Search results for: pragmatic concerns
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 2024

Search results for: pragmatic concerns

1934 Verifiable Secure Computation of Large Scale Two-Point Boundary Value Problems Using Certificate Validation

Authors: Yogita M. Ahire, Nedal M. Mohammed, Ahmed A. Hamoud

Abstract:

Scientific computation outsourcing is gaining popularity because it allows customers with limited computing resources and storage devices to outsource complex computation workloads to more powerful service providers. However, it raises some security and privacy concerns and challenges, such as customer input and output privacy, as well as cloud cheating behaviors. This study was motivated by these concerns and focused on privacy-preserving Two-Point Boundary Value Problems (BVP) as a common and realistic instance for verifiable safe multiparty computing. We'll look at the safe and verifiable schema with correctness guarantees by utilizing standard multiparty approaches to compute the result of a computation and then solely using verifiable ways to check that the result was right.

Keywords: verifiable computing, cloud computing, secure and privacy BVP, secure computation outsourcing

Procedia PDF Downloads 62
1933 Polycode Texts in Communication of Antisocial Groups: Functional and Pragmatic Aspects

Authors: Ivan Potapov

Abstract:

Background: The aim of this paper is to investigate poly code texts in the communication of youth antisocial groups. Nowadays, the notion of a text has numerous interpretations. Besides all the approaches to defining a text, we must take into account semiotic and cultural-semiotic ones. Rapidly developing IT, world globalization, and new ways of coding of information increase the role of the cultural-semiotic approach. However, the development of computer technologies leads also to changes in the text itself. Polycode texts play a more and more important role in the everyday communication of the younger generation. Therefore, the research of functional and pragmatic aspects of both verbal and non-verbal content is actually quite important. Methods and Material: For this survey, we applied the combination of four methods of text investigation: not only intention and content analysis but also semantic and syntactic analysis. Using these methods provided us with information on general text properties, the content of transmitted messages, and each communicants’ intentions. Besides, during our research, we figured out the social background; therefore, we could distinguish intertextual connections between certain types of polycode texts. As the sources of the research material, we used 20 public channels in the popular messenger Telegram and data extracted from smartphones, which belonged to arrested members of antisocial groups. Findings: This investigation let us assert that polycode texts can be characterized as highly intertextual language unit. Moreover, we could outline the classification of these texts based on communicants’ intentions. The most common types of antisocial polycode texts are a call to illegal actions and agitation. What is more, each type has its own semantic core: it depends on the sphere of communication. However, syntactic structure is universal for most of the polycode texts. Conclusion: Polycode texts play important role in online communication. The results of this investigation demonstrate that in some social groups using these texts has a destructive influence on the younger generation and obviously needs further researches.

Keywords: text, polycode text, internet linguistics, text analysis, context, semiotics, sociolinguistics

Procedia PDF Downloads 105
1932 Systematic Review: Examining Teacher-Led Prevention Programs to Address Behavioral Concerns in Students

Authors: Mika Kaufman

Abstract:

Behavioral health in school-age children is a great concern. Negative behaviors can affect mental and physical health and, if ignored, can lead to further problems later in life. Rural communities often lack resources for counselors, social workers, and mental health care in the hopes of intervening with children who exhibit negative behaviors. Because of this, schools in rural communities are more likely to have children with behavioral issues. Prevention programs to recognize and address these behavioral concerns can educate teachers about mental health, different negative behaviors that students might exhibit, and how to manage those behaviors and engage with students in a positive way.

Keywords: prevention programs, behavioral health, resources for teachers, rural schools

Procedia PDF Downloads 41
1931 Domestic Led Lighting Designs Using Internet of Things

Authors: Gouresh Singhal, Rajib Kumar Panigrahi

Abstract:

In this paper, we try to examine historical and technological changes in lighting industry. We propose a (proto) technical solution at block diagram and circuit level. Untapped and upcoming technologies such as Cloud and 6LoWPAN are further explored. The paper presents a robust hardware realistic design. A mobile application is also provided to provide last mile user interface. The paper highlights the current challenges to be faced and concludes with a pragmatic view of lighting industry.

Keywords: 6lowpan, internet of things, mobile application, led

Procedia PDF Downloads 549
1930 Promoting Affordable Housing Public-Private Partnerships (PPPs) in Nigeria: Addressing Ethical Concerns in Construction and Exploring Solutions

Authors: Shem Ikoojo Ayegba, Ye Qi

Abstract:

Public-private partnerships (PPPs) can potentially be a transformative mechanism for advancing affordable housing in Nigeria., considering the current housing deficit between 17 – 24 million. Nevertheless, their effectiveness is marred by persistent unethical practices such as corruption and the utilization of subpar materials. Through a comprehensive mixed-methods approach, this study delves into the ethical quandaries within Nigerian housing construction and their cascading effects on the success of PPPs. Semi-structured interviews encompassing seasoned construction professionals and an in-depth content analysis of ongoing housing policies and projects in Nigeria reveal a culture of corruption across the value chain. This malaise is exacerbated by glaring deficiencies in oversight and a lack of transparent practices. A robust statistical survey involving diverse professionals, including engineers, architects, and project managers, echoes these findings, emphasizing that a frail institutional framework facilitates the persistence of substandard material use, professional negligence, and rampant bribery. Such compromised construction standards place residents in potential jeopardy and impede the achievement of broader sustainability objectives. This study propounds a suite of policy interventions to pave the way for thriving affordable housing PPPs: initiating transparent bidding processes, establishing non-negotiable quality benchmarks for construction materials, and incorporating independent third-party audits throughout the building phase. Furthermore, cultivating a culture of professional integrity through targeted ethics training for all construction personnel is imperative. This research furnishes pragmatic strategies that can radically enhance the potency of housing PPPs, thereby ensuring safe, durable, and affordable housing solutions for Nigeria's underserved populace.

Keywords: public-private partnerships, affordable housing, unethical practicies, housing policies, construction ethics

Procedia PDF Downloads 42
1929 Comparative Study of Case Files in the Context of H. P. Grice’s Pragmatic Theory

Authors: Tugce Arslan

Abstract:

For a communicative act to be carried out successfully, the speaker and the listener must consider certain principles in line with the intention–centered “Cooperative Principle” expressed by H. P. Grice. Violation of a communication principle causes the listener to make new inferences called “implicatures”. In this study, focusing on the linguistic use of H. P. Grice’s principles, we aim to find out which principles of conversation are generally followed in case files from different fields and which principles are frequently violated. Three case files were examined, and the violating and the abiding cases of the maxims were classified in terms of four categories (Quality, Quantity, Relevance and Manner). The results of this investigation is reported below (V: Violating, A: Abiding): Quality Quantity Relevance Manner V A V A V A V A Case 1 10 8 5 9 3 15 16 6 Case 2 4 5 11 6 2 11 7 14 Case 3 21 13 7 12 9 14 15 9 Total 35 26 23 27 14 40 38 29 The excerpts were selected from files covering three different areas: the Assize Court, the Family Court and the Commercial Court of First Instance. In this way, the relations between the types of violations and the types of courts are examined. Our main finding is that in the 1st and the 3rd file, as the cases of violation in “Quality” and “Manner” increase, the cases of violation in “Quantity” and “Relevance” decrease. In the second file, on the other hand, as the cases of violation in “Quantity” increase, the cases of violation in “Quality”, “Relevance” and “Manner” decrease. In the talk, we shall compare these results with the results obtained in the study of Tajabadi, Dowlatabadi, and Mehric (2014), which examined various case files in Iran. Our main finding is that in the study conducted in Iran, violations were found only on the principles of “Quantity” and “Relevance”, while violations were found on the principles of “Quality”, “Quantity” and “Manner” in this study. In this case, it shows us that there is a connection between at least two maxims. In both cases, it has been noticed that the “Quantity” maxim is a common denominator. Studies in this field can be enlightening for many areas such as discourse analysis, legal studies, etc. Accordingly, comments will be made about the nature of the violations mentioned in H. P. Grice’s “Cooperation Principle”. We shall also discuss various conversational practices that cannot be analysed with these maxims.

Keywords: comparative analysis, cooperation principle, forensic linguistics, pragmatic.

Procedia PDF Downloads 183
1928 Extension Services' Needs of Small Farmers in Biliran Province, Philippines

Authors: Mario C. Nierras

Abstract:

This study aimed to determine the extension services’ needs of small farmers in Biliran province, Philippines. It also sought to find out other issues/concerns of the small farmers. Extension services’ needs of small farmers were gathered through personal interviewing and observational analysis of randomly-selected small farmers in Biliran, Philippines. Biliran small farmers extension services’ needs include: raising fruits, raising legumes, raising vegetables, raising swine, raising cattle, and raising chicken (as priority broad skills). For the specific skills, diagnosing symptoms on fertilizer deficiencies, controlling plant pests and diseases, diagnosing signs on specific pest and disease damage, controlling animal pests and diseases, and doing artificial insemination were the priority skills. They considered an on-farm trial of new technology as most needed to be coupled with industry and quality-orientedness, as positive behaviors needed in farming success. The farmers still adhere to the so-called wait-and-see attitude, thus they are more convinced to follow a particular technology if they see a concrete result of the introduced changes. Technical needs prioritization of Biliran small farmers showed that they have a real need for crop and animal production skills to include the other issues/concerns. Extension service program planning for small farmers should be patterned after their technical needs giving due attention to some issues/concerns so that extension work could deliver the right skills for the right needs of the farmers.

Keywords: extension, extension service, extension service needs, extension service program, farmers, small farmers, marginal farmers

Procedia PDF Downloads 409
1927 Effects of Coastal Structure Construction on Ecosystem

Authors: Afshin Jahangirzadeh, Shatirah Akib, Keyvan Kimiaei, Hossein Basser

Abstract:

Coastal defense structures were built to protect part of shore from beach erosion and flooding by sea water. Effects of coastal defense structures can be negative or positive. Some of the effects are beneficial in socioeconomic aspect, but environment matters should be given more concerns because it can bring bad consequences to the earth landscape and make the ecosystem be unbalanced. This study concerns on the negative impacts as they are dominant. Coastal structures can extremely impact the shoreline configuration. Artificial structures can influence sediment transport, split the coastal space, etc. This can result in habitats loss and lead to noise and visual disturbance of birds. There are two types of coastal defense structures, hard coastal structure and soft coastal structure. Both coastal structures have their own impacts. The impacts are induced during the construction, maintaining, and operation of the structures.

Keywords: ecosystem, environmental impact, hard coastal structures, soft coastal structures

Procedia PDF Downloads 455
1926 Running Head: Psychological Inflexibility and Distress

Authors: Steven M. Sanders, April T. Berry, David W. Hollingsworth

Abstract:

Previous research has shown that veterans have higher rates of mental health concerns compared to non-veteran populations. A potential risk factor for the development of mental health concerns (i.e., depression & anxiety), particularly in Black veterans, is psychological inflexibility. Psychological inflexibility, a component of Acceptance & Commitment Therapy (ACT), is a process by which behavior is expressed in ways that attempt to control emotional and psychological reactions to uncomfortable stimuli and situations rather than by direct contingencies or personal values. The present study explored the relationship between psychological inflexibility, symptoms of depression, and symptoms of anxiety in a sample of 131 Black veterans. Results demonstrated that Black veterans who endorsed psychological inflexibility also endorsed higher levels of both depression and anxiety symptomology. These findings indicate the deleterious consequences of experiencing psychological inflexibility, which could be treated through ACT.

Keywords: psychological flexibility, veteran, black, psychological distress

Procedia PDF Downloads 89
1925 Electronic Marketing Applied to Tourism Case Study

Authors: Ahcene Boucied

Abstract:

In this paper, a case study is conducted to analyze the effectiveness of web pages designed in Barbados for the tourism and hospitality industry. The assessment is made from two perspectives: to understand how the Barbados’ tourism industry is using the web, and to identify the effect of information technology on economic issues. In return, this is used: (a) to provide interested parties with accurate information and marketing insight necessary for decision making for electronic commerce/e-commerce, and (b) to demonstrate pragmatic difficulties in searching and designing web pages.

Keywords: segmentation, tourism stakeholders, destination marketing, case study

Procedia PDF Downloads 386
1924 Religion and Politeness: An Exploratory Study for the Integration of Religious Expressions with Politeness Strategies in Iraqi Computer-Mediated Communication

Authors: Rasha Alsabbah

Abstract:

This study explores the relationship between polite language use and religion in the Iraqi culture in computer mediated communication. It tackles the speech acts where these expressions are employed, the frequency of their occurrence and the aims behind them. It also investigates if they have equivalent expressions in English and the possibility of translating them in intercultural communication. Despite the wide assumption that language is a reflection of culture and religion, it started to grant the attention sociologists during the recent 40 years when scholars have questioned the possible interconnection between religion and language in which religion is used as a mean of producing language and performing pragmatic functions. It is presumed that Arabs in general, and Iraqis in particular, have an inclination to use religious vocabulary in showing politeness in their greeting and other speech acts. Due to Islamic religion and culture’s influences, it is observed that Iraqis are very much concerned of maintaining social solidarity and harmonious relationships which make religion a politeness strategy that operates as the key point of their social behaviours. In addition, religion has found to influence almost all their interactions in which they have a tendency of invoking religious expressions, the lexicon of Allah (God), and Qur’anic verses in their daily politeness discourse. This aspect of Islamic culture may look strange, especially to people who come from individualist societies, such as England. Data collection in this study is based on messaging applications like Viber, WhatsApp, and Facebook. After gaining the approval of the participants, there was an investigation for the different aims behind these expressions and the pragmatic function that they perform. It is found that Iraqis tend to incorporate the lexicon of Allah in most of their communication. Such employment is not only by religious people but also by individuals who do not show strong commitment to religion. Furthermore, the social distance and social power between people do not play a significant role in increasing or reducing the rate of using these expressions. A number of these expressions, though can be translated into English, do not have one to one counterpart or reflect religious feeling. In addition, they might sound odd upon being translated or transliterated in oral and written communication in intercultural communication.

Keywords: computer mediated communication (CMC), intercultural communication, politeness, religion, situation bound utterances rituals, speech acts

Procedia PDF Downloads 368
1923 Cloud Computing Security for Multi-Cloud Service Providers: Controls and Techniques in Our Modern Threat Landscape

Authors: Sandesh Achar

Abstract:

Cloud computing security is a broad term that covers a variety of security concerns for organizations that use cloud services. Multi-cloud service providers must consider several factors when addressing security for their customers, including identity and access management, data at rest and in transit, egress and ingress traffic control, vulnerability and threat management, and auditing. This paper explores each of these aspects of cloud security in detail and provides recommendations for best practices for multi-cloud service providers. It also discusses the challenges inherent in securing a multi-cloud environment and offers solutions for overcoming these challenges. By the end of this paper, readers should have a good understanding of the various security concerns associated with multi-cloud environments in the context of today’s modern cyber threats and how to address them.

Keywords: multi-cloud service, system organization control, data loss prevention, identity and access management

Procedia PDF Downloads 68
1922 Elimination of Contaminants of Emerging Concerns by Peracetic Acid and Advanced Oxidation Process

Authors: Abdul Rahim Al Umairi, Mohamed Gamal El-Din

Abstract:

The removal of the selected contaminants of emerging concerns (CECs) presented under related environmental conditions by Peracetic Acid (PAA) and PAA-UV photolysis processes was examined in this study. A mixture of (CECs) (pesticides and pharmaceutical compounds) was prepared inclean water and treated with different doses of PAA (3.2, 6.4, and 9.6 mg/L) under different pH values (5.2, 7.2, and 9.2). The results revealed that the reactivity of the selected CECs with PAA was classified into three groups: Group 1 poorly reactive (removal <25%), Group2 moderately reactive (removal 25% to 50%), and Group 3 highly reactive (> 50%). Group1 includes atrazine (ATZ) and fluconazole (FCL), Group2 includes carbamazepine (CBZ), sulfamethoxazole (SMX), trimethoprim (TMP), mecoprop (MCPP), diazinon (DZN) and Group 3 includes perfluorooctanoic acid (PFOA) and clindamycin (CLN). The pH was found to affect the CECs' degradation differently, for Group 1 and Group 3, better removal was achieved in the acidand alkaline medium. In contrast, for Group 2 pH effects were not well pronounced. PAA-UV photolysis processes were explored to degrade the recalcitrant indicators compounds: ATZ (Group1) and SMX(Group2). PAA-UV process showed no improvement in the removal of ATZ. In contrast, PAA-UV removed SMX drastically with a pseudo decay rate constant of 0.014 cm2/mJ compared to 0.002 cm2/mJ by UV alone. The contribution of hydroxyl radical to the degradation process using the PAA-UV process was found to be negligible. This study illustratedPAA's capability on the degradation of the CECs presented in relative environmental conditions and unveiled the potential of using PAA-UV processes as advanced oxidation processes.

Keywords: advanced oxidation process, contaminants of emerging concerns, peracetic acid, hydroxyl radical

Procedia PDF Downloads 92
1921 Analysis of CO₂ Two-Phase Ejector with Taguchi and ANOVA Optimization and Refrigerant Selection with Enviro Economic Concerns by TOPSIS Analysis

Authors: Karima Megdouli, Bourhan tachtouch

Abstract:

Ejector refrigeration cycles offer an alternative to conventional systems for producing cold from low-temperature heat. In this article, a thermodynamic model is presented. This model has the advantage of simplifying the calculation algorithm and describes the complex double-throttling mechanism that occurs in the ejector. The model assumption and calculation algorithm are presented first. The impact of each efficiency is evaluated. Validation is performed on several data sets. The ejector model is then used to simulate a RES (refrigeration ejector system), to validate its robustness and suitability for use in predicting thermodynamic cycle performance. A Taguchi and ANOVA optimization is carried out on a RES. TOPSIS analysis was applied to decide the optimum refrigerants with cost, safety, environmental and enviro economic concerns along with thermophysical properties.

Keywords: ejector, velocity distribution, shock circle, Taguchi and ANOVA optimization, TOPSIS analysis

Procedia PDF Downloads 50
1920 Addressing Stigma on the Child and Adolescent Psychiatry Consultation Service Through Use of Video

Authors: Rachel Talbot, Nasuh Malas

Abstract:

Stigma in child and adolescent psychiatry continues to be a significant barrier for youth to receive much needed psychiatric care. Parents misperceptions regarding mental health may interfere with their child’s care and negatively influence their child’s view of mental health. For some children, their first experience with psychiatry may occur during medical hospitalization when they are seen by the Psychiatry Consultation-Liaison (C/L) Service. Despite this unique role, there is limited data on how to address mental health stigma with patients and families within the context of Child and Adolescent C/L Psychiatry. This study explores the use of a brief introductory video with messages from the psychiatry C/L team, families who have accessed mental health consultation in the hospital, as well as clips of family and C/L team interactions to address parental stigma of psychiatry. Common stigmatized concerns shared by parents include concerns about confidentiality, later ramifications of mental healthcare, outsider status, and parental self-blame. There are also stigmatized concerns about psychiatric medication use including overmedication, sedation, long-term effects, medicating ‘real problems’ and personality blunting. Each of these are addressed during the video parents will see with the intent of reducing negative parental perceptions relating to mental healthcare. For this study, families are given a survey highlighting these concerns, prior to and after watching the video. Pre-and post-video responses are compared with the hypothesis that watching the video will effectively reduce parental stigma about psychiatric care. Data collection is currently underway and will be completed by the end of November 2017 with data analysis completed by January 2018. This study will also give vital information about the demographic differences in perceptions of stigma so future interventions can be targeted towards those with higher perceived stigma. This study posits that use of an introductory video is an effective strategy to combat stigma and help educate and empower families. In this way, we will be reducing further barriers for patients and families to seek out mental health resources and supports that are often desperately needed for these youths.

Keywords: child and adolescent psychiatry, consult-liaison psychiatry, media, stigma

Procedia PDF Downloads 158
1919 Reading and Teaching Poetry as Communicative Discourse: A Pragma-Linguistic Approach

Authors: Omnia Elkommos

Abstract:

Language is communication on several discourse levels. The target of teaching a language and the literature of a foreign language is to communicate a message. Reading, appreciating, analysing, and interpreting poetry as a sophisticated rhetorical expression of human thoughts, emotions, and philosophical messages is more feasible through the use of linguistic pragmatic tools from a communicative discourse perspective. The poet's intention, speech act, illocutionary act, and perlocutionary goal can be better understood when communicative situational context as well as linguistic discourse structure theories are employed. The use of linguistic theories in the teaching of poetry is, therefore, intrinsic to students' comprehension, interpretation, and appreciation of poetry of the different ages. It is the purpose of this study to show how both teachers as well as students can apply these linguistic theories and tools to dramatic poetic texts for an engaging, enlightening, and effective interpretation and appreciation of the language. Theories drawn from areas of pragmatics, discourse analysis, embedded discourse level, communicative situational context, and other linguistic approaches were applied to selected poetry texts from the different centuries. Further, in a simple statistical count of the number of poems with dialogic dramatic discourse with embedded two or three levels of discourse in different anthologies outweighs the number of descriptive poems with a one level of discourse, between the poet and the reader. Poetry is thus discourse on one, two, or three levels. It is, therefore, recommended that teachers and students in the area of ESL/EFL use the linguistics theories for a better understanding of poetry as communicative discourse. The practice of applying these linguistic theories in classrooms and in research will allow them to perceive the language and its linguistic, social, and cultural aspect. Texts will become live illocutionary acts with a perlocutionary acts goal rather than mere literary texts in anthologies.

Keywords: coda, commissives, communicative situation, context of culture, context of reference, context of utterance, dialogue, directives, discourse analysis, dramatic discourse interaction, duologue, embedded discourse levels, language for communication, linguistic structures, literary texts, poetry, pragmatic theories, reader response, speech acts (macro/micro), stylistics, teaching literature, TEFL, terms of address, turn-taking

Procedia PDF Downloads 296
1918 Play-Based Approaches to Stimulate Language

Authors: Sherri Franklin-Guy

Abstract:

The emergence of language in young children has been well-documented and play-based activities that support its continued development have been utilized in the clinic-based setting. Speech-language pathologists have long used such activities to stimulate the production of language in children with speech and language disorders via modeling and elicitation tasks. This presentation will examine the importance of play in the development of language in young children, including social and pragmatic communication. Implications for clinicians and educators will be discussed.

Keywords: language development, language stimulation, play-based activities, symbolic play

Procedia PDF Downloads 210
1917 Effects of Turbulence Penetration on Valve Leakage in Nuclear Reactor Coolant System

Authors: Gupta Rajesh, Paudel Sagar, Sharma Utkarsh, Singh Amit Kumar

Abstract:

Thermal stratification has drawn much attention because of the malfunctions at various nuclear plants in U.S.A that raised significant safety concerns. The concerns due to this phenomenon relate to thermal stresses in branch pipes connected to the reactor coolant system piping. This stress limits the lifetime of the piping system, and even leading to penetrating cracks. To assess origin of valve damage in the pipeline, it is essential to determine the effect of turbulence penetration on valve leakage; since stratified flow is generally generated by turbulent penetration or valve leakage. As a result, we concluded with the help of coupled fluent-structural analysis that the pipe with less turbulence has less chance of failure there by requiring less maintenance.

Keywords: nuclear reactor coolant system, thermal stratification, turbulent penetration, coupled fluent-structural analysis, Von-Misses stress

Procedia PDF Downloads 257
1916 Determination of Frequency Relay Setting during Distributed Generators Islanding

Authors: Tarek Kandil, Ameen Ali

Abstract:

Distributed generation (DG) has recently gained a lot of momentum in power industry due to market deregulation and environmental concerns. One of the most technical challenges facing DGs is islanding of distributed generators. The current industry practice is to disconnect all distributed generators immediately after the occurrence of islands within 200 to 350 ms after loss of main supply. To achieve such goal, each DG must be equipped with an islanding detection device. Frequency relays are one of the most commonly used loss of mains detection method. However, distribution utilities may be faced with concerns related to false operation of these frequency relays due to improper settings. The commercially available frequency relays are considering standard tight setting. This paper investigates some factors related to relays internal algorithm that contribute to their different operating responses. Further, the relay operation in the presence of multiple distributed at the same network is analyzed. Finally, the relay setting can be accurately determined based on these investigation and analysis.

Keywords: frequency relay, distributed generation, islanding detection, relay setting

Procedia PDF Downloads 507
1915 Integrative Review: Impact of Transitional Care on Self-Management of Chronic Conditions in Un/Underinsured Populations

Authors: Ashleigh Medina

Abstract:

Chronic conditions account for the majority of total health care spending both in the United States and globally. Encouraging self-management to improve chronic conditions, which in turn could decrease the strain placed on hospitals, requires resources to address the patient’s social concerns in addition to their medical concerns. Transitional care has been identified as a possible bridge between acutely managing conditions at the hospital to chronically managing conditions in a community setting. The aim of this integrative review was to examine the impact of transitional care on self-management outcomes of chronic conditions in un/underinsured populations. Both transitional care, by assisting with resources such as funding sources for healthcare and medications or identifying a healthcare provider for continued care, and self-management, by increasing responsibility for one’s care through goal setting and taking action, can impact health outcomes while providing health care cost-savings.

Keywords: chronic conditions, self-management, transitional care, uninsured

Procedia PDF Downloads 134
1914 Extending the AOP Joinpoint Model for Memory and Type Safety

Authors: Amjad Nusayr

Abstract:

Software security is a general term used to any type of software architecture or model in which security aspects are incorporated in this architecture. These aspects are not part of the main logic of the underlying program. Software security can be achieved using a combination of approaches, including but not limited to secure software designs, third part component validation, and secure coding practices. Memory safety is one feature in software security where we ensure that any object in memory has a valid pointer or a reference with a valid type. Aspect-Oriented Programming (AOP) is a paradigm that is concerned with capturing the cross-cutting concerns in code development. AOP is generally used for common cross-cutting concerns like logging and DB transaction managing. In this paper, we introduce the concepts that enable AOP to be used for the purpose of memory and type safety. We also present ideas for extending AOP in software security practices.

Keywords: aspect oriented programming, programming languages, software security, memory and type safety

Procedia PDF Downloads 99
1913 Systematic and Simple Guidance for Feed Forward Design in Model Predictive Control

Authors: Shukri Dughman, Anthony Rossiter

Abstract:

This paper builds on earlier work which demonstrated that Model Predictive Control (MPC) may give a poor choice of default feed forward compensator. By first demonstrating the impact of future information of target changes on the performance, this paper proposes a pragmatic method for identifying the amount of future information on the target that can be utilised effectively in both finite and infinite horizon algorithms. Numerical illustrations in MATLAB give evidence of the efficacy of the proposal.

Keywords: model predictive control, tracking control, advance knowledge, feed forward

Procedia PDF Downloads 500
1912 Chaotic Dynamics of Cost Overruns in Oil and Gas Megaprojects: A Review

Authors: O. J. Olaniran, P. E. D. Love, D. J. Edwards, O. Olatunji, J. Matthews

Abstract:

Cost overruns are a persistent problem in oil and gas megaprojects. Whilst the extant literature is filled with studies on incidents and causes of cost overruns, underlying theories to explain their emergence in oil and gas megaprojects are few. Yet, a way to contain the syndrome of cost overruns is to understand the bases of ‘how and why’ they occur. Such knowledge will also help to develop pragmatic techniques for better overall management of oil and gas megaprojects. The aim of this paper is to explain the development of cost overruns in hydrocarbon megaprojects through the perspective of chaos theory. The underlying principles of chaos theory and its implications for cost overruns are examined and practical recommendations proposed. In addition, directions for future research in this fertile area provided.

Keywords: chaos theory, oil and gas, cost overruns, megaprojects

Procedia PDF Downloads 527
1911 Speech Impact Realization via Manipulative Argumentation Techniques in Modern American Political Discourse

Authors: Zarine Avetisyan

Abstract:

Paper presents the discussion of scholars concerning speech impact, peculiarities of its realization, speech strategies, and techniques. Departing from the viewpoints of many prominent linguists, the paper suggests manipulative argumentation be viewed as a most pervasive speech strategy with a certain set of techniques which are to be found in modern American political discourse. The precedence of their occurrence allows us to regard them as pragmatic patterns of speech impact realization in effective public speaking.

Keywords: speech impact, manipulative argumentation, political discourse, technique

Procedia PDF Downloads 471
1910 The Effect of Malaysia’s Outward FDI on Manufacturing Exports

Authors: Teo Yen Nee, Tham Siew Yean, Andrew Kam Jia Yi

Abstract:

There are growing concerns about the effect of increasing outward foreign direct investment (OFDI) from Malaysia. These concerns emerged when OFDI surpassed inward FDI for the first time in 2007 and in the subsequent years as well. From a theoretical point of view, the effect of OFDI on exports remains inconclusive depending on the types and/or motivations of investment. Therefore, the objective of this paper is to investigate the effect of Malaysia’s OFDI on manufacturing exports, using a reduced form exports model. The manufacturing data used in this study covered 24 manufacturing industries for the period 2003-2010. The manufacturing sector is the fourth largest sector invested by Malaysia’s OFDI abroad. However, this sector is chosen for this study because total manufacturing trade contributed significantly to Malaysia’s economy growth as reflected by its significant share in the country’s gross domestic product (138.7%) in 2013. Furthermore, Malaysia’s exports are dominated by manufacturing goods. Consequently, the drastic increase in OFDI added concerns about its impact on the country’s exports. Since OFDI activities are still relatively new in Malaysia, this study is exploratory in nature due to a lack of firm level data. Using industry level panel data, the value added of this paper is to meet the research gap by examining the effect of Malaysia’s outward FDI on manufacturing exports. Overall, the findings show that lagged inward FDI, technology development, and industry size are found to positive and significantly influence manufacturing exports as compared to other factors. The insignificant impact of OFDI on manufacturing exports suggests market seeking investment is the main form of OFDI from Malaysia and the destination markets are not served by exports before so that there are no new exports created or displacement of exports. While the results show that there is no need to worry about OFDI’s negative impact on exports, policies should be undertaken to encourage OFDI from Malaysia to create new exports for the country.

Keywords: OFDI, manufacturing industries, exports, Malaysia

Procedia PDF Downloads 344
1909 Generalized π-Armendariz Authentication Cryptosystem

Authors: Areej M. Abduldaim, Nadia M. G. Al-Saidi

Abstract:

Algebra is one of the important fields of mathematics. It concerns with the study and manipulation of mathematical symbols. It also concerns with the study of abstractions such as groups, rings, and fields. Due to the development of these abstractions, it is extended to consider other structures, such as vectors, matrices, and polynomials, which are non-numerical objects. Computer algebra is the implementation of algebraic methods as algorithms and computer programs. Recently, many algebraic cryptosystem protocols are based on non-commutative algebraic structures, such as authentication, key exchange, and encryption-decryption processes are adopted. Cryptography is the science that aimed at sending the information through public channels in such a way that only an authorized recipient can read it. Ring theory is the most attractive category of algebra in the area of cryptography. In this paper, we employ the algebraic structure called skew -Armendariz rings to design a neoteric algorithm for zero knowledge proof. The proposed protocol is established and illustrated through numerical example, and its soundness and completeness are proved.

Keywords: cryptosystem, identification, skew π-Armendariz rings, skew polynomial rings, zero knowledge protocol

Procedia PDF Downloads 183
1908 Use of Pragmatic Cues for Word Learning in Bilingual and Monolingual Children

Authors: Isabelle Lorge, Napoleon Katsos

Abstract:

BACKGROUND: Children growing up in a multilingual environment face challenges related to the need to monitor the speaker’s linguistic abilities, more frequent communication failures, and having to acquire a large number of words in a limited amount of time compared to monolinguals. As a result, bilingual learners may develop different word learning strategies, rely more on some strategies than others, and engage cognitive resources such as theory of mind and attention skills in different ways. HYPOTHESIS: The goal of our study is to investigate whether multilingual exposure leads to improvements in the ability to use pragmatic inference for word learning, i.e., to use speaker cues to derive their referring intentions, often by overcoming lower level salience effects. The speaker cues we identified as relevant are (a) use of a modifier with or without stress (‘the WET dax’ prompting the choice of the referent which has a dry counterpart), (b) referent extension (‘this is a kitten with a fep’ prompting the choice of the unique rather than shared object), (c) referent novelty (choosing novel action rather than novel object which has been manipulated already), (d) teacher versus random sampling (assuming the choice of specific examples for a novel word to be relevant to the extension of that new category), and finally (e) emotional affect (‘look at the figoo’ uttered in a sad or happy voice) . METHOD: To this end, we implemented on a touchscreen computer a task corresponding to each of the cues above, where the child had to pick the referent of a novel word. These word learning tasks (a), (b), (c), (d) and (e) were adapted from previous word learning studies. 113 children have been tested (54 reception and 59 year 1, ranging from 4 to 6 years old) in a London primary school. Bilingual or monolingual status and other relevant information (age of onset, proficiency, literacy for bilinguals) is ascertained through language questionnaires from parents (34 out of 113 received to date). While we do not yet have the data that will allow us to test for effect of bilingualism, we can already see that performances are far from approaching ceiling in any of the tasks. In some cases the children’s performances radically differ from adults’ in a qualitative way, which means that there is scope for quantitative and qualitative effects to arise between language groups. The findings should contribute to explain the puzzling speed and efficiency that bilinguals demonstrate in acquiring competence in two languages.

Keywords: bilingualism, pragmatics, word learning, attention

Procedia PDF Downloads 109
1907 Ageing Patterns and Concerns in the Arabian Gulf: A Systematic Review

Authors: Asharaf Abdul Salam

Abstract:

Arabian Gulf countries have norms and rules different from others: having an exodus of male immigrant labor contract holders of age 20-60 years as a floating population. Such a demographic scenario camouflages population ageing. However, it is observed on examining vigilantly, not only in the native population but also in the general population. This research on population ageing in the Arabian Gulf examines ageing scenario and concerns through analyses of international databases (US Census Bureau and United Nations) and national level databases (Censuses and Surveys) apart from a review of published research. Transitions in demography and epidemiology lead to gains in life expectancy and thereby reductions in fertility, leading to ageing of the population in the region. Even after bringing adult immigrants, indices and age pyramids show an increasing ageing trend in the total population, demonstrating an ageing workforce. Besides, the exclusive native population analysis reveals a trend of expansive pyramids (pre-transitional stage) turning to constrictive (transition stage) and cylindrical (post-transition stage) shapes. Age-based indices such as the index of ageing, age dependency ratio, and median age confirm this trend. While the feminine nature of ageing is vivid, gains in life expectancy and causes of death in old age, indicating co-morbidity compression, are concerns to ageing. Preparations are in demand to cope with ageing from different dimensions, as explained in the United Nations Plans of Action. A strategy of strengthening informal care with supportive semi-formal and supplementary formal care networks would alleviate this crisis associated with population ageing.

Keywords: total versus native population, indices of ageing, age pyramids, feminine nature, comorbidity compression, strategic interventions

Procedia PDF Downloads 62
1906 An Investigation of Food Quality and Risks in Thailand: A Case of Inbound Senior Tourists

Authors: Kevin Wongleedee

Abstract:

Food quality and risks are major concerns for inbound senior tourists when visiting tourist destinations in Thailand. The purposes of this study were to investigate food quality and risks perceived by inbound senior tourists. This paper drew upon data collection from an inbound senior tourist survey conducted in Thailand during summer 2013. Summer time in Thailand is a high season for inbound tourists. It is also a high risk period in which a variety food safety issues and incidents have often occurred. The survey was structured primarily to obtain inbound senior tourists’ concerns toward a variety of food quality and risks they encountered during their trip in Thailand. A total of 400 inbound senior tourists were elicited as data input for mean and standard deviation. The findings revealed that inbound tourists rated the overall food quality at a high level and the three most important perceived food risks were 1) unclean physical cooking facility, 2) toxic chemical handling, and 3) unclean water.

Keywords: food quality, inbound senior tourists, risks, Thailand

Procedia PDF Downloads 361
1905 Cybersecurity Protection Structures: The Case of Lesotho

Authors: N. N. Mosola, K. F. Moeketsi, R. Sehobai, N. Pule

Abstract:

The Internet brings increasing use of Information and Communications Technology (ICT) services and facilities. Consequently, new computing paradigms emerge to provide services over the Internet. Although there are several benefits stemming from these services, they pose several risks inherited from the Internet. For example, cybercrime, identity theft, malware etc. To thwart these risks, this paper proposes a holistic approach. This approach involves multidisciplinary interactions. The paper proposes a top-down and bottom-up approach to deal with cyber security concerns in developing countries. These concerns range from regulatory and legislative areas, cyber awareness, research and development, technical dimensions etc. The main focus areas are highlighted and a cybersecurity model solution is proposed. The paper concludes by combining all relevant solutions into a proposed cybersecurity model to assist developing countries in enhancing a cyber-safe environment to instill and promote a culture of cybersecurity.

Keywords: cybercrime, cybersecurity, computer emergency response team, computer security incident response team

Procedia PDF Downloads 126