Search results for: fashion show
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 4708

Search results for: fashion show

4678 Behavior of Cu-WC-Ti Metal Composite Afterusing Planetary Ball Milling

Authors: A.T.Z. Mahamat, A.M. A Rani, Patthi Husain

Abstract:

Copper based composites reinforced with WC and Ti particles were prepared using planetary ball-mill. The experiment was designed by using Taguchi technique and milling was carried out in an air for several hours. The powder was characterized before and after milling using the SEM, TEM and X-ray for microstructure and for possible new phases. Microstructures show that milled particles size and reduction in particle size depend on many parameters. The distance d between planes of atoms estimated from X-ray powder diffraction data and TEM image. X-ray diffraction patterns of the milled powder did not show clearly any new peak or energy shift, but the TEM images show a significant change in crystalline structure of corporate on titanium in the composites.

Keywords: ball milling, microstructures, titanium, tungstencarbides, X-ray

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1584
4677 EU, US and Tax Incentives: An Application

Authors: Carlos F. Liard-Muriente

Abstract:

The purpose of this paper is to shed light on the controversial subject of tax incentives to promote regional development. Although extensive research has been conducted, a review of the literature gives an inconclusive answer to whether economic incentives are effective. One reason is the fact that for some researchers “effective" means the significant location of new firms in targeted areas, while for others the creation of jobs regardless if new firms are arriving in a significant fashion. We present this dichotomy by analyzing a tax incentive program via both alternatives: location and job creation. The contribution of the paper is to inform policymakers about the potential opportunities and pitfalls when designing incentive strategies. This is particularly relevant, given that both the US and Europe have been promoting incentives as a tool for regional economic development.

Keywords: Employment, Foreign Investment, Tax Incentives.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1391
4676 Distributed Self-Healing Protocol for Unattended Wireless Sensor Network

Authors: E. Golden Julie, E. Sahaya Rose Vigita, S. Tamil Selvi

Abstract:

Wireless sensor network is vulnerable to a wide range of attacks. Recover secrecy after compromise, to develop technique that can detect intrusions and able to resilient networks that isolates the point(s) of intrusion while maintaining network connectivity for other legitimate users. To define new security metrics to evaluate collaborative intrusion resilience protocol, by leveraging the sensor mobility that allows compromised sensors to recover secure state after compromise. This is obtained with very low overhead and in a fully distributed fashion using extensive simulations support our findings.

Keywords: WSN security, intrusion resilience, compromised sensors, mobility.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1739
4675 Monitoring and Prediction of Intra-Crosstalk in All-Optical Network

Authors: Ahmed Jedidi, Mesfer Mohammed Alshamrani, Alwi Mohammad A. Bamhdi

Abstract:

Optical performance monitoring and optical network management are essential in building a reliable, high-capacity, and service-differentiation enabled all-optical network. One of the serious problems in this network is the fact that optical crosstalk is additive, and thus the aggregate effect of crosstalk over a whole AON may be more nefarious than a single point of crosstalk. As results, we note a huge degradation of the Quality of Service (QoS) in our network. For that, it is necessary to identify and monitor the impairments in whole network. In this way, this paper presents new system to identify and monitor crosstalk in AONs in real-time fashion. particular, it proposes a new technique to manage intra-crosstalk in objective to relax QoS of the network.

Keywords: All-optical networks, optical crosstalk, optical cross-connect, crosstalk, monitoring crosstalk.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1703
4674 Some Constructions of Non-Commutative Latin Squares of Order n

Authors: H. V. Chen, A. Y. M. Chin, S. Sharmini

Abstract:

Let n be an integer. We show the existence of at least three non-isomorphic non-commutative Latin squares of order n which are embeddable in groups when n ≥ 5 is odd. By using a similar construction for the case when n ≥ 4 is even, we show that certain non-commutative Latin squares of order n are not embeddable in groups.

Keywords: group, Latin square, embedding.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1734
4673 Intervention Targeting in Environmental Networks

Authors: Chukwudi Henry Dike

Abstract:

We explore targeted subsidy in a set-up for which manufacturing firms in a waste-spillover network make endogenous production decisions. Here, games of substitution in digraphs arises where waste-producing firms internalise negative externality in a quadratic fashion. We find neutrality in intervention policies that create or reduce spillover links. Most importantly, we observe centrality distinction in asymmetric digraphs so that the dependence and power of each firm play unique roles. Here we see that in targeted subsidy, a firm with greater centrality guarantees optimal welfare improvement. This centrality however measures the weakness of each firm’s Nash-based link to other neighbourhood firms i.e., lower negative externality.

Keywords: Centrality, externality, key-player, Nash-Equilibrium.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 179
4672 Use of Indian Food Mascot Design as an Advertising Tool in Maintaining and Growing the Brand Name

Authors: Preeti Yadav, Dandeswar Bisoyi, Debkumar Chakrabarti

Abstract:

Mascots provide memories to viewers, and numerous promotional campaigns with different appearances, continue to trigger viewers and capture their interest. This study investigates the effect of Indian food mascot designs and influence on enhancing communication; thereby, building long-term brand recognition by the consumers. This paper presents a descriptive approach to Indian food mascot design as an advertising tool, and its research adopts a quantitative methodology. The study confirms that mascots have an ability to communicate a message in an effective manner; all though they are simple in terms of design and fashion trend, they have the capability to build positive reactions.

Keywords: Food mascot, brand recognitions, advertising, humour.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1397
4671 Using Perspective Schemata to Model the ETL Process

Authors: Valeria M. Pequeno, Joao Carlos G. M. Pires

Abstract:

Data Warehouses (DWs) are repositories which contain the unified history of an enterprise for decision support. The data must be Extracted from information sources, Transformed and integrated to be Loaded (ETL) into the DW, using ETL tools. These tools focus on data movement, where the models are only used as a means to this aim. Under a conceptual viewpoint, the authors want to innovate the ETL process in two ways: 1) to make clear compatibility between models in a declarative fashion, using correspondence assertions and 2) to identify the instances of different sources that represent the same entity in the real-world. This paper presents the overview of the proposed framework to model the ETL process, which is based on the use of a reference model and perspective schemata. This approach provides the designer with a better understanding of the semantic associated with the ETL process.

Keywords: conceptual data model, correspondence assertions, data warehouse, data integration, ETL process, object relational database.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1492
4670 A Wireless Secure Remote Access Architecture Implementing Role Based Access Control: WiSeR

Authors: E. Tomur, R. Deregozu, T. Genc

Abstract:

In this study, we propose a network architecture for providing secure access to information resources of enterprise network from remote locations in a wireless fashion. Our proposed architecture offers a very promising solution for organizations which are in need of a secure, flexible and cost-effective remote access methodology. Security of the proposed architecture is based on Virtual Private Network technology and a special role based access control mechanism with location and time constraints. The flexibility mainly comes from the use of Internet as the communication medium and cost-effectiveness is due to the possibility of in-house implementation of the proposed architecture.

Keywords: Remote access, wireless networks, security, virtualprivate networks, RBAC.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1676
4669 An Ecological Model for Three Species with Crowley–Martin Functional Response

Authors: Randhir Singh Baghel, Govind Shay Sharma

Abstract:

In this paper, we explore an ecosystem that contains a three-species food chain. The first and second species are in competition with one another for resources. However, the third species plays an important role in providing non-linear Crowley-Martin functional support for the first species. Additionally, the third species consumes the second species in a linear fashion, taking advantage of the available resources. This intricate balance ensures the survival of all three species in the ecosystem. A set of non-linear isolated first-order differential equations establish this model. We examine the system's stability at all potential equilibrium locations using the perturbed technique. Furthermore, by spending a lot of time observing the species in their natural habitat, the numerical illustrations at suitable parameter values for the model are shown.

Keywords: Competition, predator, response function, local stability, numerical simulations.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 182
4668 Septic B-spline Collocation Method for Solving One-dimensional Hyperbolic Telegraph Equation

Authors: Marzieh Dosti, Alireza Nazemi

Abstract:

Recently, it is found that telegraph equation is more suitable than ordinary diffusion equation in modelling reaction diffusion for such branches of sciences. In this paper, a numerical solution for the one-dimensional hyperbolic telegraph equation by using the collocation method using the septic splines is proposed. The scheme works in a similar fashion as finite difference methods. Test problems are used to validate our scheme by calculate L2-norm and L∞-norm. The accuracy of the presented method is demonstrated by two test problems. The numerical results are found to be in good agreement with the exact solutions.

Keywords: B-spline, collocation method, second-order hyperbolic telegraph equation, difference schemes.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1776
4667 Microfluidic Continuous Approaches to Produce Magnetic Nanoparticles with Homogeneous Size Distribution

Authors: Ane Larrea, Victor Sebastian, Manuel Arruebo, Jesus Santamaria

Abstract:

We present a gas-liquid microfluidic system as a reactor to obtain magnetite nanoparticles with an excellent degree of control regarding their crystalline phase, shape and size. Several types of microflow approaches were selected to prevent nanomaterial aggregation and to promote homogenous size distribution. The selected reactor consists of a mixer stage aided by ultrasound waves and a reaction stage using a N2-liquid segmented flow to prevent magnetite oxidation to non-magnetic phases. A milli-fluidic reactor was developed to increase the production rate where a magnetite throughput close to 450 mg/h in a continuous fashion was obtained.

Keywords: Microfluidics, magnetic nanoparticles, continuous production, nanomaterials.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2961
4666 Identifying the Gap between Consumers with Down Syndrome and Apparel Brands

Authors: Lucky Farha, Martha L. Hall

Abstract:

The current adaptive clothing brands are limited in numbers and specific categories. This study explores clothing challenges for children with Down syndrome and factors that influence their perception of adaptive clothing brands. Another aim of this study was to explore brands' challenges in the adaptive business and factors that influence their perceptions towards the adaptive market. In order to determine the market barriers affecting adaptive target market needs, we applied Technology Acceptance Model. After interviewing and surveying parents/caregivers having children with Down syndrome and current adaptive brands, the results found education as the significant gap in the adaptive clothing market yet to be overcome. Based on the finding, several recommendations were suggested to improve the current barriers in the adaptive clothing market.

Keywords: Adaptive fashion, disability, functional clothing, clothing needs assessment, Down syndrome, clothing challenge.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 324
4665 Cooling Turbine Blades using Exciting Boundary Layer

Authors: Ali Ghobadi, Seyed Mohammad Javadi, Behnam Rahimi

Abstract:

The present study is concerned with the effect of exciting boundary layer on cooling process in a gas-turbine blades. The cooling process is numerically investigated. Observations show cooling the first row of moving or stable blades leads to increase their life-time. Results show that minimum temperature in cooling line with exciting boundary layer is lower than without exciting. Using block in cooling line of turbines' blade causes flow pattern and stability in boundary layer changed that causes increase in heat transfer coefficient. Results show at the location of block, temperature of turbines' blade is significantly decreased. The k-ε turbulence model is used.

Keywords: Cooling, Exciting Boundary Layer, Heat Transfer, Turbine Blade.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2260
4664 Impact of Reflectors on Solar Energy Systems

Authors: J. Rizk, M. H. Nagrial

Abstract:

The paper aims to show that implementing different types of reflectors in solar energy systems, will dramatically improve energy production by means of concentrating and intensifying more sunlight onto a solar cell. The Solar Intensifier unit is designed to increase efficiency and performance of a set of solar panels. The unit was fabricated and tested. The experimental results show good improvement in the performance of the solar energy system.

Keywords: Renewable Energy, Power optimization, Solar Energy.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3241
4663 Rheological Behavior of Fresh Activated Sludge

Authors: Salam K. Al-Dawery

Abstract:

Despite of few research works on municipal sludge, still there is a lack of actual data. Thus, this work was focused on the conditioning and rheology of fresh activated sludge. The effect of cationic polyelectrolyte has been investigated at different concentrations and pH values in a comparative fashion. Yield stress is presented in all results indicating the minimum stress that necessary to reach flow conditions. Connections between particle-particle is the reason for this yield stress, also, the addition of polyelectrolyte causes strong bonds between particles and water resulting in the aggregation of particles which required higher shear stress in order to flow. The results from the experiments indicate that the cationic polyelectrolytes have significant effluence on the sludge characteristic and water quality such as turbidity, SVI, zone settling rate and shear stress.

Keywords: Rheology, Polyelectrolyte, Settling volume index, Turbidity.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1868
4662 Public R and D Risk and Risk Management Policy

Authors: Youngseok Lee, Dongjin Chung, Youngjin Kim

Abstract:

R&D risk management has been suggested as one of the management approaches for accomplishing the goals of public R&D investment. The investment in basic science and core technology development is the essential roles of government for securing the social base needed for continuous economic growth. And, it is also an important role of the science and technology policy sectors to generate a positive environment in which the outcomes of public R&D can be diffused in a stable fashion by controlling the uncertainties and risk factors in advance that may arise during the application of such achievements to society and industry. Various policies have already been implemented to manage uncertainties and variables that may have negative impact on accomplishing public R& investment goals. But we may derive new policy measures for complementing the existing policies and for exploring progress direction by analyzing them in a policy package from the viewpoint of R&D risk management.

Keywords: Risk management, Public R&D policy, Science andtechnology policy, Performance management.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1637
4661 Landslide and Debris Flow Characteristics during Extreme Rainfall in Taiwan

Authors: C. Y. Chen

Abstract:

As the global climate changes, the threat from landslides and debris flows increases. Learning how a watershed initiates landslides under abnormal rainfall conditions and predicting landslide magnitude and frequency distribution is thus important. Landslides show a power-law distribution in the frequency-area distribution. The distribution curve shows an exponent gradient 1.0 in the Sandpile model test. Will the landslide frequency-area statistics show a distribution similar to the Sandpile model under extreme rainfall conditions? The purpose of the study is to identify the extreme rainfall-induced landslide frequency-area distribution in the Laonong River Basin in southern Taiwan. Results of the analysis show that a lower gradient of landslide frequency-area distribution could be attributed to the transportation and deposition of debris flow areas that are included in the landslide area.

Keywords: Landslide, power-law distribution, GIS.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1925
4660 An Innovative Approach to the Formulation of Connection Admission Control Problem

Authors: Carlo Bruni, Francesco Delli Priscoli, Giorgio Koch, Ilaria Marchetti

Abstract:

This paper proposes an innovative approach for the Connection Admission Control (CAC) problem. Starting from an abstract network modelling, the CAC problem is formulated in a technology independent fashion allowing the proposed concepts to be applied to any wireless and wired domain. The proposed CAC is decoupled from the other Resource Management procedures, but cooperates with them in order to guarantee the desired QoS requirements. Moreover, it is based on suitable performance measurements which, by using proper predictors, allow to forecast the domain dynamics in the next future. Finally, the proposed CAC control scheme is based on a feedback loop aiming at maximizing a suitable performance index accounting for the domain throughput, whilst respecting a set of constraints accounting for the QoS requirements.

Keywords: Network Management, Quality of Service (QoS) requirements, Optimal Control.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2268
4659 Interaction between Environmental Performance and Logistic System: A Case Study of International Company

Authors: T. Tambovceva, A. Tambovcevs

Abstract:

The activities which are mostly related to the environmental performance need to be pointed, especially how logistics systems influence on environmental performance. This paper analyses how company could lead the initiative in this area by incorporating environmental management principles into their daily activities. The analysis is based on literature review about logistics and environment, the information from company R website as well as face-to-face interviews. A case study is given to show how they can turn practices into green while simultaneously meet the efficiency objectives. The research results show that the adoption of EMS and ISO 14001 certification is an effective tool for the logistics management. Such practices simultaneously reduce the negative contribute to better company performance. The results also show that the emissions to air and water, and energy consumption are the main logistics impacts to the environment.

Keywords: environmental management system, green logistics, information technology, information systems.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1743
4658 Analysis of Network Performance Using Aspect of Quantum Cryptography

Authors: Nisarg A. Patel, Hiren B. Patel

Abstract:

Quantum cryptography is described as a point-to-point secure key generation technology that has emerged in recent times in providing absolute security. Researchers have started studying new innovative approaches to exploit the security of Quantum Key Distribution (QKD) for a large-scale communication system. A number of approaches and models for utilization of QKD for secure communication have been developed. The uncertainty principle in quantum mechanics created a new paradigm for QKD. One of the approaches for use of QKD involved network fashioned security. The main goal was point-to-point Quantum network that exploited QKD technology for end-to-end network security via high speed QKD. Other approaches and models equipped with QKD in network fashion are introduced in the literature as. A different approach that this paper deals with is using QKD in existing protocols, which are widely used on the Internet to enhance security with main objective of unconditional security. Our work is towards the analysis of the QKD in Mobile ad-hoc network (MANET).

Keywords: QKD, cryptography, quantum cryptography, network performance.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 904
4657 Reduction of Overheads with Dynamic Caching in Fixed AODV based MANETs

Authors: Babar S. Kawish, Baber Aslam, Shoab A Khan

Abstract:

In this paper we show that adjusting ART in accordance with static network scenario can substantially improve the performance of AODV by reducing control overheads. We explain the relationship of control overheads with network size and request patterns of the users. Through simulation we show that making ART proportionate to network static time reduces the amount of control overheads independent of network size and user request patterns.

Keywords: AODV, ART, MANET, Route Cache, TTL.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1726
4656 A Dynamic RGB Intensity Based Steganography Scheme

Authors: Mandep Kaur, Surbhi Gupta, Parvinder S. Sandhu, Jagdeep Kaur

Abstract:

Steganography meaning covered writing. Steganography includes the concealment of information within computer files [1]. In other words, it is the Secret communication by hiding the existence of message. In this paper, we will refer to cover image, to indicate the images that do not yet contain a secret message, while we will refer to stego images, to indicate an image with an embedded secret message. Moreover, we will refer to the secret message as stego-message or hidden message. In this paper, we proposed a technique called RGB intensity based steganography model as RGB model is the technique used in this field to hide the data. The methods used here are based on the manipulation of the least significant bits of pixel values [3][4] or the rearrangement of colors to create least significant bit or parity bit patterns, which correspond to the message being hidden. The proposed technique attempts to overcome the problem of the sequential fashion and the use of stego-key to select the pixels.

Keywords: Steganography, Stego Image, RGB Image, Cryptography, LSB.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2097
4655 Neural Adaptive Switching Control of Robotic Systems

Authors: A. Denker, U. Akıncıoğlu

Abstract:

In this paper a neural adaptive control method has been developed and applied to robot control. Simulation results are presented to verify the effectiveness of the controller. These results show that the performance by using this controller is better than those which just use either direct inverse control or predictive control. In addition, they show that the resulting is a useful method which combines the advantages of both direct inverse control and predictive control.

Keywords: Neural networks, robotics, direct inverse control, predictive control.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2161
4654 Authentication in Multi-Hop Wireless Mesh Networks

Authors: Kaleemullah Khan, Muhammmad Akbar

Abstract:

Wireless Mesh Networks (WMNs) are an emerging technology for last-mile broadband access. In WMNs, similar to ad hoc networks, each user node operates not only as a host but also as a router. User packets are forwarded to and from an Internet-connected gateway in multi-hop fashion. The WMNs can be integrated with other networking technologies i.e. ad hoc networks, to implement a smooth network extension. The meshed topology provides good reliability and scalability, as well as low upfront investments. Despite the recent start-up surge in WMNs, much research remains to be done in standardizing the functional parameters of WMNs to fully exploit their full potential. An edifice of the security concerns of these networks is authentication of a new client joining an integrated ad hoc network and such a scenario will require execution of a multihop authentication technique. Our endeavor in this paper is to introduce a secure authentication technique, with light over-heads that can be conveniently implemented for the ad-hoc nodes forming clients of an integrated WMN, thus facilitating their inter-operability.

Keywords: Multi-Hop WMNs, PANA, EAP-TTLS, Authentication, RADIUS.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1802
4653 A Fuzzy Dynamic Load Balancing Algorithm for Homogenous Distributed Systems

Authors: Ali M. Alakeel

Abstract:

Load balancing in distributed computer systems is the process of redistributing the work load among processors in the system to improve system performance. Most of previous research in using fuzzy logic for the purpose of load balancing has only concentrated in utilizing fuzzy logic concepts in describing processors load and tasks execution length. The responsibility of the fuzzy-based load balancing process itself, however, has not been discussed and in most reported work is assumed to be performed in a distributed fashion by all nodes in the network. This paper proposes a new fuzzy dynamic load balancing algorithm for homogenous distributed systems. The proposed algorithm utilizes fuzzy logic in dealing with inaccurate load information, making load distribution decisions, and maintaining overall system stability. In terms of control, we propose a new approach that specifies how, when, and by which node the load balancing is implemented. Our approach is called Centralized-But-Distributed (CBD).

Keywords: Dynamic load balancing, fuzzy logic, distributed systems, algorithm.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2433
4652 CFD Modeling of Reduction in NOX Emission Using HiTAC Technique

Authors: Abbas Khoshhal, Masoud Rahimi, Sayed Reza Shabanian, Ammar Abdulaziz Alsairafi

Abstract:

In the present study, the rate of NOx emission in a combustion chamber working in conventional combustion and High Temperature Air Combustion (HiTAC) system are examined using CFD modeling. The effect of peak temperature, combustion air temperature and oxygen concentration on NOx emission rate was undertaken. Results show that in a fixed oxygen concentration, increasing the preheated air temperature will increase the peak temperature and NOx emission rate. In addition, it was observed that the reduction of the oxygen concentration in the fixed preheated air temperature decreases the peak temperature and NOx emission rate. On the other hand, the results show that increase of preheated air temperature at various oxygen concentrations increases the NOx emission rate. However, the rate of increase in HiTAC conditions is quite lower than the conventional combustion. The modeling results show that the NOx emission rate in HiTAC combustion is 133% less than that of the conventional combustion.

Keywords: CFD Modeling, HiTAC, NOx, Combustion.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1895
4651 Knowledge Transfer and the Translation of Technical Texts

Authors: Ahmed Alaoui

Abstract:

This paper contributes to the ongoing debate as to the relevance of translation studies to professional practitioners. It exposes the various misconceptions permeating the links between theory and practice in the translation landscape in the Arab World. It is a thesis of this paper that specialization in translation should be redefined; taking account of the fact, that specialized knowledge alone is neither crucial nor sufficient in technical translation. It should be tested against the readability of the translated text, the appropriateness of its style and the usability of its content by endusers to carry out their intended tasks. The paper also proposes a preliminary model to establish a working link between theory and practice from the perspective of professional trainers and practitioners, calling for the latter to participate in the production of knowledge in a systematic fashion. While this proposal is driven by a rather intuitive conviction, a research line is needed to specify the methodological moves to establish the mediation strategies that would relate the components in the model of knowledge transfer proposed in this paper. 

Keywords: Knowledge transfer, misconceptions, specialized texts, translation theory, translation practice.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3769
4650 Extreme Temperature Forecast in Mbonge, Cameroon through Return Level Analysis of the Generalized Extreme Value (GEV) Distribution

Authors: Nkongho Ayuketang Arreyndip, Ebobenow Joseph

Abstract:

In this paper, temperature extremes are forecast by employing the block maxima method of the Generalized extreme value(GEV) distribution to analyse temperature data from the Cameroon Development Corporation (C.D.C). By considering two sets of data (Raw data and simulated data) and two (stationary and non-stationary) models of the GEV distribution, return levels analysis is carried out and it was found that in the stationary model, the return values are constant over time with the raw data while in the simulated data, the return values show an increasing trend but with an upper bound. In the non-stationary model, the return levels of both the raw data and simulated data show an increasing trend but with an upper bound. This clearly shows that temperatures in the tropics even-though show a sign of increasing in the future, there is a maximum temperature at which there is no exceedence. The results of this paper are very vital in Agricultural and Environmental research.

Keywords: Return level, Generalized extreme value (GEV), Meteorology, Forecasting.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2085
4649 An Improved Method to Watermark Images Sensitive to Blocking Artifacts

Authors: Afzel Noore

Abstract:

A new digital watermarking technique for images that are sensitive to blocking artifacts is presented. Experimental results show that the proposed MDCT based approach produces highly imperceptible watermarked images and is robust to attacks such as compression, noise, filtering and geometric transformations. The proposed MDCT watermarking technique is applied to fingerprints for ensuring security. The face image and demographic text data of an individual are used as multiple watermarks. An AFIS system was used to quantitatively evaluate the matching performance of the MDCT-based watermarked fingerprint. The high fingerprint matching scores show that the MDCT approach is resilient to blocking artifacts. The quality of the extracted face and extracted text images was computed using two human visual system metrics and the results show that the image quality was high.

Keywords: Digital watermarking, data hiding, modified discretecosine transformation (MDCT).

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1591