Search results for: vernacular and traditional architecture
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 6232

Search results for: vernacular and traditional architecture

4432 A Three Tier Secure KQML Interface with Novel Performatives

Authors: Dimple Juneja, Aarti Singh, Renu Hooda

Abstract:

Knowledge Query Manipulation Language (KQML) and FIPA ACL are two prime communication languages existing in multi agent systems (MAS). Both languages are more or less similar in terms of semantics (based on speech act theory) and offer cutting edge competition while establishing agent communication across Internet. In contrast to the fact that software agents operating on the internet are required to be more safeguarded from their counter-peer, both protocols lack security performatives. The paper proposes a three tier security interface with few novel security related performatives enhancing the basic architecture of KQML. The three levels are attestation, certification and trust establishment which enforces a tight security and hence reduces the security breeches.

Keywords: multiagent systems, KQML, FIPA ACL, performatives

Procedia PDF Downloads 397
4431 Wasting Human and Computer Resources

Authors: Mária Csernoch, Piroska Biró

Abstract:

The legends about “user-friendly” and “easy-to-use” birotical tools (computer-related office tools) have been spreading and misleading end-users. This approach has led us to the extremely high number of incorrect documents, causing serious financial losses in the creating, modifying, and retrieving processes. Our research proved that there are at least two sources of this underachievement: (1) The lack of the definition of the correctly edited, formatted documents. Consequently, end-users do not know whether their methods and results are correct or not. They are not aware of their ignorance. They are so ignorant that their ignorance does not allow them to realize their lack of knowledge. (2) The end-users’ problem-solving methods. We have found that in non-traditional programming environments end-users apply, almost exclusively, surface approach metacognitive methods to carry out their computer related activities, which are proved less effective than deep approach methods. Based on these findings we have developed deep approach methods which are based on and adapted from traditional programming languages. In this study, we focus on the most popular type of birotical documents, the text-based documents. We have provided the definition of the correctly edited text, and based on this definition, adapted the debugging method known in programming. According to the method, before the realization of text editing, a thorough debugging of already existing texts and the categorization of errors are carried out. With this method in advance to real text editing users learn the requirements of text-based documents and also of the correctly formatted text. The method has been proved much more effective than the previously applied surface approach methods. The advantages of the method are that the real text handling requires much less human and computer sources than clicking aimlessly in the GUI (Graphical User Interface), and the data retrieval is much more effective than from error-prone documents.

Keywords: deep approach metacognitive methods, error-prone birotical documents, financial losses, human and computer resources

Procedia PDF Downloads 371
4430 The Effect of Excel on Undergraduate Students’ Understanding of Statistics and the Normal Distribution

Authors: Masomeh Jamshid Nejad

Abstract:

Nowadays, statistical literacy is no longer a necessary skill but an essential skill with broad applications across diverse fields, especially in operational decision areas such as business management, finance, and economics. As such, learning and deep understanding of statistical concepts are essential in the context of business studies. One of the crucial topics in statistical theory and its application is the normal distribution, often called a bell-shaped curve. To interpret data and conduct hypothesis tests, comprehending the properties of normal distribution (the mean and standard deviation) is essential for business students. This requires undergraduate students in the field of economics and business management to visualize and work with data following a normal distribution. Since technology is interconnected with education these days, it is important to teach statistics topics in the context of Python, R-studio, and Microsoft Excel to undergraduate students. This research endeavours to shed light on the effect of Excel-based instruction on learners’ knowledge of statistics, specifically the central concept of normal distribution. As such, two groups of undergraduate students (from the Business Management program) were compared in this research study. One group underwent Excel-based instruction and another group relied only on traditional teaching methods. We analyzed experiential data and BBA participants’ responses to statistic-related questions focusing on the normal distribution, including its key attributes, such as the mean and standard deviation. The results of our study indicate that exposing students to Excel-based learning supports learners in comprehending statistical concepts more effectively compared with the other group of learners (teaching with the traditional method). In addition, students in the context of Excel-based instruction showed ability in picturing and interpreting data concentrated on normal distribution.

Keywords: statistics, excel-based instruction, data visualization, pedagogy

Procedia PDF Downloads 39
4429 The Influence of Travel Experience within Perceived Public Transport Quality

Authors: Armando Cartenì, Ilaria Henke

Abstract:

The perceived public transport quality is an important driver that influences both customer satisfaction and mobility choices. The competition among transport operators needs to improve the quality of the services and identify which attributes are perceived as relevant by passengers. Among the “traditional” public transport quality attributes there are, for example: travel and waiting time, regularity of the services, and ticket price. By contrast, there are some “non-conventional” attributes that could significantly influence customer satisfaction jointly with the “traditional” ones. Among these, the beauty/aesthetics of the transport terminals (e.g. rail station and bus terminal) is probably one of the most impacting on user perception. Starting from these considerations, the point stressed in this paper was if (and how munch) the travel experience of the overall travel (e.g. how long is the travel, how many transport modes must be used) influences the perception of the public transport quality. The aim of this paper was to investigate the weight of the terminal quality (e.g. aesthetic, comfort and service offered) within the overall travel experience. The case study was the extra-urban Italian bus network. The passengers of the major Italian terminal bus were interviewed and the analysis of the results shows that about the 75% of the travelers, are available to pay up to 30% more for the ticket price for having a high quality terminal. A travel experience effect was observed: the average perceived transport quality varies with the characteristic of the overall trip. The passengers that have a “long trip” (travel time greater than 2 hours) perceived as “low” the overall quality of the trip even if they pass through a high quality terminal. The opposite occurs for the “short trip” passengers. This means that if a traveler passes through a high quality station, the overall perception of that terminal could be significantly reduced if he is tired from a long trip. This result is important and if confirmed through other case studies, will allow to conclude that the “travel experience impact" must be considered as an explicit design variable for public transport services and planning.

Keywords: transportation planning, sustainable mobility, decision support system, discrete choice model, design problem

Procedia PDF Downloads 281
4428 Facial Emotion Recognition Using Deep Learning

Authors: Ashutosh Mishra, Nikhil Goyal

Abstract:

A 3D facial emotion recognition model based on deep learning is proposed in this paper. Two convolution layers and a pooling layer are employed in the deep learning architecture. After the convolution process, the pooling is finished. The probabilities for various classes of human faces are calculated using the sigmoid activation function. To verify the efficiency of deep learning-based systems, a set of faces. The Kaggle dataset is used to verify the accuracy of a deep learning-based face recognition model. The model's accuracy is about 65 percent, which is lower than that of other facial expression recognition techniques. Despite significant gains in representation precision due to the nonlinearity of profound image representations.

Keywords: facial recognition, computational intelligence, convolutional neural network, depth map

Procedia PDF Downloads 206
4427 Challenges of Implementing Zero Trust Security Based on NIST SP 800-207

Authors: Mazhar Hamayun

Abstract:

Organizations need to take a holistic approach to their Zero Trust strategic and tactical security needs. This includes using a framework-agnostic model that will ensure all enterprise resources are being accessed securely, regardless of their location. Such can be achieved through the implementation of a security posture, monitoring the posture, and adjusting the posture through the Identify, Detect, Protect, Respond, and Recover Methods, The target audience of this document includes those involved in the management and operational functions of risk, information security, and information technology. This audience consists of the chief information security officer, chief information officer, chief technology officer, and those leading digital transformation initiatives where Zero Trust methods can help protect an organization’s data assets.

Keywords: ZTNA, zerotrust architecture, microsegmentation, NIST SP 800-207

Procedia PDF Downloads 66
4426 Queer Social Realism and Architecture in British Cinema: Tenement Housing, Unions and the Affective Body

Authors: Christopher Pullen

Abstract:

This paper explores the significance of British cinema in the late 1950s and early 1960s as offering a renaissance of realist discourse, in the representation of everyday social issues. Offering a rejection of Hollywood cinema and the superficially of the middle classes, these ‘kitchen sink dramas’ often set within modest and sometimes squalid domestic and social environments, focused on the political struggle of the disenfranchised examining poverty, the oppressed and the outsider. While films like Look Back in Anger and Room at the Top looked primarily at male heterosexual subjectivity, films like A Taste of Honey and Victim focused on female and queer male narratives. Framing the urban landscape as a discursive architectural arena, representing basic living conditions and threatening social worlds, these iconic films established new storytelling processes for the outsider. This paper examines this historical context foregrounding the contemporary films Beautiful Thing (Hettie Macdonald, 1996), Weekend (Andrew Haigh, 2011) and Pride (Marcus Warchus, 2014), while employing the process of textual analysis in relation to theories of affect, defined by writers such as Lisa U. Marks and Sara Ahmed. Considering both romance narratives and public demonstrations of unity, where the queer ‘affective’ body is placed within architectural and social space, Beautiful Thing tells the story of gay male teenagers falling in love despite oppression from family and school, Weekend examines a one-night stand between young gay men and the unlikeliness of commitment, but the drive for sensitivity, and Pride foregrounds an historical relationship between queer youth activists and the miner’s union, who were on strike between 1984-5. These films frame the queer ‘affective’ body within politicized public space, evident in lower class men’s working clubs, tenement housing and brutal modernist tower blocks, focusing on architectural features such as windows, doorways and staircases, relating temporality, desire and change. Through such an examination a hidden history of gay male performativity is revealed, framing the potential of contemporary cinema to focus on the context of the outsider in encouraging social change.

Keywords: queer, affect, cinema, architecture, life chances

Procedia PDF Downloads 344
4425 E-Service and the Nigerian Banking Sector: A Review of ATM Architecture and Operations

Authors: Bashir Aliyu Yauri, Rufai Aliyu Yauri

Abstract:

With the introduction of cash-less society policy by the Central Bank of Nigeria, the concept of e-banking services has experienced a significant improvement over the years. Today quite a number of people are embracing e-banking activities especially ATM, thereby moving away from the conventional banking system. This paper presents a review of the underlying Architectural Layout of Intra-Bank and Inter-Bank ATM connectivity in Nigeria. The paper further investigates and discusses factors affecting the Intra-Bank and Inter-Bank ATM connectivity in Nigeria. And as well possible solutions to these factors affecting ATM Connectivity and Operations are proposed.

Keywords: architectural layout, automated teller machine, e-services, postilion

Procedia PDF Downloads 612
4424 Complex Event Processing System Based on the Extended ECA Rule

Authors: Kwan Hee Han, Jun Woo Lee, Sung Moon Bae, Twae Kyung Park

Abstract:

ECA (Event-Condition-Action) languages are largely adopted for event processing since they are an intuitive and powerful paradigm for programming reactive systems. However, there are some limitations about ECA rules for processing of complex events such as coupling of event producer and consumer. The objective of this paper is to propose an ECA rule pattern to improve the current limitations of ECA rule, and to develop a prototype system. In this paper, conventional ECA rule is separated into 3 parts and each part is extended to meet the requirements of CEP. Finally, event processing logic is established by combining the relevant elements of 3 parts. The usability of proposed extended ECA rule is validated by a test scenario in this study.

Keywords: complex event processing, ECA rule, Event processing system, event-driven architecture, internet of things

Procedia PDF Downloads 516
4423 Security Issues in Long Term Evolution-Based Vehicle-To-Everything Communication Networks

Authors: Mujahid Muhammad, Paul Kearney, Adel Aneiba

Abstract:

The ability for vehicles to communicate with other vehicles (V2V), the physical (V2I) and network (V2N) infrastructures, pedestrians (V2P), etc. – collectively known as V2X (Vehicle to Everything) – will enable a broad and growing set of applications and services within the intelligent transport domain for improving road safety, alleviate traffic congestion and support autonomous driving. The telecommunication research and industry communities and standardization bodies (notably 3GPP) has finally approved in Release 14, cellular communications connectivity to support V2X communication (known as LTE – V2X). LTE – V2X system will combine simultaneous connectivity across existing LTE network infrastructures via LTE-Uu interface and direct device-to-device (D2D) communications. In order for V2X services to function effectively, a robust security mechanism is needed to ensure legal and safe interaction among authenticated V2X entities in the LTE-based V2X architecture. The characteristics of vehicular networks, and the nature of most V2X applications, which involve human safety makes it significant to protect V2X messages from attacks that can result in catastrophically wrong decisions/actions include ones affecting road safety. Attack vectors include impersonation attacks, modification, masquerading, replay, MiM attacks, and Sybil attacks. In this paper, we focus our attention on LTE-based V2X security and access control mechanisms. The current LTE-A security framework provides its own access authentication scheme, the AKA protocol for mutual authentication and other essential cryptographic operations between UEs and the network. V2N systems can leverage this protocol to achieve mutual authentication between vehicles and the mobile core network. However, this protocol experiences technical challenges, such as high signaling overhead, lack of synchronization, handover delay and potential control plane signaling overloads, as well as privacy preservation issues, which cannot satisfy the adequate security requirements for majority of LTE-based V2X services. This paper examines these challenges and points to possible ways by which they can be addressed. One possible solution, is the implementation of the distributed peer-to-peer LTE security mechanism based on the Bitcoin/Namecoin framework, to allow for security operations with minimal overhead cost, which is desirable for V2X services. The proposed architecture can ensure fast, secure and robust V2X services under LTE network while meeting V2X security requirements.

Keywords: authentication, long term evolution, security, vehicle-to-everything

Procedia PDF Downloads 154
4422 Specification of Requirements to Ensure Proper Implementation of Security Policies in Cloud-Based Multi-Tenant Systems

Authors: Rebecca Zahra, Joseph G. Vella, Ernest Cachia

Abstract:

The notion of cloud computing is rapidly gaining ground in the IT industry and is appealing mostly due to making computing more adaptable and expedient whilst diminishing the total cost of ownership. This paper focuses on the software as a service (SaaS) architecture of cloud computing which is used for the outsourcing of databases with their associated business processes. One approach for offering SaaS is basing the system’s architecture on multi-tenancy. Multi-tenancy allows multiple tenants (users) to make use of the same single application instance. Their requests and configurations might then differ according to specific requirements met through tenant customisation through the software. Despite the known advantages, companies still feel uneasy to opt for the multi-tenancy with data security being a principle concern. The fact that multiple tenants, possibly competitors, would have their data located on the same server process and share the same database tables heighten the fear of unauthorised access. Security is a vital aspect which needs to be considered by application developers, database administrators, data owners and end users. This is further complicated in cloud-based multi-tenant system where boundaries must be established between tenants and additional access control models must be in place to prevent unauthorised cross-tenant access to data. Moreover, when altering the database state, the transactions need to strictly adhere to the tenant’s known business processes. This paper focuses on the fact that security in cloud databases should not be considered as an isolated issue. Rather it should be included in the initial phases of the database design and monitored continuously throughout the whole development process. This paper aims to identify a number of the most common security risks and threats specifically in the area of multi-tenant cloud systems. Issues and bottlenecks relating to security risks in cloud databases are surveyed. Some techniques which might be utilised to overcome them are then listed and evaluated. After a description and evaluation of the main security threats, this paper produces a list of software requirements to ensure that proper security policies are implemented by a software development team when designing and implementing a multi-tenant based SaaS. This would then assist the cloud service providers to define, implement, and manage security policies as per tenant customisation requirements whilst assuring security for the customers’ data.

Keywords: cloud computing, data management, multi-tenancy, requirements, security

Procedia PDF Downloads 140
4421 Managing Cognitive Load in Accounting: An Analysis of Three Instructional Designs in Financial Accounting

Authors: Seedwell Sithole

Abstract:

One of the persistent problems in accounting education is how to effectively support students’ learning. A promising technique to this issue is to investigate the extent that learning is determined by the design of instructional material. This study examines the academic performance of students using three instructional designs in financial accounting. Student’s performance scores and reported mental effort ratings were used to determine the instructional effectiveness. The findings of this study show that accounting students prefer graph and text designs that are integrated. The results suggest that spatially separated graph and text presentations in accounting should be reorganized to align with the requirements of human cognitive architecture.

Keywords: accounting, cognitive load, education, instructional preferences, students

Procedia PDF Downloads 128
4420 The Sublimation Of Personal Drama Into Mythological Tale: ‘‘The Search Of Golden Fleece’’ By Alexander Mcqueen, Givenchy

Authors: Ani Hambardzumyan

Abstract:

The influence of Greek culture and Greek mythology on the fashion industry is enormous. The first reason behind this is that Greek culture is one of the core elements to form the clothing tradition in Europe. French fashion houses have always been considered one of the leading cloth representatives in the world. As we could perceive in the first chapter, they are among the first ones to get inspired from Greek cultural heritage and apply it while creating their garments. The French fashion industry has kept traditional classical elements in clothes for decades. However, from the second half of the 20th century, this idea started to alter step by step. Society was transforming its vision with the influence of avant-garde movements. Hence, the fashion industry needed to transform its conception as well. However, it should be mentioned that fashion brands never stopped looking at the past when creating a new perspective or vision. Paradoxically, Greek mythology and clothing tradition continued to be applied even in the search of new ideas or new interpretations. In 1997 Alexander McQueen presents his first Haute Couture collection for French fashion house Givenchy, inspired by Greek mythology and titled ‘‘Search for The Golden Fleece.’’ Perhaps, this was one of the most controversial Haute Couture shows that French audience could expect to see and French media could capture and write about. The paper discuss Spring/Summer 1997 collection ‘‘The Search of Golden Fleece’’ by Alexander McQueen. It should be mentioned that there has not been yet conducted researches to analyze the mythological and archetypal nature of the collection, as well as general observations that go beyond traditional historical reviews are few in number. Here we will observe designer’s transformative new approach regarding Greek heritage and the media’s perception of it while collection was presented. On top of that, we will observe Alexander McQueen life in the parallel line with the fashion show since the collection is nothing else but the sublimation of his personal journey and drama.

Keywords: mythology, mcqueen, the argonaut, french fashion, golden fleece, givenchy

Procedia PDF Downloads 92
4419 Research on Hangzhou Commercial Center System Based on Point of Interest Data

Authors: Chen Wang, Qiuxiao Chen

Abstract:

With the advent of the information age and the era of big data, urban planning research is no longer satisfied with the analysis and application of traditional data. Because of the limitations of traditional urban commercial center system research, big data provides new opportunities for urban research. Therefore, based on the quantitative evaluation method of big data, the commercial center system of the main city of Hangzhou is analyzed and evaluated, and the scale and hierarchical structure characteristics of the urban commercial center system are studied. In order to make up for the shortcomings of the existing POI extraction method, it proposes a POI extraction method based on adaptive adjustment of search window, which can accurately and efficiently extract the POI data of commercial business in the main city of Hangzhou. Through the visualization and nuclear density analysis of the extracted Point of Interest (POI) data, the current situation of the commercial center system in the main city of Hangzhou is evaluated. Then it compares with the commercial center system structure of 'Hangzhou City Master Plan (2001-2020)', analyzes the problems existing in the planned urban commercial center system, and provides corresponding suggestions and optimization strategy for the optimization of the planning of Hangzhou commercial center system. Then get the following conclusions: The status quo of the commercial center system in the main city of Hangzhou presents a first-level main center, a two-level main center, three third-level sub-centers, and multiple community-level business centers. Generally speaking, the construction of the main center in the commercial center system is basically up to standard, and there is still a big gap in the construction of the sub-center and the regional-level commercial center, further construction is needed. Therefore, it proposes an optimized hierarchical functional system, organizes commercial centers in an orderly manner; strengthens the central radiation to drive surrounding areas; implements the construction guidance of the center, effectively promotes the development of group formation and further improves the commercial center system structure of the main city of Hangzhou.

Keywords: business center system, business format, main city of Hangzhou, POI extraction method

Procedia PDF Downloads 123
4418 Effects of Silver Nanoparticles on in vitro Adventitious Shoot Regeneration of Water Hyssop (Bacopa monnieri L. Wettst.)

Authors: Muhammad Aasim, Mehmet Karataş, Fatih Erci, Şeyma Bakırcı, Ecenur Korkmaz, Burak Kahveci

Abstract:

Water hyssop (Bacopa monnieri L. Wettst.) is an important medicinal aquatic/semi aquatic plant native to India where it is used in traditional medicinal system. The plant contains bioactive compounds mainly Bacosides which are the main ingridient of commercial drug available as memory enhancer tonic. The local name of water hyssop is Brahmi and brahmi based drugs are available against for curing chronic diseases and disorders Alzheimer’s disease, anxiety, asthma, cancer, mental illness, respiratory ailments, and stomach ulcers. The plant is not a cultivated plant and collection of plant from nature make palnt threatened to endangered. On the other hand, low seed viability and availability make it difficult to propagate plant through traditional techniques. In recent years, plant tissue culture techniques have been employed to propagate plant for its conservation and production for continuous availability of secondary metabolites. On the other hand, application of nanoparticles has been reported for increasing biomass, in vitro regeneration and secondary metabolites production. In this study, silver nanoparticles (AgNPs) were applied at the rate of 2, 4, 6, 8 and 10 ppm to Murashihe and Skoog (MS) medium supplemented with 1.0 mg/l Benzylaminopurine (BAP), 3.0% sucrose and 0.7% agar. Leaf explants of water hyssop were cultured on AgNPs containing medium. Shoot induction from leaf explants were relatively slow compared to medium without AgNPs. Multiple shoot induction was recorded after 3-4 weeks of culture comapred to control that occured within 10 days. Regenerated shoots were rooted successfully on MS medium supplemented with 1.0 mg/l IBA and acclimatized in the aquariums for further studies.

Keywords: Water hyssop, Silver nanoparticles, In vitro, Regeneration, Secondary metabolites

Procedia PDF Downloads 172
4417 An Informative Marketing Platform: Methodology and Architecture

Authors: Martina Marinelli, Samanta Vellante, Francesco Pilotti, Daniele Di Valerio, Gaetanino Paolone

Abstract:

Any development in web marketing technology requires changes in information engineering to identify instruments and techniques suitable for the production of software applications for informative marketing. Moreover, for large web solutions, designing an interface that enables human interactions is a complex process that must bridge between informative marketing requirements and the developed solution. A user-friendly interface in web marketing applications is crucial for a successful business. The paper introduces mkInfo - a software platform that implements informative marketing. Informative marketing is a new interpretation of marketing which places the information at the center of every marketing action. The creative team includes software engineering researchers who have recently authored an article on automatic code generation. The authors have created the mkInfo software platform to generate informative marketing web applications. For each web application, it is possible to automatically implement an opt in page, a landing page, a sales page, and a thank you page: one only needs to insert the content. mkInfo implements an autoresponder to send mail according to a predetermined schedule. The mkInfo platform also includes e-commerce for a product or service. The stakeholder can access any opt-in page and get basic information about a product or service. If he wants to know more, he will need to provide an e-mail address to access a landing page that will generate an e-mail sequence. It will provide him with complete information about the product or the service. From this point on, the stakeholder becomes a user and is now able to purchase the product or related services through the mkInfo platform. This paper suggests a possible definition for Informative Marketing, illustrates its basic principles, and finally details the mkInfo platform that implements it. This paper also offers some Informative Marketing models, which are implemented in the mkInfo platform. Informative marketing can be applied to products or services. It is necessary to realize a web application for each product or service. The mkInfo platform enables the product or the service producer to send information concerning a specific product or service to all stakeholders. In conclusion, the technical contributions of this paper are: a different interpretation of marketing based on information; a modular architecture for web applications, particularly for one with standard features such as information storage, exchange, and delivery; multiple models to implement informative marketing; a software platform enabling the implementation of such models in a web application. Future research aims to enable stakeholders to provide information about a product or a service so that the information gathered about a product or a service includes both the producer’s and the stakeholders' point of view. The purpose is to create an all-inclusive management system of the knowledge regarding a specific product or service: a system that includes everything about the product or service and is able to address even unexpected questions.

Keywords: informative marketing, opt in page, software platform, web application

Procedia PDF Downloads 114
4416 Kanga Traditional Costume as a Tool for Community Empowerment in Tanzania in Ubuntu perspective - A Literature Review

Authors: Meinrad Haule Lembuka

Abstract:

Introduction: Ubuntu culture represents African humanism with collective and positive feeling of people living together, interdependence, equally and peaceful etc. Overtime, Ubuntu culture developed varieties of communicative strategies to express experiences, feelings and knowledge. Khanga or kanga (garment) is among the Ubuntu cultural practice of Bantu speaking people along the East African coast following interaction with Arabs and Bantu speaking people to formulate Swahili culture. Kanga or Kanga is a Swahili word which means a traditional soft cotton cloths in varieties of colours, patterns, and styles which as a deep cultural, historical, and social significance not only in Tanzania but the rest of East African coast. Swahili culture is a sub culture of Ubuntu African culture which is rich in customs and rituals that serve to preserve goodness and life where Tanzania, like the rest of East African societies along the Indian coast engaged in kanga dressing custom under Swahili culture to express their feelings and knowledge sharing. After the independence of Tanzania (formerly Tanganyika) from British colonial rule, Kanga traditional dressing gained momentum in Swahili culture and spread to the rest of East Africa and beyond. To date kanga dressing holds a good position as a formal and informal tool for advocating marginalised groups, counselling, psychosocial therapy, liberation, compassion, love, justice, campaign, and cerebration etc. Methodology: A literature review method was guided by Ubuntu theory to assess the implications of kanga traditional dressing in empowering Tanzanian community. Findings: During slavery, slaves wore Kaniki and people despised Kaniki dressing due to its association with slavery. Ex-slave women seeking to become part of the Swahili society began to decorate their Kaniki clothes. After slavery was abolished in 1897, Kangas began to be used for self-empowerment and to indicate that the wearer had personal wealth. During colonial era, freedom of expressions for Africans were restricted by colonial masters thus Tanzanians used kanga to express the evils of colonialism and other social problems, Under Ubuntu value of unity and solidarity liberation and independence fighters crafted motto and liberation messages that were shared and spread rapidly in the community. Political parities like TANU used kanga to spread nationalism and Ujamaa policy. kanga is more than a piece of fabric-it is a space for women to voice unspeakable communication and a women-centred repository for indigenous knowledge, feminisms addressing social ills, happiness, campaigns, memories and reconciliation etc. Kanga provides an indirect voice and support vulnerable and marginalised populations and strongly it has proved to be a peaceful platform of capture attention of government and societies. Kanga textiles gained increased international fame when an Obama kanga design was produced upon the president’s election in 2008 and his visit to Tanzania in 2013. Conclusion: Kanga preserves and symbolises Swahili culture and contributes in realization of social justice, inclusion, national identity and unity. As an inclusive cultural tool, Kanga spread across Africa to international community and the practice has moved from being a woman domination dressing code to other sex orientations.

Keywords: African culture, Kanga, khanga, swahili culture, ubuntu

Procedia PDF Downloads 48
4415 Effective Teaching Pyramid and Its Impact on Enhancing the Participation of Students in Swimming Classes

Authors: Salam M. H. Kareem

Abstract:

Instructional or teaching procedures and their proper sequence are essential for high-quality learning outcomes. These actions are the path that the teacher takes during the learning process after setting the learning objectives. Teachers and specialists in the education field should include teaching procedures with putting in place an effective mechanism for the procedure’s implementation to achieve a logical sequence with the desired output of overall education process. Determining the sequence of these actions may be a strategic process outlined by a strategic educational plan or drawn by teachers with a high level of experience, enabling them to determine those logical procedures. While specific actions may be necessary for a specific form, many Physical Education (PE) teachers can work out on various sports disciplines. This study was conducted to investigate the impact of using the teaching sequence of the teaching pyramid in raising the level of enjoyment in swimming classes. Four months later of teaching swimming skills to the control and experimental groups of the study, we figured that using the tools shown in the teaching pyramid with the experimental group led to statistically significant differences in the positive tendencies of students to participate in the swimming classes by using the traditional procedures of teaching and using of successive procedures in the teaching pyramid, and in favor of the teaching pyramid, The students are influenced by enhancing their tendency to participate in swimming classes when the teaching procedures followed are sensitive to individual differences and are based on the element of pleasure in learning, and less positive levels of the tendency of students when using traditional teaching procedures, by getting the level of skills' requirements higher and more difficult to perform. The level of positive tendencies of students when using successive procedures in the teaching pyramid was increased, by getting the level of skills' requirements higher and more difficult to perform, because of the high level of motivation and the desire to challenge the self-provided by the teaching pyramid.

Keywords: physical education, swimming classes, teaching process, teaching pyramid

Procedia PDF Downloads 131
4414 The Use of Indicators to Evaluate Minor Heritage Areas in a City

Authors: J. L. Oliver, T. Agryzkov, L. Tortosa, J. F. Vicent, J. Santacruz

Abstract:

This paper aims to demonstrate how a system of indicators can be used in order to evaluate some heritage areas which can be understood as minor ones. We mean by that those urban areas with high heritage interest from an academical point of view, but never properly valued. The reasons for this situation may be diverse, either they are not old enough, or they may show the modest architecture, the fact is these areas have not been considered deserving of protection, as the historical ones. As a result of this reality, they usually show now a very degraded urban space, which in addition contribute to accelerate a process of deterioration. Using a technic well known in urban design, we propose here a system of indicators for patrimonial purposes, as a tool to identify and quantify the heritage value of these kinds of areas. As a case study, we apply this system in some part of the City of Quito (El Ecuador).

Keywords: heritage cities, indicators, spatial analysis, historic sites

Procedia PDF Downloads 229
4413 Evaluation of Anti-inflammatory Activities of Extracts Obtained from Capparis Erythrocarpos In-Vivo

Authors: Benedict Ofori, Kwabena Sarpong, Stephen Antwi

Abstract:

Background: Medicinal plants are utilized all around the world and are becoming increasingly important economically. The WHO notes that ‘inappropriate use of traditional medicines or practices can have negative or dangerous effects and that future research is needed to ascertain the efficacy and safety of such practices and medicinal plants used by traditional medicine systems. The poor around the world have limited access to palliative care or pain relief. Pharmacologists have been focused on developing safe and effective anti-inflammatory drugs. Most of the issues related to their use have been linked to the fact that numerous traditional and herbal treatments are classified in different nations as meals or dietary supplements. As a result, there is no need for evidence of the quality, efficacy, or safety of these herbal formulations before they are marketed. The fact that access to drugs meant for pain relief is limited in low-income countries means advanced studies should be done on home drugs meant for inflammation to close the gap. Methods: The ethanolic extracts of the plant were screened for the presence of 10 phytochemicals. The Pierce BCA Protein Assay Kit was used for the determination of the protein concentration of the egg white. The rats were randomly selected and put in 6 groups. The egg white was sub-plantar injected into the right-hand paws of the rats to induce inflammation. The animals were treated with the three plant extracts obtained from the root bark, stem, and leaves of the plant. The control groups were treated with normal saline, while the standard groups were treated with standard drugs indomethacin and celecoxib. Plethysmometer was used to measure the change in paw volume of the animals over the course of the experiment. Results: The results of the phytochemical screening revealed the presence of reducing sugars and saponins. Alkaloids were present in only R.L.S (1:1:1), and phytosterols were found in R.L(1:1) and R.L.S (1:1:1). The estimated protein concentration was found to be 103.75 mg/ml. The control group had an observable increase in paw volume, which indicated that inflammation was induced during the 5 hours. The increase in paw volume for the control group peaked at the 1st hour and decreased gradually throughout the experiment, with minimal changes in the paw volumes. The 2nd and 3rd groups were treated with 20 mg/kg of indomethacin and celecoxib. The anti-inflammatory activities of indomethacin and celecoxib were calculated to be 21.4% and 4.28%, respectively. The remaining 3 groups were treated with 2 dose levels of 200mg/kg plant extracts. R.L.S, R.L, and S.R.L had anti-inflammatory activities of 22.3%, 8.2%, and 12.07%, respectively. Conclusions: Egg albumin-induced paw model in rats can be used to evaluate the anti-inflammatory activity of herbs that might have potential anti-inflammatory activity. Herbal medications have potential anti-inflammatory activities and can be used to manage various inflammatory conditions if their efficacy and side effects are well studied. The three extracts all possessed anti-inflammatory activity, with R.L.S having the highest anti-inflammatory activity.

Keywords: inflammation, capparis erythrocarpos, anti-inflammatory activity, herbal medicine, paw volume, egg albumin

Procedia PDF Downloads 74
4412 Reconstruction of Womanhood: Narratives of Unmarried Basotho Women in Lesotho

Authors: Neo Mohlabane

Abstract:

-- Feminists across various contexts have written extensively on the subject of ‘Woman.’ Recently the question of difference; to account for the cultural, ethnic, and racial diversity among women themselves has become a highly contested issue in feminist theories. Tensions have ensued where ‘western feminisms’ have been criticized for bias that is embedded in the objectification of ‘different’ women often regarded as ‘other’; traditional, therefore inferior. Thus, it is argued that womanhood; a set of socially defined attributes appropriate for women, holds different meanings depending on the context in which it is defined. Drawing on decolonial feminist approaches, this qualitative study explored the constructions of ‘womanhood’ from the perspective of unmarried Basotho women in Lesotho, where womanhood is predominantly defined in marital terms. Through the narrated life-stories of twenty unmarried Basotho women, the study revealed that as opposed to the ‘traditional’ definition that accounts for a single attribute woman as ‘wife,’ unmarried Basotho women defined ‘womanhood’ in different ways that deconstructed fixed gendered categories. The women drew meaning from their past personal experiences of childhood to construct and re-construct womanhood in adulthood. By transforming their embodied experiences of hardship and sorrow into valuable constructs with which they self-evaluated as resilient and perseverant, the women constructed a base for self-affirmation as woman. In addition, the women anchored their constructions and reconstructions of woman by transforming the meanings attached to the realms of respectability, sexuality and motherhood. Thus, to the question; what is a Woman? In part, the study concluded that there is no such thing as a ‘unitary’ definition of womanhood, instead Mosotho womanhood has always been and will always be in a state of flux; bearing multiplicity and complexity. This study highlights the need to exercise caution when using western concepts to understand the experiences of women in local African contexts. In order to decolonize feminist scholarship, African feminisms need to re-construct conceptual and theoretical frameworks appropriate for analyzing and understanding gender issues in African contexts.

Keywords: decoloniality, feminism, Lesotho, womanhood

Procedia PDF Downloads 89
4411 Investigating the Relationship between Bank and Cloud Provider

Authors: Hatim Elhag

Abstract:

Banking and Financial Service Institutions are possibly the most advanced in terms of technology adoption and use it as a key differentiator. With high levels of business process automation, maturity in the functional portfolio, straight through processing and proven technology outsourcing benefits, Banking sector stand to benefit significantly from Cloud computing capabilities. Additionally, with complex Compliance and Regulatory policies, combined with expansive products and geography coverage, the business impact is even greater. While the benefits are exponential, there are also significant challenges in adopting this model– including Legal, Security, Performance, Reliability, Transformation complexity, Operating control and Governance and most importantly proof for the promised cost benefits. However, new architecture designed should be implemented to align this approach.

Keywords: security, cloud, banking sector, cloud computing

Procedia PDF Downloads 484
4410 Hydrogen: Contention-Aware Hybrid Memory Management for Heterogeneous CPU-GPU Architectures

Authors: Yiwei Li, Mingyu Gao

Abstract:

Integrating hybrid memories with heterogeneous processors could leverage heterogeneity in both compute and memory domains for better system efficiency. To ensure performance isolation, we introduce Hydrogen, a hardware architecture to optimize the allocation of hybrid memory resources to heterogeneous CPU-GPU systems. Hydrogen supports efficient capacity and bandwidth partitioning between CPUs and GPUs in both memory tiers. We propose decoupled memory channel mapping and token-based data migration throttling to enable flexible partitioning. We also support epoch-based online search for optimized configurations and lightweight reconfiguration with reduced data movements. Hydrogen significantly outperforms existing designs by 1.21x on average and up to 1.31x.

Keywords: hybrid memory, heterogeneous systems, dram cache, graphics processing units

Procedia PDF Downloads 52
4409 On-Chip Aging Sensor Circuit Based on Phase Locked Loop Circuit

Authors: Ararat Khachatryan, Davit Mirzoyan

Abstract:

In sub micrometer technology, the aging phenomenon starts to have a significant impact on the reliability of integrated circuits by bringing performance degradation. For that reason, it is important to have a capability to evaluate the aging effects accurately. This paper presents an accurate aging measurement approach based on phase-locked loop (PLL) and voltage-controlled oscillator (VCO) circuit. The architecture is rejecting the circuit self-aging effect from the characteristics of PLL, which is generating the frequency without any aging phenomena affects. The aging monitor is implemented in low power 32 nm CMOS technology, and occupies a pretty small area. Aging simulation results show that the proposed aging measurement circuit improves accuracy by about 2.8% at high temperature and 19.6% at high voltage.

Keywords: aging effect, HCI, NBTI, nanoscale

Procedia PDF Downloads 347
4408 Palestine Smart Tourism Augmented Reality Mobile Application

Authors: Murad Al-Rajab, Sherin Hazboun, Azhar Al-Hamamreh, Nirmeen Odeh, Siham Halaseh

Abstract:

Tourism is considered an important sector for most countries, while maintaining good tourism attractions can promote national economic development. The State of Palestine is historically considered a wealthy country full of many archaeological places. In the city of Bethlehem, for example, the Church of the Nativity is the most important touristic site, but it does not have enough technology development to attract tourists. In this paper, we propose a smart mobile application named “Pal-STAR” (Palestine Smart Tourist Augmented Reality) as an innovative solution which targets tourists and assists them to make a visit inside the Church of the Nativity. The application will use augmented reality and feature a virtual tourist guide showing views of the church while providing historical information in a smart, easy, effective and user-friendly way. The proposed application is compatible with multiple mobile platforms and is considered user friendly. The findings show that this application will improve the practice of the tourism sector in the Holy Land, it will also increase the number of tourists visiting the Church of the Nativity and it will facilitate access to historical data that have been difficult to obtain using traditional tourism guidance. The value that tourism adds to a country cannot be denied, and the more technological advances are incorporated in this sector, the better the country’s tourism sector can be served. Palestine’s economy is heavily dependent on tourism in many of its main cities, despite several limitations, and technological development is needed to enable this sector to flourish. The proposed mobile application would definitely have a good impact on the development of the tourism sector by creating an Augmented Reality environment for tourists inside the church, helping them to navigate and learn about holy places in a non-traditional way, using a virtual tourist guide.

Keywords: smartphones, tourism, tourists guide, augmented reality, Palestine

Procedia PDF Downloads 150
4407 Libyan Residents in Britain and Identity of Place

Authors: Intesar Ibrahim

Abstract:

Large-scale Libyan emigration is a relatively new phenomenon. Most of the Libyan families in the UK are new immigrants, unlike the other neighbouring countries of Egypt, Tunisia, Algeria and even Sudan. Libyans have no particular history of large-scale migration. On the other hand, many Libyan families live in modest homes located in large Muslim communities of Pakistanis and Yemenis. In the UK as a whole, there are currently 16 Libyan schools most of which are run during the weekend for children of school age. There are three such weekend schools in Sheffield that teach a Libyan school curriculum, and Libyan women and men run these schools. Further, there is also a Masjid (mosque) that is operated by Libyans, beside the other Masjids in the city, which most of the Libyan community attend for prayer and for other activities such as writing marriage contracts. The presence of this Masjid increases the attraction for Libyans to reside in the Sheffield area. This paper studies how Libyan immigrants in the UK make their decisions on their housing and living environment in the UK. Libyan residents in the UK come from different Libyan regions, social classes and lifestyles; this may have an impact on their choices in the interior designs of their houses in the UK. A number of case studies were chosen from Libyan immigrants who came from different types of dwellings in Libya, in order to compare with their homes and their community lifestyle in the UK and those in Libya. This study explores the meaning and the ways of using living rooms in Libyan emigrants’ houses in the UK and compares those with those in their houses back in their home country. For example, the way they set up furniture in rooms acts as an indicator of the hierarchical structure of society. The design of furniture for Libyan sitting rooms for floor-seating is different from that of the traditional English sitting room. The paper explores the identity and cultural differences that affected the style and design of the living rooms for Libyan immigrants in the UK. The study is carried out based on the "production of space" theory that any culture has its needs, style of living and way of thinking. I argue that the study found more than 70% of Libyan immigrants in the UK still furnish the living room in their traditional way (flooring seating).

Keywords: place, identity, culture, immigrants

Procedia PDF Downloads 266
4406 Seismic Performance of Highway Bridges with Partially Self-Centering Isolation Bearings against Near-Fault Ground Motions

Authors: Shengxin Yu

Abstract:

Earthquakes can cause varying degrees of damage to building and bridge structures. Traditional laminated natural rubber bearings (NRB) exhibit inadequate energy dissipation and restraint, particularly under near-fault ground motions, resulting in excessive displacements in the superstructure. This paper presents a composite natural rubber bearing (NFUD-NRB) incorporating two types of shape memory alloy (SMA) U-shaped dampers (UD). The bearing exhibits adjustable features, predominantly characterized by partial self-centering and multi-level energy dissipation, facilitated by nickel-titanium-based SMA (NiTi-SMA) and iron-based SMA (Fe-SMA) UDs. The hysteresis characteristics of NFUD-NRB can be tailored by manipulating the configuration of NiTi-SMA and Fe-SMA UDs. Firstly, the proposed bearing's geometric configuration and working principle are introduced. The rationality of the modeling strategy for the bearing is validated through existing experimental results. Parameterized numerical simulations are subsequently performed to investigate the partially self-centering behavior of NFUD-NRB. The findings indicate that NFUD-NRB can attain the anticipated nonlinear behavior and deliver adequate energy dissipation. Finally, the impact of NFUD-NRB on improving the seismic resilience of highway bridges is examined using the OpenSees software, with particular emphasis on the seismic performance of NFUD-NRB under near-fault ground motions. System-level analysis reveals that bridge systems equipped with NFUD-NRBs exhibit satisfactory residual deformations and higher energy dissipation than those equipped with traditional NRBs. Moreover, NFUD-NRB markedly mitigates the detrimental impacts of near-fault ground motions on the main structure of bridges.

Keywords: partially self-centering behavior, energy dissipation, natural rubber bearing, shape memory alloy, U-shaped damper, numerical investigation, near-fault ground motion

Procedia PDF Downloads 36
4405 Women’s Financial Literacy and Family Financial Fragility

Authors: Pepur Sandra, Bulog Ivana, Rimac Smiljanić Ana

Abstract:

During the COVID-19 pandemic, stress and family financial fragility arose worldwide. Economic and health uncertainty created new pressure on the everyday life of families. The work from home, homeschooling, and care of other family members caused an increase in unpaid work and generated a new division of intrahousehold. As many times before, women have taken the higher burden. This paper analyzes family stress and finance during the COVID-19 pandemic. We propose that women's inclusion in paid and unpaid work and their financial literacy influence family finances. We build up our assumptions according to the two theories that explain intrahousehold family decision-making: traditional and barging models. The traditional model assumes that partners specialize in their roles in line with time availability. Consequently, partners less engaged in payable working activities will spend more time on domestic activities and vice versa. According to the bargaining model, each individual has their preferences, and the one with more household bargaining power, e.g., higher income, higher level of education, better employment, or higher financial knowledge, is likely to make family decisions and avoid unpaid work. Our results are based on an anonymous and voluntary survey of 869 valid responses from women older than 18 conducted in Croatia at the beginning of 2021. We found that families who experienced delays in settling current obligations before the pandemic were in a worse financial situation during the pandemic. However, all families reported problems settling current obligations during pandemic times regardless of their financial condition before the crisis. Women from families with financial issues reported higher levels of family and personal stress during the pandemic. Furthermore, we provide evidence that more women's unpaid work negatively affects the family's financial fragility during the pandemic. In addition, in families where women have better financial literacy and are more financially independent, families cope better with finance before and during pandemics.

Keywords: family financial fragility, stress, unpaid work, women's financial literacy

Procedia PDF Downloads 58
4404 The Traditional Roles and Place of Indigenous Musical Practices in Contemporary African Society

Authors: Benjamin Obeghare Izu

Abstract:

In Africa, indigenous musical practices are the focal point in which most cultural practices revolve, and they are the conduit mainly used in transmitting Indigenous knowledge and values. They serve as a means of documenting, preserving, transmitting indigenous knowledge, and re-enacting their historical, social, and cultural affinity. Indigenous musical practices also serve as a repository for indigenous knowledge and artistic traditions. However, these indigenous musical practices and the resulting cultural ideals are confronted with substantial challenges in the twenty-first century from contemporary cultural influence. Additionally, indigenous musical practices' educational and cultural purposes have been impacted by the broad monetisation of the arts in contemporary society. They are seen as objects of entertainment. Some young people are today unaware of their cultural roots and are losing their cultural identity due to these influences and challenges. In order to help policymakers raise awareness of and encourage the use of indigenous knowledge and musical practices among African youth and scholars, this study is in response to the need to explore the components and functions of the indigenous knowledge system, values, and musical tradition in Africa. The study employed qualitative research methods, utilising interviews, participant observation, and conducting related literature as data collection methods. It examines the indigenous musical practices in the Oba of Benin Royal Igue festival among the Benin people in Edo state, Nigeria, and the Ovwuwve festival observed by the Abraka people in Delta state, Nigeria. The extent to which the indigenous musical practices convey and protect indigenous knowledge and cultural values are reflected in the musical practices of the cultural festivals. The study looks at how indigenous musical arts are related to one another and how that affects how indigenous knowledge is transmitted and preserved. It makes recommendations for how to increase the use of indigenous knowledge and values and their fusion with contemporary culture. The study contributes significantly to ethnomusicology by showing how African traditional music traditions support other facets of culture and how indigenous knowledge might be helpful in contemporary society.

Keywords: African musical practices, African music and dance, African society, indigenous musical practices

Procedia PDF Downloads 95
4403 Algae Growth and Biofilm Control by Ultrasonic Technology

Authors: Vojtech Stejskal, Hana Skalova, Petr Kvapil, George Hutchinson

Abstract:

Algae growth has been an important issue in water management of water plants, ponds and lakes, swimming pools, aquaculture & fish farms, gardens or golf courses for last decades. There are solutions based on chemical or biological principles. Apart of these traditional principles for inhibition of algae growth and biofilm production there are also physical methods which are very competitive compared to the traditional ones. Ultrasonic technology is one of these alternatives. Ultrasonic emitter is able to eliminate the biofilm which behaves as a host and attachment point for algae and is original reason for the algae growth. The ultrasound waves prevent majority of the bacteria in planktonic form becoming strongly attached sessile bacteria that creates welcoming layer for the biofilm production. Biofilm creation is very fast – in the serene water it takes between 30 minutes to 4 hours, depending on temperature and other parameters. Ultrasound device is not killing bacteria. Ultrasound waves are passing through bacteria, which retract as if they were in very turbulent water even though the water is visually completely serene. In these conditions, bacteria does not excrete the polysaccharide glue they use to attach to the surface of the pool or pond, where ultrasonic technology is used. Ultrasonic waves decrease the production of biofilm on the surfaces in the selected area. In case there are already at the start of the application of ultrasonic technology in a pond or basin clean inner surfaces, the biofilm production is almost absolutely inhibited. This paper talks about two different pilot applications – one in Czech Republic and second in United States of America, where the used ultrasonic technology (AlgaeControl) is coming from. On both sites, there was used Mezzo Ultrasonic Algae Control System with very positive results not only on biofilm production, but also algae growth in the surrounding area. Technology has been successfully tested in two different environments. The poster describes the differences and their influence on the efficiency of ultrasonic technology application. Conclusions and lessons learned can be possibly applied also on other sites within Europe or even further.

Keywords: algae growth, biofilm production, ultrasonic solution, ultrasound

Procedia PDF Downloads 247