Search results for: internet language
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 5354

Search results for: internet language

2534 Structural Analysis and Evolution of 18th Century Ottoman Imperial Mosques (1750-1799) in Comparison with the Classical Period Examples

Authors: U. Demir

Abstract:

18th century which is the period of 'change' in the Ottoman Empire, affects the architecture as well, where the Classical period is left behind, architecture is differentiated in the form language. This change is especially noticeable in monumental buildings and thus manifested itself in the mosques. But, is it possible to talk about the structural context of the 'change' which has been occurred in decoration? The aim of this study is to investigate the changes and classical relations of the 18th century mosques through plan schedules and structure systems. This study focuses on the monumental mosques constructed during the reign of the three sultans who ruled in the second half of the century (Mustafa the 3rd 1757-1774, Abdülhamid the 1st 1774-1789 and Selim the 3rd). According to their construction years these are 'Ayazma, Laleli, Zeyneb Sultan, Fatih, Beylerbeyi, Şebsefa Kadın, Eyüb Sultan, Mihrişah Valide Sultan and Üsküdar-Selimiye' mosques. As a plan scheme, four mosques have a square or close to a rectangular square scheme, while the others have a rectangle scheme and showing the longitudinal development of the mihrab axis. This situation is widespread throughout the period. In addition to the longitudinal development plan, which is the general characteristic of the 18th century mosques, the use of the classical plan schemes continued in the same direction. Spatialization of the mihrab area was applied to the five mosques while other mosques were applied as niches on the wall surface. This situation is widespread in the period of the second half of the century. In the classical period, the lodges may be located at the back of the mosques interior, not interfering with the main worship area. In the period, the lodges were withdrawn from the main worship area. They are separated from the main interior with their own structural and covering systems. The plans seem to be formed as a result of the addition of lodge parts to the northern part of the Classical period mosques. The 18th century mosques are the constructions where the change of the architectural language and style can be observed easily. This change and the break from the classical period manifest themselves quickly in the structural elements, wall surface decorations, pencil work designs, small scale decor elements, motifs. The speed and intensity of change in the decor does not occur the same as in structural context. The mosque construction rules from the traditional and classical era still continues in the century. While some mosque structures have a plan which is inherited from the classical successor, some of were constructed with the same classical period rules. Nonetheless, the location and transformation of the lodges, which are affecting the interior design, are noteworthy. They provide a significant transition on the way to the new language of the mosque design that will be experienced in the next century. It is intended to draw attention to the structural evolution of the 18th century Ottoman architecture through the royal mosques within the scope of this conference.

Keywords: mosque structure, Ottoman architecture, structural evolution, 18th century architecture

Procedia PDF Downloads 203
2533 The Influence of Online Marketing Tactics in Tourist Destination Reputation: Egypt as a Case Study

Authors: Alyaa Darwish, Peter Burns, Sofia Reino

Abstract:

Online marketing has been the key focus of attention for the majority of destinations since the Internet became the primarily information tool for travel marketing. Tourism is a reputation-dependent industry; potential travelers who do not have previous experience with the destination face numerous risks during the process of decision-making. An accurate perception of the destination’s reputation helps to minimize risk against unsatisfying travel experiences. However, there has been limited investigation with regards to the reputation of tourist destination. Taking the importance of reputation to the tourism industry, this research aims to: 1) Develop a destination reputation model; 2) Assess the tourist destination approach towards online marketing tactics; 3) Evaluate the impact of differentiated online marketing tactics on reputation; and 4) Measure the potential for using online marketing tactics to manage the destination’s online reputation. This research follows an interpretivism epistemological research approach through using four research methods; interviews, questionnaire, content analysis, and experiment to achieve the research goals.

Keywords: destination reputation, online marketing, reputation, tactics

Procedia PDF Downloads 361
2532 An Energy-Efficient Model of Integrating Telehealth IoT Devices with Fog and Cloud Computing-Based Platform

Authors: Yunyong Guo, Sudhakar Ganti, Bryan Guo

Abstract:

The rapid growth of telehealth Internet of Things (IoT) devices has raised concerns about energy consumption and efficient data processing. This paper introduces an energy-efficient model that integrates telehealth IoT devices with a fog and cloud computing-based platform, offering a sustainable and robust solution to overcome these challenges. Our model employs fog computing as a localized data processing layer while leveraging cloud computing for resource-intensive tasks, significantly reducing energy consumption. We incorporate adaptive energy-saving strategies. Simulation analysis validates our approach's effectiveness in enhancing energy efficiency for telehealth IoT systems integrated with localized fog nodes and both private and public cloud infrastructures. Future research will focus on further optimization of the energy-saving model, exploring additional functional enhancements, and assessing its broader applicability in other healthcare and industry sectors.

Keywords: energy-efficient, fog computing, IoT, telehealth

Procedia PDF Downloads 88
2531 Importance of Remote Sensing and Information Communication Technology to Improve Climate Resilience in Low Land of Ethiopia

Authors: Hasen Keder Edris, Ryuji Matsunaga, Toshi Yamanaka

Abstract:

The issue of climate change and its impact is a major contemporary global concern. Ethiopia is one of the countries experiencing adverse climate change impact including frequent extreme weather events that are exacerbating drought and water scarcity. Due to this reason, the government of Ethiopia develops a strategic document which focuses on the climate resilience green economy. One of the major components of the strategic framework is designed to improve community adaptation capacity and mitigation of drought. For effective implementation of the strategy, identification of regions relative vulnerability to drought is vital. There is a growing tendency of applying Geographic Information System (GIS) and Remote Sensing technologies for collecting information on duration and severity of drought by direct measure of the topography as well as an indirect measure of land cover. This study aims to show an application of remote sensing technology and GIS for developing drought vulnerability index by taking lowland of Ethiopia as a case study. In addition, it assesses integrated Information Communication Technology (ICT) potential of Ethiopia lowland and proposes integrated solution. Satellite data is used to detect the beginning of the drought. The severity of drought risk prone areas of livestock keeping pastoral is analyzed through normalized difference vegetation index (NDVI) and ten years rainfall data. The change from the existing and average SPOT NDVI and vegetation condition index is used to identify the onset of drought and potential risks. Secondary data is used to analyze geographical coverage of mobile and internet usage in the region. For decades, the government of Ethiopia introduced some technologies and approach to overcoming climate change related problems. However, lack of access to information and inadequate technical support for the pastoral area remains a major challenge. In conventional business as usual approach, the lowland pastorals continue facing a number of challenges. The result indicated that 80% of the region face frequent drought occurrence and out of this 60% of pastoral area faces high drought risk. On the other hand, the target area mobile phone and internet coverage is rapidly growing. One of identified ICT solution enabler technology is telecom center which covers 98% of the region. It was possible to identify the frequently affected area and potential drought risk using the NDVI remote-sensing data analyses. We also found that ICT can play an important role in mitigating climate change challenge. Hence, there is a need to strengthen implementation efforts of climate change adaptation through integrated Remote Sensing and web based information dissemination and mobile alert of extreme events.

Keywords: climate changes, ICT, pastoral, remote sensing

Procedia PDF Downloads 318
2530 Sentiment Mapping through Social Media and Its Implications

Authors: G. C. Joshi, M. Paul, B. K. Kalita, V. Ranga, J. S. Rawat, P. S. Rawat

Abstract:

Being a habitat of the global village, every place has established connection through the strength and power of social media piercing through the political boundaries. Social media is a digital platform, where people across the world can interact as it has advantages of being universal, anonymous, easily accessible, indirect interaction, gathering and sharing information. The power of social media lies in the intensity of sharing extreme opinions or feelings, in contrast to the personal interactions which can be easily mapped in the form of Sentiment Mapping. The easy access to social networking sites such as Facebook, Twitter and blogs made unprecedented opportunities for citizens to voice their opinions loaded with dynamics of emotions. These further influence human thoughts where social media plays a very active role. A recent incident of public importance was selected as a case study to map the sentiments of people through Twitter. Understanding those dynamics through the eye of an ordinary people can be challenging. With the help of R-programming language and by the aid of GIS techniques sentiment maps has been produced. The emotions flowing worldwide in the form of tweets were extracted and analyzed. The number of tweets had diminished by 91 % from 25/08/2017 to 31/08/2017. A boom of sentiments emerged near the origin of the case, i.e., Delhi, Haryana and Punjab and the capital showed maximum influence resulting in spillover effect near Delhi. The trend of sentiments was prevailing more as neutral (45.37%), negative (28.6%) and positive (21.6%) after calculating the sentiment scores of the tweets. The result can be used to know the spatial distribution of digital penetration in India, where highest concentration lies in Mumbai and lowest in North East India and Jammu and Kashmir.

Keywords: sentiment mapping, digital literacy, GIS, R statistical language, spatio-temporal

Procedia PDF Downloads 152
2529 Survey on Data Security Issues Through Cloud Computing Amongst Sme’s in Nairobi County, Kenya

Authors: Masese Chuma Benard, Martin Onsiro Ronald

Abstract:

Businesses have been using cloud computing more frequently recently because they wish to take advantage of its advantages. However, employing cloud computing also introduces new security concerns, particularly with regard to data security, potential risks and weaknesses that could be exploited by attackers, and various tactics and strategies that could be used to lessen these risks. This study examines data security issues on cloud computing amongst sme’s in Nairobi county, Kenya. The study used the sample size of 48, the research approach was mixed methods, The findings show that data owner has no control over the cloud merchant's data management procedures, there is no way to ensure that data is handled legally. This implies that you will lose control over the data stored in the cloud. Data and information stored in the cloud may face a range of availability issues due to internet outages; this can represent a significant risk to data kept in shared clouds. Integrity, availability, and secrecy are all mentioned.

Keywords: data security, cloud computing, information, information security, small and medium-sized firms (SMEs)

Procedia PDF Downloads 86
2528 Research Writing Anxiety among Engineering Postgraduate Students in Taiwan

Authors: Mei-Ching Ho

Abstract:

Graduate-level writing practices have gained increasing scholarly attention in recent years. Due to its discipline-specific conventions and requirements, research writing can cause various levels of anxiety for native English speaking and English as a second/foreign language (ESL/EFL) postgraduate students. Although many studies have investigated how writing anxiety can negatively affect writing performance, self-efficacy, and disciplinary discourse socialization process, relatively few have examined the impact of writing anxiety from the perspectives of postgraduate students in EFL contexts. This study aims to 1) examine the level of and the relationship between research writing anxiety and self-efficacy among Taiwanese EFL students at the master's and doctoral levels and 2) to uncover the causes of students' research writing anxiety. The data was collected from an adapted version of Second Language Writing Anxiety Inventory (SLWAI) and Research Writing Self-Efficacy Scale with 218 EFL graduate students in engineering-related fields at two research-oriented universities in Taiwan. A pilot study was conducted to ensure the construct and content validity of the instruments. Semi-structured interviews were also undertaken with 30 survey respondents to better understand the causes of their writing anxiety. The results revealed that while both master's and doctoral students had low to moderate research writing anxiety and self-efficacy, the doctoral students with more experiences in writing research papers in English were more anxious but not necessarily more confident than the master's students. A significantly weak negative correlation was found between the two constructs. The contributing factors for these results include different degree of writing exigency, perceived importance and types of writing tasks, writing for publication as graduation thresholds, and mentoring relationship with thesis/dissertation advisers. The study also identified several causes of graduate-level writing anxiety, of which writing under time constraints and concern on linguistic and rhetorical proficiency appeared to be the major concern. Pedagogical implications regarding facilitating graduate students' writing process and reducing anxiety will also be drawn.

Keywords: writing affect, writing anxiety, writing self-efficacy, EFL, postgraduate students

Procedia PDF Downloads 486
2527 Agri-Food Transparency and Traceability: A Marketing Tool to Satisfy Consumer Awareness Needs

Authors: Angelo Corallo, Maria Elena Latino, Marta Menegoli

Abstract:

The link between man and food plays, in the social and economic system, a central role where cultural and multidisciplinary aspects intertwine: food is not only nutrition, but also communication, culture, politics, environment, science, ethics, fashion. This multi-dimensionality has many implications in the food economy. In recent years, the consumer became more conscious about his food choices, involving a consistent change in consumption models. This change concerns several aspects: awareness of food system issues, employment of socially and environmentally conscious decision-making, food choices based on different characteristics than nutritional ones i.e. origin of food, how it’s produced, and who’s producing it. In this frame the ‘consumption choices’ and the ‘interests of the citizen’ become one part of the others. The figure of the ‘Citizen Consumer’ is born, a responsible and ethically motivated individual to change his lifestyle, achieving the goal of sustainable consumption. Simultaneously the branding, that before was guarantee of the product quality, today is questioned. In order to meet these needs, Agri-Food companies are developing specific product lines that follow two main philosophies: ‘Back to basics’ and ‘Less is more’. However, the issue of ethical behavior does not seem to find an adequate on market offer. Most likely due to a lack of attention on the communication strategy used, very often based on market logic and rarely on ethical one. The label in its classic concept of ‘clean labeling’ can no longer be the only instrument through which to convey product information and its evolution towards a concept of ‘clear label’ is necessary to embrace ethical and transparent concepts in progress the process of democratization of the Food System. The implementation of a voluntary traceability path, relying on the technological models of the Internet of Things or Industry 4.0, would enable the Agri-Food Supply Chain to collect data that, if properly treated, could satisfy the information need of consumers. A change of approach is therefore proposed towards Agri-Food traceability that is no longer intended as a tool to be used to respond to the legislator, but rather as a promotional tool useful to tell the company in a transparent manner and then reach the slice of the market of food citizens. The use of mobile technology can also facilitate this information transfer. However, in order to guarantee maximum efficiency, an appropriate communication model based on the ethical communication principles should be used, which aims to overcome the pipeline communication model, to offer the listener a new way of telling the food product, based on real data collected through processes traceability. The Citizen Consumer is therefore placed at the center of the new model of communication in which he has the opportunity to choose what to know and how. The new label creates a virtual access point capable of telling the product according to different point of views, following the personal interests and offering the possibility to give several content modalities to support different situations and usability.

Keywords: agri food traceability, agri-food transparency, clear label, food system, internet of things

Procedia PDF Downloads 161
2526 Another Justice: Litigation Masters in Chinese Legal Story

Authors: Lung-Lung Hu

Abstract:

Ronald Dworkin offered a legal theory of ‘chain enterprise’ that all the judges in legal history altogether create a ‘law’ aiming a specific purpose. Those judges are like co-writers of a chain-story who not only create freely but also are constrained by the story made by the judges before them. The law created by Chinese traditional judges is another case, they, compared with the judges mentioned by Ronald Dworkin, have relatively narrower space of making a legal sentence according to their own discretions because the statutes in Chinese traditional law at the very beginning have been designed as panel code that leaves small room to judge’s discretion. Furthermore, because law is a representative of the authority of the government, i.e. the emperor, any misjudges and misuses deviated from the law will be considered as a challenge to the supreme power. However, different from judges as the defenders of law, Chinese litigation masters who want to win legal cases have to be offenders challenging the verdict that does not favor his or his client’s interest. Besides, litigation master as an illegal or non-authorized profession does not belong to any legal system, therefore, they are relatively freer to ‘create’ the law. According to Stanley Fish’s articles that question Ronald Dworkin and Owen Fiss’ ideas about law, he construes that, since law is made of language, law is open to interpretations that cannot be constrained by any rules or any particular legal purposes. Stanley Fish’s idea can also be applied on the analysis about the stories of Chinese litigation masters in traditional Chinese literature. These Chinese litigation masters’ legal opinions in the so-called chain enterprise are like an unexpected episode that tries to revise the fixed story told by law. Although they are not welcome to the officials and also to the society, their existence is still a phenomenon representing another version of justice different from the official’s and can be seen as a de-structural power to the government. Hence, in this present paper the language and strategy applied by Chinese litigation masters in Chinese legal stories will be analysed to see how they refute made legal judgments and challenge the official standard of justice.

Keywords: Chinese legal stories, interdisciplinary, litigation master, post-structuralism

Procedia PDF Downloads 390
2525 An Intrusion Detection Systems Based on K-Means, K-Medoids and Support Vector Clustering Using Ensemble

Authors: A. Mohammadpour, Ebrahim Najafi Kajabad, Ghazale Ipakchi

Abstract:

Presently, computer networks’ security rise in importance and many studies have also been conducted in this field. By the penetration of the internet networks in different fields, many things need to be done to provide a secure industrial and non-industrial network. Fire walls, appropriate Intrusion Detection Systems (IDS), encryption protocols for information sending and receiving, and use of authentication certificated are among things, which should be considered for system security. The aim of the present study is to use the outcome of several algorithms, which cause decline in IDS errors, in the way that improves system security and prevents additional overload to the system. Finally, regarding the obtained result we can also detect the amount and percentage of more sub attacks. By running the proposed system, which is based on the use of multi-algorithmic outcome and comparing that by the proposed single algorithmic methods, we observed a 78.64% result in attack detection that is improved by 3.14% than the proposed algorithms.

Keywords: intrusion detection systems, clustering, k-means, k-medoids, SV clustering, ensemble

Procedia PDF Downloads 222
2524 Analysis of Interleaving Scheme for Narrowband VoIP System under Pervasive Environment

Authors: Monica Sharma, Harjit Pal Singh, Jasbinder Singh, Manju Bala

Abstract:

In Voice over Internet Protocol (VoIP) system, the speech signal is degraded when passed through the network layers. The speech signal is processed through the best effort policy based IP network, which leads to the network degradations including delay, packet loss and jitter. The packet loss is the major issue of the degradation in the VoIP signal quality; even a single lost packet may generate audible distortion in the decoded speech signal. In addition to these network degradations, the quality of the speech signal is also affected by the environmental noises and coder distortions. The signal quality of the VoIP system is improved through the interleaving technique. The performance of the system is evaluated for various types of noises at different network conditions. The performance of the enhanced VoIP signal is evaluated using perceptual evaluation of speech quality (PESQ) measurement for narrow band signal.

Keywords: VoIP, interleaving, packet loss, packet size, background noise

Procedia PDF Downloads 482
2523 Analyzing Mexican Adaptation of Shakespeare: A Study of Onstage Violence in Richard III and Its Impact on Mexican Viewers

Authors: Nelya Babynets

Abstract:

Shakespeare and Mexican theatregoers have enjoyed quite a complex relationship. Shakespearean plays have appeared on the Mexican stage with remarkable perseverance, yet with mixed success. Although Shakespeare has long been a part of the global cultural marketplace and his works are celebrated all around the world, the adaptation of his plays on the contemporary Mexican stage is always an adventure, since the works of this early modern author are frequently seen as the legacy of a ‘high’, but obsolete, culture, one that is quite distant from the present-day viewers’ daily experiences and concerns. Moreover, Mexican productions of Shakespeare are presented mostly in Peninsular Spanish, a language similar yet alien to the language spoken in Mexico, one that does not wholly fit into the viewers’ cultural praxis. This is the reason why Mexican dramatic adaptations of Shakespearean plays tend to replace the cultural references of the original piece with ones that are more significant and innate to Latin American spectators. This paper analyses the new Mexican production of Richard III adapted and directed by Mauricio Garcia Lozano, which employs onstage violence - a cultural force that is inherent to all human beings regardless of their beliefs, ethnic background or nationality - as the means to make this play more relevant to a present-day audience. Thus, this paper addresses how the bloody bombast of staged murders helps to avoid the tyranny of a rigid framework of fixed meanings that denies the possibility of an intercultural appropriation of this European play written over four hundred years ago. The impact of violence displayed in Garcia Lozano’s adaptation of Richard III on Mexican audiences will also be examined. This study is particularly relevant in Mexico where the term ‘tragedy’ has become a commonplace and where drug wars and state-sanctioned violence have already taken the lives of many people.

Keywords: audience, dramatic adaptation, Shakespeare, viewer

Procedia PDF Downloads 461
2522 Are Values Reflected in Online Skincare Advertisements from the Philippines and Taiwan the Same?

Authors: Chih-Ping Chen

Abstract:

In recent years, some scholars established the reflection of cultural values in advertisements. However, despite the Internet’s rapid development, few studies have focused on observing cross-cultural differences of values reflected in online advertisements. As mirrors of culture, advertisements are believed to reflect values relevant to consumers. Therefore, this research aims to examine the cultural values reflected on online skincare advertisements between countries with different cultural influences. We argue that culture affects the values presented in the slogans, endorsers, brand prominence, and product prominence of online advertisements; a concept that challenges the standardized manner of communication utilized by most multinational brands. Results highlight that the Philippines and Taiwan are neither located on extreme low-context nor extreme high-context cultures. Moreover, although advertisements reflect culture, it may be affected by potential value shifting caused by globalization, standardized communication, and the advertisers’ marketing priorities.

Keywords: cross-culture, cultural values, online advertising, prominence, beauty

Procedia PDF Downloads 473
2521 Translation of Post-Soviet Kyrgyz Women’s Poetry

Authors: K. Kalieva, G. Ibraimova

Abstract:

In literature, poetry stands as a profound genre that bridges the life experiences of everyday people, transcending language and culture to unite people through the universal language of emotion and human connection. This paper explores the collaborative efforts of translators in creating the anthology of post-Soviet Kyrgyz women’s poetry, a project spanning over ten years. This compelling anthology brings together the works of fifty prominent female poets from Kyrgyzstan during the post-Soviet era. It includes the original poems in Kyrgyz and provide English translations, sharing the rich and diverse voices of Kyrgyz women with a global audience and fostering a deep appreciation for the beauty of their words. The paper highlights the unique perspectives on life, love, and identity offered by each poet, and emphasizes the role of translation in making these voices accessible worldwide. Each poet's unique voice offers a glimpse into the rich cultural and literary landscape of Kyrgyzstan, highlighting themes that resonate universally. Methodology of the paper employs a combination of qualitative content analysis, semiotic analysis, and quantitative thematic analysis to examine the translation strategies, and the cultural and emotional peculiarities captured in the translations, as well as the themes explored by the poets in their poems. Through the art of translation, the paper explores the lyrical world of Kyrgyz women poets. Although Kyrgyz poets’ names and poems are unfamiliar to many, their words resonate with an emotional depth that is sure to leave a lasting impression. Kyrgyz women's poetry translated into English celebrates the distinctive voices of women in the contemporary world. It serves as a reminder that poetry possesses the power to transcend life's obstacles, foster mutual understanding, and inspire positive change. The poems created by Kyrgyz women are envisioned to serve as a source of inspiration for readers. The paper proposes a poetic journey created by Kyrgyz women, offering readers an opportunity to experience Kyrgyz landscapes, traditions, and universal human themes through their verses. The paper provides an in-depth analysis of the poem translations, exploring the beauty and depth of the poets' thoughts and feelings. Through these translations, readers are invited to explore the world of Kyrgyz women poets, enriching their understanding of the language, culture, and the profound human experiences conveyed in the poetry. The hypotheses of the paper is that analyzing these translations through translation studies theories and linguistic and semiotic frameworks will reveal the complexities and challenges involved in translating poetry across languages and cultures.

Keywords: Kyrgyz poetry, post-soviet literature, translation, women poets.

Procedia PDF Downloads 33
2520 Applications of AI, Machine Learning, and Deep Learning in Cyber Security

Authors: Hailyie Tekleselase

Abstract:

Deep learning is increasingly used as a building block of security systems. However, neural networks are hard to interpret and typically solid to the practitioner. This paper presents a detail survey of computing methods in cyber security, and analyzes the prospects of enhancing the cyber security capabilities by suggests that of accelerating the intelligence of the security systems. There are many AI-based applications used in industrial scenarios such as Internet of Things (IoT), smart grids, and edge computing. Machine learning technologies require a training process which introduces the protection problems in the training data and algorithms. We present machine learning techniques currently applied to the detection of intrusion, malware, and spam. Our conclusions are based on an extensive review of the literature as well as on experiments performed on real enterprise systems and network traffic. We conclude that problems can be solved successfully only when methods of artificial intelligence are being used besides human experts or operators.

Keywords: artificial intelligence, machine learning, deep learning, cyber security, big data

Procedia PDF Downloads 127
2519 A Cross-Cultural Approach for Communication with Biological and Non-Biological Intelligences

Authors: Thomas Schalow

Abstract:

This paper posits the need to take a cross-cultural approach to communication with non-human cultures and intelligences in order to meet the following three imminent contingencies: communicating with sentient biological intelligences, communicating with extraterrestrial intelligences, and communicating with artificial super-intelligences. The paper begins with a discussion of how intelligence emerges. It disputes some common assumptions we maintain about consciousness, intention, and language. The paper next explores cross-cultural communication among humans, including non-sapiens species. The next argument made is that we need to become much more serious about communicating with the non-human, intelligent life forms that already exist around us here on Earth. There is an urgent need to broaden our definition of communication and reach out to the other sentient life forms that inhabit our world. The paper next examines the science and philosophy behind CETI (communication with extraterrestrial intelligences) and how it has proven useful, even in the absence of contact with alien life. However, CETI’s assumptions and methodology need to be revised and based on the cross-cultural approach to communication proposed in this paper if we are truly serious about finding and communicating with life beyond Earth. The final theme explored in this paper is communication with non-biological super-intelligences using a cross-cultural communication approach. This will present a serious challenge for humanity, as we have never been truly compelled to converse with other species, and our failure to seriously consider such intercourse has left us largely unprepared to deal with communication in a future that will be mediated and controlled by computer algorithms. Fortunately, our experience dealing with other human cultures can provide us with a framework for this communication. The basic assumptions behind intercultural communication can be applied to the many types of communication envisioned in this paper if we are willing to recognize that we are in fact dealing with other cultures when we interact with other species, alien life, and artificial super-intelligence. The ideas considered in this paper will require a new mindset for humanity, but a new disposition will prepare us to face the challenges posed by a future dominated by artificial intelligence.

Keywords: artificial intelligence, CETI, communication, culture, language

Procedia PDF Downloads 360
2518 Development of a Low-Cost Smart Insole for Gait Analysis

Authors: S. M. Khairul Halim, Mojtaba Ghodsi, Morteza Mohammadzaheri

Abstract:

Gait analysis is essential for diagnosing musculoskeletal and neurological conditions. However, current methods are often complex and expensive. This paper introduces a methodology for analysing gait parameters using a smart insole with a built-in accelerometer. The system measures stance time, swing time, step count, and cadence and wirelessly transmits data to a user-friendly IoT dashboard for centralized processing. This setup enables remote monitoring and advanced data analytics, making it a versatile tool for medical diagnostics and everyday usage. Integration with IoT enhances the portability and connectivity of the device, allowing for secure, encrypted data access over the Internet. This feature supports telemedicine and enables personalized treatment plans tailored to individual needs. Overall, the approach provides a cost-effective (almost 25 GBP), accurate, and user-friendly solution for gait analysis, facilitating remote tracking and customized therapy.

Keywords: gait analysis, IoT, smart insole, accelerometer sensor

Procedia PDF Downloads 21
2517 Translation of the Verbal Nouns (Masadars) Originating from Three-Letter Verbs in the Holy Quran: Verbal Noun with More than One Pattern (Wazn) As a Model

Authors: Montasser Mohamed Abdelwahab Mahmoud, Abdelwahab Saber Esawi

Abstract:

The language of the Qur’an has a wide range of understanding, reflection, and meanings. Therefore, translation of the Qur’an is inevitably nothing but a translation of the interpretation of the meanings of the Qur’an. It requires special competencies and skills for translators so that they can get close to the intended meaning of the verse of the Qur’an and convey it with precision. In the Arabic language, the verbal noun “AlMasdar” is a very important derivative that properly expresses the verbal idea in the form of a noun. It sounds the same as the base form of the verb with minor changes in the vowel pattern. It is one of the important topics in morphology. The morphologists divided verbal nouns into auditory and analogical, and they stated that that the verbal nouns (Masadars) originating from three-letter verbs are auditory, although they set controls for some of them in order to preserve them. As for the lexicographers, they mentioned the verbal nouns while talking about the lexical materials, and in some cases, their explanation of them exceeded that made by the morphologists, especially in their discussion of structures that the morphologists did not refer to in their books. The verb kafara (disbelief), for example, has three patterns, namely: al-kufْr, al-kufrān, and al-kufūr, and it was mentioned in the Holy Qur’an with different connotations. The verb ṣāma (fasted) with his two patterns (al-ṣaūm and al-ṣīām) was mentioned in the Holy Qur’an while their semantic meaning is different. The problem discussed in this research paper lied in the "linguistic loss" committed by translators when dealing with Islamic religious texts, especially the Qur'an. The study tried to identify the strategy adopted by translators of the Holy Qur'an in translating words that were classified as verbal nouns through analyzing the translation rendered by five translations of the Qur’an into English: Yusuf Ali, Pickthall, Mohsin Khan, Muhammad Sarwar, and Shakir. This study was limited to the verbal nouns in the Quraan that originate from three-letter verbs and have different semantic meanings.

Keywords: pattern, three-letter verbs, translation of the Quran, verbal nouns

Procedia PDF Downloads 163
2516 The Influence of Screen Translation on Creative Audiovisual Writing: A Corpus-Based Approach

Authors: John D. Sanderson

Abstract:

The popularity of American cinema worldwide has contributed to the development of sociolects related to specific film genres in other cultural contexts by means of screen translation, in many cases eluding norms of usage in the target language, a process whose result has come to be known as 'dubbese'. A consequence for the reception in countries where local audiovisual fiction consumption is far lower than American imported productions is that this linguistic construct is preferred, even though it differs from common everyday speech. The iconography of film genres such as science-fiction, western or sword-and-sandal films, for instance, generates linguistic expectations in international audiences who will accept more easily the sociolects assimilated by the continuous reception of American productions, even if the themes, locations, characters, etc., portrayed on screen may belong in origin to other cultures. And the non-normative language (e.g., calques, semantic loans) used in the preferred mode of linguistic transfer, whether it is translation for dubbing or subtitling, has diachronically evolved in many cases into a status of canonized sociolect, not only accepted but also required, by foreign audiences of American films. However, a remarkable step forward is taken when this typology of artificial linguistic constructs starts being used creatively by nationals of these target cultural contexts. In the case of Spain, the success of American sitcoms such as Friends in the 1990s led Spanish television scriptwriters to include in national productions lexical and syntactical indirect borrowings (Anglicisms not formally identifiable as such because they include elements from their own language) in order to target audiences of the former. However, this commercial strategy had already taken place decades earlier when Spain became a favored location for the shooting of foreign films in the early 1960s. The international popularity of the then newly developed sub-genre known as Spaghetti-Western encouraged Spanish investors to produce their own movies, and local scriptwriters made use of the dubbese developed nationally since the advent of sound in film instead of using normative language. As a result, direct Anglicisms, as well as lexical and syntactical borrowings made up the creative writing of these Spanish productions, which also became commercially successful. Interestingly enough, some of these films were even marketed in English-speaking countries as original westerns (some of the names of actors and directors were anglified to that purpose) dubbed into English. The analysis of these 'back translations' will also foreground some semantic distortions that arose in the process. In order to perform the research on these issues, a wide corpus of American films has been used, which chronologically range from Stagecoach (John Ford, 1939) to Django Unchained (Quentin Tarantino, 2012), together with a shorter corpus of Spanish films produced during the golden age of Spaghetti Westerns, from una tumba para el sheriff (Mario Caiano; in English lone and angry man, William Hawkins) to tu fosa será la exacta, amigo (Juan Bosch, 1972; in English my horse, my gun, your widow, John Wood). The methodology of analysis and the conclusions reached could be applied to other genres and other cultural contexts.

Keywords: dubbing, film genre, screen translation, sociolect

Procedia PDF Downloads 173
2515 Analysis of the Topics of Research of Brazilian Researchers Acting in the Areas of Engineering

Authors: Jether Gomes, Thiago M. R. Dias, Gray F. Moita

Abstract:

The production and publication of scientific works have increased significantly in the last years, being the Internet the main factor of access and diffusion of these. In view of this, researchers from several areas of knowledge have carried out several studies on scientific production data in order to analyze phenomena and trends about science. The understanding of how research has evolved can, for example, serve as a basis for building scientific policies for further advances in science and stimulating research groups to become more productive. In this context, the objective of this work is to analyze the main research topics investigated along the trajectory of the Brazilian science of researchers working in the areas of engineering, in order to map scientific knowledge and identify topics in highlights. To this end, studies are carried out on the frequency and relationship of the keywords of the set of scientific articles registered in the existing curricula in the Lattes Platform of each one of the selected researchers, counting with the aid of bibliometric analysis features.

Keywords: research topics, bibliometrics, topics of interest, Lattes Platform

Procedia PDF Downloads 221
2514 The Role of Metaphor in Communication

Authors: Fleura Shkëmbi, Valbona Treska

Abstract:

In elementary school, we discover that a metaphor is a decorative linguistic device just for poets. But now that we know, it's also a crucial tactic that individuals employ to understand the universe, from fundamental ideas like time and causation to the most pressing societal challenges today. Metaphor is the use of language to refer to something other than what it was originally intended for or what it "literally" means in order to suggest a similarity or establish a connection between the two. People do not identify metaphors as relevant in their decisions, according to a study on metaphor and its effect on decision-making; instead, they refer to more "substantive" (typically numerical) facts as the basis for their problem-solving decision. Every day, metaphors saturate our lives via language, cognition, and action. They argue that our conceptions shape our views and interactions with others and that concepts define our reality. Metaphor is thus a highly helpful tool for both describing our experiences to others and forming notions for ourselves. In therapeutic contexts, their shared goal appears to be twofold. The cognitivist approach to metaphor regards it as one of the fundamental foundations of human communication. The benefits and disadvantages of utilizing the metaphor differ depending on the target domain that the metaphor portrays. The challenge of creating messages and surroundings that affect customers' notions of abstract ideas in a variety of industries, including health, hospitality, romance, and money, has been studied for decades in marketing and consumer psychology. The aim of this study is to examine, through a systematic literature review, the role of the metaphor in communication and in advertising. This study offers a selected analysis of this literature, concentrating on research on customer attitudes and product appraisal. The analysis of the data identifies potential research questions. With theoretical and applied implications for marketing, design, and persuasion, this study sheds light on how, when, and for whom metaphoric communications are powerful.

Keywords: metaphor, communication, advertising, cognition, action

Procedia PDF Downloads 101
2513 Fuzzy Sentiment Analysis of Customer Product Reviews

Authors: Samaneh Nadali, Masrah Azrifah Azmi Murad

Abstract:

As a result of the growth of the web, people are able to express their views and opinions. They can now post reviews of products at merchant sites and express their views on almost anything in internet forums, discussion groups, and blogs. Therefore, the number of product reviews has grown rapidly. The large numbers of reviews make it difficult for manufacturers or businesses to automatically classify them into different semantic orientations (positive, negative, and neutral). For sentiment classification, most existing methods utilize a list of opinion words whereas this paper proposes a fuzzy approach for evaluating sentiments expressed in customer product reviews, to predict the strength levels (e.g. very weak, weak, moderate, strong and very strong) of customer product reviews by combinations of adjective, adverb and verb. The proposed fuzzy approach has been tested on eight benchmark datasets and obtained 74% accuracy, which leads to help the organization with a more clear understanding of customer's behavior in support of business planning process.

Keywords: fuzzy logic, customer product review, sentiment analysis

Procedia PDF Downloads 366
2512 Introducing Data-Driven Learning into Chinese Higher Education English for Academic Purposes Writing Instructional Settings

Authors: Jingwen Ou

Abstract:

Writing for academic purposes in a second or foreign language is one of the most important and the most demanding skills to be mastered by non-native speakers. Traditionally, the EAP writing instruction at the tertiary level encompasses the teaching of academic genre knowledge, more specifically, the disciplinary writing conventions, the rhetorical functions, and specific linguistic features. However, one of the main sources of challenges in English academic writing for L2 students at the tertiary level can still be found in proficiency in academic discourse, especially vocabulary, academic register, and organization. Data-Driven Learning (DDL) is defined as “a pedagogical approach featuring direct learner engagement with corpus data”. In the past two decades, the rising popularity of the application of the data-driven learning (DDL) approach in the field of EAP writing teaching has been noticed. Such a combination has not only transformed traditional pedagogy aided by published DDL guidebooks in classroom use but also triggered global research on corpus use in EAP classrooms. This study endeavors to delineate a systematic review of research in the intersection of DDL and EAP writing instruction by conducting a systematic literature review on both indirect and direct DDL practice in EAP writing instructional settings in China. Furthermore, the review provides a synthesis of significant discoveries emanating from prior research investigations concerning Chinese university students’ perception of Data-Driven Learning (DDL) and the subsequent impact on their academic writing performance following corpus-based training. Research papers were selected from Scopus-indexed journals and core journals from two main Chinese academic databases (CNKI and Wanfang) published in both English and Chinese over the last ten years based on keyword searches. Results indicated an insufficiency of empirical DDL research despite a noticeable upward trend in corpus research on discourse analysis and indirect corpus applications for material design by language teachers. Research on the direct use of corpora and corpus tools in DDL, particularly in combination with genre-based EAP teaching, remains a relatively small fraction of the whole body of research in Chinese higher education settings. Such scarcity is highly related to the prevailing absence of systematic training in English academic writing registers within most Chinese universities' EAP syllabi due to the Chinese English Medium Instruction policy, where only English major students are mandated to submit English dissertations. Findings also revealed that Chinese learners still held mixed attitudes towards corpus tools influenced by learner differences, limited access to language corpora, and insufficient pre-training on corpus theoretical concepts, despite their improvements in final academic writing performance.

Keywords: corpus linguistics, data-driven learning, EAP, tertiary education in China

Procedia PDF Downloads 64
2511 Reliability Analysis of Computer Centre at Yobe State University Nigeria under Different Repair Policies

Authors: Vijay Vir Singh

Abstract:

In this paper, we focus on the reliability and performance analysis of Computer Centre (CC) at Yobe State University, Damaturu, Nigeria. The CC consists of three servers: one database mail server, one redundant and one for sharing with the client computers in the CC (called as local server). Observing the different possibilities of functioning of the CC, analysis has been done to evaluate the various reliability characteristics of the system. The system can completely fail due to failure of router, redundant server before repairing the mail server, and switch failure. The system can also partially fail when local server fails. The system can also fail completely due to a cooling failure, electricity failure or some natural calamity like earthquake, fire etc. All the failure rates are assumed to be constant while repair follows two types of distributions: general and Gumbel-Hougaard family copula.

Keywords: reliability, availability Gumbel-Hougaard family copula, MTTF, internet data centre

Procedia PDF Downloads 462
2510 An Intelligent Baby Care System Based on IoT and Deep Learning Techniques

Authors: Chinlun Lai, Lunjyh Jiang

Abstract:

Due to the heavy burden and pressure of caring for infants, an integrated automatic baby watching system based on IoT smart sensing and deep learning machine vision techniques is proposed in this paper. By monitoring infant body conditions such as heartbeat, breathing, body temperature, sleeping posture, as well as the surrounding conditions such as dangerous/sharp objects, light, noise, humidity and temperature, the proposed system can analyze and predict the obvious/potential dangerous conditions according to observed data and then adopt suitable actions in real time to protect the infant from harm. Thus, reducing the burden of the caregiver and improving safety efficiency of the caring work. The experimental results show that the proposed system works successfully for the infant care work and thus can be implemented in various life fields practically.

Keywords: baby care system, Internet of Things, deep learning, machine vision

Procedia PDF Downloads 227
2509 Classification of IoT Traffic Security Attacks Using Deep Learning

Authors: Anum Ali, Kashaf ad Dooja, Asif Saleem

Abstract:

The future smart cities trend will be towards Internet of Things (IoT); IoT creates dynamic connections in a ubiquitous manner. Smart cities offer ease and flexibility for daily life matters. By using small devices that are connected to cloud servers based on IoT, network traffic between these devices is growing exponentially, whose security is a concerned issue, since ratio of cyber attack may make the network traffic vulnerable. This paper discusses the latest machine learning approaches in related work further to tackle the increasing rate of cyber attacks, machine learning algorithm is applied to IoT-based network traffic data. The proposed algorithm train itself on data and identify different sections of devices interaction by using supervised learning which is considered as a classifier related to a specific IoT device class. The simulation results clearly identify the attacks and produce fewer false detections.

Keywords: IoT, traffic security, deep learning, classification

Procedia PDF Downloads 154
2508 Implementation of Big Data Concepts Led by the Business Pressures

Authors: Snezana Savoska, Blagoj Ristevski, Violeta Manevska, Zlatko Savoski, Ilija Jolevski

Abstract:

Big data is widely accepted by the pharmaceutical companies as a result of business demands create through legal pressure. Pharmaceutical companies have many legal demands as well as standards’ demands and have to adapt their procedures to the legislation. To manage with these demands, they have to standardize the usage of the current information technology and use the latest software tools. This paper highlights some important aspects of experience with big data projects implementation in a pharmaceutical Macedonian company. These projects made improvements of their business processes by the help of new software tools selected to comply with legal and business demands. They use IT as a strategic tool to obtain competitive advantage on the market and to reengineer the processes towards new Internet economy and quality demands. The company is required to manage vast amounts of structured as well as unstructured data. For these reasons, they implement projects for emerging and appropriate software tools which have to deal with big data concepts accepted in the company.

Keywords: big data, unstructured data, SAP ERP, documentum

Procedia PDF Downloads 273
2507 Cyber Victimization: School Experience of Malaysian Cyberbullied Teenagers

Authors: Shireen Simon

Abstract:

Cyberbullying among schoolchildren and teenagers became a hot issue discussed by Malaysian society. Cyberbullying is a new age of bullying because it uses the modern digital technology intentionally to hurt and degrade someone in the cyber world. Cyberbullying is a problem affecting many teenagers as they embrace online communication and interaction whereby virtual world with no borders. By adopting a qualitative approach, this study has captured 8 cyberbullied victims’ school experience. Even years after leaving school, these 8 cyberbullied victims remember how it feels to be bullied in the cyber world. The principal investigator also tries to identify the possibility factors that contribute to cyberbullying among these 8 victims. The result shows that these victims were bullied differently in cyber world. This study not just primarily focuses on cyberbullying issues among schoolchildren and teenagers; it also addresses the motives and causes of cyberbullying. Lastly, this article will be served as guidance for school teachers, parents and teenagers to prepare to tackle cyberbullying together. Cyberbullying is no laughing matter in our community, and it is time to spread the seeds of peace inspires others to do the same.

Keywords: cyberbullying, cyber victimization, internet, school experience, teenagers

Procedia PDF Downloads 289
2506 Literature as a Strategic Tool to Conscientise Africans: An Attempt by Postcolonial Writers and Critics to Reverse the Socio-Economics Imbalances of Colonialism

Authors: Lutendo Nendauni

Abstract:

Colonialism breaks things, colonisers exploded native cultural solidarity, producing the spiritual confusion, psychic wounding, and economic exploitation of a new and dominated ‘other’. Colonialism as the cultural and economic exploitation began when the West defended in their seizure of foreign territories for the exploitation of its natural resources; this resulted in brutal socio-economic imbalances. The Western profited at the detriment of the weak Africa. However, colonialism has since passed, but the effects are still evident culturally, socially, and economically. This paper explored how postcolonial writers and critics attempt to reverse the socio-economic imbalances resulting from the fragmentation of colonialism, with a focus on the play 'I will Marry When I Want' by Ngugi wa Thiong’o and Ngugi wa Mirii, as a primary text. Using qualitative discourse-textual analysis as the research methodology, the researcher purposively extracts discourse segments from the text for analysis and interpretation. The findings reveal that Postcolonial critics and writers attempt to reverse the socio-economic effects of colonialism through various counter discourses; their literature is concerned with the destruction of colonised identity, the search for this identity, and its assertion. It is manifest in the text that writers offer corrective views about Africans; they stress that they write their literary texts to conscientise their fellow Africans. Postcolonial writers and critics argue that language is a carrier of culture and that the only way to break free from colonial influence is by not adopting a foreign language. They further through their poems, novels, plays, and music strategically shine the spotlight on the previously nameless and destitute people so that they can develop the human spirit’s desire to overcome defeat, socio-political deprivation, and isolation.

Keywords: colonialism, postcoloniality, critics, socio-economic imbalances

Procedia PDF Downloads 159
2505 Spatial Correlation of Channel State Information in Real Long Range Measurement

Authors: Ahmed Abdelghany, Bernard Uguen, Christophe Moy, Dominique Lemur

Abstract:

The Internet of Things (IoT) is developed to ensure monitoring and connectivity within different applications. Thus, it is critical to study the channel propagation characteristics in Low Power Wide Area Network (LPWAN), especially Long Range Wide Area Network (LoRaWAN). In this paper, an in-depth investigation of the reciprocity between the uplink and downlink Channel State Information (CSI) is done by performing an outdoor measurement campaign in the area of Campus Beaulieu in Rennes. At each different location, the CSI reciprocity is quantified using the Pearson Correlation Coefficient (PCC) which shows a very high linear correlation between the uplink and downlink CSI. This reciprocity feature could be utilized for the physical layer security between the node and the gateway. On the other hand, most of the CSI shapes from different locations are highly uncorrelated from each other. Hence, it can be anticipated that this could achieve significant localization gain by utilizing the frequency hopping in the LoRa systems by getting access to a wider band.

Keywords: IoT, LPWAN, LoRa, effective signal power, onsite measurement

Procedia PDF Downloads 164