Search results for: transitional commercial code of Eritrea
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 3740

Search results for: transitional commercial code of Eritrea

3710 Code Switching: A Case Study Of Lebanon

Authors: Wassim Bekai

Abstract:

Code switching, as its name states, is altering between two or more languages in one sentence. The speaker tends to use code switching in his/her speech for better clarification of his/her message to the receiver. It is commonly used in sociocultural countries such as Lebanon because of the various cultures that have come across its lands through history, considering Lebanon is geographically located in the heart of the world, and hence between many cultures and languages. In addition, Lebanon was occupied by Turkish authorities for about 400 years, and later on by the French mandate, where both of these countries forced their languages in official papers and in the Lebanese educational system. In this paper, the importance of code switching in the Lebanese workplace will be examined, stressing the efficiency and amount of the production resulting from code switching in the workplace (factories, universities among other places) in addition to exploring the social, education, religious and cultural factors behind this phenomenon in Lebanon.

Keywords: code switching, Lebanon, cultural, factors

Procedia PDF Downloads 252
3709 Features of Testing of the Neuronetwork Converter Biometrics-Code with Correlation Communications between Bits of the Output Code

Authors: B. S. Akhmetov, A. I. Ivanov, T. S. Kartbayev, A. Y. Malygin, K. Mukapil, S. D. Tolybayev

Abstract:

The article examines the testing of the neural network converter of biometrics code. Determined the main reasons that prevented the use adopted in the works of foreign researchers classical a Binomial Law when describing distribution of measures of Hamming "Alien" codes-responses.

Keywords: biometrics, testing, neural network, converter of biometrics-code, Hamming's measure

Procedia PDF Downloads 1114
3708 Optical Multicast over OBS Networks: An Approach Based on Code-Words and Tunable Decoders

Authors: Maha Sliti, Walid Abdallah, Noureddine Boudriga

Abstract:

In the frame of this work, we present an optical multicasting approach based on optical code-words. Our approach associates, in the edge node, an optical code-word to a group multicast address. In the core node, a set of tunable decoders are used to send a traffic data to multiple destinations based on the received code-word. The use of code-words, which correspond to the combination of an input port and a set of output ports, allows the implementation of an optical switching matrix. At the reception of a burst, it will be delayed in an optical memory. And, the received optical code-word is split to a set of tunable optical decoders. When it matches a configured code-word, the delayed burst is switched to a set of output ports.

Keywords: optical multicast, optical burst switching networks, optical code-words, tunable decoder, virtual optical memory

Procedia PDF Downloads 574
3707 Quick Response(QR) Code for Vehicle Registration and Identification

Authors: S. Malarvizhi, S. Sadiq Basha, M. Santhosh Kumar, K. Saravanan, R. Sasikumar, R. Satheesh

Abstract:

This is a web based application which provides authorization for the vehicle identification and registration. It also provides mutual authentication between the police and users in order to avoid misusage. The QR code generation in this application overcomes the difficulty in the manual registration of the vehicle documents. This generated QR code is placed in the number plates of the vehicles. The QR code is scanned using the QR Reader installed in the smart devices. The police officials can check the vehicle details and file cases on accidents, theft and traffic rules violations using QR code. In addition to vehicle insurance payments and renewals, the renewal alert is sent to the vehicle owner about payment deadline. The non-permitted vehicles can be blocked in the next check-post by sending the alert messages.

Keywords: QR code, QR reader, registration, authentication, idenfication

Procedia PDF Downloads 456
3706 Strategy Research for the Development of Thematic Commercial Streets - Based On the Survey of Eight Typical Thematic Commercial Streets in Harbin

Authors: Wang Zhenzhen, Wang Xu, Hong Liangping

Abstract:

The construction of thematic commercial streets has been on the hotspot with the rapid development of cities. In order to improve the image and competitiveness of cities, many cities are building or rebuilding thematic commercial streets. However, many contradictions and problems have emerged during this process. Therefore, it is significant, for both the practice and the research, to analyse the development of thematic commercial streets and provide some useful suggestions. Through the deep research and comparative study of the eight typical thematic commercial streets in Harbin, this paper summarize the current situations, laws and influencing factors of the development of these streets, and then put forward some suggestions about the plan, constructions and developments of the thematic commercial streets.

Keywords: thematic commercial streets, laws of the development, influence factors, the constructions and developments, degrees of aggregation

Procedia PDF Downloads 348
3705 Analyzing the Impact of Code Commenting on Software Quality

Authors: Thulya Premathilake, Tharushi Perera, Hansi Thathsarani, Tharushi Nethmini, Dilshan De Silva, Piyumika Samarasekara

Abstract:

One of the most efficient ways to assist developers in grasping the source code is to make use of comments, which can be found throughout the code. When working in fields such as software development, having comments in your code that are of good quality is a fundamental requirement. Tackling software problems while making use of programs that have already been built. It is essential for the intention of the source code to be made crystal apparent in the comments that are added to the code. This assists programmers in better comprehending the programs they are working on and enables them to complete software maintenance jobs in a more timely manner. In spite of the fact that comments and documentation are meant to improve readability and maintainability, the vast majority of programmers place the majority of their focus on the actual code that is being written. This study provides a complete and comprehensive overview of the previous research that has been conducted on the topic of code comments. The study focuses on four main topics, including automated comment production, comment consistency, comment classification, and comment quality rating. One is able to get the knowledge that is more complete for use in following inquiries if they conduct an analysis of the proper approaches that were used in this study issue.

Keywords: code commenting, source code, software quality, quality assurance

Procedia PDF Downloads 61
3704 The Effect of Bottom Shape and Baffle Length on the Flow Field in Stirred Tanks in Turbulent and Transitional Flow

Authors: Jie Dong, Binjie Hu, Andrzej W Pacek, Xiaogang Yang, Nicholas J. Miles

Abstract:

The effect of the shape of the vessel bottom and the length of baffles on the velocity distributions in a turbulent and in a transitional flow has been simulated. The turbulent flow was simulated using standard k-ε model and simulation was verified using LES whereas transitional flow was simulated using only LES. It has been found that both the shape of tank bottom and the baffles’ length has significant effect on the flow pattern and velocity distribution below the impeller. In the dished bottom tank with baffles reaching the edge of the dish, the large rotating volume of liquid was formed below the impeller. Liquid in this rotating region was not fully mixing. A dead zone was formed here. The size and the intensity of circulation within this zone calculated by k-ε model and LES were practically identical what reinforces the accuracy of the numerical simulations. Both types of simulations also show that employing full-length baffles can reduce the size of dead zone formed below the impeller. The LES was also used to simulate the velocity distribution below the impeller in transitional flow and it has been found that secondary circulation loops were formed near the tank bottom in all investigated geometries. However, in this case the length of baffles has smaller effect on the volume of rotating liquid than in the turbulent flow.

Keywords: baffles length, dished bottom, dead zone, flow field

Procedia PDF Downloads 275
3703 Lowering Error Floors by Concatenation of Low-Density Parity-Check and Array Code

Authors: Cinna Soltanpur, Mohammad Ghamari, Behzad Momahed Heravi, Fatemeh Zare

Abstract:

Low-density parity-check (LDPC) codes have been shown to deliver capacity approaching performance; however, problematic graphical structures (e.g. trapping sets) in the Tanner graph of some LDPC codes can cause high error floors in bit-error-ratio (BER) performance under conventional sum-product algorithm (SPA). This paper presents a serial concatenation scheme to avoid the trapping sets and to lower the error floors of LDPC code. The outer code in the proposed concatenation is the LDPC, and the inner code is a high rate array code. This approach applies an interactive hybrid process between the BCJR decoding for the array code and the SPA for the LDPC code together with bit-pinning and bit-flipping techniques. Margulis code of size (2640, 1320) has been used for the simulation and it has been shown that the proposed concatenation and decoding scheme can considerably improve the error floor performance with minimal rate loss.

Keywords: concatenated coding, low–density parity–check codes, array code, error floors

Procedia PDF Downloads 332
3702 Regulation of the Commercial Credits in the Foreign Exchange Operations

Authors: Marija Vicic

Abstract:

The purpose of commercial credit regulation in an unified way under Law on Foreign Exchange Operations in Republic of Serbia allows an easier state monitoring of credit operations performed by non-professionals on foreign exchange market. By broadly defining the term “commercial credits“, the state (i.e. National Bank of Serbia) is given the authority to monitor the performance of all obligations under commercial contracts in which the obligations are not performed simultaneously. In the first part of the paper, the author analyses the economic gist of commercial credits with the purpose of giving an insight into their special treatment. The author examines the term „commercial credits“ given in Law on foreign exchange operations and the difference between financial credits and irregular commercial credits (exports and imports of goods and services deemed to be commercial credits) is particularly highlighted. In the second part, the author emphasizes the specifics of commercial credit contracts, especially the effects of special requests for the parties to these contracts to notify National Bank of Serbia and specific regulations regarding maturity of obligations under these commercial credits and the assignment and compensation of the said contracts.

Keywords: commercial credit, foreign exchange operations, commercial transactions, deferred payment, advance payment, (non) resident

Procedia PDF Downloads 396
3701 Frequent-Flyer Program: The Connection between Commercial Partners and Spin-off

Authors: Changmin Jiang

Abstract:

In this paper, we build a theoretical model to investigate the relationship between two recent trends in airline frequent-flyer programs (FFPs): the adoption of the “coalition” business model with other commercial partners, and the separation from airlines’ operations. We show that commercial partners benefit from teaming up with FFP, while increasing the number of commercial partners will increase the total profit; it reduces the average profit of the parties involved. Furthermore, we show that the number of commercial partners of an FFP is negatively related with the benefit to keep the FFP in-house.

Keywords: frequent flyer program, coalition, commercial partners, spin-off

Procedia PDF Downloads 258
3700 Computational Study of Flow and Heat Transfer Characteristics of an Incompressible Fluid in a Channel Using Lattice Boltzmann Method

Authors: Imdat Taymaz, Erman Aslan, Kemal Cakir

Abstract:

The Lattice Boltzmann Method (LBM) is performed to computationally investigate the laminar flow and heat transfer of an incompressible fluid with constant material properties in a 2D channel with a built-in triangular prism. Both momentum and energy transport is modelled by the LBM. A uniform lattice structure with a single time relaxation rule is used. Interpolation methods are applied for obtaining a higher flexibility on the computational grid, where the information is transferred from the lattice structure to the computational grid by Lagrange interpolation. The flow is researched on for different Reynolds number, while Prandtl number is keeping constant as a 0.7. The results show how the presence of a triangular prism effects the flow and heat transfer patterns for the steady-state and unsteady-periodic flow regimes. As an evaluation of the accuracy of the developed LBM code, the results are compared with those obtained by a commercial CFD code. It is observed that the present LBM code produces results that have similar accuracy with the well-established CFD code, as an additionally, LBM needs much smaller CPU time for the prediction of the unsteady phonema.

Keywords: laminar forced convection, lbm, triangular prism

Procedia PDF Downloads 352
3699 Developers’ Gains and Losses from the Economic Incentives of Green Building: Explanations from the Transitional Gains Trap and Transaction Cost Economics

Authors: Ke Fan, Edwin H. W. Chan

Abstract:

Economic incentives of green building (GB) have been implemented to promote green building and address the market barriers. However, if developers could gain from the incentives, why not all the buildings are green? This paper aims to study this problem and provide a new perspective to look at the economic incentives. The theories of Transitional Gains Trap (TGP) and Transaction Cost Economics (TCE) are employed to explain the developers’ gains and losses from the economic incentives. This paper takes the GFA (gross floor area) concession incentive in Hong Kong, which is one of the most popular incentives, as the case to conduct in-depth case study and it did interview to validate the results. The results show that after implementing the GFA concession scheme, the benefit of the GFA concession is capitalized into land value. Therefore, developers have to bear the increased land cost, which supports the theory of the TGP. Even though, some developers are still not willing to participate in the incentive scheme because of high transaction costs (TCs).

Keywords: green building, economic incentives, transitional gains trap, transaction cost

Procedia PDF Downloads 263
3698 Translation Methods Applied While Dealing With System-Bound Terms (Polish-English Translation)

Authors: Anna Kizinska

Abstract:

The research aims at discussing Polish and British incongruent terms that refer to company law. The Polish terms under analysis appear in the Polish Code of Commercial Partnerships and Companies and constitute legal terms or factual terms. The English equivalents of each Polish term under research appear in two Polish Code of Commercial Partnerships and Companies translations into English. The theoretical part of the paper includes the presentation of the definitions of a system-bound term and incongruity of terms. The aim of the analysis is to check if the classification of translation methods used in civil law terms translation comprehends the translation methods applied while translating company law terms into English. The translation procedures are defined according to Newmark. The stages of the research include 1) presentation of a definition of a Polish term, 2) enumerating the so-far published English equivalents of a given Polish term and comparing their definitions (as long as they appear in English law dictionaries ) with the definition of a given Polish term under analysis, 3) checking whether an English equivalent appears or not in, among others, the sources of the British law (legislation.gov.uk database) , 4) identifying the translation method that was applied while forming a given English equivalent.

Keywords: translation, legal terms, equivalence, company law, incongruency

Procedia PDF Downloads 50
3697 UNIX Source Code Leak: Evaluation and Feasible Solutions

Authors: Gu Dongxing, Li Yuxuan, Nong Tengxiao, Burra Venkata Durga Kumar

Abstract:

Since computers are widely used in business models, more and more companies choose to store important information in computers to improve productivity. However, this information can be compromised in many cases, such as when it is stored locally on the company's computers or when it is transferred between servers and clients. Of these important information leaks, source code leaks are probably the most costly. Because the source code often represents the core technology of the company, especially for the Internet companies, source code leakage may even lead to the company's core products lose market competitiveness, and then lead to the bankruptcy of the company. In recent years, such as Microsoft, AMD and other large companies have occurred source code leakage events, suffered a huge loss. This reveals to us the importance and necessity of preventing source code leakage. This paper aims to find ways to prevent source code leakage based on the direction of operating system, and based on the fact that most companies use Linux or Linux-like system to realize the interconnection between server and client, to discuss how to reduce the possibility of source code leakage during data transmission.

Keywords: data transmission, Linux, source code, operating system

Procedia PDF Downloads 226
3696 Code Refactoring Using Slice-Based Cohesion Metrics and AOP

Authors: Jagannath Singh, Durga Prasad Mohapatra

Abstract:

Software refactoring is very essential for maintaining the software quality. It is an usual practice that we first design the software and then go for coding. But after coding is completed, if the requirement changes slightly or our expected output is not achieved, then we change the codes. For each small code change, we cannot change the design. In course of time, due to these small changes made to the code, the software design decays. Software refactoring is used to restructure the code in order to improve the design and quality of the software. In this paper, we propose an approach for performing code refactoring. We use slice-based cohesion metrics to identify the target methods which requires refactoring. After identifying the target methods, we use program slicing to divide the target method into two parts. Finally, we have used the concepts of Aspects to adjust the code structure so that the external behaviour of the original module does not change.

Keywords: software refactoring, program slicing, AOP, cohesion metrics, code restructure, AspectJ

Procedia PDF Downloads 479
3695 Maximum Distance Separable b-Symbol Repeated-Root γ-Constacylic Codes over a Finite Chain Ring of Length 2

Authors: Jamal Laaouine, Mohammed Elhassani Charkani

Abstract:

Let p be a prime and let b be an integer. MDS b-symbol codes are a direct generalization of MDS codes. The γ-constacyclic codes of length pˢ over the finite commutative chain ring Fₚm [u]/ < u² > had been classified into four distinct types, where is a nonzero element of the field Fₚm. Let C₃ be a code of Type 3. In this paper, we obtain the b-symbol distance db(C₃) of the code C₃. Using this result, necessary and sufficient conditions under which C₃ is an MDS b-symbol code are given.

Keywords: constacyclic code, repeated-root code, maximum distance separable, MDS codes, b-symbol distance, finite chain rings

Procedia PDF Downloads 110
3694 The Development, Validation, and Evaluation of the Code Blue Simulation Module in Improving the Code Blue Response Time among Nurses

Authors: Siti Rajaah Binti Sayed Sultan

Abstract:

Managing the code blue event is stressful for nurses, the patient, and the patient's families. The rapid response from the first and second responders in the code blue event will improve patient outcomes and prevent tissue hypoxia that leads to brain injury and other organ failures. Providing 1 minute for the cardiac massage and 2 minutes for defibrillation will significantly improve patient outcomes. As we know, the American Heart Association came out with guidelines for managing cardiac arrest patients. The hospital must provide competent staff to manage this situation. It can be achieved when the staff is well equipped with the skill, attitude, and knowledge to manage this situation with well-planned strategies, i.e., clear guidelines for managing the code blue event, competent staff, and functional equipment. The code blue simulation (CBS) was chosen in the training program for code blue management because it can mimic real scenarios. Having the code blue simulation module will allow the staff to appreciate what they will face during the code blue event, especially since it rarely happens in that area. This CBS module training will help the staff familiarize themselves with the activities that happened during actual events and be able to operate the equipment accordingly. Being challenged and independent in managing the code blue in the early phase gives the patient a better outcome. The CBS module will help the assessor and the hospital management team with the proper tools and guidelines for managing the code blue drill accordingly. As we know, prompt action will benefit the patient and their family. It also indirectly increases the confidence and job satisfaction among the nurses, increasing the standard of care, reducing the complication and hospital burden, and enhancing cost-effective care.

Keywords: code blue simulation module, development of code blue simulation module, code blue response time, code blue drill, cardiorespiratory arrest, managing code blue

Procedia PDF Downloads 31
3693 In-Vitro Assessment of Saponin’s Level and Hemolytic Activity of Five Medicinal Plants from Eritrea

Authors: Leah Ghebreberhan, Liya Abraham, John Issac, Atul Kaushik

Abstract:

Medicinal plants are used for various indications in Eritrea according to traditional systems of medicine. Safety concerns, however, are dubious since some medicinal plants have toxic effects indeed. The medicinal plants under study (Commicarpus pedunculosis, Steganotaenia araliaceae, Boscia angustifolia, Solanum incanum, and Calpurnia aurea) are used in the treatment of various diseases. Thus, safety studies must be performed prior to usage since they are rich in phytoconstituents like saponins. Saponns are natural glycosides with several pharmacologic activities including hemolysis. The study was done to assess the level of saponin and toxic effects (hemolysis) of medicinal plants used in folk medicine. The plant extracts were subject to phytochemical analysis, foam test, and hemolytic assay. Regarding the Fh value, Solanam incanum consisted highest Fh value (20mm), whereas Boscia angustifolia showed the lowest Fh value (10mm). The level of hemolysis of all the plant extracts ranged between 9.0 to 20.2 %. All the plant extracts were suitable for treatment with respect to saponin level since they exhibited minimal hemolytic effect against erythrocytes.

Keywords: Boscia angustifolia, Calpurnia aurea, Commicarpus pedunculosis, hemolysis, saponin, Solanum incanum, Steganotaenia araliaceae

Procedia PDF Downloads 219
3692 A Characterization of Skew Cyclic Code with Complementary Dual

Authors: Eusebio Jr. Lina, Ederlina Nocon

Abstract:

Cyclic codes are a fundamental subclass of linear codes that enjoy a very interesting algebraic structure. The class of skew cyclic codes (or θ-cyclic codes) is a generalization of the notion of cyclic codes. This a very large class of linear codes which can be used to systematically search for codes with good properties. A linear code with complementary dual (LCD code) is a linear code C satisfying C ∩ C^⊥ = {0}. This subclass of linear codes provides an optimum linear coding solution for a two-user binary adder channel and plays an important role in countermeasures to passive and active side-channel analyses on embedded cryptosystems. This paper aims to identify LCD codes from the class of skew cyclic codes. Let F_q be a finite field of order q, and θ be an automorphism of F_q. Some conditions for a skew cyclic code to be LCD were given. To this end, the properties of a noncommutative skew polynomial ring F_q[x, θ] of automorphism type were revisited, and the algebraic structure of skew cyclic code using its skew polynomial representation was examined. Using the result that skew cyclic codes are left ideals of the ring F_q[x, θ]/〈x^n-1〉, a characterization of a skew cyclic LCD code of length n was derived. A necessary condition for a skew cyclic code to be LCD was also given.

Keywords: LCD cyclic codes, skew cyclic LCD codes, skew cyclic complementary dual codes, theta-cyclic codes with complementary duals

Procedia PDF Downloads 308
3691 Performance Analysis and Comparison of Various 1-D and 2-D Prime Codes for OCDMA Systems

Authors: Gurjit Kaur, Shashank Johri, Arpit Mehrotra

Abstract:

In this paper we have analyzed and compared the performance of various coding schemes. The basic ID prime sequence codes are unique in only dimension i.e. time slots whereas 2D coding techniques are not unique by their time slots but with their wavelengths also. In this research we have evaluated and compared the performance of 1D and 2D coding techniques constructed using prime sequence coding pattern for OCDMA system on a single platform. Results shows that 1D Extended Prime Code (EPC) can support more number of active users compared to other codes but at the expense of larger code length which further increases the complexity of the code. Modified Prime Code (MPC) supports lesser number of active users at λc=2 but it has a lesser code length as compared to 1D prime code. Analysis shows that 2D prime code supports lesser number of active users than 1D codes but they are having large code family and are the most secure codes compared to other codes. The performance of all these codes is analyzed on basis of number of active users supported at a Bit Error Rate (BER) of 10-9.

Keywords: CDMA, OCDMA, BER, OOC, PC, EPC, MPC, 2-D PC/PC, λc, λa

Procedia PDF Downloads 481
3690 The Effect of the 2015 Revision to the Corporate Governance Code on Japanese Listed Firms

Authors: Tomotaka Yanagida

Abstract:

The Corporate Governance Code, revised in 2015, requires firms listed within the first and second sections of Japan’s Tokyo stock exchange to select two or more independent outside directors (the Corporate Governance Code4-8). Therefore, Japanese listed firms must do this or explain the reason why they are not able to do so. This study investigates how the Corporate Governance Code affects Japanese listed firms. We find that the Corporate Governance Code increases the ratio of outside directors by nearly 8.8% for a sample of Japanese firms comprising nearly 4,200 firm-year observations from 2014 to 2015 using a difference-in-differences approach. This implies that they felt it would have been difficult to explain why it was not appropriate to have an outside director at the annual shareholders' meeting. Moreover, this suggests that they appoint outside directors as defined by the Corporate Governance Code, but maintain board size. This situation shows that compliance in Japan may simply be 'window dressing,' that is, more form than substance.

Keywords: board structure, comply or explain, corporate governance code, soft law

Procedia PDF Downloads 147
3689 The Social Aspects of Mental Illness among Orthodox Christians of the Tigrinya Ethnic Group in Eritrea

Authors: Erimias Firre

Abstract:

This study is situated within the religio-cultural milieu of Coptic Orthodox Christians of the Tigrinya ethnic group in Eritrea. With this ethnic group being conservative and traditionally bound, extended family structures dissected along various clans and expansive community networks are the distinguishing mark of its members. Notably, Coptic Tigrinya constitutes the largest percentage of all Christian denominations in Eritrea. As religious, cultural beliefs, rituals and teachings permeate in all aspects of social life, a distinct worldview and traditionalized health and illness conceptualization are common. Accordingly, this study argues that religio-culturally bound illness ideologies immensely determine the perception, help seeking behavior and healing preference of Coptic Tigrinya in Eritrea. The study bears significance in the sense that it bridges an important knowledge gap, given that it is ethno-linguistically (within the Tigrinya ethnic group), spatially (central region of Eritrea) and religiously (Coptic Christianity) specific. The conceptual framework guiding this research centered on the social determinants of mental health, and explores through the lens of critical theory how existing systems generate social vulnerability and structural inequality, providing a platform to reveal how the psychosocial model has the capacity to emancipate and empower those with mental disorders to live productive and meaningful lives. A case study approach was employed to explore the interrelationship between religio-cultural beliefs and practices and perception of common mental disorders of depression, anxiety, bipolar affective, schizophrenia and post-traumatic stress disorders and the impact of these perceptions on people with those mental disorders. Purposive sampling was used to recruit 41 participants representing seven diverse cohorts; people with common mental disorders, family caregivers, general community members, ex-fighters , priests, staff at St. Mary’s and Biet-Mekae Community Health Center; resulting in rich data for thematic analysis. Findings highlighted current religio-cultural perceptions, causes and treatment of mental disorders among Coptic Tigrinya result in widespread labelling, stigma and discrimination, both of those with mental disorders and their families. Traditional healing sources are almost exclusively tried, sometimes for many years, before families and sufferers seek formal medical assessment and treatment, resulting difficult to treat illness chronicity. Service gaps in the formal medical system result in the inability to meet the principles enshrined in the WHO Mental Health Action Plan 2013-2020 to which the Eritrean Government is a signatory. However, the study found that across all participant cohorts, there was a desire for change that will create a culture whereby those with mental disorders will have restored hope, connectedness, healing and self-determination.

Keywords: Coptic Tigrinya, mental disorders, psychosocial model social integration and recovery, traditional healing

Procedia PDF Downloads 158
3688 A Sociolinguistic Investigation of Code-Switching Practices of ESL Students Outside EFL Classrooms

Authors: Shehroz Mukhtar, Maqsood Ahmed, Abdullah Mukhtar, Choudhry Shahid, Waqar Javaid

Abstract:

Code switching is a common phenomenon, generally observed in multilingual communities across the globe. A critical look at code switching literature reveals that mostly code switching has been studied in classroom in learning and teaching context while code switching outside classroom in settings such as café, hostel and so on have been the least explored areas. Current research investigated the reasons for code switching in the interactive practices of students and their perceptions regarding the same outside the classroom settings. This paper is the study of the common practice that prevails in the Universities of Sialkot that bilinguals mix two languages when they speak in different class room situations. In Pakistani classrooms where Multilingual are in abundance i.e. they can speak two or more than two languages at the same time, the code switching or language combination is very common. The teachers of Sialkot switch from one language to another consciously or unconsciously while teaching English in the class rooms. This phenomenon has not been explored in the Sialkot’s teaching context. In Sialkot private educational institutes does not encourage code-switching whereas the public or government institutes use it frequently. The crux of this research is to investigate and identify the importance of code switching by taking its users in consideration. Survey research method and survey questionnaire will be used to get exact data from teachers and students. We will try to highlight the functions and importance of code switching in foreign language classrooms of Sialkot and will explore why this trend is emerging in Sialkot.

Keywords: code switching, bilingual context, L1, L2

Procedia PDF Downloads 29
3687 Code Embedding for Software Vulnerability Discovery Based on Semantic Information

Authors: Joseph Gear, Yue Xu, Ernest Foo, Praveen Gauravaran, Zahra Jadidi, Leonie Simpson

Abstract:

Deep learning methods have been seeing an increasing application to the long-standing security research goal of automatic vulnerability detection for source code. Attention, however, must still be paid to the task of producing vector representations for source code (code embeddings) as input for these deep learning models. Graphical representations of code, most predominantly Abstract Syntax Trees and Code Property Graphs, have received some use in this task of late; however, for very large graphs representing very large code snip- pets, learning becomes prohibitively computationally expensive. This expense may be reduced by intelligently pruning this input to only vulnerability-relevant information; however, little research in this area has been performed. Additionally, most existing work comprehends code based solely on the structure of the graph at the expense of the information contained by the node in the graph. This paper proposes Semantic-enhanced Code Embedding for Vulnerability Discovery (SCEVD), a deep learning model which uses semantic-based feature selection for its vulnerability classification model. It uses information from the nodes as well as the structure of the code graph in order to select features which are most indicative of the presence or absence of vulnerabilities. This model is implemented and experimentally tested using the SARD Juliet vulnerability test suite to determine its efficacy. It is able to improve on existing code graph feature selection methods, as demonstrated by its improved ability to discover vulnerabilities.

Keywords: code representation, deep learning, source code semantics, vulnerability discovery

Procedia PDF Downloads 131
3686 A Sociolinguistic Investigation of Code-Switching Practices of ESL Students Outside EFL Classrooms

Authors: Shehroz Mukhtar, Maqsood Ahmed, Abdullah Mukhtar, Choudhry Shahid, Waqar Javaid

Abstract:

Code switching is a common phenomenon, generally observed in multilingual communities across the globe. A critical look at code-switching literature reveals that mostly code-switching has been studied in the classrooms in learning and teaching contexts, while code-switching outside the classroom in settings such as café, hostels and so on has been the least explored areas. The current research investigated the reasons for code-switching in the interactive practices of students and their perceptions regarding the same outside the classroom settings. This paper is the study of the common practice that prevails in the Universities of Sialkot that bilinguals mix two languages when they speak in different classroom situations. In Pakistani classrooms where Multilingual is in abundance, i.e. they can speak two or more two languages at the same time, code-switching or language combination is very common. The teachers of Sialkot switch from one language to another consciously or unconsciously while teaching English in the classrooms. This phenomenon has not been explored in Sialkot’s teaching context. In Sialkot, private educational institutes do not encourage code-switching, whereas public or government institutes use it frequently. The crux of this research is to investigate and identify the importance of code-switching by taking its users into consideration. The survey research method and survey questionnaire will be used to get exact data from teachers and students. We will try to highlight the functions and importance of code switching in foreign language classrooms of Sialkot and will explore why this trend is emerging in Sialkot.

Keywords: code switching, foreign language classrooms, bilingual context, use of L1, importance of L2.

Procedia PDF Downloads 27
3685 Code – Switching in a Flipped Classroom for Foreign Students

Authors: E. Tutova, Y. Ebzeeva, L. Gishkaeva, Y.Smirnova, N. Dubinina

Abstract:

We have been working with students from different countries and found it crucial to switch the languages to explain something. Whether it is Russian, or Chinese, explaining in a different language plays an important role for students’ cognitive abilities. In this work we are going to explore how code switching may impact the student’s perception of information. Code-switching is a tool defined by linguists as a switch from one language to another for convenience, explanation of terms unavailable in an initial language or sometimes prestige. In our case, we are going to consider code-switching from the function of convenience. As a rule, students who come to study Russian in a language environment, lack many skills in speaking the language. Thus, it is made harder to explain the rules for them of another language, which is English. That is why switching between English, Russian and Mandarin is crucial for their better understanding. In this work we are going to explore the code-switching as a tool which can help a teacher in a flipped classroom.

Keywords: bilingualism, psychological linguistics, code-switching, social linguistics

Procedia PDF Downloads 49
3684 Optimization of Steel Moment Frame Structures Using Genetic Algorithm

Authors: Mohammad Befkin, Alireza Momtaz

Abstract:

Structural design is the challenging aspect of every project due to limitations in dimensions, functionality of the structure, and more importantly, the allocated budget for construction. This research study aims to investigate the optimized design for three steel moment frame buildings with different number of stories using genetic algorithm code. The number and length of spans, and height of each floor were constant in all three buildings. The design of structures are carried out according to AISC code within the provisions of plastic design with allowable stress values. Genetic code for optimization is produced using MATLAB program, while buildings modeled in Opensees program and connected to the MATLAB code to perform iterations in optimization steps. In the end designs resulted from genetic algorithm code were compared with the analysis of buildings in ETABS program. The results demonstrated that suggested structural elements by the code utilize their full capacity, indicating the desirable efficiency of produced code.

Keywords: genetic algorithm, structural analysis, steel moment frame, structural design

Procedia PDF Downloads 86
3683 Colour Quick Response Code with High Damage Resistance Capability

Authors: Minh Nguyen

Abstract:

Today, QR or Quick Response Codes are prevalent, and mobile/smart devices can efficiently read and understand them. Therefore, we can see their appearance in many areas, such as storing web pages/websites, business phone numbers, redirecting to an app download, business location, social media. The popularity of the QR Code is mainly because of its many advantages, such as it can hold a good amount of information, is small, easy to scan and read by a general RGB camera, and it can still work with some damages on its surface. However, there are still some issues. For instance, some areas needed to be kept untouched for its successful decode (e.g., the “Finder Patterns,” the “Quiet Zone,” etc.), the capability of built-in auto-correction is not robust enough, and it is not flexible enough for many application such as Augment Reality (AR). We proposed a new Colour Quick Response Code that has several advantages over the original ones: (1) there is no untouchable area, (2) it allows up to 40% of the entire code area to be damaged, (3) it is more beneficial for Augmented Reality applications, and (4) it is back-compatible and readable by available QR Code scanners such as Pyzbar. From our experience, our Colour Quick Response Code is significantly more flexible on damage compared to the original QR Code. Our code is believed to be suitable in situations where standard 2D Barcodes fail to work, such as curved and shiny surfaces, for instance, medical blood test sample tubes and syringes.

Keywords: QR code, computer vision, image processing, 2D barcode

Procedia PDF Downloads 94
3682 Counterfeit Product Detection Using Block Chain

Authors: Sharanya C. H., Pragathi M., Vathsala R. S., Theja K. V., Yashaswini S.

Abstract:

Identifying counterfeit products have become increasingly important in the product manufacturing industries in recent decades. This current ongoing product issue of counterfeiting has an impact on company sales and profits. To address the aforementioned issue, a functional blockchain technology was implemented, which effectively prevents the product from being counterfeited. By utilizing the blockchain technology, consumers are no longer required to rely on third parties to determine the authenticity of the product being purchased. Blockchain is a distributed database that stores data records known as blocks and several databases known as chains across various networks. Counterfeit products are identified using a QR code reader, and the product's QR code is linked to the blockchain management system. It compares the unique code obtained from the customer to the stored unique code to determine whether or not the product is original.

Keywords: blockchain, ethereum, QR code

Procedia PDF Downloads 149
3681 Analyzing the Perception of Identity in Bilingual Communities: Case Study of Eritrean Immigrants in Switzerland

Authors: Warsa Melles

Abstract:

This study examines the way second-generation Eritrean immigrants living in the French-speaking part of Switzerland behave linguistically and culturally. The aim of this research is to demonstrate how the participants deal with their bilingualism (Tigrinya and French). More precisely, how does their language use correlates with their socio-cultural attitudes and how do these aspects (re)construct their identity? Data for this research was collected via, questionnaires and semi-structured interviews. Participants were asked to answer questions regarding their linguistic habits, their perception on being bilingual and their cultural identity. The major findings demonstrate that generation 2 relates more with the host country’s language since French is used as the main language in their daily interactions. On the other hand, due to the fact that they have never lived in Eritrea yet were raised by Eritrean born parents in a foreign country, it is more difficult for them to unanimously identify with just one culture. In that sense, intergenerational transmission plays a major role in the perception of identity. All the participants have at least a basic knowledge of Tigrinya, but the use of languages varies according to the purpose. Proficiency in the native language and sense of belonging can be correlated with the frequency of visits to Eritrea. In conclusion, the question of identity in the second-generation Eritrean community cannot be given a categorical and clear-cut answer instead, the new-self image that this social group aims to build is shaped by different factors that are essential to take into consideration.

Keywords: biculturalism, identity, language, migration

Procedia PDF Downloads 230