Search results for: digital history
2508 Educating on Historic Preservation in the Alabama Gulf Coast: The Case of the Peninsula of Mobile
Authors: Asmaa Benbaba
Abstract:
A series of action plans motivated this work within the city of mobile as the big category and the Peninsula more particularly. Most of the projects sought to educate about the historical and environmental assets of the place, to improve aesthetics, to preserve the natural resources on the Bayou, spread awareness, and reach out to the community. This study was conducted to preserve significant heritage landscapes, and significant historic buildings in the neighborhood of the Peninsula of Mobile at the state of Alabama, while simultaneously strengthen the cultural and historical resources. The purpose of this planning action was to provide planning regulations for the suburban areas of Mobile in Alabama. The plan attempted to overlap three main layers: community, environment, and history. The method that was used to collect data and conduct research was mainly qualitative. The Geographic Information System (GIS) was the tool used to represent this complexity. Results from this study revealed several interventions made to 'neighborhood marina.' The interventions were strategic scenarios to preserve the water landscape, create affordable leisure, connect the Dauphin Island Parkway to the water, preserve all the environmental layers, and add value to the neighborhoods of the Peninsula.Keywords: community outreach, education, historic preservation, peninsula
Procedia PDF Downloads 1352507 Fuzzy Data, Random Drift, and a Theoretical Model for the Sequential Emergence of Religious Capacity in Genus Homo
Authors: Margaret Boone Rappaport, Christopher J. Corbally
Abstract:
The ancient ape ancestral population from which living great ape and human species evolved had demographic features affecting their evolution. The population was large, had great genetic variability, and natural selection was effective at honing adaptations. The emerging populations of chimpanzees and humans were affected more by founder effects and genetic drift because they were smaller. Natural selection did not disappear, but it was not as strong. Consequences of the 'population crash' and the human effective population size are introduced briefly. The history of the ancient apes is written in the genomes of living humans and great apes. The expansion of the brain began before the human line emerged. Coalescence times for some genes are very old – up to several million years, long before Homo sapiens. The mismatch between gene trees and species trees highlights the anthropoid speciation processes, and gives the human genome history a fuzzy, probabilistic quality. However, it suggests traits that might form a foundation for capacities emerging later. A theoretical model is presented in which the genomes of early ape populations provide the substructure for the emergence of religious capacity later on the human line. The model does not search for religion, but its foundations. It suggests a course by which an evolutionary line that began with prosimians eventually produced a human species with biologically based religious capacity. The model of the sequential emergence of religious capacity relies on cognitive science, neuroscience, paleoneurology, primate field studies, cognitive archaeology, genomics, and population genetics. And, it emphasizes five trait types: (1) Documented, positive selection of sensory capabilities on the human line may have favored survival, but also eventually enriched human religious experience. (2) The bonobo model suggests a possible down-regulation of aggression and increase in tolerance while feeding, as well as paedomorphism – but, in a human species that remains cognitively sharp (unlike the bonobo). The two species emerged from the same ancient ape population, so it is logical to search for shared traits. (3) An up-regulation of emotional sensitivity and compassion seems to have occurred on the human line. This finds support in modern genetic studies. (4) The authors’ published model of morality's emergence in Homo erectus encompasses a cognitively based, decision-making capacity that was hypothetically overtaken, in part, by religious capacity. Together, they produced a strong, variable, biocultural capability to support human sociability. (5) The full flowering of human religious capacity came with the parietal expansion and smaller face (klinorhynchy) found only in Homo sapiens. Details from paleoneurology suggest the stage was set for human theologies. Larger parietal lobes allowed humans to imagine inner spaces, processes, and beings, and, with the frontal lobe, led to the first theologies composed of structured and integrated theories of the relationships between humans and the supernatural. The model leads to the evolution of a small population of African hominins that was ready to emerge with religious capacity when the species Homo sapiens evolved two hundred thousand years ago. By 50-60,000 years ago, when human ancestors left Africa, they were fully enabled.Keywords: genetic drift, genomics, parietal expansion, religious capacity
Procedia PDF Downloads 3412506 A Recognition Method for Spatio-Temporal Background in Korean Historical Novels
Authors: Seo-Hee Kim, Kee-Won Kim, Seung-Hoon Kim
Abstract:
The most important elements of a novel are the characters, events and background. The background represents the time, place and situation that character appears, and conveys event and atmosphere more realistically. If readers have the proper knowledge about background of novels, it may be helpful for understanding the atmosphere of a novel and choosing a novel that readers want to read. In this paper, we are targeting Korean historical novels because spatio-temporal background especially performs an important role in historical novels among the genre of Korean novels. To the best of our knowledge, we could not find previous study that was aimed at Korean novels. In this paper, we build a Korean historical national dictionary. Our dictionary has historical places and temple names of kings over many generations as well as currently existing spatial words or temporal words in Korean history. We also present a method for recognizing spatio-temporal background based on patterns of phrasal words in Korean sentences. Our rules utilize postposition for spatial background recognition and temple names for temporal background recognition. The knowledge of the recognized background can help readers to understand the flow of events and atmosphere, and can use to visualize the elements of novels.Keywords: data mining, Korean historical novels, Korean linguistic feature, spatio-temporal background
Procedia PDF Downloads 2762505 Book Exchange System with a Hybrid Recommendation Engine
Authors: Nilki Upathissa, Torin Wirasinghe
Abstract:
This solution addresses the challenges faced by traditional bookstores and the limitations of digital media, striking a balance between the tactile experience of printed books and the convenience of modern technology. The book exchange system offers a sustainable alternative, empowering users to access a diverse range of books while promoting community engagement. The user-friendly interfaces incorporated into the book exchange system ensure a seamless and enjoyable experience for users. Intuitive features for book management, search, and messaging facilitate effortless exchanges and interactions between users. By streamlining the process, the system encourages readers to explore new books aligned with their interests, enhancing the overall reading experience. Central to the system's success is the hybrid recommendation engine, which leverages advanced technologies such as Long Short-Term Memory (LSTM) models. By analyzing user input, the engine accurately predicts genre preferences, enabling personalized book recommendations. The hybrid approach integrates multiple technologies, including user interfaces, machine learning models, and recommendation algorithms, to ensure the accuracy and diversity of the recommendations. The evaluation of the book exchange system with the hybrid recommendation engine demonstrated exceptional performance across key metrics. The high accuracy score of 0.97 highlights the system's ability to provide relevant recommendations, enhancing users' chances of discovering books that resonate with their interests. The commendable precision, recall, and F1score scores further validate the system's efficacy in offering appropriate book suggestions. Additionally, the curve classifications substantiate the system's effectiveness in distinguishing positive and negative recommendations. This metric provides confidence in the system's ability to navigate the vast landscape of book choices and deliver recommendations that align with users' preferences. Furthermore, the implementation of this book exchange system with a hybrid recommendation engine has the potential to revolutionize the way readers interact with printed books. By facilitating book exchanges and providing personalized recommendations, the system encourages a sense of community and exploration within the reading community. Moreover, the emphasis on sustainability aligns with the growing global consciousness towards eco-friendly practices. With its robust technical approach and promising evaluation results, this solution paves the way for a more inclusive, accessible, and enjoyable reading experience for book lovers worldwide. In conclusion, the developed book exchange system with a hybrid recommendation engine represents a progressive solution to the challenges faced by traditional bookstores and the limitations of digital media. By promoting sustainability, widening access to printed books, and fostering engagement with reading, this system addresses the evolving needs of book enthusiasts. The integration of user-friendly interfaces, advanced machine learning models, and recommendation algorithms ensure accurate and diverse book recommendations, enriching the reading experience for users.Keywords: recommendation systems, hybrid recommendation systems, machine learning, data science, long short-term memory, recurrent neural network
Procedia PDF Downloads 922504 The Impact of Technological Advancement on Academic Performance of Mathematics Students in Tertiary Institutions in Ekiti State, Nigeria
Authors: Odunayo E. Popoola, Charles A. Aladesaye, Sunday O. Gbenro
Abstract:
The study investigated the impact of technological advancement on the academic performance of Mathematics students in tertiary institutions in Ekiti State, Nigeria. The quasi-experimental research design was adopted for the study. The population for the study consisted of all the 100 level undergraduates and all Mathematics lecturers in the Department of Mathematics in all the five tertiary institutions in the State. The sample of this study was made of one hundred (100) students and fifty (50) lecturers randomly selected using stratified sampling technique. Hypotheses were postulated to find out whether (i) advancement in technology influences the academic performance of students in Mathematics (ii) teaching method and gender disparity influences the academic performance of students in Mathematics. The study revealed that teaching method, gender, and technology influence academic performance of students in Mathematics. Based on the findings, it is recommended that curriculum and assessment in school Mathematics should explicitly require that all undergraduate become proficient in using digital technologies for mathematical purposes so as to enhance the better performance of students in Mathematics.Keywords: mathematics, performance, tertiary institutions, technology
Procedia PDF Downloads 1792503 Face Recognition Using Eigen Faces Algorithm
Authors: Shweta Pinjarkar, Shrutika Yawale, Mayuri Patil, Reshma Adagale
Abstract:
Face recognition is the technique which can be applied to the wide variety of problems like image and film processing, human computer interaction, criminal identification etc. This has motivated researchers to develop computational models to identify the faces, which are easy and simple to implement. In this, demonstrates the face recognition system in android device using eigenface. The system can be used as the base for the development of the recognition of human identity. Test images and training images are taken directly with the camera in android device.The test results showed that the system produces high accuracy. The goal is to implement model for particular face and distinguish it with large number of stored faces. face recognition system detects the faces in picture taken by web camera or digital camera and these images then checked with training images dataset based on descriptive features. Further this algorithm can be extended to recognize the facial expressions of a person.recognition could be carried out under widely varying conditions like frontal view,scaled frontal view subjects with spectacles. The algorithm models the real time varying lightning conditions. The implemented system is able to perform real-time face detection, face recognition and can give feedback giving a window with the subject's info from database and sending an e-mail notification to interested institutions using android application. Face recognition is the technique which can be applied to the wide variety of problems like image and film processing, human computer interaction, criminal identification etc. This has motivated researchers to develop computational models to identify the faces, which are easy and simple to implement. In this , demonstrates the face recognition system in android device using eigenface. The system can be used as the base for the development of the recognition of human identity. Test images and training images are taken directly with the camera in android device.The test results showed that the system produces high accuracy. The goal is to implement model for particular face and distinguish it with large number of stored faces. face recognition system detects the faces in picture taken by web camera or digital camera and these images then checked with training images dataset based on descriptive features. Further this algorithm can be extended to recognize the facial expressions of a person.recognition could be carried out under widely varying conditions like frontal view,scaled frontal view subjects with spectacles. The algorithm models the real time varying lightning conditions. The implemented system is able to perform real-time face detection, face recognition and can give feedback giving a window with the subject's info from database and sending an e-mail notification to interested institutions using android application.Keywords: face detection, face recognition, eigen faces, algorithm
Procedia PDF Downloads 3582502 Sexual Violence against Men in Conflicts: A Neglected Serious Issue
Authors: Olalekan Olaluwoye, Joanne Williams, Elizabeth Hoban, Sonia Brockington
Abstract:
Cases of sexual violence against men have been reported in at least twenty-five conflict situations in history. However, there is a paucity of academic literature and minimal media, policy and legal discussions on sexual violence against men. Most studies and discussions remain locked in the ‘male perpetrators, female victims’ paradigm. Male victims continue to suffer the consequences of sexual violence in conflict and post-conflict settings in silence. A rigorous narrative systematic review of the literature revealed few studies on the subject and those that exist have a narrow focus on rape as the only form of sexual violence despite the existence of other forms of sexual violence that have equally devastating effects. This paper argues that while research and discussions on sexual violence against women should continue, it is time to conduct rigorous mixed methods research to understand the experiences of men and boys survivors of sexual violence. There is a need to study sexual violence more broadly, without limiting it to rape, and to understand the determinants and health implications of sexual violence perpetrated on men. The paper concludes by proposing a research approach that gives voice to the experiences of male survivors of sexual violence in conflict and post-conflict settings.Keywords: conflict, male survivors, post-conflict settings, sexual violence
Procedia PDF Downloads 1502501 Failure Mechanisms of Isolated vs. in Aggregate Historical Buildings: A Case Study for Timisoara, Romania
Authors: I. Apostol, M. Mosoarca
Abstract:
Romania is a seismic country, with two major seismic zones, Vrancea and Banat. One of the most important cities from Banat seismic area is Timisoara, where a lot of valuable historical buildings were built before any design codes, but still they kept their stability during past earthquakes. This article presents the influence of the adjacent buildings during an earthquake and the way that the specific failure mechanism is changed when the building is part of an aggregate. The investigation was made using nonlinear analysis based on Tremuri software, first analyzing the buildings as isolated and second, considering the entire aggregate of buildings. There were noticed significant differences through the two situations regarding the specific failure mechanism activated for each building, showing the fact that in some situations, the presence of the adjacent buildings has positive or negative contribution for the seismic behavior of the analyzed one. The difference between the failure mechanism of the same buildings considered isolated and in aggregate aims to provide explications for the good structural state of the existing historical areas of Timisoara, as part of a larger multidisciplinary study, which will help local authorities to prioritize the consolidation works for the historical buildings in order to assure that the history of the city will be kept alive for the next generations.Keywords: failure mechanism, analysis, aggregate, masonry, earthquake
Procedia PDF Downloads 1442500 Exploring the Charm of Chongqing City based on the Regional Characteristics of Mountain Walking Space: A Case Study of Yuzhong Peninsula
Authors: Liu Danping
Abstract:
Walking space has very important historical and cultural value in ancient and even modern urban development. As far as the footpath itself is concerned, it reflects the spatial organization mode and traditional architectural construction characteristics of mountain cities. In terms of the spatial nature of streets, traditional streets contain the history of urban development and the most primitive urban life. The slow walking speed allows people to carefully perceive the space and scenery along the way. The real city life in the streets often makes people feel the cultural connotation and unique charm of the city. According to the regional characteristics of pedestrian traffic in the main urban area of Chongqing, the charm of chongqing is discussed. Based on the study of chongqing characteristic walking space elements, this paper summarizes the characteristics of Chongqing urban walking traffic, analyzes the existing problems of mountain city walking traffic, and takes Yuzhong Peninsula as an example to analyze the charm promotion strategy of urban walking traffic.Keywords: mountain city, walking space, urban charm, urban renewal, regional culture
Procedia PDF Downloads 922499 Agenesis of the Corpus Callosum: The Role of Neuropsychological Assessment with Implications to Psychosocial Rehabilitation
Authors: Ron Dick, P. S. D. V. Prasadarao, Glenn Coltman
Abstract:
Agenesis of the corpus callosum (ACC) is a failure to develop corpus callosum - the large bundle of fibers of the brain that connects the two cerebral hemispheres. It can occur as a partial or complete absence of the corpus callosum. In the general population, its estimated prevalence rate is 1 in 4000 and a wide range of genetic, infectious, vascular, and toxic causes have been attributed to this heterogeneous condition. The diagnosis of ACC is often achieved by neuroimaging procedures. Though persons with ACC can perform normally on intelligence tests they generally present with a range of neuropsychological and social deficits. The deficit profile is characterized by poor coordination of motor movements, slow reaction time, processing speed and, poor memory. Socially, they present with deficits in communication, language processing, the theory of mind, and interpersonal relationships. The present paper illustrates the role of neuropsychological assessment with implications to psychosocial management in a case of agenesis of the corpus callosum. Method: A 27-year old left handed Caucasian male with a history of ACC was self-referred for a neuropsychological assessment to assist him in his employment options. Parents noted significant difficulties with coordination and balance at an early age of 2-3 years and he was diagnosed with dyspraxia at the age of 14 years. History also indicated visual impairment, hypotonia, poor muscle coordination, and delayed development of motor milestones. MRI scan indicated agenesis of the corpus callosum with ventricular morphology, widely spaced parallel lateral ventricles and mild dilatation of the posterior horns; it also showed colpocephaly—a disproportionate enlargement of the occipital horns of the lateral ventricles which might be affecting his motor abilities and visual defects. The MRI scan ruled out other structural abnormalities or neonatal brain injury. At the time of assessment, the subject presented with such problems as poor coordination, slowed processing speed, poor organizational skills and time management, and difficulty with social cues and facial expressions. A comprehensive neuropsychological assessment was planned and conducted to assist in identifying the current neuropsychological profile to facilitate the formulation of a psychosocial and occupational rehabilitation programme. Results: General intellectual functioning was within the average range and his performance on memory-related tasks was adequate. Significant visuospatial and visuoconstructional deficits were evident across tests; constructional difficulties were seen in tasks such as copying a complex figure, building a tower and manipulating blocks. Poor visual scanning ability and visual motor speed were evident. Socially, the subject reported heightened social anxiety, difficulty in responding to cues in the social environment, and difficulty in developing intimate relationships. Conclusion: Persons with ACC are known to present with specific cognitive deficits and problems in social situations. Findings from the current neuropsychological assessment indicated significant visuospatial difficulties, poor visual scanning and problems in social interactions. His general intellectual functioning was within the average range. Based on the findings from the comprehensive neuropsychological assessment, a structured psychosocial rehabilitation programme was developed and recommended.Keywords: agenesis, callosum, corpus, neuropsychology, psychosocial, rehabilitation
Procedia PDF Downloads 2752498 Modeling of Transformer Winding for Transients: Frequency-Dependent Proximity and Skin Analysis
Authors: Yazid Alkraimeen
Abstract:
Precise prediction of dielectric stresses and high voltages of power transformers require the accurate calculation of frequency-dependent parameters. A lack of accuracy can result in severe damages to transformer windings. Transient conditions is stuided by digital computers, which require the implementation of accurate models. This paper analyzes the computation of frequency-dependent skin and proximity losses included in the transformer winding model, using analytical equations and Finite Element Method (FEM). A modified formula to calculate the proximity and the skin losses is presented. The results of the frequency-dependent parameter calculations are verified using the Finite Element Method. The time-domain transient voltages are obtained using Numerical Inverse Laplace Transform. The results show that the classical formula for proximity losses is overestimating the transient voltages when compared with the results obtained from the modified method on a simple transformer geometry.Keywords: fast front transients, proximity losses, transformer winding modeling, skin losses
Procedia PDF Downloads 1362497 Improved Anatomy Teaching by the 3D Slicer Platform
Authors: Ahmedou Moulaye Idriss, Yahya Tfeil
Abstract:
Medical imaging technology has become an indispensable tool in many branches of the biomedical, health area, and research and is vitally important for the training of professionals in these fields. It is not only about the tools, technologies, and knowledge provided but also about the community that this training project proposes. In order to be able to raise the level of anatomy teaching in the medical school of Nouakchott in Mauritania, it is necessary and even urgent to facilitate access to modern technology for African countries. The role of technology as a key driver of justifiable development has long been recognized. Anatomy is an essential discipline for the training of medical students; it is a key element for the training of medical specialists. The quality and results of the work of a young surgeon depend on his better knowledge of anatomical structures. The teaching of anatomy is difficult as the discipline is being neglected by medical students in many academic institutions. However, anatomy remains a vital part of any medical education program. When anatomy is presented in various planes medical students approve of difficulties in understanding. They do not increase their ability to visualize and mentally manipulate 3D structures. They are sometimes not able to correctly identify neighbouring or associated structures. This is the case when they have to make the identification of structures related to the caudate lobe when the liver is moved to different positions. In recent decades, some modern educational tools using digital sources tend to replace old methods. One of the main reasons for this change is the lack of cadavers in laboratories with poorly qualified staff. The emergence of increasingly sophisticated mathematical models, image processing, and visualization tools in biomedical imaging research have enabled sophisticated three-dimensional (3D) representations of anatomical structures. In this paper, we report our current experience in the Faculty of Medicine in Nouakchott Mauritania. One of our main aims is to create a local learning community in the fields of anatomy. The main technological platform used in this project is called 3D Slicer. 3D Slicer platform is an open-source application available for free for viewing, analysis, and interaction with biomedical imaging data. Using the 3D Slicer platform, we created from real medical images anatomical atlases of parts of the human body, including head, thorax, abdomen, liver, and pelvis, upper and lower limbs. Data were collected from several local hospitals and also from the website. We used MRI and CT-Scan imaging data from children and adults. Many different anatomy atlases exist, both in print and digital forms. Anatomy Atlas displays three-dimensional anatomical models, image cross-sections of labelled structures and source radiological imaging, and a text-based hierarchy of structures. Open and free online anatomical atlases developed by our anatomy laboratory team will be available to our students. This will allow pedagogical autonomy and remedy the shortcomings by responding more fully to the objectives of sustainable local development of quality education and good health at the national level. To make this work a reality, our team produced several atlases available in our faculty in the form of research projects.Keywords: anatomy, education, medical imaging, three dimensional
Procedia PDF Downloads 2382496 Regulation of Cultural Relationship between Russia and Ukraine after Crimea’s Annexation: A Comparative Socio-Legal Study
Authors: Elena Sherstoboeva, Elena Karzanova
Abstract:
This paper explores the impact of the annexation of Crimea on the regulation of live performances and tour management of Russian pop music performers in Ukraine and of Ukrainian performers in Russia. Without a doubt, the cultural relationship between Russia and Ukraine is not limited to this issue. Yet concert markets tend to respond particularly rapidly to political, economic, and social changes, especially in Russia and Ukraine, where the high level of digital piracy means that the music businesses mainly depend upon income from performances rather than from digital rights sales. This paper argues that the rules formed in both countries after Russia’s annexation of Crimea in 2014 have contributed to the separation of a single cultural space that had existed in Soviet and Post-Soviet Russia and Ukraine before the annexation. These rules have also facilitated performers’ self-censorship and increased the politicisation of the music businesses in the two neighbouring countries. This study applies a comparative socio-legal approach to study Russian and Ukrainian live events and tour regulation. A qualitative analysis of Russian and Ukrainian national and intergovernmental legal frameworks is applied to examine formal regulations. Soviet and early post-Soviet laws and policies are also studied, but only to the extent that they help to track the changes in the Russian–Ukrainian cultural relationship. To identify and analyse the current informal rules, the study design includes in-depth semi-structured interviews with 30 live event or tour managers working in Russia and Ukraine. A case study is used to examine how the Eurovision Song Contest, an annual international competition, has played out within the Russian–Ukrainian conflict. The study suggests that modern Russian and Ukrainian frameworks for live events and tours have developed Soviet regulatory traditions when cultural policies served as a means of ideological control. At the same time, contemporary regulations mark a considerable perspective shift, as the previous rules have been aimed at maintaining close cultural connections between the Russian and Ukrainian nations. Instead of collaboration, their current frameworks mostly serve as forms of repression, implying that performers must choose only one national market in which to work. The regulatory instruments vary and often impose limitations that typically exist in non-democratic regimes to restrict foreign journalism, such as visa barriers or bans on entry. The more unexpected finding is that, in comparison with Russian law, Ukrainian regulations have created more obstacles to the organisation of live tours and performances by Russian artists in Ukraine. Yet this stems from commercial rather than political factors. This study predicts that the more economic challenges the Russian or Ukrainian music businesses face, the harsher the regulations will be regarding the organisation of live events or tours in the other country. This study recommends that international human rights organisations and non-governmental organisations develop and promote specific standards for artistic rights and freedoms, given the negative effects of the increasing politicisation of the entertainment business and cultural spheres to freedom of expression and cultural rights and pluralism.Keywords: annexation of Crimea, artistic freedom, censorship, cultural policy
Procedia PDF Downloads 1172495 Transfer of Information Heritage between Algerian Veterinarians and Breeders: Assessment of Information and Communication Technology Using Mobile Phone
Authors: R. Bernaoui, P. Ohly
Abstract:
Our research shows the use of the mobile phone that consolidates the relationship between veterinarians, and that between breeders and veterinarians. On the other hand it asserts that the tool in question is a means of economic development. The results of our survey reveal a positive return to the veterinary community, which shows that the mobile phone has become an effective means of sustainable development through the transfer of a rapid and punctual information inheritance via social networks; including many Internet applications. Our results show that almost all veterinarians use the mobile phone for interprofessional communication. We therefore believe that the use of the mobile phone by livestock operators has greatly improved the working conditions, just as the use of this tool contributes to a better management of the exploitation as long as it allows limit travel but also save time. These results show that we are witnessing a growth in the use of mobile telephony technologies that impact is as much in terms of sustainable development. Allowing access to information, especially technical information, the mobile phone, and Information and Communication of Technology (ICT) in general, give livestock sector players not only security, by limiting losses, but also an efficiency that allows them a better production and productivity.Keywords: algeria, breeder-veterinarian, digital heritage, networking
Procedia PDF Downloads 1202494 Assessing the Effect of Underground Tunnel Diameter on Structure-Foundation-Soil Performance under the Kobe Earthquake
Authors: Masoud Mahdavi
Abstract:
Today, developed and industrial cities have all kinds of sewage and water transfer canals, subway tunnels, infrastructure facilities, etc., which have caused underground cavities to be created under the buildings. The presence of these cavities causes behavioral changes in the structural behavior that must be fully evaluated. In the present study, using Abaqus finite element software, the effect of cavities with 0.5 and 1.5 meters in diameter at a depth of 2.5 meters from the earth's surface (with a circular cross-section) on the performance of the foundation and the ground (soil) has been evaluated. For this purpose, the Kobe earthquake was applied to the models for 10 seconds. Also, pore water pressure and weight were considered on the models to get complete results. The results showed that by creating and increasing the diameter of circular cavities in the soil, three indicators; 1) von Mises stress, 2) displacement and 3) plastic strain have had oscillating, ascending and ascending processes, respectively, which shows the relationship between increasing the diameter index of underground cavities and structural indicators of structure-foundation-soil.Keywords: underground excavations, foundation, structural substrates, Abaqus software, Kobe earthquake, time history analysis
Procedia PDF Downloads 1192493 Conceptual Model Design for E-Readiness of Entrepreneurial City Case Study: Entrepreneurial Cities in Iran
Authors: Mohsen Yaghmoor, Sima Radmanesh, Ameneh Gholami
Abstract:
Cities are the principal ground for manifestation of an information society. To create an entrepreneurial city, it is required that just and equal access to opportunities are provided for all segments of the city and technologies are intelligently employed. Furthermore, it is necessary for us to be electronically ready in all political, economic, social, cultural, and technological aspects. Also e-city creates enormous potentials and opportunities for development of the entrepreneurial city. After improvement of e-readiness for establishment of entrepreneurial e-city, potentials, and capitals of the city become productive and more suitable opportunities are offered to citizens, state sectors, and private sectors in order to become entrepreneurs. To create and develop an entrepreneurial city, we need to have readiness to detection and creation of entrepreneurial opportunities and finally exploitation of these opportunities which, in turn, lead to use of entrepreneurial events and their quality in the city. In this model, the quality of entrepreneurial events, the productivity of activities, the necessity of reducing the digital gap, positive and active attendance in information society and compatibility and aligning with the global society are emphasized. In an entrepreneurial city, citizens are not help seekers, private sector is not passive, and the government is entrepreneurial.Keywords: e-city, e-readiness, entrepreneurial city, entrepreneurial events, technological entrepreneurship
Procedia PDF Downloads 3822492 Characteristics of Handgrip (Kumi-Kata) Profile of Georgian Elite Judo Athletes
Authors: Belkadi Adel, Beboucha Wahib, Cherara lalia
Abstract:
Objective: The aim of this study was to investigate the characteristics of Kumi-kata in elite judokas and characterize the kinematic and temporal parameters of different types of handgrip (HG). Method: fourteen participated in this study male athlete (23.5±2.61 years; 1.81±0.37 0 m; 87.25±22.75 kg), members of the Georgian Judo team. To characterize the dominance and types of kumi-kata used, videos of international competitions from each athlete were analyzed, and to characterize kinematic and temporal parameters and handgrip, and the volunteers pressed a digital dynamometer with each hand for 30 seconds(s) after a visual signal. Results: The values of 0.26±0.69s and 0.31±0.03s for reaction time were obtained, respectively, in the full grip and pinch grip; 19.62±18.83N/cm/s and 6.17±3.48N/cm/s for the rate of force development; 475,21 ± 101,322N and 494,65±112,73 for the FDR; 1,37 ± 0,521s and 1,45 ± 0,824s for the time between the force onset to the TFP; and 41,27±4,54N/cm/s and 45,16 ± 5,64N/cm/s for the fall index, in the dominant hand. There was no significant difference between hands for any variable, except for the dominance of Kumi-kata (p<0.05) used in combat. Conclusion: The dominance of application of the Kumi-kata is a technical option, as it does not depend on the kinetic-temporal parameters of the handgrip.Keywords: hand grip, judo, athletes, Kumi-Kata
Procedia PDF Downloads 1872491 Examples of Techniques and Algorithms Used in Wlan Security
Authors: Vahid Bairami Rad
Abstract:
Wireless communications offer organizations and users many benefits such as portability and flexibility, increased productivity, and lower installation costs. Wireless networks serve as the transport mechanism between devices and among devices and the traditional wired networks (enterprise networks and the internet). Wireless networks are many and diverse but are frequently categorized into three groups based on their coverage range: WWAN, WLAN, and WPAN. WWAN, representing wireless wide area networks, includes wide coverage area technologies such as 2G cellular, Cellular Digital Packet Data (CDPD), Global System for Mobile Communications (GSM), and Mobitex. WLAN, representing wireless local area networks, includes 802.11, Hyper lan, and several others. WPAN, represents wireless personal area network technologies such as Bluetooth and Infrared. The security services are provided largely by the WEP (Wired Equivalent Privacy) protocol to protect link-level data during wireless transmission between clients and access points. That is, WEP does not provide end-to-end security but only for the wireless portion of the connection.Keywords: wireless lan, wired equivalent privacy, wireless network security, wlan security
Procedia PDF Downloads 5682490 Metabolic Syndrome and Mental Health in Post Traumatic Stress Disorder Patient
Authors: Hassan Shahmiri Barzoki
Abstract:
Background: Posttraumatic stress disorder (PTSD) is an abnormal physiologic and psychological reaction in person with severe traumatic history. In recent studies, the relationship between PTSD and some other disease apparently unrelated to psychological situations, such as cardiovascular diseases, diabetes, and metabolic syndrome, has been revealed. Thus, the aim of this study was to survey the prevalence of metabolic syndrome and mental health in PTSD patients. Methods: The research design was retrospective cohort study. Subjects were consisted of 142 Iran-Iraq war veterans with PTSD (age: 40-60 years), and the control group was consisted of 153 veterans without PTSD. Data was collected using questionnaires, physical exams and laboratory tests. Results: Prevalence of metabolic syndrome was 45.1%in PTSD group and 17% in control group. In addition, blood pressure, triglyceride and fasting blood sugar in PTSD group were significantly higher than control group (p<0.05). Also, PTSD patients had significant high rates of psychiatric disorders. Conclusion: PTSD patients are more prone to metabolic syndrome and psychiatric disorders than control group.Keywords: mental health, metabolic syndrome, post traumatic stress disorder, patient
Procedia PDF Downloads 912489 Preliminary Study on Chinese Traditional Garden Making Based on Water Storage Projects
Authors: Liu Fangxin, Zhao Jijun
Abstract:
Nowadays, China and the world are facing the same problems of flooding, city waterlogging and other environment issues. Throughout history, China had many excellent experiences dealing with the flood, and can be used as a significant reference for contemporary urban construction. In view of this, the research used the method of literature analysis to find out the main water storage measures in ancient cities, including reservoir storage and pond water storage. And it used the case study method to introduce the historical evolution, engineering measures and landscape design of 4 typical ancient Chinese cities in details. Then we found the pond and the reservoir were the main infrastructures for the ancient Chinese city to avoid the waterlogging and flood. At last this paper summed up the historical experience of Chinese traditional water storage and made conclusions that the establishment of a reasonable green water storage facilities could be used to solve today's rain and flood problems, and hoped to give some enlightenment of stormwater management to our modern city.Keywords: ancient Chinese cities, water storage project, Chinese classical gardening, stormwater management, green facilities
Procedia PDF Downloads 3352488 The Challenges of Decentralised Education Policy for Teachers in Indonesian Contexts
Authors: Ahmad Ardillah Rahman
Abstract:
The decentralisation policy in education has been a trend in some countries in the last two decades. In Indonesia, the implementation of the policy has been introduced since 2003 with the occurrence of School-Based Management policy. The reform has affected the way principals and teachers should involve in school practices in which more autonomies and flexibilities are given to teachers in conducting their teaching practices. Almost 13 years since the policy was firstly introduced, the government and teachers in Indonesia still face some obstacles in maximising the potential benefits of the implementation of the decentralised education system. This study, thus, critically analyses the challenges of decentralised education policy for teachers in Indonesian education context. The purposes of this study are threefold. Firstly, it will explore the history of policy transformation from a centralised to a decentralised education policy. Secondly, it points out the advantages of the decentralised policy implementation. The last, it provides a comprehensive description of challenges faced by Indonesian teachers with the new roles in designing and implementing a curriculum. By using data from existing surveys and research, this study concludes that to successfully implement the transformation in the educational reform of Indonesia, continual and gradual teachers’ training, professional career pathway, and local monitoring for teachers should be developed and strengthened.Keywords: curriculum design, decentralisation, school-based management, teachers’ autonomy
Procedia PDF Downloads 3192487 ArcGIS as a Tool for Infrastructure Documentation and Asset Management: Establishing a GIS for Computer Network Documentation
Authors: John Segars
Abstract:
Built out of a real-world need to have better, more detailed, asset and infrastructure documentation, this project will lay out the case for using the database functionality of ArcGIS as a tool to track and maintain infrastructure location, status, maintenance and serviceability. Workflows and processes will be presented and detailed which may be applied to an organizations’ infrastructure needs that might allow them to make use of the robust tools which surround the ArcGIS platform. The end result is a value-added information system framework with a geographic component e.g., the spatial location of various I.T. assets, a detailed set of records which not only documents location but also captures the maintenance history for assets along with photographs and documentation of these various assets as attachments to the numerous feature class items. In addition to the asset location and documentation benefits, the staff will be able to log into the devices and pull SNMP (Simple Network Management Protocol) based query information from within the user interface. The entire collection of information may be displayed in ArcGIS, via a JavaScript based web application or via queries to the back-end database. The project is applicable to all organizations which maintain an IT infrastructure but specifically targets post-secondary educational institutions where access to ESRI resources is generally already available in house.Keywords: ESRI, GIS, infrastructure, network documentation, PostgreSQL
Procedia PDF Downloads 1802486 Urban Innovations: Towards a Comprehensive and Sustainable City Development
Authors: Sarang Yeola
Abstract:
A smart city can be defined as a city that uses Information and Communication Technologies (ICT) to enhance its sustainability, workability and livability. It can be viewed as a ‘System of Systems’. We propose decentralization of power and centralization of system. We are presenting a bird's eye view of the system as a whole. The holistic view includes the entirety of human activity in an area including city governments, schools, hospitals, infrastructure, resources, business and people. The main objective for development of Nashik as a smart city is to identify the flaws of the existing systems, eliminate them and come up with innovative and feasible solutions for the betterment of masses. The Make in India is a visionary proposal for FDI in India. It should be managed that the campaign and the industrial estates work in synchronization for boosting the setup of new industrial units in and around Nashik. A smart grid is a modernized electrical grid that uses analog or digital information and communications technology to gather and act on information. We have identified major domains for making Nashik a smart city by surveying the existing infrastructure, challenges and problems faced and the proposed solutions through innovative ideas.Keywords: transport, (bus rapid transit system) BRTS, metrorail, autos
Procedia PDF Downloads 3782485 On Dynamic Chaotic S-BOX Based Advanced Encryption Standard Algorithm for Image Encryption
Authors: Ajish Sreedharan
Abstract:
Security in transmission and storage of digital images has its importance in today’s image communications and confidential video conferencing. Due to the increasing use of images in industrial process, it is essential to protect the confidential image data from unauthorized access. Advanced Encryption Standard (AES) is a well known block cipher that has several advantages in data encryption. However, it is not suitable for real-time applications. This paper presents modifications to the Advanced Encryption Standard to reflect a high level security and better image encryption. The modifications are done by adjusting the ShiftRow Transformation and using On Dynamic chaotic S-BOX. In AES the Substitute bytes, Shift row and Mix columns by themselves would provide no security because they do not use the key. In Dynamic chaotic S-BOX Based AES the Substitute bytes provide security because the S-Box is constructed from the key. Experimental results verify and prove that the proposed modification to image cryptosystem is highly secure from the cryptographic viewpoint. The results also prove that with a comparison to original AES encryption algorithm the modified algorithm gives better encryption results in terms of security against statistical attacks.Keywords: advanced encryption standard (AES), on dynamic chaotic S-BOX, image encryption, security analysis, ShiftRow transformation
Procedia PDF Downloads 4342484 Organizational Climate being Knowledge Sharing Oriented: A Fuzzy-Set Analysis
Authors: Paulo Lopes Henriques, Carla Curado
Abstract:
According to literature, knowledge sharing behaviors are influenced by organizational values and structures, namely organizational climate. The manuscript examines the antecedents of the knowledge sharing oriented organizational climate. According to theoretical expectations the study adopts the following explanatory conditions: knowledge sharing costs, knowledge sharing incentives, perceptions of knowledge sharing contributing to performance and tenure. The study confronts results considering two groups of firms: nondigital (firms without intranet) vs digital (firms with intranet). The paper applies fsQCA technique to analyze data by using fsQCA 2.5 software (www.fsqca.com) testing several conditional arguments to explain the outcome variable. Main results strengthen claims on the relevancy of the contribution of knowledge sharing to performance. Secondly, evidence brings tenure - an explanatory condition that is associated to organizational memory – to the spotlight. The study provides an original contribution not previously addressed in literature, since it identifies the sufficient conditions sets to knowledge sharing oriented organizational climate using fsQCA, which is, to our knowledge, a novel application of the technique.Keywords: fsQCA, knowledge sharing oriented organizational climate, knowledge sharing costs, knowledge sharing incentives
Procedia PDF Downloads 3272483 The Efficacy of Mindfulness-Based Interventions on Occupational Stress and Burnout among K-12 Educators: A Review of the Literature
Authors: Kailen Krame
Abstract:
This paper presents a review of the literature on the efficacy of mindfulness-based interventions for reducing occupational stress and burnout among K-12 educators. An in-depth discussion of the incidence and impact of teacher stress and burnout is provided, as a wealth of literature indicates that this issue is of growing concern and has important implications not only for individual educators but also for students and the school as an organization. Given the evidence of a link between teacher wellbeing and student outcomes, this topic is worth further investigation in order to better understand sources of stress and burnout and propose adequate coping strategies for today’s educators. As a potential solution to teacher stress and burnout, mindfulness-based interventions are reviewed in-depth, and an overview of the history, diverse application, and effects of mindfulness practice are provided. Relevant outcomes of educator mindfulness training presented in the literature include increased emotional regulation, self-efficacy, and personal wellbeing, among several others. Lastly, additional implications and benefits of educator mindfulness training are explored, limitations of the current research are reviewed, and apparent best practices are proposed.Keywords: educator burnout, emotional regulation, mindfulness, self-efficacy, stress-reduction
Procedia PDF Downloads 1452482 Forensic Imaging as an Effective Learning Tool for Teaching Forensic Pathology to Undergraduate Medical Students
Authors: Vasudeva Murthy Challakere Ramaswamy
Abstract:
Background: Conventionally forensic pathology is learnt through autopsy demonstrations which carry various limitations such as unavailability of cases in the mortuary, medico-legal implication and infection. Over the years forensic pathology and science has undergone significant evolution in this digital world. Forensic imaging is a technology which can be effectively utilized for overcoming the current limitations in the undergraduate learning of forensic curriculum. Materials and methods: demonstration of forensic imaging was done using a novel technology of autopsy which has been recently introduced across the globe. Three sessions were conducted in international medical university for a total of 196 medical students. The innovative educational tool was evacuated by using quantitative questionnaire with the scoring scales between 1 to 10. Results: The mean score for acceptance of new tool was 82% and about 74% of the students recommended incorporation of the forensic imaging in the regular curriculum. 82% of students were keen on collaborative research and taking further training courses in forensic imaging. Conclusion: forensic imaging can be an effective tool and also a suitable alternative for teaching undergraduate students. This feedback also supports the fact that students favour the use of contemporary technologies in learning medicine.Keywords: forensic imaging, forensic pathology, medical students, learning tool
Procedia PDF Downloads 4782481 Overview of Research Contexts about XR Technologies in Architectural Practice
Authors: Adeline Stals
Abstract:
The transformation of architectural design practices has been underway for almost forty years due to the development and democratization of computer technology. New and more efficient tools are constantly being proposed to architects, amplifying a technological wave that sometimes stimulates them, sometimes overwhelms them, depending essentially on their digital culture and the context (socio-economic, structural, organizational) in which they work on a daily basis. Our focus is on VR, AR, and MR technologies dedicated to architecture. The commercialization of affordable headsets like the Oculus Rift, the HTC Vive or more low-tech like the Google CardBoard, makes it more accessible to benefit from these technologies. In that regard, researchers report the growing interest of these tools for architects, given the new perspectives they open up in terms of workflow, representation, collaboration, and client’s involvement. However, studies rarely mention the consequences of the sample studied on results. Our research provides an overview of VR, AR, and MR researches among a corpus of papers selected from conferences and journals. A closer look at the sample of these research projects highlights the necessity to take into consideration the context of studies in order to develop tools truly dedicated to the real practices of specific architect profiles. This literature review formalizes milestones for future challenges to address. The methodology applied is based on a systematic review of two sources of publications. The first one is the Cumincad database, which regroups publications from conferences exclusively about digital in architecture. Additionally, the second part of the corpus is based on journal publications. Journals have been selected considering their ranking on Scimago. Among the journals in the predefined category ‘architecture’ and in Quartile 1 for 2018 (last update when consulted), we have retained the ones related to the architectural design process: Design Studies, CoDesign, Architectural Science Review, Frontiers of Architectural Research and Archnet-IJAR. Beside those journals, IJAC, not classified in the ‘architecture’ category, is selected by the author for its adequacy with architecture and computing. For all requests, the search terms were ‘virtual reality’, ‘augmented reality’, and ‘mixed reality’ in title and/or keywords for papers published between 2015 and 2019 (included). This frame time is defined considering the fast evolution of these technologies in the past few years. Accordingly, the systematic review covers 202 publications. The literature review on studies about XR technologies establishes the state of the art of the current situation. It highlights that studies are mostly based on experimental contexts with controlled conditions (pedagogical, e.g.) or on practices established in large architectural offices of international renown. However, few studies focus on the strategies and practices developed by offices of smaller size, which represent the largest part of the market. Indeed, a European survey studying the architectural profession in Europe in 2018 reveals that 99% of offices are composed of less than ten people, and 71% of only one person. The study also showed that the number of medium-sized offices is continuously decreasing in favour of smaller structures. In doing so, a frontier seems to remain between the worlds of research and practice, especially for the majority of small architectural practices having a modest use of technology. This paper constitutes a reference for the next step of the research and for further worldwide researches by facilitating their contextualization.Keywords: architectural design, literature review, SME, XR technologies
Procedia PDF Downloads 1082480 Pivoting to Fortify our Digital Self: Revealing the Need for Personal Cyber Insurance
Authors: Richard McGregor, Carmen Reaiche, Stephen Boyle
Abstract:
Cyber threats are a relatively recent phenomenon and offer cyber insurers a dynamic and intelligent peril. As individuals en mass become increasingly digitally dependent, Personal Cyber Insurance (PCI) offers an attractive option to mitigate cyber risk at a personal level. This abstract proposes a literature review that conceptualises a framework for siting Personal Cyber Insurance (PCI) within the context of cyberspace. The lack of empirical research within this domain demonstrates an immediate need to define the scope of PCI to allow cyber insurers to understand personal cyber risk threats and vectors, customer awareness, capabilities, and their associated needs. Additionally, this will allow cyber insurers to conceptualise appropriate frameworks allowing effective management and distribution of PCI products and services within a landscape often in-congruent with risk attributes commonly associated with traditional personal line insurance products. Cyberspace has provided significant improvement to the quality of social connectivity and productivity during past decades and allowed enormous capability uplift of information sharing and communication between people and communities. Conversely, personal digital dependency furnish ample opportunities for adverse cyber events such as data breaches and cyber-attacksthus introducing a continuous and insidious threat of omnipresent cyber risk–particularly since the advent of the COVID-19 pandemic and wide-spread adoption of ‘work-from-home’ practices. Recognition of escalating inter-dependencies, vulnerabilities and inadequate personal cyber behaviours have prompted efforts by businesses and individuals alike to investigate strategies and tactics to mitigate cyber risk – of which cyber insurance is a viable, cost-effective option. It is argued that, ceteris parabus, the nature of cyberspace intrinsically provides characteristic peculiarities that pose significant and bespoke challenges to cyber insurers, often in-congruent with risk attributes commonly associated with traditional personal line insurance products. These challenges include (inter alia) a paucity of historical claim/loss data for underwriting and pricing purposes, interdependencies of cyber architecture promoting high correlation of cyber risk, difficulties in evaluating cyber risk, intangibility of risk assets (such as data, reputation), lack of standardisation across the industry, high and undetermined tail risks, and moral hazard among others. This study proposes a thematic overview of the literature deemed necessary to conceptualise the challenges to issuing personal cyber coverage. There is an evident absence of empirical research appertaining to PCI and the design of operational business models for this business domain, especially qualitative initiatives that (1) attempt to define the scope of the peril, (2) secure an understanding of the needs of both cyber insurer and customer, and (3) to identify elements pivotal to effective management and profitable distribution of PCI - leading to an argument proposed by the author that postulates that the traditional general insurance customer journey and business model are ill-suited for the lineaments of cyberspace. The findings of the review confirm significant gaps in contemporary research within the domain of personal cyber insurance.Keywords: cyberspace, personal cyber risk, personal cyber insurance, customer journey, business model
Procedia PDF Downloads 1012479 Online Learning for Modern Business Models: Theoretical Considerations and Algorithms
Authors: Marian Sorin Ionescu, Olivia Negoita, Cosmin Dobrin
Abstract:
This scientific communication reports and discusses learning models adaptable to modern business problems and models specific to digital concepts and paradigms. In the PAC (probably approximately correct) learning model approach, in which the learning process begins by receiving a batch of learning examples, the set of learning processes is used to acquire a hypothesis, and when the learning process is fully used, this hypothesis is used in the prediction of new operational examples. For complex business models, a lot of models should be introduced and evaluated to estimate the induced results so that the totality of the results are used to develop a predictive rule, which anticipates the choice of new models. In opposition, for online learning-type processes, there is no separation between the learning (training) and predictive phase. Every time a business model is approached, a test example is considered from the beginning until the prediction of the appearance of a model considered correct from the point of view of the business decision. After choosing choice a part of the business model, the label with the logical value "true" is known. Some of the business models are used as examples of learning (training), which helps to improve the prediction mechanisms for future business models.Keywords: machine learning, business models, convex analysis, online learning
Procedia PDF Downloads 138