Search results for: update rule
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1008

Search results for: update rule

918 Computing Continuous Skyline Queries without Discriminating between Static and Dynamic Attributes

Authors: Ibrahim Gomaa, Hoda M. O. Mokhtar

Abstract:

Although most of the existing skyline queries algorithms focused basically on querying static points through static databases; with the expanding number of sensors, wireless communications and mobile applications, the demand for continuous skyline queries has increased. Unlike traditional skyline queries which only consider static attributes, continuous skyline queries include dynamic attributes, as well as the static ones. However, as skyline queries computation is based on checking the domination of skyline points over all dimensions, considering both the static and dynamic attributes without separation is required. In this paper, we present an efficient algorithm for computing continuous skyline queries without discriminating between static and dynamic attributes. Our algorithm in brief proceeds as follows: First, it excludes the points which will not be in the initial skyline result; this pruning phase reduces the required number of comparisons. Second, the association between the spatial positions of data points is examined; this phase gives an idea of where changes in the result might occur and consequently enables us to efficiently update the skyline result (continuous update) rather than computing the skyline from scratch. Finally, experimental evaluation is provided which demonstrates the accuracy, performance and efficiency of our algorithm over other existing approaches.

Keywords: continuous query processing, dynamic database, moving object, skyline queries

Procedia PDF Downloads 191
917 Directors’ Duties, Civil Liability, and the Business Judgment Rule under the Portuguese Legal Framework

Authors: Marisa Catarina da Conceição Dinis

Abstract:

The commercial companies’ management has suffered an important material and legal transformation in the last years, mainly related to the changes in the Portuguese legal framework and because of the fact they were recently object of great expansion. In fact, next to the smaller family businesses, whose management is regularly assumed by partners, companies with social investment highly scattered, whose owners are completely out from administration, are now arising. In those particular cases, the business transactions are much more complex and require from the companies’ managers a highly technical knowledge and some specific professionals’ skills and abilities. This kind of administration carries a high-level risk that can both result in great success or in great losses. Knowing that the administration performance can result in important losses to the companies, the Portuguese legislator has created a legal structure to impute them some responsibilities and sanctions. The main goal of this study is to analyze the Portuguese law and some jurisprudence about companies’ management rules and about the conflicts between the directors and the company. In order to achieve these purposes we have to consider, on the one hand, the legal duties directly connected to the directors’ functions and on the other hand the disrespect for those same rules. The Portuguese law in this matter, influenced by the common law, determines that the directors’ attitude should be guided by loyalty and honesty. Consequently, we must reflect in which cases the administrators should respond to losses that they might cause to companies as a result of their duties’ disrespect. In this way is necessary to study the business judgment rule wich is a rule that refers to a liability exclusion rule. We intend, in the same way, to evaluate if the civil liability that results from the directors’ duties disrespect can extend itself to those who have elected them ignoring or even knowing that they don´t have the necessary skills or appropriate knowledge to the position they hold. To charge directors’, without ruining entrepreneurship, charging, in the same way, those who select them reinforces the need for more responsible and cautious attitudes which will lead consequently to more confidence in the markets.

Keywords: business judgment rule, civil liability of directors, duty of care, duty of care, Portuguese legal framework

Procedia PDF Downloads 318
916 Law and its Implementation and Consequences in Pakistan

Authors: Amir Shafiq, Asif Shahzad, Shabbar Mehmood, Muhammad Saeed, Hamid Mustafa

Abstract:

Legislation includes the law or the statutes which is being reputable by a sovereign authority and generally can be implemented by the courts of law time to time to accomplish the objectives. Historically speaking upon the emergence of Pakistan in 1947, the intact laws of the British Raj remained effective after ablution by Islamic Ideology. Thus, there was an intention to begin the statutes book afresh for Pakistan's legal history. In consequence thereof, the process of developing detailed plans, procedures and mechanisms to ensure legislative and regulatory requirements are achieved began keeping in view the cultural values and the local customs. This article is an input to the enduring discussion about implementing rule of law in Pakistan whereas; the rule of law requires the harmony of laws which is mostly in the arrangement of codified state laws. Pakistan has legal plural civilizations where completely different and independent systems of law like the Mohammadan law, the state law and the traditional law exist. The prevailing practiced law in Pakistan is actually the traditional law though the said law is not acknowledged by the State. This caused the main problem of the rule of law in the difference between the state laws and the cultural values. These values, customs and so-called traditional laws are the main obstacle to enforce the State law in true letter and spirit which has caused dissatisfaction of the masses and distrust upon the judicial system of the country.

Keywords: consequences, implement, law, Pakistan

Procedia PDF Downloads 404
915 Alternative Futures for the Middle East

Authors: Dorsa Bakhshandehgeyazdi

Abstract:

This paper examines elective future of security in the Middle East trying to find a way that could take the district from a shaky past to a more secure future. Taking a gander at five situations about the eventual future of world legislative issues, in particular, globalization, fragmentation, conflict of civilizations, majority rule peace and the development of a security group, the paper contends that albeit every situation has its qualities (and in addition shortcomings), it is the situation that predicts the foundation of a security group that joins a more express thought for forming a more secure future for the Middle East.

Keywords: Middle East, Globalization, Fragmentation, Conflict of civilizations, Majority rule peace, Development of a security group

Procedia PDF Downloads 266
914 An Optimized Association Rule Mining Algorithm

Authors: Archana Singh, Jyoti Agarwal, Ajay Rana

Abstract:

Data Mining is an efficient technology to discover patterns in large databases. Association Rule Mining techniques are used to find the correlation between the various item sets in a database, and this co-relation between various item sets are used in decision making and pattern analysis. In recent years, the problem of finding association rules from large datasets has been proposed by many researchers. Various research papers on association rule mining (ARM) are studied and analyzed first to understand the existing algorithms. Apriori algorithm is the basic ARM algorithm, but it requires so many database scans. In DIC algorithm, less amount of database scan is needed but complex data structure lattice is used. The main focus of this paper is to propose a new optimized algorithm (Friendly Algorithm) and compare its performance with the existing algorithms A data set is used to find out frequent itemsets and association rules with the help of existing and proposed (Friendly Algorithm) and it has been observed that the proposed algorithm also finds all the frequent itemsets and essential association rules from databases as compared to existing algorithms in less amount of database scan. In the proposed algorithm, an optimized data structure is used i.e. Graph and Adjacency Matrix.

Keywords: association rules, data mining, dynamic item set counting, FP-growth, friendly algorithm, graph

Procedia PDF Downloads 389
913 Attachment Systems and Psychotherapy: An Internal Secure Caregiver to Heal and Protect the Parts of Our Clients: InCorporer Method

Authors: Julien Baillet

Abstract:

In light of 30 years of scientific research, InCorporer Method was created in 2019 as a new approach to heal traumatic, developmental, and dissociative injuries. Following natural nervous system functions, InCorporer aims to heal, develop, and update the different defensive mammalian subsystems: fight, flight, freeze, feign death, cry for help, & energy regulator. The dimensions taken into account are: (i) Heal the traumatic injuries who are still bleeding, (ii) Develop the systems that never received the security, attention, and affection they needed. (iii) Update the parts that stayed stuck in the past, ignoring for too long that they are out of danger now. Through the Present Part and its caregiving skills, InCorporer method enables a balanced, soothed, and collaborative personality system. To be as integrative as possible, InCorporer method has been designed according to several fields of research, such as structural dissociation theory, attachment theory, and information processing theory. In this paper, the author presents how the internal caregiver is developed and trained to heal all the different parts/subsystems of our clients through mindful attention and reflex movement integration.

Keywords: PTSD, attachment, dissociation, part work

Procedia PDF Downloads 39
912 Rule-Based Mamdani Type Fuzzy Modeling of Performances of Anode Side of Proton Exchange Membrane Fuel Cell Spin-Coated with Yttria-Stabilized Zirconia

Authors: Sadık Ata, Kevser Dincer

Abstract:

In this study, performance of proton exchange membrane (PEM) fuel cell was experimentally investigated and modelled with Rule-Based Mamdani-Type Fuzzy (RBMTF) modelling technique. Coating on the anode side of the PEM fuel cell was accomplished with the spin method by using Yttria-stabilized zirconia (YSZ). Input parameters voltage density (V/cm2), and current density (A/cm2), temperature (°C), time (s); output parameter power density (W/cm2) were described by RBMTF if-then rules. Numerical parameters of input and output variables were fuzzificated as linguistic variables: Very Very Low (L1), Very Low (L2), Low (L3), Negative Medium (L4), Medium (L5), Positive Medium (L6), High (L7), Very High (L8) and Very Very High (L9) linguistic classes. The comparison between experimental data and RBMTF is done by using statistical methods like absolute fraction of variance (R2). The actual values and RBMTF results indicated that RBMTF can be successfully used for the analysis of performance of PEM fuel cell.

Keywords: proton exchange membrane (PEM), fuel cell, rule-based Mamdani-type fuzzy (RMBTF) modeling, yttria-stabilized zirconia (YSZ)

Procedia PDF Downloads 333
911 Judicial Institutions in a Post-Conflict Society: Gaining Legitimacy through a Holistic Reform

Authors: Abdul Salim Amin

Abstract:

This paper focuses on how judiciaries in post-conflict society gain legitimacy through reformation. Legitimacy plays a pivotal role in shaping peoples’ behavior to submit to the law and verifies the rightfulness of an organ for taking binding decisions. Among various dynamics, judicial independence, access to justice and behavioral changes of the judicial officials broadly contribute in legitimation of judiciary in general, and the court in particular. Increasing the independence of judiciary through reform limits the interference of governmental branches in judicial issues and protects basic rights of the citizens. Judicial independence does not only matter in institutional terms, individual independence also influences the impartiality and integrity of judges, which can be increased through education and better administration of justice. Finally, access to justice as an intertwined concept both at the legal and moral spectrum of judicial reform avails justice to the citizen and increases the level of public trust and confidence. Efficient legal decisions on fostering such elements through holistic reform create a rule of law atmosphere. Citizens do not accept illegitimate judiciary and do not trust its decisions. Lack of such tolerance and confidence deters the rule of law and, thus, undermines the democratic development of a society.

Keywords: legitimacy, judicial reform, judicial independence, access to justice, legal training, informal justice, rule of law

Procedia PDF Downloads 476
910 Chinese Event Detection Technique Based on Dependency Parsing and Rule Matching

Authors: Weitao Lin

Abstract:

To quickly extract adequate information from large-scale unstructured text data, this paper studies the representation of events in Chinese scenarios and performs the regularized abstraction. It proposes a Chinese event detection technique based on dependency parsing and rule matching. The method first performs dependency parsing on the original utterance, then performs pattern matching at the word or phrase granularity based on the results of dependent syntactic analysis, filters out the utterances with prominent non-event characteristics, and obtains the final results. The experimental results show the effectiveness of the method.

Keywords: natural language processing, Chinese event detection, rules matching, dependency parsing

Procedia PDF Downloads 108
909 DCASH: Dynamic Cache Synchronization Algorithm for Heterogeneous Reverse Y Synchronizing Mobile Database Systems

Authors: Gunasekaran Raja, Kottilingam Kottursamy, Rajakumar Arul, Ramkumar Jayaraman, Krithika Sairam, Lakshmi Ravi

Abstract:

The synchronization server maintains a dynamically changing cache, which contains the data items which were requested and collected by the mobile node from the server. The order and presence of tuples in the cache changes dynamically according to the frequency of updates performed on the data, by the server and client. To synchronize, the data which has been modified by client and the server at an instant are collected, batched together by the type of modification (insert/ update/ delete), and sorted according to their update frequencies. This ensures that the DCASH (Dynamic Cache Synchronization Algorithm for Heterogeneous Reverse Y synchronizing Mobile Database Systems) gives priority to the frequently accessed data with high usage. The optimal memory management algorithm is proposed to manage data items according to their frequency, theorems were written to show the current mobile data activity is reverse Y in nature and the experiments were tested with 2g and 3g networks for various mobile devices to show the reduced response time and energy consumption.

Keywords: mobile databases, synchronization, cache, response time

Procedia PDF Downloads 363
908 An Enhanced MEIT Approach for Itemset Mining Using Levelwise Pruning

Authors: Tanvi P. Patel, Warish D. Patel

Abstract:

Association rule mining forms the core of data mining and it is termed as one of the well-known methodologies of data mining. Objectives of mining is to find interesting correlations, frequent patterns, associations or casual structures among sets of items in the transaction databases or other data repositories. Hence, association rule mining is imperative to mine patterns and then generate rules from these obtained patterns. For efficient targeted query processing, finding frequent patterns and itemset mining, there is an efficient way to generate an itemset tree structure named Memory Efficient Itemset Tree. Memory efficient IT is efficient for storing itemsets, but takes more time as compare to traditional IT. The proposed strategy generates maximal frequent itemsets from memory efficient itemset tree by using levelwise pruning. For that firstly pre-pruning of items based on minimum support count is carried out followed by itemset tree reconstruction. By having maximal frequent itemsets, less number of patterns are generated as well as tree size is also reduced as compared to MEIT. Therefore, an enhanced approach of memory efficient IT proposed here, helps to optimize main memory overhead as well as reduce processing time.

Keywords: association rule mining, itemset mining, itemset tree, meit, maximal frequent pattern

Procedia PDF Downloads 343
907 Improved FP-Growth Algorithm with Multiple Minimum Supports Using Maximum Constraints

Authors: Elsayeda M. Elgaml, Dina M. Ibrahim, Elsayed A. Sallam

Abstract:

Association rule mining is one of the most important fields of data mining and knowledge discovery. In this paper, we propose an efficient multiple support frequent pattern growth algorithm which we called “MSFP-growth” that enhancing the FP-growth algorithm by making infrequent child node pruning step with multiple minimum support using maximum constrains. The algorithm is implemented, and it is compared with other common algorithms: Apriori-multiple minimum supports using maximum constraints and FP-growth. The experimental results show that the rule mining from the proposed algorithm are interesting and our algorithm achieved better performance than other algorithms without scarifying the accuracy.

Keywords: association rules, FP-growth, multiple minimum supports, Weka tool

Procedia PDF Downloads 449
906 Ontology-Based Representation of Islamic Rules to Perform Salah

Authors: Hamza Zafar, Quratulain Rajput

Abstract:

Salah (نماز ) is one of five pillars of Islam and obligatory for every Muslims. However, due to the lack of Islamic knowledge it might be very difficult for a layperson to perform it correctly. This paper presents an ontology based representation of Islamic rules to perform Salah. The Salah ontology has been built under the guidance of domain expert in light of Quran and Hadith. The ontology consists of basic concepts as well as relationship among concepts and constraints on them. The basic concepts include cleanness, body cover, Salah timing and steps to perform Salah. The SWRL rule language has been used to represent rule to determine whether the Salah performed correctly or it should be repeated. Finally, we evaluate the use of the Salat ontology through user’s example queries using SPARQL queries.

Keywords: prayer, salah, ontology, SPARQL queries, reasoning

Procedia PDF Downloads 384
905 Development of a French to Yorùbá Machine Translation System

Authors: Benjamen Nathaniel, Eludiora Safiriyu Ijiyemi, Egume Oneme Lucky

Abstract:

A review on machine translation systems shows that a lot of computational artefacts has been carried out to translate written or spoken texts from a source language to Yorùbá language through Machine Translation systems. However, there are no work on French to Yorùbá language machine translation system; hence, the study investigated the process involved in the translation of French-to-Yorùbá language equivalent with the view to adopting a rule- based MT approach to build a Machine Translation framework from simple sentences administered through questionnaire. Articles and relevant textbooks were reviewed with key speakers of both languages interviewed to find out the processes involved in the translation of French language and their equivalent in Yorùbálanguage simple sentences using home domain terminologies. Achieving this, a model was formulated using phrase grammar structure, re-write rule, parse tree, automata theory- based techniques, designed and implemented respectively with unified modeling language (UML) and python programming language. Analysing the result, it was observed when carrying out the result that, the Machine Translation system performed 18.45% above Experimental Subject Respondent and 2.7% below Linguistics Expert when analysed with word orthography, sentence syntax and semantic correctness of the sentences. And, when compared with Google Machine Translation system, it was noticed that the developed system performed better on lexicons of the target language.

Keywords: machine translation (MT), rule-based, French language, Yoru`ba´ language

Procedia PDF Downloads 17
904 Federalism, Dual Sovereignty, and the Supreme Court of Nigeria

Authors: Edoba Bright Omoregie

Abstract:

Nigeria became a federation in 1954 six years before it gained independence away from British colonial rule. The country has remained a federation since then despite the challenging circumstances of military rule and civil strife which have tasked its federal credentials. Since 1961, when it first decided a federalism dispute, cases over vertical and horizontal powers have inundated the country’s Supreme Court. In its current practice of federalism after democratic rule was resumed in 1999, the country has witnessed a spell of intergovernmental disputes over a good number of federalism issues. Such conflicts have eventually found their way to the Supreme Court for resolution, not as a final appellate court (which it is in other non-federal matters) but as a court of first and final instance following the constitutional provision granting the court such power. However, in April 2014 one of such disputes was denied hearing by the court when it declined original jurisdiction to determine the matter. The suit was instituted by one state of the federation against the federal government and the other 35 states challenging the collection of value added tax (a consumption tax)on certain goods and services within the state. The paper appraises the rationale of the court’s decision and reason that its decision to decline jurisdiction is the result of an avoidable misunderstanding of the dual sovereignty instituted by the federal system of Nigeria as well as a misconception of the role which the court is constitutionally assigned to play in resolving intergovernmental schisms in the federal system.

Keywords: dual sovereignty, federalism, intergovernmental conflict, Supreme Court

Procedia PDF Downloads 523
903 Democracy and Security Challenge in Nigeria, 1999, Till Date

Authors: Abdulsalami M. Deji

Abstract:

Prolonged military incursion in Nigeria politics which favored the oligarchy brought agitation for democratic rule it exacerbated ethnicity integration of minority for fear of domination. The advent of democracy ushered in new breath of life to Nigerians from the shackle of military oppression to democratic governance. Democratic rule became a mirage as a result of prevalent insecurity in Nigeria; effort to bring lasting peace to all sections of the country had not yielded positive result till date. In the process of struggling for democracy among ethnic groups in Nigeria, they had instituted various militia groups defending the interest of their identity due to unequal distribution of wealth by military junta. When democracy came on board, these various militia groups became demons hunting democratic institutions. Quest by the successful government to find lasting solution has proved abortive. The security of politics which guaranteed stability is not visible in Nigeria, what we have now is politics of security. The unrest in Nigeria today has cripple socio-political and economy of the nation; the growth of economy favored elites without meaningful impact on the common man. This paper focus on the effects of democracy on Nigerians and, how security under democratic rule has hindered dividends of democracy since 1999-till date and way forward. The source is strictly base on secondary source from textbook, newspapers, internet, and journals.

Keywords: democracy, interest, militia, security

Procedia PDF Downloads 308
902 Externalizing Behavior Problems Influencing Social Behavior in Early Adolescence

Authors: Zhidong Zhang, Zhi-Chao Zhang

Abstract:

This study focuses on early adolescent externalizing behavioral problems which specifically concentrate on rule breaking behavior and aggressive behavior using the instrument of Achenbach System of Empirically Based Assessment (ASEBA). The purpose was to analyze the relationships between the externalizing behavioral problems and relevant background variables such as sports activities, hobbies, chores and the number of close friends. The stratified sampling method was used to collect data from 1975 participants. The results indicated that several background variables as predictors could significantly predict rule breaking behavior and aggressive behavior. Further, a hierarchical modeling method was used to explore the causal relations among background variables, breaking behavior variables and aggressive behavior variables.

Keywords: aggressive behavior, breaking behavior, early adolescence, externalizing problem

Procedia PDF Downloads 470
901 Hybrid Artificial Bee Colony and Least Squares Method for Rule-Based Systems Learning

Authors: Ahcene Habbi, Yassine Boudouaoui

Abstract:

This paper deals with the problem of automatic rule generation for fuzzy systems design. The proposed approach is based on hybrid artificial bee colony (ABC) optimization and weighted least squares (LS) method and aims to find the structure and parameters of fuzzy systems simultaneously. More precisely, two ABC based fuzzy modeling strategies are presented and compared. The first strategy uses global optimization to learn fuzzy models, the second one hybridizes ABC and weighted least squares estimate method. The performances of the proposed ABC and ABC-LS fuzzy modeling strategies are evaluated on complex modeling problems and compared to other advanced modeling methods.

Keywords: automatic design, learning, fuzzy rules, hybrid, swarm optimization

Procedia PDF Downloads 409
900 Forecasting Unusual Infection of Patient Used by Irregular Weighted Point Set

Authors: Seema Vaidya

Abstract:

Mining association rule is a key issue in data mining. In any case, the standard models ignore the distinction among the exchanges, and the weighted association rule mining does not transform on databases with just binary attributes. This paper proposes a novel continuous example and executes a tree (FP-tree) structure, which is an increased prefix-tree structure for securing compacted, discriminating data about examples, and makes a fit FP-tree-based mining system, FP enhanced capacity algorithm is used, for mining the complete game plan of examples by illustration incessant development. Here, this paper handles the motivation behind making remarkable and weighted item sets, i.e. rare weighted item set mining issue. The two novel brightness measures are proposed for figuring the infrequent weighted item set mining issue. Also, the algorithm are handled which perform IWI which is more insignificant IWI mining. Moreover we utilized the rare item set for choice based structure. The general issue of the start of reliable definite rules is troublesome for the grounds that hypothetically no inciting technique with no other person can promise the rightness of influenced theories. In this way, this framework expects the disorder with the uncommon signs. Usage study demonstrates that proposed algorithm upgrades the structure which is successful and versatile for mining both long and short diagnostics rules. Structure upgrades aftereffects of foreseeing rare diseases of patient.

Keywords: association rule, data mining, IWI mining, infrequent item set, frequent pattern growth

Procedia PDF Downloads 377
899 Principle Components Updates via Matrix Perturbations

Authors: Aiman Elragig, Hanan Dreiwi, Dung Ly, Idriss Elmabrook

Abstract:

This paper highlights a new approach to look at online principle components analysis (OPCA). Given a data matrix X R,^m x n we characterise the online updates of its covariance as a matrix perturbation problem. Up to the principle components, it turns out that online updates of the batch PCA can be captured by symmetric matrix perturbation of the batch covariance matrix. We have shown that as n→ n0 >> 1, the batch covariance and its update become almost similar. Finally, utilize our new setup of online updates to find a bound on the angle distance of the principle components of X and its update.

Keywords: online data updates, covariance matrix, online principle component analysis, matrix perturbation

Procedia PDF Downloads 167
898 Lateral Torsional Buckling of an Eccentrically Loaded Channel Section Beam

Authors: L. Dahmani, S. Drizi, M. Djemai, A. Boudjemia, M. O. Mechiche

Abstract:

Channel sections are widely used in practice as beams. However, design rules for eccentrically loaded (not through shear center) beams with channel cross- sections are not available in Eurocode 3. This paper compares the ultimate loads based on the adjusted design rules for lateral torsional buckling of eccentrically loaded channel beams in bending to the ultimate loads obtained with Finite Element (FE) simulations on the basis of a parameter study. Based on the proposed design rule, this study has led to a new design rule which conforms to Eurocode 3.

Keywords: ANSYS, Eurocode 3, finite element method, lateral torsional buckling, steel channel beam

Procedia PDF Downloads 362
897 Anti-Corruption in Adverse Contexts: A Strategic Approach

Authors: Mushtaq H. Khan, Antonio Andreoni, Pallavi Roy

Abstract:

Developing countries are characterized by political settlements where formal rules are generally weakly enforced and widely violated. Conventional anti-corruption strategies that focus on improving the general enforcement of a rule of law and raising the costs of corruption facing individual public officials have typically delivered poor results in these contexts. Our alternative approach is to identify anti-corruption strategies that have a high impact and that are feasible to implement in these contexts. Our alternative approach identifies anti-corruption strategies from the bottom up. This involves identifying the characteristics of the corruption constraining particular development outcomes. By drawing on theories of rents and rent seeking, and theories of political settlements, we can assess the developmental impact of particular anti-corruption strategies and the feasibility of implementing these strategies. We argue that feasible anti-corruption in these contexts cannot be solely based on conventional anti-corruption strategies. In societies that have widespread rule violations, high-impact anti-corruption is only likely to be feasible if the overall strategy succeeds in aligning the interests and capabilities of powerful organizations at the sectoral level to support the enforcement of particular sets of rules. We examine four related strategies for changing these incentives and capabilities of critical stakeholders at the local or sectoral level, and we argue that this can provide a framework for organizing research on the impact and feasibility of anti-corruption activities in different priority areas in particular countries.

Keywords: anti-corruption, development, political settlements analysis, rule of law

Procedia PDF Downloads 376
896 A New Assessment of the Chronology of the Vouni Palace

Authors: Seren Sevim Öğmen, Ömer Özyiğit

Abstract:

Vouni Palace is a Persian palace built on a rocky hill in the Lefke district of Cyprus. The palace is one of the limited number of architectures identified, which prove the existence of a Persian period on the island. Since the excavations on the palace were held a very long time ago, there is a need to re-date the cultural layers within the palace using new archaeological evidence and recent studies. The existing chronology has been reviewed and a new chronology has been created according to its architectural structure, floor findings such as ceramics and sculptures and the stratigraphic layer of Room 59 where the Vouni Treasure was found. This work dates the palace in Vouni between the periods of c. 520 BC, deduced from the early period sculptures, and c. 330 BC by the late period floor ceramics. Some earlier dated archaic sculptures are identified in Room 122 – which takes part in the temenos area of the palace, and correspondingly the construction of the palace is dated c. 520 BC. The comparison between Vouni Palace and Persian palaces built in Iran, shows similarities with palaces built during the rule of Darius. It is evident that two main building periods of the palace which are previously identified, represent Persian influence according to its architectural structure and findings. Several floor potteries show that there must be other layer or layers after Vouni Treasure dated 390/380 BC, which was considered as the destruction date of the palace. At this point the forenamed date can indicate the end of a stage, not the end of the period because the palace was still in use until c. 330 BC. The results of the study, in addition to dating the layers of Vouni Palace, enlightens the administrative function of the Palace within the Persian rule in Cyprus.

Keywords: administrative, chronology, cyprus, persian rule, vouni palace

Procedia PDF Downloads 93
895 A Study on the Nostalgia Contents Analysis of Hometown Alumni in the Online Community

Authors: Heejin Yun, Juanjuan Zang

Abstract:

This study aims to analyze the text terms posted on an online community of people from the same hometown and to understand the topic and trend of nostalgia composed online. For this purpose, this study collected 144 writings which the natives of Yeongjong Island, Incheon, South-Korea have posted on an online community. And it analyzed association relations. As a result, online community texts means that just defining nostalgia as ‘a mind longing for hometown’ is not an enough explanation. Second, texts composed online have abstractness rather than persons’ individual stories. This study figured out the relationship that had the most critical and closest mutual association among the terms that constituted nostalgia through literature research and association rule concerning nostalgia. The result of this study has a characteristic that it summed up the core terms and emotions related to nostalgia.

Keywords: nostalgia, cultural memory, data mining, association rule

Procedia PDF Downloads 209
894 Commodity Price Shocks and Monetary Policy

Authors: Faisal Algosair

Abstract:

We examine the role of monetary policy in the presence of commodity price shocks using a Dynamic stochastic general equilibrium (DSGE) model with price and wage rigidities. The model characterizes a commodity exporter by its degree of export diversification, and explores the following monetary regimes: flexible domestic inflation targeting; flexible Consumer Price Index inflation targeting; exchange rate peg; and optimal rule. An increase in the degree of diversification is found to mitigate responses to commodity shocks. The welfare comparison suggests that a flexible exchange rate regime under the optimal rule is preferred to an exchange rate peg. However, monetary policy provides limited stabilization effects in an economy with low degree of export diversification.

Keywords: business cycle, commodity price, exchange rate, global financial cycle

Procedia PDF Downloads 64
893 User Authentication Using Graphical Password with Sound Signature

Authors: Devi Srinivas, K. Sindhuja

Abstract:

This paper presents architecture to improve surveillance applications based on the usage of the service oriented paradigm, with smart phones as user terminals, allowing application dynamic composition and increasing the flexibility of the system. According to the result of moving object detection research on video sequences, the movement of the people is tracked using video surveillance. The moving object is identified using the image subtraction method. The background image is subtracted from the foreground image, from that the moving object is derived. So the Background subtraction algorithm and the threshold value is calculated to find the moving image by using background subtraction algorithm the moving frame is identified. Then, by the threshold value the movement of the frame is identified and tracked. Hence, the movement of the object is identified accurately. This paper deals with low-cost intelligent mobile phone-based wireless video surveillance solution using moving object recognition technology. The proposed solution can be useful in various security systems and environmental surveillance. The fundamental rule of moving object detecting is given in the paper, then, a self-adaptive background representation that can update automatically and timely to adapt to the slow and slight changes of normal surroundings is detailed. While the subtraction of the present captured image and the background reaches a certain threshold, a moving object is measured to be in the current view, and the mobile phone will automatically notify the central control unit or the user through SMS (Short Message System). The main advantage of this system is when an unknown image is captured by the system it will alert the user automatically by sending an SMS to user’s mobile.

Keywords: security, graphical password, persuasive cued click points

Procedia PDF Downloads 511
892 Peripheral Facial Nerve Palsy after Lip Augmentation

Authors: Sana Ilyas, Kishalaya Mukherjee, Suresh Shetty

Abstract:

Lip Augmentation has become more common in recent years. Patients do not expect to experience facial palsy after having lip augmentation. This poster will present the findings of such a presentation and will discuss the possible pathophysiology and management. (This poster has been published as a paper in the dental update, June 2022) Aim: The aim of the study was to explore the link between facial nerve palsy and lip fillers, to explore the literature surrounding facial nerve palsy, and to discuss the case of a patient who presented with facial nerve palsy with seemingly unknown cause. Methodology: There was a thorough assessment of the current literature surrounding the topic. This included published papers in journals through PubMed database searches and printed books on the topic. A case presentation was discussed in detail of a patient presenting with peripheral facial nerve palsy and associating it with lip augmentation that she had a day prior. Results and Conclusion: Even though the pathophysiology may not be clear for this presentation, it is important to highlight uncommon presentations or complications that may occur after treatment. This can help with understanding and managing similar cases, should they arise.It is also important to differentiate cause and association in order to make an accurate diagnosis. This may be difficult if there is little scientific literature. Therefore, further research can help to improve the understanding of the pathophysiology of similar presentations. This poster has been published as a paper in dental update, June 2022, and therefore shares a similar conclusiom.

Keywords: facial palsy, lip augmentation, causation and correlation, dental cosmetics

Procedia PDF Downloads 117
891 An Ontology for Investment in Chinese Steel Company

Authors: Liming Chen, Baoxin Xu, Zhaoyun Ding, Bin Liu, Xianqiang Zhu

Abstract:

In the era of big data, public investors are faced with more complicated information related to investment decisions than ever before. To survive in the fierce competition, it has become increasingly urgent for investors to combine multi-source knowledge and evaluate the companies’ true value efficiently. For this, a rule-based ontology reasoning method is proposed to support steel companies’ value assessment. Considering the delay in financial disclosure and based on cost-benefit analysis, this paper introduces the supply chain enterprises financial analysis and constructs the ontology model used to value the value of steel company. In addition, domain knowledge is formally expressed with the help of Web Ontology Language (OWL) language and SWRL (Semantic Web Rule Language) rules. Finally, a case study on a steel company in China proved the effectiveness of the method we proposed.

Keywords: financial ontology, steel company, supply chain, ontology reasoning

Procedia PDF Downloads 99
890 Confessors in Im Sun-dŭk’s Short Stories: Interiority of Korean Women under the End of Japanese Colonial Rule

Authors: Min Koo Choi

Abstract:

The paper will examine Im Sun-dŭk’s two short stories, 'Iryoil' (Sunday, 1937) and 'Nazuoya' (A Godmother, 1942), which illuminate the subjects of Korean intellectuals going through the later period of a harsh and oppressive Japanese colonial rule. When Japan went to war against China in 1937, Korea, a colony of Japan since 1910, became an outpost for Japanese expansionism into China, and the Korean people were mobilized into the war effort. Nationalist movements and radical ideas that posed a threat and opposition to Japanese colonial rule in Korea and its colonial expansionism were ruthlessly suppressed, and Koreans were forcibly assimilated into becoming Japanese citizens without political rights. Racial discrimination between Koreans and Japanese was prevalent. Im Sun-dŭk, who participated in the Socialist movement in the 1930s, had his debut as a literary writer and a critic in the late 1930s, when Korean literary society was reincorporated in order to collaborate with the Japanese war effort through writing and public speech. Sun-duk's writing illuminates the unique internal landscape of a female subject who strives to live on while preserving her commitment and dignity under the circumstances that force Korean intellectuals either to collaborate with or acquiesce to Japanese colonial rule. 'Iryoil' (Sunday, 1937) foregrounds an educated intellectual, Hyeyŏng, who supplies her fiancé in prison for political involvement in resistance against Japan. On Sundays, she turns down her friends’ suggestion for enjoying holidays outside, due to her indebtedness to her fiancé. Her fiancé's imprisonment indicates the social conscience that still remains, and she seeks to share the commitment and suffering with her fiancé. The short story 'Nazuoya' (A Godmother, 1942), written in Japanese due to the suppression of Korean language publications at the time, also problematizes Japanese policy that forces Koreans to change their names into Japanese. Through the narrator I, who struggles to find a meaningful name for her cousin brother’s baby, she highlights how meaningful one’s name is for one’s life and identity. What makes her two stories unique is that her writing draws other people’s confessions into its own narrative through fragmentary forms, such as part of letter or reflection. The voices of others are intersected with the main character in 'Iryoil' (Sunday, 1937) and a narrator in 'Nazuoya' (A Godmother, 1942). In many ways, the narrator and main character provide the confessional voices who display the characters' gloomy interiorities. Even though these confessional voices do not share the commitment and values, both the main character and I in the stories reveal a more open set of viewpoints to them. In this way, they seek to form bonds and encouragement and acquire a more resilient sensibility that embraces those who strive to survive and endure in the gloomy days of the later period of Japanese colonial rule.

Keywords: Im Sun-dŭk, Japanese colonial rule, Korean literature, socialist movement

Procedia PDF Downloads 242
889 A Hybrid Approach for Thread Recommendation in MOOC Forums

Authors: Ahmad. A. Kardan, Amir Narimani, Foozhan Ataiefard

Abstract:

Recommender Systems have been developed to provide contents and services compatible to users based on their behaviors and interests. Due to information overload in online discussion forums and users diverse interests, recommending relative topics and threads is considered to be helpful for improving the ease of forum usage. In order to lead learners to find relevant information in educational forums, recommendations are even more needed. We present a hybrid thread recommender system for MOOC forums by applying social network analysis and association rule mining techniques. Initial results indicate that the proposed recommender system performs comparatively well with regard to limited available data from users' previous posts in the forum.

Keywords: association rule mining, hybrid recommender system, massive open online courses, MOOCs, social network analysis

Procedia PDF Downloads 262