Search results for: architecture department in Islamic
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 4151

Search results for: architecture department in Islamic

2171 Appropriate Depth of Needle Insertion during Rhomboid Major Trigger Point Block

Authors: Seongho Jang

Abstract:

Objective: To investigate an appropriate depth of needle insertion during trigger point injection into the rhomboid major muscle. Methods: Sixty-two patients who visited our department with shoulder or upper back pain participated in this study. The distance between the skin and the rhomboid major muscle (SM) and the distance between the skin and rib (SB) were measured using ultrasonography. The subjects were divided into 3 groups according to BMI: BMI less than 23 kg/m2 (underweight or normal group); 23 kg/m2 or more to less than 25 kg/m2 (overweight group); and 25 kg/m2 or more (obese group). The mean ±standard deviation (SD) of SM and SB of each group were calculated. A range between mean+1 SD of SM and the mean-1 SD of SB was defined as a safe margin. Results: The underweight or normal group’s SM, SB, and the safe margin were 1.2±0.2, 2.1±0.4, and 1.4 to 1.7 cm, respectively. The overweight group’s SM and SB were 1.4±0.2 and 2.4±0.9 cm, respectively. The safe margin could not be calculated for this group. The obese group’s SM, SB, and the safe margin were 1.8±0.3, 2.7±0.5, and 2.1 to 2.2 cm, respectively. Conclusion: This study will help us to set the standard depth of safe needle insertion into the rhomboid major muscle in an effective manner without causing any complications.

Keywords: pneumothorax, rhomboid major muscle, trigger point injection, ultrasound

Procedia PDF Downloads 290
2170 Gendered Self-Expression and Muslim Medieval Women's Participation in the Creation and Production of Islam's Literary Heritage

Authors: Safa Moussoud

Abstract:

Contrary to modern misconceptions, women in the Muslim Middle Ages enjoyed a generous degree of liberty both in the public and private sphere. Poetry was a significant component of public life throughout the Muslim Civilization as its vitality and multi-generic nature acted as a way for medieval Muslims to communicate with each other. As such, a continuity of poetic literary heritage was preserved through multiple centuries and dynasties. This paper will argue that Muslim women were active participants in medieval Muslim society’s social and public sphere and therefore, can be seen as vital contributors to the intellectual and literary creation of the Muslim Civilization. This paper will examine poetry written by Safiyya al-Baghddadiya and Salma bint al-Qaratisi from the Abbasid period, as well as Wallada bint al-Mustakfi from the Andalusian period and focus particularly at the poetesses’ modes of self-expression regarding beauty and sexuality to argue that Medieval Muslim women enjoyed creative and literary liberty thus allowing them to proclaim their subjectivity publicly through poetry. By emphasizing women’s involvement in the social aspects of Medieval Muslim societies, this paper will ultimately urge for a more thorough investigation of Muslim women’s role and function in the making of the Muslim Civilization.

Keywords: Arabo-Islamic society, medieval Muslims, Muslim poetesses, self-expression

Procedia PDF Downloads 134
2169 An Investigation on Students’ Reticence in Iranian University EFL Classrooms

Authors: Azizeh Chalak, Firouzeh Baktash

Abstract:

Reticence is a prominent and complex phenomenon which occurs in foreign language classrooms and influences students’ oral passivity. The present study investigated the extent in which students experience reticence in the EFL classrooms and explored the underlying factors triggering reticence. The participants were 104 Iranian freshmen undergraduate male and female EFL students, who enrolled in listening and speaking courses, all majoring in English studying at Islamic Azad University Isfahan (Khorasgan) Branch and University of Isfahan, Isfahan, Iran. To collect the data, the Reticence Scale-12 (RS-12) questionnaire which measures the level of reticence consisting of six dimensions (anxiety, knowledge, timing, organization, skills, and memory) was administered to the participants. The statistical analyses showed that the reticent level was high among the Iranian EFL undergraduate students, and their major problems were feelings of anxiety and delivery skills. Moreover, the results revealed that factors such as low English proficiency, the teaching method, and lack of confidence contributed to the students’ reticence in Iranian EFL classrooms. It can be implied that language teachers’ awareness of learners’ reticence can help them choose more appropriate activities and provide a friendly environment enhancing hopefully more effective participation of EFL learners. The findings can have implications for EFL teachers, learners and policy makers.

Keywords: anxiety, Iranian EFL learners, reticence, reticence scale-12

Procedia PDF Downloads 498
2168 Critical Analysis of Media Discourse and the Politics of Self-Censorship in Afghanistan

Authors: Abdul Wahab Rahimi

Abstract:

This research examines the role of discursive strategies in the politics of self-censorship in Afghanistan, where political pressure, press freedom, and independent media work together, and language plays a vital role in implementing these strategies. Critical Discourse Analysis was conducted to describe the connection between language usage and the exercise of power by analyzing news stories related to women’s rights. This research focuses on 11 months of chronologically collected data from two mainstream television channels in Afghanistan: Tolo News and Ariana News. The findings show that Tolo News sustains and justifies juxtaposition and political critics’ discursive strategies to address women’s rights issues, criticize government policies, and deal with political pressure. At the same time, Ariana News follows the factual narrative strategy, practices self-censorship, and skips or partially focuses on the objective reporting of sensitive issues. The research concludes that the domestic media in Afghanistan follows the media policy of the Islamic Emirate of Afghanistan by covering sensitive issues and marginalizing women's rights issues in the media discourse.

Keywords: discursive strategies, Taliban, TV Channel, news stories, self-censorship, women's rights.

Procedia PDF Downloads 13
2167 Visual Improvement with Low Vision Aids in Children with Stargardt’s Disease

Authors: Anum Akhter, Sumaira Altaf

Abstract:

Purpose: To study the effect of low vision devices i.e. telescope and magnifying glasses on distance visual acuity and near visual acuity of children with Stargardt’s disease. Setting: Low vision department, Alshifa Trust Eye Hospital, Rawalpindi, Pakistan. Methods: 52 children having Stargardt’s disease were included in the study. All children were diagnosed by pediatrics ophthalmologists. Comprehensive low vision assessment was done by me in Low vision clinic. Visual acuity was measured using ETDRS chart. Refraction and other supplementary tests were performed. Children with Stargardt’s disease were provided with different telescopes and magnifying glasses for improving far vision and near vision. Results: Out of 52 children, 17 children were males and 35 children were females. Distance visual acuity and near visual acuity improved significantly with low vision aid trial. All children showed visual acuity better than 6/19 with a telescope of higher magnification. Improvement in near visual acuity was also significant with magnifying glasses trial. Conclusions: Low vision aids are useful for improvement in visual acuity in children. Children with Stargardt’s disease who are having a problem in education and daily life activities can get help from low vision aids.

Keywords: Stargardt, s disease, low vision aids, telescope, magnifiers

Procedia PDF Downloads 539
2166 Cortex-M3 Based Virtual Platform Implementation for Software Development

Authors: Jun Young Moon, Hyeonggeon Lee, Jong Tae Kim

Abstract:

In this paper, we present Cortex-M3 based virtual platform which can virtualize wearable hardware platform and evaluate hardware performance. Cortex-M3 is very popular microcontroller in wearable devices, hardware sensors and display devices. This platform can be used to implement software layer for specific hardware architecture. By using the proposed platform the software development process can be parallelized with hardware development process. We present internal mechanism to implement the proposed virtual platform and describe how to use the proposed platform to develop software by using case study which is low cost wearable device that uses Cortex-M3.

Keywords: electronic system level design, software development, virtual platform, wearable device

Procedia PDF Downloads 375
2165 National Standard of Canada for Psychological Health and Safety in the Workplace: A Critical Review

Authors: Lucie Cote, Isabelle Rodier

Abstract:

The main objective of the research was to identify demonstrated mechanisms promoting psychological well-being and psychological health in the workplace, and to take a critical look at the 'National Standard of Canada for Psychological Health and Safety in the Workplace - Prevention, Promotion and Guidance to Staged Implementation (Standard)' as a mechanism to promote the psychological well-being and psychological health in the workplace. A review of the scientific literature was conducted, and a case study was done using data from a Canadian federal department. The following six mechanisms with an efficiency supported by most of the studies reviewed were identified: improving psychological well-being in the workplace literacy; strengthening the resilience of employees; creating an environmentally friendly and healthy workplace; promoting a healthy lifestyle; taking into account psychological characteristics in the drafting of job descriptions and tasks during the hiring process; and offering psychological self-care tools. The Standard offers several mechanisms beyond those previously identified and their implementation can be demanding. Research based on objective data and addressing the magnitude of the effect would be required.

Keywords: critical review, national standard of Canada, psychological health, workplace

Procedia PDF Downloads 238
2164 A Translation Criticism of the Persian Translation of “A**Hole No More” Written by Xavier Crement

Authors: Mehrnoosh Pirhayati

Abstract:

Translation can be affected by different meta-textual factors of target context such as ideology, politics, and culture. So, the rule of fidelity, or being faithful to the source text, can be ignored by the translator. On the other hand, critical discourse analysis, derived from applied linguistics, is entered into the field of translation studies and used by scholars for revealing hidden deviations and possible roots of manipulations. This study focused on the famous Persian translation of the bestseller book, “A**hole No More,” written by XavierCrement 1990, performed by Mahmud Farjami to comparatively and critically analyze it with its corresponding English original book. The researcher applied Pirhayati’s model and framework of translation criticism at the textual and semiotic levels for this qualitative study. It should be noted that Kress and Van Leeuwen’s semiotic model, along with Machin’s model of typographical analysis, was also used at the semiotic level. The results of the comparisons and analyses indicate thatthis Persian translation of the book is affected by the factors of ideology and economics and reveal that the Islamic attitude causes the translator to employ some strategies such as substitution and deletion. Those who may benefit from this research are translation trainers, students of translation studies, critics, and scholars.

Keywords: farjami (2013), Ideology, manipulation, pirhayati's (2013) model of translation criticism, Xavier crement (1990)

Procedia PDF Downloads 213
2163 Islam, Forced Marriages and Pakistani Culture: An Analytical Overview

Authors: Naseem Akhter, Rozina Khattak, Arshad Munir

Abstract:

The Islamic social and family system is very clear concerning will, choice, consent and negation of compulsion and force in human life. Marriage is not only a civil contract but also a religious and spiritual contract between spouse (man and woman), which allows them for each other to live gladly, joyfully and legally in the society. It is an immortal and perpetual association between man and woman, which is filled with sympathetic affection, kindness, compassion and security. Islam gives specific rights to parents and guardians to set up the marriage ceremony and get done it as a respectful family occasion, confer their blessing and advice for a life partner of their children. The rights of parents and guardians are summed up in the term of "Willayah”. Islam does not permit parents, guardians and other relatives to compel their children regarding the marriage of their choice, because the groom and the bride are the real parties of the contract. Therefore, their willingness is of prime importance in order to spend whole life with each other. The Holy Prophet (peace and blessings of Allah be upon him) prohibits forcing a virgin to marriage without her permission, whether this is her father or someone else. The right of free consent to choose a life partner is the basic right for the human which is God (Allah) gifted. Unfortunately, forced marriage is a common practice in Pakistani society that has no link with Islam. This article is being written in the same context.

Keywords: choice, consent, forced marriage, Islam, parents, spouse

Procedia PDF Downloads 317
2162 Streaming Communication Component for Multi-Robots

Authors: George Oliveira, Luana D. Fronza, Luiza Medeiros, Patricia D. M. Plentz

Abstract:

The research presented in this article is part of a wide project that proposes a scheduling system for multi-robots in intelligent warehouses employing multi-robot path-planning (MPP) and multi-robot task allocation (MRTA) to reconcile multiple restrictions (task delivery time, task priorities, charging capacity, and robots battery capacity). We present the software component capable of interconnecting an open streaming processing architecture and robot operating system (ROS), ensuring communication and message exchange between robots and the environment in which they are inserted. Simulation results show the good performance of our proposed technique for connecting ROS and streaming platforms.

Keywords: complex distributed systems, mobile robots, smart warehouses, streaming platforms

Procedia PDF Downloads 194
2161 Examining Relationship between Programming Performance, Programming Self Efficacy and Math Success

Authors: Mustafa Ekici, Sacide Güzin Mazman

Abstract:

Programming is the one of ability in computer science fields which is generally perceived difficult by students and various individual differences have been implicated in that ability success. Although several factors that affect programming ability have been identified over the years, there is not still a full understanding of why some students learn to program easily and quickly while others find it complex and difficult. Programming self-efficacy and mathematic success are two of those essential individual differences which are handled as having important effect on the programming success. This study aimed to identify the relationship between programming performance, programming self efficacy and mathematics success. The study group is consisted of 96 undergraduates from Department of Econometrics of Uşak University. 38 (39,58%) of the participants are female while 58 (60,41%) of them are male. Study was conducted in the programming-I course during 2014-2015 fall term. Data collection tools are comprised of programming course final grades, programming self efficacy scale and a mathematics achievement test. Data was analyzed through correlation analysis. The result of study will be reported in the full text of the study.

Keywords: programming performance, self efficacy, mathematic success, computer science

Procedia PDF Downloads 502
2160 Physical Verification Flow on Multiple Foundries

Authors: Rohaya Abdul Wahab, Raja Mohd Fuad Tengku Aziz, Nazaliza Othman, Sharifah Saleh, Nabihah Razali, Muhammad Al Baqir Zinal Abidin, Md Hanif Md Nasir

Abstract:

This paper will discuss how we optimize our physical verification flow in our IC Design Department having various rule decks from multiple foundries. Our ultimate goal is to achieve faster time to tape-out and avoid schedule delay. Currently the physical verification runtimes and memory usage have drastically increased with the increasing number of design rules, design complexity and the size of the chips to be verified. To manage design violations, we use a number of solutions to reduce the amount of violations needed to be checked by physical verification engineers. The most important functions in physical verifications are DRC (design rule check), LVS (layout vs. schematic) and XRC (extraction). Since we have a multiple number of foundries for our design tape-outs, we need a flow that improve the overall turnaround time and ease of use of the physical verification process. The demand for fast turnaround time is even more critical since the physical design is the last stage before sending the layout to the foundries.

Keywords: physical verification, DRC, LVS, XRC, flow, foundry, runset

Procedia PDF Downloads 654
2159 Secure Network Coding-Based Named Data Network Mutual Anonymity Transfer Protocol

Authors: Tao Feng, Fei Xing, Ye Lu, Jun Li Fang

Abstract:

NDN is a kind of future Internet architecture. Due to the NDN design introduces four privacy challenges,Many research institutions began to care about the privacy issues of naming data network(NDN).In this paper, we are in view of the major NDN’s privacy issues to investigate privacy protection,then put forwards more effectively anonymous transfer policy for NDN.Firstly,based on mutual anonymity communication for MP2P networks,we propose NDN mutual anonymity protocol.Secondly,we add interest package authentication mechanism in the protocol and encrypt the coding coefficient, security of this protocol is improved by this way.Finally, we proof the proposed anonymous transfer protocol security and anonymity.

Keywords: NDN, mutual anonymity, anonymous routing, network coding, authentication mechanism

Procedia PDF Downloads 451
2158 Determining the Frequency of Pneumonia Emerging in COVID-19 Infection

Authors: Zoirov Amirdin Olimovich, Akbarov Elbek Elmurodovich

Abstract:

Introduction: Pneumonia that occurs during COVID-19 infection is common among patients. This research was conducted to determine the frequency of symptoms occurring during pneumonia according to the purpose. Objective and Task: The goal of our research is to develop clinical concepts of pneumonia that occur during COVID-19 infection. Our main task is to analyze the results of blood tests and understand the progression of the disease. Research Materials and Methods: The research was conducted among patients admitted to the Tashkent Medical Academy multi-profile clinic in the department of infectious diseases undergoing stationary treatment with a diagnosis of COVID-19. The analyzed patients had an average age of 46, with a total of 48 patients, 23 of whom were female and 25 were male. Research Results: The research results showed the development of pneumonia within three days in 27 patients after COVID-19 infection. During the observation period, 24 patients (88.8%) recovered completely. The X-ray revealed no signs of pneumonia in those who fully recovered. The remaining three patients showed a persistent form of pneumonia. Conclusion: The conclusion of the research indicates that pneumonia during COVID-19 infection develops in many patients, and 88.8% of patients recover completely without any lingering symptoms.

Keywords: COVID-19, pneumonia, the X-ray, blood, TTA

Procedia PDF Downloads 63
2157 Self-Organization-Based Approach for Embedded Real-Time System Design

Authors: S. S. Bendib, L. W. Mouss, S. Kalla

Abstract:

This paper proposes a self-organization-based approach for real-time systems design. The addressed issue is the mapping of an application onto an architecture of heterogeneous processors while optimizing both makespan and reliability. Since this problem is NP-hard, a heuristic algorithm is used to obtain efficiently approximate solutions. The proposed approach takes into consideration the quality as well as the diversity of solutions. Indeed, an alternate treatment of the two objectives allows to produce solutions of good quality while a self-organization approach based on the neighborhood structure is used to reorganize solutions and consequently to enhance their diversity. Produced solutions make different compromises between the makespan and the reliability giving the user the possibility to select the solution suited to his (her) needs.

Keywords: embedded real-time systems design, makespan, reliability, self-organization, compromises

Procedia PDF Downloads 134
2156 Invalidation of the Start of Lunar Calendars Based on Sighting of Crescent: A Survey of 101 Years of Data between 1938 and 2038

Authors: Rafik Ouared

Abstract:

The purpose of this paper is to invalidate decisions made by the Islamic conference led at Istanbul in 2016, which had defined two basic criteria to determine the start of the lunar month: (1)they are all based on the sighting of the crescent, be it observed or computed with modern methods, and (2) they've strongly recommended the adoption of the principle of 'unification of sighting', by which any occurrence of sighting anywhere would be applicable everywhere. To demonstrate the invalidation of those statements, a survey of 101 years of data, from 1938 to 2038, have been analyzed to compare the probability density function (PDF) of time difference between different types of fajr and new moon. Two groups of fajr have been considered: the 'natural fajr', which is the very first fajr following new moon, and the 'biased fajr', which is defined by human being inclusively of all chosen definitions. The parametric and non-parametric statistical comparisons between the different groups have shown the all the biased PDFs are significantly different from the unbiased (natural) PDF with probability value (p-value) less than 0.001. The significance level was fixed to 0.05. Conclusion: the on-going reference to sighting of crescent is inducing an significant bias in defining lunar calendar. Therefore, 'natural' calendar would be more applicable requiring a more contextualized revision of issue in fiqh.

Keywords: biased fajr, lunar calendar, natural fajr, probability density function, sighting of crescent, time difference between fajr and new moon

Procedia PDF Downloads 212
2155 Transformational Leadership and Departmental Performance: The Intervening Role of Internal Communication and Citizen/Customer Participation

Authors: Derrick Boakye Boadu, Zahra Fakhri

Abstract:

Transformational leaders are the catalyst of change and focus more importantly on members or followers. Involvement of transformational leadership style in organizational structures can provide interesting nuances to the implementation and enhancement of citizen and customer participation mechanisms in an organization regardless of the time consuming, cost, and delaying process of analyzing the feedback of workers and citizens/customers which stifles good outcome of organization’s department performance. It posits that transformational leadership has a positive direct effect on organization-departmental performance and the intervening role of citizen and customer participation and internal communication. Using the NASP-IV 2007 data, the article finds support for the five hypotheses in a structural equation model, and the findings show that transformational leadership does have a direct impact on organizational-departmental performance a partial mediation effect of the relationship through the role of internal communication and citizen and customer participation.  

Keywords: transformational leaders, departmental performance, internal communication, citizen/customer participation

Procedia PDF Downloads 117
2154 Expression of ACSS2 Genes in Peripheral Blood Mononuclear Cells of Patients with Alzheimer’s Disease

Authors: Ali Bayram, Burak Uz, Remzi Yiğiter

Abstract:

The impairment of lipid metabolism in the central nervous system has been suggested as a critical factor of Alzheimer’s disease (AD) pathogenesis. Homo sapiens acyl-coenyme A synthetase short-chain family member 2 (ACSS2) gene encodes the enzyme acetyl-Coenzyme A synthetase (AMP forming; AceCS) providing acetyl-coenzyme A (Ac-CoA) for various physiological processes, such as cholesterol and fatty acid synthesis, as well as the citric acid cycle. We investigated ACSS2, transcript variant 1 (ACSS2*1), mRNA levels in the peripheral blood mononuclear cells (PBMC) of patients with AD and compared them with the controls. The study group comprised 50 patients with the diagnosis of AD who have applied to Gaziantep University Faculty of Medicine, and Department of Neurology. 49 healthy individuals without any neurodegenerative disease are included as controls. ACSS2 mRNA expression in PBMC of AD/control patients was 0.495 (95% confidence interval: 0.410-0.598), p= .000000001902). Further studies are needed to better clarify this association.

Keywords: Alzheimer’s disease, ACSS2 Genes, mRNA expression, RT-PCR

Procedia PDF Downloads 392
2153 Formation of Self Help Groups (SHGs) Protected Human Rights and Ensured Human Security of Female Sex Workers at Brothel in Bangladesh

Authors: Md. Nurul Alom Siddikqe

Abstract:

The purpose of this intervention was to describe how the marginalized people protect their rights and increase their self-dignity and self-esteem among brothel-based sex workers in 6 cities which are the victim of trafficked who came from different periphery areas Bangladesh. Eventually the sex workers are tortured by the pimp, clients, Msahi (so called guardian of bonded sex workers), Babu (So called husband) highly discriminated, vulnerable and stigmatized due to their occupation, movement, behavior and activities, which has got social disapproval. However, stigma, discrimination and violation of human rights not only bar them to access legal services, education of their kids, health, movement of outside of brothel, deprived of funeral after death, but also make them inaccessible due to their invisibility. Conducted an assessment among brothel-based sex workers setup to know their knowledge on human rights and find out their harassment and violence in their community. Inspired them to think about to be united and also assisted them to formation of self help group (SHG). Developed capacity of the SHG and developed leadership of its members through different trainings like administrative, financial management, public speaking and resource mobilization. Developed strategy to enhance the capacity of SHG so that they can collectively claim their rights and develop strategic partnership and network with the relevant service provider’s for restoring all sorts of rights. Conducted meeting with stakeholder including duty bearers, civil society organizations, media people and local government initiatives. Developed Networking with human rights commission, local elite, religious leaders and form human right watch committees at community level. Organized rally and observed national and international days along with government counterparts. By utilizing the project resources the members of SHG became capable to raise their collective voices against violence, discrimination and stigma as well as protected them from insecurity. The members of SHG have been participating in social program/event the SHG got membership of district level NGO coordination meeting through invitation from Deputy Commissioner, Civil Surgeon and Social welfare office of Government of Bangladesh. The Law Enforcement Agency is ensuring safety and security and the education department of government enrolled their children in primary level education. The Government provided land for grave yard after death for the Muslim sex workers and same for the other religious group. The SHGs are registered with government respective authorities. The SHGs are working with support from different development partners and implementing different projects sometime as consortium leaders. Opportunity created to take the vocational training from the government reputed department. The harassment by the clients reduced remarkably, babu, Mashi and other counterparts recognized the sex workers rights and ensure security with government counterpart access increased in legal, health and education. Indications are that the brothel based sex workers understood about their rights and became capable of ensuring their security through working under the self-help groups meaningfully.

Keywords: brothel, discrimination, harassment, stigma

Procedia PDF Downloads 358
2152 The Evaluation of Caustic and Corrosive Poisoning in Children

Authors: Sabiha Sahin

Abstract:

Introduction: We have planned this study because of the increasing number of corrosive substance poisoning who admitted to the Pediatric Emergency Department. Method: 636 corrosive substance poisoning cases applied to the Osmangazi University PED between 1 January 2015 - 31 December 2017 were retrospectively analyzed. Results: 438 (69%) cases were male.The poisoning rate of groups 0-4 was significantly higher and occurred by accident. A total of 616 cases (96.9%) were poisoned by the oral route, and 20 cases were poisoned by inhalation.462 Patients were admitted to the hospital within an hour (72.8%). Of the 134 patients who had only erosion and redness around the mouth, 24 patients had salivation and dysphagia symptoms besides these. Of the 28 cases of 158 patients with symptoms, eusaphegeal stenosis was detected. on third day examination. Although there was no statistically significant correlation between esophageal stenosis and erosion and redness around the mouth, there was a statistically significant correlation between dysphagia and salivation between esophageal stenosis Conclusion: The increased salivation and the dysphagia are important signs of risk of devoloping esophageal stenosis at first examination corrosive poisoning in children.

Keywords: caustic, corrosive, poisoning, children

Procedia PDF Downloads 160
2151 Evaluation of Bollworm Tolerance in F1 and F2 BT Cotton under Unprotected Condition

Authors: N. K. Bhute, B. B. Bhosle

Abstract:

Field experiment was conducted during kharif 2005, at the experimental farm of the Department of Genetics and Plant Breeding, College of Agriculture, Marathwada Agricultural University, Parbhani, Maharashtra. F1 and F2 hybrids of 23 Bt and 5 non-Bt hybrids were grown in a randomized block design with two replications. The results showed that among F1 hybrids, open boll damage due to bollworm complex was not noticed in 4233 Bt and 4247 Bt cotton hybrids which were found significantly superior over MECH 6301 Bt (3.2 %), 4255 Bt (3.28 %) and it was at par with rest of the hybrids. Among F2 hybrids minimum open boll damage (3.10 %) was noticed in Proagro 144 Bt, which was found significantly superior over rest of the hybrids except 4234 Bt (4.17 %) and 4254 Bt (4.98 %) which were at par with each other. In respect of seed cotton yield, among F1 hybrids maximum yield (15.51 q/ha) was recorded in 4233 Bt which was found significantly superior over rest of the hybrids except 4237 Bt (15.24 q/ha). Among F2 maximum yield (15.44 q/ha) was recorded in 4233 Bt which was found significantly superior over rest of the hybrids except 4258 Bt (15.41 q/ha), 4239 Bt (15.098 q/ha) which were at par with each other. Thus F2 Bt cotton express Bt protein in segregated pattern in which bollworm attack was more as compared to F1 which affects yield as well as quality of lint.

Keywords: Bt cotton, bollworms, F1 and F2 generations, unprotected condition

Procedia PDF Downloads 299
2150 A User Identification Technique to Access Big Data Using Cloud Services

Authors: A. R. Manu, V. K. Agrawal, K. N. Balasubramanya Murthy

Abstract:

Authentication is required in stored database systems so that only authorized users can access the data and related cloud infrastructures. This paper proposes an authentication technique using multi-factor and multi-dimensional authentication system with multi-level security. The proposed technique is likely to be more robust as the probability of breaking the password is extremely low. This framework uses a multi-modal biometric approach and SMS to enforce additional security measures with the conventional Login/password system. The robustness of the technique is demonstrated mathematically using a statistical analysis. This work presents the authentication system along with the user authentication architecture diagram, activity diagrams, data flow diagrams, sequence diagrams, and algorithms.

Keywords: design, implementation algorithms, performance, biometric approach

Procedia PDF Downloads 476
2149 Good Environmental Governance Realization among the Three King Mongkut's Institutes of Technology in Bangkok, Thailand

Authors: Pastraporn Thipayasothorn, Vipawan Tadapratheep, Jintana Nokyoo

Abstract:

A physical realization of good environmental governance about an environmental principle, educational psychology and architecture in the three King Mongkut's Institutes of Technology, is generated for researching physical environmental factors which related to the good environmental governance, communication between the good environmental governance and a physical environmental, and a physical environmental design policy. Moreover, we collected data by a survey, observation and questionnaire that participants are students of the three King Mongkut's Institutes of Technology, and analyzed a relationship between a building utilization and the good environmental governance awareness. We found that, from the data analysis, a balance and creativity participation which played as the project users and communities of the good governance environmental promotion in the institutes helps the good governance and environmental development in the future.

Keywords: built environment, good governance, environmental governance, physical environmental

Procedia PDF Downloads 438
2148 Content Analysis of Depictions of Terrorism in U.S. Major Motion Pictures: A Social Constructionist Perspective

Authors: Raleigh Blasdell, Amanda M. Sharp Parker, Lauren Waldrop, Brigid Toney

Abstract:

It has been demonstrated that fictional media sources have persuasive effects on public beliefs; this study contributes to the social constructionist literature by conducting a content analysis of U.S. major motion pictures involving terrorism. Using the Unified Film Population Sampling Methodology, the top-grossing films were identified to examine the frequency and context of several constructs of terrorism, including terrorist demographics, type of terrorism, country of origin, organizational affiliation, crime typology, and victim demographics. Comparisons of these constructs, as depicted in the films, were then made with the extant academic literature on terrorism. The data provide notable information regarding the representation of terrorism by the film industry, as well the discrepancies between the scholarly literature and depictions in popular films. The results indicate vast differences between fiction and reality, emphasizing a 'Middle Eastern Islamic male' terrorist stereotype. Using the theoretical foundation of social constructionism, the findings provide insight into how inaccurate depictions in film can influence society’s beliefs about terrorism and terrorists, which subsequently can translate into public support for legislation and policies that are often fueled by misinformation.

Keywords: film, media, social constructionism, terrorism

Procedia PDF Downloads 169
2147 Unlocking Tourism Value through a Tourist Experience Management Paradigm

Authors: Siphiwe P. Mandina, Tinashe Shamuyashe

Abstract:

Tourism has become a topical issue amongst academics and practitioners due to its potential to contribute significantly towards an economy’s GDP. The problem underpinning this research is the fact that the major attraction, Victoria Falls, is being marketed in neighboring countries like South Africa, Botswana and Zambia with tour operators providing just day trips to the Victoria Falls. This has deprived Zimbabwe of income from tourism with tourists making day trips and actually not spending nights in Zimbabwe. This therefore calls for cutting edge marketing strategies that are superior to or inimitable by competing nations such as South Africa and Zambia. This study proposes a shift towards an experience management paradigm in the tourism sector. A qualitative research was adopted for this study, and findings of this study were generalized across different tourism contexts, therefore making the survey based research design more appropriate. The target population for this study is tourists visiting Zimbabwe over the period 2016 and ZTA visitor database acquired from the Department of Immigration will form the sampling frame for the purposes of this study.

Keywords: tourist experiences, Zimbabwe, tourist arrivals, competitiveness

Procedia PDF Downloads 253
2146 Energy Planning Analysis of an Agritourism Complex Based on Energy Demand Simulation: A Case Study of Wuxi Yangshan Agritourism Complex

Authors: Li Zhu, Binghua Wang, Yong Sun

Abstract:

China is experiencing the rural development process, with the agritourism complex becoming one of the significant modes. Therefore, it is imperative to understand the energy performance of agritourism complex. This study focuses on a typical case of the agritourism complex and simulates the energy consumption performance on condition of the regular energy system. It was found that HVAC took 90% of the whole energy demand range. In order to optimize the energy supply structure, the hierarchical analysis was carried out on the level of architecture with three main factors such as construction situation, building types and energy demand types. Finally, the energy planning suggestion of the agritourism complex was put forward and the relevant results were obtained.

Keywords: agritourism complex, energy planning, energy demand simulation, hierarchical structure model

Procedia PDF Downloads 193
2145 Advantages of Fuzzy Control Application in Fast and Sensitive Technological Processes

Authors: Radim Farana, Bogdan Walek, Michal Janosek, Jaroslav Zacek

Abstract:

This paper presents the advantages of fuzzy control use in technological processes control. The paper presents a real application of the Linguistic Fuzzy-Logic Control, developed at the University of Ostrava for the control of physical models in the Intelligent Systems Laboratory. The paper presents an example of a sensitive non-linear model, such as a magnetic levitation model and obtained results which show how modern information technologies can help to solve actual technical problems. A special method based on the LFLC controller with partial components is presented in this paper followed by the method of automatic context change, which is very helpful to achieve more accurate control results. The main advantage of the used system is its robustness in changing conditions demonstrated by comparing with conventional PID controller. This technology and real models are also used as a background for problem-oriented teaching, realized at the department for master students and their collaborative as well as individual final projects.

Keywords: control, fuzzy logic, sensitive system, technological proves

Procedia PDF Downloads 469
2144 Femtocell Stationed Flawless Handover in High Agility Trains

Authors: S. Dhivya, M. Abirami, M. Farjana Parveen, M. Keerthiga

Abstract:

The development of high-speed railway makes people’s lives more and more convenient; meanwhile, handover is the major problem on high-speed railway communication services. In order to overcome that drawback the architecture of Long-Term Evolution (LTE) femtocell networks is used to improve network performance, and the deployment of a femtocell is a key for bandwidth limitation and coverage issues in conventional mobile network system. To increase the handover performance this paper proposed a multiple input multiple output (MIMO) assisted handoff (MAHO) algorithm. It is a technique used in mobile telecom to transfer a mobile phone to a new radio channel with stronger signal strength and improved channel quality.

Keywords: flawless handover, high-speed train, home evolved Node B, LTE, mobile femtocell, RSS

Procedia PDF Downloads 473
2143 Data Quality as a Pillar of Data-Driven Organizations: Exploring the Benefits of Data Mesh

Authors: Marc Bachelet, Abhijit Kumar Chatterjee, José Manuel Avila

Abstract:

Data quality is a key component of any data-driven organization. Without data quality, organizations cannot effectively make data-driven decisions, which often leads to poor business performance. Therefore, it is important for an organization to ensure that the data they use is of high quality. This is where the concept of data mesh comes in. Data mesh is an organizational and architectural decentralized approach to data management that can help organizations improve the quality of data. The concept of data mesh was first introduced in 2020. Its purpose is to decentralize data ownership, making it easier for domain experts to manage the data. This can help organizations improve data quality by reducing the reliance on centralized data teams and allowing domain experts to take charge of their data. This paper intends to discuss how a set of elements, including data mesh, are tools capable of increasing data quality. One of the key benefits of data mesh is improved metadata management. In a traditional data architecture, metadata management is typically centralized, which can lead to data silos and poor data quality. With data mesh, metadata is managed in a decentralized manner, ensuring accurate and up-to-date metadata, thereby improving data quality. Another benefit of data mesh is the clarification of roles and responsibilities. In a traditional data architecture, data teams are responsible for managing all aspects of data, which can lead to confusion and ambiguity in responsibilities. With data mesh, domain experts are responsible for managing their own data, which can help provide clarity in roles and responsibilities and improve data quality. Additionally, data mesh can also contribute to a new form of organization that is more agile and adaptable. By decentralizing data ownership, organizations can respond more quickly to changes in their business environment, which in turn can help improve overall performance by allowing better insights into business as an effect of better reports and visualization tools. Monitoring and analytics are also important aspects of data quality. With data mesh, monitoring, and analytics are decentralized, allowing domain experts to monitor and analyze their own data. This will help in identifying and addressing data quality problems in quick time, leading to improved data quality. Data culture is another major aspect of data quality. With data mesh, domain experts are encouraged to take ownership of their data, which can help create a data-driven culture within the organization. This can lead to improved data quality and better business outcomes. Finally, the paper explores the contribution of AI in the coming years. AI can help enhance data quality by automating many data-related tasks, like data cleaning and data validation. By integrating AI into data mesh, organizations can further enhance the quality of their data. The concepts mentioned above are illustrated by AEKIDEN experience feedback. AEKIDEN is an international data-driven consultancy that has successfully implemented a data mesh approach. By sharing their experience, AEKIDEN can help other organizations understand the benefits and challenges of implementing data mesh and improving data quality.

Keywords: data culture, data-driven organization, data mesh, data quality for business success

Procedia PDF Downloads 135
2142 The Results of Reading Test on Movement Staff Notation System

Authors: Sonay Ödemiş

Abstract:

Movement Staff Notation System (MSNS) is a movement transcription, analyzing method, and it's been constantly improved since it was first developed in 2005. This method is based on human anatomy, is being used and applied in the lessons at The Department of Turkish Folk Dances in Istanbul Technical University, nowadays. In this research, it is aimed to discover, how MSNS can help to participants about learning the basic movements of lower extremity. This experiment has six volunteers who were randomly selected. Each volunteer has been graded for their dance backgrounds and all the volunteers have been studied for six weeks. Each week has included different topic and examples such as contacts on foot, jumps, timing, directions and basic symbols of MSNS. Examples have changed from easy to hard. On conclusion, 6 volunteer subjects were tested in final test. The tests were recorded with the camera. In this presentation, it will be explained and detailed the results of the reading test on MSNS. Some of important video records will be watched and interpreted after the test. As a conclusion, all the scores will be interpreted and assessed from different perspectives.

Keywords: dance notation, Turkish dances, reading test, Education

Procedia PDF Downloads 233