Search results for: family history
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 828

Search results for: family history

558 Liberation as a Method for Monument Valorisation: The Case of the Defence Heritage Restoration

Authors: Donatella R. Fiorino, Marzia Loddo

Abstract:

The practice of freeing monuments from subsequent additions crosses the entire history of conservation and it is traditionally connected to the aim of valorisation, both for cultural and educational purpose and recently even for touristic exploitation. Defence heritage has been widely interested by these cultural and technical moods from philological restoration to critic innovations. A renovated critical analysis of Italian episodes and in particular the Sardinian case of the area of San Pancrazio in Cagliari, constitute an important lesson about the limits of this practice and the uncertainty in terms of results, towards the definition of a sustainable good practice in the restoration of military architectures.

Keywords: Defensive architecture, Liberation, Valorisation for tourism, Historical restoration.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2043
557 Enhancing Retrieval Effectiveness of Malay Documents by Exploiting Implicit Semantic Relationship between Words

Authors: Mohd Pouzi Hamzah, Tengku Mohd Tengku Sembok

Abstract:

Phrases has a long history in information retrieval, particularly in commercial systems. Implicit semantic relationship between words in a form of BaseNP have shown significant improvement in term of precision in many IR studies. Our research focuses on linguistic phrases which is language dependent. Our results show that using BaseNP can improve performance although above 62% of words formation in Malay Language based on derivational affixes and suffixes.

Keywords: Information Retrieval, Malay Language, Semantic Relationship, Retrieval Effectiveness, Conceptual Indexing.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1380
556 Response of a Bridge Crane during an Earthquake

Authors: F. Fekak, A. Gravouil, M. Brun, B. Depale

Abstract:

During an earthquake, a bridge crane may be subjected to multiple impacts between crane wheels and rail. In order to model such phenomena, a time-history dynamic analysis with a multi-scale approach is performed. The high frequency aspect of the impacts between wheels and rails is taken into account by a Lagrange explicit event-capturing algorithm based on a velocity-impulse formulation to resolve contacts and impacts. An implicit temporal scheme is used for the rest of the structure. The numerical coupling between the implicit and the explicit schemes is achieved with a heterogeneous asynchronous time-integrator.

Keywords: Earthquake, bridge crane, heterogeneous asynchronous time-integrator, impacts.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1386
555 Airliner-UAV Flight Formation in Climb Regime

Authors: Pavel Zikmund, Robert Popela

Abstract:

Extreme formation is a theoretical concept of selfsustain flight when a big airliner is followed by a small UAV glider flying in the airliner wake vortex. The paper presents results of a climb analysis with the goal to lift the gliding UAV to airliners cruise altitude. Wake vortex models, the UAV drag polar and basic parameters and airliner’s climb profile are introduced at first. Afterwards, flight performance of the UAV in a wake vortex is evaluated by analytical methods. Time history of optimal distance between an airliner and the UAV during a climb is determined. The results are encouraging. Therefore available UAV drag margin for electricity generation is figured out for different vortex models.

Keywords: Flight in formation, self-sustained flight, UAV, wake vortex.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1948
554 The Effect of Social Structural Change on the Traditional Turkish Houses Becoming Unusable

Authors: Gamze Fahriye Pehlivan, Tulay Canitez

Abstract:

The traditional Turkish houses becoming unusable are a result of the deterioration of the balanced interaction between users and house (human and house) continuing during the history. Especially depending upon the change in social structure, the houses becoming neglected do not meet the desires of the users and do not have the meaning but the shelter are becoming unusable and are being destroyed. A conservation policy should be developed and renovations should be made in order to pass the traditional houses carrying the quality of a cultural and historical document presenting the social structure, the lifestyle and the traditions of its own age to the next generations and to keep them alive.

Keywords: House, social structural change, social structural, traditional Turkish houses.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1666
553 Two Kinds of Self-Oscillating Circuits Mechanically Demonstrated

Authors: Shiang-Hwua Yu, Po-Hsun Wu

Abstract:

This study introduces two types of self-oscillating circuits that are frequently found in power electronics applications. Special effort is made to relate the circuits to the analogous mechanical systems of some important scientific inventions: Galileo’s pendulum clock and Coulomb’s friction model. A little touch of related history and philosophy of science will hopefully encourage curiosity, advance the understanding of self-oscillating systems and satisfy the aspiration of some students for scientific literacy. Finally, the two self-oscillating circuits are applied to design a simple class-D audio amplifier.

Keywords: Self-oscillation, sigma-delta modulator, pendulum clock, Coulomb friction, class-D amplifier.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2404
552 RFID Logistic Management with Cold Chain Monitoring – Cold Store Case Study

Authors: Mira Trebar

Abstract:

Logistics processes of perishable food in the supply chain include the distribution activities and the real time temperature monitoring to fulfil the cold chain requirements. The paper presents the use of RFID (Radio Frequency Identification) technology as an identification tool of receiving and shipping activities in the cold store. At the same time, the use of RFID data loggers with temperature sensors is presented to observe and store the temperatures for the purpose of analyzing the processes and having the history data available for traceability purposes and efficient recall management.

Keywords: Logistics, warehouse, RFID device, cold chain.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3653
551 Digital Image Forensics: Discovering the History of Digital Images

Authors: Gurinder Singh, Kulbir Singh

Abstract:

Digital multimedia contents such as image, video, and audio can be tampered easily due to the availability of powerful editing softwares. Multimedia forensics is devoted to analyze these contents by using various digital forensic techniques in order to validate their authenticity. Digital image forensics is dedicated to investigate the reliability of digital images by analyzing the integrity of data and by reconstructing the historical information of an image related to its acquisition phase. In this paper, a survey is carried out on the forgery detection by considering the most recent and promising digital image forensic techniques.

Keywords: Computer forensics, multimedia forensics, image ballistics, camera source identification, forgery detection.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1734
550 Applications of Stable Distributions in Time Series Analysis, Computer Sciences and Financial Markets

Authors: Mohammad Ali Baradaran Ghahfarokhi, Parvin Baradaran Ghahfarokhi

Abstract:

In this paper, first we introduce the stable distribution, stable process and theirs characteristics. The a -stable distribution family has received great interest in the last decade due to its success in modeling data, which are too impulsive to be accommodated by the Gaussian distribution. In the second part, we propose major applications of alpha stable distribution in telecommunication, computer science such as network delays and signal processing and financial markets. At the end, we focus on using stable distribution to estimate measure of risk in stock markets and show simulated data with statistical softwares.

Keywords: stable distribution, SaS, infinite variance, heavy tail networks, VaR.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2012
549 A Geometrical Perspective on the Insulin Evolution

Authors: Yuhei Kunihiro, Sorin V. Sabau, Kazuhiro Shibuya

Abstract:

We study the molecular evolution of insulin from metric geometry point of view. In mathematics, and in particular in geometry, distances and metrics between objects are of fundamental importance. Using a weaker notion than the classical distance, namely the weighted quasi-metrics, one can study the geometry of biological sequences (DNA, mRNA, or proteins) space. We analyze from geometrical point of view a family of 60 insulin homologous sequences ranging on a large variety of living organisms from human to the nematode C. elegans. We show that the distances between sequences provide important information about the evolution and function of insulin.

Keywords: Metric geometry, evolution, insulin.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1493
548 The Same or Not the Same - On the Variety of Mechanisms of Path Dependence

Authors: Jürgen Beyer

Abstract:

In association with path dependence, researchers often talk of institutional “lock-in", thereby indicating that far-reaching path deviation or path departure are to be regarded as exceptional cases. This article submits the alleged general inclination for stability of path-dependent processes to a critical review. The different reasons for path dependence found in the literature indicate that different continuity-ensuring mechanisms are at work when people talk about path dependence (“increasing returns", complementarity, sequences etc.). As these mechanisms are susceptible to fundamental change in different ways and to different degrees, the path dependence concept alone is of only limited explanatory value. It is therefore indispensable to identify the underlying continuity-ensuring mechanism as well if a statement-s empirical value is to go beyond the trivial, always true “history matters".

Keywords: path dependence, increasing returns, historicalinstitutionalism, lock-in.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1810
547 Sociocultural Context of Pain Management in Oncology and Palliative Nursing Care

Authors: Andrea Zielke-Nadkarni

Abstract:

Pain management is a question of quality of life and an indicator for nursing quality. Chronic pain which is predominant in oncology and palliative nursing situations is perceived today as a multifactorial, individual emotional experience with specific characteristics including the sociocultural dimension when dealing with migrant patients. This dimension of chronic pain is of major importance in professional nursing of migrant patients in hospices or palliative care units. Objectives of the study are: 1. To find out more about the sociocultural views on pain and nursing care, on customs and nursing practices connected with pain of both Turkish Muslim and German Christian women, 2. To improve individual and family oriented nursing practice with view to sociocultural needs of patients in severe pain in palliative care. In a qualitative-explorative comparative study 4 groups of women, Turkish Muslims immigrants (4 from the first generation, 5 from the second generation) and German Christian women of two generations (5 of each age group) of the same age groups as the Turkish women and with similar educational backgrounds were interviewed (semistructured ethnographic interviews using Spradley, 1979) on their perceptions and experiences of pain and nursing care within their families. For both target groups the presentation will demonstrate the following results in detail: Utterance of pain as well as “private” and “public” pain vary within different societies and cultures. Permitted forms of pain utterance are learned in childhood and determine attitudes and expectations in adulthood. Language, especially when metaphors and symbols are used, plays a major role for misunderstandings. The sociocultural context of illness may include specific beliefs that are important to the patients and yet seem more than far-fetched from a biomedical perspective. Pain can be an influential factor in family relationships where respect or hierarchies do not allow the direct utterance of individual needs. Specific resources are often, although not exclusively, linked to religious convictions and are significantly helpful in reducing pain. The discussion will evaluate the results of the study with view to the relevant literature and present nursing interventions and instruments beyond medication that are helpful when dealing with patients from various socio-cultural backgrounds in painful end-oflife situations.

Keywords: Pain management, migrants, sociocultural context, palliative care.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2115
546 Frequency Domain Analysis for Hopf Bifurcation in a Delayed Competitive Web-site Model

Authors: Changjin Xu, Yusen Wu

Abstract:

In this paper, applying frequency domain approach, a delayed competitive web-site system is investigated. By choosing the parameter α as a bifurcation parameter, it is found that Hopf bifurcation occurs as the bifurcation parameter α passes a critical values. That is, a family of periodic solutions bifurcate from the equilibrium when the bifurcation parameter exceeds a critical value. Some numerical simulations are included to justify the theoretical analysis results. Finally, main conclusions are given.

Keywords: Web-site system, stability, Nyquist criterion, Hopf bifurcation, frequency domain.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1424
545 Metamorphism, Formal Grammars and Undecidable Code Mutation

Authors: Eric Filiol

Abstract:

This paper presents a formalisation of the different existing code mutation techniques (polymorphism and metamorphism) by means of formal grammars. While very few theoretical results are known about the detection complexity of viral mutation techniques, we exhaustively address this critical issue by considering the Chomsky classification of formal grammars. This enables us to determine which family of code mutation techniques are likely to be detected or on the contrary are bound to remain undetected. As an illustration we then present, on a formal basis, a proof-of-concept metamorphic mutation engine denoted PB MOT, whose detection has been proven to be undecidable.

Keywords: Polymorphism, Metamorphism, Formal Grammars, Formal Languages, Language Decision, Code Mutation, Word Problem

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2366
544 A Side-Peak Cancellation Scheme for CBOC Code Acquisition

Authors: Youngpo Lee, Seokho Yoon

Abstract:

In this paper, we propose a side-peak cancellation scheme for code acquisition of composite binary offset carrier (CBOC) signals. We first model the family of CBOC signals in a generic form, and then, propose a side-peak cancellation scheme by combining correlation functions between the divided sub-carrier and received signals. From numerical results, it is shown that the proposed scheme removes the side-peak completely, and moreover, the resulting correlation function demonstrates the better power ratio performance than the CBOC autocorrelation.

Keywords: CBOC, side-peak, ambiguity problem, synchronization

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1692
543 Inclusive Housing in Australia – A Voluntary Response

Authors: M. Ward, J. Franz, B. Adkins

Abstract:

The lack of inclusive housing in Australia contributes to the marginalization and exclusion of people with disability and older people from family and community life. The Australian government has handed over the responsibility of increasing the supply of inclusive housing to the housing industry through an agreed national access standard and a voluntary strategy. Voluntary strategies have not been successful in other constituencies and little is known about what would work in Australia today. Findings from a research project into the voluntariness of the housing industry indicate that a reliable and consistent supply is unlikely without an equivalent increase in demand. The strategy has, however, an important role to play in the task of changing housing industry practices towards building more inclusive communities.

Keywords: Australia, housing, inclusion, voluntary, industry

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1530
542 How to Modernise the European Competition Network (ECN)

Authors: Dorota Galeza

Abstract:

This paper argues that networks, such as the ECN and the American network, are affected by certain small events which are inherent to path dependence and preclude the full evolution towards efficiency. It is advocated that the American network is superior to the ECN in many respects due to its greater flexibility and longer history. This stems in particular from the creation of the American network, which was based on a small number of cases. Such a structure encourages further changes and modifications which are not necessarily radical. The ECN, by contrast, was established by legislative action, which explains its rigid structure and resistance to change. This paper is an attempt to transpose the superiority of the American network on to the ECN. It looks at concepts such as judicial cooperation, harmonisation of procedure, peer review and regulatory impact assessments (RIAs), and dispute resolution procedures.

Keywords: Antitrust, Competition, Networks, Path Dependence.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1573
541 Efficient Web Usage Mining Based on K-Medoids Clustering Technique

Authors: P. Sengottuvelan, T. Gopalakrishnan

Abstract:

Web Usage Mining is the application of data mining techniques to find usage patterns from web log data, so as to grasp required patterns and serve the requirements of Web-based applications. User’s expertise on the internet may be improved by minimizing user’s web access latency. This may be done by predicting the future search page earlier and the same may be prefetched and cached. Therefore, to enhance the standard of web services, it is needed topic to research the user web navigation behavior. Analysis of user’s web navigation behavior is achieved through modeling web navigation history. We propose this technique which cluster’s the user sessions, based on the K-medoids technique.

Keywords: Clustering, K-medoids, Recommendation, User Session, Web Usage Mining.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1358
540 Ranking - Convex Risk Minimization

Authors: Wojciech Rejchel

Abstract:

The problem of ranking (rank regression) has become popular in the machine learning community. This theory relates to problems, in which one has to predict (guess) the order between objects on the basis of vectors describing their observed features. In many ranking algorithms a convex loss function is used instead of the 0-1 loss. It makes these procedures computationally efficient. Hence, convex risk minimizers and their statistical properties are investigated in this paper. Fast rates of convergence are obtained under conditions, that look similarly to the ones from the classification theory. Methods used in this paper come from the theory of U-processes as well as empirical processes.

Keywords: Convex loss function, empirical risk minimization, empirical process, U-process, boosting, euclidean family.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1372
539 The Number of Rational Points on Elliptic Curves and Circles over Finite Fields

Authors: Betül Gezer, Ahmet Tekcan, Osman Bizim

Abstract:

In elliptic curve theory, number of rational points on elliptic curves and determination of these points is a fairly important problem. Let p be a prime and Fp be a finite field and k ∈ Fp. It is well known that which points the curve y2 = x3 + kx has and the number of rational points of on Fp. Consider the circle family x2 + y2 = r2. It can be interesting to determine common points of these two curve families and to find the number of these common points. In this work we study this problem.

Keywords: Elliptic curves over finite fields, rational points on elliptic curves and circles.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1997
538 A Family of Minimal Residual Based Algorithm for Adaptive Filtering

Authors: Noor Atinah Ahmad

Abstract:

The Minimal Residual (MR) is modified for adaptive filtering application. Three forms of MR based algorithm are presented: i) the low complexity SPCG, ii) MREDSI, and iii) MREDSII. The low complexity is a reduced complexity version of a previously proposed SPCG algorithm. Approximations introduced reduce the algorithm to an LMS type algorithm, but, maintain the superior convergence of the SPCG algorithm. Both MREDSI and MREDSII are MR based methods with Euclidean direction of search. The choice of Euclidean directions is shown via simulation to give better misadjustment compared to their gradient search counterparts.

Keywords: Adaptive filtering, Adaptive least square, Minimalresidual method.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1394
537 Fixed Point of Lipschitz Quasi Nonexpansive Mappings

Authors: M. Moosavi, H. Khatibzadeh

Abstract:

In this article, we study demiclosed and strongly quasi-nonexpansive of a sequence generated by the proximal point algorithm for a finite family of quasi-nonexpansive mappings in Hadamard spaces. Δ-convergence of iterations for the sequence of strongly quasi-nonexpansive mappings as well as the strong convergence of the Halpern type regularization of them to a common fixed point of sequence are also established. Our results generalize and improve several previously known results of the existing literature.

Keywords: Fixed point, Hadamard space, proximal point algorithm, quasi-nonexpansive sequence of mappings, resolvent.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 97
536 The Giant Component in a Random Subgraph of a Weak Expander

Authors: Yilun Shang

Abstract:

In this paper, we investigate the appearance of the giant component in random subgraphs G(p) of a given large finite graph family Gn = (Vn, En) in which each edge is present independently with probability p. We show that if the graph Gn satisfies a weak isoperimetric inequality and has bounded degree, then the probability p under which G(p) has a giant component of linear order with some constant probability is bounded away from zero and one. In addition, we prove the probability of abnormally large order of the giant component decays exponentially. When a contact graph is modeled as Gn, our result is of special interest in the study of the spread of infectious diseases or the identification of community in various social networks.

Keywords: subgraph, expander, random graph, giant component, percolation.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1648
535 Proton-conducting PVA/PMA Hybrid Membranes for Fuel Cell Applications

Authors: Uma Thanganathan

Abstract:

The hybrid membranes containing inorganic materials in polymer matrix are identified as a remarkable family of proton conducting hybrid electrolytes. In this work, the proton conducting inorganic/organic hybrid membranes for proton exchange membrane fuel cells (PEMFCs) were prepared using polyvinyl alcohol (PVA), tetraethoxyorthosilane (TEOS) and heteropolyacid (HPA). The synthesized hybrid membranes were characterized by Fourier transform infrared spectroscopy (FTIR), X-ray diffraction spectroscopy (XRD), Scanning electron microscopy (SEM) and Thermogravimetry analysis (TGA). The effects of heteropolyacid incorporation on membrane properties, including morphology and thermal stability were extensively investigated.

Keywords: PEMFC, Hybrid membrane, FTIR, TGA, Phosphomolybdic acid

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2548
534 Ginzburg-Landau Model : an Amplitude Evolution Equation for Shallow Wake Flows

Authors: Imad Chaddad, Andrei A. Kolyshkin

Abstract:

Linear and weakly nonlinear analysis of shallow wake flows is presented in the present paper. The evolution of the most unstable linear mode is described by the complex Ginzburg-Landau equation (CGLE). The coefficients of the CGLE are calculated numerically from the solution of the corresponding linear stability problem for a one-parametric family of shallow wake flows. It is shown that the coefficients of the CGLE are not so sensitive to the variation of the base flow profile.

Keywords: Ginzburg-Landau equation, shallow wake flow, weakly nonlinear theory.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1537
533 Progressive Collapse of Hyperbolic Cooling Tower Considering the Support Inclinations

Authors: Esmaeil Asadzadeh, Mehtab Alam

Abstract:

Progressive collapse of the layered hyperbolic tower shells are studied considering the influences of changes in the supporting columns’ types and angles. 3-D time history analyses employing the finite element method are performed for the towers supported with I-type and ᴧ-type column. It is found that the inclination angle of the supporting columns is a very important parameter in optimization and safe design of the cooling towers against the progressive collapse. It is also concluded that use of Demand Capacity Ratio (DCR) criteria of the linear elastic approach recommended by GSA is un-conservative for the hyperbolic tower shells.

Keywords: Progressive collapse, cooling towers, finite element analysis, crack generation, reinforced concrete.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1309
532 Seismic Fragility Assessment of Continuous Integral Bridge Frames with Variable Expansion Joint Clearances

Authors: P. Mounnarath, U. Schmitz, Ch. Zhang

Abstract:

Fragility analysis is an effective tool for the seismic vulnerability assessment of civil structures in the last several years. The design of the expansion joints according to various bridge design codes is almost inconsistent, and only a few studies have focused on this problem so far. In this study, the influence of the expansion joint clearances between the girder ends and the abutment backwalls on the seismic fragility assessment of continuous integral bridge frames is investigated. The gaps (ranging from 60 mm, 150 mm, 250 mm and 350 mm) are designed by following two different bridge design code specifications, namely, Caltrans and Eurocode 8-2. Five bridge models are analyzed and compared. The first bridge model serves as a reference. This model uses three-dimensional reinforced concrete fiber beam-column elements with simplified supports at both ends of the girder. The other four models also employ reinforced concrete fiber beam-column elements but include the abutment backfill stiffness and four different gap values. The nonlinear time history analysis is performed. The artificial ground motion sets, which have the peak ground accelerations (PGAs) ranging from 0.1 g to 1.0 g with an increment of 0.05 g, are taken as input. The soil-structure interaction and the P-Δ effects are also included in the analysis. The component fragility curves in terms of the curvature ductility demand to the capacity ratio of the piers and the displacement demand to the capacity ratio of the abutment sliding bearings are established and compared. The system fragility curves are then obtained by combining the component fragility curves. Our results show that in the component fragility analysis, the reference bridge model exhibits a severe vulnerability compared to that of other sophisticated bridge models for all damage states. In the system fragility analysis, the reference curves illustrate a smaller damage probability in the earlier PGA ranges for the first three damage states, they then show a higher fragility compared to other curves in the larger PGA levels. In the fourth damage state, the reference curve has the smallest vulnerability. In both the component and the system fragility analysis, the same trend is found that the bridge models with smaller clearances exhibit a smaller fragility compared to that with larger openings. However, the bridge model with a maximum clearance still induces a minimum pounding force effect.

Keywords: Expansion joint clearance, fiber beam-column element, fragility assessment, time history analysis.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1676
531 Anaplasmosis among Camels in Iran and Observation of Abnormalities in Infected Blood Films

Authors: Khosro Ghazvinian, Touba Khodaiean

Abstract:

Anaplasma organisms are obligatory intracellular bacteria belonging to the order Rickettsiales, family Anaplasmataceae. This disease is distributed around the globe and infected ticks are the most important vectors in anaplasmosis transmission. There is a little information about anaplasmosis in camels. This research investigated the blood films of 35 (20 male, 15 female) camels randomly selected from a flock of 150 camels. Samples were stained with Giemsa and Anaplasma sp. organisms were observed in six out of 35 (17.14 %) blood films. There were also some changes in Diff-Quick and morphology of leukocytes. No significant difference between male and female camels was observed (P>0.05). According to the results anaplasmosis is presented among camels in Iran.

Keywords: Anaplasma, camel, anaplasmosis, Iran.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 986
530 Managing your Online Reputation: Issues of Ethics, Trust and Privacy in a Wired, “No Place to Hide“ World

Authors: Karen Armstrong

Abstract:

This paper examines the issues, the dangers and the saving graces of life in a transparent global community where there is truly “no place to hide". In recent years, social networks and online groups have transformed issues of privacy and the ways in which we perceive and interact with others. The idea of reputation is critical to this dynamic. The discussion begins with a brief etymological history of the concept of reputation and moves to an exploration of how and why online communication changes our basic nature, our various selves and the Bakhtin idea of the polyphonic nature of truth. The discussion considers the damaging effects of bullying and gossip, both of which constitute an assault on reputation and the latter of which is not limited to the lifetime of the person. It concludes with guidelines and specific recommendations.

Keywords: online reputation, gossip, cyberbullying, privacy

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3330
529 Chinese Tourists’s Behaviors towards Travel and Shopping in Bangkok

Authors: Sasitorn Chetanont

Abstract:

The objectives of this study are to study Chinese tourist’s Behaviors towards travel and shopping in Bangkok. The research methodology was a quantitative research. The sample of this research was 400 Chinese tourists in Bangkok chosen by the accidental sampling and the purposive sampling. Inferential Statistics Analysis by using the Chi-square statistics. As for the results of this study the researcher found that differences between personal, social and cultural information, i.e., gender, age, place of residence, educational level, occupation, income, family, and main objectives of tourism with behaviors of Chinese tourists in Bangkok towards travel and shopping in Bangkok.

Keywords: Tourists’ behavior, Chinese tourists, travelling, expenses in travels.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 4646