Search results for: 20th century architecture
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 3121

Search results for: 20th century architecture

1471 CNC Milling-Drilling Machine Cutting Tool Holder

Authors: Hasan Al Dabbas

Abstract:

In this paper, it is addressed that the mechanical machinery captures a major share of innovation in drilling and milling chucks technology. Users demand higher speeds in milling because they are cutting more aluminum and are relying on higher speeds to eliminate secondary finishing operations. To meet that demand, milling-machine builders have enhanced their machine’s rigidity. Moreover, faster cutting has caught up with boring mills. Cooling these machine’s internal components is a challenge at high speeds. Another trend predicted that it is more use of controlled axes to let the machines do many more operations on 5 sides without having to move or re-fix the work. Advances of technology in mechanical engineering have helped to make high-speed machining equipment. To accompany these changes in milling and drilling machines chucks, the demand of easiest software is increased. An open architecture controller is being sought that would allow flexibility and information exchange.

Keywords: drilling, milling, chucks, cutting edges, tools, machines

Procedia PDF Downloads 570
1470 Implementing Green IT Practices in Non-IT Industries in Sri Lanka: Contemplating the Feasibility and Methods to Ensure Sustainability

Authors: Manuela Nayantara Jeyaraj

Abstract:

Green IT is a term that refers to the collective strategic and tactical practices that unswervingly condense the carbon footprint to a diminished proportion in an establishment’s computing procedures. This concept has been tightly knit with IT related organizations; hence it has been precluded to be applied within non-IT organizations in Sri Lanka. With the turn of the century, computing technologies have taken over commonplace activities in every nook and corner in Sri Lanka, which is still on the verge of moving forth in its march towards being a developed country. Hence, it needs to be recursively proven that non-IT industries are well-bound to adhere to ‘Green IT’ practices as well, in order to reduce their carbon footprint and move towards considering the practicality of implementing Green-IT practices within their work-arounds. There are several spheres that need to be taken into account in creating awareness of ‘Green IT’, such as the economic breach, technologies available, legislative bounds, community mind-set and many more. This paper tends to reconnoiter causes that currently restrain non-IT organizations from considering Green IT concepts. By doing so, it is expected to prove the beneficial providence gained by implementing this concept within the organization. The ultimate goal is to propose feasible ‘Green IT’ practices that could be implemented within the context of Sri Lankan non-IT sectors in order to ensure that organization’s sustainable growth towards a long term existence.

Keywords: computing practices, Green IT, non-IT industries, Sri Lanka, sustainability

Procedia PDF Downloads 246
1469 A Knowledge-As-A-Service Support Framework for Ambient Learning in Kenya

Authors: Lucy W. Mburu, Richard Karanja, Simon N. Mwendia

Abstract:

Over recent years, learners have experienced a constant need to access on demand knowledge that is fully aligned with the paradigm of cloud computing. As motivated by the global sustainable development goal to ensure inclusive and equitable learning opportunities, this research has developed a framework hinged on the knowledge-as-a-service architecture that utilizes knowledge from ambient learning systems. Through statistical analysis and decision tree modeling, the study discovers influential variables for ambient learning among university students. The main aim is to generate a platform for disseminating and exploiting the available knowledge to aid the learning process and, thus, to improve educational support on the ambient learning system. The research further explores how collaborative effort can be used to form a knowledge network that allows access to heterogeneous sources of knowledge, which benefits knowledge consumers, such as the developers of ambient learning systems.

Keywords: actionable knowledge, ambient learning, cloud computing, decision trees, knowledge as a service

Procedia PDF Downloads 158
1468 On the Paradigm Shift of the Overall Urban Design in China

Authors: Gaoyuan Wang, Tian Chen, Junnan Liu

Abstract:

Facing a period of major change that’s rarely seen in a century, China formulates the 14th Five-Year Plan and places emphasis on promoting high-quality development. In this context, the overall urban design has become a crucial and systematic tool for high-quality urban development. However, there are bottlenecks in the nature definition, content scope and transmission mechanisms of the current overall urban design in China. The paper interprets the emerging demands of the 14th Five-Year Plan on urban design in terms of new value-quality priority, new dynamic-space performance, new target-region coordination and new path-refined governance. Based on the new trend and appeal, the multi-dimensional thinking integrated with the major tasks of urban design are proposed accordingly, which is the biomass thinking in ecological, production and living element, the strategic thinking in spatial structure, the systematic thinking in the cityscape, the low-carbon thinking in urban form, the governance thinking in public space, the user thinking in design implementation. The paper explores the possibility of transforming the value thinking and technical system of urban design in China and provides a breakthrough path for the urban planning and design industry to better respond to the propositions of the country’s 14th Five-Year Plan.

Keywords: China’s 14th five-year plan, overall urban design, urban design thinking, transformation of urban design

Procedia PDF Downloads 265
1467 Migrating Words and Voices in Joseph O’Neill’s Netherland and The Dog

Authors: Masami Usui

Abstract:

The 21th century has already witnessed the rapid globalization of catastrophes caused by layered political, social, religious, cultural, and environmental conflicts. The post 9/11 literature that reflects these characteristics retells the experiences of those who are, whether directly or indirectly, involved in the globalized catastrophes of enlarging and endangering their boundaries and consequences. With an Irish-Turkish origin, a Dutch and British educational background, and as an American green-card holder, Joseph O’Neill challenges this changing circumstances of the expanding crisis. In his controversial novel, Netherland (2008), O’Neill embodies the deeply-rooted compromises, the transplanted conflicts, and human internalized crisis in post 9/11 New York City. O’Neill presents to us the transition between Netherland to New York with a post-colonial perspective. This internalized conflicts are revised in The Dog (2014) in which a newly-constructing and expanding global city of gold, Dubai, represents the transitional location from New York City. Through these two novels, words and voices are migrating beyond cultural and political boundaries and discussing what a collective mind embodies in this globalized society.  

Keywords: American literature, global literature, cultural studies, political science

Procedia PDF Downloads 366
1466 Genealogy of a Building: Tarikhaneh

Authors: Mohadeseh Salari Sardari

Abstract:

As Muslims conquered Iran, their first impression was to show their power over others. They needed mosques for their multiple needs like prayer, tax collecting, law-making, hearing of law cases, and most important of all, as a seat of government. Sometimes they did not have time to build mosques and only began to build them after years of ruling. Many religious buildings with pre-Islamic past survived in Iran, most of the fire temples in cities were destroyed or changed radically, but some deserted temples outside of cities survived, and based on these surviving buildings, we can trace changes in fire temples inside cities and discover how they were adapted and expanded to be mosques. In addition, there are some other buildings with doubts about their date of construction. These buildings might be transitional buildings between two different historical eras or might be an old building with a slight change. One of these interesting buildings is Tarikhaneh, a small, simple yet striking building. By tracing Tarikhaneh’s roots in other buildings like fire temples and secular buildings existed before Arab invasion, it can be better understood how the original form of Tatikhaneh was.

Keywords: iranian architecture, early mosques, fire temples, adaptation and reuse

Procedia PDF Downloads 136
1465 Novel Marketing Strategy To Increase Sales Revenue For SMEs Through Social Media

Authors: Kruti Dave

Abstract:

Social media marketing is an essential component of 21st-century business. Social media platforms enable small and medium-sized businesses to enhance brand recognition, generate leads and sales. However, the research on social media marketing is still fragmented and focuses on specific topics, such as effective communication techniques. Since the various ways in which social media impacts individuals and companies alike, the authors of this article focus on the origin, impacts, and current state of Social Media, emphasizing their significance as customer empowerment agents. It illustrates their potential and current responsibilities as part of the corporate business strategy and also suggests several methods to engage them as marketing tools. The focus of social media marketing ranges from defenders to explorers, the culture of Social media marketing encompasses the poles of conservatism and modernity, social media marketing frameworks lie between hierarchies and networks, and its management goes from autocracy to anarchy. This research proposes an integrative framework for small and medium-sized businesses through social media, and the influence of the same will be measured. This strategy will help industry experts to understand this new era. We propose an axiom: Social Media is always a function of marketing as a revenue generator.

Keywords: social media, marketing strategy, media marketing, brand awareness, customer engagement, revenue generator, brand recognition

Procedia PDF Downloads 196
1464 Automatic Queuing Model Applications

Authors: Fahad Suleiman

Abstract:

Queuing, in medical system is the process of moving patients in a specific sequence to a specific service according to the patients’ nature of illness. The term scheduling stands for the process of computing a schedule. This may be done by a queuing based scheduler. This paper focuses on the medical consultancy system, the different queuing algorithms that are used in healthcare system to serve the patients, and the average waiting time. The aim of this paper is to build automatic queuing system for organizing the medical queuing system that can analyses the queue status and take decision which patient to serve. The new queuing architecture model can switch between different scheduling algorithms according to the testing results and the factor of the average waiting time. The main innovation of this work concerns the modeling of the average waiting time is taken into processing, in addition with the process of switching to the scheduling algorithm that gives the best average waiting time.

Keywords: queuing systems, queuing system models, scheduling algorithms, patients

Procedia PDF Downloads 351
1463 Media Literacy: Information and Communication Technology Impact on Teaching and Learning Methods in Albanian Education System

Authors: Loreta Axhami

Abstract:

Media literacy in the digital age emerges not only as a set of skills to generate true knowledge and information but also as a pedagogy methodology, as a kind of educational philosophy. In addition to such innovations as information integration and communication technologies, media infrastructures, and web usage in the educational system, media literacy enables the change in the learning methods, pedagogy, teaching programs, and school curriculum itself. In this framework, this study focuses on ICT's impact on teaching and learning methods and the degree they are reflected in the Albanian education system. The study is based on a combination of quantitative and qualitative methods of scientific research. Referring to the study findings, it results that student’s limited access to the internet in school, focus on the hardcopy textbooks and the role of the teacher as the only or main source of knowledge and information are some of the main factors contributing to the implementation of authoritarian pedagogical methods in the Albanian education system. In these circumstances, the implementation of media literacy is recommended as an apt educational process for the 21st century, which requires a reconceptualization of textbooks as well as the application of modern teaching and learning methods by integrating information and communication technologies.

Keywords: authoritarian pedagogic model, education system, ICT, media literacy

Procedia PDF Downloads 138
1462 Threat Analysis: A Technical Review on Risk Assessment and Management of National Testing Service (NTS)

Authors: Beenish Urooj, Ubaid Ullah, Sidra Riasat

Abstract:

National Testing Service-Pakistan (NTS) is an agency in Pakistan that conducts student success appraisal examinations. In this research paper, we must present a security model for the NTS organization. The security model will depict certain security countermeasures for a better defense against certain types of breaches and system malware. We will provide a security roadmap, which will help the company to execute its further goals to maintain security standards and policies. We also covered multiple aspects in securing the environment of the organization. We introduced the processes, architecture, data classification, auditing approaches, survey responses, data handling, and also training and awareness of risk for the company. The primary contribution is the Risk Survey, based on the maturity model meant to assess and examine employee training and knowledge of risks in the company's activities.

Keywords: NTS, risk assessment, threat factors, security, services

Procedia PDF Downloads 69
1461 Depiction of a Circulated Double Psi-Shaped Microstrip Antenna for Ku-Band Satellite Applications

Authors: M. Naimur Rahman, Mohammad Tariqul Islam, Mandeep Singh Jit Singh, Norbahiah Misran

Abstract:

This paper presents the architecture and exploration of a compact, circulated double Psi-shaped microstrip patch antenna for Ku-band satellite applications. The antenna is composed of the double Psi-shaped patch in opposite focus which is circulated with a ring. The antenna size is 24 mm × 18 mm and the prototype is imprinted on Rogers RT/duroid 5880 materials with the depth of 1.57 mm. The substrate has a relative permittivity of 2.2 and the dielectric constant of 0.0009. The excitation is supplied through a 50Ω microstrip line. The performance of the presented antenna has been simulated and verified with the High-Frequency Structural Simulator (HFSS). The results depict that the antenna covers the frequency spectrum 14.6 - 17.4 GHz (Ku-band) with 10 dB return loss. The antenna has a 4.40 dBi maximum gain with stable radiation patterns throughout the operating band which makes the proposed antenna compatible for the satellite application in Ku-band.

Keywords: Ku-band antenna, microstrip antenna, psi-shaped antenna, satellite applications

Procedia PDF Downloads 308
1460 Diallyl Trisulfide Protects the Rat Liver from CCl4-Induced Injury and Fibrogenesis by Attenuating Oxidative Stress

Authors: Xiao-Jing Zhu, Liang Zhou, Shi-Zhong Zheng

Abstract:

Various studies have shown that diallyl trisulfide (DATS) can protect the liver injury, and DATS has a strong antioxidant property. The aim of this study is to evaluate the in vivo role of DATS in protecting the liver against injury and fibrogenesis and further explores the underlying mechanisms. Our results demonstrated that DATS protected the liver from CCl4-caused injury by suppressing the elevation of ALT and AST activities, and by improving the histological architecture of the liver. Treatment with DATS or colchicine improved the liver fibrosis by sirius red staining and immunofluorescence. In addition, immunohistochemistry, western blot, and RT-PCR analyses indicated that DATS inhibited HSC activation. Furthermore, DATS attenuated oxidative stress by increasing glutathione and reducing lipid peroxides and malondialdehyde. These findings suggest that the protective effect of DATS on CCl4-caused liver injury and liver fibrogenesis was, at least partially, attributed to its antioxidant activity.

Keywords: liver fibrogenesis, liver injury, oxidative stress, DATS

Procedia PDF Downloads 429
1459 Extending Image Captioning to Video Captioning Using Encoder-Decoder

Authors: Sikiru Ademola Adewale, Joe Thomas, Bolanle Hafiz Matti, Tosin Ige

Abstract:

This project demonstrates the implementation and use of an encoder-decoder model to perform a many-to-many mapping of video data to text captions. The many-to-many mapping occurs via an input temporal sequence of video frames to an output sequence of words to form a caption sentence. Data preprocessing, model construction, and model training are discussed. Caption correctness is evaluated using 2-gram BLEU scores across the different splits of the dataset. Specific examples of output captions were shown to demonstrate model generality over the video temporal dimension. Predicted captions were shown to generalize over video action, even in instances where the video scene changed dramatically. Model architecture changes are discussed to improve sentence grammar and correctness.

Keywords: decoder, encoder, many-to-many mapping, video captioning, 2-gram BLEU

Procedia PDF Downloads 105
1458 Efficient and Timely Mutual Authentication Scheme for RFID Systems

Authors: Hesham A. El Zouka, Mustafa M. Hosni ka

Abstract:

The Radio Frequency Identification (RFID) technology has a diverse base of applications, but it is also prone to security threats. There are different types of security attacks that limit the range of the RFID applications. For example, deploying the RFID networks in insecure environments could make the RFID system vulnerable to many types of attacks such as spoofing attack, location traceability attack, physical attack and many more. Therefore, security is often an important requirement for RFID systems. In this paper, RFID mutual authentication protocol is implemented based on mobile agent technology and timestamp, which are used to provide strong authentication and integrity assurances to both the RFID readers and their corresponding RFID tags. The integration of mobile agent technology and timestamp provides promising results towards achieving this goal and towards reducing the security threats in RFID systems.

Keywords: RFID, security, authentication protocols, privacy, agent-based architecture, time-stamp, digital signature

Procedia PDF Downloads 267
1457 Lewis Turning Point in China: Interviewing Perceptions of Fertility Policies by Unmarried Female Millennials

Authors: Yunqi Wang

Abstract:

Benefiting from the demographic dividend, China has enjoyed export-led economic growth since 1978. While Lewis's model marks the structural transformation from the low-wage 'subsistence' sector to the 'modern sector' as the end of labour surplus, the Chinese government seems eager to extend such benefit by promoting a series of fertility encouragement policies, contrasting to its firm and strict birth control since last century. Based on a Attride-Stirling’s thematic analysis of interviews with unmarried female millennials in China, this paper argues that the young female generation responded to current fertility policies negatively, where the policy ineffectiveness and irresponsiveness have further worsened their marriage and childbirth reluctance. Instead of focusing on changes in wage level, this research contributes a qualitative perspective to the existing theoretical debate on the Lewis turning point, implying an inevitable end of demographic dividend in China. Highlighting the greater focus on female consciousness among the younger generation, it also suggests a policy orientation towards resolving outdated social norms to accommodate the rising female consciousness since millennials will become the childbirth mainstay in forthcoming years.

Keywords: lewis model, fertility policy, demographic dividend, one-child policy

Procedia PDF Downloads 117
1456 The Effect of Voice Recognition Dictation Software on Writing Quality in Third Grade Students: An Action Research Study

Authors: Timothy J. Grebec

Abstract:

This study investigated whether using a voice dictation software program (i.e., Google Voice Typing) has an impact on student writing quality. The research took place in a third-grade general education classroom in a suburban school setting. Because the study involved minors, all data was encrypted and deidentified before analysis. The students completed a series of writings prior to the beginning of the intervention to determine their thoughts and skill level with writing. During the intervention phase, the students were introduced to the voice dictation software, given an opportunity to practice using it, and then assigned writing prompts to be completed using the software. The prompts written by nineteen student participants and surveys of student opinions on writing established a baseline for the study. The data showed that using the dictation software resulted in a 34% increase in the response quality (compared to the Pennsylvania State Standardized Assessment [PSSA] writing guidelines). Of particular interest was the increase in students' proficiency in demonstrating mastery of the English language and conventions and elaborating on the content. Although this type of research is relatively no, it has the potential to reshape the strategies educators have at their disposal when instructing students on written language.

Keywords: educational technology, accommodations, students with disabilities, writing instruction, 21st century education

Procedia PDF Downloads 74
1455 Environmental Liability of Architects: Architects Destroying the City in Designed and Creative Way, Dhaka City

Authors: Md. Ratin

Abstract:

This paper aims to show how Dhaka city is getting destroyed and the creator and guide of the city – the architects destroying the city in more designed and creative way. The liability of architects should be first and foremost to make the would, country, city a better living environment. As without it where the architects will do their design? To make a better living environment architects should conserve the tress, river and other related ingredient related to the environment. This paper attempts to show how cutting down trees and filling rivers causing more problem than having a great architecture in those places. For increasing people in a city like Dhaka, we need more shelter. But for providing those architects building more living spaces. But as a liability of an architect, one should give something back to the environment too. With time the city’s greenery and water body are getting vanished like magic. And for this, the architects should be blamed for giving us a disastrous future. The analysis is based on literature survey and survey by questionnaire, interviews of users.

Keywords: architect, environment, liability, river

Procedia PDF Downloads 344
1454 Research Approaches for Identifying Images of the Past in the Built Environment

Authors: Ahmad Al-Zoabi

Abstract:

Development of research approaches for identifying images of the past in the built environment is at a beginning stage, and a review of the current literature reveals a limited body of research in this area. This study seeks to make a contribution to fill this void. It investigates the theoretical and empirical studies that examine the built environment as a medium for communicating the past in order to understand how images of the past are operationalized in these studies. Findings revealed that image could be operationalized in several ways depending on the focus of the study. Three concerns were addressed in this study when defining the image of the past: (a) to investigate an 'everyday' popular image of the past; (b) to look at the building's image as an integrated part of a larger image for the city; and (c) to find patterns within residents' images of the past. This study concludes that a future study is needed to address the effects of different scales (size and depth of history) of cities and of different cultural backgrounds of images of the past.

Keywords: architecture, built environment, image of the past, research approaches

Procedia PDF Downloads 314
1453 Authentication of Physical Objects with Dot-Based 2D Code

Authors: Michał Glet, Kamil Kaczyński

Abstract:

Counterfeit goods and documents are a global problem, which needs more and more sophisticated methods of resolving it. Existing techniques using watermarking or embedding symbols on objects are not suitable for all use cases. To address those special needs, we created complete system allowing authentication of paper documents and physical objects with flat surface. Objects are marked using orientation independent and resistant to camera noise 2D graphic codes, named DotAuth. Based on the identifier stored in 2D code, the system is able to perform basic authentication and allows to conduct more sophisticated analysis methods, e.g., relying on augmented reality and physical properties of the object. In this paper, we present the complete architecture, algorithms and applications of the proposed system. Results of the features comparison of the proposed solution and other products are presented as well, pointing to the existence of many advantages that increase usability and efficiency in the means of protecting physical objects.

Keywords: anti-forgery, authentication, paper documents, security

Procedia PDF Downloads 132
1452 Highly Linear and Low Noise AMR Sensor Using Closed Loop and Signal-Chopped Architecture

Authors: N. Hadjigeorgiou, A. C. Tsalikidou, E. Hristoforou, P. P. Sotiriadis

Abstract:

During the last few decades, the continuously increasing demand for accurate and reliable magnetic measurements has paved the way for the development of different types of magnetic sensing systems as well as different measurement techniques. Sensor sensitivity and linearity, signal-to-noise ratio, measurement range, cross-talk between sensors in multi-sensor applications are only some of the aspects that have been examined in the past. In this paper, a fully analog closed loop system in order to optimize the performance of AMR sensors has been developed. The operation of the proposed system has been tested using a Helmholtz coil calibration setup in order to control both the amplitude and direction of magnetic field in the vicinity of the AMR sensor. Experimental testing indicated that improved linearity of sensor response, as well as low noise levels can be achieved, when the system is employed.

Keywords: AMR sensor, closed loop, memory effects, chopper, linearity improvement, sensitivity improvement, magnetic noise, electronic noise

Procedia PDF Downloads 361
1451 Home Legacy Device Output Estimation Using Temperature and Humidity Information by Adaptive Neural Fuzzy Inference System

Authors: Sung Hyun Yoo, In Hwan Choi, Jun Ho Jung, Choon Ki Ahn, Myo Taeg Lim

Abstract:

Home energy management system (HEMS) has been issued to reduce the power consumption. The HEMS performs electric power control for the indoor electric device. However, HEMS commonly treats the smart devices. In this paper, we suggest the output estimation of home legacy device using the artificial neural fuzzy inference system (ANFIS). This paper discusses the overview and the architecture of the system. In addition, accurate performance of the output estimation using the ANFIS inference system is shown via a numerical example.

Keywords: artificial neural fuzzy inference system (ANFIS), home energy management system (HEMS), smart device, legacy device

Procedia PDF Downloads 541
1450 A Framework and Case Study for Sustainable Development of Urban Areas

Authors: Yasaman Zeinali, Farid Khosravikia

Abstract:

This paper presents a multi-objective framework for sustainable urban development. The proposed framework aims to address different aspects of sustainability in urban development planning. These aspects include, but are not limited to education, health, job opportunities, architecture, culture, environment, mobility, energy, water, waste, and so on. Then, the proposed framework is applied to the Brackenridge Tract (an area in downtown Austin, Texas), to redevelop that area in a sustainable way. The detail of the implementation process is presented in this paper. The ultimate goal of this paper is to develop a sustainable area in downtown Austin with ensuring that it locally meets the needs of present and future generations with respect to economic, social, environmental, health as well as cultural aspects. Moreover, it helps the city with the population growth problem by accommodating more people in that area.

Keywords: urban planning, sustainability, sustainable urban development, environmental impacts of human activities

Procedia PDF Downloads 252
1449 Iron Extraction from Bog Iron Ore in Early French Colonial America

Authors: Yves Monette, Brad Loewen, Louise Pothier

Abstract:

This study explores the first bog iron ore extraction activities which took place in colonial New France. Archaeological excavations carried on the founding site of Montreal in the last ten years have revealed the remains of Fort Ville-Marie erected in 1642. In a level related to the fort occupation between 1660 and 1680, kilos of scories, a dozen of half-finished iron artefacts and a light yellow clayey ore material have recovered that point to extractive metallurgy activities at the fort. Examples of scories, artefacts and of a possible bog iron ore were submitted to SEM-EDS analysis. The results clearly indicate that iron was extracted from local limonite ores in a bloomery. We discovered that the gangue material could be traced from the ore to the scories. However, some lime silicates and some accessory minerals found in the scories, like barite and celestine for example, were absent from the ore but present in dolomite fragments found in the same archaeological context. The tracing of accessory minerals suggests that the ironmaster introduced a lime flux in the bloomery charge to maximize the separation of the iron ore. Before the introduction of the blast furnace in Western Europe during the first half of the 18th Century, the use of fluxes in iron bloomery was not a common practice.

Keywords: bog iron ore, extractive metallurgy, French colonial America, Montreal, scanning electron microscopy (SEM)

Procedia PDF Downloads 353
1448 Research on the Influence of Robot Teaching on the Creativity of Primary and Secondary School Students under the Background of STEM Education

Authors: Chu Liu

Abstract:

With the development of society and the changes of the times, the requirements for the cultivation of learners are different. In the 21st century, STEM education has become a boom in the development of education in various countries, aiming to improve the comprehensive ability of learners in science, technology, engineering, and mathematics. The rise of robot education provides an effective way for STEM education to cultivate computational thinking ability, interdisciplinary ability, problem-solving ability, and teamwork ability. Although robot education has been developed in China for several years, it still lacks a standard curriculum system. This article uses programming software as a platform, through the research and analysis of 'Basic Education Information Technology Curriculum Standards (2012 Edition)', combines with the actual learning situation of learners, tries to conduct teaching project design research, and aims at providing references for the teaching ideas and method of robot education courses. In contemporary society, technological advances increasingly require creativity. Innovative comprehensive talents urgently need a radical and effective education reform to keep up with social changes. So in this context, robot teaching design can be used for students. The tendency of creativity to influence is worth to be verified.

Keywords: STEM education, robot teaching, primary and secondary school students, tendency of creativity

Procedia PDF Downloads 118
1447 Effective Practical Proceedings in Breaking the Respiratory Infections Transmission Chain in the Community with the Emphasis on SARS-COV-2 Control

Authors: Fatemeh Aghamohammadzadeh, Mahdi Asghari Ozma

Abstract:

SARS-CoV-2 was transmitted from animals to humans in China and through air transport to almost all world countries, including Iran, creating the first pandemic of the 21st century. The virus was spread through droplets from sneezing, coughing, loud talking, and exhalation of sick and asymptomatic people, even during incubation. It was transmitted from human to human directly by inhalation of viruses in droplets or indirectly through contact with infected surfaces, resulting in the death of a significant number of patients, especially the elderly and those with underlying diseases. The virus is more likely to be transmitted in places with high population densities. The chain of transmission of infection can be broken by observing the following: risk perception, reduced travel, complete quarantine in a particular area, home quarantine, social distancing, use of personal protective equipment (PPE), prevention of gatherings, cleaning and disinfection of public utilities and busy places, identifying, isolating and treating infected people, tracking calls, continuing health education, following health principles by people, especially in poor areas, and washing their hands frequently with soap and water or disinfecting them with 70% ethanol.

Keywords: COVID-19, transmission, population density, home quarantine, social distancing

Procedia PDF Downloads 104
1446 A Taxonomy of Routing Protocols in Wireless Sensor Networks

Authors: A. Kardi, R. Zagrouba, M. Alqahtani

Abstract:

The Internet of Everything (IoE) presents today a very attractive and motivating field of research. It is basically based on Wireless Sensor Networks (WSNs) in which the routing task is the major analysis topic. In fact, it directly affects the effectiveness and the lifetime of the network. This paper, developed from recent works and based on extensive researches, proposes a taxonomy of routing protocols in WSNs. Our main contribution is that we propose a classification model based on nine classes namely application type, delivery mode, initiator of communication, network architecture, path establishment (route discovery), network topology (structure), protocol operation, next hop selection and latency-awareness and energy-efficient routing protocols. In order to provide a total classification pattern to serve as reference for network designers, each class is subdivided into possible subclasses, presented, and discussed using different parameters such as purposes and characteristics.

Keywords: routing, sensor, survey, wireless sensor networks, WSNs

Procedia PDF Downloads 181
1445 Stack Overflow Detection and Prevention on Operating Systems Using Machine Learning and Control-Flow Enforcement Technology

Authors: Cao Jiayu, Lan Ximing, Huang Jingjia, Burra Venkata Durga Kumar

Abstract:

The first virus to attack personal computers was born in early 1986, called C-Brain, written by a pair of Pakistani brothers. In those days, people still used dos systems, manipulating computers with the most basic command lines. In the 21st century today, computer performance has grown geometrically. But computer viruses are also evolving and escalating. We never stop fighting against security problems. Stack overflow is one of the most common security vulnerabilities in operating systems. It may result in serious security issues for an operating system if a program in it has a vulnerability with administrator privileges. Certain viruses change the value of specific memory through a stack overflow, allowing computers to run harmful programs. This study developed a mechanism to detect and respond to time whenever a stack overflow occurs. We demonstrate the effectiveness of standard machine learning algorithms and control flow enforcement techniques in predicting computer OS security using generating suspicious vulnerability functions (SVFS) and associated suspect areas (SAS). The method can minimize the possibility of stack overflow attacks occurring.

Keywords: operating system, security, stack overflow, buffer overflow, machine learning, control-flow enforcement technology

Procedia PDF Downloads 113
1444 An Empirical Investigation of Montesquieu’s Theories on Climate

Authors: Lisa J. Piergallini

Abstract:

This project uses panel regression analyses to investigate the relationships between geography, institutions, and economic development, as guided by the theories of the 18th century French philosopher Montesquieu. Contemporary scholars of political economy perpetually misinterpret Montesquieu’s theories on climate, and in doing so they miss what could be the key to resolving the geography vs. institutions debate. There is a conspicuous gap in this literature, in that it does not consider whether geography and institutors might have an interactive, dynamic effect on economic development. This project seeks to bridge that gap. Data are used for all available countries over the years 1980-2013. Two interaction terms between geographic and institutional variables are employed within the empirical analyses, and these offer a unique contribution to the ongoing geography vs. institutions debate within the political economy literature. This study finds that there is indeed an interactive effect between geography and institutions, and that this interaction has a statistically significant effect on economic development. Democracy (as measured by Polity score) and rule of law and property rights (as measured by the Fraser index) have positive effects on economic development (as measured by GDP per capita), yet the magnitude of these effects are stronger in contexts where a low percent of the national population lives in the geographical tropics. This has implications for promoting economic development, and it highlights the importance of understanding geographical context.

Keywords: Montesquieu, institutions, geography, economic development, political philosophy, political economy

Procedia PDF Downloads 254
1443 The Effect of Artificial Intelligence on International Law, Legal Security and Privacy Issues

Authors: Akram Waheb Nasef Alzordoky

Abstract:

The wars and armed conflicts have frequently ended in violations of global humanitarian law and regularly devote the maximum severe global crimes, which include war crimes, crimes towards humanity, aggression and genocide. But, simplest inside the XX century, the guideline changed into an articulated idea of establishing a frame of worldwide criminal justice so that you can prosecute those crimes and their perpetrators. The first steps on this subject were made with the aid of setting up the worldwide army tribunals for warfare crimes at Nuremberg and Tokyo, and the formation of ad hoc tribunals for the former Yugoslavia and Rwanda. Ultimately, the global criminal courtroom was established in Rome in 1998 with the aim of justice and that allows you to give satisfaction to the sufferers of crimes and their families. The aim of the paper was to provide an ancient and comparative analysis of the establishments of worldwide criminal justice primarily based on which those establishments de lege lata fulfilled the goals of individual criminal responsibility and justice. Moreover, the authors endorse de lege ferenda that the everlasting global crook Tribunal, in addition to the potential case, additionally takes over the current ICTY and ICTR cases.

Keywords: social networks privacy issues, social networks security issues, social networks privacy precautions measures, social networks security precautions measures

Procedia PDF Downloads 21
1442 Knowledge, Technology and Empowerment in Contemporary Scenario

Authors: Samir Roy

Abstract:

This paper investigates the relationship among knowledge, technology, and empowerment. In Physics power is defined as rate of doing work. In everyday use, the meaning of the word power is related to the capacity to bring change of value in the world. It appears that the popular aphorism “Knowledge is power” should be revisited in the context of contemporary states of affairs. For instance, classical mechanics is a system of knowledge, so also thermodynamics. But neither of them, per se, is sufficient to produce automobilin es. Boolean algebra, the logical foundation of digital electronic computers, was introduced by George Boole in 1847. But that knowledge was practically useless for almost one hundred years until digital electronics was developed in early twentieth century, which eventually led to invention of digital electronic computers. Empowerment of women is a burning issue in the arena of social justice. However, if we carefully analyze the functional elements of women’s empowerment, we find them to be highly technology driven as well as technology dependent in real life. On the other hand, technology has empowered modern states to maintain social order and promote democracy in an effective manner. This paper includes a few case studies to establish the close correspondence between knowledge, especially scientific knowledge, technology, and empowerment. It appears that in contemporary scenario, “Technology is power” is a more appropriate statement than the traditional aphorism “Knowledge is power”.

Keywords: knowledge, science, technology, empowerment, change, social justice

Procedia PDF Downloads 39