Search results for: RFID reader
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 276

Search results for: RFID reader

126 Expansion and Consolidation of Islam in Iran to the End of Qajar Period

Authors: Ashaq Hussain

Abstract:

Under Islam, for the first time since the Achaemenids, all Iranians including those of Central Asia and on the frontiers of India became united under one rule. Islam was rescued from a narrow Bedouin outlook and Bedouin mores primarily by the Iranians, who showed that Islam, both as a religion and, primarily, as a culture, need not be bound solely to the Arabic language and Arab norms of behavior. Instead Islam was to become a universal religion and culture open to all people. This was a fundamental contribution of the Iranians to Islam, although all Iranians had become Muslims by the time of the creation of Saljuq Empire. So, Iran in a sense provided the history, albeit an epic, of pre-Islamic times for Islam. After all, the Arabs conquered the entire Sasanian Empire, where they found full-scale, imperial models for the management of the new Caliphate, whereas only provinces of the Byzantine Empire were overrun by the Arabs. The present paper is an attempt to give reader a detailed introduction, emergence, expansion and spread of Islam in Iran to the end of Qajar period. It is in this context the present paper has been analyzed.

Keywords: Islam, Achaemenids, Bedouin, Central Asia, Iran

Procedia PDF Downloads 399
125 The Economic System (Islam) and Riba's Prohibition on Historical Perspective

Authors: Risanda Alirastra Budiantoro, Riesanda Najmi Sasmita, Sri Herianingrum

Abstract:

Allah has given the guidance in the form of Islam for Muslim to take and lead all the aspects of life including the economic activity. The Islamic economic system is believed to be the answer to the economic problems that exist at this time. The goal is to achieve falah in kaffah by not doing some economic activities that are in violation as prescribed by Islam. An example for this is riba. Discourse on riba can be said ‘classical’ both in the development of Islamic thought and in Islamic civilization because riba often occurs in all aspects of public life, especially economic transactions (in Islam called muamalah). Riba is an additional retrieval, either in a sale and purchase transaction or lending in a false or contrary to the principle of muamalah in Islam. Prohibition of riba is obtained from various sources by the Qur'an and Hadith Rasulullah SAW, so the scholars firmly and clearly defined the prohibition of riba because there are exploitative elements that can harm the others. So, this study is aimed to identify Islamic economic system and the prohibition of riba in historical perspective. From the results of this study, it is expected to be a good reference for the reader to understand the Islamic economic system and riba in the future.

Keywords: economics system, riba, historical perspective, economy

Procedia PDF Downloads 288
124 Comprehensive Review of Ultralightweight Security Protocols

Authors: Prashansa Singh, Manjot Kaur, Rohit Bajaj

Abstract:

The proliferation of wireless sensor networks and Internet of Things (IoT) devices in the quickly changing digital landscape has highlighted the urgent need for strong security solutions that can handle these systems’ limited resources. A key solution to this problem is the emergence of ultralightweight security protocols, which provide strong security features while respecting the strict computational, energy, and memory constraints imposed on these kinds of devices. This in-depth analysis explores the field of ultralightweight security protocols, offering a thorough examination of their evolution, salient features, and the particular security issues they resolve. We carefully examine and contrast different protocols, pointing out their advantages and disadvantages as well as the compromises between resource limitations and security resilience. We also study these protocols’ application domains, including the Internet of Things, RFID systems, and wireless sensor networks, to name a few. In addition, the review highlights recent developments and advancements in the field, pointing out new trends and possible avenues for future research. This paper aims to be a useful resource for researchers, practitioners, and developers, guiding the design and implementation of safe, effective, and scalable systems in the Internet of Things era by providing a comprehensive overview of ultralightweight security protocols.

Keywords: wireless sensor network, machine-to-machine, MQTT broker, server, ultralightweight, TCP/IP

Procedia PDF Downloads 26
123 Machine Learning Based Smart Beehive Monitoring System Without Internet

Authors: Esra Ece Var

Abstract:

Beekeeping plays essential role both in terms of agricultural yields and agricultural economy; they produce honey, wax, royal jelly, apitoxin, pollen, and propolis. Nowadays, these natural products become more importantly suitable and preferable for nutrition, food supplement, medicine, and industry. However, to produce organic honey, majority of the apiaries are located in remote or distant rural areas where utilities such as electricity and Internet network are not available. Additionally, due to colony failures, world honey production decreases year by year despite the increase in the number of beehives. The objective of this paper is to develop a smart beehive monitoring system for apiaries including those that do not have access to Internet network. In this context, temperature and humidity inside the beehive, and ambient temperature were measured with RFID sensors. Control center, where all sensor data was sent and stored at, has a GSM module used to warn the beekeeper via SMS when an anomaly is detected. Simultaneously, using the collected data, an unsupervised machine learning algorithm is used for detecting anomalies and calibrating the warning system. The results show that the smart beehive monitoring system can detect fatal anomalies up to 4 weeks prior to colony loss.

Keywords: beekeeping, smart systems, machine learning, anomaly detection, apiculture

Procedia PDF Downloads 202
122 Unauthorized License Verifier and Secure Access to Vehicle

Authors: G. Prakash, L. Mohamed Aasiq, N. Dhivya, M. Jothi Mani, R. Mounika, B. Gomathi

Abstract:

In our day to day life, many people met with an accident due to various reasons like over speed, overload in the vehicle, violation of the traffic rules, etc. Driving license system is difficult task for the government to monitor. To prevent non-licensees from driving who are causing most of the accidents, a new system is proposed. The proposed system consists of a smart card capable of storing the license details of a particular person. Vehicles such as cars, bikes etc., should have a card reader capable of reading the particular license. A person, who wishes to drive the vehicle, should insert the card (license) in the vehicle and then enter the password in the keypad. If the license data stored in the card and database about the entire license holders in the microcontroller matches, he/she can proceed for ignition after the automated opening of the fuel tank valve, otherwise the user is restricted to use the vehicle. Moreover, overload detector in our proposed system verifies and then prompts the user to avoid overload before driving. This increases the security of vehicles and also ensures safe driving by preventing accidents.

Keywords: license, verifier, EEPROM, secure, overload detection

Procedia PDF Downloads 218
121 Comparison of Authentication Methods in Internet of Things Technology

Authors: Hafizah Che Hasan, Fateen Nazwa Yusof, Maslina Daud

Abstract:

Internet of Things (IoT) is a powerful industry system, which end-devices are interconnected and automated, allowing the devices to analyze data and execute actions based on the analysis. The IoT technology leverages the technology of Radio-Frequency Identification (RFID) and Wireless Sensor Network (WSN), including mobile and sensor. These technologies contribute to the evolution of IoT. However, due to more devices are connected each other in the Internet, and data from various sources exchanged between things, confidentiality of the data becomes a major concern. This paper focuses on one of the major challenges in IoT; authentication, in order to preserve data integrity and confidentiality are in place. A few solutions are reviewed based on papers from the last few years. One of the proposed solutions is securing the communication between IoT devices and cloud servers with Elliptic Curve Cryptograhpy (ECC) based mutual authentication protocol. This solution focuses on Hyper Text Transfer Protocol (HTTP) cookies as security parameter.  Next proposed solution is using keyed-hash scheme protocol to enable IoT devices to authenticate each other without the presence of a central control server. Another proposed solution uses Physical Unclonable Function (PUF) based mutual authentication protocol. It emphasizes on tamper resistant and resource-efficient technology, which equals a 3-way handshake security protocol.

Keywords: Internet of Things (IoT), authentication, PUF ECC, keyed-hash scheme protocol

Procedia PDF Downloads 230
120 Poetic Music by the Poet, Commander of the Faithful, Muhammad Bello: Prosodical Study

Authors: Sirajo Muhammad Sokoto

Abstract:

The Commander of the Faithful, Muhammad Bello, is considered one of the most distinguished scholars and poetic geniuses who is famous for reciting poetry in the classical vertical style. He is also represented by pre-Islamic poets such as Imru’ al-Qays and Alqamah and among the Islamists such as Hassan bin Thabit, Amr bin Abi Rabi’ah, and others. The poet drew from the seas of the Arabic language and its styles at the hands of His father, Sheikh Othman Bin Fodio, and his uncle, Sheikh Abdullah Bin Fodio, are both things that made Muhammad Bello conversant with the Arabic language until he was able to write poetry in a beautiful format and good style. The Commander of the Faithful, Muhammad Bello, did not deviate from what the Arabs know of poetic elements, such as taking into account its meanings and music; Muhammadu Bello has used every Bahr of prosody and its technicals in many of his poems. This article prepares the reader for the efforts made by the poet Muhammad Bello in composing poems on poetic seas, taking into account musical tones for different purposes according to his desire. The article will also discuss the poet’s talent, skill, and eloquence.

Keywords: music, Muhammad Bello, poetry, performances

Procedia PDF Downloads 40
119 The English Classroom: Scope and Space for Motivation

Authors: Madhavi Godavarthy

Abstract:

The globalized world has been witnessing the ubiquity of the English language and has made it mandatory that students be equipped with the required Communication and soft skills. For students and especially for students studying in technical streams, gaining command over the English language is only a part of the bigger challenges they will face in the future. Linguistic capabilities if blended with the right attitude and a positive personality would deliver better results in the present environment of the digitalized world. An English classroom has that ‘space’; a space if utilized well by the teacher can pay rich dividends. The prescribed syllabus for English in the process of adapting itself to the challenges of a more and more technical world has meted out an indifferent treatment in including ‘literary’ material in their curriculum. A debate has always existed regarding the same and diversified opinions have been given. When the student is motivated to reach Literature through intrinsic motivation, it may contribute to his/her personality-development. In the present paper, the element of focus is on the scope and space to motivate students by creating a specific space for herself/himself amidst the schedules of the teaching-learning processes by taking into consideration a few literary excerpts for the purpose.

Keywords: English language, teaching and learning process, reader response theory, intrinsic motivation, literary texts

Procedia PDF Downloads 583
118 Optimization of a Hand-Fan Shaped Microstrip Patch Antenna by Means of Orthogonal Design Method of Design of Experiments for L-Band and S-Band Applications

Authors: Jaswinder Kaur, Nitika, Navneet Kaur, Rajesh Khanna

Abstract:

A hand-fan shaped microstrip patch antenna (MPA) for L-band and S-band applications is designed, and its characteristics have been reconnoitered. The proposed microstrip patch antenna with double U-slot defected ground structure (DGS) is fabricated on an FR4 substrate which is a very readily available and inexpensive material. The suggested antenna is optimized using Orthogonal Design Method (ODM) of Design of Experiments (DOE) to cover the frequency range from 0.91-2.82 GHz for L-band and S-band applications. The L-band covers the frequency range of 1-2 GHz, which is allocated to telemetry, aeronautical, and military systems for passive satellite sensors, weather radars, radio astronomy, and mobile communication. The S-band covers the frequency range of 2-3 GHz, which is used by weather radars, surface ship radars and communication satellites and is also reserved for various wireless applications such as Worldwide Interoperability for Microwave Access (Wi-MAX), super high frequency radio frequency identification (SHF RFID), industrial, scientific and medical bands (ISM), Bluetooth, wireless broadband (Wi-Bro) and wireless local area network (WLAN). The proposed method of optimization is very time efficient and accurate as compared to the conventional evolutionary algorithms due to its statistical strategy. Moreover, the antenna is tested, followed by the comparison of simulated and measured results.

Keywords: design of experiments, hand fan shaped MPA, L-Band, orthogonal design method, S-Band

Procedia PDF Downloads 104
117 A Method for the Extraction of the Character's Tendency from Korean Novels

Authors: Min-Ha Hong, Kee-Won Kim, Seung-Hoon Kim

Abstract:

The character in the story-based content, such as novels and movies, is one of the core elements to understand the story. In particular, the character’s tendency is an important factor to analyze the story-based content, because it has a significant influence on the storyline. If readers have the knowledge of the tendency of characters before reading a novel, it will be helpful to understand the structure of conflict, episode and relationship between characters in the novel. It may therefore help readers to select novel that the reader wants to read. In this paper, we propose a method of extracting the tendency of the characters from a novel written in Korean. In advance, we build the dictionary with pairs of the emotional words in Korean and English since the emotion words in the novel’s sentences express character’s feelings. We rate the degree of polarity (positive or negative) of words in our emotional words dictionary based on SenticNet. Then we extract characters and emotion words from sentences in a novel. Since the polarity of a word grows strong or weak due to sentence features such as quotations and modifiers, our proposed method consider them to calculate the polarity of characters. The information of the extracted character’s polarity can be used in the book search service or book recommendation service.

Keywords: character tendency, data mining, emotion word, Korean novel

Procedia PDF Downloads 310
116 Internet Media and Public: A Report of a Mutual Deception

Authors: Safet Zejnullahu

Abstract:

The relationship between the public and media is more than meaningful. It has been a topic of discussion as early as the birth of the media. The 'magic box' called radio adapted and transformed by following the tastes and interests of the public. Television went a step further by complementing the magic sound of the magic box with photos/images. Newspapers informed the reader, but from time to time, they also provided them the room to express their opinions. The media-public report in the traditional media is a report of a mutual respect. Today, the report between media and public should be well defined. The goal of this paper is to analyze the history of the media-public relationship, with a special emphasis on the analysis of this relationship in media of the internet time. This paper seeks to prove that the internet media has created a completely new and thus far unknown relationship between the media and public. Through research, which includes an analysis of the media in Kosovo and Albania, it will be proven that the media of the internet time has elevated this relationship to a new level, with many unknowns in terms of the functioning and role of the media. The results and findings of the paper are related to the conclusion that from the relationship in which the roles of the media and the public are known, nowadays, this relationship goes beyond the known principle and rules and is more defined as a relationship of mutual deception. The media goes beyond the line of the humility of the public, and the public seeks to direct the content of the media. The media-public report in the internet-media is a report based on mutual attempt for fraud.

Keywords: media, public, report, humility, direction

Procedia PDF Downloads 137
115 How the Writer Tells the Story Should Be the Primary Concern rather than Who Can Write about Whom: The Limits of Cultural Appropriation Vis-à-Vis The Ethics of Narrative Empathy

Authors: Alexandra Cheira

Abstract:

Cultural appropriation has been theorised as a form of colonialism in which members of a dominant culture reduce cultural elements that are deeply meaningful to a minority culture to the category of the “exotic other” since they do not experience the oppression and discriminations faced by members of the minority culture. Yet, in the particular case of literature, writers such as Lionel Shriver and Bernardine Evaristo have argued that authors from a cultural majority have a right to write in the voice of someone from a cultural minority, hence attacking the idea that this is a form of cultural appropriation. By definition, Shriver and Evaristo claim, writers are supposed to write beyond their own culture, gender, class, and/ or race. In this light, this paper discusses the limits of cultural appropriation vis-à-vis the ethics of narrative empathy by addressing the mixed critical reception of Kathryn Stockett’s The Help (2009) and Jeanine Cummins’s American Dirt (2020). In fact, both novels were acclaimed as global eye-openers regarding the struggles of respectively South American migrants and African American maids. At the same time, both novelists have been accused of cultural appropriation by telling a story that is not theirs to tell, given the fact that they are white women telling these stories in what critics have argued is really an American voice telling a story to American readers.These claims will be investigated within the framework of Edward Said’s foundational examination of Orientalism in the field of postcolonial studies as a Western style for authoritatively restructuring the Orient. This means that Orientalist stereotypes regarding Eastern cultures have implicitly validated colonial and imperial pursuits, in the specific context of literary representations of African American and Mexican cultures by white writers. At the same time, the conflicted reception of American Dirt and The Help will be examined within the critical framework of narrative empathy as theorised by Suzanne Keen. Hence, there will be a particular focus on the way a reader’s heated perception that the author’s perspective is purely dishonest can result from a friction between an author’s intention and a reader’s experience of narrative empathy, while a shared sense of empathy between authors and readers can be a rousing momentum to move beyond literary response to social action.Finally, in order to assess that “the key question should not be who can write about whom, but how the writer tells the story”, the recent controversy surrounding Dutch author Marieke Lucas Rijneveld’s decision to resign the translation of American poet Amanda Gorman’s work into Dutch will be duly investigated. In fact, Rijneveld stepped out after journalist and activist Janice Deul criticised Dutch publisher Meulenhoff for choosing a translator who was not also Black, despite the fact that 22-year-old Gorman had selected the 29-year-old Rijneveld herself, as a fellow young writer who had likewise come to fame early on in life. In this light, the critical argument that the controversial reception of The Help reveals as much about US race relations in the early twenty-first century as about the complex literary transactions between individual readers and the novel itself will also be discussed in the extended context of American Dirt and white author Marieke Rijneveld’s withdrawal from the projected translation of Black poet Amanda Gorman.

Keywords: cultural appropriation, cultural stereotypes, narrative empathy, race relations

Procedia PDF Downloads 39
114 Automatic Teller Machine System Security by Using Mobile SMS Code

Authors: Husnain Mushtaq, Mary Anjum, Muhammad Aleem

Abstract:

The main objective of this paper is used to develop a high security in Automatic Teller Machine (ATM). In these system bankers will collect the mobile numbers from the customers and then provide a code on their mobile number. In most country existing ATM machine use the magnetic card reader. The customer is identifying by inserting an ATM card with magnetic card that hold unique information such as card number and some security limitations. By entering a personal identification number, first the customer is authenticated then will access bank account in order to make cash withdraw or other services provided by the bank. Cases of card fraud are another problem once the user’s bank card is missing and the password is stolen, or simply steal a customer’s card & PIN the criminal will draw all cash in very short time, which will being great financial losses in customer, this type of fraud has increase worldwide. So to resolve this problem we are going to provide the solution using “Mobile SMS code” and ATM “PIN code” in order to improve the verify the security of customers using ATM system and confidence in the banking area.

Keywords: PIN, inquiry, biometric, magnetic strip, iris recognition, face recognition

Procedia PDF Downloads 335
113 Equivalent Circuit Representation of Lossless and Lossy Power Transmission Systems Including Discrete Sampler

Authors: Yuichi Kida, Takuro Kida

Abstract:

In a new smart society supported by the recent development of 5G and 6G Communication systems, the im- portance of wireless power transmission is increasing. These systems contain discrete sampling systems in the middle of the transmission path and equivalent circuit representation of lossless or lossy power transmission through these systems is an important issue in circuit theory. In this paper, for the given weight function, we show that a lossless power transmission system with the given weight is expressed by an equivalent circuit representation of the Kida’s optimal signal prediction system followed by a reactance multi-port circuit behind it. Further, it is shown that, when the system is lossy, the system has an equivalent circuit in the form of connecting a multi-port positive-real circuit behind the Kida’s optimal signal prediction system. Also, for the convenience of the reader, in this paper, the equivalent circuit expression of the reactance multi-port circuit and the positive- real multi-port circuit by Cauer and Ohno, whose information is currently being lost even in the world of the Internet.

Keywords: signal prediction, pseudo inverse matrix, artificial intelligence, power transmission

Procedia PDF Downloads 92
112 The Quranic Case for Resurrection

Authors: Maira Farooq Maneka

Abstract:

Death has increasingly caused humans to investigate its reality and what lies after it, if something at all, with personal conviction and concern. Till date it remains a matter of speculation. We do not encounter arguments other than ‘faith’ from major world religions when justifying claims about life after death (LAD) as it is an unseen phenomenon. This paper attempts to analyse the Islamic idea of resurrection (after death) and its justification that is distinct from faith but instead contemplative in nature. To do this a legal lens was adopted which allowed the categorisation of selected Quranic arguments under the heading of direct evidence, indirect evidence and intuitive reasoning. Results: Four kinds of direct evidences are discussed under the themes of sleep, droughts, predictions and Quranic challenge. The section of indirect evidences narrows its scope only to two, out of many, broad possible signs that pointed towards the reality of resurrection. These include the signs found in nature such as sun and water as well as signs one finds within the human body such as the creation and function of human fingertips. Finally the last section tries to amalgamate Quran’s appeal to human rationality that facilitates the reader in accepting the possibility of resurrection and hence a final Day of Judgement. These include the notion of accountability, pleasure, pain and human agency.

Keywords: Islam, life after death, Quran, resurrection

Procedia PDF Downloads 67
111 Patient Service Improvement in Public Emergency Department Using Discrete Event Simulation

Authors: Dana Mohammed, Fatemah Abdullah, Hawraa Ali, Najat Al-Shaer, Rawan Al-Awadhi, , Magdy Helal

Abstract:

We study the patient service performance at the emergency department of a major Kuwaiti public hospital, using discrete simulation and lean concepts. In addition to the common problems in such health care systems (over crowdedness, facilities planning and usage, scheduling and staffing, capacity planning) the emergency department suffered from several cultural and patient behavioural issues. Those contributed significantly to the system problems and constituted major obstacles in maintaining the performance in control. This led to overly long waiting times and the potential of delaying providing help to critical cases. We utilized the visual management tools to mitigate the impact of the patients’ behaviours and attitudes and improve the logistics inside the system. In addition a proposal is made to automate the date collection and communication within the department using RFID-based barcoding system. Discrete event simulation models were developed as decision support systems; to study the operational problems and assess achieved improvements. The simulation analysis resulted in cutting the patient delays to about 35% of their current values by reallocating and rescheduling the medical staff. Combined with the application of the visual management concepts, this provided the basis to improving patient service without any major investments.

Keywords: simulation, visual management, health care system, patient

Procedia PDF Downloads 447
110 Technologies in Municipal Solid Waste Management in Indian Towns

Authors: Gargi Ghosh

Abstract:

Municipal solid waste management (MSWM) is an obligatory function of the local self-government as per the Indian constitution, and this paper gives a glimpse of the system in Indian towns focusing on its present state and use of technology in the system. The paper analyses the MSWM characteristics in 35 towns in the southern state of Karnataka. The lifestyle in these towns was found to be very sustainable with minimal disposal and considerable reuse. Average per capita waste generated in the towns ranged from 300 gm/person to 500 gm/person. The waste collection efficiency varied from 60% to 80%. The waste shows equal share of organic and non-organic waste composition with a low calorific value. Lack of capacity of the municipal body in terms of manpower, assets & knowledge and social consciousness were found to be two major issues in the system. Technical solutions in use in India at present are composting, organic re-reprocessing, bio-methanation, waste to energy etc. The tonnage of waste generated ranged from 8 TPD to 80 TPD. The feasibility of technology has been analysed in the context of the above characteristics. It was found that low calorific value and mixed nature of waste made waste to energy and bio methanation processes unsuitable. Composting – windrow and closed door was found best to treat the bulk of the waste. Organic–re-processors was planned for phase 2 of MSWM program in the towns with effective implementation of segregation at source. GPS and RFID technology was recommended for monitoring the collection process and increasing accountability of the citizens for effective implementation.

Keywords: solid waste management, Indian towns, waste management technology, waste charateristics

Procedia PDF Downloads 295
109 A Study on the Annual Doses Received by the Workers of Some Medical Practices

Authors: Eltayeb Hamad Elneel Yousif

Abstract:

This paper describes occupational radiation doses of workers in non-destructive testing (NDT) and some medical practices during the year 2007. The annual doses received by the workers of a public hospital are presented in this report. The Department is facilitated with HARSHAW Reader model 6600 and assigned the rule of personal monitoring to contribute in controlling and reducing the doses received by radiation workers. TLD cards with two TLD chips type LiF: Mg, Ti (TLD-100) were calibrated to measure the personal dose equivalent Hp(10). Around 150 medical radiation workers were monitored throughout the year. Each worker received a single TLD card worn on the chest above lead apron and returned for laboratory reading every two months. The average annual doses received by the workers of radiotherapy, nuclear medicine and diagnostic radiology were evaluated. The annual doses for individual radiation workers ranged between 0.55-4.42 mSv, 0.48-1.86 mSv, and 0.48-0.91 mSv for the workers of radiotherapy, nuclear medicine and diagnostic radiology, respectively. The mean dose per worker was 1.29±1, 1.03±0.4, and 0.69±0.2 mSv, respectively. The results showed compliance with international dose limits. Our results reconfirm the importance of personal dosimetry service in assuring the radiation protection of medical staff in developing countries.

Keywords: radiation medicine, non-destructive testing, TLD, public hospital

Procedia PDF Downloads 345
108 Cognitive Stylistics and Horror Fiction: A Case Study of Stephen King’s Misery

Authors: Kriangkrai Vathanalaoha

Abstract:

Misery generates fear and anxiety in readers through its intense plot associated with the unpredictable emotional states of the nurse, Annie Wilkes. At the same time, she mentally and physically abuses the novelist victim, Paul Sheldon. The suspense is not only at the story level, where the violent expressions are used but also at the discourse level, where the linguistic structures may intentionally cause the reader to view language as disturbing performative. This performativity could be reflected through linguistic choices where the writer triggers a new imaginative world through experiential metafunction and schema disruption. This study explores striking excerpts from the fiction through mind style and transitivity analysis to demonstrate how the horrific experience contrasts when the protagonist and the antagonist converse extensively. The results reveal that stylistic deviation can be found at the syntactic levels, where the intensity of emotions can be apparent when the protagonist is verbally abused. In addition, transitivity can flesh out how the protagonist is expressed chiefly through the internalized process, whereas the antagonist is eminent with the externalized process. The findings suggest that the application of cognitive stylistics, such as mind style and transitivity analysis, could contribute to the mental representation of horrific reality.

Keywords: horror, mind style, misery, stylistics, transitivity

Procedia PDF Downloads 110
107 Covid-19, Diagnosis with Computed Tomography and Artificial Intelligence, in a Few Simple Words

Authors: Angelis P. Barlampas

Abstract:

Target: The (SARS-CoV-2) is still a threat. AI software could be useful, categorizing the disease into different severities and indicate the extent of the lesions. Materials and methods: AI is a new revolutionary technique, which uses powered computerized systems, to do what a human being does more rapidly, more easily, as accurate and diagnostically safe as the original medical report and, in certain circumstances, even better, saving time and helping the health system to overcome problems, such as work overload and human fatigue. Results: It will be given an effort to describe to the inexperienced reader (see figures), as simple as possible, how an artificial intelligence system diagnoses computed tomography pictures. First, the computerized machine learns the physiologic motives of lung parenchyma by being feeded with normal structured images of the lung tissue. Having being used to recognizing normal structures, it can then easily indentify the pathologic ones, as their images do not fit to known normal picture motives. It is the same way as when someone spends his free time in reading magazines with quizzes, such as <> and <>. General conclusion: The AI mimics the physiological processes of the human mind, but it does that more efficiently and rapidly and provides results in a few seconds, whereas an experienced radiologist needs many days to do that, or even worse, he is unable to accomplish such a huge task.

Keywords: covid-19, artificial intelligence, automated imaging, CT, chest imaging

Procedia PDF Downloads 31
106 Nietzsche and Shakti: An Intercultural Analysis of Nietzsche's Experiment with the Eternal Feminine

Authors: Shruti Jain

Abstract:

During its independence struggle in the early 20th century, India witnessed trends of politicisation of various spiritual paths, one of them being that of Shaktism. Interestingly, Nietzsche’s teachings were being interpreted as being essentially the worship of Shakti. The present paper aims at investigating this claim and hence undertakes an intercultural archaeological excavation in the realm of the Goddess archetypes that Nietzsche’s work invokes. Ariadne is placed next to Radha, Baubo to Lajja Gauri, Medusa to Chhinnamasta, Hecate to Kali and Dhumavati and Athena to Sarawati. Indeed, the Eternal Feminine plays a vital role in Nietzsche’s writings. One might recall that Nietzsche even declared himself to be the first Psychologist of the Eternal Feminine. The present paper aims to illustrate how, the matter of the Eternal Feminine, like all other matters, is subjected to Nietzsche’s basic creative principle of transvaluation of values and new meaning making. In order to achieve this, Nietzsche applies what Heidegger calls a 'cross-wise striking-through' technique in his analysis of what can be termed as his engagement with Shaktism. Hence, not only is the mystical ascent and descent of the creative energy (Kundalini Shakti) dealt with under erasure in Thus Spake Zarathustra, but coincidentally also the Three Metamorphoses emerge as an instance of such an erasure, making the Devi invisible and yet not so invisible for an Indian reader.

Keywords: eternal feminine, Nietzsche and India, Shaktism, transvaluation of values

Procedia PDF Downloads 132
105 The Presence of Anglicisms in Italian Fashion Magazines and Fashion Blogs

Authors: Vivian Orsi

Abstract:

The present research investigates the lexicon of a fashion magazine, whose universe is very receptive to lexical loans, especially those from English, called Anglicisms. Specifically, we intend to discuss the presence of English items and expressions in the Vogue Italia fashion magazine. Besides, we aim to study the anglicisms used in an Italian fashion blog called The Blonde Salad. Within the discussion of fashion blogs and their contributions to scientific studies, we adopt the theories of Lexicology / Lexicography to define Anglicism (BIDERMAN, 2001), and the observation of its prestige in the Italian Language (ROGATO, 2008; BISETTO, 2003). According to the theoretical basis mentioned, we intend to make a brief analysis of the Anglicisms collected from posts of the first year of existence of such fashion blog, emphasizing also the keywords that have the role to encapsulate the content of the text, allowing the reader to retrieve information from the post of the blog. About the use of English in Italian magazines and blogs, we can affirm that it seems to represent sophistication, assuming the value of prerequisite to participate in the fashion centers of the world. Besides, we believe, as Barthes says (1990, p. 215), that “Fashion does not evolve, it changes: its lexicon is new each year, like that of a language which always keeps the same system but suddenly and regularly ‘changes’ the currency of its words”. Fashion is a mode of communication: it is present in man's interaction with the world, which means that such lexical universe is represented according to the particularities of each culture.

Keywords: anglicism, lexicology, magazines, blogs, fashion

Procedia PDF Downloads 301
104 Forensic Science in Dr. Jekyll and Mr. Hyde: Trails of Utterson's Quest

Authors: Kyu-Jeoung Lee, Jae-Uk Choo

Abstract:

This paper focuses on investigating The Strange Case of Dr Jekyll and Mr Hyde from Utterson’s point of view, referring to: Gabriel John Utterson, a central character in the book. Utterson is no different from a forensic investigator, as he tries to collect evidence on the mysterious Mr. Hyde’s relationship to Dr. Jekyll. From Utterson's perspective, Jekyll is the 'victim' of a potential scandal and blackmail, and Hyde is the 'suspect' of a possible 'crime'. Utterson intends to figure out Hyde's identity, connect his motive with his actions, and gather witness accounts. During Utterson’s quest, the outside materials available to him along with the social backgrounds of Hyde and Jekyll will be analyzed. The archives left from Jekyll’s chamber will also play a part providing evidence. Utterson will investigate, based on what he already knows about Jekyll his whole life, and how Jekyll had acted in his eyes until he was gone, and finding out possible explanations for Jekyll's actions. The relationship between Jekyll and Hyde becomes the major question, as the social background offers clues pointing in the direction of illegitimacy and prostitution. There is still a possibility that Jekyll and Hyde were, in fact, completely different people. Utterson received a full statement and confession from Jekyll himself at the end of the story, which gives the reader the possible truth on what happened. Stevenson’s Dr. Jekyll and Mr. Hyde led readers, as it did Utterson, to find the connection between Hyde and Jekyll using methods of history, culture, and science. Utterson's quest to uncover Hyde shows an example of applying the various fields to in his act to see if Hyde's inheritance was legal. All of this taken together could technically be considered forensic investigation.

Keywords: Dr. Jekyll and Mr. Hyde, forensic investigation, illegitimacy, prostitution, Robert Louis Stevenson

Procedia PDF Downloads 179
103 The Buddha in Sophocles’ Tragedy, King Oedipus: An Intertextual Analysis

Authors: Newton Rathnasiri Ranaweera Kalu Arachchige

Abstract:

Academics argue that Greek myths and legends have had an influence on Buddhist stories: Jataka tales, Theri Gata (Psalms of older Buddhist nuns), and even Mahavansa (a Sri Lankan historical chronicle). However, this article asserts that there is evidence in Sophocles King Oedipus to argue that the Buddha’s life story and key Buddhist concepts have influenced pre-Christian Greek philosophy and literature, especially Sophocles’ King Oedipus. When reading the text with the notion that there could be intertextual relationships or new texts are built on the existing texts and discourses, the reader may see that Sophocles’ play contains incidents that remind them of the special occasions of the Buddha’s life, his utterances and the key Buddhist concepts such as the truth of suffering, cessation of suffering, the three poisons (greed, hatred, and delusion), and finding the truth within one’s own self. The present intertextual study explored only the special occasions of the Buddha’s life to make it more focused and found that Sophocles alludes to the Buddha’s life story in his attempt to raise a moral culprit to a moral hero with higher moral values. This article, however, acknowledges that one needs to cross-check the other historical and philosophical references when claiming that Sophocles has had influence from the Buddha’s life story in King Oedipus.

Keywords: Buddhism, the Buddha’s life story, King Oedipus, Greece, tragedy, Sri Lanka

Procedia PDF Downloads 76
102 Detection and Quantification of Ochratoxin A in Food by Aptasensor

Authors: Moez Elsaadani, Noel Durand, Brice Sorli, Didier Montet

Abstract:

Governments and international instances are trying to improve the food safety system to prevent, reduce or avoid the increase of food borne diseases. This food risk is one of the major concerns for the humanity. The contamination by mycotoxins is a threat to the health and life of humans and animals. One of the most common mycotoxin contaminating feed and foodstuffs is Ochratoxin A (OTA), which is a secondary metabolite, produced by Aspergillus and Penicillium strains. OTA has a chronic toxic effect and proved to be mutagenic, nephrotoxic, teratogenic, immunosuppressive, and carcinogenic. On the other side, because of their high stability, specificity, affinity, and their easy chemical synthesis, aptamer based methods are applied to OTA biosensing as alternative to traditional analytical technique. In this work, five aptamers have been tested to confirm qualitatively and quantitatively their binding with OTA. In the same time, three different analytical methods were tested and compared based on their ability to detect and quantify the OTA. The best protocol that was established to quantify free OTA from linked OTA involved an ultrafiltration method in green coffee solution with. OTA was quantified by HPLC-FLD to calculate the binding percentage of all five aptamers. One aptamer (The most effective with 87% binding with OTA) has been selected to be our biorecognition element to study its electrical response (variation of electrical properties) in the presence of OTA in order to be able to make a pairing with a radio frequency identification (RFID). This device, which is characterized by its low cost, speed, and a simple wireless information transmission, will implement the knowledge on the mycotoxins molecular sensors (aptamers), an electronic device that will link the information, the quantification and make it available to operators.

Keywords: aptamer, aptasensor, detection, Ochratoxin A

Procedia PDF Downloads 142
101 Design and Application of NFC-Based Identity and Access Management in Cloud Services

Authors: Shin-Jer Yang, Kai-Tai Yang

Abstract:

In response to a changing world and the fast growth of the Internet, more and more enterprises are replacing web-based services with cloud-based ones. Multi-tenancy technology is becoming more important especially with Software as a Service (SaaS). This in turn leads to a greater focus on the application of Identity and Access Management (IAM). Conventional Near-Field Communication (NFC) based verification relies on a computer browser and a card reader to access an NFC tag. This type of verification does not support mobile device login and user-based access management functions. This study designs an NFC-based third-party cloud identity and access management scheme (NFC-IAM) addressing this shortcoming. Data from simulation tests analyzed with Key Performance Indicators (KPIs) suggest that the NFC-IAM not only takes less time in identity identification but also cuts time by 80% in terms of two-factor authentication and improves verification accuracy to 99.9% or better. In functional performance analyses, NFC-IAM performed better in salability and portability. The NFC-IAM App (Application Software) and back-end system to be developed and deployed in mobile device are to support IAM features and also offers users a more user-friendly experience and stronger security protection. In the future, our NFC-IAM can be employed to different environments including identification for mobile payment systems, permission management for remote equipment monitoring, among other applications.

Keywords: cloud service, multi-tenancy, NFC, IAM, mobile device

Procedia PDF Downloads 405
100 Changes of pH and Pseudomonas Aeruginosa Growth in Liquid Media

Authors: Sayaka Ono, Ryutaro Imai, Tomoko Ehara, Tetsuya Matsumoto, Hajime Matsumura

Abstract:

Background: Wound pH affects a number of important factors in wound healing. We previously measured the pH value of the exudates collected from second-degree burns and found that the increase in pH was observed in the burn wounds in which colonized by Staphylococcus spp., and the increase in pH was evident prior to the clinical findings of local infection. To investigate the relationship between the changes of pH value and bacterial growth, we performed in vitro study using Pseudomonas aeruginosa and liquid medium as a locally infected wound equivalent model. Methods: Pseudomonas aeruginosa standard strain (ATCCR 10145TM) was cultured at 37 °C environment in Luria Broth Miller medium. The absorbance rate which means the amount of bacteria was measured by a microplate reader 2300EnSpireTM). The pH was measured using pH-indicator strips (MColorpHastTM). The statistical analysis was performed using the product-moment correlation coefficient of Pearson's. Results: The absorbance rate and pH value were increased along with culture period. There was a positive correlation between pH value and absorbance rate (n = 27, Pearson's r = 0.985). Moreover, there was a positive correlation between pH value and the culture period (n = 18, Pearson's r = 0.901). The bacteria was well growth in the media from pH 6.6 to pH 8.0 and the pH of culture media converged at 8 -9 along with the bacterial growth. Conclusion: From these results, we conclude that pH value of the wound is correlated with the number of viable bacteria and bacterial growth periods.

Keywords: colonization, potential of hydrogen, Pseudomonas aeruginosa, wound

Procedia PDF Downloads 244
99 The “Prologue” in Tommy Orange’S There, There: Reinventing the Introductory Section

Authors: Kristin Murray

Abstract:

The proposed paper exams prologues in 20th and 21st century American literature in order to show how Native American writer Tommy Orange’s Prologue in his 2018 novel There, Thereis different. In an interview about his 2018 novel There, There, explains he feels “a kind of burden to catch the general reader up with what really happened, because history has got it so wrong and still continue to” (Laubernds). Orange, thus, includes a “Prologue” in his novel to do this work, catching readers upon Native Americans and their history. Prologues are usually from the narrator’s voice, a character’s voice, or even from a fictionalized version of the author, but the tone of Orange’s “Prologue” is that of a non-fictional first-person essayist. Examining prologues in American literature posits Orange’s prologue outside the norm. This paper also examines other introductory sections, the preface, in particular. The research and examination reveal that Orange is adding his personal voice in the Prologue to the multiple narratorsof the novel, and his is the voice of a writer who knows that his audience comes to his novel with a plethora of misinformation. The truths he tells are horrifying and hopeful. He tells of Thanksgiving as a “land deal” and a “successful massacre,” but he also tellsreaders how urban Indians have found a sense of the land, even through concrete. Native American writers contributed and still contribute to the genre of autobiography in ways that have changed our understanding of this genre. This examination of Orange’s Prologue reveals the new and unexpected way to view this often under-examined introductory section, the prologue.

Keywords: native american literature, prologues, prefaces, 20th century american literature

Procedia PDF Downloads 154
98 Variables for Measuring the Impact of the Social Enterprises in the Field of Community Development

Authors: A. Irudaya Veni Mary, M. Victor Louis Anthuvan, P. Christie, A. Indira

Abstract:

In India, social enterprises are working to create social value in various fields including education; health; women and child development; environment protection and community development. Although social enterprises have brought about tremendous changes in the lives of beneficiaries, the importance of their works is not understood thoroughly. One of the ways to prove themselves is to measure the impact, which in recent times has received much attention. This paper focuses on the study of social value created by the social enterprises in the field of community development. It also aims to put forth a research tool for measuring the social value created by the social enterprises in the field of community development. A close-ended interview schedule was prepared to measure the social value creation and it was administered among 60 beneficiaries of two social enterprises who work in the field of community development. The study results show that the social enterprises have brought four types of impact in the life of their beneficiaries; economic impact, social impact, political impact and cultural impact. This study is limited to the social enterprises those who work towards community development. This empirical finding will enable the reader to understand various types of social value created by the social enterprises working in the field of community development. This study will also serve as guide for social enterprises in community development activities to measure their impact and thereby improve their operation towards the betterment of the society. This paper is derived from an empirical research carried out to describe the different types of social value created by the social enterprises in India.

Keywords: social enterprise, social entrepreneurs, social impact, social value, tool for social impact measurement

Procedia PDF Downloads 246
97 Visualizing the Future of New York’s Southern Tier: Engaging Students to Help Create Sustainable Communities

Authors: William C. Dean

Abstract:

In the pedagogical sequence of the four- and five-year architectural programs at Alfred State, the fourth-year Urban Design Studio constitutes the first course where students directly explore design issues in the urban context. It is the first large-scale, community-based service learning project for most of the participating students. The students learn key lessons that include the benefits of working both individually and in groups of different sizes toward a common goal, accepting - and responding creatively too - criticism from stakeholders at different points in the project, and recognizing the role that local politics and activism can play in planning for community development. Above all, students are exposed to the importance of good planning in relation to preservation and community revitalization. The purpose of this paper is to discuss the use of community-based service-learning projects in undergraduate architectural education to promote student civic engagement as a means of helping communities visualize potential solutions for revitalizing their neighborhoods and business districts. A series of case studies will be presented in terms of challenges that were encountered, opportunities for student engagement and leadership, and the feasibility of sustainable community development resulting from those projects. The reader will be encouraged to consider how they can recognize needs within their own communities that could benefit from the assistance of architecture students and faculty.

Keywords: urban design, service-learning, civic engagement, community revitalization

Procedia PDF Downloads 60