Search results for: clarification request
308 Studying Second Language Learners' Language Behavior from Conversation Analysis Perspective
Authors: Yanyan Wang
Abstract:
This paper on second language teaching and learning uses conversation analysis (CA) approach and focuses on how second language learners of Chinese do repair when making clarification requests. In order to demonstrate their behavior in interaction, a comparison was made to study the differences between native speakers of Chinese with non-native speakers of Chinese. The significance of the research is to make second language teachers and learners aware of repair and how to seek clarification. Utilizing the methodology of CA, the research involved two sets of naturally occurring recordings, one of native speaker students and the other of non-native speaker students. Both sets of recording were telephone talks between students and teachers. There were 50 native speaker students and 50 non-native speaker students. From multiple listening to the recordings, the parts with repairs for clarification were selected for analysis which included the moments in the talk when students had problems in understanding or hearing the speaker and had to seek clarification. For example, ‘Sorry, I do not understand ‘and ‘Can you repeat the question? ‘were the parts as repair to make clarification requests. In the data, there were 43 such cases from native speaker students and 88 cases from non-native speaker students. The non-native speaker students were more likely to use repair to seek clarification. Analysis on how the students make clarification requests during their conversation was carried out by investigating how the students initiated problems and how the teachers repaired the problems. In CA term, it is called other-initiated self-repair (OISR), which refers to student-initiated teacher-repair in this research. The findings show that, in initiating repair, native speaker students pay more attention to mutual understanding (inter-subjectivity) while non-native speaker students, due to their lack of language proficiency, pay more attention to their status of knowledge (epistemic) switch. There are three major differences: 1, native Chinese students more often initiate closed-class OISR (seeking specific information in the request) such as repeating a word or phrases from the previous turn while non-native students more frequently initiate open-class OISR (not specifying clarification) such as ‘sorry, I don’t understand ‘. 2, native speakers’ clarification requests are treated by the teacher as understanding of the content while non-native learners’ clarification requests are treated by teacher as language proficiency problem. 3, native speakers don’t see repair as knowledge issue and there is no third position in the repair sequences to close repair while non-native learners take repair sequence as a time to adjust their knowledge. There is clear closing third position token such as ‘oh ‘ to close repair sequence so that the topic can go back. In conclusion, this paper uses conversation analysis approach to compare differences between native Chinese speakers and non-native Chinese learners in their ways of conducting repair when making clarification requests. The findings are useful in future Chinese language teaching and learning, especially in teaching pragmatics such as requests.Keywords: conversation analysis (CA), clarification request, second language (L2), teaching implication
Procedia PDF Downloads 256307 The Effectiveness of Video Modeling Procedures on Request an Item Behavior Children with Autism Spectrum Disorders
Authors: Melih Cattik
Abstract:
The present study investigate effectiveness of video modeling procedures on request an item behavior of children with ASD. Two male and a female children with ASD participated in the study. A multiple baseline across participant single-subject design was used to evaluate the effects of the video modeling procedures on request an item behavior. During baseline, no prompts were presented to participants. In the intervention phase, the teacher gave video model to the participant and than created opportunity for request an item to him/her. When the first participant reached to criterion, the second participant began intervention. This procedure continued till all participants completed intervention. Finally, all three participants learned to request an item behavior. Based upon findings of this study, it will make suggestions to future researches.Keywords: autism spectrum disorders, video modeling procedures, request an item behavior, single subject design
Procedia PDF Downloads 409306 Medical Aspects, Professionalism, and Bioethics of Anesthesia in Caesarean Section on Self-Request
Authors: Nasrudin Andi Mappaware, Muh. Wirawan Harahap, Erlin Syahril, Farah Ekawati Mulyadi
Abstract:
The increasing trend of cesarean sections, especially those performed on self-request without medical indications, presents complex dilemmas related to medical aspects, professionalism, and bioethics. This study aims to investigate the medical, professional, and bioethical considerations surrounding anesthesia in cesarean sections performed on self-request without medical indications. We report the case of a 27-year-old woman, G1P0A0 gravid 38 weeks, admitted to the hospital for a planned cesarean section on request for the reason that she could not tolerate pain and requested on a date that corresponded to the date and month of her mother's birth. Cesarean section on patient request fulfills the principle of autonomy, which states that patients have the right to themselves. However, this medical procedure is still considered no safer and riskier even though medical technology has developed rapidly. Furthermore, anesthesia during cesarean section at self-request without medical indications is a dilemma for anesthesiologists considering the risks and complications of anesthesia for both the fetus and the mother. The trend in increasing the number of cesarean sections is influenced by patient reasons such as not being able to tolerate pain, trust factors, and worry about damage to the birth canal.Keywords: anesthesia, bioethics, cesarean section, self-request, professionalism
Procedia PDF Downloads 52305 Content and Language Integrated Instruction: An Investigation of Oral Corrective Feedback in the Chinese Immersion Classroom
Authors: Qin Yao
Abstract:
Content and language integrated instruction provides second language learners instruction in subject matter and language, and is greatly valued, particularly in the language immersion classroom where a language other than students’ first language is the vehicle for teaching school curriculum. Corrective feedback is an essential instructional technique for teachers to integrate a focus on language into their content instruction. This study aims to fill a gap in the literature on immersion—the lack of studies examining corrective feedback in Chinese immersion classrooms, by studying learning opportunities brought by oral corrective feedback in a Chinese immersion classroom. Specifically, it examines what is the distribution of different types of teacher corrective feedback and how students respond to each feedback type, as well as how the focus of the teacher-student interactional exchanges affect the effect of feedback. Two Chinese immersion teachers and their immersion classes were involved, and data were collected through classroom observations interviews. Observations document teachers’ provision of oral corrective feedback and students’ responses following the feedback in class, and interviews with teachers collected teachers’ reflective thoughts about their teaching. A primary quantitative and qualitative analysis of the data revealed that, among different types of corrective feedback, recast occurred most frequently. Metalinguistic clue and repetition were the least occurring feedback types. Clarification request lead to highest percentage of learner uptake manifested by learners’ oral production immediately following the feedback, while explicit correction came the second and recast the third. In addition, the results also showed the interactional context played a role in the effectiveness of the feedback: teachers were most likely to give feedback in conversational exchanges that focused on explicit language and content, while students were most likely to use feedback in exchanges that focused on explicit language. In conclusion, the results of this study indicate recasts are preferred by Chinese immersion teachers, confirming results of previous studies on corrective feedback in non-Chinese immersion classrooms; and clarification request and explicit language instruction elicit more target language production from students and are facilitative in their target language development, thus should not be overlooked in immersion and other content and language integrated classrooms.Keywords: Chinese immersion, content and language integrated instruction, corrective feedback, interaction
Procedia PDF Downloads 411304 Gender Difference in the Use of Request Strategies by Urdu/Punjabi Native Speakers
Authors: Muzaffar Hussain
Abstract:
Requests strategies are considered as a part of the speech acts, which are frequently used in everyday communication. Each language provides speech acts to the speakers; therefore, the selection of appropriate form seems more culture-specific rather than language. The present paper investigates the gender-based difference in the use of request strategies by native speakers of Urdu/Punjabi male and female who are learning English as a second language. The data for the present study were collected from 68 graduate students, who are learning English as an L2 in Pakistan. They were given an online close-ended questionnaire, based on Discourse Completion Test (DCT). After analyzing the data, it was found that the L1 male Urdu/Punjabi speakers were inclined to use more direct request strategies while the female Urdu/Punjabi speakers used indirect request strategies. This paper also found that in some situations female participants used more direct strategies than male participants. The present study concludes that the use of request strategies is influenced by culture, social status, and power distribution in a society.Keywords: gender variation, request strategies, face-threatening, second language pragmatics, language competence
Procedia PDF Downloads 189303 Research on Load Balancing Technology for Web Service Mobile Host
Authors: Yao Lu, Xiuguo Zhang, Zhiying Cao
Abstract:
In this paper, Load Balancing idea is used in the Web service mobile host. The main idea of Load Balancing is to establish a one-to-many mapping mechanism: An entrance-mapping request to plurality of processing node in order to realize the dividing and assignment processing. Because the mobile host is a resource constrained environment, there are some Web services which cannot be completed on the mobile host. When the mobile host resource is not enough to complete the request, Load Balancing scheduler will divide the request into a plurality of sub-requests and transfer them to different auxiliary mobile hosts. Auxiliary mobile host executes sub-requests, and then, the results will be returned to the mobile host. Service request integrator receives results of sub-requests from the auxiliary mobile host, and integrates the sub-requests. In the end, the complete request is returned to the client. Experimental results show that this technology adopted in this paper can complete requests and have a higher efficiency.Keywords: Dinic, load balancing, mobile host, web service
Procedia PDF Downloads 328302 Maternal Request: A Minor but Important Contributor to the Rising Rates of Caesarean Section: A Retrospective Observational Study
Authors: Katherine Russell
Abstract:
Background: Over recent decades the number of caesarean sections performed in the UK has continued to rise. The cause of the rising caesarean rate (CSR) is not well understood. However, one of the most heavily cited reasons is an increase in maternal request for caesarean section. Maternal request for caesarean section (CDMR) refers to a caesarean section performed on maternal request with no medical indication. The true rate of caesarean delivery on maternal request in the UK and its contribution to the caesarean section rate is not known. Methods: To elucidate current understanding of the cause of the rising caesarean section rate and the role of CDMR we conducted a systematic review of the literature. To determine the role of CDMR in the CSR at the PRH we conducted a retrospective observational study of the caesarean section rates and CDMR from 2009-2015. Results: We demonstrated a negative correlation between rates of elective sections and CDMR over the study period (-0.123). On average, there were more elective sections performed after 2011 (15.10% of all deliveries) than before 2011 (12.41% of all deliveries); this difference was statistically significant (p = < 0.001). There were more cases of CDMR after 2011 (1.39% of all deliveries) than before 2011 (0.85% of all deliveries). The difference in average rates of CDMR before and after 2011 was statistically significant (p ≤ 0.001). Conclusions: CDMR is only a minor contributor to the CSR at the PRH. However, it remains an important factor because it represents a target for the reduction of the CSR that is more manageable than other, more complex and ubiquitous causes of the rising CSR.Keywords: cesarean section, maternal request for cesarean section, obstetrics, pre-natal health
Procedia PDF Downloads 99301 The Study on Energy Saving in Clarification Process for Water Treatment Plant
Authors: Wiwat Onnakklum
Abstract:
Clarification is the turbidity removal process of water treatment plant. This paper was to study the factors affecting on energy consumption in order to control energy saving strategy. The factors studied were raw water turbidity in the range of 26-40 NTU and production rate in the range of 3.76-5.20 m³/sec. Clarifiers were sludge blanket and sludge recirculation clarifier. Experimental results found that the raw water turbidity was not affected significantly by energy consumption, while the production rate was affected significantly by energy consumption. Sludge blanket clarifier provided lower energy consumption than sludge recirculation clarifier about 32-37%. Subsequently, the operating pattern in production rate can be arranged to decreased energy consumption. The results showed that it can be reduced about 5.09 % of energy saving of clarification process about 754,655 Baht per year.Keywords: sludge blanket clarifier, sludge recirculation clarifier, water treatment plant, energy
Procedia PDF Downloads 325300 The Speech Act Responses of Students on the Teacher’s Request in the EFL Classroom
Authors: Agis Andriani
Abstract:
To create an effective teaching condition, the teacher requests the students as the instruction to guide the them interactively in the learning activities in the classroom. This study involves 160 Indonesian students who study English in the university, as participants in the discourse completion test, and ten of them are interviewed. The result shows that when the students response the teacher’s request, it realizes assertives, directives, commisives, expressives, and declaratives. These indicate that the students are active, motivated, and responsive in the learning process, although in the certain condition these responses are to prevent their faces from the shyness of their silence in interaction. Therefore, it needs the teacher’s creativity to give the conducive atmosphere in order to support the students’ participation in learning English.Keywords: discourse completion test, effective teaching, request, teacher’s creativity
Procedia PDF Downloads 437299 Investigating Kinetics and Mathematical Modeling of Batch Clarification Process for Non-Centrifugal Sugar Production
Authors: Divya Vats, Sanjay Mahajani
Abstract:
The clarification of sugarcane juice plays a pivotal role in the production of non-centrifugal sugar (NCS), profoundly influencing the quality of the final NCS product. In this study, we have investigated the kinetics and mathematical modeling of the batch clarification process. The turbidity of the clarified cane juice (NTU) emerges as the determinant of the end product’s color. Moreover, this parameter underscores the significance of considering other variables as performance indicators for accessing the efficacy of the clarification process. Temperature-controlled experiments were meticulously conducted in a laboratory-scale batch mode. The primary objective was to discern the essential and optimized parameters crucial for augmenting the clarity of cane juice. Additionally, we explored the impact of pH and flocculant loading on the kinetics. Particle Image Velocimetry (PIV) is employed to comprehend the particle-particle and fluid-particle interaction. This technique facilitated a comprehensive understanding, paving the way for the subsequent multiphase computational fluid dynamics (CFD) simulations using the Eulerian-Lagrangian approach in the Ansys fluent. Impressively, these simulations accurately replicated comparable velocity profiles. The final mechanism of this study helps to make a mathematical model and presents a valuable framework for transitioning from the traditional batch process to a continuous process. The ultimate aim is to attain heightened productivity and unwavering consistency in product quality.Keywords: non-centrifugal sugar, particle image velocimetry, computational fluid dynamics, mathematical modeling, turbidity
Procedia PDF Downloads 71298 Evaluation of Pragmatic Information in an English Textbook: Focus on Requests
Authors: Israa A. Qari
Abstract:
Learning to request in a foreign language is a key ability within pragmatics language teaching. This paper examines how requests are taught in English Unlimited Book 3 (Cambridge University Press), an EFL textbook series employed by King Abdulaziz University in Jeddah, Saudi Arabia to teach advanced foundation year students English. The focus of analysis is the evaluation of the request linguistic strategies present in the textbook, frequency of the use of these strategies, and the contextual information provided on the use of these linguistic forms. The researcher collected all the linguistic forms which consisted of the request speech act and divided them into levels employing the CCSARP request coding manual. Findings demonstrated that simple and commonly employed request strategies are introduced. Looking closely at the exercises throughout the chapters, it was noticeable that the book exclusively employed the most direct form of requesting (the imperative) when giving learners instructions: e.g. listen, write, ask, answer, read, look, complete, choose, talk, think, etc. The book also made use of some other request strategies such as ‘hedged performatives’ and ‘query preparatory’. However, it was also found that many strategies were not dealt with in the book, specifically strategies with combined functions (e.g. possibility, ability). On a sociopragmatic level, a strong focus was found to exist on standard situations in which relations between the requester and requestee are clear. In general, contextual information was communicated implicitly only. The textbook did not seem to differentiate between formal and informal request contexts (register) which might consequently impel students to overgeneralize. The paper closes with some recommendations for textbook and curriculum designers. Findings are also contrasted with previous results from similar body of research on EFL requests.Keywords: EFL, requests, saudi, speech acts, textbook evaluation
Procedia PDF Downloads 134297 Prospection of Technology Production in Physiotherapy in Brazil
Authors: C. M. Priesnitz, G. Zanandrea, J. P. Fabris, S. L. Russo, M. E. Camargo
Abstract:
This study aimed to the prospection the physiotherapy area technological production registered with the National Intellectual Property Institute (INPI) in Brazil, for understand the evolution of the technological production in the country over time and visualize the distribution this production request in Brazil. There was an evolution in the technology landscape, where the average annual deposits had an increase of 102%, from 3.14 before the year 2004 to 6,33 after this date. It was found differences in the distribution of the number the deposits requested to each Brazilian region, being that of the 132 request, 68,9% were from the southeast region. The international patent classification evaluated the request deposits, and the more found numbers were A61H and A63B. So even with an improved panorama of technology production, this should still have incentives since it is an important tool for the development of the country.Keywords: distribution, evolution, patent, physiotherapy, technological prospecting
Procedia PDF Downloads 329296 The Clarification of Palm Oil Wastewater Treatment by Coagulant Composite from Palm Oil Ash
Authors: Rewadee Anuwattana, Narumol Soparatana, Pattamaphorn Phuangngamphan, Worapong Pattayawan, Atiporn Jinprayoon, Saroj Klangkongsap, Supinya Sutthima
Abstract:
In this work focus on clarification in palm oil wastewater treatment by using coagulant composite from palm oil ash. The design of this study was carried out by two steps; first, synthesis of new coagulant composite from palm oil ash which was fused by using Al source combined with Fe source and form to the crystal by the hydrothermal crystallization process. The characterization of coagulant composite from palm oil ash was analyzed by advanced instruments, and The pattern was analyzed by X-ray Diffraction (XRD), chemical composition by X-Ray Fluorescence (XRFS) and morphology characterized by SEM. The second step, the clarification wastewater treatment efficiency of synthetic coagulant composite, was evaluated by coagulation/flocculation process based on the COD, turbidity, phosphate and color removal of wastewater from palm oil factory by varying the coagulant dosage (1-8 %w/v) with no adjusted pH and commercial coagulants (Alum, Ferric Chloride and poly aluminum chloride) which adjusted the pH (6). The results found that the maximum removal of 6% w/v of synthetic coagulant from palm oil ash can remove COD, turbidity, phosphate and color was 88.44%, 93.32%, 93.32% and 93.32%, respectively. The experiments were compared using 6% w/v of commercial coagulants (Alum, Ferric Chloride and Polyaluminum Chloride) can remove COD of 74.29%, 71.43% and 57.14%, respectively.Keywords: coagulation, coagulant, wastewater treatment, waste utilization, palm oil ash
Procedia PDF Downloads 191295 Prioritized Processor-Sharing with a Maximum Permissible Sojourn Time
Authors: Yoshiaki Shikata
Abstract:
A prioritized processor-sharing (PS) system with a maximum permissible sojourn time (MPST) is proposed. In this PS system, a higher-priority request is allocated a larger service ratio than a lower-priority request. Moreover, each request receiving service is guaranteed the maximum permissible sojourn time determined by each priority class, regardless of its service time. Arriving requests that cannot receive service due to this guarantee are rejected. We further propose a guarantee method for implementing such a system, and discuss performance evaluation procedures for the resulting system. Practical performance measures, such as the relationships between the loss probability or mean sojourn time of each class request and the maximum permissible sojourn time are evaluated via simulation. At the arrival of each class request, its acceptance or rejection is judged using extended sojourn times of all requests receiving service in the server. As the MPST increases, the mean sojourn time increases almost linearly. However, the logarithm of the loss probability decreases almost linearly. Moreover with an MPST, the difference in the mean sojourn time for different MPSTs increases with the traffic rate. Conversely, the difference in the loss probability for different MPSTs decreases as the traffic rate increases.Keywords: prioritized processor sharing, priority ratio, permissible sojourn time, loss probability, mean sojourn time, simulation
Procedia PDF Downloads 192294 AIPM:An Integrator and Pull Request Matching Model in Github
Authors: Zhifang Liao, Yanbing Li, Li Xu, Yan Zhang, Xiaoping Fan, Jinsong Wu
Abstract:
Pull Request (PR) is the primary method for code contributions from the external contributors in Github. PR review is an essential part of open source software developments for maintaining the quality of software. Matching a new PR of an appropriate integrator will make the PR review more effective. However, PR and integrator matching are now organized manually in Github. To reduce this cost, we presented an AIPM model to predict highly relevant integrator of incoming PRs. AIPM uses topic model to extract topics from the PRs, and builds a one-to-one correspondence between topics and integrators. Then, AIPM finds the most suitable integrator according to the maximum entry of the topic-document distribution. On average, AIPM can reach a precision of 60%, and even in some projects, can reach a precision of 80%.Keywords: pull Request, integrator matching, Github, open source project, topic model
Procedia PDF Downloads 299293 HD-WSComp: Hypergraph Decomposition for Web Services Composition Based on QoS
Authors: Samah Benmerbi, Kamal Amroun, Abdelkamel Tari
Abstract:
The increasing number of Web service (WS)providers throughout the globe, have produced numerous Web services providing the same or similar functionality. Therefore, there is a need of tools developing the best answer of queries by selecting and composing services with total transparency. This paper reviews various QoS based Web service selection mechanisms and architectures which facilitate qualitatively optimal selection, in other fact Web service composition is required when a request cannot be fulfilled by a single web service. In such cases, it is preferable to integrate existing web services to satisfy user’s request. We introduce an automatic Web service composition method based on hypergraph decomposition using hypertree decomposition method. The problem of selection and the composition of the web services is transformed into a resolution in a hypertree by exploring the relations of dependency between web services to get composite web service via employing an execution order of WS satisfying global request.Keywords: web service, web service selection, web service composition, QoS, hypergraph decomposition, BE hypergraph decomposition, hypertree resolution
Procedia PDF Downloads 509292 A Discourse Completion Test Analysis of Email Request Strategies as Used by Tunisian Postgraduate Students
Authors: Imen Aribi Ben Amor
Abstract:
The aim of the present study is to analyze the performance of requests in emails among a group of Tunisian postgraduate students. It also seeks to determine the influence of the social factors on the participants’ requests performance. For this purpose, the data were collected using a discourse completion test (DCT). Accordingly, 42 Tunisian postgraduate students were asked to respond in English to eight different situations in which they carried out the speech act of request in emails. The data were analyzed based on the degree of directness. A detailed analysis of the head acts found in the DCT revealed that Tunisian Postgraduate students use a varied repertoire of request strategies (direct, conventionally indirect and non-conventionally indirect) but at the same time rely heavily on direct request strategies. They tended to address their requestees directly except for distant superiors. DCT results suggest that the participants are to some extent aware of the influence of the ranking of imposition and social distance but fail to acknowledge the weight of social power when performing requests in emails. The preference of the participants to use direct strategies may be the result of the effect of Tunisian culture and the negative transfer of Tunisian communicative strategies. Accordingly, this study suggests some pedagogical implications and suggestions for Tunisian EFL (English as a Foreign Language) instructors. They are required to pay closer attention to the pragmalinguistic nuances of the ways in which requests in emails are realized. Teachers can also help students understand academic email etiquettes by explicitly explaining what they expect in the student email. Thus, EFL teachers and syllabus designers should devote more attention to developing EFL learners’ pragmatic competence through teaching L2 pragmatics.Keywords: directness, ranking of imposition, request strategies, social distance, social power
Procedia PDF Downloads 231291 Magnetite Nanoparticles Immobilized Pectinase: Preparation, Characterization and Application for the Fruit Juices Clarification
Authors: Leila Mosafa, Majid Moghadam, Mohammad Shahedi
Abstract:
In this work, pectinase was immobilized on the surface of silica-coated magnetite nanoparticles via covalent attachment. The magnetite-immobilized enzyme was characterized by Fourier transform infrared spectroscopy, X-ray powder diffraction, scanning electron microscopy and vibrating sample magnetometry techniques. Response surface methodology using Minitab Software was applied for statistical designing of operating conditions in order to immobilize pectinase on magnetic nanoparticles. The optimal conditions were obtained at 30°C and pH 5.5 with 42.97 µl pectinase for 2 h. The immobilization yield was 50.6% at optimized conditions. Compared to the free pectinase, the immobilized pectinase was found to exhibit enhanced enzyme activity, better tolerance to the variation of pH and temperature, and improved storage stability. Both free and immobilized samples reduced the viscosity of apple juice from 1.12 to 0.88 and 0.92 mm2s-1, respectively, after 30 min at their optimum temperature. Furthermore, the immobilized enzyme could be reused six consecutive cycles and the efficiency loss in viscosity reduction was found to be only 8.16%.Keywords: magnetite nanoparticles, pectinase enzyme, immobilization, juice clarification, enzyme activity
Procedia PDF Downloads 407290 CSRFDtool: Automated Detection and Prevention of a Reflected Cross-Site Request Forgery
Authors: Alaa A. Almarzuki, Nora A. Farraj, Aisha M. Alshiky, Omar A. Batarfi
Abstract:
The number of internet users is dramatically increased every year. Most of these users are exposed to the dangers of attackers in one way or another. The reason for this lies in the presence of many weaknesses that are not known for native users. In addition, the lack of user awareness is considered as the main reason for falling into the attackers’ snares. Cross Site Request Forgery (CSRF) has placed in the list of the most dangerous threats to security in OWASP Top Ten for 2013. CSRF is an attack that forces the user’s browser to send or perform unwanted request or action without user awareness by exploiting a valid session between the browser and the server. When CSRF attack successes, it leads to many bad consequences. An attacker may reach private and personal information and modify it. This paper aims to detect and prevent a specific type of CSRF, called reflected CSRF. In a reflected CSRF, a malicious code could be injected by the attackers. This paper explores how CSRF Detection Extension prevents the reflected CSRF by checking browser specific information. Our evaluation shows that the proposed solution succeeds in preventing this type of attack.Keywords: CSRF, CSRF detection extension, attackers, attacks
Procedia PDF Downloads 414289 Polite Request Strategies in Commuter Discourse in Xhosa
Authors: Mawande Dlali
Abstract:
This paper examines the request strategies in commuter discourse involving taxi drivers and passengers in Khayelitsha as well as the responses to these requests. The present study considers requests in commuter transport as face threatening acts (FTAs), hence the need for the commuter crew to strategically shape their communicative actions to achieve their overall discourse goal of getting passengers to perform actions that are in their own interest with minimum resistance or confrontation. The crew presents itself by using communicative devices that prompt the passengers to evaluate it positively as warm, friendly, and respectful. However, the passengers' responses to requests range from compliance to resistance depending on their interpretation of the speaker’s motive and the probable social consequences. Participant observation by the researcher was the main method of collecting examples of requests and responses to the requests. Unstructured interviews and informal discussions were made with randomly selected taxi drivers and commuters. The findings and explanations presented in this article revealed the predominance of polite requests as speech acts in taxi discourse in Khayelitsha. This research makes a contribution to the contemporary pragmatics study of African languages in urban context.Keywords: face threatening acts, speech acts, request strategies, discourse
Procedia PDF Downloads 164288 Performance Evaluation of a Prioritized, Limited Multi-Server Processor-Sharing System that Includes Servers with Various Capacities
Authors: Yoshiaki Shikata, Nobutane Hanayama
Abstract:
We present a prioritized, limited multi-server processor sharing (PS) system where each server has various capacities, and N (≥2) priority classes are allowed in each PS server. In each prioritized, limited server, different service ratio is assigned to each class request, and the number of requests to be processed is limited to less than a certain number. Routing strategies of such prioritized, limited multi-server PS systems that take into account the capacity of each server are also presented, and a performance evaluation procedure for these strategies is discussed. Practical performance measures of these strategies, such as loss probability, mean waiting time, and mean sojourn time, are evaluated via simulation. In the PS server, at the arrival (or departure) of a request, the extension (shortening) of the remaining sojourn time of each request receiving service can be calculated by using the number of requests of each class and the priority ratio. Utilising a simulation program which executes these events and calculations, the performance of the proposed prioritized, limited multi-server PS rule can be analyzed. From the evaluation results, most suitable routing strategy for the loss or waiting system is clarified.Keywords: processor sharing, multi-server, various capacity, N-priority classes, routing strategy, loss probability, mean sojourn time, mean waiting time, simulation
Procedia PDF Downloads 331287 Pattern of Prostate Specific Antigen Request in a Tertiary Health Institution S’ Tumor Marker Laboratory in Nigeria: A Two Year Review
Authors: Ademola Azeez
Abstract:
Background: This study is a two year review of requests pattern for Prostate Specific Antigen (PSA), in a Nigerian tertiary health care institution. Prostate specific antigen was first described about 44 years ago but is still in use today for, diagnosis, monitoring, screening and prognosis of prostatic carcinoma though not-very specific as was widely believed. Prostate cancer is an increasingly important public health problem among adult men worldwide. Nigeria, which was formerly regarded as a low-incidence area by several authors is now witnessing a steep rise in the occurrence of this disease. This has been suggested to be due to increasing availability of screening tests and diagnostic facilities and not necessarily because of increased incidence of the diseases. Many notable Nigerians have died due to this dreaded disease. Methods: All plasma samples for PSA from January 2021-December 2022 were analyzed weekly by abbot autoanalyser, chemiluminescence assay method. Bio-data from request form were collated and analyzed. A total of 385 requests were received for the period under review. Result: There was an increase of request from inception to the last year of review. Smoked food, consumption of local herb and alcohol in order of importance, respectively, appears to be prominent factor in patient requested for PSA. The mean age was 67.years; the youngest was 29, while the oldest was 93years. Age 70 has the highest frequency of 8.5% .Mean PSA was 12.9ng/ml. There was a positive correlation between age and PSA (R=0.255, P < 0.05).Significant increase in PSA with age were reported. Men who retired from active jobs constitute the highest request for PSA test. Conclusion: There was an increasing trend in the proportion of requests with values outside the reference interval especially in patients diagnosed of benign prostatic hyperplasia, prostate cancer, while some routine test for PSA were elevated for the first time .This is in line with earlier report of increasing incidence of prostate cancer in Nigeria despite the increasing knowledge of healthy lifestyle.Keywords: pattern, PSA, tertiary institution, Nigeria
Procedia PDF Downloads 28286 IoT Based Smart Car Parking System Using Node Red
Authors: Armel Asongu Nkembi, Ahmad Fawad
Abstract:
In this paper, we design a smart car parking system using the Node-Red interface, which enables the user to find the nearest parking area from his current location and gives the availability of parking slots in that respective parking area. The closest parking area is determined by sending an HTTP request to an API, and the shortest distance is computed using some mathematical formulations based on the coordinates retrieved. There is also the use of IR sensors to signal the availability or lack of available parking lots within any parking area. The aim is to reduce the time and effort needed to find empty parking lots and also avoid unnecessary traveling through filled parking lots in a parking area. Thus, it reduces fuel consumption, which in turn reduces carbon footprints in the atmosphere and, overall, makes the city much smarter.Keywords: node-red, smart parking system, API, http request, IR sensors, Internet of Things, smart city, parking lots.
Procedia PDF Downloads 41285 Capacity Estimation of Hybrid Automated Repeat Request Protocol for Low Earth Orbit Mega-Constellations
Authors: Arif Armagan Gozutok, Alper Kule, Burak Tos, Selman Demirel
Abstract:
Wireless communication chain requires effective ways to keep throughput efficiency high while it suffers location-dependent, time-varying burst errors. Several techniques are developed in order to assure that the receiver recovers the transmitted information without errors. The most fundamental approaches are error checking and correction besides re-transmission of the non-acknowledged packets. In this paper, stop & wait (SAW) and chase combined (CC) hybrid automated repeat request (HARQ) protocols are compared and analyzed in terms of throughput and average delay for the usage of low earth orbit (LEO) mega-constellations case. Several assumptions and technological implementations are considered as well as usage of low-density parity check (LDPC) codes together with several constellation orbit configurations.Keywords: HARQ, LEO, satellite constellation, throughput
Procedia PDF Downloads 145284 Message Authentication Scheme for Vehicular Ad-Hoc Networks under Sparse RSUs Environment
Authors: Wen Shyong Hsieh, Chih Hsueh Lin
Abstract:
In this paper, we combine the concepts of chameleon hash function (CHF) and identification based cryptography (IBC) to build a message authentication environment for VANET under sparse RSUs. Based on the CHF, TA keeps two common secrets that will be embedded to all identities to be as the evidence of mutual trusting. TA will issue one original identity to every RSU and vehicle. An identity contains one public ID and one private key. The public ID, includes three components: pseudonym, random key, and public key, is used to present one entity and can be verified to be a legal one. The private key is used to claim the ownership of the public ID. Based on the concept of IBC, without any negotiating process, a CHF pairing key multiplied by one private key and other’s public key will be used for mutually trusting and to be utilized as the session key of secure communicating between RSUs and vehicles. To help the vehicles to do message authenticating, the RSUs are assigned to response the vehicle’s temple identity request using two short time secretes that are broadcasted by TA. To light the loading of request information, one day is divided into M time slots. At every time slot, TA will broadcast two short time secretes to all valid RSUs for that time slot. Any RSU can response the temple identity request from legal vehicles. With the collected announcement of public IDs from the neighbor vehicles, a vehicle can set up its neighboring set, which includes the information about the neighbor vehicle’s temple public ID and temple CHF pairing key that can be derived by the private key and neighbor’s public key and will be used to do message authenticating or secure communicating without the help of RSU.Keywords: Internet of Vehicles (IOV), Vehicular Ad-hoc Networks (VANETs), Chameleon Hash Function (CHF), message authentication
Procedia PDF Downloads 391283 Jelly and Beans: Appropriate Use of Ultrasound in Acute Kidney Injury
Authors: Raja Ezman Raja Shariff
Abstract:
Acute kidney injury (AKI) is commonly seen in inpatients, and places a great cost on the NHS and patients. Timely and appropriate management is both nephron sparing and potentially life-saving. Ultrasound scanning (USS) is a well-recognised method for stratifying patients. Subsequently, the NICE AKI guidance has defined groups in whom scanning is recommended within 6 hours of request (pyonephrosis), within 24 hours (obstruction/cause unknown), and in whom routine scanning isn't recommended (cause for AKI identified). The audit looks into whether Stockport NHS Trust USS practice was in line with such recommendations. The audit evaluated 92 patients with AKI who had USS, between 01/01/14 to 30/04/14. Data collection was divided into 2 parts. Firstly, radiology request cards and the online imaging software (PACS) were evaluated. Then, the electronic case notes (ADVANTIS) was evaluated further. Based on request cards, 10% of requests were for pyonephrosis. Only 33% were scanned within 6hours and a further 33% within 24hours. 75% were requested for possible obstructions and unknown cause collectively. Of those due to possible obstruction, 71% of patients were scanned within 24 hours. Of those with unknown cause, 50% were scanned within 24 hours. 15% of requests had a cause declared and so potentially did not require scanning. Evaluation of the patients’ notes suggested further interesting findings. Firstly, potentially 39% of patients had a known cause for AKI, therefore, did not need USS. Subsequently, the cohort of unknown cause and possible obstruction was collectively reduced to 45%. Alarmingly the patient cohort with possible pyonephrosis went up to 16%, suggesting an under-recognition of this life-threatening condition. We plan to highlight these findings within our institution and make changes to encourage more appropriate requesting and timely scanning. Time will tell if we manage to save or increase our costs in this cost-conscious NHS. Patient benefits, though, seem to be guaranteed.Keywords: AKI, ARF, kidney, renal
Procedia PDF Downloads 399282 Dynamic Self-Scheduling of Pumped-Storage Power Plant in Energy and Ancillary Service Markets Using Sliding Window Technique
Authors: P. Kanakasabapathy, S. Radhika
Abstract:
In the competitive electricity market environment, the profit of the pumped-storage plant in the energy market can be maximized by operating it as a generator, when market clearing price is high and as a pump, to pump water from lower reservoir to upper reservoir, when the price is low. An optimal self-scheduling plan has been developed for a pumped-storage plant, carried out on weekly basis in order to maximize the profit of the plant, keeping into account of all the major uncertainties such as the sudden ancillary service delivery request and the price forecasting errors. For a pumped storage power plant to operate in a real time market successive self-scheduling has to be done by considering the forecast of the day-ahead market and the modified reservoir storage due to the ancillary service request of the previous day. Sliding Window Technique has been used for successive self-scheduling to ensure profit for the plant.Keywords: ancillary services, BPSO, power system economics, self-scheduling, sliding window technique
Procedia PDF Downloads 401281 A Study on the Treatment of Municipal Waste Water Using Sequencing Batch Reactor
Authors: Bhaven N. Tandel, Athira Rajeev
Abstract:
Sequencing batch reactor process is a suspended growth process operating under non-steady state conditions which utilizes a fill and draw reactor with complete mixing during the batch reaction step (after filling) and where the subsequent steps of aeration and clarification occur in the same tank. All sequencing batch reactor systems have five steps in common, which are carried out in sequence as follows, (1) fill (2) react (3) settle (sedimentation/clarification) (4) draw (decant) and (5) idle. The study was carried out in a sequencing batch reactor of dimensions 44cmx30cmx70cm with a working volume of 40 L. Mechanical stirrer of 100 rpm was used to provide continuous mixing in the react period and oxygen was supplied by fish tank aerators. The duration of a complete cycle of sequencing batch reactor was 8 hours. The cycle period was divided into different phases in sequence as follows-0.25 hours fill phase, 6 hours react period, 1 hour settling phase, 0.5 hours decant period and 0.25 hours idle phase. The study consisted of two runs, run 1 and run 2. Run 1 consisted of 6 hours aerobic react period and run 2 consisted of 3 hours aerobic react period followed by 3 hours anoxic react period. The influent wastewater used for the study had COD, BOD, NH3-N and TKN concentrations of 308.03±48.94 mg/L, 100.36±22.05 mg/L, 14.12±1.18 mg/L, and 24.72±2.21 mg/L respectively. Run 1 had an average COD removal efficiency of 41.28%, BOD removal efficiency of 56.25%, NH3-N removal efficiency of 86.19% and TKN removal efficiency of 54.4%. Run 2 had an average COD removal efficiency of 63.19%, BOD removal efficiency of 73.85%, NH3-N removal efficiency of 90.74% and TKN removal efficiency of 65.25%. It was observed that run 2 gave better performance than run 1 in the removal of COD, BOD and TKN.Keywords: municipal waste water, aerobic, anoxic, sequencing batch reactor
Procedia PDF Downloads 550280 3D Remote Sensing Images Parallax Refining Based On HTML5
Authors: Qian Pei, Hengjian Tong, Weitao Chen, Hai Wang, Yanrong Feng
Abstract:
Horizontal parallax is the foundation of stereoscopic viewing. However, the human eye will feel uncomfortable and it will occur diplopia if horizontal parallax is larger than eye separation. Therefore, we need to do parallax refining before conducting stereoscopic observation. Although some scholars have been devoted to online remote sensing refining, the main work of image refining is completed on the server side. There will be a significant delay when multiple users access the server at the same time. The emergence of HTML5 technology in recent years makes it possible to develop rich browser web application. Authors complete the image parallax refining on the browser side based on HTML5, while server side only need to transfer image data and parallax file to browser side according to the browser’s request. In this way, we can greatly reduce the server CPU load and allow a large number of users to access server in parallel and respond the user’s request quickly.Keywords: 3D remote sensing images, parallax, online refining, rich browser web application, HTML5
Procedia PDF Downloads 461279 Vulnerable Paths Assessment for Distributed Denial of Service Attacks in a Cloud Computing Environment
Authors: Manas Tripathi, Arunabha Mukhopadhyay
Abstract:
In Cloud computing environment, cloud servers, sometimes may crash after receiving huge amount of request and cloud services may stop which can create huge loss to users of that cloud services. This situation is called Denial of Service (DoS) attack. In Distributed Denial of Service (DDoS) attack, an attacker targets multiple network paths by compromising various vulnerable systems (zombies) and floods the victim with huge amount of request through these zombies. There are many solutions to mitigate this challenge but most of the methods allows the attack traffic to arrive at Cloud Service Provider (CSP) and then only takes actions against mitigation. Here in this paper we are rather focusing on preventive mechanism to deal with these attacks. We analyze network topology and find most vulnerable paths beforehand without waiting for the traffic to arrive at CSP. We have used Dijkstra's and Yen’s algorithm. Finally, risk assessment of these paths can be done by multiplying the probabilities of attack for these paths with the potential loss.Keywords: cloud computing, DDoS, Dijkstra, Yen’s k-shortest path, network security
Procedia PDF Downloads 278