Search results for: contemporary issues
4419 Beyond Informality: Relocation from a Traditional Village 'Mit Oqbah' to Masaken El-Barageel and the Role of ‘Urf in Governing Built Environment, Egypt
Authors: Sarah Eldefrawi, Maike Didero
Abstract:
In Egypt, residents’ urban interventions (colloquially named A’hali’s interventions) are always tackled by government, scholars, and media as an encroachment (taeadiyat), chaotic (a’shwa’i) or informal (gheir mokanan) practices. This paper argues that those interventions cannot be simply described as an encroachment on public space or chaotic behaviour. We claim here that they are relevant to traditional governing methods (‘Urf) that were governing Arab cities for many decades. Through an in-depth field study conducted in a real estate public housing project in the city of Giza called 'Masaken El-Barageel', we traced the urban transformations demonstrated in private and public spaces. To understand those transformations, we used wide-range of qualitative research methods such as semi-guided and informal interviews, observations and mapping of the built environment and the newly added interventions. This study was as well strengthened through the contributions of the author in studying nine sectors emerging by Ahali in six districts in Great Cairo. The results of this study indicate that a culturally and socially sensitive framework has to be related to the individual actions toward the spatial and social structures as well as to culturally transmitted views and meanings connected with 'Urf'. The study could trace three crucial principals in ‘urf that influenced these interventions; the eliminating of harm (Al-Marafiq wa Man’ al-Darar), the appropriation of space (Haqq el-Intefa’) and public interest (maslaha a’ma). Our findings open the discussion for the (il) legitimate of a’hali governing methods in contemporary cities.Keywords: Urf, urban governance, public space, public housing, encroachments, chaotic, Egyptian cities
Procedia PDF Downloads 1344418 The Effects of Social Media on the Dreams of Preadolescent Girls
Authors: Saveria Capecchi
Abstract:
The aim of the quali-quantitative research conducted in the spring of 2021 (still in the midst of the Covid-19 emergency) was to analyze the relationship between the imaginary of 142 girls aged 10-12 from two Italian cities in the Emilia-Romagna region (the capital, Bologna, and Parma) and the influence that various socialization agents can have on it, with particular attention to social media. In order to investigate the relationship between imagination and media, two tools were used: first, the girls wrote an essay in class about their future lives, imagining waking up one morning as a thirty-year-old adults. Six types of "dreams" reflecting the values and lifestyles characteristic of contemporary Italian society emerged. Additionally, the girls completed a questionnaire on their leisure time and, in particular, media consumption aimed at identifying their favorite characters. The results provided insights into understanding the reference values and lifestyles that define their subculture (they belong to the so-called Generation Z). Another interesting aspect of this research is the possibility of comparing the results with those of a similar study on preadolescent imaginary conducted in 1995, involving 292 girls from Milan and Bologna, belonging to the Millennial generation. The narratives about the imagined adult life reflect some crucial changes undergone by Italian society in a quarter of a century: there are advancements towards gender equality, and the imagined family is increasingly detached from tradition. There is a more persistent dream of a life marked by beauty, wealth, and fame, while at the same time, there is a greater social commitment, from solidarity with marginalized people to environmentalism. Furthermore, the mentioned new digital and robotic professions will project us into the near future.Keywords: gender equality, gender stereotypes, imaginary, preadolescents, social media
Procedia PDF Downloads 544417 Relationships between Chinese Talented Educated Women
Authors: Jianghe Niu, Zhu Xiao Di
Abstract:
This research uses a qualitative case study of the literature review approach to explore and analyze the relationship between three pairs of famous and talented women in China and uncovers certain regularities. From all kinds of available Chinese materials, such as biographies, memoirs, and news reports, both in papers and from the internet, we carefully selected the following 3 pairs of 6 Chinese women, whose relationships went through upheavals from friendship to jealousy and hostility, and we analyzed many factors contributing to this kind of relationship. (1) Hong Huang and Su Mang, both are leaders in the contemporary Chinese fashion industry as editors-in-chief of major fashion magazines. (2) Lin Huiyin and Xie Bingxin, both are phenomenally successful women in the field of literature and/or architecture throughout most of the 20th century. They are also quite similar in terms of age, family background, professional achievements, and celebrity status, but the former has multiple men's pursuit and admiration, while the latter has fewer. (3) Zhang Ailing and Su Qing, their achievements in the field of literature are remarkably similar, as top two female authors in metropolitan Shanghai during 1940s. They once admired each other's talents very much. Zhang’s husband used to have a relationship with Su Qing, and it was through Su Qing that he met Zhang Ailing. Major Findings: (1) Across the three pairs of case studies, it is observed that the more they are similar to each other in age, family background, education level, career positions, and social statues, the more they are likely to be in discord, jealousy, and hostility. (2) In the relationship between Chinese women, especially between talented, educated women, if there are men involved and one is more adored and favored by men than the other, such as in the 2nd and third pairs, the resulting jealousy deepens the negative relationship between them. (3) The relationship between talented and successful Chinese women, as shown in the third example, where a man was introduced by a woman to her close female friend, and then the man fell in love with her and married her, would undoubtedly deteriorate until jealousy, hatred, and hostility reached climax.Keywords: relationship, Chinese, women, men
Procedia PDF Downloads 864416 Lessons of Passive Environmental Design in the Sarabhai and Shodan Houses by Le Corbusier
Authors: Juan Sebastián Rivera Soriano, Rosa Urbano Gutiérrez
Abstract:
The Shodan House and the Sarabhai House (Ahmedabad, India, 1954 and 1955, respectively) are considered some of the most important works of Le Corbusier produced in the last stage of his career. There are some academic publications that study the compositional and formal aspects of their architectural design, but there is no in-depth investigation into how the climatic conditions of this region were a determining factor in the design decisions implemented in these projects. This paper argues that Le Corbusier developed a specific architectural design strategy for these buildings based on scientific research on climate in the Indian context. This new language was informed by a pioneering study and interpretation of climatic data as a design methodology that would even involve the development of new design tools. This study investigated whether their use of climatic data meets values and levels of accuracy obtained with contemporary instruments and tools, such as Energy Plus weather data files and Climate Consultant. It also intended to find out if Le Corbusier's office’s intentions and decisions were indeed appropriate and efficient for those climate conditions by assessing these projects using BIM models and energy performance simulations from Design Builder. Accurate models were built using original historical data through archival research. The outcome is to provide a new understanding of the environment of these houses through the combination of modern building science and architectural history. The results confirm that in these houses, it was achieved a model of low energy consumption. This paper contributes new evidence not only on exemplary modern architecture concerned with environmental performance but also on how it developed progressive thinking in this direction.Keywords: bioclimatic architecture, Le Corbusier, Shodan, Sarabhai Houses
Procedia PDF Downloads 654415 History and Its Significance in Modern Visual Graphic: Its Niche with Respect to India
Authors: Hemang Madhusudan Anglay, Akash Gaur
Abstract:
Value of visual perception in today’s context is vulnerable. Visual Graphic broadly and conveniently expresses culture, language and science of art that satisfactorily is a mould to cast various expressions. It is one of the essential parts of communication design which relatively can be used to approach the above areas of expressions. In between the receptors and interpreters, there is an expanse of comprehension and cliché in relation to the use of Visual Graphics. There are pedagogies, commodification and honest reflections where Visual Graphic is a common area of interest. The traditional receptors amidst the dilemma of this very situation find themselves in the pool of media, medium and interactions. Followed by a very vague interpretation the entire circle of communication becomes a question of comprehension vs cliché. Residing in the same ‘eco-system’ these communities who make pedagogies and multiply its reflections sometimes with honesty and sometimes on commercial values tend to function differently. With the advent of technology, which is a virtual space allows the user to access various forms of content. This diminishes the core characteristics and creates a vacuum even though it satisfies the user. The symbolic interpretation of visual form and structure is transmitted in a culture by the means of contemporary media. Starting from a very individualistic approach, today it is beyond Print & Electronic media. The expected outcome will be a study of Ahmedabad City, situated in the Gujarat State of India. It is identity with respect to socio-cultural as well as economic changes. The methodology will include process to understand the evolution and narratives behind it that will encompass diverse community, its reflection and it will sum up the salient features of communication through combination of visual and graphic that is relevant in Indian context trading its values to global scenario.Keywords: communication, culture, graphic, visual
Procedia PDF Downloads 2754414 Presenting an Integrated Framework for the Introduction and Evaluation of Social Media in Enterprises
Authors: Gerhard Peter
Abstract:
In this paper, we present an integrated framework that governs the introduction of social media into enterprises and its evaluation. It is argued that the framework should address the following issues: (1) the contribution of social media for increasing efficiency and improving the quality of working life; (2) the level on which this contribution happens (i.e., individual, team, or organisation); (3) a description of the processes for implementing and evaluating social media; and the role of (4) organisational culture and (5) management. We also report the results of a case study where the framework has been employed to introduce a social networking platform at a German enterprise. This paper only considers the internal use of social media.Keywords: case study, enterprise 2.0, framework, introducing and evaluating social media, social media
Procedia PDF Downloads 3674413 Fashion Appropriation: A Study in Awareness of Crossing Cultural Boundaries in Design
Authors: Anahita Suri
Abstract:
Myriad cultures form the warp and weft of the fabric of this world. The last century saw mass migration of people across geographical boundaries, owing to industrialization and globalization. These people took with them their cultures, costumes, traditions, and folklore, which mingled with the local cultures to create something new and place it in a different context to make it contemporary. With the surge in population and growth of the fashion industry, there has been an increasing demand for innovative and individual fashion, from street markets to luxury brands. Exhausted by local influences, designers take inspiration from the so called ‘low’ culture and create artistic products, place it in a different context, and the end-product is categorized as ‘high’ culture. It is challenging as to why a design/culture is ‘high’ or ‘low’. Who decides which works, practices, activities, etc., are ‘high’ and which are ‘low’? The justification for this distinction is often found not in the design itself but the context attached to it. Also, the concept of high/ low is relative to time- what is ‘high’ today can be ‘low’ tomorrow and ‘high’ again the day after. This raises certain concerns. Firstly, it is sad that a culture which offers inspiration is looked down upon as ‘low’ culture. Secondly, it is ironic because the so designated ‘high’ culture is a manipulation of the truth from the authentic ‘low’ culture, which is capable of true expression. When you borrow from a different culture, you pretend to be authentic because you actually are not. Finally, it is important to be aware of crossing cultural boundaries and the context attached to a design/product so as to use it a responsible way that communicates the design without offending anyone. Is it ok for a person’s cultural identity to become another person’s fashion accessory? This essay explores the complex, multi-layered subject of fashion appropriation and aims to provoke debate over cultural ‘borrowing’ and create awareness that commodification of cultural symbols and iconography in fashion is inappropriate and offensive and not the same as ‘celebrating cultural differences’.Keywords: context, culture, fashion appropriation, inoffensive, responsible
Procedia PDF Downloads 1244412 Resource Management Framework in Cloud Computing
Authors: Gagandeep Kaur, Sonal Chawla
Abstract:
In a Cloud Computing environment, resource provisioning, resource allocation and resource scheduling is the most complex issues these days. Cloud User expects the best resource utilization and Cloud Provider expects revenue maximization by considering budget and time constraints. In this research paper, Resource Management Framework has been proposed to allocate the resources to Cloud Users and Cloud Providers in Cloud environment. The main aim of the proposed work is to provide the resources and services to Cloud Providers and Cloud Users in an efficient and effective manner. The proposed framework has been simulated and tested using the CloudSim simulator tool.Keywords: cloud computing, resource allocation, auction, provisioning
Procedia PDF Downloads 1494411 Water Supply and Demand Analysis for Ranchi City under Climate Change Using Water Evaluation and Planning System Model
Authors: Pappu Kumar, Ajai Singh, Anshuman Singh
Abstract:
There are different water user sectors such as rural, urban, mining, subsistence and commercial irrigated agriculture, commercial forestry, industry, power generation which are present in the catchment in Subarnarekha River Basin and Ranchi city. There is an inequity issue in the access to water. The development of the rural area, construction of new power generation plants, along with the population growth, the requirement of unmet water demand and the consideration of environmental flows, the revitalization of small-scale irrigation schemes is going to increase the water demands in almost all the water-stressed catchment. The WEAP Model was developed by the Stockholm Environment Institute (SEI) to enable evaluation of planning and management issues associated with water resources development. The WEAP model can be used for both urban and rural areas and can address a wide range of issues including sectoral demand analyses, water conservation, water rights and allocation priorities, river flow simulation, reservoir operation, ecosystem requirements and project cost-benefit analyses. This model is a tool for integrated water resource management and planning like, forecasting water demand, supply, inflows, outflows, water use, reuse, water quality, priority areas and Hydropower generation, In the present study, efforts have been made to access the utility of the WEAP model for water supply and demand analysis for Ranchi city. A detailed works have been carried out and it was tried to ascertain that the WEAP model used for generating different scenario of water requirement, which could help for the future planning of water. The water supplied to Ranchi city was mostly contributed by our study river, Hatiya reservoir and ground water. Data was collected from various agencies like PHE Ranchi, census data of 2011, Doranda reservoir and meteorology department etc. This collected and generated data was given as input to the WEAP model. The model generated the trends for discharge of our study river up to next 2050 and same time also generated scenarios calculating our demand and supplies for feature. The results generated from the model outputs predicting the water require 12 million litter. The results will help in drafting policies for future regarding water supplies and demands under changing climatic scenarios.Keywords: WEAP model, water demand analysis, Ranchi, scenarios
Procedia PDF Downloads 4194410 The First Japanese-Japanese Dictionary for Non-Japanese Using the Defining Vocabulary
Authors: Minoru Moriguchi
Abstract:
This research introduces the concept of a monolingual Japanese dictionary for non-native speakers of Japanese, whose temporal title is Dictionary of Contemporary Japanese for Advanced Learners (DCJAL). As the language market is very small compared with English, a monolingual Japanese dictionary for non-native speakers, containing sufficient entries, has not been published yet. In such a dictionary environment, Japanese-language learners are using bilingual dictionaries or monolingual Japanese dictionaries for Japanese people. This research started in 2017, as a project team which consists of four Japanese and two non-native speakers, all of whom are linguists of the Japanese language. The team has been trying to propose the concept of a monolingual dictionary for non-native speakers of Japanese and to provide the entry list, the definition samples, the list of defining vocabulary, and the writing manual. As the result of seven-year research, DCJAL has come to have 28,060 head words, 539 entry examples, 4,598-word defining vocabulary, and the writing manual. First, the number of the entry was determined as about 30,000, based on an experimental method using existing six dictionaries. To make the entry list satisfying this number, words suitable for DCJAL were extracted from the Tsukuba corpus of the Japanese language, and later the entry list was adjusted according to the experience as Japanese instructor. Among the head words of the entry list, 539 words were selected and added with lexicographical information such as proficiency level, pronunciation, writing system (hiragana, katakana, kanji, or alphabet), definition, example sentences, idiomatic expression, synonyms, antonyms, grammatical information, sociolinguistic information, and etymology. While writing the definition of the above 539 words, the list of the defining vocabulary was constructed, based on frequent vocabulary used in a Japanese monolingual dictionary. Although the concept of DCJAL has been almost perfected, it may need some more adjustment, and the research is continued.Keywords: monolingual dictionary, the Japanese language, non-native speaker of Japanese, defining vocabulary
Procedia PDF Downloads 414409 Case-Based Reasoning Approach for Process Planning of Internal Thread Cold Extrusion
Authors: D. Zhang, H. Y. Du, G. W. Li, J. Zeng, D. W. Zuo, Y. P. You
Abstract:
For the difficult issues of process selection, case-based reasoning technology is applied to computer aided process planning system for cold form tapping of internal threads on the basis of similarity in the process. A model is established based on the analysis of process planning. Case representation and similarity computing method are given. Confidence degree is used to evaluate the case. Rule-based reuse strategy is presented. The scheme is illustrated and verified by practical application. The case shows the design results with the proposed method are effective.Keywords: case-based reasoning, internal thread, cold extrusion, process planning
Procedia PDF Downloads 5104408 Rival Conceptions of Sovereignty in Modern South Asian Political Thought: An Analysis Through the Writings of Maulana Syed Abul Ala Maududi and Maulana Hifzurrahman Seoharvi
Authors: Mohammad Saif
Abstract:
In the post-Westphalianworld order, the concept of sovereignty has been a fundamental area of inquiry in Political Science, International Relations, and International Law. Modern Islamic political thought has also dedicated a fair share of debate on the subject. The debate fundamentally revolves around the ‘ontological differentiation’ between western and Islamic political thought. While the centrality of the individual in western political thought regards the individual as the center of universe, Islamic Political thought provides that space to God. The modern liberal democratic principles suggest sovereignty as one of the major attributes of modern nation state; Islamists regard sovereignty as an attribute of God. However, the position regarding God’ssovereignty in Islamic political thought is not coherent in conception. Some scholars regard such a position as ‘the political interpretation of Islam’. This paper is an attempt to first analyze the fundamental discord between two rival political ideologies (western and Islamic), and then forward a debate on the subject of sovereignty in South Asian Islamic Political thought, particularly between Syed Abul Ala Maududi (ideological father of modern islamist movements) andHifzurrahmanSeoharvi (lesser known in Academia but highly influential in shaping Deobandi position of principles related to political nature of Islamic theology). Maududi regardssovereignty as an attribute of God and the rulers as subservient to Gods will, Seoharvi suggests that God's sovereignty does not entail that the caliph or amir cannot be a ruler or hakim, nor can his command or hukum be an order. Certain references have also been made to contemporary scholars like Sayidd Qutub, Rashid al Ghanouchi, who in one way or the other have contributed to the debate on ‘sovereignty in Islamic thought’.Keywords: nation state, sovereigty, sovereignty of God (Hakimmiyah), deoband
Procedia PDF Downloads 1784407 Students and Teachers Perceptions about Interactive Learning in Teaching Health Promotion Course: Implication for Nursing Education and Practice
Authors: Ahlam Alnatour
Abstract:
Background: To our knowledge, there is lack of studies that describe the experience of studying health promotion courses using an interactive approach, and compare students’ and teachers perceptions about this method of teaching. The purpose of this study is to provide a comparison between student and teacher experiences and perspectives in learning health promotion course using interactive learning. Design: A descriptive qualitative design was used to provide an in-depth description and understanding of students’ and teachers experiences and perceptions of learning health promotion courses using an interactive learning. Study Participants: About 14 fourteen students (seven male, seven female) and eight teachers at governmental university in northern Jordan participated in this study. Data Analysis: Conventional content analysis approach was used for participants’ scripts to gain an in-depth description for both students' and teacher’s experiences. Results: The main themes emerged from the data analysis describing the students’ and teachers perceptions of the interactive health promotion class: teachers’ and students positive experience in adopting interactive learning, advantages and benefits of interactive teaching, barriers to interactive teaching, and suggestions for improvement. Conclusion: Both teachers and students reflected positive attitudes toward interactive learning. Interactive learning helped to engage in learning process physically and cognitively. Interactive learning enhanced learning process, promote student attention, enhanced final performance, and satisfied teachers and students accordingly. Interactive learning approach should be adopted in teaching graduate and undergraduate courses using updated and contemporary strategies. Nursing scholars and educators should be motivated to integrate interactive learning in teaching different nursing courses.Keywords: interactive learning, nursing, health promotion, qualitative study
Procedia PDF Downloads 2504406 Mnemotopic Perspectives: Communication Design as Stabilizer for the Memory of Places
Authors: C. Galasso
Abstract:
The ancestral relationship between humans and geographical environment has long been at the center of an interdisciplinary dialogue, which sees one of its main research nodes in the relationship between memory and places. Given its deep complexity, this symbiotic connection continues to look for a proper definition that appears increasingly negotiated by different disciplines. Numerous fields of knowledge are involved, from anthropology to semiotics of space, from photography to architecture, up to subjects traditionally far from these reasonings. This is the case of Design of Communication, a young discipline, now confident in itself and its objectives, aimed at finding and investigating original forms of visualization and representation, between sedimented knowledge and new technologies. In particular, Design of Communication for the Territory offers an alternative perspective to the debate, encouraging the reactivation and reconstruction of the memory of places. Recognizing mnemotopes as a cultural object of vertical interpretation of the memory-place relationship, design can become a real mediator of the territorial fixation of memories, making them increasingly accessible and perceptible, contributing to build a topography of memory. According to a mnemotopic vision, Communication Design can support the passage from a memory in which the observer participates only as an individual to a collective form of memory. A mnemotopic form of Communication Design can, through geolocation and content map-based systems, make chronology a topography rooted in the territory and practicable; it can be useful to understand how the perception of the memory of places changes over time, considering how to insert them in the contemporary world. Mnemotopes can be materialized in different format of translation, editing and narration and then involved in complex systems of communication. The memory of places, therefore, if stabilized by the tools offered by Communication Design, can make visible ruins and territorial stratifications, illuminating them with new communicative interests that can be shared and participated.Keywords: memory of places, design of communication, territory, mnemotope, topography of memory
Procedia PDF Downloads 1324405 Profiling Risky Code Using Machine Learning
Authors: Zunaira Zaman, David Bohannon
Abstract:
This study explores the application of machine learning (ML) for detecting security vulnerabilities in source code. The research aims to assist organizations with large application portfolios and limited security testing capabilities in prioritizing security activities. ML-based approaches offer benefits such as increased confidence scores, false positives and negatives tuning, and automated feedback. The initial approach using natural language processing techniques to extract features achieved 86% accuracy during the training phase but suffered from overfitting and performed poorly on unseen datasets during testing. To address these issues, the study proposes using the abstract syntax tree (AST) for Java and C++ codebases to capture code semantics and structure and generate path-context representations for each function. The Code2Vec model architecture is used to learn distributed representations of source code snippets for training a machine-learning classifier for vulnerability prediction. The study evaluates the performance of the proposed methodology using two datasets and compares the results with existing approaches. The Devign dataset yielded 60% accuracy in predicting vulnerable code snippets and helped resist overfitting, while the Juliet Test Suite predicted specific vulnerabilities such as OS-Command Injection, Cryptographic, and Cross-Site Scripting vulnerabilities. The Code2Vec model achieved 75% accuracy and a 98% recall rate in predicting OS-Command Injection vulnerabilities. The study concludes that even partial AST representations of source code can be useful for vulnerability prediction. The approach has the potential for automated intelligent analysis of source code, including vulnerability prediction on unseen source code. State-of-the-art models using natural language processing techniques and CNN models with ensemble modelling techniques did not generalize well on unseen data and faced overfitting issues. However, predicting vulnerabilities in source code using machine learning poses challenges such as high dimensionality and complexity of source code, imbalanced datasets, and identifying specific types of vulnerabilities. Future work will address these challenges and expand the scope of the research.Keywords: code embeddings, neural networks, natural language processing, OS command injection, software security, code properties
Procedia PDF Downloads 1074404 Teaching Material, Books, Publications versus the Practice: Myths and Truths about Installation and Use of Downhole Safety Valve
Authors: Robson da Cunha Santos, Caio Cezar R. Bonifacio, Diego Mureb Quesada, Gerson Gomes Cunha
Abstract:
The paper is related to the safety of oil wells and environmental preservation on the planet, because they require great attention and commitment from oil companies and people who work with these equipments. This must occur from drilling the well until it is abandoned in order to safeguard the environment and prevent possible damage. The project had as main objective the constitution resulting from comparatives made among books, articles and publications with information gathered in technical visits to operational bases of Petrobras. After the visits, the information from methods of utilization and present managements, which were not available before, became available to the general audience. As a result, it is observed a huge flux of incorrect and out-of-date information that comprehends not only bibliographic archives, but also academic resources and materials. During the gathering of more in-depth information on the manufacturing, assembling, and use aspects of DHSVs, several issues that were previously known as correct, customary issues were discovered to be uncertain and outdated. Information of great importance resulted in affirmations about subjects as the depth of the valve installation that was before installed to 30 meters from the seabed (mud line). Despite this, the installation should vary in conformity to the ideal depth to escape from area with the biggest tendency to hydrates formation according to the temperature and pressure. Regarding to valves with nitrogen chamber, in accordance with books, they have their utilization linked to water line ≥ 700 meters, but in Brazilian exploratory fields, their use occurs from 600 meters of water line. The valves used in Brazilian fields are able to be inserted to the production column and self-equalizing, but the use of screwed valve in the column of production and equalizing is predominant. Although these valves are more expensive to acquire, they are more reliable, efficient, with a bigger shelf life and they do not cause restriction to the fluid flux. It follows that based on researches and theoretical information confronted to usual forms used in fields, the present project is important and relevant. This project will be used as source of actualization and information equalization that connects academic environment and real situations in exploratory situations and also taking into consideration the enrichment of precise and easy to understand information to future researches and academic upgrading.Keywords: down hole safety valve, security devices, installation, oil-wells
Procedia PDF Downloads 2704403 Actresses as Eunuchs: The Versatility of Cross-Gendered Roles in Eighteenth-Century Orientalist Theatre
Authors: Anne Greenfield
Abstract:
Introductory Statement: During the eighteenth century in London, there were over two dozen theatrical productions that featured eunuchoid characters, most of which were set in 'Eastern' locales, including the Ottoman Empire, Persia, India, and China. These characters have gone largely overlooked by recent scholars, and more analysis is needed in order to illustrate the contemporary values and anxieties reflected in these popular and recurring figures at the time. Methodology: This paper adopts a New Historical and Cultural Studies approach to the subject of theatrical depictions of eunuchs, drawing insights from seventeenth- and eighteenth-century literary works, travel narratives, medical treatises, and histories of the age. Major Findings: As this paper demonstrates, there was a high degree of complexity, variety, and -at times- respect underlying orientalist theatrical depictions of eunuchs. Not only were eunuchoid characters represented in strikingly diverse ways in scripts, but these roles were also played by a heterogeneous group of actors and even actresses. More specifically, this paper looks closely at three actresses who took roles as eunuchs in tragedies: Mrs. Verbruggen (aka Mrs. Mountfort), Mrs. Rogers, and Mrs. Bicknell—all of whom were otherwise best known as comediennes. These casting choices provided an entertaining twist on the breeches roles these actresses often played. In fact, the staging and scripting of these roles, when analyzed through the lens of these cross-gendered roles, becomes ironic and comical in several scenes that are usually assumed (by recent scholars) to be thoroughly tragic. Conclusion: Ultimately, a careful look at the staging of eunuchoid characters sheds light on not only how these productions were performed and understood, but also on how writers and theatre managers navigated the Other, whether in gender identity or culture, during this era.Keywords: eunuch, actress, literature, drama
Procedia PDF Downloads 1344402 KBASE Technological Framework - Requirements
Authors: Ivan Stanev, Maria Koleva
Abstract:
Automated software development issues are addressed in this paper. Layers and packages of a Common Platform for Automated Programming (CPAP) are defined based on Service Oriented Architecture, Cloud computing, Knowledge based automated software engineering (KBASE) and Method of automated programming. Tools of seven leading companies (AWS of Amazon, Azure of Microsoft, App Engine of Google, vCloud of VMWare, Bluemix of IBM, Helion of HP, OCPaaS of Oracle) are analyzed in the context of CPAP. Based on the results of the analysis CPAP requirements are formulatedKeywords: automated programming, cloud computing, knowledge based software engineering, service oriented architecture
Procedia PDF Downloads 3014401 Municipal Solid Waste Management and Analysis of Waste Generation: A Case Study of Bangkok, Thailand
Authors: Pitchayanin Sukholthaman
Abstract:
Gradually accumulated, the enormous amount of waste has caused tremendous adverse impacts to the world. Bangkok, Thailand, is chosen as an urban city of a developing country having coped with serious MSW problems due to the vast amount of waste generated, ineffective and improper waste management problems. Waste generation is the most important factor for successful planning of MSW management system. Thus, the prediction of MSW is a very important role to understand MSW distribution and characteristic; to be used for strategic planning issues. This study aims to find influencing variables that affect the amount of Bangkok MSW generation quantity.Keywords: MSW generation, MSW quantity prediction, MSW management, multiple regression, Bangkok
Procedia PDF Downloads 4214400 The Determinants and Effects of R&D Outsourcing in Korean Manufacturing Firm
Authors: Sangyun Han, Minki Kim
Abstract:
R&D outsourcing is a strategy for acquiring the competitiveness of firms as an open innovation strategy. As increasing total R&D investment of firms, the ratio of amount of R&D outsourcing in it is also increased in Korea. In this paper, we investigate the determinants and effects of R&D outsourcing of firms. Through analyzing the determinants of R&D outsourcing and effect on firm’s performance, we can find some academic and politic issues. Firstly, in the point of academic view, distinguishing the determinants of R&D outsourcing is linked why the firms do open innovation. It can be answered resource based view, core competence theory, and etc. Secondly, we can get some S&T politic implication for transferring the public intellectual properties to private area. Especially, for supporting the more SMEs or ventures, government can get the basement and the reason why and how to make the policies.Keywords: determinants, effects, R&D, outsourcing
Procedia PDF Downloads 5064399 The Job of Rhetoric in Public Relations Practice
Authors: Talal Alqahtani
Abstract:
For all institutions, either public or private, communication is important now more than ever. This is because the importance of communication has grown over the years, and it has the ability to either break or make an organization. With globalization, the changing technology, and other emergent issues that affect organizations, the communication given out has had to be better, sharper, and both proactive and reactive. This is the reason why the importance of public relations has been on the increase. Institutions realize the importance of having a good image and having public relations experts who can effectively manage communication in an institution easily in times of crisis. Public relations itself is not, however, effective, and this has led to the adoption of rhetoric in communication. Rhetoric use has had a long transformation because, in the past, it was only used in politics. Rhetoric in communication has come to be appreciated and adopted by many diverse fields and sectors. This study looks at the job of rhetoric in public relations practice and how it can identify with the administration of an institution's notoriety.Keywords: communication, notoriety, rhetoric, public relation
Procedia PDF Downloads 2344398 Effects of Irregular Migration from Different Aspects of Security
Authors: Muzaffer Topgul, Hasan Atac
Abstract:
In case of explaining the migration concept, although it is not a new phenomenon, it is easy to understand that communities have migrated for variety of reasons such as natural disasters, famine, wars, economic problems, and several theories have been put forth to define and find solution for migration within its changing nature. Examining of migration theories denotes that the circumstances under which they appear reflect political, social, and economic conditions of the age they appear. In this day and time, security is considered not only from military perspective but also from economic, political, sociological dimensions. Based on the changing security environment new impacts of migration has occurred; the migration is proceed to be conferred as a type of war, qualified as a transnational crime because of its outcomes and interpreted in a different dimension owing to its effects on the health and education areas. Social security dimension in the context of expanding concept of security; when dealing with the safety of people and social groups with the assumption that national unity and identity are threatened, it sees immigrants as a source of threat. The human security assesses the safety of individuals in terms of survival and quality of life. Changes in the standard of living under the influence of immigrants and possible terrorist acts can be seen as a threat source in this type of security. Economic security of the individuals and the regional changes at the micro level created by the immigrants are covered issues of economic security. Due to the factors such as terrorism and civil war, the increasing numbers of displaced people who have taken refugee status affect the countries, whether it is near or far to the crisis areas, in the new and different dimensions of security day by day. In this study, the term of immigration through the eyes of national and international law will be evaluated, the place of the irregular and illegal immigration in the changing security sphere will be revealed and the effects of the irregular migration to short-term, mid-term and long-term security issues will be assessed through human and social security aspects. In order to analyze the threats for the human security; the parameters such as living conditions of the immigrants, the ratio of the genders, birth rate occasions, the education circumstances of the immigrant children and the effects of the illegal passing on the public order will be evaluated. The outcomes of the problem areas for the human security and the demographic alteration resulting from the human flow of displaced people will be discussed thorough social security extent. The fizzling economic diversity, which has shown up by irregular migration, will be presented within the scope of economic dimension of security.Keywords: irregular migration, the changing dimensions of security, human security, social security
Procedia PDF Downloads 3364397 Parametric Appraisal of Robotic Arc Welding of Mild Steel Material by Principal Component Analysis-Fuzzy with Taguchi Technique
Authors: Amruta Rout, Golak Bihari Mahanta, Gunji Bala Murali, Bibhuti Bhusan Biswal, B. B. V. L. Deepak
Abstract:
The use of industrial robots for performing welding operation is one of the chief sign of contemporary welding in these days. The weld joint parameter and weld process parameter modeling is one of the most crucial aspects of robotic welding. As weld process parameters affect the weld joint parameters differently, a multi-objective optimization technique has to be utilized to obtain optimal setting of weld process parameter. In this paper, a hybrid optimization technique, i.e., Principal Component Analysis (PCA) combined with fuzzy logic has been proposed to get optimal setting of weld process parameters like wire feed rate, welding current. Gas flow rate, welding speed and nozzle tip to plate distance. The weld joint parameters considered for optimization are the depth of penetration, yield strength, and ultimate strength. PCA is a very efficient multi-objective technique for converting the correlated and dependent parameters into uncorrelated and independent variables like the weld joint parameters. Also in this approach, no need for checking the correlation among responses as no individual weight has been assigned to responses. Fuzzy Inference Engine can efficiently consider these aspects into an internal hierarchy of it thereby overcoming various limitations of existing optimization approaches. At last Taguchi method is used to get the optimal setting of weld process parameters. Therefore, it has been concluded the hybrid technique has its own advantages which can be used for quality improvement in industrial applications.Keywords: robotic arc welding, weld process parameters, weld joint parameters, principal component analysis, fuzzy logic, Taguchi method
Procedia PDF Downloads 1794396 Assessment of Pakistan-China Economic Corridor: An Emerging Dynamic of 21st Century
Authors: Naad-E-Ali Sulehria
Abstract:
Pakistan and china have stepped in a new phase of strengthening fraternity as the dream of economic corridor once discerned by both countries is going to take a pragmatic shape. Pak-China economic corridor an under construction program is termed to be an emerging dynamic of 21st century that anticipates a nexus between Asian continent and Indian Ocean by extending its functions to adjoining East, South, Central and Western Asian regions. The $45.6 billion worth heavily invested megaprojects by China are meant to revive energy sector and building economic infrastructure in Pakistan. Evidently, these projects are a part of ‘southern extension’ of Silk Road economic belt which is going to draw out prominent incentives for both countries particularly bolstering China to acquire influential dominance over the regional trade and beyond. In pursuit to adhere, by these progressive plans both countries have began working on their respective assignments. This article discusses the economical development programs under China’s peripheral diplomacy regarding its region-specific-approach to accumulate trade of Persian Gulf and access the landlocked Central Asian states through Pakistan in a sublimate context to break US encirclement of Asia. Pakistan’s utmost preference to utilize its strategic channel as a trade hub to become an emerging economy and surpass its arch-rival India for strategic concerns is contemplated accordingly. The needs and feasibility of the economic gateway and the dividends it can provide in the contemporary scenario are examined carefully and analysis is drawn upon the future prospects of the Pakistan-China Economic corridor once completed.Keywords: pak-china economic corridor (PCEC), central asian republic states (CARs), new silk road economic belt, gawadar
Procedia PDF Downloads 3674395 “Japan’s New Security Outlook: Implications for the US-Japan Alliance”
Authors: Agustin Maciel-Padilla
Abstract:
This paper explores the most significant change to Japan’s security strategy since the end of World War II, in particular Prime Minister Fumio Kishida’s government publication, in late 2022, of 3 policy documents (the National Security Strategy [NSS], the National Defense Strategy and the Defense Buildup Program) that basically propose to expand the country’s military capabilities and to increase military spending over a 5-year period. These policies represent a remarkable transformation of Japan’s defense-oriented policy followed since 1946. These proposals have been under analysis and debate since they were announced, as it was also Japan’s historic ambition to strengthening its deterrence capabilities in the context of a more complex regional security environment. Even though this new defense posture has attracted significant international attention, it is far from representing a done deal because of the fact that there is still a long way to go to implement this vision because of a wide variety of political and economic issues. Japan is currently experiencing the most dangerous security environment since the end of World War II, and this situation led Japan to intensify its dialogue with the United States to reflect a re-evaluation of deterrence in the face of a rapidly worsening security environment, a changing balance of power in East Asia, and the arrival of a new era of “great power competition”. Japan’s new documents, for instance, identify China and North Korea’s as posing, respectively, a strategic challenge and an imminent threat. Japan has also noted that Russia’s invasion of Ukraine has contributed to erode the foundation of the international order. It is considered that Russia’s aggression was possible because Ukraine’s defense capability was not enough for effective deterrence. Moreover, Japan’s call for “counterstrike capabilities” results from a recognition that China and North Korea’s ballistic and cruise missiles could overwhelm Japan’s air and missile defense systems, and therefore there is an urgent need to strengthen deterrence and resilience. In this context, this paper will focus on the impact of these changes on the US-Japan alliance. Adapting this alliance to Tokyo’s new ambitions and capabilities could be critical in terms of updating their traditional protection/access to bases arrangement, interoperability and joint command and control issues, as well as regarding the security–economy nexus. While China is Japan’s largest trading partner, and trade between the two has been growing, US-Japan economic relationship has been slower, notwithstanding the fact that US-Japan security cooperation has strengthened significantly in recent years.Keywords: us-japan alliance, japan security, great power competition, interoperability
Procedia PDF Downloads 654394 Exploration and Evaluation of the Effect of Multiple Countermeasures on Road Safety
Authors: Atheer Al-Nuaimi, Harry Evdorides
Abstract:
Every day many people die or get disabled or injured on roads around the world, which necessitates more specific treatments for transportation safety issues. International road assessment program (iRAP) model is one of the comprehensive road safety models which accounting for many factors that affect road safety in a cost-effective way in low and middle income countries. In iRAP model road safety has been divided into five star ratings from 1 star (the lowest level) to 5 star (the highest level). These star ratings are based on star rating score which is calculated by iRAP methodology depending on road attributes, traffic volumes and operating speeds. The outcome of iRAP methodology are the treatments that can be used to improve road safety and reduce fatalities and serious injuries (FSI) numbers. These countermeasures can be used separately as a single countermeasure or mix as multiple countermeasures for a location. There is general agreement that the adequacy of a countermeasure is liable to consistent losses when it is utilized as a part of mix with different countermeasures. That is, accident diminishment appraisals of individual countermeasures cannot be easily added together. The iRAP model philosophy makes utilization of a multiple countermeasure adjustment factors to predict diminishments in the effectiveness of road safety countermeasures when more than one countermeasure is chosen. A multiple countermeasure correction factors are figured for every 100-meter segment and for every accident type. However, restrictions of this methodology incorporate a presumable over-estimation in the predicted crash reduction. This study aims to adjust this correction factor by developing new models to calculate the effect of using multiple countermeasures on the number of fatalities for a location or an entire road. Regression models have been used to establish relationships between crash frequencies and the factors that affect their rates. Multiple linear regression, negative binomial regression, and Poisson regression techniques were used to develop models that can address the effectiveness of using multiple countermeasures. Analyses are conducted using The R Project for Statistical Computing showed that a model developed by negative binomial regression technique could give more reliable results of the predicted number of fatalities after the implementation of road safety multiple countermeasures than the results from iRAP model. The results also showed that the negative binomial regression approach gives more precise results in comparison with multiple linear and Poisson regression techniques because of the overdispersion and standard error issues.Keywords: international road assessment program, negative binomial, road multiple countermeasures, road safety
Procedia PDF Downloads 2404393 Technology Assessment: Exploring Possibilities to Encounter Problems Faced by Intellectual Property through Blockchain
Authors: M. Ismail, E. Grifell-Tatjé, A. Paz
Abstract:
A significant discussion on the topic of blockchain as a solution to the issues of intellectual property highlights the relevance that this topic holds. Some experts label this technology as destructive since it holds immense potential to change course of traditional practices. The extent and areas to which this technology can be of use are still being researched. This paper provides an in-depth review on the intellectual property and blockchain technology. Further it explores what makes blockchain suitable for intellectual property, the practical solutions available and the support different governments are offering. This paper further studies the framework of universities in context of its outputs and how can they be streamlined using blockchain technology. The paper concludes by discussing some limitations and future research question.Keywords: blockchain, decentralization, open innovation, intellectual property, patents, university-industry relationship
Procedia PDF Downloads 1854392 Experiences of Discrimination and Coping Strategies of Second Generation Academics during the Career-Entry Phase in Austria
Authors: R. Verwiebe, L. Seewann, M. Wolf
Abstract:
This presentation addresses marginalization and discrimination as experienced by young academics with a migrant background in the Austrian labor market. Focusing on second generation academics of Central Eastern European and Turkish descent we explore two major issues. First, we ask whether their career-entry and everyday professional life entails origin-specific barriers. As educational residents, they show competences which, when lacking, tend to be drawn upon to explain discrimination: excellent linguistic skills, accredited high-level training, and networks. Second, we concentrate on how this group reacts to discrimination and overcomes experiences of marginalization. To answer these questions, we utilize recent sociological and social psychological theories that focus on the diversity of individual experiences. This distinguishes us from a long tradition of research that has dealt with the motives that inform discrimination, but has less often considered the effects on those concerned. Similarly, applied coping strategies have less often been investigated, though they may provide unique insights into current problematic issues. Building upon present literature, we follow recent discrimination research incorporating the concepts of ‘multiple discrimination’, ‘subtle discrimination’, and ‘visual social markers’. 21 problem-centered interviews are the empirical foundation underlying this study. The interviewees completed their entire educational career in Austria, graduated in different universities and disciplines and are working in their first post-graduate jobs (career entry phase). In our analysis, we combined thematic charting with a coding method. The results emanating from our empirical material indicated a variety of discrimination experiences ranging from barely perceptible disadvantages to directly articulated and overt marginalization. The spectrum of experiences covered stereotypical suppositions at job interviews, the disavowal of competencies, symbolic or social exclusion by new colleges, restricted professional participation (e.g. customer contact) and non-recruitment due to religious or ethnical markers (e.g. headscarves). In these experiences the role of the academics education level, networks, or competences seemed to be minimal, as negative prejudice on the basis of visible ‘social markers’ operated ‘ex-ante’. The coping strategies identified in overcoming such barriers are: an increased emphasis on effort, avoidance of potentially marginalizing situations, direct resistance (mostly in the form of verbal opposition) and dismissal of negative experiences by ignoring or ironizing the situation. In some cases, the academics drew into their specific competences, such as an intellectual approach of studying specialist literature, focus on their intercultural competences or planning to migrate back to their parent’s country of origin. Our analysis further suggests a distinction between reactive (i.e. to act on and respond to experienced discrimination) and preventative strategies (applied to obviate discrimination) of coping. In light of our results, we would like to stress that the tension between educational and professional success experienced by academics with a migrant background – and the barriers and marginalization they continue to face – are essential issues to be introduced to socio-political discourse. It seems imperative to publicly accentuate the growing social, political and economic significance of this group, their educational aspirations, as well as their experiences of achievement and difficulties.Keywords: coping strategies, discrimination, labor market, second generation university graduates
Procedia PDF Downloads 2214391 Revealing Celtic and Norse Mythological Depths through Dragon Age’s Tattoos and Narratives
Authors: Charles W. MacQuarrie, Rachel R. Tatro Duarte
Abstract:
This paper explores the representation of medieval identity within the world of games such as Dragon Age, Elden Ring, Hellblade: Senua’s sacrifice, fantasy role-playing games that draw effectively and problematically on Celtic and Norse mythologies. Focusing on tattoos, onomastics, and accent as visual and oral markers of status and ethnicity, this study analyzes how the game's interplay between mythology, character narratives, and visual storytelling enriches the themes and offers players an immersive, but sometimes baldly ahistorical, connection to ancient mythologies and contemporary digital storytelling. Dragon Age is a triple a game series, Hellblade Senua’s Sacrifice, and Elden Ring of gamers worldwide with its presentation of an idealized medieval world, inspired by the lore of Celtic and Norse mythologies. This paper sets out to explore the intricate relationships between tattoos, accent, and character narratives in the game, drawing parallels to themes,heroic figures and gods from Celtic and Norse mythologies. Tattoos as Mythic and Ethnic Markers: This study analyzes how tattoos in Dragon Age visually represent mythological elements from both Celtic and Norse cultures, serving as conduits of cultural identity and narratives. The nature of these tattoos reflects the slave, criminal, warrior associations made in classical and medieval literature, and some of the episodes concerning tattoos in the games have either close analogs or sources in literature. For example the elvish character Solas, in Dragon Age Inquisition, removes a slave tattoo from the face of a lower status elf in an episode that is reminiscent of Bridget removing the stigmata from Connallus in the Vita Prima of Saint Bridget Character Narratives: The paper examines how characters' personal narratives in the game parallel the archetypal journeys of Celtic heroes and Norse gods, with a focus on their relationships to mythic themes. In these games the Elves usually have Welsh or Irish accents, are close to nature, magically powerful, oppressed by apparently Anglo-Saxon humans and Norse dwarves, and these elves wear facial tattoos. The Welsh voices of fairies and demons is older than the reference in Shakespeare’s Merry Wives of Windsor or even the Anglo-Saxon Life of Saint Guthlac. The English speaking world, and the fantasy genre of literature and gaming, undoubtedly driven by Tolkien, see Elves as Welsh speakers, and as having Welsh accents when speaking English Comparative Analysis: A comparative approach is employed to reveal connections, adaptations, and unique interpretations of the motifs of tattoos and narrative themes in Dragon Age, compared to those found in Celtic and Norse mythologies. Methodology: The study uses a comparative approach to examine the similarities and distinctions between Celtic and Norse mythologies and their counterparts in video games. The analysis encompasses character studies, narrative exploration, visual symbolism, and the historical context of Celtic and Norse cultures. Mythic Visuals: This study showcases how tattoos, as visual symbols, encapsulate mythic narratives, beliefs, and cultural identity, echoing Celtic and Norse visual motifs. Archetypal Journeys: The paper analyzes how character arcs mirror the heroic journeys of Celtic and Norse mythological figures, allowing players to engage with mythic narratives on a personal level. Cultural Interplay: The study discusses how the game's portrayal of tattoos and narratives both preserves and reinterprets elements from Celtic and Norse mythologies, fostering a connection between ancient cultures and modern digital storytelling. Conclusion: By exploring the interconnectedness of tattoos and character narratives in Dragon Age, this paper reveals the game series' ability to act as a bridge between ancient mythologies and contemporary gaming. By drawing inspiration from Celtic heroes and Norse gods and translating them into digital narratives and visual motifs, Dragon Age offers players a multi-dimensional engagement with mythic themes and a unique lens through which to appreciate the enduring allure of these cultures.Keywords: comparative analysis, character narratives, video games and literature, tattoos, immersive storytelling, character development, mythological influences, Celtic mythology, Norset mythology
Procedia PDF Downloads 704390 Sustainable Development: The Human Rights Approach to Environmental Protection in South Africa
Authors: CM van der Bank, Marjoné van der Bank
Abstract:
International and domestic environmental law has evolved quite rapidly in the last few decades. At the international level the Stockholm and Rio Declarations paved the way for a broad based consensus of the international community on environmental issues and principles. At the Domestic level also many states have incorporated environmental protection in their constitutions and even more states are doing the same at least in their domestic legislations. In this process of evolution environmental law has unleashed a number of novel principles such as; the participatory principle, the polluter pays principle, the precautionary principle, the inter-generational and intra-generational principles, the prevention principle, the sustainable development principle and so on.Keywords: environment, human rights, international law, protection
Procedia PDF Downloads 463