enables the product or the service producer to send information concerning a specific product or service to all stakeholders. In conclusion, the technical contributions of this paper are: a different interpretation of marketing based on information; a modular architecture for web applications, particularly for one with standard features such as information storage, exchange, and delivery; multiple models to implement informative marketing; a software platform enabling the implementation of such models in a web application. Future research aims to enable stakeholders to provide information about a product or a service so that the information gathered about a product or a service includes both the producer’s and the stakeholders' point of view. The purpose is to create an all-inclusive management system of the knowledge regarding a specific product or service: a system that includes everything about the product or service and is able to address even unexpected questions.Keywords: informative marketing, opt in page, software platform, web application
Procedia PDF Downloads 1272990 Evolution of Fluvial-Deltaic System Recorded in Accumulation of Organic Material: From the Example of the Kura River in the South Caspian Basin
Authors: Dadash Huseynov, Elmira Aliyeva, Robert Hoogendoorn, Salomon Kroonenberg
Abstract:
The study of organic material in bottom sediments together with lithologic and biostratigraphic data improves our understanding of the evolution of fluvial and deltaic systems. The modern Kura River delta is located in the Southwest Caspian Sea and is fluvial-dominated. The river distributes its sediment load through three channels oriented North-East, South-East, and South-West. The offshore modern delta consists of thinly bedded or laminated silty clays and dark grey clays. Locally sand and shell-rich horizons occur. Onshore delta is composed of channel-levee sands and floodplain silts and clays. Overall sedimentation rates in the delta determined by the 210Pb method range between 1.5-3.0 cm/yr. We investigated the distribution of organic material in the deltaic sediments in 300 samples selected from 3m deep piston cores. The studies of transparent sections demonstrate that deltaic sediments are enriched in terrestrial debris. It is non-transparent and has an irregular, isometric, or elongated shape, angular edges, black or dark-brown colour, and a clearly expressed fabric. Partially it is dissolved at the edges and is replaced by iron sulphides. Fragments of marine algae have more smooth edges, brown colour. They are transparent; the fabric is rarely preserved. The evidences of dissolution and gelification are well observed. Iron sulphides are common. The recorded third type of organic material has a round, drop-like, or oval shape and belongs to planktonic organisms. Their initial organic material is strongly transformed or replaced by dark organic compounds, probably, neoplasms. The particles are red-brown and transparent. The iron sulphides are not observed. The amount of Corg in the uppermost portion of sediments accumulated in the offshore Kura River delta varies from 0.2 to 1.22%, with median values of 0.6-0.8%. In poorly sorted sediments Corg content changes from 0.24 to 0.97% (average 0.69%), silty-sandy clay - 0.45 to 1.22% (average 0.77%), sandy-silty clay - 0.5 to 0.97% (average 0.67%), silty clay - 0.52 to 0.95% (average 0.70%). The data demonstrate that in sediments deposited during Caspian Sea high stand in 1929, the minimum of Corg content is localised near the mouth of the main south-eastern distributary channel and coincides with the minimum of the clay fraction. At the same time, the maximum of organic matter content locates near the mouth of the eastern channel, which was inactive at that time. In sediments accumulated during the last Caspian Sea low stand in 1977, the area of Corg minimum is attached to the north-eastern distributary’s mouth. It indicates the high activity of this distributary during the Caspian Sea fall. The area of Corg minimum is also recorded around the mouth of the main channel and eastern part of the delta. Maximums of Corg and clay fraction shift towards the basin. During the Caspian high stand in 1995, the minimum of Corg content is again observed in the mouth of the main south-eastern channel. The distribution of organic matter in the modern sediments of the Kura river delta displays the strong time dependence and reflects progradational-retrogradational cycles of evolution of this fluvial-deltaic system.Keywords: high and low stands, Kura River delta, South Caspian Sea, organic matter
Procedia PDF Downloads 1262989 Fallacies of Argumentation in Modern American Political Discourse
Authors: Zarine Avetisyan
Abstract:
The process of speech production and transmission naturally implies the occurrence of certain defective assumptions and erroneous formulations which may be both spontaneous, caused by haste, carelessness, etc., or deliberate. Whether deliberate or not, fallacies always act by way of “faux pas”. In the latter case, we deal with fake or deceptive arguments which are the focus of the given paper. The paper departs from the assumption that fallacies are arguments that prove nothing. Additionally and more importantly, political discourse becomes the main domain for scholarly “cultivation” while pinning down fallacies. The fallacy of telling the truth but deliberately omitting important key details in order to falsify the larger picture called “the half truth” captures special attention in the given paper.Keywords: break in the information chain, fallacy, half truth, political discourse
Procedia PDF Downloads 3922988 Management of Innovations in the Context of Overcoming Destructive Work Motivation and Anomie
Authors: Naira Hakobyan, Shant Bagratyan
Abstract:
This paper explores the phenomenon of management of innovations from the standpoint of work motivation. The main purpose of the theoretical research is to reveal the role of management of innovations to overcome the destructive work motivation and anomie. Systematization of the theoretical approaches and the literary sources indicates connections between destructive forms of work motivation and anomie. These connections allow an understanding of the role of innovations dedicated to decrease the motivational destructiveness of the employees. It is important to note that, in general, the presence of destructive motivation among employees can lead to work anomie. At the same time, issues related to the influence of destructive motivation on innovative processes in the management of an organization are not sufficiently studied. Exploring the factors leading to destructive work motivation and anomie manages toolkit and innovative ways of solution of the motivational destructiveness. The relevance of this scientific issue is that motivational destructiveness and work anomie are widespread phenomena in modern society. It means that previous forms of management become unusable and the way to introduce the innovations seems unclear for the employees. Investigation of the phenomenon of management of innovations is carried out in the following logical sequence: firstly, the issues of destructive work motivation and leadership are considered, and then the key points of work anomie are presented. Finally, there are explored the modern trends in the management of innovations aimed at overcoming motivational destructiveness and work anomie. The issue of management of innovations is explored by two levels: external-social and internal-organizational levels. Considering the phenomenon of management of innovations, the motivational role of the innovations is emphasized. The object of the research is the phenomenon of management of innovations in the context of overcoming motivational and anomic destructiveness. The paper presents the results of the theoretical analysis of the main factors of destructive motivation and work anomie among employees: an excessive dependence of employees on the manager, ignorance of one’s own work functions or unreasonable change by the manager, prevalence of formalism in assessing work comparing with the content and quality of work, lack of adaptive interaction among employees and low self-esteem of work activity. The paper theoretically proves that unclearly formulated innovative strategies for the development of the organization, lack of feedback from the manager to employees regarding the discussion of innovative technologies, non-compliance of working conditions with declared norms and standards, and formalism in management of innovations lead to destructiveness in a management system. The results of the research can be useful for managers, sociologists, economists, and psychologists.Keywords: management of innovations, destructive motivation, work anomie, leadership, workaholism
Procedia PDF Downloads 202987 Beyond Chol Soo Lee’s Death Row Release: Transinstitutionalization, Mortification, and the Limits of Legal Activism in 20th Century America
Authors: Minhae Shim Roth
Abstract:
The “Deinstitutionalization movement” refers to the spatial transition in the United States during the mid-20th century when the treatment of mental illness purportedly moved from long-term psychiatric institutions to community integrated care. Contrary to the accepted narrative of mental health care in the U.S., asylums did not close or empty. Some remained psychiatric hospitals, which came to be called forensic hospitals or state hospitals; others were converted into prisons or carceral institutions. During Deinstitutionalization, the asylum system became an appendage of the carceral system, with state hospitals becoming little more than holding centers for prisoners who were civilly committed, those incompetent to stand trial, offenders with mental health issues, and those found not guilty by reason of insanity. Psychiatric patients who became prisoners and prisoners who became patients became entangled in the phenomenon called transinstitutionalization. This paper investigates the relationship between psychiatric and criminal incarceration in 20th century California and focuses particularly on the case of Korean-American Chol Soo Lee, who fought detention in the psychiatric-prison system through the writ of habeas corpus. This study uses methodologies like critical theory, close reading, and archival research. This paper argues that during his psychiatric hospitalization at Napa State Hospital and incarceration in the California Department of Corrections, Lee underwent what sociologist Erving Goffman coined in his 1960 text Asylums as the process of “mortification.” After a burst of Asian American solidarity and legal aid that resulted in Lee’s triumphant release from Death Row in 1983 through a writ of habeas corpus, Lee struggled in the free world due to the long-lasting consequences of institutionalization, which led to alienation, recidivism, and an early death at the age of 62. This paper examines the trajectory of Lee’s trial and the legal activism behind it within the context of Goffman’s theory of total institutions and offer a nuanced reading of Lee’s case both during and after his incarceration.Keywords: criminal justice, criminal law, law and mental capacity, habeas corpus, deinstitutionalization, mental health
Procedia PDF Downloads 332986 The Use of Indicators to Evaluate Minor Heritage Areas in a City
Authors: J. L. Oliver, T. Agryzkov, L. Tortosa, J. F. Vicent, J. Santacruz
Abstract:
This paper aims to demonstrate how a system of indicators can be used in order to evaluate some heritage areas which can be understood as minor ones. We mean by that those urban areas with high heritage interest from an academical point of view, but never properly valued. The reasons for this situation may be diverse, either they are not old enough, or they may show the modest architecture, the fact is these areas have not been considered deserving of protection, as the historical ones. As a result of this reality, they usually show now a very degraded urban space, which in addition contribute to accelerate a process of deterioration. Using a technic well known in urban design, we propose here a system of indicators for patrimonial purposes, as a tool to identify and quantify the heritage value of these kinds of areas. As a case study, we apply this system in some part of the City of Quito (El Ecuador).Keywords: heritage cities, indicators, spatial analysis, historic sites
Procedia PDF Downloads 2432985 Efficient Frontier: Comparing Different Volatility Estimators
Authors: Tea Poklepović, Zdravka Aljinović, Mario Matković
Abstract:
Modern Portfolio Theory (MPT) according to Markowitz states that investors form mean-variance efficient portfolios which maximizes their utility. Markowitz proposed the standard deviation as a simple measure for portfolio risk and the lower semi-variance as the only risk measure of interest to rational investors. This paper uses a third volatility estimator based on intraday data and compares three efficient frontiers on the Croatian Stock Market. The results show that range-based volatility estimator outperforms both mean-variance and lower semi-variance model.Keywords: variance, lower semi-variance, range-based volatility, MPT
Procedia PDF Downloads 513