Search results for: cultural code
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 5040

Search results for: cultural code

4860 Cross-Country Differences in Homeownership: A Cultural Phenomenon?

Authors: Stefanie J. Huber, Tobias Schmidt

Abstract:

Cross-country differences in homeownership rates are large and very persistent over time, ranging between 35% in Switzerland to 80% in Spain. In this project, we test the hypothesis that these cross-country differences are driven by cultural tastes. To isolate the effect of culture from the effects of institutions and economic factors, we investigate the homeownership attitudes of second-generation immigrants in the United States. We find robust evidence that cross-country differences in cultural preferences are an important explanatory factor for the observed persistent differences in homeownership rates across countries.

Keywords: housing markets, homeownership rates, country heterogeneity, preferences, cultural transmission, migration

Procedia PDF Downloads 245
4859 On the Difference between Cultural and Religious Identities

Authors: Mputu Ngandu Simon

Abstract:

Culture and religion are two of the most significant markers of an individual or group's identity. Religion finds its expression in a given culture, and culture is the costume in which a religion is dressed. In other words, there is a crucial relationship between religion and culture which should not be ignored. On the one hand, religion influences the way in which a culture is consumed. A person's consumption of a certain cultural practice is influenced by his/her religious identity. On the other hand, cultural identity plays an important role in how a religion is practiced by its adherents. Some cultural practices become more credible when interpreted in religious terms just as religious doctrines and dogmas need cultural interpretation to be understood by a given people in a given context. This relationship goes so deep that sometimes the boundaries between culture and religion become blurred, and people end up mixing religion and culture. In some cases, the two are considered to be one and the same thing. However, despite this apparent sameness, religion and culture are two distinct aspects of identity, and they should always be considered as such. One results from knowledge, while the other has beliefs as its foundation. This essay explores the difference between cultural and religious identity by drawing from existing literature on this topic as a whole before applying that knowledge to two specific case studies: Christianity and Islam in some African and Asian countries.

Keywords: culture, religion, identity, knowledge, belief

Procedia PDF Downloads 144
4858 Software Defect Analysis- Eclipse Dataset

Authors: Amrane Meriem, Oukid Salyha

Abstract:

The presence of defects or bugs in software can lead to costly setbacks, operational inefficiencies, and compromised user experiences. The integration of Machine Learning(ML) techniques has emerged to predict and preemptively address software defects. ML represents a proactive strategy aimed at identifying potential anomalies, errors, or vulnerabilities within code before they manifest as operational issues. By analyzing historical data, such as code changes, feature im- plementations, and defect occurrences. This en- ables development teams to anticipate and mitigate these issues, thus enhancing software quality, reducing maintenance costs, and ensuring smoother user interactions. In this work, we used a recommendation system to improve the performance of ML models in terms of predicting the code severity and effort estimation.

Keywords: software engineering, machine learning, bugs detection, effort estimation

Procedia PDF Downloads 47
4857 Performance Analysis of MIMO-OFDM Using Convolution Codes with QAM Modulation

Authors: I Gede Puja Astawa, Yoedy Moegiharto, Ahmad Zainudin, Imam Dui Agus Salim, Nur Annisa Anggraeni

Abstract:

Performance of Orthogonal Frequency Division Multiplexing (OFDM) system can be improved by adding channel coding (error correction code) to detect and correct the errors that occur during data transmission. One can use the convolution code. This paper presents performance of OFDM using Space Time Block Codes (STBC) diversity technique use QAM modulation with code rate 1/2. The evaluation is done by analyzing the value of Bit Error Rate (BER) vs. Energy per Bit to Noise Power Spectral Density Ratio (Eb/No). This scheme is conducted 256 sub-carrier which transmits Rayleigh multipath channel in OFDM system. To achieve a BER of 10-3 is required 30 dB SNR in SISO-OFDM scheme. For 2x2 MIMO-OFDM scheme requires 10 dB to achieve a BER of 10-3. For 4x4 MIMO-OFDM scheme requires 5 dB while adding convolution in a 4x4 MIMO-OFDM can improve performance up to 0 dB to achieve the same BER. This proves the existence of saving power by 3 dB of 4x4 MIMO-OFDM system without coding, power saving 7 dB of 2x2 MIMO-OFDM system without coding and significant power savings from SISO-OFDM system.

Keywords: convolution code, OFDM, MIMO, QAM, BER

Procedia PDF Downloads 364
4856 Simulations of a Jet Impinging on a Flat Plate

Authors: Reda Mankbadi

Abstract:

In this paper we explore the use of a second-order unstructured-grid, finite-volume code for direct noise prediction. We consider a Mach 1.5 jet impinging on a perpendicular flat plate. Hybrid LES-RANS simulations are used to calculate directly both the flow field and the radiated sound. The ANSYS Fluent commercial code is utilized for the calculations. The acoustic field is obtained directly from the simulations and is compared with the integral approach of Ffowcs Williams-Hawkings (FWH). Results indicate the existence of a preferred radiation angle. The spectrum obtained is in good agreement with observations. This points out to the possibility of handling the effects of complicated geometries on noise radiation by using unstructured second-orders codes.

Keywords: CFD, Ffowcs Williams-Hawkings (FWH), imping jet, ANSYS fluent commercial code, hybrid LES-RANS simulations

Procedia PDF Downloads 420
4855 The Names of the Traditional Motif of Batik Solo

Authors: Annisa D. Febryandini

Abstract:

Batik is a unique cultural heritage that strongly linked with its community. As a product of current culture in Solo, Batik Solo not only has a specific design and color to represent the cultural identity, cultural values, and spirituality of the community, but also has some specific names given by its community which are not arbitrary. This qualitative research paper uses the primary data by interview method as well as the secondary data to support it. Based on the data, this paper concludes that the names consist of a word or words taken from a current name of things in Javanese language. They indicate the cultural meaning such as a specific event, a hope, and the social status of the people who use the motif. Different from the other research, this paper takes a look at the names of traditional motif of Batik Solo which analyzed linguistically to reveal the cultural meaning.

Keywords: traditional motif, Batik, solo, anthropological linguistics

Procedia PDF Downloads 245
4854 Cultural-Creative Design with Language Figures of Speech

Authors: Wei Chen Chang, Ming Yu Hsiao

Abstract:

The commodity takes one kind of mark, the designer how to construction and interpretation the user how to use the process and effectively convey message in design education has always been an important issue. Cultural-creative design refers to signifying cultural heritage for product design. In terms of Peirce’s Semiotic Triangle: signifying elements-object-interpretant, signifying elements are the outcomes of design, the object is cultural heritage, and the interpretant is the positioning and description of product design. How to elaborate the positioning, design, and development of a product is a narrative issue of the interpretant, and how to shape the signifying elements of a product by modifying and adapting styles is a rhetoric matter. This study investigated the rhetoric of elements signifying products to develop a rhetoric model with cultural style. Figures of speech are a rhetoric method in narrative. By adapting figures of speech to the interpretant, this study developed the rhetoric context of cultural context by narrative means. In this two-phase study, phase I defines figures of speech and phase II analyzes existing cultural-creative products in terms of figures of speech to develop a rhetoric of style model. We expect it can reference for the future development of Cultural-creative design.

Keywords: cultural-creative design, cultural-creative products, figures of speech, Peirce’s semiotic triangle, rhetoric of style model

Procedia PDF Downloads 345
4853 Cultural Event and Urban Regeneration: Lessons from Liverpool as the 2008 European Capital of Culture

Authors: Yi-De Liu

Abstract:

For many European cities, a key motivation in developing event strategies is to use event as a catalyst for urban regeneration. One type of event that is particularly used as a means of urban development is the European Capital of Culture (ECOC) initiative. Based on a case study of the 2008 ECOC Liverpool, this paper aims at conceptualising the significance of major event for a city’s economic, cultural and social regenerations. In terms of economic regeneration, the role of the ECOC is central in creating Liverpool’s visitor economy and reshaping city image. Liverpool planned different themes for eight consecutive years as a way to ensure economic sustainability. As far as cultural regeneration is concerned, the ECOC contributed to the cultural regeneration of Liverpool by stimulating cultural participation and interest from the demand side, as well as improving cultural provision and collaboration within the cultural sector from the supply side. So as to social regeneration, Liverpool treated access development as a policy guideline and considered the ECOC as an opportunity to enhance the sense of place. The most significant lesson learned from Liverpool is its long-term planning and efforts made to integrate the ECOC into the overall urban development strategy. As a result, a more balanced and long-term effect on urban regeneration could be achieved.

Keywords: cultural event, urban regeneration, european capital of culture, Liverpool

Procedia PDF Downloads 240
4852 Using ALOHA Code to Evaluate CO2 Concentration for Maanshan Nuclear Power Plant

Authors: W. S. Hsu, S. W. Chen, Y. T. Ku, Y. Chiang, J. R. Wang , J. H. Yang, C. Shih

Abstract:

ALOHA code was used to calculate the concentration under the CO2 storage burst condition for Maanshan nuclear power plant (NPP) in this study. Five main data are input into ALOHA code including location, building, chemical, atmospheric, and source data. The data from Final Safety Analysis Report (FSAR) and some reports were used in this study. The ALOHA results are compared with the failure criteria of R.G. 1.78 to confirm the habitability of control room. The result of comparison presents that the ALOHA result is below the R.G. 1.78 criteria. This implies that the habitability of control room can be maintained in this case. The sensitivity study for atmospheric parameters was performed in this study. The results show that the wind speed has the larger effect in the concentration calculation.

Keywords: PWR, ALOHA, habitability, Maanshan

Procedia PDF Downloads 175
4851 A Comparative Study for the Axial Load Capacity of Circular High Strength CFST Columns

Authors: Eylem Guzel, Faruk Osmanoglu, Muhammet Kurucu

Abstract:

The concrete filled steel tube (CFST) columns are commonly used in construction applications such as high-rise buildings and bridges owing to its lots of remarkable benefits. The use of concrete-filled steel tube columns provides large areas by reduction in cross-sectional area of columns. The main aim of this study is to examine the axial load capacities of circular high strength concrete-filled steel tube columns according to Eurocode 4 (EC4) and Chinese Code (DL/T). The results showed that the predictions of EC4 and Chinese Code DL/T are unsafe for all specimens.

Keywords: concrete-filled steel tube column, axial load capacity, Chinese code, Australian standard

Procedia PDF Downloads 368
4850 The Primitive Code-Level Design Patterns for Distributed Programming

Authors: Bing Li

Abstract:

The primitive code-level design patterns (PDP) are the rudimentary programming elements to develop any distributed systems in the generic distributed programming environment, GreatFree. The PDP works with the primitive distributed application programming interfaces (PDA), the distributed modeling, and the distributed concurrency for scaling-up. They not only hide developers from underlying technical details but also support sufficient adaptability to a variety of distributed computing environments. Programming with them, the simplest distributed system, the lightweight messaging two-node client/server (TNCS) system, is constructed rapidly with straightforward and repeatable behaviors, copy-paste-replace (CPR). As any distributed systems are made up of the simplest ones, those PDAs, as well as the PDP, are generic for distributed programming.

Keywords: primitive APIs, primitive code-level design patterns, generic distributed programming, distributed systems, highly patterned development environment, messaging

Procedia PDF Downloads 150
4849 Statistical Characteristics of Code Formula for Design of Concrete Structures

Authors: Inyeol Paik, Ah-Ryang Kim

Abstract:

In this research, a statistical analysis is carried out to examine the statistical properties of the formula given in the design code for concrete structures. The design formulas of the Korea highway bridge design code - the limit state design method (KHBDC) which is the current national bridge design code and the design code for concrete structures by Korea Concrete Institute (KCI) are applied for the analysis. The safety levels provided by the strength formulas of the design codes are defined based on the probabilistic and statistical theory.KHBDC is a reliability-based design code. The load and resistance factors of this code were calibrated to attain the target reliability index. It is essential to define the statistical properties for the design formulas in this calibration process. In general, the statistical characteristics of a member strength are due to the following three factors. The first is due to the difference between the material strength of the actual construction and that used in the design calculation. The second is the difference between the actual dimensions of the constructed sections and those used in design calculation. The third is the difference between the strength of the actual member and the formula simplified for the design calculation. In this paper, the statistical study is focused on the third difference. The formulas for calculating the shear strength of concrete members are presented in different ways in KHBDC and KCI. In this study, the statistical properties of design formulas were obtained through comparison with the database which comprises the experimental results from the reference publications. The test specimen was either reinforced with the shear stirrup or not. For an applied database, the bias factor was about 1.12 and the coefficient of variation was about 0.18. By applying the statistical properties of the design formula to the reliability analysis, it is shown that the resistance factors of the current design codes satisfy the target reliability indexes of both codes. Also, the minimum resistance factors of the KHBDC which is written in the material resistance factor format and KCE which is in the member resistance format are obtained and the results are presented. A further research is underway to calibrate the resistance factors of the high strength and high-performance concrete design guide.

Keywords: concrete design code, reliability analysis, resistance factor, shear strength, statistical property

Procedia PDF Downloads 289
4848 An Investigation on Overstrength Factor (Ω) of Reinforced Concrete Buildings in Turkish Earthquake Draft Code (TEC-2016)

Authors: M. Hakan Arslan, I. Hakkı Erkan

Abstract:

Overstrength factor is an important parameter of load reduction factor. In this research, the overstrength factor (Ω) of reinforced concrete (RC) buildings and the parameters of Ω in TEC-2016 draft version have been explored. For this aim, 48 RC buildings have been modeled according to the current seismic code TEC-2007 and Turkish Building Code-500-2000 criteria. After modelling step, nonlinear static pushover analyses have been applied to these buildings by using TEC-2007 Section 7. After the nonlinear pushover analyses, capacity curves (lateral load-lateral top displacement curves) have been plotted for 48 RC buildings. Using capacity curves, overstrength factors (Ω) have been derived for each building. The obtained overstrength factor (Ω) values have been compared with TEC-2016 values for related building types, and the results have been interpreted. According to the obtained values from the study, overstrength factor (Ω) given in TEC-2016 draft code is found quite suitable.

Keywords: reinforced concrete buildings, overstrength factor, earthquake, static pushover analysis

Procedia PDF Downloads 332
4847 Wikipedia World: A Computerized Process for Cultural Heritage Data Dissemination

Authors: L. Rajaonarivo, M. N. Bessagnet, C. Sallaberry, A. Le Parc Lacayrelle, L. Leveque

Abstract:

TCVPYR is a European FEDER (European Regional Development Fund) project which aims to promote tourism in the French Pyrenees region by leveraging its cultural heritage. It involves scientists from various domains (geographers, historians, anthropologists, computer scientists...). This paper presents a fully automated process to publish any dataset as Wikipedia articles as well as the corresponding linked information on Wikidata and Wikimedia Commons. We validate this process on a sample of geo-referenced cultural heritage data collected by TCVPYR researchers in different regions of the Pyrenees. The main result concerns the technological prerequisites, which are now in place. Moreover, we demonstrated that we can automatically publish cultural heritage data on Wikimedia.

Keywords: cultural heritage dissemination, digital humanities, open data, Wikimedia automated publishing

Procedia PDF Downloads 98
4846 The Effects of Cultural Self-Efficacy and Perceived Social Support on Acculturative Stress of International Postgraduate Students in the United Kingdom

Authors: Rhea Mathews

Abstract:

The purpose of the study is to investigate the effects of perceived social support and cultural self-efficacy on the acculturative stress of international postgraduate students in the United Kingdom. The study adopted Berry, Kim, Minde & Mok’s (1987) acculturative framework on acculturative stress and examined the relationship between the variables. The study hypothesized that perceived social support and cultural self-efficacy would predict lower levels of acculturative stress among students. Postgraduate students in the United Kingdom (N = 76) completed three surveys measuring the variables; Acculturative Stress Scale for International Students, Multidimensional Scale of Perceived Social Support, and Cultural Self-efficacy for Adolescents. To evaluate the role of the perceived social support and cultural self-efficacy in determining the acculturative stress level of international students, multiple linear regression was employed. Both independent variables exhibited a significant, negative relationship with acculturative stress (p < 0.001; p < 0.01). Results described that cultural self-efficacy and perceived social support significantly predicted acculturative stress (p < 0.01). Together, the variables accounted for 22% of the variance in acculturative stress scores (adjusted R² = 0.22), with cultural self-efficacy playing a larger role in predicting the dependent variable. Limitations and implications of the study are noted. The findings of the study are discussed in relation to enhancing international students’ acculturative experience when relocating to a new environment.

Keywords: acculturative stress, coping, cultural adjustment, cultural self-efficacy, international education, international students, migration, perceived social support

Procedia PDF Downloads 292
4845 The Analysis of TRACE/FRAPTRAN in the Fuel Rods of Maanshan PWR for LBLOCA

Authors: J. R. Wang, W. Y. Li, H. T. Lin, J. H. Yang, C. Shih, S. W. Chen

Abstract:

Fuel rod analysis program transient (FRAPTRAN) code was used to study the fuel rod performance during a postulated large break loss of coolant accident (LBLOCA) in Maanshan nuclear power plant (NPP). Previous transient results from thermal hydraulic code, TRACE, with the same LBLOCA scenario, were used as input boundary conditions for FRAPTRAN. The simulation results showed that the peak cladding temperatures and the fuel center line temperatures were all below the 10CFR50.46 LOCA criteria. In addition, the maximum hoop stress was 18 MPa and the oxide thickness was 0.003 mm for the present simulation cases, which are all within the safety operation ranges. The present study confirms that this analysis method, the FRAPTRAN code combined with TRACE, is an appropriate approach to predict the fuel integrity under LBLOCA with operational ECCS.

Keywords: FRAPTRAN, TRACE, LOCA, PWR

Procedia PDF Downloads 489
4844 Design and Analysis of Piping System with Supports Using CAESAR-II

Authors: M. Jamuna Rani, K. Ramanathan

Abstract:

A steam power plant is housed with various types of equipments like boiler, turbine, heat exchanger etc. These equipments are mainly connected with piping systems. Such a piping layout design depends mainly on stress analysis and flexibility. It will vary with respect to pipe geometrical properties, pressure, temperature, and supports. The present paper is to analyze the presence and effect of hangers and expansion joints in the piping layout/routing using CAESAR-II software. Main aim of piping stress analysis is to provide adequate flexibility for absorbing thermal expansion, code compliance for stresses and displacement incurred in piping system. The design is said to be safe if all these are in allowable range as per code. In this study, a sample problem is considered for analysis as per power piping ASME B31.1 code and the results thus obtained are compared.

Keywords: ASTM B31.1, hanger, expansion joint, CAESAR-II

Procedia PDF Downloads 336
4843 A Simple Recursive Framework to Generate Gray Codes for Weak Orders in Constant Amortized Time

Authors: Marsden Jacques, Dennis Wong

Abstract:

A weak order is a way to rank n objects where ties are allowed. In this talk, we present a recursive framework to generate Gray codes for weak orders. We then describe a simple algorithm based on the framework that generates 2-Gray codes for weak orders in constant amortized time per string. This framework can easily be modified to generate other Gray codes for weak orders. We provide an example on using the framework to generate the first Shift Gray code for weak orders, also in constant amortized time, where consecutive strings differ by a shift or a symbol change.

Keywords: weak order, Cayley permutation, Gray code, shift Gray code

Procedia PDF Downloads 144
4842 Recent Legal Changes in Turkish Commercial Law to Be a Part of International Markets and Their Results

Authors: Ibrahim Arslan

Abstract:

Since 1984, Turkey has experienced a significant transformation in legal and economic matters. The most consequential examples of this transformation in recent years are the renewal of the Commercial Code and the Check Act. Nowadays, the commercial activity is not limited within the boundaries of the country; on the contrary, as required by the global economy, it has an international dimension. For this reason, unlike some other legal principles, the rules regulating the commercial life should be compatible with the international standards as much as possible. Otherwise the development possibility in the global markets will be limited. The Check Act has been adopted in 2009 and the Commercial Code has been adopted in 2011. The Commercial Code has been entered into force on 1 July 2012. The international dimension of check is in-disputable for it is based on the Geneva Convention. However, the Turkish business life has created a unique application of this legal tool. This application is called “post-date” checks. Indeed the majority of the checks being used in the market are post-dated checks. The holders of these checks have waited the date written on the check for presentation and collection. Thus, the actual situation has occurred. This actual situation has been legitimized via Check Act No. 5941 and post dated checks have gained a legal status. In the preparation of the new the Turkish Commercial Code one of the goals is "to ensure that the Turkish commercial law becomes a part of the international market". To achieve this goal, significant changes have been made especially concerning the independent external audition of the corporations, the board structure and public disclosure regulations. These changes aim to facilitate the internationalization of Turkish corporations as well as intensification of foreign direct investments through foreign capital. Although the target has been determined this way, after the adoption but five days before the entry into force of the Turkish Commercial Code No. 6102, a law made backward going alterations concerning independent external audition and public disclosure regulations. Turkish Commercial Code has been currently in force with its altered status. Both the regulations in the Check Act as well as the changes in the Commercial Code are not compatible with the goals introduced by rationale “to ensure Turkish commercial law to be a part of the international market” as such.

Keywords: Turkish Commercial Code No. 6102, Turkish Check Act, “post-date” checks, legal changes

Procedia PDF Downloads 265
4841 The Jordanian Traditional Dress of Women as a Form of Cultural Heritage

Authors: Sarah Alkhateeb

Abstract:

This research explores the Jordanian traditional dress of women as a form of cultural heritage. The dress of the Jordanian woman expresses her social and cultural functions and reflects the local environment in its social and cultural frameworks and the determinants of the natural formation of climate and terrain, in addition to what is expressed by the person’s social status and position in the social ladder of any society. Therefore, the traditional dress of Jordanian women is distinguished by its abundance and diversity. Few studies have been conducted on the Jordanian traditional dress of women, the lack of studies about the Jordanian traditional dress of women needs highlighting and the characteristics of this dress have to be featured and documented as a part of cultural heritage. The main aim of this research is to contribute or to develop a conservation strategy to save this part of cultural heritage from loss. In this research, the qualitative method approach will be used and will follow the ethnographic method. The data will be gathered from a primary source which is the single focus group discussion with the TIRAZ museum team; the Jordanian traditional dress will be explored across three regions: The North, Middle and South of Jordan, investigating the regional differences and focusing on the details of the individual garment.

Keywords: Jordanian traditional dress, cultural heritage, tiraz museum, ethnographic method

Procedia PDF Downloads 108
4840 Automatic Teller Machine System Security by Using Mobile SMS Code

Authors: Husnain Mushtaq, Mary Anjum, Muhammad Aleem

Abstract:

The main objective of this paper is used to develop a high security in Automatic Teller Machine (ATM). In these system bankers will collect the mobile numbers from the customers and then provide a code on their mobile number. In most country existing ATM machine use the magnetic card reader. The customer is identifying by inserting an ATM card with magnetic card that hold unique information such as card number and some security limitations. By entering a personal identification number, first the customer is authenticated then will access bank account in order to make cash withdraw or other services provided by the bank. Cases of card fraud are another problem once the user’s bank card is missing and the password is stolen, or simply steal a customer’s card & PIN the criminal will draw all cash in very short time, which will being great financial losses in customer, this type of fraud has increase worldwide. So to resolve this problem we are going to provide the solution using “Mobile SMS code” and ATM “PIN code” in order to improve the verify the security of customers using ATM system and confidence in the banking area.

Keywords: PIN, inquiry, biometric, magnetic strip, iris recognition, face recognition

Procedia PDF Downloads 335
4839 Value from Environmental and Cultural Perspectives or Two Sides of the Same Coin

Authors: Vilem Paril, Dominika Tothova

Abstract:

This paper discusses the value theory in cultural heritage and the value theory in environmental economics. Two economic views of the value theory are compared within the field of cultural heritage maintenance and within the field of the environment. The main aims are to find common features in these two differently structured theories under the layer of differently defined terms as well as really differing features of these two approaches, to clear the confusion which stems from different terminology as in fact these terms capture the same aspects of reality and to show possible inspiration these two perspectives can offer one another. Another aim is to present these two value systems in one value framework. First, important moments of the value theory from the economic perspective are presented, leading to the marginal revolution of (not only) the Austrian School. Then the theory of value within cultural heritage and environmental economics are explored. Finally, individual approaches are compared and their potential mutual inspiration searched for.

Keywords: cultural heritage, environmental economics, existence value, value theory

Procedia PDF Downloads 291
4838 Digital Repository as a Service: Enhancing Access and Preservation of Cultural Heritage Artefacts

Authors: Lefteris Tsipis, Demosthenes Vouyioukas, George Loumos, Antonis Kargas, Dimitris Varoutas

Abstract:

The employment of technology and digitization is crucial for cultural organizations to establish and sustain digital repositories for their cultural heritage artefacts. This utilization is also essential in facilitating the presentation of cultural works and exhibits to a broader audience. Consequently, in this work, we propose a digital repository that functions as Software as a Service (SaaS), primarily promoting the safe storage, display, and sharing of cultural materials, enhancing accessibility, and fostering a deeper understanding and appreciation of cultural heritage. Moreover, the proposed digital repository service is designed as a multitenant architecture, which enables organizations to expand their reach, enhance accessibility, foster collaboration, and ensure the preservation of their content. Specifically, this project aims to assist each cultural institution in organizing its digital cultural assets into collections and feeding other digital platforms, including educational, museum, pedagogical, and games, through appropriate interfaces. Moreover, the creation of this digital repository offers a cutting-edge and effective open-access laboratory solution. It allows organizations to have a significant influence on their audiences by fostering cultural understanding and appreciation. Additionally, it facilitates the connection between different digital repositories and national/European aggregators, promoting collaboration and information sharing. By embracing this solution, cultural institutions can benefit from shared resources and features, such as system updates, backup and recovery services, and data analytics tools, that are provided by the platform.

Keywords: cultural technologies, gaming technologies, web sharing, digital repository

Procedia PDF Downloads 44
4837 Skew Cyclic Codes over Fq+uFq+…+uk-1Fq

Authors: Jing Li, Xiuli Li

Abstract:

This paper studies a special class of linear codes, called skew cyclic codes, over the ring R= Fq+uFq+…+uk-1Fq, where q is a prime power. A Gray map ɸ from R to Fq and a Gray map ɸ' from Rn to Fnq are defined, as well as an automorphism Θ over R. It is proved that the images of skew cyclic codes over R under map ɸ' and Θ are cyclic codes over Fq, and they still keep the dual relation.

Keywords: skew cyclic code, gray map, automorphism, cyclic code

Procedia PDF Downloads 263
4836 Cultural Heritage Impact Assessments and the Negotiation of Identity in South Africa

Authors: Rosabelle Boswell

Abstract:

South Africa, a country with experience of both colonial rule and apartheid is now more than 25 years past its first democratic elections. However, and as noted in this article, South Africa is still experiencing the legacies of racial segregation and is concerned to address inequality by attracting investment for socioeconomic development. The paper offered considers five cultural heritage impact assessments conducted in South Africa for offshore oil and gas exploration and development. The results of the research, from more than 20 towns and cities in southern Africa, indicate a rich intangible cultural heritage in South Africa and Namibia, and the potential impacts on investor engagements for more inclusive and sustainable coastal development practices. The discussion advances critical heritage studies, taking into account socioeconomic realities and aboriginal concepts of nature and nature management.

Keywords: cultural heritage impact assessments, intangible cultural heritage, South Africa, ocean philosophies

Procedia PDF Downloads 119
4835 Adult Learners’ Code-Switching in the EFL Classroom: An Analysis of Frequency and Type of Code-Switching

Authors: Elizabeth Patricia Beck

Abstract:

Stepping into various English as foreign language classrooms, one will see some fundamental similarities. There will likely be groups of students working collaboratively, possibly sitting at tables together. They will be using a set coursebook or photocopies of materials developed by publishers or the teacher. The teacher will be carefully monitoring students’ behaviour and progress. The teacher will also likely be insisting that the students only speak English together, possibly having implemented a complex penalty and award systems to encourage this. This is communicative language teaching and it is commonly how foreign languages are taught around the world. Recently, there has been much interest in the codeswitching behaviour of learners in foreign or second language classrooms. It is a significant topic as it relates to second language acquisition theory, language teaching training and policy, and student expectations and classroom practice. Generally in an English as a foreign language context, an ‘English Only’ policy is the norm. This is based on historical factors, socio-political influence and theories surrounding language learning. The trend, however, is shifting and, based on these same factors, a re-examination of language use in the foreign language classroom is taking place. This paper reports the findings of an examination into the codeswitching behaviour of learners with a shared native language in an English classroom. Specifically, it addresses the question of classroom code-switching by adult learners in the EFL classroom during student-to-student, spoken interaction. Three generic categories of code switching are proposed based on published research and classroom practice. Italian adult learners at three levels were observed and patterns of language use were identified, recorded and analysed using the proposed categories. After observations were completed, a questionnaire was distributed to the students focussing on attitudes and opinions around language choice in the EFL classroom, specifically, the usefulness of L1 for specific functions in the classroom. The paper then investigates the relationship between learners’ foreign language proficiency and the frequency and type of code-switching that they engaged in, and the relationship between learners’ attitudes to classroom code-switching and their behaviour. Results show that code switching patterns underwent changes as the students’ level of English language proficiency improved, and that students’ attitudes towards code-switching generally correlated with their behaviour with some exceptions, however. Finally, the discussion focusses on the details of the language produced in observation, possible influencing factors that may affect the frequency and type of code switching that took place, and additional influencing factors that may affect students’ attitudes towards code switching in the foreign language classroom. An evaluation of the limitations of this study is offered and some suggestions are made for future research in this field of study.

Keywords: code-switching, EFL, second language aquisition, adult learners

Procedia PDF Downloads 247
4834 Moving Images and Re-Articulations of Self-Identity: Young People's Experiences of Viewing Representations Disability in Films

Authors: Alison Wilde, Stephen Millett

Abstract:

The cultural value of disabled people has largely been overlooked within forms of media and cultural analysis until the 1980s, when disabled people and disability studies highlighted the cultural misrecognition of disabled people and called for improved forms of cultural recognition and representation. Despite an increase in cultural analysis of representations of disabled people, much has been assumed about how images are read, and little work has been done on the value attributed to disabled people by media audiences and the viewing interests and encounters of film audiences. In particular, there has been little work on film reception, or on the way that young people interpret images of disability. We set out to understand some of the ways that young people read disability imagery, by showing small groups of young people different types of film featuring impairments, chosen from three different eras in film. These were Freaks, Rear Window (remake), and Finding Nemo. The discussions after these films allowed them to explore their own experiences of disability alongside the evolution of cultural representations; in so doing they discussed significant themes of cultural value and reflected on their own identities, e.g. in/dependency, autonomy, and competency and the ways these intersected with self-identity, and attitudes to disabled people.

Keywords: film, audience, identity, disability

Procedia PDF Downloads 387
4833 About Multi-Resolution Techniques for Large Eddy Simulation of Reactive Multi-Phase Flows

Authors: Giacomo Rossi, Bernardo Favini, Eugenio Giacomazzi, Franca Rita Picchia, Nunzio Maria Salvatore Arcidiacono

Abstract:

A numerical technique for mesh refinement in the HeaRT (Heat Release and Transfer) numerical code is presented. In the CFD framework, Large Eddy Simulation (LES) approach is gaining in importance as a tool for simulating turbulent combustion processes, also if this approach has an high computational cost due to the complexity of the turbulent modeling and the high number of grid points necessary to obtain a good numerical solution. In particular, when a numerical simulation of a big domain is performed with a structured grid, the number of grid points can increase so much that the simulation becomes impossible: this problem can be overcame with a mesh refinement technique. Mesh refinement technique developed for HeaRT numerical code (a staggered finite difference code) is based on an high order reconstruction of the variables at the grid interfaces by means of a least square quasi-ENO interpolation: numerical code is written in modern Fortran (2003 standard of newer) and is parallelized using domain decomposition and message passing interface (MPI) standard.

Keywords: LES, multi-resolution, ENO, fortran

Procedia PDF Downloads 334
4832 Cultural Influence on Social Cognition in Social and Educational Psychology

Authors: Mbah Fidelix Njong, Sabi Emile Forkwa

Abstract:

Social cognition is an aspect of social psychology that focuses on how people process, store and apply information about others and social situations. It lay emphasis on how cognitive processes play in our social interactions. In this article, we try to show how culture can influence our ways of thinking about others, how we feel and interact with the world around us. Social cognitive processes involve perceiving people and how we learn about the people around us. It concerns the mental processes of remembering, thinking and attending to other people with different cultural backgrounds and how we attend to certain information about the world. Especially in an educational setting, students’ learning processes are most often than not influenced by their cultural background. We can also talk of social schemas. That’s people’s mental representation of social patterns and norms. This involves information about the societal role and the expectations of individuals within a group. These cognitive processes can also be influence by culture. There are important cultural differences in social cognition. In any social situation, two individuals may have different interpretations. Each person brings in a unique background of experiences, knowledge, social influence, feelings and cultural variations. Cultural differences can also affect how people interpret social situations. The same social behavior in one cultural setting might have completely different meaning and interpretation if observed or applied in another culture. However, as people interpret behaviors and bring out meaning from the interpretations, they act based on their beliefs about situations they are confronted with. This helps to reinforce and reproduce the cultural norms that influence their social cognition.

Keywords: social cognition, social schema, cultural influence, psychology

Procedia PDF Downloads 43
4831 Hydrodynamic and Sediment Transport Analysis of Computational Fluid Dynamics Designed Flow Regulating Liner (Smart Ditch)

Authors: Saman Mostafazadeh-Fard, Zohrab Samani, Kenneth Suazo

Abstract:

Agricultural ditch liners are used to prevent soil erosion and reduce seepage losses. This paper introduced an approach to validate a computational fluid dynamics (CFD) platform FLOW-3D code and its use to design a flow-regulating corrugated agricultural ditch liner system (Smart Ditch (SM)). Hydrodynamic and sediment transport analyses were performed on the proposed liner flow using the CFD platform FLOW-3D code. The code's hydrodynamic and scour and sediment transport models were calibrated and validated using lab data with an accuracy of 94 % and 95%, respectively. The code was then used to measure hydrodynamic parameters of sublayer turbulent intensity, kinetic energy, dissipation, and packed sediment mass normalized with respect to sublayer flow velocity. Sublayer turbulent intensity, kinetic energy, and dissipation in the SM flow were significantly higher than CR flow. An alternative corrugated liner was also designed, and sediment transport was measured and compared to SM and CR flows. Normalized packed sediment mass with respect to average sublayer flow velocity was 27.8 % lower in alternative flow compared to SM flow. CFD platform FLOW-3D code could effectively be used to design corrugated ditch liner systems and perform hydrodynamic and sediment transport analysis under various corrugation designs.

Keywords: CFD, hydrodynamic, sediment transport, ditch, liner design

Procedia PDF Downloads 94