Search results for: spread reshaping code
963 Characteristic Study of Polymer Sand as a Potential Substitute for Natural River Sand in Construction Industry
Authors: Abhishek Khupsare, Ajay Parmar, Ajay Agarwal, Swapnil Wanjari
Abstract:
The extreme demand for aggregate leads to the exploitation of river-bed for fine aggregates, affecting the environment adversely. Therefore, a suitable alternative to natural river sand is essentially required. This study focuses on preventing environmental impact by developing polymer sand to replace natural river sand (NRS). Development of polymer sand by mixing high volume fly ash, bottom ash, cement, natural river sand, and locally purchased high solid content polycarboxylate ether-based superplasticizer (HS-PCE). All the physical and chemical properties of polymer sand (P-Sand) were observed and satisfied the requirement of the Indian Standard code. P-Sand yields good specific gravity of 2.31 and is classified as zone-I sand with a satisfactory friction angle (37˚) compared to natural river sand (NRS) and Geopolymer fly ash sand (GFS). Though the water absorption (6.83%) and pH (12.18) are slightly more than those of GFS and NRS, the alkali silica reaction and soundness are well within the permissible limit as per Indian Standards. The chemical analysis by X-Ray fluorescence showed the presence of high amounts of SiO2 and Al2O3 with magnitudes of 58.879% 325 and 26.77%, respectively. Finally, the compressive strength of M-25 grade concrete using P-sand and Geopolymer sand (GFS) was observed to be 87.51% and 83.82% with respect to natural river sand (NRS) after 28 days, respectively. The results of this study indicate that P-sand can be a good alternative to NRS for construction work as it not only reduces the environmental effect due to sand mining but also focuses on utilising fly ash and bottom ash.Keywords: polymer sand, fly ash, bottom ash, HSPCE plasticizer, river sand mining
Procedia PDF Downloads 77962 A Series of Teaching Modules to Prepare International Students for Real-World China
Authors: Jui-Chien Wang
Abstract:
Because of China’s continued economic growth and dominance, increasingly many students of Chinese from western countries are interested in pursuing careers related to China. Unless we do more to teach them about contemporary Chinese society and Chinese cultural codes, however, few will be able to do so successfully. Most traditional language textbooks treat these topics only cursorily, and, because of the rapid pace of China’s social and economic development, what they do cover is frequently outdated and insufficient. However, understanding contemporary Chinese society and Chinese cultural codes is essential to successfully negotiating real-world China. The current paper details one of the main ways in which the presenter has dealt with this educational lacuna: the development and implementation of a series of teaching modules for advanced Chinese language classes. Each module explores a particular area, provides resources, and raises questions to engage students in strengthening their language and cultural competencies. The teaching modules address four main areas: (1) Chinese behavioral culture; (2) critical issues in contemporary China; (3) current events in China; and (4) great social transformations in contemporary China. The presenter will also discuss lessons learned and insights gained during the development and implementation process as well as the benefits of using these modules. In addition, the presenter will offer suggestions for the application of these modules, so that other language teachers will be able to make better use of them in their own classrooms.Keywords: behavioral culture, contemporary Chinese society, cultural code, teaching module
Procedia PDF Downloads 267961 Fire and Explosion Consequence Modeling Using Fire Dynamic Simulator: A Case Study
Authors: Iftekhar Hassan, Sayedil Morsalin, Easir A Khan
Abstract:
Accidents involving fire occur frequently in recent times and their causes showing a great deal of variety which require intervention methods and risk assessment strategies are unique in each case. On September 4, 2020, a fire and explosion occurred in a confined space caused by a methane gas leak from an underground pipeline in Baitus Salat Jame mosque during Night (Esha) prayer in Narayanganj District, Bangladesh that killed 34 people. In this research, this incident is simulated using Fire Dynamics Simulator (FDS) software to analyze and understand the nature of the accident and associated consequences. FDS is an advanced computational fluid dynamics (CFD) system of fire-driven fluid flow which solves numerically a large eddy simulation form of the Navier–Stokes’s equations for simulation of the fire and smoke spread and prediction of thermal radiation, toxic substances concentrations and other relevant parameters of fire. This study focuses on understanding the nature of the fire and consequence evaluation due to thermal radiation caused by vapor cloud explosion. An evacuation modeling was constructed to visualize the effect of evacuation time and fractional effective dose (FED) for different types of agents. The results were presented by 3D animation, sliced pictures and graphical representation to understand fire hazards caused by thermal radiation or smoke due to vapor cloud explosion. This study will help to design and develop appropriate respond strategy for preventing similar accidents.Keywords: consequence modeling, fire and explosion, fire dynamics simulation (FDS), thermal radiation
Procedia PDF Downloads 227960 Hierarchical Optimization of Composite Deployable Bridge Treadway Using Particle Swarm Optimization
Authors: Ashraf Osman
Abstract:
Effective deployable bridges that are characterized by an increased capacity to weight ratio are recently needed for post-disaster rapid mobility and military operations. In deployable bridging, replacing metals as the fabricating material with advanced composite laminates as lighter alternatives with higher strength is highly advantageous. This article presents a hierarchical optimization strategy of a composite bridge treadway considering maximum strength design and bridge weight minimization. Shape optimization of a generic deployable bridge beam cross-section is performed to achieve better stress distribution over the bridge treadway hull. The developed cross-section weight is minimized up to reserving the margins of safety of the deployable bridging code provisions. Hence, the strength of composite bridge plates is maximized through varying the plies orientation. Different loading cases are considered of a tracked vehicle patch load. The orthotropic plate properties of a composite sandwich core are used to simulate the bridge deck structural behavior. Whereas, the failure analysis is conducted using Tsai-Wu failure criterion. The naturally inspired particle swarm optimization technique is used in this study. The proposed technique efficiently reduced the weight to capacity ratio of the developed bridge beam.Keywords: CFRP deployable bridges, disaster relief, military bridging, optimization of composites, particle swarm optimization
Procedia PDF Downloads 141959 Investigating the Prevalence of HCV from Laboratory Centers in Tehran City - Iran by Electrochemiluminescence (ECL) and PCR Techniques
Authors: Zahra Rakhshan Masoudi, Sona Rostampour Yasouri
Abstract:
Considering that the only way to save the lives of patients and healthy people who have suffered sudden accidents is blood transfusion, what is important is the presence of the known HCV virus as the most important cause of the disease after blood transfusion. HCV is one of the major global problems, and its transmission through blood causes life-threatening complications and extensive legal, social and economic consequences. On the one hand, unfortunately, there is still no effective vaccine available to prevent HCV. In Iran, the exact statistics of the prevalence of this disease have not yet been fully announced. The main purpose of this study is to investigate the prevalence rate and rapid diagnosis of HCV among those who refer to laboratory centers in Tehran. From spring to winter of 1401 (2022-2023), 2166 blood samples were collected from laboratory centers in Tehran. Blood samples were evaluated for the presence of HCV by Electrochemiluminescence (ECL) and PCR techniques along with specific HCV primers. In general, 36 samples (1.6%) were tested positive by the mentioned techniques. The results indicated that the ECL technique is a sensitive and specific diagnostic method for detecting HCV in the early stages of the disease and can be very helpful and provide the possibility of starting the treatment steps to prevent the exacerbation of the disease earlier. Also, the results of PCR technique showed that PCR is an accurate, sensitive and fast method for definitive diagnosis of HCV. It seems that the incidence rate of this disease is increasing in Iran, and investigating the spread of the disease throughout Iran for a longer period of time in the continuation of our research can be helpful in the future to take the necessary measures to prevent the transmission of the disease to people and the rapid onset Treatment steps for patients with HCV should be carried out.Keywords: electrochemiluminescence, HCV, PCR, prevalence
Procedia PDF Downloads 69958 Seroprevalence of Herpes Simplex Virus and Rubella Confection in Tropical Regions in Bihar, India
Authors: Bhawana, Roshan Kamal Topno, Maneesh Kumar, Major Madhukar, Krishna Pandey, Ganesh Chandra Sahoo, Manas Ranjan Dikhit, Surya Suman, Devendra Prasad Yadav, Rishikesh Kumar, Pradeep Das
Abstract:
Viral co-infection is now very common across taxa and environments that are involved in congenital infections. Herpes simplex virus (HSV) and Rubella are the two serious viral infections, well categorized in TORCH Syndrome. Here we had endeavoured the seroprevalence of co-infection of HSV and Rubella. Systematic tests have been performed to check the virulence pattern of the co-infection. The study was conducted at Department of Virology, Rajendra Memorial Research Institute of Medical Sciences (ICMR), Patna, Bihar, India during January 2018-July 2018. 299 newly cases were attended with the sign and symptoms of HSV and Rubella. After taking written consent forms from all the subjects, blood samples were collected for serological detection. ELISA was performed to detect the presence of IgM antibody level. 12 patients were found to be IgM positive from each HSV and Rubella infection. The findings of our study showed that 6 patients were positive for both HSV and rubella and hence were co-infected. Such co-infection causes severe health problems as it leads to the mortality rate of the patients during viral infectivity. Epidemiologically, proper screening should be needed to check any chance of occurrence of such co-infection in the affected regions in large scale and take suitable preventive approach to decrease the case totality. Concern has to be given to aid proper diagnosis and treatment in order to decrease the spread of HSV and Rubella co-infection.Keywords: HSV, Rubella, seroprevalence, co-infection, ELISA, viral infectivity
Procedia PDF Downloads 215957 The Dangers of Attentional Inertia in the Driving Task
Authors: Catherine Thompson, Maryam Jalali, Peter Hills
Abstract:
The allocation of visual attention is critical when driving and anything that limits attention will have a detrimental impact on safety. Engaging in a secondary task reduces the amount of attention directed to the road because drivers allocate resources towards this task, leaving fewer resources to process driving-relevant information. Yet the dangers associated with a secondary task do not end when the driver returns their attention to the road. Instead, the attentional settings adopted to complete a secondary task may persist to the road, affecting attention, and therefore affecting driver performance. This 'attentional inertia' effect was investigated in the current work. Forty drivers searched for hazards in driving video clips while their eye-movements were recorded. At varying intervals they were instructed to attend to a secondary task displayed on a tablet situated to their left-hand side. The secondary task consisted of three separate computer games that induced horizontal, vertical, and random eye movements. Visual search and hazard detection in the driving clips were compared across the three conditions of the secondary task. Results showed that the layout of information in the secondary task, and therefore the allocation of attention in this task, had an impact on subsequent search in the driving clips. Vertically presented information reduced the wide horizontal spread of search usually associated with accurate driving and had a negative influence on the detection of hazards. The findings show the additional dangers of engaging in a secondary task while driving. The attentional inertia effect has significant implications for semi-autonomous and autonomous vehicles in which drivers have greater opportunity to direct their attention away from the driving task.Keywords: attention, eye-movements, hazard perception, visual search
Procedia PDF Downloads 165956 Coding and Decoding versus Space Diversity for Rayleigh Fading Radio Frequency Channels
Authors: Ahmed Mahmoud Ahmed Abouelmagd
Abstract:
The diversity is the usual remedy of the transmitted signal level variations (Fading phenomena) in radio frequency channels. Diversity techniques utilize two or more copies of a signal and combine those signals to combat fading. The basic concept of diversity is to transmit the signal via several independent diversity branches to get independent signal replicas via time – frequency - space - and polarization diversity domains. Coding and decoding processes can be an alternative remedy for fading phenomena, it cannot increase the channel capacity, but it can improve the error performance. In this paper we propose the use of replication decoding with BCH code class, and Viterbi decoding algorithm with convolution coding; as examples of coding and decoding processes. The results are compared to those obtained from two optimized selection space diversity techniques. The performance of Rayleigh fading channel, as the model considered for radio frequency channels, is evaluated for each case. The evaluation results show that the coding and decoding approaches, especially the BCH coding approach with replication decoding scheme, give better performance compared to that of selection space diversity optimization approaches. Also, an approach for combining the coding and decoding diversity as well as the space diversity is considered, the main disadvantage of this approach is its complexity but it yields good performance results.Keywords: Rayleigh fading, diversity, BCH codes, Replication decoding, convolution coding, viterbi decoding, space diversity
Procedia PDF Downloads 443955 An Efficient Machine Learning Model to Detect Metastatic Cancer in Pathology Scans Using Principal Component Analysis Algorithm, Genetic Algorithm, and Classification Algorithms
Authors: Bliss Singhal
Abstract:
Machine learning (ML) is a branch of Artificial Intelligence (AI) where computers analyze data and find patterns in the data. The study focuses on the detection of metastatic cancer using ML. Metastatic cancer is the stage where cancer has spread to other parts of the body and is the cause of approximately 90% of cancer-related deaths. Normally, pathologists spend hours each day to manually classifying whether tumors are benign or malignant. This tedious task contributes to mislabeling metastasis being over 60% of the time and emphasizes the importance of being aware of human error and other inefficiencies. ML is a good candidate to improve the correct identification of metastatic cancer, saving thousands of lives and can also improve the speed and efficiency of the process, thereby taking fewer resources and time. So far, the deep learning methodology of AI has been used in research to detect cancer. This study is a novel approach to determining the potential of using preprocessing algorithms combined with classification algorithms in detecting metastatic cancer. The study used two preprocessing algorithms: principal component analysis (PCA) and the genetic algorithm, to reduce the dimensionality of the dataset and then used three classification algorithms: logistic regression, decision tree classifier, and k-nearest neighbors to detect metastatic cancer in the pathology scans. The highest accuracy of 71.14% was produced by the ML pipeline comprising of PCA, the genetic algorithm, and the k-nearest neighbor algorithm, suggesting that preprocessing and classification algorithms have great potential for detecting metastatic cancer.Keywords: breast cancer, principal component analysis, genetic algorithm, k-nearest neighbors, decision tree classifier, logistic regression
Procedia PDF Downloads 83954 Elasticity Model for Easing Peak Hour Demand for Metrorail Transport System
Authors: P. K. Sarkar, Amit Kumar Jain
Abstract:
The demand for Urban transportation is characterised by a large scale temporal and spatial variations which causes heavy congestion inside metro trains in peak hours near Centre Business District (CBD) of the city. The conventional approach to address peak hour congestion, metro trains has been to increase the supply by way of introduction of more trains, increasing the length of the trains, optimising the time table to increase the capacity of the system. However, there is a limitation of supply side measures determined by the design capacity of the systems beyond which any addition in the capacity requires huge capital investments. The demand side interventions are essentially required to actually spread the demand across the time and space. In this study, an attempt has been made to identify the potential Transport Demand Management tools applicable to Urban Rail Transportation systems with a special focus on differential pricing. A conceptual price elasticity model has been developed to analyse the effect of various combinations of peak and nonpeak hoursfares on demands. The elasticity values for peak hour, nonpeak hour and cross elasticity have been assumed from the relevant literature available in the field. The conceptual price elasticity model so developed is based on assumptions which need to be validated with actual values of elasticities for different segments of passengers. Once validated, the model can be used to determine the peak and nonpeak hour fares with an objective to increase overall ridership, revenue, demand levelling and optimal utilisation of assets.Keywords: urban transport, differential fares, congestion, transport demand management, elasticity
Procedia PDF Downloads 310953 Farmers' Perspective on Soil Health in the Indian Punjab: A Quantitative Analysis of Major Soil Parameters
Authors: Sukhwinder Singh, Julian Park, Dinesh Kumar Benbi
Abstract:
Although soil health, which is recognized as one of the key determinants of sustainable agricultural development, can be measured by a range of physical, chemical and biological parameters, the widely used parameters include pH, electrical conductivity (EC), organic carbon (OC), plant available phosphorus (P) and potassium (K). Soil health is largely affected by the occurrence of natural events or human activities and can be improved by various land management practices. A database of 120 soil samples collected from farmers’ fields spread across three major agro-climatic zones of Punjab suggested that the average pH, EC, OC, P and K was 8.2 (SD = 0.75, Min = 5.5, Max = 9.1), 0.27 dS/m (SD = 0.17, Min = 0.072 dS/m, Max = 1.22 dS/m), 0.49% (SD = 0.20, Min = 0.06%, Max = 1.2%), 19 mg/kg soil (SD = 22.07, Min = 3 mg/kg soil, Max = 207 mg/kg soil) and 171 mg/kg soil (SD = 47.57, Min = 54 mg/kg soil, Max = 288 mg/kg soil), respectively. Region-wise, pH, EC and K were the highest in south-western district of Ferozpur whereas farmers in north-eastern district of Gurdaspur had the best soils in terms of OC and P. The soils in the central district of Barnala had lower OC, P and K than the respective overall averages while its soils were normal but skewed towards alkalinity. Besides agro-climatic conditions, the size of landholding and farmer education showed a significant association with Soil Fertility Index (SFI), a composite index calculated using the aforementioned parameters’ normalized weightage. All the four stakeholder groups cited the current cropping patterns, burning of rice crop residue, and imbalanced use of chemical fertilizers for change in soil health. However, the current state of soil health in Punjab is unclear, which needs further investigation based on temporal data collected from the same field to see the short and long-term impacts of various crop combinations and varied cropping intensity levels on soil health.Keywords: soil health, punjab agriculture, sustainability, soil fertility index
Procedia PDF Downloads 363952 Modeling and Behavior of Structural Walls
Authors: Salima Djehaichia, Rachid Lassoued
Abstract:
Reinforced concrete structural walls are very efficient elements for protecting buildings against excessive early damage and against collapse under earthquake actions. It is therefore of interest to develop a numerical model which simulates the typical behavior of these units, this paper presents and describes different modeling techniques that have been used by researchers and their advantages and limitations mentioned. The earthquake of Boumerdes in 2003 has demonstrated the fragility of structures and total neglect of sismique design rules in the realization of old buildings. Significant damage and destruction of buildings caused by this earthquake are not due to the choice of type of material, but the design and the study does not congruent with seismic code requirements and bad quality of materials. For idealizing the failure of rules, a parametric study focuses on: low rate of reinforcements, type of reinforcement, resistance moderate of concrete. As an application the modeling strategy based on finite elements combined with a discretization of wall more solicited by successive thin layers. The estimated performance level achieved during a seismic action is obtained from capacity curves under incrementally increasing loads. Using a pushover analysis, a characteristic non linear force-displacement relationship can be determined. The results of numeric model are confronted with those of Algerian Para seismic Rules (RPA) in force have allowed the determination of profits in terms of displacement, shearing action, ductility.Keywords: modeling, old building, pushover analysis, structural walls
Procedia PDF Downloads 247951 Review of Capitalization of Construction Industry on Sustainable Risk Management in Nigeria
Authors: Nnadi Ezekiel Ejiofor
Abstract:
The construction industry plays a decisive role in the healthy development of any nation. Not only large but even small construction projects contribute to a country’s economic growth. There is a need for good management to ensure successful delivery and sustainability because of the plethora of risks that have resulted in low-profit margins for contractors, cost and schedule overruns, poor quality delivery, and abandoned projects. This research reviewed Capitalization on Sustainable Risk Management. Questionnaires and oral interviews conducted were utilized as means of data collection. One hundred and ninety-eight (198) large construction firms in Nigeria form the population of this study. 15 (fifteen) companies that emanated from merger and acquisition were used for the study. The instruments used for data collection were a researcher-developed structured questionnaire based on a five-point rating scale, interviews, focus group discussion, and secondary sources (bill of quantities and stock and exchange commission). The instrument was validated by two experts in the field. The reliability of the instrument was established by applying the split-half method. Kendall’s coefficient of concordance was used to test the data, and a degree of agreement was obtained. Data were subjected to descriptive statistics and analyzed using analysis of variance, t-test, and SPSS. The identified impacts of capitalization were an increase in turnover (24.5%), improvement in the image (24.5%), risk reduction (20%), business expansion (17.3%), and geographical spread (13.6%). The study strongly advocates the inclusion of risk management evaluation as part of the construction procurement process.Keywords: capitalization, project delivery, risks, risk management, sustainability
Procedia PDF Downloads 61950 Molecular Diagnosis of Influenza Strains Was Carried Out on Patients of the Social Security Clinic in Karaj Using the RT-PCR Technique
Authors: A. Ferasat, S. Rostampour Yasouri
Abstract:
Seasonal flu is a highly contagious infection caused by influenza viruses. These viruses undergo genetic changes that result in new epidemics across the globe. Medical attention is crucial in severe cases, particularly for the elderly, frail, and those with chronic illnesses, as their immune systems are often weaker. The purpose of this study was to detect new subtypes of the influenza A virus rapidly using a specific RT-PCR method based on the HA gene (hemagglutinin). In the winter and spring of 2022_2023, 120 embryonated egg samples were cultured, suspected of seasonal influenza. RNA synthesis, followed by cDNA synthesis, was performed. Finally, the PCR technique was applied using a pair of specific primers designed based on the HA gene. The PCR product was identified after purification, and the nucleotide sequence of purified PCR products was compared with the sequences in the gene bank. The results showed a high similarity between the sequence of the positive samples isolated from the patients and the sequence of the new strains isolated in recent years. This RT-PCR technique is entirely specific in this study, enabling the detection and multiplication of influenza and its subspecies from clinical samples. The RT-PCR technique based on the HA gene, along with sequencing, is a fast, specific, and sensitive diagnostic method for those infected with influenza viruses and its new subtypes. Rapid molecular diagnosis of influenza is essential for suspected people to control and prevent the spread of the disease to others. It also prevents the occurrence of secondary (sometimes fatal) pneumonia that results from influenza and pathogenic bacteria. The critical role of rapid diagnosis of new strains of influenza is to prepare a drug vaccine against the latest viruses that did not exist in the community last year and are entirely new viruses.Keywords: influenza, molecular diagnosis, patients, RT-PCR technique
Procedia PDF Downloads 76949 The Non-Stationary BINARMA(1,1) Process with Poisson Innovations: An Application on Accident Data
Authors: Y. Sunecher, N. Mamode Khan, V. Jowaheer
Abstract:
This paper considers the modelling of a non-stationary bivariate integer-valued autoregressive moving average of order one (BINARMA(1,1)) with correlated Poisson innovations. The BINARMA(1,1) model is specified using the binomial thinning operator and by assuming that the cross-correlation between the two series is induced by the innovation terms only. Based on these assumptions, the non-stationary marginal and joint moments of the BINARMA(1,1) are derived iteratively by using some initial stationary moments. As regards to the estimation of parameters of the proposed model, the conditional maximum likelihood (CML) estimation method is derived based on thinning and convolution properties. The forecasting equations of the BINARMA(1,1) model are also derived. A simulation study is also proposed where BINARMA(1,1) count data are generated using a multivariate Poisson R code for the innovation terms. The performance of the BINARMA(1,1) model is then assessed through a simulation experiment and the mean estimates of the model parameters obtained are all efficient, based on their standard errors. The proposed model is then used to analyse a real-life accident data on the motorway in Mauritius, based on some covariates: policemen, daily patrol, speed cameras, traffic lights and roundabouts. The BINARMA(1,1) model is applied on the accident data and the CML estimates clearly indicate a significant impact of the covariates on the number of accidents on the motorway in Mauritius. The forecasting equations also provide reliable one-step ahead forecasts.Keywords: non-stationary, BINARMA(1, 1) model, Poisson innovations, conditional maximum likelihood, CML
Procedia PDF Downloads 129948 Test Suite Optimization Using an Effective Meta-Heuristic BAT Algorithm
Authors: Anuradha Chug, Sunali Gandhi
Abstract:
Regression Testing is a very expensive and time-consuming process carried out to ensure the validity of modified software. Due to the availability of insufficient resources to re-execute all the test cases in time constrained environment, efforts are going on to generate test data automatically without human efforts. Many search based techniques have been proposed to generate efficient, effective as well as optimized test data, so that the overall cost of the software testing can be minimized. The generated test data should be able to uncover all potential lapses that exist in the software or product. Inspired from the natural behavior of bat for searching her food sources, current study employed a meta-heuristic, search-based bat algorithm for optimizing the test data on the basis certain parameters without compromising their effectiveness. Mathematical functions are also applied that can effectively filter out the redundant test data. As many as 50 Java programs are used to check the effectiveness of proposed test data generation and it has been found that 86% saving in testing efforts can be achieved using bat algorithm while covering 100% of the software code for testing. Bat algorithm was found to be more efficient in terms of simplicity and flexibility when the results were compared with another nature inspired algorithms such as Firefly Algorithm (FA), Hill Climbing Algorithm (HC) and Ant Colony Optimization (ACO). The output of this study would be useful to testers as they can achieve 100% path coverage for testing with minimum number of test cases.Keywords: regression testing, test case selection, test case prioritization, genetic algorithm, bat algorithm
Procedia PDF Downloads 382947 Text as Reader Device Improving Subjectivity on the Role of Attestation between Interpretative Semiotics and Discursive Linguistics
Authors: Marco Castagna
Abstract:
Proposed paper is aimed to inquire about the relation between text and reader, focusing on the concept of ‘attestation’. Indeed, despite being widely accepted in semiotic research, even today the concept of text remains uncertainly defined. So, it seems to be undeniable that what is called ‘text’ offers an image of internal cohesion and coherence, that makes it possible to analyze it as an object. Nevertheless, this same object remains problematic when it is pragmatically activated by the act of reading. In fact, as for the T.A.R:D.I.S., that is the unique space-temporal vehicle used by the well-known BBC character Doctor Who in his adventures, every text appears to its own readers not only “bigger inside than outside”, but also offering spaces that change according to the different traveller standing in it. In a few words, as everyone knows, this singular condition raises the questions about the gnosiological relation between text and reader. How can a text be considered the ‘same’, even if it can be read in different ways by different subjects? How can readers can be previously provided with knowledge required for ‘understanding’ a text, but at the same time learning something more from it? In order to explain this singular condition it seems useful to start thinking about text as a device more than an object. In other words, this unique status is more clearly understandable when ‘text’ ceases to be considered as a box designed to move meaning from a sender to a recipient (marking the semiotic priority of the “code”) and it starts to be recognized as performative meaning hypothesis, that is discursively configured by one or more forms and empirically perceivable by means of one or more substances. Thus, a text appears as a “semantic hanger”, potentially offered to the “unending deferral of interpretant", and from time to time fixed as “instance of Discourse”. In this perspective, every reading can be considered as an answer to the continuous request for confirming or denying the meaning configuration (the meaning hypothesis) expressed by text. Finally, ‘attestation’ is exactly what regulates this dynamic of request and answer, through which the reader is able to confirm his previous hypothesis on reality or maybe acquire some new ones.Proposed paper is aimed to inquire about the relation between text and reader, focusing on the concept of ‘attestation’. Indeed, despite being widely accepted in semiotic research, even today the concept of text remains uncertainly defined. So, it seems to be undeniable that what is called ‘text’ offers an image of internal cohesion and coherence, that makes it possible to analyze it as an object. Nevertheless, this same object remains problematic when it is pragmatically activated by the act of reading. In fact, as for the T.A.R:D.I.S., that is the unique space-temporal vehicle used by the well-known BBC character Doctor Who in his adventures, every text appears to its own readers not only “bigger inside than outside”, but also offering spaces that change according to the different traveller standing in it. In a few words, as everyone knows, this singular condition raises the questions about the gnosiological relation between text and reader. How can a text be considered the ‘same’, even if it can be read in different ways by different subjects? How can readers can be previously provided with knowledge required for ‘understanding’ a text, but at the same time learning something more from it? In order to explain this singular condition it seems useful to start thinking about text as a device more than an object. In other words, this unique status is more clearly understandable when ‘text’ ceases to be considered as a box designed to move meaning from a sender to a recipient (marking the semiotic priority of the “code”) and it starts to be recognized as performative meaning hypothesis, that is discursively configured by one or more forms and empirically perceivable by means of one or more substances. Thus, a text appears as a “semantic hanger”, potentially offered to the “unending deferral of interpretant", and from time to time fixed as “instance of Discourse”. In this perspective, every reading can be considered as an answer to the continuous request for confirming or denying the meaning configuration (the meaning hypothesis) expressed by text. Finally, ‘attestation’ is exactly what regulates this dynamic of request and answer, through which the reader is able to confirm his previous hypothesis on reality or maybe acquire some new ones.Keywords: attestation, meaning, reader, text
Procedia PDF Downloads 237946 Indian Christian View of God: Exploring Its Trajectory in 20th Century
Authors: James Ponniah
Abstract:
Christianity is the largest religious tradition of the world. What makes Christianity a world religion is its characteristics of universality and particularity. Its universality and particularity are closely interrelated. Its university is realized and embodied in its particularities and its particularity is recognized and legitimized through its universality. This paper focuses on the dimension of the particularity of Christianity in that it looks at the particularized ideas and discourses of Christian thinking in India in the 20th century and pays attention to the differing shifts and new shades of meaning in Indian Christian notion of God. Drawing upon the writings of select Indian theologians such as Brahmabandhab Upadhyaya, Sundar Sing, A.J Appasamy, Raymond Panikkar, Amalorpavadass and George Soares Prabhhu, this paper delves into how the contexts—be it personal, political, historical or ecclesial—bear upon the way Indian theologians have conceived and constructed the notion of God in their work. Focusing upon how they responded to the signs of their time through their theological narratives, the paper argues that the religion of Christianity can sustain its universality only when it translates its key notions such as God into indigenous categories and local idioms and thus makes itself relevant to the people among whom it is spread. Monotheistic God of Christianity has to accommodate plurality of expressions if Christian idea God has to capture and convey everyone’s experience of God. The case of Indian Christianity then reveals that a monolithic world religion will be experienced and recognised as truly universal only when it sheds its homogeneity and assumes a heterogeneous portrait through the acquisition of local idioms. Allowing culturally diverse idioms to influence theological categories is not inconsequential to—‘accommodating differences and accepting diversities,’ an issue we encounter within and beyond religious domains in our contemporary times.Keywords: concept of God, heterogeneity, Indian Christianity, indigenous categories
Procedia PDF Downloads 251945 Performance Comparison of Resource Allocation without Feedback in Wireless Body Area Networks by Various Pseudo Orthogonal Sequences
Authors: Ojin Kwon, Yong-Jin Yoon, Liu Xin, Zhang Hongbao
Abstract:
Wireless Body Area Network (WBAN) is a short-range wireless communication around human body for various applications such as wearable devices, entertainment, military, and especially medical devices. WBAN attracts the attention of continuous health monitoring system including diagnostic procedure, early detection of abnormal conditions, and prevention of emergency situations. Compared to cellular network, WBAN system is more difficult to control inter- and inner-cell interference due to the limited power, limited calculation capability, mobility of patient, and non-cooperation among WBANs. In this paper, we compare the performance of resource allocation scheme based on several Pseudo Orthogonal Codewords (POCs) to mitigate inter-WBAN interference. Previously, the POCs are widely exploited for a protocol sequence and optical orthogonal code. Each POCs have different properties of auto- and cross-correlation and spectral efficiency according to its construction of POCs. To identify different WBANs, several different pseudo orthogonal patterns based on POCs exploits for resource allocation of WBANs. By simulating these pseudo orthogonal resource allocations of WBANs on MATLAB, we obtain the performance of WBANs according to different POCs and can analyze and evaluate the suitability of POCs for the resource allocation in the WBANs system.Keywords: wireless body area network, body sensor network, resource allocation without feedback, interference mitigation, pseudo orthogonal pattern
Procedia PDF Downloads 354944 A Location-based Authentication and Key Management Scheme for Border Surveillance Wireless Sensor Networks
Authors: Walid Abdallah, Noureddine Boudriga
Abstract:
Wireless sensor networks have shown their effectiveness in the deployment of many critical applications especially in the military domain. Border surveillance is one of these applications where a set of wireless sensors are deployed along a country border line to detect illegal intrusion attempts to the national territory and report this to a control center to undergo the necessary measures. Regarding its nature, this wireless sensor network can be the target of many security attacks trying to compromise its normal operation. Particularly, in this application the deployment and location of sensor nodes are of great importance for detecting and tracking intruders. This paper proposes a location-based authentication and key distribution mechanism to secure wireless sensor networks intended for border surveillance where the key establishment is performed using elliptic curve cryptography and identity-based public key scheme. In this scheme, the public key of each sensor node will be authenticated by keys that depend on its position in the monitored area. Before establishing a pairwise key between two nodes, each one of them must verify the neighborhood location of the other node using a message authentication code (MAC) calculated on the corresponding public key and keys derived from encrypted beacon messages broadcast by anchor nodes. We show that our proposed public key authentication and key distribution scheme is more resilient to node capture and node replication attacks than currently available schemes. Also, the achievement of the key distribution between nodes in our scheme generates less communication overhead and hence increases network performances.Keywords: wireless sensor networks, border surveillance, security, key distribution, location-based
Procedia PDF Downloads 661943 Polarization of Lithuanian Society on Issues Related to Language Politics
Authors: Eglė Žurauskaitė, Eglė Gudavičienė
Abstract:
The goal of this paper is to reveal how polarization is constructed through the use of impoliteness strategies. In general, media helps to spread various ideas very fast, and it means that processes of polarization are best revealed in computer-mediated communication (CMC) contexts. For this reason, data for the research was collected from online texts about a current, very diverse topic in Lithuania - Lithuanian language policy and regulations, because this topic is causing a lot of tension in Lithuanian society. Computer-mediated communication allows users to edit their message before they send it. It means that addressees carefully select verbal expressions to convey their message. In other words, each impoliteness strategy and its verbal expression were created intentionally. Impoliteness strategies in this research are understood as various ways to reach a communicative goal: belittle the other. To reach the goal, the public opinions of various Lithuanian public figures (e. g., cultural people, politicians, officials) were collected from new portals in 2019–2023 and analyzed using both quantitative and qualitative approaches. First, problematic aspects of the language policy, for which public figures complain, were identified. Then instances when public figures take a defensive position were analyzed: how they express this position and what it reveals about Lithuanian culture. Findings of this research demonstrate how concepts of impoliteness theory can be applied in analyzing the process of polarization in Lithuanian society on issues related to the State language policy. Also, to reveal how polarization is constructed, these tasks were set: a) determine which impoliteness strategies are used throughout the process of creating polarization, b) analyze how they were expressed verbally (e. g., as an advice, offer, etc.).Keywords: impoliteness, Lithuanian language policy, polarization, impoliteness strategies
Procedia PDF Downloads 60942 Green Design Study of Prefabricated Community Control Measures in Response to Public Health Emergencies
Authors: Enjia Zhang
Abstract:
During the prevention and control of the COVID-19 pandemic, all communities in China were gated and under strict management, which was highly effective in preventing the spread of the epidemic from spreading. Based on the TRIZ theory, this paper intends to propose green design strategies of community control in response to public health emergencies and to optimize community control facilities according to the principle of minimum transformation. Through the questionnaire method, this paper investigates and summarizes the situation and problems of community control during the COVID-19 pandemic. Based on these problems, the TRIZ theory is introduced to figure out the problems and associates them with prefabricated facilities. Afterward, the innovation points and solutions of prefabricated community control measures are proposed by using the contradiction matrix. This paper summarizes the current situation of community control under public health emergencies and concludes the problems such as simple forms of temporary roadblocks, sudden increase of community traffic pressure, and difficulties to access public spaces. The importance of entrance and exit control in community control is emphasized. Therefore, the community control measures are supposed to focus on traffic control, and the external access control measures, including motor vehicles, non-motor vehicles, residents and non-residents access control, and internal public space access control measures, including public space control shared with the society or adjacent communities, are proposed in order to make the community keep the open characteristics and have the flexibility to deal with sudden public health emergencies in the future.Keywords: green design, community control, prefabricated structure, public health emergency
Procedia PDF Downloads 130941 Numerical Analysis of the Aging Effects of RC Shear Walls Repaired by CFRP Sheets: Application of CEB-FIP MC 90 Model
Authors: Yeghnem Redha, Guerroudj Hicham Zakaria, Hanifi Hachemi Amar Lemiya, Meftah Sid Ahmed, Tounsi Abdelouahed, Adda Bedia El Abbas
Abstract:
Creep deformation of concrete is often responsible for excessive deflection at service loads which can compromise the performance of elements within a structure. Although laboratory test may be undertaken to determine the deformation properties of concrete, these are time-consuming, often expensive and generally not a practical option. Therefore, relatively simple empirically design code models are relied to predict the creep strain. This paper reviews the accuracy of creep and shrinkage predictions of reinforced concrete (RC) shear walls structures strengthened with carbon fibre reinforced polymer (CFRP) sheets, which is characterized by a widthwise varying fibre volume fraction. This review is yielded by CEB-FIB MC90 model. The time-dependent behavior was investigated to analyze their static behavior. In the numerical formulation, the adherents and the adhesives are all modelled as shear wall elements, using the mixed finite element method. Several tests were used to dem¬onstrate the accuracy and effectiveness of the proposed method. Numerical results from the present analysis are presented to illustrate the significance of the time-dependency of the lateral displacements.Keywords: RC shear walls strengthened, CFRP sheets, creep and shrinkage, CEB-FIP MC90 model, finite element method, static behavior
Procedia PDF Downloads 310940 Preliminary Study on the Factors Affecting Safety Parameters of (Th, U)O₂ Fuel Cycle: The Basis for Choosing Three Fissile Enrichment Zones
Authors: E. H. Uguru, S. F. A. Sani, M. U. Khandaker, M. H. Rabir
Abstract:
The beginning of cycle transient safety parameters is paramount for smooth reactor operation. The enhanced operational safety of UO₂ fuelled AP1000 reactor being the first using three fissile enrichment zones motivated this research for (Th, U)O₂ fuel. This study evaluated the impact of fissile enrichment, soluble boron, and gadolinia on the transient safety parameters to determine the basis for choosing the three fissile enrichment zones. Fuel assembly and core model of Westinghouse small modular reactor were investigated using different fuel and reactivity control arrangements. The Monte Carlo N-Particle eXtended (MCNPX) integrated with CINDER90 burn-up code was used for the calculations. The results show that the moderator temperature coefficient of reactivity (MTC) and the fuel temperature coefficient of reactivity (FTC) were respectively negative and decreased with increasing fissile enrichment. Soluble boron significantly decreased the MTC but slightly increased FTC while gadolinia followed the same trend with a minor impact. However, the MTC and FTC respectively decreased significantly with increasing change in temperature. These results provide a guide on the considerable factors in choosing the three fissile enrichment zones for (Th, U)O₂ fuel in anticipation of their impact on safety parameters. Therefore, this study provides foundational results on the factors that must be considered in choosing three fissile arrangement zones for (Th, U)O₂ fuel.Keywords: reactivity, safety parameters, small modular reactor, soluble boron, thorium fuel cycle
Procedia PDF Downloads 132939 Culture as a Barrier: Political Rights of Women in Pakhtun Society
Authors: Muhammad Adil
Abstract:
Women in different parts of the world confront several barriers to accomplishing their legal rights, particularly political rights. One of the common barriers in this respect is the indigenous culture of the locality. In the same way, women in Khyber Pakhtunkhwa are facing difficulties in accomplishing their political rights. The most significant obstacle in this context is Pakhtunwali, the traditional code of conduct in Pakhtun society, which is perceived as a substantial impediment for Pakhtun women in practicing their political rights as guaranteed by the Constitution of Pakistan and international legal instruments. Several codes of Pakhtunwali, like peghor (slander or abuse), tor (blame or disgraced), sharam (shame and dishonor), purdah (gender segregation), and ghayrat (honor) have a prominent role in this regard. The research approach employed a combination of both qualitative and quantitative methods to ensure a thorough exploration of the subject. Not only different documents have been analyzed but also a questionnaire has been developed to get accurate findings. Simultaneously, both primary and secondary data have been utilized. The finding shows that the Pakhtun culture is a formidable hurdle in accomplishing women’s political rights in Pakhtun society, particularly in rural areas. Observation reveals that a prevailing societal perception is that having women as their representatives would be viewed as a challenge to the honor of Pakhtun men. Consequently, women candidates who participated in the general elections in Khyber Pakhtunkhwa received only 1 percent or less than 1 percent of the votes compared to their male counterparts. It is recommended that certain codes of Pakhtunwali should be redefined and made compatible with international legal instruments.Keywords: constitution, fundamental rights, honor, pakhtunwali.
Procedia PDF Downloads 50938 Overview of the 2017 Fire Season in Amazon
Authors: Ana C. V. Freitas, Luciana B. M. Pires, Joao P. Martins
Abstract:
In recent years, fire dynamics in deforestation areas of tropical forests have received considerable attention because of their relationship to climate change. Climate models project great increases in the frequency and area of drought in the Amazon region, which may increase the occurrence of fires. This study analyzes the historical record number of fire outbreaks in 2017 using satellite-derived data sets of active fire detections, burned area, precipitation, and data of the Fire Program from the Center for Weather Forecasting and Climate Studies (CPTEC/INPE). A downward trend in the number of fire outbreaks occurred in the first half of 2017, in relation to the previous year. This decrease can be related to the fact that 2017 was not an El Niño year and, therefore, the observed rainfall and temperature in the Amazon region was close to normal conditions. Meanwhile, the worst period in history for fire outbreaks began with the subsequent arrival of the dry season. September of 2017 exceeded all monthly records for number of fire outbreaks per month in the entire series. This increase was mainly concentrated in Bolivia and in the states of Amazonas, northeastern Pará, northern Rondônia and Acre, regions with high densities of rural settlements, which strongly suggests that human action is the predominant factor, aggravated by the lack of precipitation during the dry season allowing the fires to spread and reach larger areas. Thus, deforestation in the Amazon is primarily a human-driven process: climate trends may be providing additional influences.Keywords: Amazon forest, climate change, deforestation, human-driven process, fire outbreaks
Procedia PDF Downloads 129937 Digitizing Masterpieces in Italian Museums: Techniques, Challenges and Consequences from Giotto to Caravaggio
Authors: Ginevra Addis
Abstract:
The possibility of reproducing physical artifacts in a digital format is one of the opportunities offered by the technological advancements in information and communication most frequently promoted by museums. Indeed, the study and conservation of our cultural heritage have seen significant advancement due to the three-dimensional acquisition and modeling technology. A variety of laser scanning systems has been developed, based either on optical triangulation or on time-of-flight measurement, capable of producing digital 3D images of complex structures with high resolution and accuracy. It is necessary, however, to explore the challenges and opportunities that this practice brings within museums. The purpose of this paper is to understand what change is introduced by digital techniques in those museums that are hosting digital masterpieces. The methodology used will investigate three distinguished Italian exhibitions, related to the territory of Milan, trying to analyze the following issues about museum practices: 1) how digitizing art masterpieces increases the number of visitors; 2) what the need that calls for the digitization of artworks; 3) which techniques are most used; 4) what the setting is; 5) the consequences of a non-publication of hard copies of catalogues; 6) envision of these practices in the future. Findings will show how interconnection plays an important role in rebuilding a collection spread all over the world. Secondly how digital artwork duplication and extension of reality entail new forms of accessibility. Thirdly, that collection and preservation through digitization of images have both a social and educational mission. Fourthly, that convergence of the properties of different media (such as web, radio) is key to encourage people to get actively involved in digital exhibitions. The present analysis will suggest further research that should create museum models and interaction spaces that act as catalysts for innovation.Keywords: digital masterpieces, education, interconnection, Italian museums, preservation
Procedia PDF Downloads 175936 Comparing Business Excellence Models Using Quantitative Methods: A First Step
Authors: Mohammed Alanazi, Dimitrios Tsagdis
Abstract:
Established Business Excellence Models (BEMs), like the Malcolm Baldrige National Quality Award (MBNQA) model and the European Foundation for Quality Management (EFQM) model, have been adopted by firms all over the world. They exist alongside more recent country-specific BEMs; e.g. the Australian, Canadian, China, New Zealand, Singapore, and Taiwan quality awards that although not as widespread as MBNQA and EFQM have nonetheless strong national followings. Regardless of any differences in their following or prestige, the emergence and development of all BEMs have been shaped both by their local context (e.g. underlying socio-economic dynamics) as well as by global best practices. Besides such similarities, that render them into objects (i.e. models) of the same class (i.e. BEMs), BEMs exhibit non-trivial differences in their criteria, relations, and emphasis. Given the evolution of BEMs (e.g. the MBNQA underwent seven evolutions since its inception in 1987 while the EFQM five since 1993), it is unsurprising that comparative studies of their validity are few and far in between. This poses challenges for practitioners and policy makers alike; as it is not always clear which BEM is to be preferred or better fitting to a particular context. Especially, in contexts that differ substantially from the original context of BEM development. This paper aims to fill this gap by presenting a research design and measurement model for comparing BEMs using quantitative methods (e.g. structural equations). Three BEMs will be focused upon in particular for illustration purposes; the MBNQA, the EFQM, and the King Abdul Aziz Quality Award (KAQA) model. They have been selected so to reflect the two established and widely spread traditions as well as a more recent context-specific arrival promising a better fit.Keywords: Baldrige, business excellence, European Foundation for Quality Management, Structural Equation Model, total quality management
Procedia PDF Downloads 238935 Power System Cyber Security Risk in the Era of Digital Transformation
Authors: Rafat Rob, Khaled Alotaibi, Dana Nour, Abdullah Albadrani, Abdulmohsen Mulhim
Abstract:
Power systems digitization solutions provides a comprehensive smart, cohesive, interconnected network, extensive connectivity between digital assets, physical power plants, and resources to form digital economies. However, digitization has exposed the classical air gapped power plants to the rapid spread of cyber threats and attacks in the process delaying and forcing many organizations to rethink their cyber security policies and standards before they can augment their operation the new advanced digital devices. Cyber Security requirements for power systems (and industry control systems therein) demand a new approach, unique methodology, and design process that is completely different to Cyber Security measures designed for the IT systems. In practice, Cyber Security strategy, as applied to power systems, tends to be closely aligned to those measures applied for IT system purposes. The differentiator for Cyber Security in terms of power systems are the physical assets and applications used, alongside the ever-growing rate of expansion within the industry controls sector (in comparison to the relatively saturated growth observed for corporate IT systems). These factors increase the magnitude of the cyber security risk within such systems. The introduction of smart devices and sensors along the grid initiate vulnerable entry points to the systems. Every installed Smart Meter is a target; the way these devices communicate with each other may instigate a Denial of Service (DoS) and Distributed Denial of Service (DDoS) attack. Attacking one sensor or meter has the potential to propagate itself throughout the power grid reaching the IT network, where it may manifest itself as a malware infiltration.Keywords: supply chain, cybersecurity, maturity model, risk, smart grid
Procedia PDF Downloads 116934 Study and Acquisition of the Duality of the Arabic Language
Authors: Oleg Redkin, Olga Bernikova
Abstract:
It is commonly accepted that every language is both pure linguistic phenomenon as well as socially significant communicative system, which exists on the basis of certain society - its collective 'native speaker'. Therefore the language evolution and features besides its own linguistic rules and regulations are also defined by the influence of a number of extra-linguistic factors. The above mentioned statement may be illustrated by the example of the Arabic language which may be characterized by the following peculiarities: - the inner logic of the Arabic language - the 'algebraicity' of its morphological paradigms and grammar rules; - association of the Arabic language with the sacred texts of Islam, its close ties with the pre-Islamic and Islamic cultural heritage - the pre-Islamic poetry and Islamic literature and science; - territorial distribution, which in recent years went far beyond the boundaries of its traditional realm due to the development of new technologies and the spread of mass media, and what is more important, migration processes; - association of the Arabic language with the so called 'Renaissance of Islam'. These peculiarities should be remembered while considering the status of the Modern Standard Arabic (MSA) language or the Classical Arabic (CA) language as well as the Modern Arabic (MA) dialects in synchrony or from the diachronic point of view. Continuity of any system in diachrony on the one hand depends on the level of its ability to adapt itself to changing environment and by its internal ties on the other. Structural durability of language is characterized by its inner logic, hierarchy of paradigms and its grammar rules, as well as continuity of their implementation in acts of everyday communication. Since the Arabic language is both linguistic and social phenomenon the process of the Arabic language acquisition and study should not be focused only on the knowledge about linguistic features or development of communicative skills alone, but must be supplied with the information related to culture, history and religion of peoples of certain region that will expand and enrich competences of the target audience.Keywords: Arabic, culture, Islam, language
Procedia PDF Downloads 277