Search results for: architecture firm practice
4120 Visualising Charles Bonnet Syndrome: Digital Co-Creation of Pseudohallucinations
Authors: Victoria H. Hamilton
Abstract:
Charles Bonnet Syndrome (CBS) is when a person experiences pseudohallucinations that fill in visual information from any type of sight loss. CBS arises from an epiphenomenal process, with the physical actions of sight resulting in the mental formations of images. These pseudohallucinations—referred to as visions by the CBS community—manifest in a wide range of forms, from complex scenes to simple geometric shapes. To share these unique visual experiences, a remote co-creation website was created where CBS participants communicated their lived experiences. This created a reflexive process, and we worked to produce true representations of these interesting and little-known phenomena. Digital reconstruction of the visions is utilised as it echoes the vivid, experiential movie-like nature of what is being perceived. This paper critically analyses co-creation as a method for making digital assets. The implications of the participants' vision impairments and the application of ethical safeguards are examined in this context. Important to note, this research is of a medical syndrome for a non-medical, practice-based design. CBS research to date is primarily conducted by the ophthalmic, neurological, and psychiatric fields and approached with the primary concerns of these specialties. This research contributes a distinct approach incorporating practice-based digital design, autoethnography, and phenomenology. Autoethnography and phenomenology combine as a foundation, with the first bringing understanding and insights, balanced by the second philosophical, bigger picture, and established approach. With further refining, it is anticipated that the research may be applied to other conditions. Conditions where articulating internal experiences proves challenging and the use of digital methods could aid communication. Both the research and CBS communities will benefit from the insights regarding the relationship between cognitive perceptions and the vision process. This research combines the digital visualising of visions with interest in the link between metaphor, embodied cognition, and image. The argument for a link between CBS visions and metaphor may appear evident due to the cross-category mapping of images that is necessary for comprehension. They both are— CBS visions and metaphors—the experience of picturing images, often with lateral connections and imaginative associations.Keywords: Charles Bonnet Syndrome, digital design, visual hallucinations, visual perception
Procedia PDF Downloads 444119 Genealogy of a Building: Tarikhaneh
Authors: Mohadeseh Salari Sardari
Abstract:
As Muslims conquered Iran, their first impression was to show their power over others. They needed mosques for their multiple needs like prayer, tax collecting, law-making, hearing of law cases, and most important of all, as a seat of government. Sometimes they did not have time to build mosques and only began to build them after years of ruling. Many religious buildings with pre-Islamic past survived in Iran, most of the fire temples in cities were destroyed or changed radically, but some deserted temples outside of cities survived, and based on these surviving buildings, we can trace changes in fire temples inside cities and discover how they were adapted and expanded to be mosques. In addition, there are some other buildings with doubts about their date of construction. These buildings might be transitional buildings between two different historical eras or might be an old building with a slight change. One of these interesting buildings is Tarikhaneh, a small, simple yet striking building. By tracing Tarikhaneh’s roots in other buildings like fire temples and secular buildings existed before Arab invasion, it can be better understood how the original form of Tatikhaneh was.Keywords: iranian architecture, early mosques, fire temples, adaptation and reuse
Procedia PDF Downloads 1374118 Automatic Queuing Model Applications
Authors: Fahad Suleiman
Abstract:
Queuing, in medical system is the process of moving patients in a specific sequence to a specific service according to the patients’ nature of illness. The term scheduling stands for the process of computing a schedule. This may be done by a queuing based scheduler. This paper focuses on the medical consultancy system, the different queuing algorithms that are used in healthcare system to serve the patients, and the average waiting time. The aim of this paper is to build automatic queuing system for organizing the medical queuing system that can analyses the queue status and take decision which patient to serve. The new queuing architecture model can switch between different scheduling algorithms according to the testing results and the factor of the average waiting time. The main innovation of this work concerns the modeling of the average waiting time is taken into processing, in addition with the process of switching to the scheduling algorithm that gives the best average waiting time.Keywords: queuing systems, queuing system models, scheduling algorithms, patients
Procedia PDF Downloads 3544117 Practical Application of Business Processes Simulation
Authors: M. Gregušová, V. Schindlerová, I. Šajdlerová, P. Mohyla, J. Kedroň
Abstract:
Company managers are always looking for more and more opportunities to succeed in today's fiercely competitive market. Maintain your place among the successful companies on the market today or come up with a revolutionary business idea; it is much more difficult than before. Each new or improved method, tools, or the approach that can improve the functioning of business processes or even the entire system is worth checking and verification. The use of simulation in the design of manufacturing systems and their management in practice is one of the ways without increased risk to find the optimal parameters of manufacturing processes and systems. The paper presents an example of using simulation to solve the bottleneck problem in concrete company.Keywords: practical applications, business processes, systems, simulation
Procedia PDF Downloads 6384116 Progression of Trauma: Myth Mess Mastery, Addressing and Grooming
Authors: Stuart Bassman
Abstract:
Services that focus on the synthesis of research and clinical practice are vital in providing efficacious change for the men and women who have been victims of childhood sexual abuse. This study will address what processes have been helpful in being a catalyst in changing one’s inner life as well as providing meaningful applications and fulfilling experiences. Initially, we would focus on the Myths regarding childhood sexual abuse. This would include Grooming behaviors and Delayed Disclosures. Subsequently, we would address the Mess that follows from not recognizing the adverse impairments that result from Childhood Sexual Abuse. Finally, we would conclude by looking at the Mastery that could arise from moving from being a Victim to a Survivor and a Thriver.Keywords: trauma, childhood, somatic, treatment
Procedia PDF Downloads 564115 The Study of Indigenous Communities in Sefidkuh Makran, the Showcase of Prehistoric Societies in the 21st Century, Based on Ethnoarchaeological Studies
Authors: Hossein Vahedi, Zahra Soleymani Fard
Abstract:
SefidKuh area in Baluchistan, Iran, is one of the impossible areas which the focused archeological investigations have not been on it. In the Sefidkuh area, there are colonies as if they were stopped in the Neolithic and Chalcolithic ages. These colonies exhibit culturally specific behaviors, which their study can reveal much of the cultural nature of the Neolithic, Chalcolithic inhabitants of the region. In the villages of this area, still, circular architecture is used in different types. The political management of the villages in the region is also the responsibility of Khan, whose characteristics can be compared to the prehistoric era. These people's livelihoods include hunting, animal husbandry, horticulture, and limited crop storage. Residents of Sefidkuh use the exchange of goods to obtain needed supplies that they themselves cannot produce. In this area, there are central location villages that are quite similar to the cluster model, and the Great Khan leads the surrounding villages.Keywords: archaeology, social structure, neolithic, chalcolithic, Sefidkuh, Baluchistan
Procedia PDF Downloads 1184114 Threat Analysis: A Technical Review on Risk Assessment and Management of National Testing Service (NTS)
Authors: Beenish Urooj, Ubaid Ullah, Sidra Riasat
Abstract:
National Testing Service-Pakistan (NTS) is an agency in Pakistan that conducts student success appraisal examinations. In this research paper, we must present a security model for the NTS organization. The security model will depict certain security countermeasures for a better defense against certain types of breaches and system malware. We will provide a security roadmap, which will help the company to execute its further goals to maintain security standards and policies. We also covered multiple aspects in securing the environment of the organization. We introduced the processes, architecture, data classification, auditing approaches, survey responses, data handling, and also training and awareness of risk for the company. The primary contribution is the Risk Survey, based on the maturity model meant to assess and examine employee training and knowledge of risks in the company's activities.Keywords: NTS, risk assessment, threat factors, security, services
Procedia PDF Downloads 704113 Depiction of a Circulated Double Psi-Shaped Microstrip Antenna for Ku-Band Satellite Applications
Authors: M. Naimur Rahman, Mohammad Tariqul Islam, Mandeep Singh Jit Singh, Norbahiah Misran
Abstract:
This paper presents the architecture and exploration of a compact, circulated double Psi-shaped microstrip patch antenna for Ku-band satellite applications. The antenna is composed of the double Psi-shaped patch in opposite focus which is circulated with a ring. The antenna size is 24 mm × 18 mm and the prototype is imprinted on Rogers RT/duroid 5880 materials with the depth of 1.57 mm. The substrate has a relative permittivity of 2.2 and the dielectric constant of 0.0009. The excitation is supplied through a 50Ω microstrip line. The performance of the presented antenna has been simulated and verified with the High-Frequency Structural Simulator (HFSS). The results depict that the antenna covers the frequency spectrum 14.6 - 17.4 GHz (Ku-band) with 10 dB return loss. The antenna has a 4.40 dBi maximum gain with stable radiation patterns throughout the operating band which makes the proposed antenna compatible for the satellite application in Ku-band.Keywords: Ku-band antenna, microstrip antenna, psi-shaped antenna, satellite applications
Procedia PDF Downloads 3104112 Polygamy versus Equality Rights: Polyandry as a Solution
Authors: Nqobizwe Mvelo Ngema
Abstract:
The right to equality has been accepted as one of the principles of jus cogens since the Second World War and it is protected in numerous international and regional human rights instruments. The convention on the elimination of all forms of discrimination against women (CEDAW) is a comprehensive document that serves as the international Bill of Rights for women and it prohibits polygamy. This paper examines whether the most unusual customary practice of polyandry would serve as a solution in elevating the status of women to be on par with that of man that are polygamists or not. This paper concludes by arguing that polyandry cannot solve the problem of inequalities that are confronted by women because even in polyandrous societies there is male domination that is detrimental to the equality rights of women.Keywords: human rights, polygamy, polyandry, polygyny
Procedia PDF Downloads 4994111 Diallyl Trisulfide Protects the Rat Liver from CCl4-Induced Injury and Fibrogenesis by Attenuating Oxidative Stress
Authors: Xiao-Jing Zhu, Liang Zhou, Shi-Zhong Zheng
Abstract:
Various studies have shown that diallyl trisulfide (DATS) can protect the liver injury, and DATS has a strong antioxidant property. The aim of this study is to evaluate the in vivo role of DATS in protecting the liver against injury and fibrogenesis and further explores the underlying mechanisms. Our results demonstrated that DATS protected the liver from CCl4-caused injury by suppressing the elevation of ALT and AST activities, and by improving the histological architecture of the liver. Treatment with DATS or colchicine improved the liver fibrosis by sirius red staining and immunofluorescence. In addition, immunohistochemistry, western blot, and RT-PCR analyses indicated that DATS inhibited HSC activation. Furthermore, DATS attenuated oxidative stress by increasing glutathione and reducing lipid peroxides and malondialdehyde. These findings suggest that the protective effect of DATS on CCl4-caused liver injury and liver fibrogenesis was, at least partially, attributed to its antioxidant activity.Keywords: liver fibrogenesis, liver injury, oxidative stress, DATS
Procedia PDF Downloads 4314110 Extending Image Captioning to Video Captioning Using Encoder-Decoder
Authors: Sikiru Ademola Adewale, Joe Thomas, Bolanle Hafiz Matti, Tosin Ige
Abstract:
This project demonstrates the implementation and use of an encoder-decoder model to perform a many-to-many mapping of video data to text captions. The many-to-many mapping occurs via an input temporal sequence of video frames to an output sequence of words to form a caption sentence. Data preprocessing, model construction, and model training are discussed. Caption correctness is evaluated using 2-gram BLEU scores across the different splits of the dataset. Specific examples of output captions were shown to demonstrate model generality over the video temporal dimension. Predicted captions were shown to generalize over video action, even in instances where the video scene changed dramatically. Model architecture changes are discussed to improve sentence grammar and correctness.Keywords: decoder, encoder, many-to-many mapping, video captioning, 2-gram BLEU
Procedia PDF Downloads 1084109 Efficient and Timely Mutual Authentication Scheme for RFID Systems
Authors: Hesham A. El Zouka, Mustafa M. Hosni ka
Abstract:
The Radio Frequency Identification (RFID) technology has a diverse base of applications, but it is also prone to security threats. There are different types of security attacks that limit the range of the RFID applications. For example, deploying the RFID networks in insecure environments could make the RFID system vulnerable to many types of attacks such as spoofing attack, location traceability attack, physical attack and many more. Therefore, security is often an important requirement for RFID systems. In this paper, RFID mutual authentication protocol is implemented based on mobile agent technology and timestamp, which are used to provide strong authentication and integrity assurances to both the RFID readers and their corresponding RFID tags. The integration of mobile agent technology and timestamp provides promising results towards achieving this goal and towards reducing the security threats in RFID systems.Keywords: RFID, security, authentication protocols, privacy, agent-based architecture, time-stamp, digital signature
Procedia PDF Downloads 2694108 Immersed in Design: Using an Immersive Teaching Space to Visualize Design Solutions
Authors: Lisa Chandler, Alistair Ward
Abstract:
A significant component of design pedagogy is the need to foster design thinking in various contexts and to support students in understanding links between educational exercises and their potential application in professional design practice. It is also important that educators provide opportunities for students to engage with new technologies and encourage them to imagine applying their design skills for a range of outcomes. Problem solving is central to design so it is also essential that students understand that there can be multiple solutions to a design brief, and are supported in undertaking creative experimentation to generate imaginative outcomes. This paper presents a case study examining some innovative approaches to addressing these elements of design pedagogy. It investigates the effectiveness of the Immerse Lab, a three wall projection room at the University of the Sunshine Coast, Australia, as a learning context for design practice, for generating ideas and for supporting learning involving the comparative display of design outcomes. The project required first year design students to create a simple graphic design derived from an ordinary object and to incorporate specific design criteria. Utilizing custom-designed software, the students’ solutions were projected together onto the Immerse walls to create a large-scale, immersive grid of images, which was used to compare and contrast various responses to the same problem. The software also enabled individual student designs to be transformed, multiplied and enlarged in multiple ways and prompted discussions around the applicability of the designs in real world contexts. Teams of students interacted with their projected designs, brainstorming imaginative applications for their outcomes. Analysis of 77 anonymous student surveys revealed that the majority of students found: learning in the Immerse Lab to be beneficial; comparative review more effective than in standard tutorial rooms; that the activity generated new ideas; it encouraged students to think differently about their designs; it inspired students to develop their existing designs or create new ones. The project demonstrates that curricula involving immersive spaces can be effective in supporting engaging and relevant design pedagogy and might be utilized in other disciplinary areas.Keywords: design pedagogy, immersive education, technology-enhanced learning, visualization
Procedia PDF Downloads 2594107 Knowledge, Attitude and Associated Factors of Practice towards Post Exposure Prophylaxis of HIV Infection among Health Professionals in Yeka and Kazanchis Health Center
Authors: Semira Zeru Haileslassie
Abstract:
Lack of awareness and practices of PEP treatment were observed among respondents, but they had a better attitude towards PEP. To this end, a formal training for all respondents regarding PEP for HIV prior to their clinical attachments is of utmost importance. The training ought to incorporate a brief clarification with respect to the unpleasant impact of non-adherence that essentially incorporate destitute treatment result and most prominent hazard of resistance and few given as a major cause for non-compliance to PEP, common transient side-effects of PEP and its administrations ought to be cloister educated healthcare specialists to diminish its effect on adherence. Besides, the propensity of detailing needle adhere harm was destitute that needs endeavors to progress. Progressing the culture of detailing and making the detailing handle simple is very necessary. In reality, announcing such wounds as early as conceivable will educate others not to commit same issue once more and, for the most part, will empower stakeholders to intercede the issue sometime prior to it re-occur. At long last, as distant as get up and go utilize has cleared out with so numerous bothers, risk decrease is the foremost choice. With this, taking the increased significance of protective barriers so as to decrease the hazard of exposure to HIV, distinctive stakeholders (the healing center hardware supply chain director, the HIV/ Helps clinic, the clinic chief, hardware and supply quality confirmation group, and other authoritative bodies) ought to work together in co-ordination to secure the supply and guarantee the quality of those crucial protective barriers and to advance demand health laborers to continuously wear protective barriers when exposed to HIV hazard components as well as to dispose appropriately once done. At long last, we prescribe future examiners to conduct planned multicenter studies with extra goals (counting indicator investigation) for way better generalization and result. In spite of satisfactory information and favorable state of mind towards PEP for HIV in most of the respondents, this study uncovered that there were delays in starting, low utilization, and fragmented use of the prescribed PEP. So, health care staff need to progress their practice on PEP of HIV through diverse training program related to PEP of HIV.Keywords: HIV infection, prophylaxis, knowledge, attitude
Procedia PDF Downloads 1954106 Residential Architecture and Its Representation in Movies: Bangkok's Spatial Research in the Study of Thai Cinematography
Authors: Janis Matvejs
Abstract:
Visual representation of a city creates unique perspectives that allow to interpret the urban environment and enable to understand a space that is culturally created and territorially organized. Residential complexes are an essential part of cities and cinema is a specific representation form of these areas. There has been very little research done on exploring how these areas are depicted in the Thai movies. The aim of this research is to interpret the discourse of residential areas of Bangkok throughout the 20th and 21st centuries and to examine essential changes in the residential structure. Specific cinematic formal techniques in relation to the urban image were used. The movie review results were compared with changes in Bangkok’s residential development. Movie analysis displayed that residential areas are frequently used in Thai cinematography and they make up an integral part of the urban visual perception.Keywords: Bangkok, cinema, residential area, representation, visual perception
Procedia PDF Downloads 1944105 Environmental Liability of Architects: Architects Destroying the City in Designed and Creative Way, Dhaka City
Authors: Md. Ratin
Abstract:
This paper aims to show how Dhaka city is getting destroyed and the creator and guide of the city – the architects destroying the city in more designed and creative way. The liability of architects should be first and foremost to make the would, country, city a better living environment. As without it where the architects will do their design? To make a better living environment architects should conserve the tress, river and other related ingredient related to the environment. This paper attempts to show how cutting down trees and filling rivers causing more problem than having a great architecture in those places. For increasing people in a city like Dhaka, we need more shelter. But for providing those architects building more living spaces. But as a liability of an architect, one should give something back to the environment too. With time the city’s greenery and water body are getting vanished like magic. And for this, the architects should be blamed for giving us a disastrous future. The analysis is based on literature survey and survey by questionnaire, interviews of users.Keywords: architect, environment, liability, river
Procedia PDF Downloads 3464104 Research Approaches for Identifying Images of the Past in the Built Environment
Authors: Ahmad Al-Zoabi
Abstract:
Development of research approaches for identifying images of the past in the built environment is at a beginning stage, and a review of the current literature reveals a limited body of research in this area. This study seeks to make a contribution to fill this void. It investigates the theoretical and empirical studies that examine the built environment as a medium for communicating the past in order to understand how images of the past are operationalized in these studies. Findings revealed that image could be operationalized in several ways depending on the focus of the study. Three concerns were addressed in this study when defining the image of the past: (a) to investigate an 'everyday' popular image of the past; (b) to look at the building's image as an integrated part of a larger image for the city; and (c) to find patterns within residents' images of the past. This study concludes that a future study is needed to address the effects of different scales (size and depth of history) of cities and of different cultural backgrounds of images of the past.Keywords: architecture, built environment, image of the past, research approaches
Procedia PDF Downloads 3164103 Advancing Communication Theory in the Age of Digital Technology: Bridging the Gap Between Traditional Models and Emerging Platforms
Authors: Sidique Fofanah
Abstract:
This paper explores the intersection of traditional communication theories and modern digital technologies, analyzing how established models adapt to contemporary communication platforms. It examines the evolving nature of interpersonal, group, and mass communication within digital environments, emphasizing the role of social media, AI-driven communication tools, and virtual reality in reshaping communication paradigms. The paper also discusses the implications for future research and practice in communication studies, proposing an integrated framework that accommodates both classical and emerging theories.Keywords: communication, traditional models, emerging platforms, digital media
Procedia PDF Downloads 264102 An Exploratory Case Study of the Transference of Skills and Dispositions Used by a Newly Qualified Teacher
Authors: Lynn Machin
Abstract:
Using the lens of a theoretical framework relating to learning to learn the intention of the case study was to explore how transferable the teaching and learning skills of a newly qualified teacher (post-compulsory education) were when used in an overseas, unfamiliar and challenging post-compulsory educational environment. Particularly, the research sought to explore how this newly qualified teacher made use of the skills developed during their teacher training and to ascertain if, and what, other skills were necessary in order for them to have a positive influence on their learners and for them to be able to thrive within a different country and learning milieu. This case study looks at the experience of a trainee teacher who recently qualified in the UK to teach in post compulsory education (i.e. post 16 education). Rather than gaining employment in a UK based academy or college of further education this newly qualified teacher secured her first employment as a teacher in a province in China. Moreover, the newly qualified teacher had limited travel experience and had never travelled to Asia. She was one of the quieter and more reserved members on the one year teacher training course and was the least likely of the group to have made the decision to work abroad. How transferable the pedagogical skills that she had gained during her training would be when used in a culturally different and therefore (to her, challenging) environment was a key focus of the study. Another key focus was to explore the dispositions being used by the newly qualified teacher in order for her to teach and to thrive in an overseas educational environment. The methodological approach used for this study was both interpretative and qualitative. Associated methods were: Observation: observing the wider and operational practice of the newly qualified teacher over a five day period, and their need, ability and willingness to be reflective, resilient, reciprocal and resourceful. Interview: semi-structured interview with the newly qualified teacher following the observation of her practice. Findings from this case study illuminate the modifications made by the newly qualified teacher to her bank of teaching and learning strategies as well as the essentiality of dispositions used by her to know how to learn and also, crucially, to be ready and willing to do so. Such dispositions include being resilient, resourceful, reciprocal and reflective; necessary in order to adapt to the emerging challenges encountered by the teacher during their first months of employment in China. It is concluded that developing the skills to teach is essential for good teaching and learning practices. Having dispositions that enable teachers to work in ever changing conditions and surroundings is, this paper argues, essential for transferability and longevity of use of these skills.Keywords: learning, post-compulsory, resilience, transferable
Procedia PDF Downloads 2924101 Modern Wars: States Responsibility
Authors: Lakshmi Chebolu
Abstract:
'War’, the word itself, is so vibrant and handcuffs the entire society. Since the beginning of manhood, the world has been evident in constant struggles. However, along with the growth of communities, relations, on the one hand, and disputes, on the other hand, infinitely increased. When states cannot or will not settle their disputes or differences by means of peaceful agreements, weapons are suddenly made to speak. It does not mean states can engage in war whenever they desire. At an international level, there has been a vast development of the law of war in the 20th century. War, it may be internal or international, in all situations, belligerent actors should follow the principles of warfare. With the advent of technology, the shape of war has changed, and it violates fundamental principles without observing basic norms. Conversely, states' attitudes towards international relationships are also undermined to some extent as state parties are not prioritized the communal interest rather than political or individual interest. In spite of the persistent development of communities, still many people are innocent victims of modern wars. It costs a toll on many lives, liberties, and properties and remains a major obstacle to nations' development. Recent incidents in Afghan are a live example to World Nations. We know that the principles of international law cannot be implemented very strictly on perpetrators due to the lacuna in the international legal system. However, the rules of war are universal in nature. The Geneva Convention, 1949 which are the core element of IHL, has been ratified by all 196 States. In fact, very few international treaties received this much of big support from nations. State’s approach towards Modern International Law, places a heavy burden on States practice towards in implementation of law. Although United Nations Security Council possesses certain powers under ‘Pacific Settlement of Disputes’, (Chapter VI) of the United Nations Charter to prevent disputes in a peaceful manner, conversely, this practice has been overlooked for many years due to political interests, favor, etc. Despite international consensus on the prohibition of war and protection of fundamental freedoms and human dignity, still, often, law has been misused by states’. The recent tendencies trigger questions about states’ willingness towards the implementation of the law. In view of the existing practices of nations, this paper aims to elevate the legal obligations of the international community to save the succeeding generations from the scourge of modern war practices.Keywords: modern wars, weapons, prohibition and suspension of war activities, states’ obligations
Procedia PDF Downloads 814100 Authentication of Physical Objects with Dot-Based 2D Code
Authors: Michał Glet, Kamil Kaczyński
Abstract:
Counterfeit goods and documents are a global problem, which needs more and more sophisticated methods of resolving it. Existing techniques using watermarking or embedding symbols on objects are not suitable for all use cases. To address those special needs, we created complete system allowing authentication of paper documents and physical objects with flat surface. Objects are marked using orientation independent and resistant to camera noise 2D graphic codes, named DotAuth. Based on the identifier stored in 2D code, the system is able to perform basic authentication and allows to conduct more sophisticated analysis methods, e.g., relying on augmented reality and physical properties of the object. In this paper, we present the complete architecture, algorithms and applications of the proposed system. Results of the features comparison of the proposed solution and other products are presented as well, pointing to the existence of many advantages that increase usability and efficiency in the means of protecting physical objects.Keywords: anti-forgery, authentication, paper documents, security
Procedia PDF Downloads 1334099 AgriFood Model in Ankara Regional Innovation Strategy
Authors: Coskun Serefoglu
Abstract:
The study aims to analyse how a traditional sector such as agri-food could be mobilized through regional innovation strategies. A principal component analysis as well as qualitative information, such as in-depth interviews, focus group and surveys, were employed to find the priority sectors. An agri-food model was developed which includes both a linear model and interactive model. The model consists of two main components, one of which is technological integration and the other one is agricultural extension which is based on Land-grant university approach of U.S. which is not a common practice in Turkey.Keywords: regional innovation strategy, interactive model, agri-food sector, local development, planning, regional development
Procedia PDF Downloads 1494098 Highly Linear and Low Noise AMR Sensor Using Closed Loop and Signal-Chopped Architecture
Authors: N. Hadjigeorgiou, A. C. Tsalikidou, E. Hristoforou, P. P. Sotiriadis
Abstract:
During the last few decades, the continuously increasing demand for accurate and reliable magnetic measurements has paved the way for the development of different types of magnetic sensing systems as well as different measurement techniques. Sensor sensitivity and linearity, signal-to-noise ratio, measurement range, cross-talk between sensors in multi-sensor applications are only some of the aspects that have been examined in the past. In this paper, a fully analog closed loop system in order to optimize the performance of AMR sensors has been developed. The operation of the proposed system has been tested using a Helmholtz coil calibration setup in order to control both the amplitude and direction of magnetic field in the vicinity of the AMR sensor. Experimental testing indicated that improved linearity of sensor response, as well as low noise levels can be achieved, when the system is employed.Keywords: AMR sensor, closed loop, memory effects, chopper, linearity improvement, sensitivity improvement, magnetic noise, electronic noise
Procedia PDF Downloads 3624097 Perpetrator Trauma in Current World Cinema
Authors: Raya Morag
Abstract:
This paper proposes a new paradigm for cinema/trauma studies - the trauma of the perpetrator. Canonical trauma research from Freud’s Aetiology of Hysteria to the present has been carried out from the perspective of identification with the victim, as have cinema trauma research and contemporary humanities-based trauma studies, climaxing during the 1990s in widespread interest in the victim vis-à-vis the Holocaust, war, and domestic violence. Breaking over 100 years of repression of the abhorrent and rejected concept of the perpetrator in psychoanalytic-based research proposes an uncanny shift in our conception of psychoanalysis' trajectory from women's 'hysteria' to 'post-traumatic stress disorder'. This new paradigm is driven by the global emergence of new waves of films (2007-2015) representing trauma suffered by perpetrators involved in the new style of war entailing deliberate targeting of non-combatants. Analyzing prominent examples from Israeli post-second Intifada documentaries (e.g., Ari Folman’s Waltz with Bashir), and post post-Iraq (and Afghanistan) War American documentaries (e.g., Errol Morris' Standard Operating Procedure), the paper discusses the limitations of victim trauma by the firm boundaries it (rightly) set in order to defend such victims of nineteenth and especially twentieth-century catastrophes; the epistemological processes needed in order to consider perpetrators’ trauma as an inevitable part of psychiatric-psychological and cultural perspectives on trauma, and, thus, the definition of perpetrators' trauma in contrast to victims'. It also analyzes the perpetrator's figure in order to go beyond the limitation of current trauma theory's relation to the Real, thus transgressing the 'unspeakableness' of the trauma itself. The paper seeks an exploration of what perpetrator trauma teaches us not only as a counter-paradigm to victim trauma, but as a reflection on the complex intertwining of the two paradigms in the twenty-first century collective new war unconscious, and on what psychoanalysis might offer us in the first decade of this terrorized-ethnicized century.Keywords: American war documentaries, Israeli war documentaries, 'new war', perpetrator trauma
Procedia PDF Downloads 2974096 Home Legacy Device Output Estimation Using Temperature and Humidity Information by Adaptive Neural Fuzzy Inference System
Authors: Sung Hyun Yoo, In Hwan Choi, Jun Ho Jung, Choon Ki Ahn, Myo Taeg Lim
Abstract:
Home energy management system (HEMS) has been issued to reduce the power consumption. The HEMS performs electric power control for the indoor electric device. However, HEMS commonly treats the smart devices. In this paper, we suggest the output estimation of home legacy device using the artificial neural fuzzy inference system (ANFIS). This paper discusses the overview and the architecture of the system. In addition, accurate performance of the output estimation using the ANFIS inference system is shown via a numerical example.Keywords: artificial neural fuzzy inference system (ANFIS), home energy management system (HEMS), smart device, legacy device
Procedia PDF Downloads 5454095 A Framework and Case Study for Sustainable Development of Urban Areas
Authors: Yasaman Zeinali, Farid Khosravikia
Abstract:
This paper presents a multi-objective framework for sustainable urban development. The proposed framework aims to address different aspects of sustainability in urban development planning. These aspects include, but are not limited to education, health, job opportunities, architecture, culture, environment, mobility, energy, water, waste, and so on. Then, the proposed framework is applied to the Brackenridge Tract (an area in downtown Austin, Texas), to redevelop that area in a sustainable way. The detail of the implementation process is presented in this paper. The ultimate goal of this paper is to develop a sustainable area in downtown Austin with ensuring that it locally meets the needs of present and future generations with respect to economic, social, environmental, health as well as cultural aspects. Moreover, it helps the city with the population growth problem by accommodating more people in that area.Keywords: urban planning, sustainability, sustainable urban development, environmental impacts of human activities
Procedia PDF Downloads 2534094 A Taxonomy of Routing Protocols in Wireless Sensor Networks
Authors: A. Kardi, R. Zagrouba, M. Alqahtani
Abstract:
The Internet of Everything (IoE) presents today a very attractive and motivating field of research. It is basically based on Wireless Sensor Networks (WSNs) in which the routing task is the major analysis topic. In fact, it directly affects the effectiveness and the lifetime of the network. This paper, developed from recent works and based on extensive researches, proposes a taxonomy of routing protocols in WSNs. Our main contribution is that we propose a classification model based on nine classes namely application type, delivery mode, initiator of communication, network architecture, path establishment (route discovery), network topology (structure), protocol operation, next hop selection and latency-awareness and energy-efficient routing protocols. In order to provide a total classification pattern to serve as reference for network designers, each class is subdivided into possible subclasses, presented, and discussed using different parameters such as purposes and characteristics.Keywords: routing, sensor, survey, wireless sensor networks, WSNs
Procedia PDF Downloads 1824093 Application of Modulo-2 Arithmetic in Securing Communicated Messages throughout the Globe
Authors: Ejd Garba, Okike Benjamin
Abstract:
Today, the word encryption has become very popular even among non-computer professionals. There is no doubt that some works have been carried out in this area, but more works need to be done. Presently, most of the works on encryption is concentrated on the sender of the message without paying any attention to the message recipient. However, it is a good practice if any message sent to someone is received by the particular person whom the message is sent to. This work seeks to ensure that at the receiving end of the message, there is a security to ensure that the recipient computes a key that would enable the encrypted message to be accessed. This key would be in form of password. This would make it possible for a given message to be sent to several people at the same time. When this happens, it is only those people who computes the key correctly that would be given the opportunity to access even the encrypted message, which can in turn be decrypted using the appropriate key.Keywords: arithmetic, cyber space, modulo-2, information security
Procedia PDF Downloads 3204092 Stop Forced Child Marriage: A Comparative Global Law Analysis
Authors: Michelle J. Miller
Abstract:
Millions of girls are forcibly married during the transitional period between puberty and adulthood. At a stage of vulnerability; cultural practices, religious rights, and social standards place girls in a position where they are catapult into womanhood. An advocate against forced child marriage could argue that child rights, cultural rights, religious rights, right to marry, right to life, right to health, right to education, right to be free from slavery, right to be free from torture, right to consent to marriage are all violated by the practice of child marriage. This paper will present how some of these rights are violated and how they establish the need for change.Keywords: child marriage, forced child marriage, children's rights, religious rights, cultural rights
Procedia PDF Downloads 4374091 An Earth Mover’s Distance Algorithm Based DDoS Detection Mechanism in SDN
Authors: Yang Zhou, Kangfeng Zheng, Wei Ni, Ren Ping Liu
Abstract:
Software-defined networking (SDN) provides a solution for scalable network framework with decoupled control and data plane. However, this architecture also induces a particular distributed denial-of-service (DDoS) attack that can affect or even overwhelm the SDN network. DDoS attack detection problem has to date been mostly researched as entropy comparison problem. However, this problem lacks the utilization of SDN, and the results are not accurate. In this paper, we propose a DDoS attack detection method, which interprets DDoS detection as a signature matching problem and is formulated as Earth Mover’s Distance (EMD) model. Considering the feasibility and accuracy, we further propose to define the cost function of EMD to be a generalized Kullback-Leibler divergence. Simulation results show that our proposed method can detect DDoS attacks by comparing EMD values with the ones computed in the case without attacks. Moreover, our method can significantly increase the true positive rate of detection.Keywords: DDoS detection, EMD, relative entropy, SDN
Procedia PDF Downloads 338