Search results for: modern code
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 4030

Search results for: modern code

1720 The Martingale Options Price Valuation for European Puts Using Stochastic Differential Equation Models

Authors: H. C. Chinwenyi, H. D. Ibrahim, F. A. Ahmed

Abstract:

In modern financial mathematics, valuing derivatives such as options is often a tedious task. This is simply because their fair and correct prices in the future are often probabilistic. This paper examines three different Stochastic Differential Equation (SDE) models in finance; the Constant Elasticity of Variance (CEV) model, the Balck-Karasinski model, and the Heston model. The various Martingales option price valuation formulas for these three models were obtained using the replicating portfolio method. Also, the numerical solution of the derived Martingales options price valuation equations for the SDEs models was carried out using the Monte Carlo method which was implemented using MATLAB. Furthermore, results from the numerical examples using published data from the Nigeria Stock Exchange (NSE), all share index data show the effect of increase in the underlying asset value (stock price) on the value of the European Put Option for these models. From the results obtained, we see that an increase in the stock price yields a decrease in the value of the European put option price. Hence, this guides the option holder in making a quality decision by not exercising his right on the option.

Keywords: equivalent martingale measure, European put option, girsanov theorem, martingales, monte carlo method, option price valuation formula

Procedia PDF Downloads 115
1719 Political Implications of Shared Authority: Efforts to Retain Indigenous Sovereignty Within the Modern Global Power Structures

Authors: David E. Wilkins

Abstract:

While colonialism in its many guises remains the dominant theoretical framework within which to analyze Indigenous relations with state powers, this paper takes a deep look at the treaty, policy, and statutory efforts initiated by both Indigenous peoples and colonial, and later federal representatives within what is now the United States that were intended to create a Native constituent state of the union. While these plans ultimately failed, they are indicative of the reality that, throughout much of the shared Indigenous and American history, there were both Native and non-Native political elites who were keen on the idea of incorporating Indigenous peoples into the burgeoning body politic. This paper explores why these plans arose, who the architects were that devised them, which Native peoples were involved in, and why they ultimately failed to be enacted. Although governmental relations within the US remain fraught and unpredictable, Native nations continue to wield a form of sovereignty that, while truncated, has maintained their distinctive political statuses. There is much to be learned from the exploration of these mixed successes and failures. There are other examples across the globe whereby Indigenous peoples like the Saami and the Māori have secured greater clarity of their retained autonomy through structural political arrangements with the states that have laid claim to their territories while the Ainu struggle to regain their status.

Keywords: indigenous, sovereignty, diplomacy, intergovernmental

Procedia PDF Downloads 49
1718 Mobile Cloud Application in Design Build Bridge Construction

Authors: Meng Sun, Bin Wei

Abstract:

In the past decades, design-build has become a more popular project delivery system especially for the large scaled infrastructure project in North America. It provides a one-stop shopping system for the client therefore improves the efficiency of construction, and reduces the risks and overall cost for the clients. Compared to the project with traditional delivery method, design-build project requires contractor and designer to work together efficiently to deliver the best-value solutions through the construction process. How to facilitate a solid integration and efficient interaction between contractor and designer often affects the schedule, budget and quality of the construction therefore becomes a key factor to the success of a design-build project. This paper presents a concept of using modern mobile cloud technology to provide an integrated solution during the design-build construction. It uses mobile cloud architecture to provide a platform for real-time field progress, change request approval, job progress log, and project time entry with devices integration for field information and communications. The paper uses a real filed change notice as an example to demonstrate how mobile cloud technology applies in a design-build project and how it can improve the project efficiency.

Keywords: cloud, design-build, field change notice, mobile application

Procedia PDF Downloads 226
1717 Frequency of BCR-ABL Fusion Transcript Types with Chronic Myeloid Leukemia by Multiplex Polymerase Chain Reaction in Srinagarind Hospital, Khon Kaen Thailand

Authors: Kanokon Chaicom, Chitima Sirijerachai, Kanchana Chansung, Pinsuda Klangsang, Boonpeng Palaeng, Prajuab Chaimanee, Pimjai Ananta

Abstract:

Chronic myeloid leukemia (CML) is characterized by the consistent involvement of the Philadelphia chromosome (Ph), which is derived from a reciprocal translocation between chromosome 9 and 22, the main product of the t(9;22) (q34;q11) translocation, is found in the leukemic clone of at least 95% of CML patients. There are two major forms of the BCR/ABL fusion gene, involving ABL exon 2, but including different exons of BCR gene. The transcripts b2a2 (e13a2) or b3a2 (e14a2) code for a p210 protein. Another fusion gene leads to the expression of an e1a2 transcript, which codes for a p190 protein. Other less common fusion genes are b3a3 or b2a3, which codes for a p203 protein and e19a2 (c3a2) transcript, which codes for a p230 protein. Its frequency varies in different populations. In this study, we aimed to report the frequency of BCR-ABL fusion transcript types with CML by multiplex PCR (polymerase chain reaction) in Srinagarind Hospital, Khon Kaen, Thailand. Multiplex PCR for BCR-ABL was performed on 58 patients, to detect different types of BCR-ABL transcripts of the t (9; 22). All patients examined were positive for some type of BCR/ABL rearrangement. The majority of the patients (93.10%) expressed one of the p210 BCR-ABL transcripts, b3a2 and b2a2 transcripts were detected in 53.45% and 39.65% respectively. The expression of an e1a2 transcript showed 3.75%. Co-expression of p210/p230 was detected in 3.45%. Co-expression of p210/p190 was not detected. Multiplex PCR is useful, saves time and reliable in the detection of BCR-ABL transcript types. The frequency of one or other rearrangement in CML varies in different population.

Keywords: chronic myeloid leukemia, BCR-ABL fusion transcript types, multiplex PCR, frequency of BCR-ABL fusion

Procedia PDF Downloads 222
1716 A Method for False Alarm Recognition Based on Multi-Classification Support Vector Machine

Authors: Weiwei Cui, Dejian Lin, Leigang Zhang, Yao Wang, Zheng Sun, Lianfeng Li

Abstract:

Built-in test (BIT) is an important technology in testability field, and it is widely used in state monitoring and fault diagnosis. With the improvement of modern equipment performance and complexity, the scope of BIT becomes larger, and it leads to the emergence of false alarm problem. The false alarm makes the health assessment unstable, and it reduces the effectiveness of BIT. The conventional false alarm suppression methods such as repeated test and majority voting cannot meet the requirement for a complicated system, and the intelligence algorithms such as artificial neural networks (ANN) are widely studied and used. However, false alarm has a very low frequency and small sample, yet a method based on ANN requires a large size of training sample. To recognize the false alarm, we propose a method based on multi-classification support vector machine (SVM) in this paper. Firstly, we divide the state of a system into three states: healthy, false-alarm, and faulty. Then we use multi-classification with '1 vs 1' policy to train and recognize the state of a system. Finally, an example of fault injection system is taken to verify the effectiveness of the proposed method by comparing ANN. The result shows that the method is reasonable and effective.

Keywords: false alarm, fault diagnosis, SVM, k-means, BIT

Procedia PDF Downloads 136
1715 Effect of Thermal Radiation and Chemical Reaction on MHD Flow of Blood in Stretching Permeable Vessel

Authors: Binyam Teferi

Abstract:

In this paper, a theoretical analysis of blood flow in the presence of thermal radiation and chemical reaction under the influence of time dependent magnetic field intensity has been studied. The unsteady non linear partial differential equations of blood flow considers time dependent stretching velocity, the energy equation also accounts time dependent temperature of vessel wall, and concentration equation includes time dependent blood concentration. The governing non linear partial differential equations of motion, energy, and concentration are converted into ordinary differential equations using similarity transformations solved numerically by applying ode45. MATLAB code is used to analyze theoretical facts. The effect of physical parameters viz., permeability parameter, unsteadiness parameter, Prandtl number, Hartmann number, thermal radiation parameter, chemical reaction parameter, and Schmidt number on flow variables viz., velocity of blood flow in the vessel, temperature and concentration of blood has been analyzed and discussed graphically. From the simulation study, the following important results are obtained: velocity of blood flow increases with both increment of permeability and unsteadiness parameter. Temperature of the blood increases in vessel wall as Prandtl number and Hartmann number increases. Concentration of the blood decreases as time dependent chemical reaction parameter and Schmidt number increases.

Keywords: stretching velocity, similarity transformations, time dependent magnetic field intensity, thermal radiation, chemical reaction

Procedia PDF Downloads 72
1714 Plasma Ion Implantation Study: A Comparison between Tungsten and Tantalum as Plasma Facing Components

Authors: Tahreem Yousaf, Michael P. Bradley, Jerzy A. Szpunar

Abstract:

Currently, nuclear fusion is considered one of the most favorable options for future energy generation, due both to its abundant fuel and lack of emissions. For fusion power reactors, a major problem will be a suitable material choice for the Plasma Facing Components (PFCs) which will constitute the reactor first wall. Tungsten (W) has advantages as a PFC material because of its high melting point, low vapour pressure, high thermal conductivity and low retention of hydrogen isotopes. However, several adverse effects such as embrittlement, melting and morphological evolution have been observed in W when it is bombarded by low-energy and high-fluence helium (He) and deuterium (D) ions, as a simulation conditions adjacent to a fusion plasma. Recently, tantalum (Ta) also investigate as PFC and show better reluctance to nanostructure fuzz as compared to W under simulated fusion plasma conditions. But retention of D ions found high in Ta than W. Preparatory to plasma-based ion implantation studies, the effect of D and He ion impact on W and Ta is predicted by using the stopping and range of ions in the matter (SRIM) code. SRIM provided some theoretical results regarding projected range, ion concentration (at. %) and displacement damage (dpa) in W and Ta. The projected range for W under Irradiation of He and D ions with an energy of 3-keV and 1×fluence is determined 75Å and 135 Å and for Ta 85Å and 155Å, respectively. For both W and Ta samples, the maximum implanted peak for helium is predicted ~ 5.3 at. % at 12 nm and for De ions concentration peak is located near 3.1 at. % at 25 nm. For the same parameters, the displacement damage for He ions is observed in W ~ 0.65 dpa and Ta ~ 0.35 dpa at 5 nm. For D ions the displacement damage for W ~ 0.20 dpa at 8 nm and Ta ~ 0.175 dpa at 7 nm. The mean implantation depth is same for W and Ta, i.e. for He ions ~ 40 nm and D ions ~ 70 nm. From these results, we conclude that retention of D is high than He ions, but damage is low for Ta as compared to W. Further investigation still in progress regarding W and T.

Keywords: helium and deuterium ion impact, plasma facing components, SRIM simulation, tungsten, tantalum

Procedia PDF Downloads 117
1713 Heat Transfer Analysis of Helical Grooved Passages near the Leading Edge Region in Gas Turbine Blade

Authors: Harishkumar Kamath, Chandrakant R. Kini, N. Yagnesh Sharma

Abstract:

Gas turbines are highly effective engineered prime movers for converting energy from thermal form (combustion stage) to mechanical form – are widely used for propulsion and power generation systems. One method of increasing both the power output and thermal efficiency is to increase the temperature of the gas entering the turbine. In the advanced gas turbines of today, the turbine inlet temperature can be as high as 1500°C; however, this temperature exceeds the melting temperature of the metal blade. With modern gas turbines operating at extremely high temperatures, it is necessary to implement various cooling methods, so the turbine blades and vanes endure in the path of the hot gases. Merely passing coolant air through the blade does not provide adequate cooling; therefore, it is necessary to implement techniques that will further enhance the heat transfer from the blade walls. It is seen that by incorporating helical grooved passages into the leading edge built on turbulence and higher flow rates through the passages, the blade can be cooled effectively. It seen from the analysis helical grooved passages with diameter 5 mm, helical pitch of 50 mm and 8 starts results in better cooling of turbine blade and gives the best thermal performance.

Keywords: blade cooling, helical grooves, leading edge, numerical analysis

Procedia PDF Downloads 244
1712 Redefinition of Village Landscape with Ruins-Taking Cunwei Village in Nanping City, Fujian Province as Example

Authors: Siyu Bu, Jie Wang, Yajing Jiang

Abstract:

Nowadays, villages still occupying 94.7% of the national territorial area (almost nine million square kilometers) of China. Some of them are meeting urbanization and grow as satellite; however, others are witnessing more and more citizens swarming into with nostalgia, seek enjoyment from the beautiful green countryside. In villages, new types of house come and we see billions of old houses lay unused, or even be dying at every second, which cause a lot of 'bad palaces', decadent and dangerous. In this context, there are lots of tries for gearing villages in China. This article deconstructs the traditional village house to excavate its’ landscape potential for future. By research in CunWei Village, Nanping City, Fujian Province, China, a method of reconstruction of old houses comes out: the wreckage will be a strong landscape, showing the great beauty of nature. It will be a better use of the old material as well as the space pattern. It was supposed to gain a juxtaposition of traditional village life and modern social life by offering possibilities of multiple event, replacing the bad space to attractive one by strengthen the old structures without destroy traditional patterns. Furthermore , this method acts as an exploring for building redefinition of village landscape that fit Chinese villages, using local nature resource and traditional construction logic.

Keywords: juxtaposition, replace, village, ruins

Procedia PDF Downloads 232
1711 Public-Private Partnership in Tourism Development: Kuwait Experience within 2035 Vision

Authors: Obaid Alotaibi

Abstract:

Tourism and recreation have become one of the important and influential sectors in most of the modern economies. This sector has been accepted as one of the alternative sources of national income, employment, and foreign exchange. Kuwait has many potentialities in tourism and recreation, and exploitation of this leads to more diversification of the economy besides augmenting its contribution to the GDP. It is an import-oriented economy; it requires hard currencies (foreign exchange) to meet the import costs as well as to maintain stability in the international market. To compensate for the revenue fall stemmed from fluctuations in oil prices -where the agriculture, fisheries, and industrial sectors are too immune and inelastic- the only alternative solution is the regeneration of the tourism and recreation to surface. This study envisages the characteristics of tourism and recreation, the economic and social importance for the society, the physical and human endowments, as well as the tourist pattern and plans for promoting and sustaining tourism in the country. The study summarizes many recommendations, including the necessity of establishing authority or a council for tourism, linking the planning of tourism development with the comprehensive planning for economic and social development in Kuwait in the shadow of 2035 vision, and to encourage the investors to develop new tourist and recreation projects.

Keywords: Kuwait, public-private, partnership, tourism, 2035 vision

Procedia PDF Downloads 105
1710 Consumer Perception of 3D Body Scanning While Online Shopping for Clothing

Authors: A. Grilec, S. Petrak, M. Mahnic Naglic

Abstract:

Technological development and the globalization in production and sales of clothing in the last decade have significantly influenced the changes in consumer relationship with the industrial-fashioned apparel and in the way of clothing purchasing. The Internet sale of clothing is in a constant and significant increase in the global market, but the possibilities offered by modern computing technologies in the customization segment are not yet fully involved, especially according to the individual customer requirements and body sizes. Considering the growing trend of online shopping, the main goal of this paper is to investigate the differences in customer perceptions towards online apparel shopping and particularly to discover the main differences in perceptions between customers regarding three different body sizes. In order to complete the research goal, the quantitative study on the sample of 85 Croatian consumers was conducted in 2017 in Zagreb, Croatia. Respondents were asked to indicate their level of agreement according to a five-point Likert scale ranging from strongly disagree (1) to strongly agree (5). To analyze attitudes of respondents, simple and descriptive statistics were used. The main findings highlight the differences in respondent perception of 3D body scanning, using 3D body scanning in Internet shopping, online apparel shopping habits regarding their body sizes.

Keywords: consumer behavior, Internet, 3D body scanning, body types

Procedia PDF Downloads 140
1709 From Shock to Self-Determination: Igbo Responses to the 1966 Pogrom and the Rise of Biafra Nationalism

Authors: Nnaemeka Enemchukwu

Abstract:

In modern-day Nigeria, the spirit of Biafra, the defunct secessionist state of former Eastern Nigeria, endures. While some attempt to downplay the historical factors that led to its creation, this paper aims to demonstrate that the 1966 pogroms in Nigeria, which claimed the lives of over 30,000 Igbo people, shattered their faith in the nation's ability to provide security and acceptance. This loss of faith led to a mass exodus from various regions of the country back to their homeland in Eastern Nigeria. Utilizing primary sources such as interviews and archival reports, and secondary sources like books, journals, and websites, this paper will argue that the trauma and terror of the 1966 massacres were the primary drivers of secessionist sentiment and self-determination among the Igbo people, ultimately leading to the declaration of Biafra. By drawing parallels with other historical incidents across the globe, this paper will establish the theoretical connection between shocking events, identity questioning among traumatized groups, and the subsequent rise of nationalistic sentiments seeking to ensure group preservation. To achieve its objective, this paper will employ descriptive, narrative, and chronological methods of analysis to present and discuss its findings.

Keywords: Igbo, pogrom, shock, trauma, nationalism, Biafra

Procedia PDF Downloads 50
1708 Security Report Profiling for Mobile Banking Applications in Indonesia Based on OWASP Mobile Top 10-2016

Authors: Bambang Novianto, Rizal Aditya Herdianto, Raphael Bianco Huwae, Afifah, Alfonso Brolin Sihite, Rudi Lumanto

Abstract:

The mobile banking application is a type of mobile application that is growing rapidly. This is caused by the ease of service and time savings in making transactions. On the other hand, this certainly provides a challenge in security issues. The use of mobile banking can not be separated from cyberattacks that may occur which can result the theft of sensitive information or financial loss. The financial loss and the theft of sensitive information is the most avoided thing because besides harming the user, it can also cause a loss of customer trust in a bank. Cyberattacks that are often carried out against mobile applications are phishing, hacking, theft, misuse of data, etc. Cyberattack can occur when a vulnerability is successfully exploited. OWASP mobile Top 10 has recorded as many as 10 vulnerabilities that are most commonly found in mobile applications. In the others, android permissions also have the potential to cause vulnerabilities. Therefore, an overview of the profile of the mobile banking application becomes an urgency that needs to be known. So that it is expected to be a consideration of the parties involved for improving security. In this study, an experiment has been conducted to capture the profile of the mobile banking applications in Indonesia based on android permission and OWASP mobile top 10 2016. The results show that there are six basic vulnerabilities based on OWASP Mobile Top 10 that are most commonly found in mobile banking applications in Indonesia, i.e. M1:Improper Platform Usage, M2:Insecure Data Storage, M3:Insecure Communication, M5:Insufficient Cryptography, M7:Client Code Quality, and M9:Reverse Engineering. The most permitted android permissions are the internet, status network access, and telephone read status.

Keywords: mobile banking application, OWASP mobile top 10 2016, android permission, sensitive information, financial loss

Procedia PDF Downloads 122
1707 Using Health Literacy and Medico-Legal Guidance to Improve Restorative Dentistry Patient Information Leaflets

Authors: Hasneet K. Kalsi, Julie K. Kilgariff

Abstract:

Introduction: Within dentistry, the process for gaining informed consent has become more complex. To consent for treatment, patients must understand all reasonable treatment options and associated risks and benefits. Consenting is therefore deeply embedded in health literacy. Patients attending for dental consultation are often presented with an array of information and choices, yet studies show patients recall less than half of the information provided immediately after. Appropriate and comprehensible patient information leaflets (PILs) may be useful aid memories. In 2016 the World Health Organisation set improving health literacy as a global priority. Soon after, Scotland’s 2017-2025 Making it Easier: A Health Literacy Action Plan followed. This project involved the review of Restorative PILs used within Dundee Dental Hospital to assess the Content and Readability. Method: The current PIL on Root Canal Treatment (RCT) was created in 2011. This predates the Montgomery vs. NHS Lanarkshire case, a ruling which significantly impacted dental consenting processes, as well as General Dental Council’s (GDC’s) Standards for the Dental Team and Faculty of General Dental Practice’s Good Practice Guidance on Clinical Examination and Record-Keeping. Current evidence-based guidance, including that stipulated by the GDC, was reviewed. A 20-point Essential Content Checklist was designed to conform to best practice guidance for valid consenting processes. The RCT leaflet was scored against this to ascertain if the content was satisfactory. Having ensured the content satisfied medicolegal requirements, health literacy considerations were reviewed regarding readability. This was assessed using McLaughlin’s Simple Measure of Gobbledygook (SMOG) formula, which identifies school stages that would have to be achieved to comprehend the PIL. The sensitivity of the results to alternative readability methods were assessed. Results: The PIL was not sufficient for modern consenting processes and reflected a suboptimal level of health literacy. Evaluation of the leaflet revealed key content was missing, including information pertaining to risks and benefits. Only five points out of the 20-point checklist were present. The readability score was 16, equivalent to a level 2 in National Adult Literacy Standards/Scottish Credit and Qualification Framework Level 5; 62% of Scottish adults are able to read to this standard. Discussion: Assessment of the leaflet showed it was no longer fit for purpose. Reasons include a lack of pertinent information, a text-heavy leaflet lacking flow, and content errors. The SMOG score indicates a high level of comprehension is required to understand this PIL, which many patients may not possess. A new PIL, compliant with medicolegal and health literacy guidance, was designed with patient-driven checklists, notes spaces for annotations/ questions and areas for clinicians to highlight important case-specific information. It has been tested using the SMOG formula. Conclusion: PILs can be extremely useful. Studies show that interactive use can enhance their effectiveness. PILs should reflect best practice guidance and be understood by patients. The 2020 leaflet designed and implemented aims to fulfill the needs of a modern healthcare system and its service users. It embraces and embeds Scotland’s Health Literacy Action Plan within the consenting process. A review of further leaflets using this model is ongoing.

Keywords: consent, health literacy, patient information leaflet, restorative dentistry

Procedia PDF Downloads 127
1706 Understanding of Heritage Values within University Education Systems in the Kingdom of Saudi Arabia

Authors: Mahmoud Tarek Mohamed Hammad

Abstract:

Despite the importance of the role and efforts made by the universities of the Kingdom of Saudi Arabia in reviving and preserving heritage architecture as an important cultural heritage in the Kingdom, The idea revolves around restoration and conservation processes and neglects the architectural heritage values, whose content can be used in sustainable contemporary architectural works. Educational values based on heritage architecture and how to integrate with the contemporary requirements were investigated in this research. For this purpose, by understanding the heritage architectural values as well as educational, academic process, the researcher presented an educational model of questionnaire forms for architecture students and the staff at the Architecture Department at Al-Baha University as a case study that serves the aims of the research. The results of the research show that heritage values especially those interview results are considered as a positive indicator of the importance of these values. The students and the staff need both to gain an understanding of heritage values as well as an understanding of theories of incorporating those values into the design process of contemporary local architecture. The research concludes that a correct understanding of the heritage values, its performance, and its reintegration with modern architecture technology should be focused on architectural education.

Keywords: heritage architecture, academic work, heritage values, sustainable contemporary local architectural

Procedia PDF Downloads 144
1705 The Role of Human Resource Flexibility and Agility in Achieving Sustainable Competitiveness

Authors: Agnieszka Leszczynska

Abstract:

Flexibility and agility constitute the most dominant features of modern human resource management systems. The former pertains to procedures, practices and competences of human resources, and the latter to the procedures and practices’ effectiveness in dealing with changing conditions in the surrounding environment. The purpose of the paper is to present the relations between the flexibility and agility of human resources and achieving sustainable competitiveness. Based upon hitherto research, we develop a conceptual model that links the constructs together. The conducted study is of theoretical and conceptual nature. Critical literature analysis and the synthesis method were applied. A premise was made that the three dimensions of HR (Human Resources) flexibility (employee skill flexibility, employee behaviour flexibility, and HR practice flexibility) and HR agility affect competitiveness, by increasing the flexibility, creativity of human resources, and improving quality performance, and exert an impact upon the quality of life of employees and social relations. In particular, the agility and flexibility of human resources contribute to the growth of adaptability and strategic orientation, which directly affects the organization's competitiveness. The research results will help to better understand the impact of flexibility and agility related to the HRM (Human Resources Management) system upon the implementation of the concept of sustainable development in the organization.

Keywords: agility, human resource, sustainable competitiveness, sustainable development

Procedia PDF Downloads 195
1704 Ethnolinguistic Otherness: The Vedda Language (Baasapojja) of Indigenous Adivasi (Veddas) of Dambana in Sri Lanka

Authors: Nimasha Malalasekera

Abstract:

Working with the indigenous Adivasi (Vedda) community of Dambana in the district of Badulla in Sri Lanka, this research documents linguistic data to address language and cultural endangerment. The ancestral language of Adivasi has undergone sustained restructuration over a long historical period due to its contact with Sinhala, an Indo-Aryan language spoken by the majority Sinhalese. The Vedda language is highly endangered today. At present, all speakers of the Vedda language spoken in Dambana are Adivasi men in the parent generation, who are Sinhala-Vedda bilinguals. Adivasi women and children do not speak the Vedda language but Sinhala in everyday life. Women can understand the Vedda language and would respond to a Vedda language utterance in Sinhala. The use of the Vedda language is largely restricted to self-ascribing Adivasi men who employ it in the context of cultural tourism in Dambana to index ethnolinguistic otherness. Adivasi of Dambana often refers to this distinct linguistic code that they speak as baasapojja or language. This research employs a cooperative model of ethnographic documentation to explore the interrelations between discursive practices, linguistic structures, and linguistic (and broader sociocultural) ideologies in this community. The Vedda language has been previously identified as a dialect of Sinhala or a creole emerging in the contact between Sinhala and the ancestral Vedda language. This paper analyzes the current language endangerment context of bilingual Adivasi members that allows the birth of a mixed language. The aim of this research is to preserve ongoing linguistic innovation among this endangered language speech community. It contributes to the appreciation of creative cultural and linguistic production of a stigmatized minuscule indigenous community of South Asia that strives to assert a distinct linguistic and cultural identity from the dominant populations.

Keywords: Vedda language, language endangerment, mixed languages, indigenous identity

Procedia PDF Downloads 81
1703 Analysis of Spamming Threats and Some Possible Solutions for Online Social Networking Sites (OSNS)

Authors: Dilip Singh Sisodia, Shrish Verma

Abstract:

Spamming is the most common issue seen nowadays in the Internet especially in Online Social Networking Sites (like Facebook, Twitter, and Google+ etc.). Spam messages keep wasting Internet bandwidth and the storage space of servers. On social network sites; spammers often disguise themselves by creating fake accounts and hijacking user’s accounts for personal gains. They behave like normal user and they continue to change their spamming strategy. To prevent this, most modern spam-filtering solutions are deployed on the receiver side; they are good at filtering spam for end users. In this paper we are presenting some spamming techniques their behaviour and possible solutions. We have analyzed how Spammers enters into online social networking sites (OSNSs) and how they target it and the techniques they use for it. The five discussed techniques of spamming techniques which are clickjacking, social engineered attacks, cross site scripting, URL shortening, and drive by download. We have used elgg framework for demonstration of some of spamming threats and respective implementation of solutions.

Keywords: online social networking sites, spam, attacks, internet, clickjacking / likejacking, drive-by-download, URL shortening, networking, socially engineered attacks, elgg framework

Procedia PDF Downloads 325
1702 Industrial Management of Highland Community: The Hmong Ethnic Group Hill Tribe, Phetchabun Province

Authors: Kusuma Palaprom

Abstract:

The aims of this research are: 1) to study Hmong ethnic group hill tribe’s way of life and community industrial management and 2) to bring the industrial management into the community. This is a Participatory Action Research (PAR) using qualitative and quantitative data. The findings are: 1) Way of living and learning from nature of Hmong ethnic group hill tribe bases on their cultural relic belief. Hmong‘s way of life or occupation is traditional agriculture which cannot be business because they cannot adopt the industrial management to the community economic innovation base on local wisdom. 2) Quality of life development using local wisdom cost is not worth. Hmong ethnic group hill tribe are lack of modern knowledge-managerial aspect and the application of local wisdom cost and 3) the government supports for Hmong’s developing of life quality are limited. Solving problem guidelines are: 1) to create awareness of ethnic group wisdom-industrial conservation. 2) Government policy need to give an opportunity and motivate ethnic group community to do the cultural-industrial conservation with industrial management process and local wisdom cost. In order to, improve the sustainability of quality of life.

Keywords: industrial management, highland community, community empowerment ethnic group

Procedia PDF Downloads 551
1701 A Study of Transferable Strategies in Multilanguage Learning

Authors: Zixi You

Abstract:

With the demand of multilingual speakers increasing in the job market, multi-language learning programs have become more and more popular among undergraduate students. A study on multi-language learning strategies is therefore highly demanded on both practical and theoretical levels. Based on previous classification of learning strategies in SLA, and an investigation of BA Modern Language program students (with post-A level L2 and ab initio L3 learning experience from year one), this study explores and compares different types of learning strategies used by multi-language speakers and learners, transferable learning strategies between L2 and L3, and factors affecting the transfer. The results indicate that all the 23 types of learning strategies of L2 are employed when learning L3 from ab initio level, yet with different tendencies. Learning strategy transfer from L2 to L3 (i.e., the learners attribute the applying of these L3 learning strategies to be a direct result of their L2 learning experience) are observed in all 23 types of learning strategies. Comparatively, six types of “cognitive strategies” have higher transfer tendency than others. With regard to the failure of the transfer of some particular L2 strategies and the development of independent L3 strategies of individual learners, factors such as language proficiency, language typology and learning environment have played important roles among others. The presentation of this study will provide audiences with detailed data, insightful analysis and discussion on both theoretical and practical aspects of multi-language learning that will benefit both students and educators.

Keywords: learning strategy, multi-language acquisition, second language acquisition, strategy transfer

Procedia PDF Downloads 555
1700 Combination of Standard Secondary Raw Materials and New Production Waste Materials in Green Concrete Technology

Authors: M. Tazky, R. Hela, P. Novosad, L. Osuska

Abstract:

This paper deals with the possibility of safe incorporation fluidised bed combustion fly ash (waste material) into cement matrix together with next commonly used secondary raw material, which is high-temperature fly ash. Both of these materials have a very high pozzolanic ability, and the right combination could bring important improvements in both the physico-mechanical properties and the better durability of a cement composite. This paper tries to determine the correct methodology for designing green concrete by using modern methods measuring rheology of fresh concrete and following hydration processes. The use of fluidised bed combustion fly ash in cement composite production as an admixture is not currently common, but there are some real possibilities for its potential. The most striking negative aspect is its chemical composition which supports the development of new product formation, influencing the durability of the composite. Another disadvantage is the morphology of grains, which have a negative effect on consistency. This raises the question of how this waste can be used in concrete production to emphasize its positive properties and eliminate negatives. The focal point of the experiment carried out on cement pastes was particularly on the progress of hydration processes, aiming for the possible acceleration of pozzolanic reactions of both types of fly ash.

Keywords: high temperature fly ash, fluidized bed combustion fly ash, pozzolan, CaO (calcium oxide), rheology

Procedia PDF Downloads 188
1699 Human Rights Violation in Modern Society

Authors: Shenouda Salib Hosni Rofail

Abstract:

The interface between development and human rights has long been the subject of scholarly debate. As a result, a set of principles ranging from the right to development to a human rights-based approach to development has been adopted to understand the dynamics between the two concepts. Despite these attempts, the exact link between development and human rights is not yet fully understood. However, the inevitable interdependence between the two concepts and the idea that development efforts must be made while respecting human rights have gained prominence in recent years. On the other hand, the emergence of sustainable development as a widely accepted approach to development goals and policies further complicates this unresolved convergence. The place of sustainable development in the human rights discourse and its role in ensuring the sustainability of development programs require systematic research. The aim of this article is, therefore, to examine the relationship between development and human rights, with a particular focus on the place of the principles of sustainable development in international human rights law. It will continue to examine whether it recognizes the right to sustainable development. Thus, the Article states that the principles of sustainable development are recognized directly or implicitly in various human rights instruments, which is an affirmative answer to the question posed above. Accordingly, this document scrutinizes international and regional human rights instruments, as well as the case law and interpretations of human rights bodies, to support this hypothesis.

Keywords: sustainable development, human rights, the right to development, the human rights-based approach to development, environmental rights, economic development, social sustainability human rights protection, human rights violations, workers’ rights, justice, security.

Procedia PDF Downloads 18
1698 The Contribution of Translation to Arabic and Islamic Civilization during the Golden Age (661–1258)

Authors: Smail Hadj Mahammed

Abstract:

Translation is not merely a process of conveying the meaning from one particular language into another to overcome language barriers and ensure a good understanding; it is also a work of civilization and progress. Without the translation of Greek, Indian and Persian works, Arabic and Islamic Civilization would not have taken off, and without the translations of Arabic works into Latin, and then into European languages, the scientific and technological revolution of the modern world would not have taken place. In this context, the present paper seeks to investigate how the translation movement contributed to the Arabic and Islamic Civilizations during the Golden Age. The research paper consists of three major parts: the first part provides a brief historical overview of the translation movement during the golden age, which witnessed two important eras: the Umayyad and Abbasid eras. The second part shows the main reasons why translation was a prominent cultural activity during the Golden Age and why it gained great interest from the Arabs. The last part highlights the constructive contribution of translation to the Arabic and Islamic Civilization during the period (661–1258). The results demonstrate that Arabic translation movement was unprecedented in the transmission of knowledge in the whole history of humankind and that translation during the Golden Age had significantly assisted in enriching the Arabic and Islamic civilizations, which had absorbed major and important scientific works of old Greek, Indian and Persian civilizations.

Keywords: Arabic and Islamic civilization, contribution, golden age, translation

Procedia PDF Downloads 95
1697 Smart-Textile Containers for Urban Mobility

Authors: René Vieroth, Christian Dils, M. V. Krshiwoblozki, Christine Kallmayer, Martin Schneider-Ramelow, Klaus-Dieter Lang

Abstract:

Green urban mobility in commercial and private contexts is one of the great challenges for the continuously growing cities all over the world. Bicycle based solutions are already and since a long time the key to success. Modern developments like e-bikes and high-end cargo-bikes complement the portfolio. Weight, aerodynamic drag, and security for the transported goods are the key factors for working solutions. Recent achievements in the field of smart-textiles allowed the creation of a totally new generation of intelligent textile cargo containers, which fulfill those demands. The fusion of technical textiles, design and electrical engineering made it possible to create an ecological solution which is very near to become a product. This paper shows all the details of this solution that includes an especially developed sensor textile for cut detection, a protective textile layer for intrusion prevention, an universal-charging-unit for energy harvesting from diverse sources and a low-energy alarm system with GSM/GPRS connection, GPS location and RFID interface.

Keywords: cargo-bike, cut-detection, e-bike, energy-harvesting, green urban mobility, logistics, smart-textiles, textile-integrity sensor

Procedia PDF Downloads 298
1696 Modeling and Characterization of the SiC Single Crystal Growth Process

Authors: T. Wejrzanowski, M. Grybczuk, E. Tymicki, K. J. Kurzydlowski

Abstract:

In the present study numerical simulations silicon carbide single crystal growth process in Physical Vapor Transport reactor are addressed. Silicon Carbide is a perspective material for many applications in modern electronics. One of the main challenges for wider applications of SiC is high price of high quality mono crystals. Improvement of silicon carbide manufacturing process has a significant influence on the product price. Better understanding of crystal growth allows for optimization of the process, and it can be achieved by numerical simulations. In this work Virtual Reactor software was used to simulate the process. Predicted geometrical properties of the final product and information about phenomena occurring inside process reactor were obtained. The latter is especially valuable because reactor chamber is inaccessible during the process due to high temperature inside the reactor (over 2000˚C). Obtained data was used for improvement of the process and reactor geometry. Resultant crystal quality was also predicted basing on crystallization front shape evolution and threading dislocation paths. Obtained results were confronted with experimental data and the results are in good agreement.

Keywords: Finite Volume Method, semiconductors, Physical Vapor Transport, silicon carbide

Procedia PDF Downloads 513
1695 Sociocultural Barriers to the Development of Autonomous Foreign Language Learning: Some Teaching Strategies to Overcome Such Challenges in a Mexican Context

Authors: Zaideth Zobeida Ponce Alonso, Laura Emilia Fierro Lopez, Maria del Rocio Dominguez Gaona

Abstract:

The present study is part of the Master in Modern Languages at the Universidad Autónoma de Baja California, and it aims to analyze how the sociocultural background might influence the development of learner autonomy in foreign language education in order to propose some strategies to overcome such challenges. Given the lack of research on the sociocultural barriers in learner autonomy in a Mexican context and the need to hear teachers’ voices about this issue, qualitative data was obtained from semi-structured interviews with six language teachers on their perspectives on learner autonomy, its application to the language classroom, and their experiences with Mexican and foreign learners/contexts in order to find out differences regarding learner autonomy. The results suggest three main sociocultural characteristics: preference for an authority figure, tendency towards collectivism, and low tolerance of ambiguity. Finally, nine strategies were proposed in order to help language teachers to deal with such sociocultural characteristics when fostering learner autonomy in the border city of Mexicali, where this study was carried out.

Keywords: learner autonomy, Mexican context, sociocultural influence, teachers' perspectives, teaching strategies

Procedia PDF Downloads 139
1694 A Speeded up Robust Scale-Invariant Feature Transform Currency Recognition Algorithm

Authors: Daliyah S. Aljutaili, Redna A. Almutlaq, Suha A. Alharbi, Dina M. Ibrahim

Abstract:

All currencies around the world look very different from each other. For instance, the size, color, and pattern of the paper are different. With the development of modern banking services, automatic methods for paper currency recognition become important in many applications like vending machines. One of the currency recognition architecture’s phases is Feature detection and description. There are many algorithms that are used for this phase, but they still have some disadvantages. This paper proposes a feature detection algorithm, which merges the advantages given in the current SIFT and SURF algorithms, which we call, Speeded up Robust Scale-Invariant Feature Transform (SR-SIFT) algorithm. Our proposed SR-SIFT algorithm overcomes the problems of both the SIFT and SURF algorithms. The proposed algorithm aims to speed up the SIFT feature detection algorithm and keep it robust. Simulation results demonstrate that the proposed SR-SIFT algorithm decreases the average response time, especially in small and minimum number of best key points, increases the distribution of the number of best key points on the surface of the currency. Furthermore, the proposed algorithm increases the accuracy of the true best point distribution inside the currency edge than the other two algorithms.

Keywords: currency recognition, feature detection and description, SIFT algorithm, SURF algorithm, speeded up and robust features

Procedia PDF Downloads 217
1693 The Imperative of Adult Education in the Knowledge Society

Authors: Najim Akorede Babalola

Abstract:

Adult Education is a multi and interdisciplinary in nature that cut across different fields of study which includes education, social sciences, engineering even information technologies that dominate the contemporary world among others. In the past, Adult Education has been used as an instrument of civilization by teaching people how to read and write as well as earning a better living. The present world has witnessed a transition from industrial age to information age which is also known as knowledge society needs Adult Education for knowledge acquisition and update of existing knowledge. An individual needs Adult Education in either of its various forms (on-the-job-training, in-service training, extramural classes, vocational education, continuing education among others) in order to develop towards the information society trends; this is because Adult Education is a process of transforming an individual through acquisition of relevant skills and knowledge for personal as well as societal development. Evidence abounds in the literature that Adult Education has not only assisted people in the medieval period but still assisting people in this modern society in changing and transforming their lives for a better living. This study, therefore, raised a salient question that with different ideas and innovations brought by the contemporary world, is Adult Education relevant? It is on this basis that this study intends to examine the relevance of Adult Education in the past and present in order to determine its future relevance.

Keywords: adult education, multi and inter-disciplinary, knowledge society, skill acquisition

Procedia PDF Downloads 331
1692 Convolutional Neural Network and LSTM Applied to Abnormal Behaviour Detection from Highway Footage

Authors: Rafael Marinho de Andrade, Elcio Hideti Shiguemori, Rafael Duarte Coelho dos Santos

Abstract:

Relying on computer vision, many clever things are possible in order to make the world safer and optimized on resource management, especially considering time and attention as manageable resources, once the modern world is very abundant in cameras from inside our pockets to above our heads while crossing the streets. Thus, automated solutions based on computer vision techniques to detect, react, or even prevent relevant events such as robbery, car crashes and traffic jams can be accomplished and implemented for the sake of both logistical and surveillance improvements. In this paper, we present an approach for vehicles’ abnormal behaviors detection from highway footages, in which the vectorial data of the vehicles’ displacement are extracted directly from surveillance cameras footage through object detection and tracking with a deep convolutional neural network and inserted into a long-short term memory neural network for behavior classification. The results show that the classifications of behaviors are consistent and the same principles may be applied to other trackable objects and scenarios as well.

Keywords: artificial intelligence, behavior detection, computer vision, convolutional neural networks, LSTM, highway footage

Procedia PDF Downloads 142
1691 CFD Simulation on Gas Turbine Blade and Effect of Twisted Hole Shape on Film Cooling Effectiveness

Authors: Thulodin Mat Lazim, Aminuddin Saat, Ammar Fakhir Abdulwahid, Zaid Sattar Kareem

Abstract:

Film cooling is one of the cooling systems investigated for the application to gas turbine blades. Gas turbines use film cooling in addition to turbulence internal cooling to protect the blades outer surface from hot gases. The present study concentrates on the numerical investigation of film cooling performance for a row of twisted cylindrical holes in modern turbine blade. The adiabatic film effectiveness and the heat transfer coefficient are determined numerical on a flat plate downstream of a row of inclined different cross section area hole exit by using Computational Fluid Dynamics (CFD). The swirling motion of the film coolant was induced the twisted angle of film cooling holes, which inclined an angle of α toward the vertical direction and surface of blade turbine. The holes angle α of the impingement mainstream was changed from 90°, 65°, 45°, 30° and 20°. The film cooling effectiveness on surface of blade turbine wall was measured by using 3D Computational Fluid Dynamics (CFD). Results showed that the effectiveness of rectangular twisted hole has the effectiveness among other cross section area of the hole at blowing ratio (0.5, 1, 1.5 and 2).

Keywords: turbine blade cooling, film cooling, geometry shape of hole, turbulent flow

Procedia PDF Downloads 525