Search results for: the Jordanian civil code
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 2323

Search results for: the Jordanian civil code

2263 The Prevalence of Musculoskeletal Disorders and Their Associated Factors among Nurses in Jordan

Authors: Khader A. Almhdawi, Hassan Alrabbaie

Abstract:

Background: Musculoskeletal disorders (MSDs) represent a significant challenge for registered nurses. To our best knowledge, there is no published study that investigated the prevalence of MSDs among nurses and their associated factors comprehensively in Jordan. This study aimed to find the prevalence of MSDs, their possible predictors among registered nurses in Jordanian hospitals. Methods: A cross-sectional design was used. Outcome measures included Nordic Musculoskeletal Questioner (NMQ), Depression Anxiety Stress Scale (DASS), Pittsburgh Sleep Quality Index (PSQI), IPAQ, and sociodemographic data. Prevalence of musculoskeletal complaints was reported using descriptive analysis. Logistic regression analyses were conducted to identify predictors of MSDs. Results: 597 nurses from different hospitals in Jordan participated in this study. Reported MSDs prevalence was the highest at neck (61.1%), followed by upper back (47.2%), shoulder (46.7%), wrist and hands (27.3%), and elbow (13.9%). Significant predictors of MSDs among Jordanian nurses included: being a female, poor sleep quality, high physical activity levels, poor ergonomics, increased workload, and mental stress. Conclusion: This study showed a high prevalence of MSDs among Jordanian nurses and identified their significant predictors. Future studies are needed to investigate the progressive nature of MSDs and their effective treatment strategies.

Keywords: musculoskeletal disorders, nursing, ergonomic, occupational stress

Procedia PDF Downloads 66
2262 Colour Quick Response Code with High Damage Resistance Capability

Authors: Minh Nguyen

Abstract:

Today, QR or Quick Response Codes are prevalent, and mobile/smart devices can efficiently read and understand them. Therefore, we can see their appearance in many areas, such as storing web pages/websites, business phone numbers, redirecting to an app download, business location, social media. The popularity of the QR Code is mainly because of its many advantages, such as it can hold a good amount of information, is small, easy to scan and read by a general RGB camera, and it can still work with some damages on its surface. However, there are still some issues. For instance, some areas needed to be kept untouched for its successful decode (e.g., the “Finder Patterns,” the “Quiet Zone,” etc.), the capability of built-in auto-correction is not robust enough, and it is not flexible enough for many application such as Augment Reality (AR). We proposed a new Colour Quick Response Code that has several advantages over the original ones: (1) there is no untouchable area, (2) it allows up to 40% of the entire code area to be damaged, (3) it is more beneficial for Augmented Reality applications, and (4) it is back-compatible and readable by available QR Code scanners such as Pyzbar. From our experience, our Colour Quick Response Code is significantly more flexible on damage compared to the original QR Code. Our code is believed to be suitable in situations where standard 2D Barcodes fail to work, such as curved and shiny surfaces, for instance, medical blood test sample tubes and syringes.

Keywords: QR code, computer vision, image processing, 2D barcode

Procedia PDF Downloads 91
2261 The Dynamics of Jordanian Socio-Political Satire after the Arab Spring

Authors: Yousef Barahmeh

Abstract:

There is a wide cultural belief that Jordanians are po-faced and unable to produce humour and satire. However, in the light of the harbingers of the Arab Spring in the early 2011, socio-political satire has thrived notably in social media as a rigorous act of critique and dissent against the institutionalized discourse. This paper seeks to explore the case study of Ahmad Hassan al-Zou’bi’s satirical articles and Facebook posts in the context of theories of satire and digital politics. Al-Zou’bi is the most prominent and prolific Jordanian satirist who rose to prominence after the Arab Spring. The analysis shows that his satirical articles provide a vintage point to the rhetoric behind the socio-political and economic reform programs as much as the adverse impact of neoliberal governments in the modern history of Jordan.

Keywords: Arab Spring, digital politics, humour and socio-political satire

Procedia PDF Downloads 426
2260 Counterfeit Product Detection Using Block Chain

Authors: Sharanya C. H., Pragathi M., Vathsala R. S., Theja K. V., Yashaswini S.

Abstract:

Identifying counterfeit products have become increasingly important in the product manufacturing industries in recent decades. This current ongoing product issue of counterfeiting has an impact on company sales and profits. To address the aforementioned issue, a functional blockchain technology was implemented, which effectively prevents the product from being counterfeited. By utilizing the blockchain technology, consumers are no longer required to rely on third parties to determine the authenticity of the product being purchased. Blockchain is a distributed database that stores data records known as blocks and several databases known as chains across various networks. Counterfeit products are identified using a QR code reader, and the product's QR code is linked to the blockchain management system. It compares the unique code obtained from the customer to the stored unique code to determine whether or not the product is original.

Keywords: blockchain, ethereum, QR code

Procedia PDF Downloads 145
2259 The Leadership Criterion: Challenges in Pursuing Excellence in the Jordanian Public Sector

Authors: Shaker Aladwan, Paul Forrester

Abstract:

This paper explores the challenges that face leaders when implementing business excellence programmes in the Jordanian public sector. The study adopted a content analysis approach to analyse the excellence assessment reports that have been produced by the King Abdullah II Centre for Excellence (KACE). The sample comprises ten public organisations which have participated in the King Abdullah Award for Excellence (KAA) more than once and acknowledge in their reports that they have failed to achieve satisfactory results. The key challenges to the implementation of leadership criteria in the public sector in Jordan were found to be poor strategic planning, lack of employee empowerment, weaknesses in benchmarking performance, a lack of financial resources, poor integration and coordination, and poor measurement system: This study proposes a conceptual model for the as assessment of challenges that face managers when seeking to implement excellence in leadership in the Jordanian public sector. Theoretically, this paper fills context gaps in the excellence literature in general and organisational excellence in the public sector in particular. Leadership challenges in the public sector are generally widely studied, but it is important to gain a better understanding of how these challenges can be overcome. In comparison to many existing studies, this research has provided specific and detailed insights these organisational excellence challenges in the public sector and provides a conceptual model for use by other researchers into the future.

Keywords: leadership criterion, organisational excellence, challenges, quality awards, public sector, Jordan

Procedia PDF Downloads 362
2258 On the Construction of Some Optimal Binary Linear Codes

Authors: Skezeer John B. Paz, Ederlina G. Nocon

Abstract:

Finding an optimal binary linear code is a central problem in coding theory. A binary linear code C = [n, k, d] is called optimal if there is no linear code with higher minimum distance d given the length n and the dimension k. There are bounds giving limits for the minimum distance d of a linear code of fixed length n and dimension k. The lower bound which can be taken by construction process tells that there is a known linear code having this minimum distance. The upper bound is given by theoretic results such as Griesmer bound. One way to find an optimal binary linear code is to make the lower bound of d equal to its higher bound. That is, to construct a binary linear code which achieves the highest possible value of its minimum distance d, given n and k. Some optimal binary linear codes were presented by Andries Brouwer in his published table on bounds of the minimum distance d of binary linear codes for 1 ≤ n ≤ 256 and k ≤ n. This was further improved by Markus Grassl by giving a detailed construction process for each code exhibiting the lower bound. In this paper, we construct new optimal binary linear codes by using some construction processes on existing binary linear codes. Particularly, we developed an algorithm applied to the codes already constructed to extend the list of optimal binary linear codes up to 257 ≤ n ≤ 300 for k ≤ 7.

Keywords: bounds of linear codes, Griesmer bound, construction of linear codes, optimal binary linear codes

Procedia PDF Downloads 719
2257 Challenges in Teaching Code of Ethics and Professional Conduct

Authors: Rasika Dayarathna

Abstract:

Computing has reached every corner of our lives in many forms. The Internet, particularly Social Media, Artificial Intelligence, are prominent among them. As a result, computing has changed our lives and it is expected that severe changes will take place in the coming years. It has introduced a new set of ethical challenges and amplified the existing ethical challenges. It is the duty of everyone involved from conceptualizing, designing, implementing, deploying, and using to follow generally accepted practices in order to avoid or minimize harm and improve the quality of life. Since computing in various forms mentioned above has a significant impact on our lives, various codes of conduct and standards have been introduced. Among many, the ACM (Association of Computing Machinery) Code of Ethics and Professional Conduct is a leading one. This was drafted for everyone, including aspiring computing professionals. However, teaching a code of conduct for aspiring computing professionals is very challenging since this universal code needs to be taught for young computing professionals in a local setting where there are value mismatches and exposure to information systems. This paper discusses the importance of teaching the code, how to overcome the challenges, and suggestions to improve the code to make it more appealing and buying in. It is expected that the improved approach would contribute to improving the quality of life.

Keywords: code of conduct, professionalism, ethics, code of ethics, ethics education, moral development

Procedia PDF Downloads 152
2256 The Right to State Lands: A Case Study of a Squatter Community in Egypt

Authors: Salwa Salman

Abstract:

On February 2016, Egypt’s President Abdel Fattah Al-Sisi ordered the former Prime Minister, Ibrahim Mehleb, to establish a committee responsible for retrieving looted state lands or providing squatters with land titles according to their individual cases. The specificity of desert lands emerges from its unique position in both Islamic law and Egypt’s Civil Code. In Egypt, desert lands can be transferred to private ownership through peaceful occupation and cultivation. This study explores the (re-) conceptualization of land rights, state territoriality, and sovereignty as a part of an emerging narrative on informal land tenure. Through the lens of an informal settlement, the study employs methodological insights from studies in the anthropology of development and their interpretation of Foucauldian discourse analysis to examine official representations on squatting over state lands and put them in conversation with individual narratives on land ownership and dispossession. It also employs Bruno Latour’s actor-network theory to explore the development of social networks through primary land contracts and informal local resource management.

Keywords: State lands, squatter community, Islamic law, Egypt’s Civil Code

Procedia PDF Downloads 138
2255 A Corpus-Based Analysis on Code-Mixing Features in Mandarin-English Bilingual Children in Singapore

Authors: Xunan Huang, Caicai Zhang

Abstract:

This paper investigated the code-mixing features in Mandarin-English bilingual children in Singapore. First, it examined whether the code-mixing rate was different in Mandarin Chinese and English contexts. Second, it explored the syntactic categories of code-mixing in Singapore bilingual children. Moreover, this study investigated whether morphological information was preserved when inserting syntactic components into the matrix language. Data are derived from the Singapore Bilingual Corpus, in which the recordings and transcriptions of sixty English-Mandarin 5-to-6-year-old children were preserved for analysis. Results indicated that the rate of code-mixing was asymmetrical in the two language contexts, with the rate being significantly higher in the Mandarin context than that in the English context. The asymmetry is related to language dominance in that children are more likely to code-mix when using their nondominant language. Concerning the syntactic categories of code-mixing words in the Singaporean bilingual children, we found that noun-mixing, verb-mixing, and adjective-mixing are the three most frequently used categories in code-mixing in the Mandarin context. This pattern mirrors the syntactic categories of code-mixing in the Cantonese context in Cantonese-English bilingual children, and the general trend observed in lexical borrowing. Third, our results also indicated that English vocabularies that carry morphological information are embedded in bare forms in the Mandarin context. These findings shed light upon how bilingual children take advantage of the two languages in mixed utterances in a bilingual environment.

Keywords: bilingual children, code-mixing, English, Mandarin Chinese

Procedia PDF Downloads 186
2254 The Effect of the Vernacular on Code-Switching Hebrew into Palestinian Arabic

Authors: Ward Makhoul

Abstract:

Code-switching (CS) is known as a ubiquitous phenomenon in multilingual societies and countries. Vernacular Palestinian Arabic (PA) variety spoken in Israel is among these languages, informally used for day-to-day conversations only. Such conversations appear to contain code-switched instances from Hebrew, the formal and dominant language of the country, even in settings where the need for CS seems to be unnecessary. This study examines the CS practices in PA and investigates the reason behind these CS instances in controlled settings and the correlation between bilingual dominance and CS. In the production-task interviews and Bilingual Language Profile test (BLP), there was a correlation between language dominance and CS; 13 participants were interviewed to elicit and analyze natural speech-containing CS instances, along with undergoing a BLP test. The acceptability judgment task observed the limits and boundaries of different code-switched linguistic structures.

Keywords: code-switching, Hebrew, Palestinian-Arabic, vernacular

Procedia PDF Downloads 83
2253 Supply Chain of Energy Resources and Its Alternatives Due to the Arab Spring: The Case of Egyptian Natural Gas Flow to Jordan

Authors: Moh’d Anwer Al-Shboul

Abstract:

The year 2011 was a challenging year for Jordanian economy, which felt a variety of effects from the Arab Spring which took place in neighboring countries. Since February, 5th 2012, the Arab Gas Supply Pipeline, which carries natural gas from Egypt through the Sinai Peninsula and to Jordan and Israel, has been attacked more than 39 times. Jordan imported about 80 percent of its necessity of natural gas (about 250 million cubic feet of natural gas per day) from Egypt to generate particularly electricity, with the reminder of being produced locally. Jordan has utilized multiple alternatives to address the interruption of available natural gas supply from Egypt. The Jordanian distributed power plants now rely on the use of heavy fuel oil and diesel for electricity generation, in this case, it costs Jordan about four times than natural gas. The substitution of Egyptian natural gas supplies by fuel oil and diesel, coupled with the 32 percent rise in global fuel prices, has increased Jordan’s energy import bill by over 50 percent in 2011, reaching more than 16 percent of the 2011 GDP. The increase in the cost of electricity generation pushed the Jordanian economy to borrow from multiple internal and external resource channels, thus increasing the public debt. The Jordanian government’s short-term solution to the reduced natural gas supply from Egypt was alternatively purchasing the necessary quantities from some Gulf countries such as Qatar and/or Saudi Arabia, which can be imported with two possible methods. The first method is to rent a ship equipped with a liquefied natural gas (LNG) terminal, which is currently operating. The second method requires equipping the Aqaba port with an LNG terminal, which also currently is operating. In the long-term, a viable solution to depending on importing expensive and often unreliable natural gas supplies from surrounding countries is to depend more heavily on renewable supply energy, including solar, wind, and water energy.

Keywords: energy supply resources, Arab spring, liquefied natural gas, pipeline, Jordan

Procedia PDF Downloads 110
2252 The Prevalence of Obesity among a Huge Sample of 5-20 Years Old Jordanian Children and Adolescents Based on CDC Criteria

Authors: Walid Al-Qerem, Ruba Zumot

Abstract:

Background: The rise of obesity among children and adolescents remains a primary challenge for healthcare providers globally and in the Middle East. The aim of the present study is to determine the prevalence of obesity among 5-20 years old Jordanians based on CDC criteria. Method: A total of 5722 Jordanians (37% males; 63% females) aged 5-20 years data were retrieved from the Jordanian Ministry of Health electronic database (Hakeem). As per the CDC selection criteria, the chosen data pertains exclusively to healthy Jordanian children and adolescents who are medically sound, not suffering from health conditions, and not undergoing any treatments that could hinder normal growth patterns, such as severe infection, chronic kidney disease (CKD), Down’s syndrome, attention deficit hyperactivity disorder, cancer, heart disease, lung disease, cystic fibrosis, Crohn’s disease, type 1 diabetes, hormonal disturbances, any stress-related conditions, hormonal therapy such as corticosteroids, Growth hormones (GHS) or gonadotropin-releasing hormone agonists, insulin, and amphetamines or any other stimulants. In addition, participants with missing or invalid data values for anthropometric measurements were excluded from the study. Weight for age and body mass index for age were analyzed comparatively for Jordanian children and adolescents against the international growth standards. The Z-score for each record was computed based on CDC equations. As per CDC classifications, BMI for age percentiles, values ≥85th and < 95th are classified as overweight, and value at ≥ 95th is classified as obesity. Results: The average age of the evaluated sample was 12.33 ±4.39 years (10.79 ±3.39 for males and 13.23 ± 4.66 for females). The mean weight for males and females were 33.16±14.17 Kg and 133.54±17.17 cm for males, 43.86 ±18.82 Kg, and 142.19±18.35 for females, while for BMI the mean was for boys and girls 17.81±3.88 and 20.52±5.03 respectively. The results indicated that based on CDC criteria, 8.9% of males were classified as children/adolescents with overweight, and 9.7% were classified as children/adolescents with obesity, while in females, 17.8% were classified as children/adolescents with overweight and 10.2% were classified as children/adolescents with obesity. Discussion: The high prevalence of obesity reported in the present study emphasizes the importance of applying different strategies to prevent childhood obesity, including encouraging physical activity, promoting healthier food options, and behavioral changes. Conclusion: The results presented in this study indicated the high prevalence of overweight/obesity among Jordanian adolescents and children, which must be tagged by healthcare planners and providers.

Keywords: CDC, obesity, childhood, Jordan

Procedia PDF Downloads 23
2251 Energy Efficiency in Hot Arid Climates Code Compliance and Enforcement for Residential Buildings

Authors: Mohamed Edesy, Carlo Cecere

Abstract:

This paper is a part of an ongoing research that proposes energy strategies for residential buildings in hot arid climates. In Egypt, the residential sector is dominated by increase in consumption rates annually. A building energy efficiency code was introduced by the government in 2005; it indicates minimum design and application requirements for residential buildings. Submission is mandatory and should lead to about 20% energy savings with an increase in comfort levels. However, compliance is almost nonexistent, electricity is subsidized and incentives to adopt energy efficient patterns are very low. This work presents an overview of the code and analyzes the impact of its introduction on different sectors. It analyses compliance barriers and indicates challenges that stand in the way of a realistic enforcement. It proposes an action plan for immediate code enforcement, updating current code to include retrofit, and development of rating systems for buildings. This work presents a broad national plan for energy efficiency empowerment in the residential sector.

Keywords: energy efficiency, housing, energy policies, code enforcement

Procedia PDF Downloads 311
2250 How Does Spirituality Manifest in the Lives of Jordanian Patients in End Stage Renal Failure: A Phenomenological Study

Authors: A. Tamimi, S. Greatrex-White, A. Narayanasamy

Abstract:

Background: Spirituality has been increasingly acknowledged in the nursing literature as an important element of holistic patient care. To date there have been numerous studies investigating the meaning of spirituality in Western cultures. Spirituality in Middle Eastern countries however remains under-researched. We will present a study which aimed to address this gap. Aim: The study aimed to explore how spirituality manifests in the lives of Jordanian End Stage Renal Failure (ESRF) patients. Methodology and Method: A hermeneutic phenomenological approach was adopted informed by the philosophy of Martin Heidegger. Participants (n=27) were recruited from four different dialysis units: in a public hospital, a private hospital, an educational hospital and a refugee’s hospital in Jordan. Data was collected through in-depth unstructured interviews. Data Analysis: Analysis was guided by the tenets of hermeneutic phenomenology namely: gaining immediate sense of what was said both during and after each interview, transcribing data verbatim, translating interviews into the English language, intensive reading and re-reading, seeking meaning units by line to line coding, developing situated structures (how spirituality was manifest in each text), developing a general structure from the individual situated structures (how the phenomenon ‘spirituality’ comes into being). Findings: Three major themes emerged from analysis: Religion, Relationships and Desperation. We will argue that a ‘secular’ concept of spirituality had no meaning for the participants in the study. Spirituality is fundamentally part of religion and vice versa. Discussion: The findings may have consequences for the use of spirituality in multi-cultural settings in Western countries. Additionally, findings highlighted an important emphasis on the practice of spirituality, often underestimated in previous literature for Arab-Muslim Jordanian patients. Conclusion: The study findings contribute to the existing gap in knowledge regarding how Arab-Muslim Jordanian ESRF patients experience spirituality during their illness. It provides valuable insights into the importance of spirituality for this patient group and suggests how nurses, educators and policy makers might help address ESRF patients’ spiritual needs and provide appropriate spiritual care. We suggest the findings may have relevance beyond the Jordanian context in educating nurses’ on the importance of appreciating the religious dimension of spirituality.

Keywords: spirituality, nursing, muslim, Jordan

Procedia PDF Downloads 414
2249 Simulation of Hamming Coding and Decoding for Microcontroller Radiation Hardening

Authors: Rehab I. Abdul Rahman, Mazhar B. Tayel

Abstract:

This paper presents a method of hardening the 8051 microcontroller, that able to assure reliable operation in the presence of bit flips caused by radiation. Aiming at avoiding such faults in the 8051 microcontroller, Hamming code protection was used in its SRAM memory and registers. A VHDL code and its simulation have been used for this hamming code protection.

Keywords: radiation, hardening, bitflip, hamming

Procedia PDF Downloads 473
2248 The Translation of Code-Switching in African Literature: Comparing the Two German Translations of Ngugi Wa Thiongo’s "Petals of Blood"

Authors: Omotayo Olalere

Abstract:

The relevance of code-switching for intercultural communication through literary translation cannot be overemphasized. The translation of code-switching and its implications for translations studies have been studied in the context of African literature. In these cases, code-switching was examined in the more general terms of its usage in source text and not particularly in Ngugi’s novels and its translations. In addition, the functions of translation and code-switching in the lyrics of some popular African songs have been studied, but this study is related more with oral performance than with written literature. As such, little has been done on the German translation of code-switching in African works. This study intends to fill this lacuna by examining the concept of code-switching in the German translations in Ngugi’s Petals of Blood. The aim is to highlight the significance of code-switching as a phenomenon in this African (Ngugi’s) novel written in English and to also focus on its representation in the two German translations. The target texts to be used are Verbrannte Blueten and Land der flammenden Blueten. “Abrogration“ as a concept will play an important role in the analysis of the data. Findings will show that the ideology of a translator plays a huge role in representing the concept of “abrogration” in the translation of code-switching in the selected source text. The study will contribute to knowledge in translation studies by bringing to limelight the need to foreground aspects of language contact in translation theory and practice, particularly in the African context. Relevant translation theories adopted for the study include Bandia’s (2008) postcolonial theory of translation and Snell-Hornby”s (1988) cultural translation theory.

Keywords: code switching, german translation, ngugi wa thiong’o, petals of blood

Procedia PDF Downloads 48
2247 Effects of Level Densities and Those of a-Parameter in the Framework of Preequilibrium Model for 63,65Cu(n,xp) Reactions in Neutrons at 9 to 15 MeV

Authors: L. Yettou

Abstract:

In this study, the calculations of proton emission spectra produced by 63Cu(n,xp) and 65Cu(n,xp) reactions are used in the framework of preequilibrium models using the EMPIRE code and TALYS code. Exciton Model predidtions combined with the Kalbach angular distribution systematics and the Hybrid Monte Carlo Simulation (HMS) were used. The effects of levels densities and those of a-parameter have been investigated for our calculations. The comparison with experimental data shows clear improvement over the Exciton Model and HMS calculations.

Keywords: Preequilibrium models , level density, level density a-parameter., Empire code, Talys code.

Procedia PDF Downloads 102
2246 A Blending Analysis of Metaphors and Metonymies Used to Depict the Deal of the Century by Jordanian Cartoonists

Authors: Aseel Zibin, Abdel Rahman Altakhaineh

Abstract:

This study analyses 30 cartoons depicting THE DEAL OF THE CENTURY as envisaged by two Jordanian cartoonists, namely, EmadHajjaj and Osama Hajjaj. Conceptual Blending Theory (CBT) and Multimodal Metaphor Theory (MMT) are adopted as a theoretical framework to interpret the metaphors and metonymies used in the target cartoons. The results reveal that the target domain THE DEAL OF THE CENTURY was conceptualized mainly through layered metaphors that have metonymic basis and event metaphors\allegories. Specifically, 6 groups were identified: OBJECT or a situation involving OBJECTS, situations involving HUMANS\HYBRIDS of HUMANS and OBJECTS, an ANIMAL OR situation involving an ANIMAL, hybrids of WEAPONS and humans, and event metaphors used to build a story\allegory. The target domain was also depicted via event metaphors used to build a story; some of which are embedded in the Jordanian culture, while others could be perceivable cross-culturally. The results also demonstrate that the most widely used configurations to construe the metaphors was the pictorial source–verbal target in line with Lan and Zuo (2016); the motivation was probably the greater conceptual density and concreteness of visual representation since the target is better captured verbally because of its abstractness. The use of cross-modal mappings of this type was attributed to the abstractness of the target domain, THE DEAL OF THE CENTURY, which makes it more construable via verbal cues rather than visual ones. In contrast, the source domains used were mainly concrete and thus perceivable pictorially rather than verbally.

Keywords: semiotics, cognitive semantics, metaphor, culture, blending, cartoon

Procedia PDF Downloads 116
2245 Halal Authentication for Some Product Collected from Jordanian Market Using Real-Time PCR

Authors: Omar S. Sharaf

Abstract:

The mitochondrial 12s rRNA (mt-12s rDNA) gene for pig-specific was developed to detect material from pork species in different products collected from Jordanian market. The amplification PCR products of 359 bp and 531 bp were successfully amplified from the cyt b gene of pig the amplification product using mt-12S rDNA gene were successfully produced a single band with a molecular size of 456 bp. In the present work, the PCR amplification of mtDNA of cytochrome b has been shown as a suitable tool for rapid detection of pig DNA. 100 samples from different dairy, gelatin and chocolate based products and 50 samples from baby food formula were collected and tested to a presence of any pig derivatives. It was found that 10% of chocolate based products, 12% of gelatin and 56% from dairy products and 5.2% from baby food formula showed single band from mt-12S rDNA gene.

Keywords: halal food, baby infant formula, chocolate based products, PCR, Jordan

Procedia PDF Downloads 508
2244 Public Administrators, Code of Conduct and the Nigerian Society

Authors: Mahmud Adam, Inuwa Abdu Ibrahim

Abstract:

The issue of ethics and values of public office holders in Nigerian has been and still is a matter of great mystery. Their behaviours in the discharge of their official responsibility remain unsatisfactory. The paper looks at the code of conduct and the societal values with which the Nigerian Administrators function today. Secondary sources of data were used. In conclusion, a change in attitude, reorientation, harsh and enforceable laws is required to reverse the trend.

Keywords: society, administrators, code of conduct, Nigeria

Procedia PDF Downloads 312
2243 Hybrid Obfuscation Technique for Reverse Engineering Problem

Authors: Asma’a Mahfoud, Abu Bakar Md. Sultan, Abdul Azim Abd, Norhayati Mohd Ali, Novia Admodisastro

Abstract:

Obfuscation is a practice to make something difficult and complicated. Programming code is ordinarily obfuscated to protect the intellectual property (IP) and prevent the attacker from reverse engineering (RE) a copyrighted software program. Obfuscation may involve encrypting some or all the code, transforming out potentially revealing data, renaming useful classes and variables (identifiers) names to meaningless labels, or adding unused or meaningless code to an application binary. Obfuscation techniques were not performing effectively recently as the reversing tools are able to break the obfuscated code. We propose in this paper a hybrid obfuscation technique that contains three approaches of renaming. Experimentation was conducted to test the effectiveness of the proposed technique. The experimentation has presented a promising result, where the reversing tools were not able to read the code.

Keywords: intellectual property, obfuscation, software security, reverse engineering

Procedia PDF Downloads 120
2242 Comparison of High Speed Railway Bride Foundation Design

Authors: Hussein Yousif Aziz

Abstract:

This paper discussed the design and analysis of bridge foundation subjected to load of train with three codes, namely AASHTO code, British Standard BS Code 8004 (1986), and Chinese code (TB10002.5-2005).The study focused on the design and analysis of bridge’s foundation manually with the three codes and found which code is better for design and controls the problem of high settlement due to the applied loads. The results showed the Chinese codes are costly that the number of reinforcement bars in the pile cap and piles is more than those with AASHTO code and BS code with the same dimensions. Settlement of the bridge was calculated depending on the data collected from the project site. The vertical ultimate bearing capacity of single pile for three codes is also discussed. Other analyses by using the two-dimensional Plaxis program and other programs like SAP2000 14, PROKON many parameters are calculated. The maximum values of the vertical displacement are close to the calculated ones. The results indicate that the AASHTO code is economics and safer in the bearing capacity of single pile. The purpose of this project is to study out the pier on the basis of the design of the pile foundation. There is a 32m simply supported beam of box section on top of the structure. The pier of bridge is round-type. The main component of the design is to calculate pile foundation and the settlement. According to the related data, we choose 1.0m in diameter bored pile of 48m. The pile is laid out in the rectangular pile cap. The dimension of the cap is 12m 9 m. Because of the interaction factors of pile groups, the load-bearing capacity of simple pile must be checked, the punching resistance of pile cap, the shearing strength of pile cap, and the part in bending of pile cap, all of them are very important to the structure stability. Also, checking soft sub-bearing capacity is necessary under the pile foundation. This project provides a deeper analysis and comparison about pile foundation design schemes. Firstly, here are brief instructions of the construction situation about the Bridge. With the actual construction geological features and the upper load on the Bridge, this paper analyzes the bearing capacity and settlement of single pile. In the paper the Equivalent Pier Method is used to calculate and analyze settlements of the piles.

Keywords: pile foundation, settlement, bearing capacity, civil engineering

Procedia PDF Downloads 389
2241 The Shona and isiXhosa Linguistic Matrimony Through Code-Switching in Cape Town

Authors: John Mambambo

Abstract:

Debates on the link between Bantu languages are often epitomized by animated theoretical critiques, including the language zoning and groupings. This evaluative, qualitative inquiry hovers above theoretical critiques to offer the sparsely studied ChiShona and isiXhosa code-switching nexus, a yawning gap in scholarship. Using interviews, questionnaires and observations, data germane to the study were collected from a purposively selected group of Shona speakers who had resided in Xhosa-speaking communities for not less than a year. Deploying Myers-Scotton’s Markedness theory, the paper gazes into the pragmatic linguistic affinity that is affirmed through the Shona-Xhosa code-switching in Cape Town. The assorted social variables motivating bilingual speakers to code-switch in Cape Town are also explored in this study. The study unveils that Shona speakers are motivated to code-switch by the linguistic affinity between ChiShona and isiXhosa. Other socio-political justifications also give an impetus to this phenomenon. The Matrix Language Frame Model affirms that ChiShona is the base while isiXhosa is the embedded language during code-switching. This paper is a momentous advancement of the extant literature on code-switching. It is a unique contribution to the nexus between ChiShona and isiXhosa languages, providing fresh insights into the discourse on African language comparison studies.

Keywords: code-switching, chishona, isiXhosa, bilingualism

Procedia PDF Downloads 79
2240 Lived Experience of Breast Cancer for Arab Muslim Women

Authors: Nesreen M. Alqaissi

Abstract:

Little is known about the lived experiences of breast cancer among Arab Muslim women. The researcher used a qualitative interpretive phenomenological research design to explore the lived experiences of breast cancer as described by Jordanian Muslim women. A purposive sample of 20 women with breast cancer was recruited. Data were collected utilizing individual semi-structured interviews, and analyzed using Heideggerian Hermeneutical methodology. Results: Five related themes and one constitutive pattern: (a) breast cancer means death; (b) matriarchal family members as important source of support; (c) spirituality as a way to live and survive breast cancer; (d) concealing cancer experiences to protect self and families; (e) physicians as protectors and treatment decision makers; (f) the constitutive pattern: culture influencing Jordanian women experiences with breast cancer. In conclusion, researchers and healthcare providers should consider the influence of culture, spirituality, and families, when caring for women with breast cancer from Jordan.

Keywords: breast cancer, Arab Muslim, Jordan, lived experiences, spirituality, culture

Procedia PDF Downloads 466
2239 Developing a Modified Version of KIVA-3V, Enabling Gaseous Injections

Authors: Hossein Keshtkar, Ali Nasiri Toosi

Abstract:

With the growing concerns about gasoline environmental pollution and also the need for a more widely available fuel source, natural gas is finding its way to the automotive engines. But before this could happen industrially, simulations of natural gas direct injection need to take place to maximize and optimize power output. KIVA is one of the most powerful tools when it comes to engine simulation. Widely accepted by both researchers and the industry, KIVA an open-source code, offers great in-depth simulation and analyzation. KIVA can compute complex phenomena’s which can occur inside the chamber before, whilst and after ignition. One downside to KIVA, is its in-capability of simulating gaseous injections, making it useful for only liquidized fuel. In this study, we developed a numerical code, to enable the simulation of gaseous injection within the KIVA code. By introducing our code as a subroutine, we modified the original KIVA program. To ensure the correct application of gaseous fuel injection using our modified KIVA code, we simulated two different cases and compared them with their experimental data. We concluded our modified version of KIVA’s simulation results came in very close to those measured experimentally.

Keywords: gaseous injections, KIVA, natural gas direct injection, numerical code, simulation

Procedia PDF Downloads 249
2238 Key Success Factors and Enterprise Resource Planning Implementation in Higher Education Institutions: Multiple Case Studies of Jordanian Universities

Authors: Abdallah Abu Madi, Dongmei Cao, Alexeis Garcia-Perez, Qile He

Abstract:

The failure of Enterprise Resource Planning (ERP) implementation in higher education institutions (HEIs) worldwide is much higher in comparison to other sectors, such as banking or manufacturing, to our knowledge limited research has been conducted on this issue. To date, prior literature has identified some key success factors (KSFs) mostly either in the domain of information and system (IS) or in the industrial context. However, evidence of ERP implementation in the higher education sector has had little attention in the extant literature. Hence, this paper identifies and categories KSFs of ERP implementation in HEIs. Semi-structured face-to-face interviews were conducted with technicians and managers from three Jordanian HEIs. From these case studies, three new sector- and context-specific KSFs were identified and categorized according to two dimensions: organizational and technical. The first new KSF is the selection of the ERP system, which is an influential factor in the organizational dimension. Results show that an ERP solution that is suitable to one context may be disastrous in another. The second new KSF, which falls under the technical dimension, is the relationship between vendors and HEIs. This must be fair and impartial to enable successful decision-making and thus the achievement of pre-defined goals. Also within the technical dimension is the third factor: in-house maintenance. Once an appropriate system is selected and a strong relationship is established, the ERP system requires continuous maintenance for effective operation. HEIs should ensure that qualified IT support is in place and in-house to avoid excessive running expenses.

Keywords: Enterprise Resource Planning (ERP)implementation, key success factors, higher education institutions, Jordanian higher education

Procedia PDF Downloads 184
2237 Students' Willingness to Accept Virtual Lecturing Systems: An Empirical Study by Extending the UTAUT Model

Authors: Ahmed Shuhaiber

Abstract:

The explosion of the World Wide Web and the electronic trend of university teaching have transformed the learning style to become more learner-centred, Which has popularized the digital delivery of mediated lectures as an alternative or an adjunct to traditional lectures. Despite its potential and popularity, virtual lectures have not been adopted yet in Jordanian universities. This research aimed to fill this gap by studying the factors that influence student’s willingness to accept virtual lectures in one Jordanian University. A quantitative approach was followed by obtaining 216 survey responses and statistically applying the UTAUT model with some modifications. Results revealed that performance expectancy, effort expectancy, social influences and self-efficacy could significantly influence student’s attitudes towards virtual lectures. Additionally, facilitating conditions and attitudes towards virtual lectures were found with significant influence on student’s intention to take virtual lectures. Research implications and future work were specified afterwards.

Keywords: E-learning, student willingness, UTAUT, virtual Lectures, web-based learning systems

Procedia PDF Downloads 263
2236 Virtual Reality Based 3D Video Games and Speech-Lip Synchronization Superseding Algebraic Code Excited Linear Prediction

Authors: P. S. Jagadeesh Kumar, S. Meenakshi Sundaram, Wenli Hu, Yang Yung

Abstract:

In 3D video games, the dominance of production is unceasingly growing with a protruding level of affordability in terms of budget. Afterward, the automation of speech-lip synchronization technique is customarily onerous and has advanced a critical research subject in virtual reality based 3D video games. This paper presents one of these automatic tools, precisely riveted on the synchronization of the speech and the lip movement of the game characters. A robust and precise speech recognition segment that systematized with Algebraic Code Excited Linear Prediction method is developed which unconventionally delivers lip sync results. The Algebraic Code Excited Linear Prediction algorithm is constructed on that used in code-excited linear prediction, but Algebraic Code Excited Linear Prediction codebooks have an explicit algebraic structure levied upon them. This affords a quicker substitute to the software enactments of lip sync algorithms and thus advances the superiority of service factors abridged production cost.

Keywords: algebraic code excited linear prediction, speech-lip synchronization, video games, virtual reality

Procedia PDF Downloads 440
2235 Practical Challenges of Tunable Parameters in Matlab/Simulink Code Generation

Authors: Ebrahim Shayesteh, Nikolaos Styliaras, Alin George Raducu, Ozan Sahin, Daniel Pombo VáZquez, Jonas Funkquist, Sotirios Thanopoulos

Abstract:

One of the important requirements in many code generation projects is defining some of the model parameters tunable. This helps to update the model parameters without performing the code generation again. This paper studies the concept of embedded code generation by MATLAB/Simulink coder targeting the TwinCAT Simulink system. The generated runtime modules are then tested and deployed to the TwinCAT 3 engineering environment. However, defining the parameters tunable in MATLAB/Simulink code generation targeting TwinCAT is not very straightforward. This paper focuses on this subject and reviews some of the techniques tested here to make the parameters tunable in generated runtime modules. Three techniques are proposed for this purpose, including normal tunable parameters, callback functions, and mask subsystems. Moreover, some test Simulink models are developed and used to evaluate the results of proposed approaches. A brief summary of the study results is presented in the following. First of all, the parameters defined tunable and used in defining the values of other Simulink elements (e.g., gain value of a gain block) could be changed after the code generation and this value updating will affect the values of all elements defined based on the values of the tunable parameter. For instance, if parameter K=1 is defined as a tunable parameter in the code generation process and this parameter is used to gain a gain block in Simulink, the gain value for the gain block is equal to 1 in the gain block TwinCAT environment after the code generation. But, the value of K can be changed to a new value (e.g., K=2) in TwinCAT (without doing any new code generation in MATLAB). Then, the gain value of the gain block will change to 2. Secondly, adding a callback function in the form of “pre-load function,” “post-load function,” “start function,” and will not help to make the parameters tunable without performing a new code generation. This means that any MATLAB files should be run before performing the code generation. The parameters defined/calculated in this file will be used as fixed values in the generated code. Thus, adding these files as callback functions to the Simulink model will not make these parameters flexible since the MATLAB files will not be attached to the generated code. Therefore, to change the parameters defined/calculated in these files, the code generation should be done again. However, adding these files as callback functions forces MATLAB to run them before the code generation, and there is no need to define the parameters mentioned in these files separately. Finally, using a tunable parameter in defining/calculating the values of other parameters through the mask is an efficient method to change the value of the latter parameters after the code generation. For instance, if tunable parameter K is used in calculating the value of two other parameters K1 and K2 and, after the code generation, the value of K is updated in TwinCAT environment, the value of parameters K1 and K2 will also be updated (without any new code generation).

Keywords: code generation, MATLAB, tunable parameters, TwinCAT

Procedia PDF Downloads 199
2234 Analyzing Software Testing Phase in Agile Project Management: The Case of Jordan

Authors: Ghaleb Y. Abbasi, Satanay Alhiary

Abstract:

This paper focused on software testing phase of activities, types, techniques, teams and methods under agile project management (APM) in the Jordanian software industry. The effect of using agile principles and practices on testing process in software development life cycle (SDLC) was analyzed in order to create full view of the agile testing aspects such as phases, levels, types, methods, team and customers. Qualitative and quantitative research methods were utilized to cover earlier literature and collect data via web survey and short interviews in Jordanian software companies. Results indicated that agile testing had positive influence on quality of product, team performance, and customer satisfaction with a rate above 80%. APM is a powerful practice of moving software project forward in current markets with a rate above 51% by early involvement of testing activities in development.

Keywords: agile project management, software development life cycle, agile methods, agile testing, software testing

Procedia PDF Downloads 424