CINXE.COM
Search results for: detecting architectural tactics
<!DOCTYPE html> <html lang="en" dir="ltr"> <head> <!-- Google tag (gtag.js) --> <script async src="https://www.googletagmanager.com/gtag/js?id=G-P63WKM1TM1"></script> <script> window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'G-P63WKM1TM1'); </script> <!-- Yandex.Metrika counter --> <script type="text/javascript" > (function(m,e,t,r,i,k,a){m[i]=m[i]||function(){(m[i].a=m[i].a||[]).push(arguments)}; m[i].l=1*new Date(); for (var j = 0; j < document.scripts.length; j++) {if (document.scripts[j].src === r) { return; }} k=e.createElement(t),a=e.getElementsByTagName(t)[0],k.async=1,k.src=r,a.parentNode.insertBefore(k,a)}) (window, document, "script", "https://mc.yandex.ru/metrika/tag.js", "ym"); ym(55165297, "init", { clickmap:false, trackLinks:true, accurateTrackBounce:true, webvisor:false }); </script> <noscript><div><img src="https://mc.yandex.ru/watch/55165297" style="position:absolute; left:-9999px;" alt="" /></div></noscript> <!-- /Yandex.Metrika counter --> <!-- Matomo --> <!-- End Matomo Code --> <title>Search results for: detecting architectural tactics</title> <meta name="description" content="Search results for: detecting architectural tactics"> <meta name="keywords" content="detecting architectural tactics"> <meta name="viewport" content="width=device-width, initial-scale=1, minimum-scale=1, maximum-scale=1, user-scalable=no"> <meta charset="utf-8"> <link href="https://cdn.waset.org/favicon.ico" type="image/x-icon" rel="shortcut icon"> <link href="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/css/bootstrap.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/plugins/fontawesome/css/all.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/css/site.css?v=150220211555" rel="stylesheet"> </head> <body> <header> <div class="container"> <nav class="navbar navbar-expand-lg navbar-light"> <a class="navbar-brand" href="https://waset.org"> <img src="https://cdn.waset.org/static/images/wasetc.png" alt="Open Science Research Excellence" title="Open Science Research Excellence" /> </a> <button class="d-block d-lg-none navbar-toggler ml-auto" type="button" data-toggle="collapse" data-target="#navbarMenu" aria-controls="navbarMenu" aria-expanded="false" aria-label="Toggle navigation"> <span class="navbar-toggler-icon"></span> </button> <div class="w-100"> <div class="d-none d-lg-flex flex-row-reverse"> <form method="get" action="https://waset.org/search" class="form-inline my-2 my-lg-0"> <input class="form-control mr-sm-2" type="search" placeholder="Search Conferences" value="detecting architectural tactics" name="q" aria-label="Search"> <button class="btn btn-light my-2 my-sm-0" type="submit"><i class="fas fa-search"></i></button> </form> </div> <div class="collapse navbar-collapse mt-1" id="navbarMenu"> <ul class="navbar-nav ml-auto align-items-center" id="mainNavMenu"> <li class="nav-item"> <a class="nav-link" href="https://waset.org/conferences" title="Conferences in 2024/2025/2026">Conferences</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/disciplines" title="Disciplines">Disciplines</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/committees" rel="nofollow">Committees</a> </li> <li class="nav-item dropdown"> <a class="nav-link dropdown-toggle" href="#" id="navbarDropdownPublications" role="button" data-toggle="dropdown" aria-haspopup="true" aria-expanded="false"> Publications </a> <div class="dropdown-menu" aria-labelledby="navbarDropdownPublications"> <a class="dropdown-item" href="https://publications.waset.org/abstracts">Abstracts</a> <a class="dropdown-item" href="https://publications.waset.org">Periodicals</a> <a class="dropdown-item" href="https://publications.waset.org/archive">Archive</a> </div> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/page/support" title="Support">Support</a> </li> </ul> </div> </div> </nav> </div> </header> <main> <div class="container mt-4"> <div class="row"> <div class="col-md-9 mx-auto"> <form method="get" action="https://publications.waset.org/abstracts/search"> <div id="custom-search-input"> <div class="input-group"> <i class="fas fa-search"></i> <input type="text" class="search-query" name="q" placeholder="Author, Title, Abstract, Keywords" value="detecting architectural tactics"> <input type="submit" class="btn_search" value="Search"> </div> </div> </form> </div> </div> <div class="row mt-3"> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Commenced</strong> in January 2007</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Frequency:</strong> Monthly</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Edition:</strong> International</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Paper Count:</strong> 1697</div> </div> </div> </div> <h1 class="mt-3 mb-3 text-center" style="font-size:1.6rem;">Search results for: detecting architectural tactics</h1> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1697</span> Detecting Heartbeat Architectural Tactic in Source Code Using Program Analysis</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ananta%20Kumar%20%20Das">Ananta Kumar Das</a>, <a href="https://publications.waset.org/abstracts/search?q=Sujit%20Kumar%20Chakrabarti"> Sujit Kumar Chakrabarti</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Architectural tactics such as heartbeat, ping-echo, encapsulate, encrypt data are techniques that are used to achieve quality attributes of a system. Detecting architectural tactics has several benefits: it can aid system comprehension (e.g., legacy systems) and in the estimation of quality attributes such as safety, security, maintainability, etc. Architectural tactics are typically spread over the source code and are implicit. For large codebases, manual detection is often not feasible. Therefore, there is a need for automated methods of detection of architectural tactics. This paper presents a formalization of the heartbeat architectural tactic and a program analytic approach to detect this tactic in source code. The experiment of the proposed method is done on a set of Java applications. The outcome of the experiment strongly suggests that the method compares well with a manual approach in terms of its sensitivity and specificity, and far supersedes a manual exercise in terms of its scalability. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=software%20architecture" title="software architecture">software architecture</a>, <a href="https://publications.waset.org/abstracts/search?q=architectural%20tactics" title=" architectural tactics"> architectural tactics</a>, <a href="https://publications.waset.org/abstracts/search?q=detecting%20architectural%20tactics" title=" detecting architectural tactics"> detecting architectural tactics</a>, <a href="https://publications.waset.org/abstracts/search?q=program%20analysis" title=" program analysis"> program analysis</a>, <a href="https://publications.waset.org/abstracts/search?q=AST" title=" AST"> AST</a>, <a href="https://publications.waset.org/abstracts/search?q=alias%20analysis" title=" alias analysis"> alias analysis</a> </p> <a href="https://publications.waset.org/abstracts/117825/detecting-heartbeat-architectural-tactic-in-source-code-using-program-analysis" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/117825.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">160</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1696</span> Follower Upward Influence Tactics: A Review of Quantitative Studies </h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Najla%20Alshenaifi">Najla Alshenaifi</a>, <a href="https://publications.waset.org/abstracts/search?q=Nicholas%20Clarke"> Nicholas Clarke</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Interest in how followers may influence their leaders in order to achieve their goals can be traced to studies in the late 1970s. The last major review of the literature was published over a decade ago in 2002. It would seem timely then to take stock of the literature and consider what we have learned since then. In so doing, our aim is to derive an empirically-based framework for understanding the effects of upward influence tactics to underpin future research in the field. Many factors are identified as having a major effect on upward influence processes including goals of influence, culture, gender, leadership style and the outcome of influence. A key conclusion from our review is that although upward influence tactics can result in positive outcomes for followers, the results from many studies are more often than inconclusive. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=upward%20influence%20tactics" title="upward influence tactics">upward influence tactics</a>, <a href="https://publications.waset.org/abstracts/search?q=influence%20tactics" title=" influence tactics"> influence tactics</a>, <a href="https://publications.waset.org/abstracts/search?q=influence%20strategies" title=" influence strategies"> influence strategies</a>, <a href="https://publications.waset.org/abstracts/search?q=followership" title=" followership"> followership</a> </p> <a href="https://publications.waset.org/abstracts/15410/follower-upward-influence-tactics-a-review-of-quantitative-studies" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/15410.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">385</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1695</span> The Effect of Socialization Tactics on Job Satisfaction of Employees, Regarding to Personality Types in Tehran University of Medical Science’s Employees</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Maryam%20Hoorzad">Maryam Hoorzad</a>, <a href="https://publications.waset.org/abstracts/search?q=Narges%20Shokry"> Narges Shokry</a>, <a href="https://publications.waset.org/abstracts/search?q=Mandan%20Momeni"> Mandan Momeni</a> </p> <p class="card-text"><strong>Abstract:</strong></p> According to importance of socialization in effectiveness of organizations and on the other hand assessing the impact of individual differences on socialization tactics by measuring employees satisfaction, can be assessed for each of the personality types which socialization tactics is the more effective. The aim of this paper is to investigate how organizational socialization tactics affect job satisfaction of employees according to personality types. A survey was conducted using a measurement tool based on Van Maanen and Schein’s theory on organizational socialization tactics and Myers Briggs’ measurement tools of personality types. The respondents were employees with more than 3 years backward in Tehran University of Medical Science. Data collection was performed using both library and field, the data collection instrument was questionnaires and data were analysed using the Spss and Lisrel programs. It was found that investiture and serial tactics has a significant effect on employees satisfaction, any increase in investiture and serial tactics led to increase in job satisfaction and any increase in divestiture and disjunctive tactics led to reduction of job satisfaction. Investiture tactic has the most effect on employees satisfaction. Also based on the results, personality types affect the relationship between socialization tactics and job satisfaction. In the ESFJ personality type the effect of investiture tactic on employee satisfaction is the most. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=organizational%20socialization" title="organizational socialization">organizational socialization</a>, <a href="https://publications.waset.org/abstracts/search?q=organizational%20socialization%20tactics" title=" organizational socialization tactics"> organizational socialization tactics</a>, <a href="https://publications.waset.org/abstracts/search?q=personality%20types" title=" personality types"> personality types</a>, <a href="https://publications.waset.org/abstracts/search?q=job%20satisfaction" title=" job satisfaction"> job satisfaction</a> </p> <a href="https://publications.waset.org/abstracts/3890/the-effect-of-socialization-tactics-on-job-satisfaction-of-employees-regarding-to-personality-types-in-tehran-university-of-medical-sciences-employees" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/3890.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">441</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1694</span> The Influence of Online Marketing Tactics in Tourist Destination Reputation: Egypt as a Case Study</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Alyaa%20Darwish">Alyaa Darwish</a>, <a href="https://publications.waset.org/abstracts/search?q=Peter%20Burns"> Peter Burns</a>, <a href="https://publications.waset.org/abstracts/search?q=Sofia%20Reino"> Sofia Reino</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Online marketing has been the key focus of attention for the majority of destinations since the Internet became the primarily information tool for travel marketing. Tourism is a reputation-dependent industry; potential travelers who do not have previous experience with the destination face numerous risks during the process of decision-making. An accurate perception of the destination’s reputation helps to minimize risk against unsatisfying travel experiences. However, there has been limited investigation with regards to the reputation of tourist destination. Taking the importance of reputation to the tourism industry, this research aims to: 1) Develop a destination reputation model; 2) Assess the tourist destination approach towards online marketing tactics; 3) Evaluate the impact of differentiated online marketing tactics on reputation; and 4) Measure the potential for using online marketing tactics to manage the destination’s online reputation. This research follows an interpretivism epistemological research approach through using four research methods; interviews, questionnaire, content analysis, and experiment to achieve the research goals. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=destination%20reputation" title="destination reputation">destination reputation</a>, <a href="https://publications.waset.org/abstracts/search?q=online%20marketing" title=" online marketing"> online marketing</a>, <a href="https://publications.waset.org/abstracts/search?q=reputation" title=" reputation"> reputation</a>, <a href="https://publications.waset.org/abstracts/search?q=tactics" title=" tactics"> tactics</a> </p> <a href="https://publications.waset.org/abstracts/58959/the-influence-of-online-marketing-tactics-in-tourist-destination-reputation-egypt-as-a-case-study" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/58959.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">355</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1693</span> An Architectural Model for APT Detection</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Nam-Uk%20Kim">Nam-Uk Kim</a>, <a href="https://publications.waset.org/abstracts/search?q=Sung-Hwan%20Kim"> Sung-Hwan Kim</a>, <a href="https://publications.waset.org/abstracts/search?q=Tai-Myoung%20Chung"> Tai-Myoung Chung</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Typical security management systems are not suitable for detecting APT attack, because they cannot draw the big picture from trivial events of security solutions. Although SIEM solutions have security analysis engine for that, their security analysis mechanisms need to be verified in academic field. Although this paper proposes merely an architectural model for APT detection, we will keep studying on correlation analysis mechanism in the future. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=advanced%20persistent%20threat" title="advanced persistent threat">advanced persistent threat</a>, <a href="https://publications.waset.org/abstracts/search?q=anomaly%20detection" title=" anomaly detection"> anomaly detection</a>, <a href="https://publications.waset.org/abstracts/search?q=data%20mining" title=" data mining "> data mining </a> </p> <a href="https://publications.waset.org/abstracts/23009/an-architectural-model-for-apt-detection" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/23009.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">528</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1692</span> Alterations in Habitation and Architectural Education Due to the COVID-19 Pandemic: The Operation of the Architectural Studio as a Crossroad</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Chrysi%20K.%20Nikoloutsou">Chrysi K. Nikoloutsou</a>, <a href="https://publications.waset.org/abstracts/search?q=Gianna%20Th.%20Siapati"> Gianna Th. Siapati</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The pandemic limitations have altered architectural education as the discourse shifted towards virtual studios and blended learning. In addition, lockdown conditions and remote working have affected habitation. Adaptability is now a key factor. The architectural studio needs to adjust to these new terms both in education and in inhabitation. This paper will investigate the operation of an architectural studio in relation to how one experiences their house due to the pandemic, based on a literature review and qualitative research methods (interviews & workshops with students). Zenetos’ prophetic ideas of ‘Electronic Urbanism’ and ‘tele-activities’ are now more present than ever. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=architectural%20education" title="architectural education">architectural education</a>, <a href="https://publications.waset.org/abstracts/search?q=pandemic" title=" pandemic"> pandemic</a>, <a href="https://publications.waset.org/abstracts/search?q=residential%20design" title=" residential design"> residential design</a>, <a href="https://publications.waset.org/abstracts/search?q=studio%20pedagogy" title=" studio pedagogy"> studio pedagogy</a> </p> <a href="https://publications.waset.org/abstracts/153337/alterations-in-habitation-and-architectural-education-due-to-the-covid-19-pandemic-the-operation-of-the-architectural-studio-as-a-crossroad" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/153337.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">105</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1691</span> A Study on the Impacts of Computer Aided Design on the Architectural Design Process</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Halleh%20Nejadriahi">Halleh Nejadriahi</a>, <a href="https://publications.waset.org/abstracts/search?q=Kamyar%20Arab"> Kamyar Arab</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Computer-aided design (CAD) tools have been extensively used by the architects for the several decades. It has evolved from being a simple drafting tool to being an intelligent architectural software and a powerful means of communication for architects. CAD plays an essential role in the profession of architecture and is a basic tool for any architectural firm. It is not possible for an architectural firm to compete without taking the advantage of computer software, due to the high demand and competition in the architectural industry. The aim of this study is to evaluate the impacts of CAD on the architectural design process from conceptual level to final product, particularly in architectural practice. It examines the range of benefits of integrating CAD into the industry and discusses the possible defects limiting the architects. Method of this study is qualitatively based on data collected from the professionals’ perspective. The identified benefits and limitations of CAD on the architectural design process will raise the awareness of professionals on the potentials of CAD and proper utilization of that in the industry, which would result in a higher productivity along with a better quality in the architectural offices. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=architecture" title="architecture">architecture</a>, <a href="https://publications.waset.org/abstracts/search?q=architectural%20practice" title=" architectural practice"> architectural practice</a>, <a href="https://publications.waset.org/abstracts/search?q=computer%20aided%20design%20%28CAD%29" title=" computer aided design (CAD)"> computer aided design (CAD)</a>, <a href="https://publications.waset.org/abstracts/search?q=design%20process" title=" design process"> design process</a> </p> <a href="https://publications.waset.org/abstracts/75147/a-study-on-the-impacts-of-computer-aided-design-on-the-architectural-design-process" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/75147.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">360</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1690</span> Identification of Architectural Design Error Risk Factors in Construction Projects Using IDEF0 Technique</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Sahar%20Tabarroki">Sahar Tabarroki</a>, <a href="https://publications.waset.org/abstracts/search?q=Ahad%20Nazari"> Ahad Nazari</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The design process is one of the most key project processes in the construction industry. Although architects have the responsibility to produce complete, accurate, and coordinated documents, architectural design is accompanied by many errors. A design error occurs when the constraints and requirements of the design are not satisfied. Errors are potentially costly and time-consuming to correct if not caught early during the design phase, and they become expensive in either construction documents or in the construction phase. The aim of this research is to identify the risk factors of architectural design errors, so identification of risks is necessary. First, a literature review in the design process was conducted and then a questionnaire was designed to identify the risks and risk factors. The questions in the form of the questionnaire were based on the “similar service description of study and supervision of architectural works” published by “Vice Presidency of Strategic Planning & Supervision of I.R. Iran” as the base of architects’ tasks. Second, the top 10 risks of architectural activities were identified. To determine the positions of possible causes of risks with respect to architectural activities, these activities were located in a design process modeled by the IDEF0 technique. The research was carried out by choosing a case study, checking the design drawings, interviewing its architect and client, and providing a checklist in order to identify the concrete examples of architectural design errors. The results revealed that activities such as “defining the current and future requirements of the project”, “studies and space planning,” and “time and cost estimation of suggested solution” has a higher error risk than others. Moreover, the most important causes include “unclear goals of a client”, “time force by a client”, and “lack of knowledge of architects about the requirements of end-users”. For error detecting in the case study, lack of criteria, standards and design criteria, and lack of coordination among them, was a barrier, anyway, “lack of coordination between architectural design and electrical and mechanical facility”, “violation of the standard dimensions and sizes in space designing”, “design omissions” were identified as the most important design errors. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=architectural%20design" title="architectural design">architectural design</a>, <a href="https://publications.waset.org/abstracts/search?q=design%20error" title=" design error"> design error</a>, <a href="https://publications.waset.org/abstracts/search?q=risk%20management" title=" risk management"> risk management</a>, <a href="https://publications.waset.org/abstracts/search?q=risk%20factor" title=" risk factor"> risk factor</a> </p> <a href="https://publications.waset.org/abstracts/144082/identification-of-architectural-design-error-risk-factors-in-construction-projects-using-idef0-technique" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/144082.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">130</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1689</span> Social Movements and the Diffusion of Tactics and Repertoires: Activists' Network in Anti-Globalism Movement</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Kyoko%20Tominaga">Kyoko Tominaga</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Non-Government Organizations (NGOs), Non-Profit Organizations (NPOs), Social Enterprises and other actors play an important role in political decisions in governments at the international levels. Especially, such organizations’ and activists’ network in civil society is quite important to effect to the global politics. To solve the complex social problems in global era, diverse actors should corporate each other. Moreover, network of protesters is also contributes to diffuse tactics, information and other resources of social movements. Based on the findings from the study of International Trade Fairs (ITFs), the author analyzes the network of activists in anti-globalism movement. This research focuses the transition of 54 activists’ whole network in the “protest event” against 2008 G8 summit in Japan. Their network is examined at the three periods: Before protest event phase, during protest event phase and after event phase. A mixed method is used in this study: the author shows the hypothesis from social network analysis and evaluates that with interview data analysis. This analysis gives the two results. Firstly, the more protesters participate to the various events during the protest event, the more they build the network. After that, active protesters keep their network as well. From interview data, we can understand that the active protesters can build their network and diffuse the information because they communicate with other participants and understand that diverse issues are related. This paper comes to same conclusion with previous researches: protest events activate the network among the political activists. However, some participants succeed to build their network, others do not. “Networked” activists are participated in the various events for short period of time and encourage the diffusion of information and tactics of social movements. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=social%20movement" title="social movement">social movement</a>, <a href="https://publications.waset.org/abstracts/search?q=global%20justice%20movement" title=" global justice movement"> global justice movement</a>, <a href="https://publications.waset.org/abstracts/search?q=tactics" title=" tactics"> tactics</a>, <a href="https://publications.waset.org/abstracts/search?q=diffusion" title=" diffusion"> diffusion</a> </p> <a href="https://publications.waset.org/abstracts/10307/social-movements-and-the-diffusion-of-tactics-and-repertoires-activists-network-in-anti-globalism-movement" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/10307.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">383</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1688</span> Architectural Thinking in a Time of Climate Emergency</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Manoj%20Parmar">Manoj Parmar</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The article uses reflexivity as a research method to investigate and propose an architectural theory plan for climate change. It hypothecates that to discuss or formulate discourse on "Architectural Thinking in a Time of Climate Emergency," firstly, we need to understand the modes of integration that enable architectural thinking with climate change. The study intends to study the various integration modes that have evolved historically and situate them in time. Subsequently, it analyses the integration pattern, challenges the existing model, and finds a way towards climate change as central to architectural thinking. The study is fundamental on-premises that ecology and climate change scholarship has consistently out lashed the asymmetrical and nonlinear knowledge and needs approaches for architecture that are less burden to climate change to people and minimize its impact on ecology. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=climate%20change" title="climate change">climate change</a>, <a href="https://publications.waset.org/abstracts/search?q=architectural%20theory" title=" architectural theory"> architectural theory</a>, <a href="https://publications.waset.org/abstracts/search?q=reflexivity" title=" reflexivity"> reflexivity</a>, <a href="https://publications.waset.org/abstracts/search?q=modernity" title=" modernity"> modernity</a> </p> <a href="https://publications.waset.org/abstracts/165411/architectural-thinking-in-a-time-of-climate-emergency" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/165411.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">285</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1687</span> Ethics and Military Defections in Nonviolent Resistance Campaigns </h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Adi%20Levy">Adi Levy</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Military and security personnel defections during nonviolent resistance (NVR) campaigns are recognized as an effective way of undermining the regime’s power, but they also may generate moral dilemmas that contradict the moral standing of NVR tactics. NVR campaigns have been primarily praised for their adherence to moral and legal norms, yet some of NVR tactics raise serious ethical concerns. This paper focuses on NVR tactics that seek to promote defections and disobedience within military and security personnel to sustain their campaign. Academic literature regarding NVR tactics indicates that compared to violent forms of resistance, defections are more likely to occur when security forces confront nonviolent activists. Indeed, defections play a strategically fundamental role in nonviolent campaigns, particularly against authoritarian regimes, as it enables activists to undermine the regime’s central pillars of support. This study examines the events of the Arab Spring and discusses the ethical problems that arise in nonviolent activists’ promotion of defections and disobedience. The cases of Syria and Egypt suggest that the strategic promotion of defections and disobedience was significantly effective in sustaining the campaign. Yet, while such defections enhance nonviolent activists’ resilience, how they are promoted can be morally contentious and the consequences can be dire. Defections are encouraged by social, moral and emotional appeals that use the power disparities between unarmed civilians and powerful regimes to affect soldiers and security personnel’s process of decision-making. In what is commonly referred to as dilemma action, nonviolent activists deliberately entangle security forces in a moral dilemma that compels them to follow a moral code to protect unarmed civilians. In this way, activists sustain their struggle and even gain protection. Nonviolent activists are likely to be completely defeated when confronted with armed forces. Therefore they rely on the military and security personnel’s moral conscious of convincing them to refrain from using force against them. While this is effective, it also leaves soldiers and security forces exposed to the implications and punishments that might follow their disobedience or defection. As long as they remain nonviolent, activists enjoy civilian immunity despite using morally contentious tactics. But the severe implications brought upon defectors. As a result, demand a deep examination of this tactic’s moral permissibility and a discussion that assesses culpability for the moral implications of its application. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=culpability" title="culpability">culpability</a>, <a href="https://publications.waset.org/abstracts/search?q=defections" title=" defections"> defections</a>, <a href="https://publications.waset.org/abstracts/search?q=nonviolence" title=" nonviolence"> nonviolence</a>, <a href="https://publications.waset.org/abstracts/search?q=permissibility" title=" permissibility"> permissibility</a> </p> <a href="https://publications.waset.org/abstracts/117792/ethics-and-military-defections-in-nonviolent-resistance-campaigns" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/117792.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">117</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1686</span> Engaging the Terrorism Problematique in Africa: Discursive and Non-Discursive Approaches to Counter Terrorism</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Cecil%20Blake">Cecil Blake</a>, <a href="https://publications.waset.org/abstracts/search?q=Tolu%20Kayode-Adedeji"> Tolu Kayode-Adedeji</a>, <a href="https://publications.waset.org/abstracts/search?q=Innocent%20Chiluwa"> Innocent Chiluwa</a>, <a href="https://publications.waset.org/abstracts/search?q=Charles%20Iruonagbe"> Charles Iruonagbe</a> </p> <p class="card-text"><strong>Abstract:</strong></p> National, regional and international security threats have dominated the twenty-first century thus far. Insurgencies that utilize “terrorism” as their primary strategy pose the most serious threat to global security. States in turn adopt terrorist strategies to resist and even defeat insurgents who invoke the legitimacy of statehood to justify their action. In short, the era is dominated by the use of terror tactics by state and non-state actors. Globally, there is a powerful network of groups involved in insurgencies using Islam as the bastion for their cause. In Africa, there are Boko Haram, Al Shabaab and Al Qaeda in the Maghreb representing Islamic groups utilizing terror strategies and tactics to prosecute their wars. The task at hand is to discover and to use multiple ways of handling the present security threats, including novel approaches to policy formulation, implementation, monitoring and evaluation that would pay significant attention to the important role of culture and communication strategies germane for discursive means of conflict resolution. In other to achieve this, the proposed research would address inter alia, root causes of insurgences that predicate their mission on Islamic tenets particularly in Africa; discursive and non-discursive counter-terrorism approaches fashioned by African governments, continental supra-national and regional organizations, recruitment strategies by major non-sate actors in Africa that rely solely on terrorist strategies and tactics and sources of finances for the groups under study. A major anticipated outcome of this research is a contribution to answers that would lead to the much needed stability required for development in African countries experiencing insurgencies carried out by the use of patterned terror strategies and tactics. The nature of the research requires the use of triangulation as the methodological tool. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=counter-terrorism" title="counter-terrorism">counter-terrorism</a>, <a href="https://publications.waset.org/abstracts/search?q=discourse" title=" discourse"> discourse</a>, <a href="https://publications.waset.org/abstracts/search?q=Nigeria" title=" Nigeria"> Nigeria</a>, <a href="https://publications.waset.org/abstracts/search?q=security" title=" security"> security</a>, <a href="https://publications.waset.org/abstracts/search?q=terrorism" title=" terrorism"> terrorism</a> </p> <a href="https://publications.waset.org/abstracts/26075/engaging-the-terrorism-problematique-in-africa-discursive-and-non-discursive-approaches-to-counter-terrorism" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/26075.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">486</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1685</span> Using Autoencoder as Feature Extractor for Malware Detection</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Umm-E-Hani">Umm-E-Hani</a>, <a href="https://publications.waset.org/abstracts/search?q=Faiza%20Babar"> Faiza Babar</a>, <a href="https://publications.waset.org/abstracts/search?q=Hanif%20Durad"> Hanif Durad</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Malware-detecting approaches suffer many limitations, due to which all anti-malware solutions have failed to be reliable enough for detecting zero-day malware. Signature-based solutions depend upon the signatures that can be generated only when malware surfaces at least once in the cyber world. Another approach that works by detecting the anomalies caused in the environment can easily be defeated by diligently and intelligently written malware. Solutions that have been trained to observe the behavior for detecting malicious files have failed to cater to the malware capable of detecting the sandboxed or protected environment. Machine learning and deep learning-based approaches greatly suffer in training their models with either an imbalanced dataset or an inadequate number of samples. AI-based anti-malware solutions that have been trained with enough samples targeted a selected feature vector, thus ignoring the input of leftover features in the maliciousness of malware just to cope with the lack of underlying hardware processing power. Our research focuses on producing an anti-malware solution for detecting malicious PE files by circumventing the earlier-mentioned shortcomings. Our proposed framework, which is based on automated feature engineering through autoencoders, trains the model over a fairly large dataset. It focuses on the visual patterns of malware samples to automatically extract the meaningful part of the visual pattern. Our experiment has successfully produced a state-of-the-art accuracy of 99.54 % over test data. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=malware" title="malware">malware</a>, <a href="https://publications.waset.org/abstracts/search?q=auto%20encoders" title=" auto encoders"> auto encoders</a>, <a href="https://publications.waset.org/abstracts/search?q=automated%20feature%20engineering" title=" automated feature engineering"> automated feature engineering</a>, <a href="https://publications.waset.org/abstracts/search?q=classification" title=" classification"> classification</a> </p> <a href="https://publications.waset.org/abstracts/172184/using-autoencoder-as-feature-extractor-for-malware-detection" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/172184.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">72</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1684</span> Integration of Magnetoresistance Sensor in Microfluidic Chip for Magnetic Particles Detection</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Chao-Ming%20Su">Chao-Ming Su</a>, <a href="https://publications.waset.org/abstracts/search?q=Pei-Sheng%20Wu"> Pei-Sheng Wu</a>, <a href="https://publications.waset.org/abstracts/search?q=Yu-Chi%20Kuo"> Yu-Chi Kuo</a>, <a href="https://publications.waset.org/abstracts/search?q=Yin-Chou%20Huang"> Yin-Chou Huang</a>, <a href="https://publications.waset.org/abstracts/search?q=Tan-Yueh%20Chen"> Tan-Yueh Chen</a>, <a href="https://publications.waset.org/abstracts/search?q=Jefunnie%20Matahum"> Jefunnie Matahum</a>, <a href="https://publications.waset.org/abstracts/search?q=Tzong-Rong%20Ger"> Tzong-Rong Ger</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Application of magnetic particles (MPs) has been applied in biomedical field for many years. There are lots of advantages through this mediator including high biocompatibility and multi-diversified bio-applications. However, current techniques for evaluating the quantity of the magnetic-labeled sample assays are rare. In this paper, a Wheatstone bridge giant magnetoresistance (GMR) sensor integrated with a homemade detecting system was fabricated and used to quantify the concentration of MPs. The homemade detecting system has shown high detecting sensitivity of 10 μg/μl of MPs with optimized parameter vertical magnetic field 100 G, horizontal magnetic field 2 G and flow rate 0.4 ml/min. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=magnetic%20particles" title="magnetic particles">magnetic particles</a>, <a href="https://publications.waset.org/abstracts/search?q=magnetoresistive%20sensors" title=" magnetoresistive sensors"> magnetoresistive sensors</a>, <a href="https://publications.waset.org/abstracts/search?q=micro%EF%AC%82uidics" title=" microfluidics"> microfluidics</a>, <a href="https://publications.waset.org/abstracts/search?q=biosensor" title=" biosensor"> biosensor</a> </p> <a href="https://publications.waset.org/abstracts/65704/integration-of-magnetoresistance-sensor-in-microfluidic-chip-for-magnetic-particles-detection" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/65704.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">399</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1683</span> Thinking about Drawing: The Evolution of Architectural Education in China After 1949</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Wang%20Yanze">Wang Yanze</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Architectural design results from the interaction between space and drawing. Stemming from the Beaux-Arts architectural education, drawing kept its dominant position in teaching and learning process for centuries. However, this education system is being challenged in the present time due to the development of the times. Based on the architectural education of China after 1949, a brief introduction to the history of the evolution of the design concept and drawing is given in this paper. Illustrating with the reference to the students’ works in Nanjing Institute of Technology, the predecessor of Southeast University, in China, the paper analyses the relationship between concept and representation, as well as the participation of Space, the modernism discourse. This process contains the transmission of the character of architects, the renovation of drawing skills and the profound social background. With different purposes, the emphasis on representation tends to be combined with the operation on space, and the role of drawing in architectural design process also changes. Therefore, based on the continuity of the traditional architectural education system, the discussion on the “Drawing of Space” in contemporary education system is proposed. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=architectural%20education" title="architectural education">architectural education</a>, <a href="https://publications.waset.org/abstracts/search?q=beaux-arts" title=" beaux-arts"> beaux-arts</a>, <a href="https://publications.waset.org/abstracts/search?q=drawing" title=" drawing"> drawing</a>, <a href="https://publications.waset.org/abstracts/search?q=modernism" title=" modernism"> modernism</a> </p> <a href="https://publications.waset.org/abstracts/25827/thinking-about-drawing-the-evolution-of-architectural-education-in-china-after-1949" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/25827.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">486</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1682</span> Methods of Categorizing Architectural Technical Debt</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Blessing%20Igbadumhe">Blessing Igbadumhe</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The continuous long- and short-term delivery of value to customers continues to be the overarching objective of software organizations. Software engineering professionals and organizations face challenges in the maintenance and evolution of software as a result of architectural, technical debt. The issues of architectural, technical debt continue to receive a significant amount of attention because of its important impact on successful system implementation. The cost of doing nothing as far as architectural, technical debt is concerned can be significant both in financial terms and impacts on customers. Different architectural, technical debt issues exist, and this qualitative research design reviewed existing literature on the subject to identify and categorize them. This research intends to contribute to the existing bludgeoning body of knowledge on categorizations and descriptive model of technical debt related issues related to system architecture. The results identify the most common characteristics of architectural and technical debt categories. Raising awareness of the intricacies of architectural and technical debt helps technology stakeholders reduce negative consequences and increase the system success rate. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=architecture" title="architecture">architecture</a>, <a href="https://publications.waset.org/abstracts/search?q=categorizing%20TD" title=" categorizing TD"> categorizing TD</a>, <a href="https://publications.waset.org/abstracts/search?q=system%20design" title=" system design"> system design</a>, <a href="https://publications.waset.org/abstracts/search?q=technical%20debt" title=" technical debt"> technical debt</a> </p> <a href="https://publications.waset.org/abstracts/161734/methods-of-categorizing-architectural-technical-debt" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/161734.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">91</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1681</span> Implementing Activity-Based Costing in Architectural Aluminum Projects: Case Study and Lessons Learned</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Amer%20Momani">Amer Momani</a>, <a href="https://publications.waset.org/abstracts/search?q=Tarek%20Al-Hawari"> Tarek Al-Hawari</a>, <a href="https://publications.waset.org/abstracts/search?q=Abdallah%20Alakayleh"> Abdallah Alakayleh</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This study explains how to construct an actionable activity-based costing and management system to accurately track and account the total costs of architectural aluminum projects. Two ABC models were proposed to accomplish this purpose. First, the learning and development model was introduced to examine how to apply an ABC model in an architectural aluminum firm for the first time and to be familiar with ABC concepts. Second, an actual ABC model was built on the basis of the results of the previous model to accurately trace the actual costs incurred on each project in a year, and to be able to provide a quote with the best trade-off between competitiveness and profitability. The validity of the proposed model was verified on a local architectural aluminum company. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=activity-based%20costing" title="activity-based costing">activity-based costing</a>, <a href="https://publications.waset.org/abstracts/search?q=activity-based%20management" title=" activity-based management"> activity-based management</a>, <a href="https://publications.waset.org/abstracts/search?q=construction" title=" construction"> construction</a>, <a href="https://publications.waset.org/abstracts/search?q=architectural%20aluminum" title=" architectural aluminum"> architectural aluminum</a> </p> <a href="https://publications.waset.org/abstracts/175107/implementing-activity-based-costing-in-architectural-aluminum-projects-case-study-and-lessons-learned" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/175107.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">102</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1680</span> Web Service Architectural Style Selection in Multi-Criteria Requirements</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ahmad%20Mohsin">Ahmad Mohsin</a>, <a href="https://publications.waset.org/abstracts/search?q=Syda%20Fatima"> Syda Fatima</a>, <a href="https://publications.waset.org/abstracts/search?q=Falak%20Nawaz"> Falak Nawaz</a>, <a href="https://publications.waset.org/abstracts/search?q=Aman%20Ullah%20Khan"> Aman Ullah Khan</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Selection of an appropriate architectural style is vital to the success of target web service under development. The nature of architecture design and selection for service-oriented computing applications is quite different as compared to traditional software. Web Services have complex and rigorous architectural styles to choose. Due to this, selection for accurate architectural style for web services development has become a more complex decision to be made by architects. Architectural style selection is a multi-criteria decision and demands lots of experience in service oriented computing. Decision support systems are good solutions to simplify the selection process of a particular architectural style. Our research suggests a new approach using DSS for selection of architectural styles while developing a web service to cater FRs and NFRs. Our proposed DSS helps architects to select right web service architectural pattern according to the domain and non-functional requirements. In this paper, a rule base DSS has been developed using CLIPS (C Language Integrated Production System) to support decisions using multi-criteria requirements. This DSS takes architectural characteristics, domain requirements and software architect preferences for NFRs as input for different architectural styles in use today in service-oriented computing. Weighted sum model has been applied to prioritize quality attributes and domain requirements. Scores are calculated using multiple criterions to choose the final architecture style. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=software%20architecture" title="software architecture">software architecture</a>, <a href="https://publications.waset.org/abstracts/search?q=web-service" title=" web-service"> web-service</a>, <a href="https://publications.waset.org/abstracts/search?q=rule-based" title=" rule-based"> rule-based</a>, <a href="https://publications.waset.org/abstracts/search?q=DSS" title=" DSS"> DSS</a>, <a href="https://publications.waset.org/abstracts/search?q=multi-criteria%20requirements" title=" multi-criteria requirements"> multi-criteria requirements</a>, <a href="https://publications.waset.org/abstracts/search?q=quality%20attributes" title=" quality attributes"> quality attributes</a> </p> <a href="https://publications.waset.org/abstracts/46346/web-service-architectural-style-selection-in-multi-criteria-requirements" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/46346.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">364</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1679</span> Emulation Model in Architectural Education</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=%C3%96.%20%C5%9Eenyi%C4%9Fit">Ö. Şenyiğit</a>, <a href="https://publications.waset.org/abstracts/search?q=A.%20%C3%87olak"> A. Çolak</a> </p> <p class="card-text"><strong>Abstract:</strong></p> It is of great importance for an architectural student to know the parameters through which he/she can conduct his/her design and makes his/her design effective in architectural education. Therefore; an empirical application study was carried out through the designing activity using the emulation model to support the design and design approaches of architectural students. During the investigation period, studies were done on the basic design elements and principles of the fall semester, and the emulation model, one of the designing methods that constitute the subject of the study, was fictionalized as three phased “recognition-interpretation-application”. As a result of the study, it was observed that when students were given a key method during the design process, their awareness increased and their aspects improved as well. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=basic%20design" title="basic design">basic design</a>, <a href="https://publications.waset.org/abstracts/search?q=design%20education" title=" design education"> design education</a>, <a href="https://publications.waset.org/abstracts/search?q=design%20methods" title=" design methods"> design methods</a>, <a href="https://publications.waset.org/abstracts/search?q=emulation" title=" emulation"> emulation</a> </p> <a href="https://publications.waset.org/abstracts/77529/emulation-model-in-architectural-education" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/77529.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">236</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1678</span> Architectural Design Studio (ADS) as an Operational Synthesis in Architectural Education</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Francisco%20A.%20Ribeiro%20Da%20Costa">Francisco A. Ribeiro Da Costa</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Who is responsible for teaching architecture; consider various ways to participate in learning, manipulating various pedagogical tools to streamline the creative process. The Architectural Design Studio (ADS) should become a holistic, systemic process responding to the complexity of our world. This essay corresponds to a deep reflection developed by the author on the teaching of architecture. The outcomes achieved are the corollary of experimentation; discussion and application of pedagogical methods that allowed consolidate the creativity applied by students. The purpose is to show the conjectures that have been considered effective in creating an intellectual environment that nurtures the subject of Architectural Design Studio (ADS), as an operational synthesis in the final stage of the degree. These assumptions, which are part of the proposed model, displaying theories and teaching methodologies that try to respect the learning process based on student learning styles Kolb, ensuring their latent specificities and formulating the structure of the ASD discipline. In addition, the assessing methods are proposed, which consider the architectural Design Studio as an operational synthesis in the teaching of architecture. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=teaching-learning" title="teaching-learning">teaching-learning</a>, <a href="https://publications.waset.org/abstracts/search?q=architectural%20design%20studio" title=" architectural design studio"> architectural design studio</a>, <a href="https://publications.waset.org/abstracts/search?q=architecture" title=" architecture"> architecture</a>, <a href="https://publications.waset.org/abstracts/search?q=education" title=" education"> education</a> </p> <a href="https://publications.waset.org/abstracts/61681/architectural-design-studio-ads-as-an-operational-synthesis-in-architectural-education" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/61681.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">390</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1677</span> A Machine Learning Approach to Detecting Evasive PDF Malware</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Vareesha%20Masood">Vareesha Masood</a>, <a href="https://publications.waset.org/abstracts/search?q=Ammara%20Gul"> Ammara Gul</a>, <a href="https://publications.waset.org/abstracts/search?q=Nabeeha%20Areej"> Nabeeha Areej</a>, <a href="https://publications.waset.org/abstracts/search?q=Muhammad%20Asif%20Masood"> Muhammad Asif Masood</a>, <a href="https://publications.waset.org/abstracts/search?q=Hamna%20Imran"> Hamna Imran</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The universal use of PDF files has prompted hackers to use them for malicious intent by hiding malicious codes in their victim’s PDF machines. Machine learning has proven to be the most efficient in identifying benign files and detecting files with PDF malware. This paper has proposed an approach using a decision tree classifier with parameters. A modern, inclusive dataset CIC-Evasive-PDFMal2022, produced by Lockheed Martin’s Cyber Security wing is used. It is one of the most reliable datasets to use in this field. We designed a PDF malware detection system that achieved 99.2%. Comparing the suggested model to other cutting-edge models in the same study field, it has a great performance in detecting PDF malware. Accordingly, we provide the fastest, most reliable, and most efficient PDF Malware detection approach in this paper. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=PDF" title="PDF">PDF</a>, <a href="https://publications.waset.org/abstracts/search?q=PDF%20malware" title=" PDF malware"> PDF malware</a>, <a href="https://publications.waset.org/abstracts/search?q=decision%20tree%20classifier" title=" decision tree classifier"> decision tree classifier</a>, <a href="https://publications.waset.org/abstracts/search?q=random%20forest%20classifier" title=" random forest classifier"> random forest classifier</a> </p> <a href="https://publications.waset.org/abstracts/172206/a-machine-learning-approach-to-detecting-evasive-pdf-malware" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/172206.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">91</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1676</span> Study on the Influence of Cladding and Finishing Materials of Apartment Buildings on the Architectural Identity of Amman</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Asil%20Zureigat">Asil Zureigat</a>, <a href="https://publications.waset.org/abstracts/search?q=Ayat%20Odat"> Ayat Odat</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Analyzing the old and bringing in the new is an ever ongoing process in driving innovations in architecture. This paper looks at the excessive use of stone in apartment buildings in Amman and speculates on the existing possibilities of changing the cladding material. By looking at architectural exceptions present in Amman the paper seeks to make the exception, the rule by adding new materials to the architectural library of Amman and in turn, project a series of possible new identities to the existing stone scape. Through distributing a survey, conducting a photographic study on exceptional buildings and shedding light on the historical narrative of stone, the paper highlights the ways in which new finishing materials such as plaster, paint and stone variations could be introduced in an attempt to project a new architectural identity to Amman. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=architectural%20city%20identity" title="architectural city identity">architectural city identity</a>, <a href="https://publications.waset.org/abstracts/search?q=cladding%20materials" title=" cladding materials"> cladding materials</a>, <a href="https://publications.waset.org/abstracts/search?q=fa%C3%A7ade%20architecture" title=" façade architecture"> façade architecture</a>, <a href="https://publications.waset.org/abstracts/search?q=image%20of%20the%20city" title=" image of the city"> image of the city</a> </p> <a href="https://publications.waset.org/abstracts/137728/study-on-the-influence-of-cladding-and-finishing-materials-of-apartment-buildings-on-the-architectural-identity-of-amman" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/137728.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">225</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1675</span> Establishment of a Test Bed for Integrated Map of Underground Space and Verification of GPR Exploration Equipment</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Jisong%20Ryu">Jisong Ryu</a>, <a href="https://publications.waset.org/abstracts/search?q=Woosik%20Lee"> Woosik Lee</a>, <a href="https://publications.waset.org/abstracts/search?q=Yonggu%20Jang"> Yonggu Jang</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The paper discusses the process of establishing a reliable test bed for verifying the usability of Ground Penetrating Radar (GPR) exploration equipment based on an integrated underground spatial map in Korea. The aim of this study is to construct a test bed consisting of metal and non-metal pipelines to verify the performance of GPR equipment and improve the accuracy of the underground spatial integrated map. The study involved the design and construction of a test bed for metal and non-metal pipe detecting tests. The test bed was built in the SOC Demonstration Research Center (Yeoncheon) of the Korea Institute of Civil Engineering and Building Technology, burying metal and non-metal pipelines up to a depth of 5m. The test bed was designed in both vehicle-type and cart-type GPR-mounted equipment. The study collected data through the construction of the test bed and conducting metal and non-metal pipe detecting tests. The study analyzed the reliability of GPR detecting results by comparing them with the basic drawings, such as the underground space integrated map. The study contributes to the improvement of GPR equipment performance evaluation and the accuracy of the underground spatial integrated map, which is essential for urban planning and construction. The study addressed the question of how to verify the usability of GPR exploration equipment based on an integrated underground spatial map and improve its performance. The study found that the test bed is reliable for verifying the performance of GPR exploration equipment and accurately detecting metal and non-metal pipelines using an integrated underground spatial map. The study concludes that the establishment of a test bed for verifying the usability of GPR exploration equipment based on an integrated underground spatial map is essential. The proposed Korean-style test bed can be used for the evaluation of GPR equipment performance and support the construction of a national non-metal pipeline exploration equipment performance evaluation center in Korea. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Korea-style%20GPR%20testbed" title="Korea-style GPR testbed">Korea-style GPR testbed</a>, <a href="https://publications.waset.org/abstracts/search?q=GPR" title=" GPR"> GPR</a>, <a href="https://publications.waset.org/abstracts/search?q=metal%20pipe%20detecting" title=" metal pipe detecting"> metal pipe detecting</a>, <a href="https://publications.waset.org/abstracts/search?q=non-metal%20pipe%20detecting" title=" non-metal pipe detecting"> non-metal pipe detecting</a> </p> <a href="https://publications.waset.org/abstracts/164644/establishment-of-a-test-bed-for-integrated-map-of-underground-space-and-verification-of-gpr-exploration-equipment" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/164644.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">100</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1674</span> Research on Architectural Steel Structure Design Based on BIM</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Tianyu%20Gao">Tianyu Gao</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Digital architectures use computer-aided design, programming, simulation, and imaging to create virtual forms and physical structures. Today's customers want to know more about their buildings. They want an automatic thermostat to learn their behavior and contact them, such as the doors and windows they want to open with a mobile app. Therefore, the architectural display form is more closely related to the customer's experience. Based on the purpose of building informationization, this paper studies the steel structure design based on BIM. Taking the Zigan office building in Hangzhou as an example, it is divided into four parts, namely, the digital design modulus of the steel structure, the node analysis of the steel structure, the digital production and construction of the steel structure. Through the application of BIM software, the architectural design can be synergized, and the building components can be informationized. Not only can the architectural design be feedback in the early stage, but also the stability of the construction can be guaranteed. In this way, the monitoring of the entire life cycle of the building and the meeting of customer needs can be realized. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=digital%20architectures" title="digital architectures">digital architectures</a>, <a href="https://publications.waset.org/abstracts/search?q=BIM" title=" BIM"> BIM</a>, <a href="https://publications.waset.org/abstracts/search?q=steel%20structure" title=" steel structure"> steel structure</a>, <a href="https://publications.waset.org/abstracts/search?q=architectural%20design" title=" architectural design"> architectural design</a> </p> <a href="https://publications.waset.org/abstracts/107854/research-on-architectural-steel-structure-design-based-on-bim" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/107854.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">195</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1673</span> Role of Geomatics in Architectural and Cultural Conservation</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Shweta%20Lall">Shweta Lall</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The intent of this paper is to demonstrate the role of computerized auxiliary science in advancing the desired and necessary alliance of historians, surveyors, topographers, and analysts of architectural conservation and management. The digital era practice of recording architectural and cultural heritage in view of its preservation, dissemination, and planning developments are discussed in this paper. Geomatics include practices like remote sensing, photogrammetry, surveying, Geographic Information System (GIS), laser scanning technology, etc. These all resources help in architectural and conservation applications which will be identified through various case studies analysed in this paper. The standardised outcomes and the methodologies using relevant case studies are listed and described. The main component of geomatics methodology adapted in conservation is data acquisition, processing, and presentation. Geomatics is used in a wide range of activities involved in architectural and cultural heritage – damage and risk assessment analysis, documentation, 3-D model construction, virtual reconstruction, spatial and structural decision – making analysis and monitoring. This paper will project the summary answers of the capabilities and limitations of the geomatics field in architectural and cultural conservation. Policy-makers, urban planners, architects, and conservationist not only need answers to these questions but also need to practice them in a predictable, transparent, spatially explicit and inexpensive manner. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=architectural%20and%20cultural%20conservation" title="architectural and cultural conservation">architectural and cultural conservation</a>, <a href="https://publications.waset.org/abstracts/search?q=geomatics" title=" geomatics"> geomatics</a>, <a href="https://publications.waset.org/abstracts/search?q=GIS" title=" GIS"> GIS</a>, <a href="https://publications.waset.org/abstracts/search?q=remote%20sensing" title=" remote sensing"> remote sensing</a> </p> <a href="https://publications.waset.org/abstracts/108329/role-of-geomatics-in-architectural-and-cultural-conservation" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/108329.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">146</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1672</span> Multimedia Firearms Training System</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Aleksander%20Nawrat">Aleksander Nawrat</a>, <a href="https://publications.waset.org/abstracts/search?q=Karol%20J%C4%99drasiak"> Karol Jędrasiak</a>, <a href="https://publications.waset.org/abstracts/search?q=Artur%20Ryt"> Artur Ryt</a>, <a href="https://publications.waset.org/abstracts/search?q=Dawid%20Sobel"> Dawid Sobel</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The goal of the article is to present a novel Multimedia Firearms Training System. The system was developed in order to compensate for major problems of existing shooting training systems. The designed and implemented solution can be characterized by five major advantages: algorithm for automatic geometric calibration, algorithm of photometric recalibration, firearms hit point detection using thermal imaging camera, IR laser spot tracking algorithm for after action review analysis, and implementation of ballistics equations. The combination of the abovementioned advantages in a single multimedia firearms training system creates a comprehensive solution for detecting and tracking of the target point usable for shooting training systems and improving intervention tactics of uniformed services. The introduced algorithms of geometric and photometric recalibration allow the use of economically viable commercially available projectors for systems that require long and intensive use without most of the negative impacts on color mapping of existing multi-projector multimedia shooting range systems. The article presents the results of the developed algorithms and their application in real training systems. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=firearms%20shot%20detection" title="firearms shot detection">firearms shot detection</a>, <a href="https://publications.waset.org/abstracts/search?q=geometric%20recalibration" title=" geometric recalibration"> geometric recalibration</a>, <a href="https://publications.waset.org/abstracts/search?q=photometric%20recalibration" title=" photometric recalibration"> photometric recalibration</a>, <a href="https://publications.waset.org/abstracts/search?q=IR%20tracking%20algorithm" title=" IR tracking algorithm"> IR tracking algorithm</a>, <a href="https://publications.waset.org/abstracts/search?q=thermography" title=" thermography"> thermography</a>, <a href="https://publications.waset.org/abstracts/search?q=ballistics" title=" ballistics"> ballistics</a> </p> <a href="https://publications.waset.org/abstracts/54247/multimedia-firearms-training-system" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/54247.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">222</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1671</span> Diagnostic Evaluation of Micro Rna (miRNA-21, miRNA-215 and miRNA-378) in Patients with Colorectal Cancer</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ossama%20Abdelmotaal">Ossama Abdelmotaal</a>, <a href="https://publications.waset.org/abstracts/search?q=Olfat%20Shaker"> Olfat Shaker</a>, <a href="https://publications.waset.org/abstracts/search?q=Tarek%20Salman"> Tarek Salman</a>, <a href="https://publications.waset.org/abstracts/search?q=Lamiaa%20Nabeel"> Lamiaa Nabeel</a>, <a href="https://publications.waset.org/abstracts/search?q=Mostafa%20Shabayek"> Mostafa Shabayek</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Colorectal Cancer (CRC) is an important worldwide health problem. Colonoscopy is used in detecting CRC suffer from drawbacks where colonoscopy is an invasive method. This study validates easier and less time-consuming techniques to evaluate the usefulness of detecting miRNA-21, miRNA-215 and miRNA-378 in the sera of colorectal cancer patients as new diagnostic tools. This study includes malignant (Colo Rectal Cancer patients, n= 64)) and healthy (n=27) groups. The studied groups were subjected to colonoscopic examination and estimation of miRNA-21, miRNA-215 and miRNA-378 in sera by RT-PCR. miRNA-21 showed the statistically significantly highest median fold change. miRNA-378 showed statistically significantly lower value (Both showed over-expression). miRNA-215 showed the statistically significantly lowest median fold change (It showed down-regulation). Overall the miRNA (21-215 and 378) appear to be promising method of detecting CRC and evaluating its stages. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=colorectal%20cancer" title="colorectal cancer">colorectal cancer</a>, <a href="https://publications.waset.org/abstracts/search?q=miRNA-21" title=" miRNA-21"> miRNA-21</a>, <a href="https://publications.waset.org/abstracts/search?q=miRNA-215" title=" miRNA-215"> miRNA-215</a>, <a href="https://publications.waset.org/abstracts/search?q=miRNA-378" title=" miRNA-378"> miRNA-378</a> </p> <a href="https://publications.waset.org/abstracts/69931/diagnostic-evaluation-of-micro-rna-mirna-21-mirna-215-and-mirna-378-in-patients-with-colorectal-cancer" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/69931.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">303</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1670</span> Applying the Integrative Design Process in Architectural Firms: An Analytical Study on Egyptian Firms</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Carole%20A.%20El%20Raheb">Carole A. El Raheb</a>, <a href="https://publications.waset.org/abstracts/search?q=Hassan%20K.%20Abdel-Salam"> Hassan K. Abdel-Salam</a>, <a href="https://publications.waset.org/abstracts/search?q=Ingi%20Elcherif"> Ingi Elcherif</a> </p> <p class="card-text"><strong>Abstract:</strong></p> An architect carrying the design process alone is the main reason for the deterioration of the quality of the architectural product as the complexity of the projects makes it a multi-disciplinary work; then, the Integrative Design Process (IDP) must be applied in the architectural firm especially from the early design phases to improve the product’s quality and to eliminate the ignorance of the principles of design causing the occurrence of low-grade buildings. The research explores the Integrative Design (ID) principles that fit in the architectural practice. Constraints facing this application are presented with strategies and solutions to overcome them. A survey questionnaire was conducted to collect data from a number of recognized Egyptian Architecture, Engineering and Construction (AEC) firms that explores their opinions on using the IDP. This survey emphasizes the importance of the IDP in firms and presents the reasons preventing the firms from applying the IDP. The aim here is to investigate the potentials of integrating this approach into architectural firms emphasizing the importance of this application which ensures the realization of the project’s goal and eliminates the reduction in the project’s quality. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=application" title="application">application</a>, <a href="https://publications.waset.org/abstracts/search?q=architectural%20firms" title=" architectural firms"> architectural firms</a>, <a href="https://publications.waset.org/abstracts/search?q=integrative%20design%20principles" title=" integrative design principles"> integrative design principles</a>, <a href="https://publications.waset.org/abstracts/search?q=integrative%20design%20process" title=" integrative design process"> integrative design process</a>, <a href="https://publications.waset.org/abstracts/search?q=the%20project%20quality" title=" the project quality"> the project quality</a> </p> <a href="https://publications.waset.org/abstracts/94670/applying-the-integrative-design-process-in-architectural-firms-an-analytical-study-on-egyptian-firms" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/94670.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">231</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1669</span> Variability of the Speaker's Verbal and Non-Verbal Behaviour in the Process of Changing Social Roles in the English Marketing Discourse</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Yuliia%20Skrynnik">Yuliia Skrynnik</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This research focuses on the interaction of verbal, non-verbal, and super-verbal communicative components used by the speaker changing social roles in the marketing discourse. The changing/performing of social roles is implemented through communicative strategies and tactics, the structural, semantic, and linguo-pragmatic means of which are characterized by specific features and differ for the performance of either a role of a supplier or a customer. Communication within the marketing discourse is characterized by symmetrical roles’ relation between communicative opponents. The strategy of a supplier’s social role realization and the strategy of a customer’s role realization influence the discursive personality's linguistic repertoire in the marketing discourse. This study takes into account that one person can be both a supplier and a customer under different circumstances, thus, exploring the one individual who can be both a supplier and a customer. Cooperative and non-cooperative tactics are the instruments for the implementation of these strategies. In the marketing discourse, verbal and non-verbal behaviour of the speaker performing a customer’s social role is highly informative for speakers who perform the role of a supplier. The research methods include discourse, context-situational, pragmalinguistic, pragmasemantic analyses, the method of non-verbal components analysis. The methodology of the study includes 5 steps: 1) defining the configurations of speakers’ social roles on the selected material; 2) establishing the type of the discourse (marketing discourse); 3) describing the specific features of a discursive personality as a subject of the communication in the process of social roles realization; 4) selecting the strategies and tactics which direct the interaction in different roles configurations; 5) characterizing the structural, semantic and pragmatic features of the strategies and tactics realization, including the analysis of interaction between verbal and non-verbal components of communication. In the marketing discourse, non-verbal behaviour is usually spontaneous but not purposeful. Thus, the adequate decoding of a partner’s non-verbal behavior provides more opportunities both for the supplier and the customer. Super-verbal characteristics in the marketing discourse are crucial in defining the opponent's social status and social role at the initial stage of interaction. The research provides the scenario of stereotypical situations of the play of a supplier and a customer. The performed analysis has perspectives for further research connected with the study of discursive variativity of speakers' verbal and non-verbal behaviour considering the intercultural factor influencing the process of performing the social roles in the marketing discourse; and the formation of the methods for the scenario construction of non-stereotypical situations of social roles realization/change in the marketing discourse. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=discursive%20personality" title="discursive personality">discursive personality</a>, <a href="https://publications.waset.org/abstracts/search?q=marketing%20discourse" title=" marketing discourse"> marketing discourse</a>, <a href="https://publications.waset.org/abstracts/search?q=non-verbal%20component%20of%20communication" title=" non-verbal component of communication"> non-verbal component of communication</a>, <a href="https://publications.waset.org/abstracts/search?q=social%20role" title=" social role"> social role</a>, <a href="https://publications.waset.org/abstracts/search?q=strategy" title=" strategy"> strategy</a>, <a href="https://publications.waset.org/abstracts/search?q=super-verbal%20component%20of%20communication" title=" super-verbal component of communication"> super-verbal component of communication</a>, <a href="https://publications.waset.org/abstracts/search?q=tactic" title=" tactic"> tactic</a>, <a href="https://publications.waset.org/abstracts/search?q=verbal%20component%20of%20communication" title=" verbal component of communication"> verbal component of communication</a> </p> <a href="https://publications.waset.org/abstracts/115524/variability-of-the-speakers-verbal-and-non-verbal-behaviour-in-the-process-of-changing-social-roles-in-the-english-marketing-discourse" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/115524.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">122</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1668</span> Detecting Cyberbullying, Spam and Bot Behavior and Fake News in Social Media Accounts Using Machine Learning</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=M.%20D.%20D.%20Chathurangi">M. D. D. Chathurangi</a>, <a href="https://publications.waset.org/abstracts/search?q=M.%20G.%20K.%20Nayanathara"> M. G. K. Nayanathara</a>, <a href="https://publications.waset.org/abstracts/search?q=K.%20M.%20H.%20M.%20M.%20Gunapala"> K. M. H. M. M. Gunapala</a>, <a href="https://publications.waset.org/abstracts/search?q=G.%20M.%20R.%20G.%20Dayananda"> G. M. R. G. Dayananda</a>, <a href="https://publications.waset.org/abstracts/search?q=Kavinga%20Yapa%20Abeywardena"> Kavinga Yapa Abeywardena</a>, <a href="https://publications.waset.org/abstracts/search?q=Deemantha%20Siriwardana"> Deemantha Siriwardana</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Due to the growing popularity of social media platforms at present, there are various concerns, mostly cyberbullying, spam, bot accounts, and the spread of incorrect information. To develop a risk score calculation system as a thorough method for deciphering and exposing unethical social media profiles, this research explores the most suitable algorithms to our best knowledge in detecting the mentioned concerns. Various multiple models, such as Naïve Bayes, CNN, KNN, Stochastic Gradient Descent, Gradient Boosting Classifier, etc., were examined, and the best results were taken into the development of the risk score system. For cyberbullying, the Logistic Regression algorithm achieved an accuracy of 84.9%, while the spam-detecting MLP model gained 98.02% accuracy. The bot accounts identifying the Random Forest algorithm obtained 91.06% accuracy, and 84% accuracy was acquired for fake news detection using SVM. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=cyberbullying" title="cyberbullying">cyberbullying</a>, <a href="https://publications.waset.org/abstracts/search?q=spam%20behavior" title=" spam behavior"> spam behavior</a>, <a href="https://publications.waset.org/abstracts/search?q=bot%20accounts" title=" bot accounts"> bot accounts</a>, <a href="https://publications.waset.org/abstracts/search?q=fake%20news" title=" fake news"> fake news</a>, <a href="https://publications.waset.org/abstracts/search?q=machine%20learning" title=" machine learning"> machine learning</a> </p> <a href="https://publications.waset.org/abstracts/186451/detecting-cyberbullying-spam-and-bot-behavior-and-fake-news-in-social-media-accounts-using-machine-learning" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/186451.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">36</span> </span> </div> </div> <ul class="pagination"> <li class="page-item disabled"><span class="page-link">‹</span></li> <li class="page-item active"><span class="page-link">1</span></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=detecting%20architectural%20tactics&page=2">2</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=detecting%20architectural%20tactics&page=3">3</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=detecting%20architectural%20tactics&page=4">4</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=detecting%20architectural%20tactics&page=5">5</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=detecting%20architectural%20tactics&page=6">6</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=detecting%20architectural%20tactics&page=7">7</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=detecting%20architectural%20tactics&page=8">8</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=detecting%20architectural%20tactics&page=9">9</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=detecting%20architectural%20tactics&page=10">10</a></li> <li class="page-item disabled"><span class="page-link">...</span></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=detecting%20architectural%20tactics&page=56">56</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=detecting%20architectural%20tactics&page=57">57</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=detecting%20architectural%20tactics&page=2" rel="next">›</a></li> </ul> </div> </main> <footer> <div id="infolinks" class="pt-3 pb-2"> <div class="container"> <div style="background-color:#f5f5f5;" class="p-3"> <div class="row"> <div class="col-md-2"> <ul class="list-unstyled"> About <li><a href="https://waset.org/page/support">About Us</a></li> <li><a href="https://waset.org/page/support#legal-information">Legal</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/WASET-16th-foundational-anniversary.pdf">WASET celebrates its 16th foundational anniversary</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Account <li><a href="https://waset.org/profile">My Account</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Explore <li><a href="https://waset.org/disciplines">Disciplines</a></li> <li><a href="https://waset.org/conferences">Conferences</a></li> <li><a href="https://waset.org/conference-programs">Conference Program</a></li> <li><a href="https://waset.org/committees">Committees</a></li> <li><a href="https://publications.waset.org">Publications</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Research <li><a href="https://publications.waset.org/abstracts">Abstracts</a></li> <li><a href="https://publications.waset.org">Periodicals</a></li> <li><a href="https://publications.waset.org/archive">Archive</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Open Science <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Philosophy.pdf">Open Science Philosophy</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Award.pdf">Open Science Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Society-Open-Science-and-Open-Innovation.pdf">Open Innovation</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Postdoctoral-Fellowship-Award.pdf">Postdoctoral Fellowship Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Scholarly-Research-Review.pdf">Scholarly Research Review</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Support <li><a href="https://waset.org/page/support">Support</a></li> <li><a href="https://waset.org/profile/messages/create">Contact Us</a></li> <li><a href="https://waset.org/profile/messages/create">Report Abuse</a></li> </ul> </div> </div> </div> </div> </div> <div class="container text-center"> <hr style="margin-top:0;margin-bottom:.3rem;"> <a href="https://creativecommons.org/licenses/by/4.0/" target="_blank" class="text-muted small">Creative Commons Attribution 4.0 International License</a> <div id="copy" class="mt-2">© 2024 World Academy of Science, Engineering and Technology</div> </div> </footer> <a href="javascript:" id="return-to-top"><i class="fas fa-arrow-up"></i></a> <div class="modal" id="modal-template"> <div class="modal-dialog"> <div class="modal-content"> <div class="row m-0 mt-1"> <div class="col-md-12"> <button type="button" class="close" data-dismiss="modal" aria-label="Close"><span aria-hidden="true">×</span></button> </div> </div> <div class="modal-body"></div> </div> </div> </div> <script src="https://cdn.waset.org/static/plugins/jquery-3.3.1.min.js"></script> <script src="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/js/bootstrap.bundle.min.js"></script> <script src="https://cdn.waset.org/static/js/site.js?v=150220211556"></script> <script> jQuery(document).ready(function() { /*jQuery.get("https://publications.waset.org/xhr/user-menu", function (response) { jQuery('#mainNavMenu').append(response); });*/ jQuery.get({ url: "https://publications.waset.org/xhr/user-menu", cache: false }).then(function(response){ jQuery('#mainNavMenu').append(response); }); }); </script> </body> </html>