CINXE.COM

Search results for: frequency-domain contention

<!DOCTYPE html> <html lang="en" dir="ltr"> <head> <!-- Google tag (gtag.js) --> <script async src="https://www.googletagmanager.com/gtag/js?id=G-P63WKM1TM1"></script> <script> window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'G-P63WKM1TM1'); </script> <!-- Yandex.Metrika counter --> <script type="text/javascript" > (function(m,e,t,r,i,k,a){m[i]=m[i]||function(){(m[i].a=m[i].a||[]).push(arguments)}; m[i].l=1*new Date(); for (var j = 0; j < document.scripts.length; j++) {if (document.scripts[j].src === r) { return; }} k=e.createElement(t),a=e.getElementsByTagName(t)[0],k.async=1,k.src=r,a.parentNode.insertBefore(k,a)}) (window, document, "script", "https://mc.yandex.ru/metrika/tag.js", "ym"); ym(55165297, "init", { clickmap:false, trackLinks:true, accurateTrackBounce:true, webvisor:false }); </script> <noscript><div><img src="https://mc.yandex.ru/watch/55165297" style="position:absolute; left:-9999px;" alt="" /></div></noscript> <!-- /Yandex.Metrika counter --> <!-- Matomo --> <!-- End Matomo Code --> <title>Search results for: frequency-domain contention</title> <meta name="description" content="Search results for: frequency-domain contention"> <meta name="keywords" content="frequency-domain contention"> <meta name="viewport" content="width=device-width, initial-scale=1, minimum-scale=1, maximum-scale=1, user-scalable=no"> <meta charset="utf-8"> <link href="https://cdn.waset.org/favicon.ico" type="image/x-icon" rel="shortcut icon"> <link href="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/css/bootstrap.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/plugins/fontawesome/css/all.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/css/site.css?v=150220211555" rel="stylesheet"> </head> <body> <header> <div class="container"> <nav class="navbar navbar-expand-lg navbar-light"> <a class="navbar-brand" href="https://waset.org"> <img src="https://cdn.waset.org/static/images/wasetc.png" alt="Open Science Research Excellence" title="Open Science Research Excellence" /> </a> <button class="d-block d-lg-none navbar-toggler ml-auto" type="button" data-toggle="collapse" data-target="#navbarMenu" aria-controls="navbarMenu" aria-expanded="false" aria-label="Toggle navigation"> <span class="navbar-toggler-icon"></span> </button> <div class="w-100"> <div class="d-none d-lg-flex flex-row-reverse"> <form method="get" action="https://waset.org/search" class="form-inline my-2 my-lg-0"> <input class="form-control mr-sm-2" type="search" placeholder="Search Conferences" value="frequency-domain contention" name="q" aria-label="Search"> <button class="btn btn-light my-2 my-sm-0" type="submit"><i class="fas fa-search"></i></button> </form> </div> <div class="collapse navbar-collapse mt-1" id="navbarMenu"> <ul class="navbar-nav ml-auto align-items-center" id="mainNavMenu"> <li class="nav-item"> <a class="nav-link" href="https://waset.org/conferences" title="Conferences in 2024/2025/2026">Conferences</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/disciplines" title="Disciplines">Disciplines</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/committees" rel="nofollow">Committees</a> </li> <li class="nav-item dropdown"> <a class="nav-link dropdown-toggle" href="#" id="navbarDropdownPublications" role="button" data-toggle="dropdown" aria-haspopup="true" aria-expanded="false"> Publications </a> <div class="dropdown-menu" aria-labelledby="navbarDropdownPublications"> <a class="dropdown-item" href="https://publications.waset.org/abstracts">Abstracts</a> <a class="dropdown-item" href="https://publications.waset.org">Periodicals</a> <a class="dropdown-item" href="https://publications.waset.org/archive">Archive</a> </div> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/page/support" title="Support">Support</a> </li> </ul> </div> </div> </nav> </div> </header> <main> <div class="container mt-4"> <div class="row"> <div class="col-md-9 mx-auto"> <form method="get" action="https://publications.waset.org/abstracts/search"> <div id="custom-search-input"> <div class="input-group"> <i class="fas fa-search"></i> <input type="text" class="search-query" name="q" placeholder="Author, Title, Abstract, Keywords" value="frequency-domain contention"> <input type="submit" class="btn_search" value="Search"> </div> </div> </form> </div> </div> <div class="row mt-3"> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Commenced</strong> in January 2007</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Frequency:</strong> Monthly</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Edition:</strong> International</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Paper Count:</strong> 54</div> </div> </div> </div> <h1 class="mt-3 mb-3 text-center" style="font-size:1.6rem;">Search results for: frequency-domain contention</h1> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">54</span> Comparison of Frequency-Domain Contention Schemes in Wireless LANs </h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Li%20Feng">Li Feng</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In IEEE 802.11 networks, it is well known that the traditional time-domain contention often leads to low channel utilization. The first frequency-domain contention scheme, the time to frequency (T2F), has recently been proposed to improve the channel utilization and has attracted a great deal of attention. In this paper, we survey the latest research progress on the weighed frequency-domain contention. We present the basic ideas, work principles of these related schemes and point out their differences. This paper is very useful for further study on frequency-domain contention. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=802.11" title="802.11">802.11</a>, <a href="https://publications.waset.org/abstracts/search?q=wireless%20LANs" title=" wireless LANs"> wireless LANs</a>, <a href="https://publications.waset.org/abstracts/search?q=frequency-domain%20contention" title=" frequency-domain contention"> frequency-domain contention</a>, <a href="https://publications.waset.org/abstracts/search?q=T2F" title=" T2F"> T2F</a> </p> <a href="https://publications.waset.org/abstracts/42959/comparison-of-frequency-domain-contention-schemes-in-wireless-lans" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/42959.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">459</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">53</span> Comparative Performance Analysis of Fiber Delay Line Based Buffer Architectures for Contention Resolution in Optical WDM Networks</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Manoj%20Kumar%20Dutta">Manoj Kumar Dutta</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Wavelength division multiplexing (WDM) technology is the most promising technology for the proper utilization of huge raw bandwidth provided by an optical fiber. One of the key problems in implementing the all-optical WDM network is the packet contention. This problem can be solved by several different techniques. In time domain approach the packet contention can be reduced by incorporating fiber delay lines (FDLs) as optical buffer in the switch architecture. Different types of buffering architectures are reported in literatures. In the present paper a comparative performance analysis of three most popular FDL architectures are presented in order to obtain the best contention resolution performance. The analysis is further extended to consider the effect of different fiber non-linearities on the network performance. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=WDM%20network" title="WDM network">WDM network</a>, <a href="https://publications.waset.org/abstracts/search?q=contention%20resolution" title=" contention resolution"> contention resolution</a>, <a href="https://publications.waset.org/abstracts/search?q=optical%20buffering" title=" optical buffering"> optical buffering</a>, <a href="https://publications.waset.org/abstracts/search?q=non-linearity" title=" non-linearity"> non-linearity</a>, <a href="https://publications.waset.org/abstracts/search?q=throughput" title=" throughput"> throughput</a> </p> <a href="https://publications.waset.org/abstracts/38257/comparative-performance-analysis-of-fiber-delay-line-based-buffer-architectures-for-contention-resolution-in-optical-wdm-networks" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/38257.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">451</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">52</span> An Enhanced Hybrid Backoff Technique for Minimizing the Occurrence of Collision in Mobile Ad Hoc Networks</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=N.%20Sabiyath%20Fatima">N. Sabiyath Fatima</a>, <a href="https://publications.waset.org/abstracts/search?q=R.%20K.%20Shanmugasundaram"> R. K. Shanmugasundaram</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In Mobile Ad-hoc Networks (MANETS), every node performs both as transmitter and receiver. The existing backoff models do not exactly forecast the performance of the wireless network. Also, the existing models experience elevated packet collisions. Every time a collision happens, the station’s contention window (CW) is doubled till it arrives at the utmost value. The main objective of this paper is to diminish collision by means of contention window Multiplicative Increase Decrease Backoff (CWMIDB) scheme. The intention of rising CW is to shrink the collision possibility by distributing the traffic into an outsized point in time. Within wireless Ad hoc networks, the CWMIDB algorithm dynamically controls the contention window of the nodes experiencing collisions. During packet communication, the backoff counter is evenly selected from the given choice of [0, CW-1]. At this point, CW is recognized as contention window and its significance lies on the amount of unsuccessful transmission that had happened for the packet. On the initial transmission endeavour, CW is put to least amount value (C min), if transmission effort fails, subsequently the value gets doubled, and once more the value is set to least amount on victorious broadcast. CWMIDB is simulated inside NS2 environment and its performance is compared with Binary Exponential Backoff Algorithm. The simulation results show improvement in transmission probability compared to that of the existing backoff algorithm. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=backoff" title="backoff">backoff</a>, <a href="https://publications.waset.org/abstracts/search?q=contention%20window" title=" contention window"> contention window</a>, <a href="https://publications.waset.org/abstracts/search?q=CWMIDB" title=" CWMIDB"> CWMIDB</a>, <a href="https://publications.waset.org/abstracts/search?q=MANET" title=" MANET"> MANET</a> </p> <a href="https://publications.waset.org/abstracts/77080/an-enhanced-hybrid-backoff-technique-for-minimizing-the-occurrence-of-collision-in-mobile-ad-hoc-networks" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/77080.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">277</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">51</span> Contention Window Adjustment in IEEE 802.11-based Industrial Wireless Networks</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Mohsen%20Maadani">Mohsen Maadani</a>, <a href="https://publications.waset.org/abstracts/search?q=Seyed%20Ahmad%20Motamedi"> Seyed Ahmad Motamedi</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The use of wireless technology in industrial networks has gained vast attraction in recent years. In this paper, we have thoroughly analyzed the effect of contention window (CW) size on the performance of IEEE 802.11-based industrial wireless networks (IWN), from delay and reliability perspective. Results show that the default values of CWmin, CWmax, and retry limit (RL) are far from the optimum performance due to the industrial application characteristics, including short packet and noisy environment. An adaptive CW algorithm (payload-dependent) has been proposed to minimize the average delay. Finally a simple, but effective CW and RL setting has been proposed for industrial applications which outperforms the minimum-average-delay solution from maximum delay and jitter perspective, at the cost of a little higher average delay. Simulation results show an improvement of up to 20%, 25%, and 30% in average delay, maximum delay and jitter respectively. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=average%20delay" title="average delay">average delay</a>, <a href="https://publications.waset.org/abstracts/search?q=contention%20window" title=" contention window"> contention window</a>, <a href="https://publications.waset.org/abstracts/search?q=distributed%20coordination%20function%20%28DCF%29" title=" distributed coordination function (DCF)"> distributed coordination function (DCF)</a>, <a href="https://publications.waset.org/abstracts/search?q=jitter" title=" jitter"> jitter</a>, <a href="https://publications.waset.org/abstracts/search?q=industrial%20wireless%20network%20%28IWN%29" title=" industrial wireless network (IWN)"> industrial wireless network (IWN)</a>, <a href="https://publications.waset.org/abstracts/search?q=maximum%20delay" title=" maximum delay"> maximum delay</a>, <a href="https://publications.waset.org/abstracts/search?q=reliability" title=" reliability"> reliability</a>, <a href="https://publications.waset.org/abstracts/search?q=retry%20limit" title=" retry limit"> retry limit</a> </p> <a href="https://publications.waset.org/abstracts/36488/contention-window-adjustment-in-ieee-80211-based-industrial-wireless-networks" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/36488.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">416</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">50</span> Throughput of Point Coordination Function (PCF)</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Faisel%20Eltuhami%20Alzaalik">Faisel Eltuhami Alzaalik</a>, <a href="https://publications.waset.org/abstracts/search?q=Omar%20Imhemed%20Alramli"> Omar Imhemed Alramli</a>, <a href="https://publications.waset.org/abstracts/search?q=Ahmed%20Mohamed%20Elaieb"> Ahmed Mohamed Elaieb</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The IEEE 802.11 defines two modes of MAC, distributed coordination function (DCF) and point coordination function (PCF) mode. The first sub-layer of the MAC is the distributed coordination function (DCF). A contention algorithm is used via DCF to provide access to all traffic. The point coordination function (PCF) is the second sub-layer used to provide contention-free service. PCF is upper DCF and it uses features of DCF to establish guarantee access of its users. Some papers and researches that have been published in this technology were reviewed in this paper, as well as talking briefly about the distributed coordination function (DCF) technology. The simulation of the PCF function have been applied by using a simulation program called network simulator (NS2) and have been found out the throughput of a transmitter system by using this function. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=DCF" title="DCF">DCF</a>, <a href="https://publications.waset.org/abstracts/search?q=PCF" title=" PCF"> PCF</a>, <a href="https://publications.waset.org/abstracts/search?q=throughput" title=" throughput"> throughput</a>, <a href="https://publications.waset.org/abstracts/search?q=NS2" title=" NS2"> NS2</a> </p> <a href="https://publications.waset.org/abstracts/2456/throughput-of-point-coordination-function-pcf" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/2456.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">577</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">49</span> Between Riots and Protests: A Structural Approach to Urban Environmental Uprisings in China </h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Zi%20Zhu">Zi Zhu</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The last decade has witnessed increasing urban environmental uprisings in China, as thousands of citizens swarmed into streets to express their deep concerns about the environmental threat and public health through various collective actions. The prevalent western approaches to collective actions, which usually treat urban riots and social movements as distinct phenomenon, have plagued an adequate analysis of the urban environmental uprisings in China. The increasing urban environmental contention can neither be categorized into riots nor social movements, as they carry the features of both: at first sight, they are spontaneous, disorganized and disruptive with an absence of observable mobilization process; however, unlike riots in the west, these collective actions conveyed explicit demand in a mostly non-destructive way rather than a pure expression of frustration. This article proposes a different approach to urban environmental uprisings in China which concerns the diminishing boundaries between riots and social movements and points to the underlying structural causes to the unique forms of urban environmental contention. Taking the urban anti-PX protests as examples, this article analyzes the societal and political structural environment faced by the Chinese environmental protesters and its influence on the origin and development of their contention. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=urban%20environmental%20uprisings" title="urban environmental uprisings">urban environmental uprisings</a>, <a href="https://publications.waset.org/abstracts/search?q=China" title=" China"> China</a>, <a href="https://publications.waset.org/abstracts/search?q=anti-PX%20protests" title=" anti-PX protests"> anti-PX protests</a>, <a href="https://publications.waset.org/abstracts/search?q=opportunity%20structure" title=" opportunity structure"> opportunity structure</a> </p> <a href="https://publications.waset.org/abstracts/58629/between-riots-and-protests-a-structural-approach-to-urban-environmental-uprisings-in-china" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/58629.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">289</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">48</span> Attention-based Adaptive Convolution with Progressive Learning in Speech Enhancement</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Tian%20Lan">Tian Lan</a>, <a href="https://publications.waset.org/abstracts/search?q=Yixiang%20Wang"> Yixiang Wang</a>, <a href="https://publications.waset.org/abstracts/search?q=Wenxin%20Tai"> Wenxin Tai</a>, <a href="https://publications.waset.org/abstracts/search?q=Yilan%20Lyu"> Yilan Lyu</a>, <a href="https://publications.waset.org/abstracts/search?q=Zufeng%20Wu"> Zufeng Wu</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The monaural speech enhancement task in the time-frequencydomain has a myriad of approaches, with the stacked con-volutional neural network (CNN) demonstrating superiorability in feature extraction and selection. However, usingstacked single convolutions method limits feature represen-tation capability and generalization ability. In order to solvethe aforementioned problem, we propose an attention-basedadaptive convolutional network that integrates the multi-scale convolutional operations into a operation-specific blockvia input dependent attention to adapt to complex auditoryscenes. In addition, we introduce a two-stage progressivelearning method to enlarge the receptive field without a dra-matic increase in computation burden. We conduct a series ofexperiments based on the TIMIT corpus, and the experimen-tal results prove that our proposed model is better than thestate-of-art models on all metrics. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=speech%20enhancement" title="speech enhancement">speech enhancement</a>, <a href="https://publications.waset.org/abstracts/search?q=adaptive%20convolu-tion" title="adaptive convolu-tion">adaptive convolu-tion</a>, <a href="https://publications.waset.org/abstracts/search?q=progressive%20learning" title="progressive learning">progressive learning</a>, <a href="https://publications.waset.org/abstracts/search?q=time-frequency%20domain" title="time-frequency domain">time-frequency domain</a> </p> <a href="https://publications.waset.org/abstracts/144532/attention-based-adaptive-convolution-with-progressive-learning-in-speech-enhancement" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/144532.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">122</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">47</span> The Art of Resilience in the Case of Skopje</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Kristina%20Nikolovska">Kristina Nikolovska</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Social movements have become common in the Post Yugoslav cities. Consequently, the wave of activism has been considerably present in Skopje. Starting from 2009 the activist wave in Skopje emerged with the notion of the city. Diversity of initiatives appeared in the city in order to defend places that have been contested by the urban development project SK2014. The activist wave diffused into many different initiatives and diversity of issues. The result was unification in one massive movement in 2016, called 'The Colourful Revolution'. The paper explores the scope of activism in Skopje, with taking into consideration the influence of the spatial transformation, the project SK2014. Moreover, it examines the processes of spatiality into shaping the contention in Skopje, focusing on interdisciplinary and comprehensive approaches. Except the diversity of theoretical framework mainly founded on contentious politics theory and space elaboration from different perspectives, the study is founded on field work based on conducted interviews. Using an interdisciplinary approach and focusing on three main dimensions, the research contributes to understand the dynamics of the activist wave and importance of spatial processes in the creation of the contention in Skopje. Moreover, it elaborates the characteristics, possible effects, and reflections of the cycles of protests in Skopje. The main results of the research showed that dynamics of space is important in the creation of the activist wave in Skopje, moreover space context can give explanation about how opportunities diffuse and transformative power is created. The study contributed into deeper understanding of the importance of spatiality in contentious politics, it showed that in general contentions politics can benefit from deeper analyses of place specificity. Finally, the thesis opposes the traditional linear understanding of social movements, and proposes more dynamic, comprehensive, and sensitive elaboration. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=contentious%20politics" title="contentious politics">contentious politics</a>, <a href="https://publications.waset.org/abstracts/search?q=place" title=" place"> place</a>, <a href="https://publications.waset.org/abstracts/search?q=Skopje" title=" Skopje"> Skopje</a>, <a href="https://publications.waset.org/abstracts/search?q=SK2014" title=" SK2014"> SK2014</a>, <a href="https://publications.waset.org/abstracts/search?q=social%20movements" title=" social movements"> social movements</a>, <a href="https://publications.waset.org/abstracts/search?q=space" title=" space"> space</a> </p> <a href="https://publications.waset.org/abstracts/69662/the-art-of-resilience-in-the-case-of-skopje" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/69662.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">229</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">46</span> Teaching Academic Vocabulary: A Recent and Old Approach</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Sara%20Fine-Meltzer">Sara Fine-Meltzer</a> </p> <p class="card-text"><strong>Abstract:</strong></p> An obvious, but ill-addressed hindrance to reading comprehension in academic English is poor vocabulary. Unfortunately, dealing with the problem is usually delayed until university entrance. It is the contention of this paper that the chore should be confronted much earlier and by using a very old-fashioned method. This presentation is accompanied by vocabulary lists for advanced level university students with explanations concerning the content and justification for the 500-word lists: how they change over time in accordance with evolving styles of academic writing. There are also sample quizzes and methods to ensure that the words are “absorbed” over time. There is a discussion of other vocabulary acquisition methods and conclusions drawn from the drawbacks of such methods. The paper concludes with the rationale for beginning the study of “academic” vocabulary earlier than is generally acceptable. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=academic%20vocabulary" title="academic vocabulary">academic vocabulary</a>, <a href="https://publications.waset.org/abstracts/search?q=old-fashioned%20methods" title=" old-fashioned methods"> old-fashioned methods</a>, <a href="https://publications.waset.org/abstracts/search?q=quizzes" title=" quizzes"> quizzes</a>, <a href="https://publications.waset.org/abstracts/search?q=vocabulary%20lists" title=" vocabulary lists"> vocabulary lists</a> </p> <a href="https://publications.waset.org/abstracts/154511/teaching-academic-vocabulary-a-recent-and-old-approach" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/154511.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">122</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">45</span> Hydrogen: Contention-Aware Hybrid Memory Management for Heterogeneous CPU-GPU Architectures</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Yiwei%20Li">Yiwei Li</a>, <a href="https://publications.waset.org/abstracts/search?q=Mingyu%20Gao"> Mingyu Gao</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Integrating hybrid memories with heterogeneous processors could leverage heterogeneity in both compute and memory domains for better system efficiency. To ensure performance isolation, we introduce Hydrogen, a hardware architecture to optimize the allocation of hybrid memory resources to heterogeneous CPU-GPU systems. Hydrogen supports efficient capacity and bandwidth partitioning between CPUs and GPUs in both memory tiers. We propose decoupled memory channel mapping and token-based data migration throttling to enable flexible partitioning. We also support epoch-based online search for optimized configurations and lightweight reconfiguration with reduced data movements. Hydrogen significantly outperforms existing designs by 1.21x on average and up to 1.31x. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=hybrid%20memory" title="hybrid memory">hybrid memory</a>, <a href="https://publications.waset.org/abstracts/search?q=heterogeneous%20systems" title=" heterogeneous systems"> heterogeneous systems</a>, <a href="https://publications.waset.org/abstracts/search?q=dram%20cache" title=" dram cache"> dram cache</a>, <a href="https://publications.waset.org/abstracts/search?q=graphics%20processing%20units" title=" graphics processing units"> graphics processing units</a> </p> <a href="https://publications.waset.org/abstracts/183187/hydrogen-contention-aware-hybrid-memory-management-for-heterogeneous-cpu-gpu-architectures" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/183187.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">96</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">44</span> Contentious Politics during a Period of Transition to Democracy from an Authoritarian Regime: The Spanish Cycle of Protest of November 1975-December 1978</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Juan%20Sanmart%C3%ADn%20Bastida">Juan Sanmartín Bastida</a> </p> <p class="card-text"><strong>Abstract:</strong></p> When a country experiences a period of transition from authoritarianism to democracy, involving an earlier process of political liberalization and a later process of democratization, a cycle of protest usually outbreaks, as there is a reciprocal influence between that kind of political change and the frequency and scale of social protest events. That is what happened in Spain during the first years of its transition to democracy from the Francoist authoritarian regime, roughly between November 1975 and December 1978. Thus, the object of this study is to show and explain how that cycle of protest started, developed, and finished in relation to such a political change, and offer specific information about the main features of all protest cycles: the social movements that arose during that period, the number of protest events by month, the forms of collective action that were utilized, the groups of challengers that engaged in contentious politics, the reaction of the authorities to the action and claims of those groups, etc. The study of this cycle of protest, using the primary sources and analytical tools that characterize the model of research of protest cycles, will make a contribution to the field of contentious politics and its phenomenon of cycles of contention, and more broadly to the political and social history of contemporary Spain. The cycle of protest and the process of political liberalization of the authoritarian regime began around the same time, but the first concluded long before the process of democratization was completed in 1982. The ascending phase of the cycle and therefore the process of liberalization started with the death of Francisco Franco and the proclamation of Juan Carlos I as King of Spain in November 1975; the peak of the cycle was around the first months of 1977; the descending phase started after the first general election of June 1977; and the level of protest stabilized in the last months of 1978, a year that finished with a referendum in which the Spanish people approved the current democratic constitution. It was then when we can consider that the cycle of protest came to an end. The primary sources are the news of protest events and social movements in the three main Spanish newspapers at the time, other written or audiovisual documents, and in-depth interviews; and the analytical tools are the political opportunities that encourage social protest, the available repertoire of contention, the organizations and networks that brought together people with the same claims and allowed them to engage in contentious politics, and the interpretative frames that justify, dignify and motivates their collective action. These are the main four factors that explain the beginning, development and ending of the cycle of protest, and therefore the accompanying social movements and events of collective action. Among those four factors, the political opportunities -their opening, exploitation, and closure-proved to be most decisive. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=contentious%20politics" title="contentious politics">contentious politics</a>, <a href="https://publications.waset.org/abstracts/search?q=cycles%20of%20protest" title=" cycles of protest"> cycles of protest</a>, <a href="https://publications.waset.org/abstracts/search?q=political%20opportunities" title=" political opportunities"> political opportunities</a>, <a href="https://publications.waset.org/abstracts/search?q=social%20movements" title=" social movements"> social movements</a>, <a href="https://publications.waset.org/abstracts/search?q=Spanish%20transition%20to%20democracy" title=" Spanish transition to democracy"> Spanish transition to democracy</a> </p> <a href="https://publications.waset.org/abstracts/135616/contentious-politics-during-a-period-of-transition-to-democracy-from-an-authoritarian-regime-the-spanish-cycle-of-protest-of-november-1975-december-1978" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/135616.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">138</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">43</span> Women Participation in Politics: Rights and Challenges: The Quranic Perspective</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Abdul%20Azeez%20Badmus">Abdul Azeez Badmus</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The extent to which women are allowed to express their liberty and freedom are varying in human society. Islam’s basic view of women postulates a complimentary function as the creator has created every living thing in pairs based on the foundation of complimentary functions, so the human species is not exceptional. It is also ubiquitous contention whether women should participate in politics or not; the limit to which women should participate in politics is another problem. This paper attempts to suggest a possible solution to the questions mentioned above, to review the level of participation of women in politics since the beginning of Islam and the Quranic injunctions that seem to have allowed or disallowed that. The paper adopts a historical and analytical approach, with special reference to the Quranic, Sunna, juristic opinions, and historical events. The paper advocates for proper reference to the authentic Islamic sources in determining the right and obligations of women in society. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=politics" title="politics">politics</a>, <a href="https://publications.waset.org/abstracts/search?q=right" title=" right"> right</a>, <a href="https://publications.waset.org/abstracts/search?q=challenges" title=" challenges"> challenges</a>, <a href="https://publications.waset.org/abstracts/search?q=Qur%E2%80%99%C4%81n" title=" Qur’ān"> Qur’ān</a>, <a href="https://publications.waset.org/abstracts/search?q=perspective" title=" perspective"> perspective</a> </p> <a href="https://publications.waset.org/abstracts/137129/women-participation-in-politics-rights-and-challenges-the-quranic-perspective" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/137129.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">188</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">42</span> Wavelength Conversion of Dispersion Managed Solitons at 100 Gbps through Semiconductor Optical Amplifier</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Kadam%20Bhambri">Kadam Bhambri</a>, <a href="https://publications.waset.org/abstracts/search?q=Neena%20Gupta"> Neena Gupta</a> </p> <p class="card-text"><strong>Abstract:</strong></p> All optical wavelength conversion is essential in present day optical networks for transparent interoperability, contention resolution, and wavelength routing. The incorporation of all optical wavelength convertors leads to better utilization of the network resources and hence improves the efficiency of optical networks. Wavelength convertors that can work with Dispersion Managed (DM) solitons are attractive due to their superior transmission capabilities. In this paper, wavelength conversion for dispersion managed soliton signals was demonstrated at 100 Gbps through semiconductor optical amplifier and an optical filter. The wavelength conversion was achieved for a 1550 nm input signal to1555nm output signal. The output signal was measured in terms of BER, Q factor and system margin.&nbsp;&nbsp; &nbsp; <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=all%20optical%20wavelength%20conversion" title="all optical wavelength conversion">all optical wavelength conversion</a>, <a href="https://publications.waset.org/abstracts/search?q=dispersion%20managed%20solitons" title=" dispersion managed solitons"> dispersion managed solitons</a>, <a href="https://publications.waset.org/abstracts/search?q=semiconductor%20optical%20amplifier" title=" semiconductor optical amplifier"> semiconductor optical amplifier</a>, <a href="https://publications.waset.org/abstracts/search?q=cross%20gain%20modultation" title=" cross gain modultation"> cross gain modultation</a> </p> <a href="https://publications.waset.org/abstracts/46267/wavelength-conversion-of-dispersion-managed-solitons-at-100-gbps-through-semiconductor-optical-amplifier" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/46267.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">453</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">41</span> Relay Node Selection Algorithm for Cooperative Communications in Wireless Networks</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Sunmyeng%20Kim">Sunmyeng Kim</a> </p> <p class="card-text"><strong>Abstract:</strong></p> IEEE 802.11a/b/g standards support multiple transmission rates. Even though the use of multiple transmission rates increase the WLAN capacity, this feature leads to the performance anomaly problem. Cooperative communication was introduced to relieve the performance anomaly problem. Data packets are delivered to the destination much faster through a relay node with high rate than through direct transmission to the destination at low rate. In the legacy cooperative protocols, a source node chooses a relay node only based on the transmission rate. Therefore, they are not so feasible in multi-flow environments since they do not consider the effect of other flows. To alleviate the effect, we propose a new relay node selection algorithm based on the transmission rate and channel contention level. Performance evaluation is conducted using simulation, and shows that the proposed protocol significantly outperforms the previous protocol in terms of throughput and delay. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=cooperative%20communications" title="cooperative communications">cooperative communications</a>, <a href="https://publications.waset.org/abstracts/search?q=MAC%20protocol" title=" MAC protocol"> MAC protocol</a>, <a href="https://publications.waset.org/abstracts/search?q=relay%20node" title=" relay node"> relay node</a>, <a href="https://publications.waset.org/abstracts/search?q=WLAN" title=" WLAN"> WLAN</a> </p> <a href="https://publications.waset.org/abstracts/7034/relay-node-selection-algorithm-for-cooperative-communications-in-wireless-networks" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/7034.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">333</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">40</span> A Low Power and High-Speed Conditional-Precharge Sense Amplifier Based Flip-Flop Using Single Ended Latch</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Guo-Ming%20Sung">Guo-Ming Sung</a>, <a href="https://publications.waset.org/abstracts/search?q=Ramavath%20Naga%20Raju%20Naik"> Ramavath Naga Raju Naik</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper presents a low power, high speed, sense-amplifier based flip-flop (SAFF). The flip-flop’s power con-sumption and delay are greatly reduced by employing a new conditionally precharge sense-amplifier stage and a single-ended latch stage. Glitch-free and contention-free latch operation is achieved by using a conditional cut-off strategy. The design uses fewer transistors, has a lower clock load, and has a simple structure, all of which contribute to a near-zero setup time. When compared to previous flip-flop structures proposed for similar input/output conditions, this design’s performance and overall PDP have improved. The post layout simulation of the circuit uses 2.91µW of power and has a delay of 65.82 ps. Overall, the power-delay product has seen some enhancements. Cadence Virtuoso Designing tool with CMOS 90nm technology are used for all designs. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=high-speed" title="high-speed">high-speed</a>, <a href="https://publications.waset.org/abstracts/search?q=low-power" title=" low-power"> low-power</a>, <a href="https://publications.waset.org/abstracts/search?q=flip-flop" title=" flip-flop"> flip-flop</a>, <a href="https://publications.waset.org/abstracts/search?q=sense-amplifier" title=" sense-amplifier"> sense-amplifier</a> </p> <a href="https://publications.waset.org/abstracts/144462/a-low-power-and-high-speed-conditional-precharge-sense-amplifier-based-flip-flop-using-single-ended-latch" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/144462.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">162</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">39</span> Shaabi in the City: On Modernizing Sounds and Exclusion in Egyptian Cities</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Mariam%20Aref%20Mahmoud">Mariam Aref Mahmoud</a> </p> <p class="card-text"><strong>Abstract:</strong></p> After centuries of historical development, Egypt is no stranger to national identity frustrations. What may or may not be counted as this “national identity” becomes a source of contention. Today, after decades of neoliberal reform, Cairo has become the center of Egypt’s cultural debacle. At its heart, the Egyptian capital serves as Egypt’s extension into global capitalism, its flailing hope to become part of the modernized, cosmopolitan world. Yet, to converge into this image of cosmopolitanism, Cairo must silence the perceived un-modernized sounds, cultures, and spaces that arise from within its alleyways. Currently, the agitation surrounding shaabi music, particularly, that of mahraganat, places these contentions to the center of the modernization debates. This paper will discuss the process through which the conversations between modernization, space, and culture have taken place through a historical analysis of national identity formation under Egypt’s neoliberal regimes. Through this, the paper concludes that music becomes a spatial force through which public space, identity, and globalization must be contested. From these findings researchers can then analyze Cairo through not only its physical landscapes, but also its metaphysical features – such as the soundscape. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=music" title="music">music</a>, <a href="https://publications.waset.org/abstracts/search?q=space" title=" space"> space</a>, <a href="https://publications.waset.org/abstracts/search?q=globalization" title=" globalization"> globalization</a>, <a href="https://publications.waset.org/abstracts/search?q=Cairo" title=" Cairo"> Cairo</a> </p> <a href="https://publications.waset.org/abstracts/179779/shaabi-in-the-city-on-modernizing-sounds-and-exclusion-in-egyptian-cities" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/179779.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">111</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">38</span> An Adaptive Opportunistic Transmission for Unlicensed Spectrum Sharing in Heterogeneous Networks</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Daehyoung%20Kim">Daehyoung Kim</a>, <a href="https://publications.waset.org/abstracts/search?q=Pervez%20Khan"> Pervez Khan</a>, <a href="https://publications.waset.org/abstracts/search?q=Hoon%20Kim"> Hoon Kim</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Efficient utilization of spectrum resources is a fundamental issue of wireless communications due to its scarcity. To improve the efficiency of spectrum utilization, the spectrum sharing for unlicensed bands is being regarded as one of key technologies in the next generation wireless networks. A number of schemes such as Listen-Before-Talk(LBT) and carrier sensor adaptive transmission (CSAT) have been suggested from this aspect, but more efficient sharing schemes are required for improving spectrum utilization efficiency. This work considers an opportunistic transmission approach and a dynamic Contention Window (CW) adjustment scheme for LTE-U users sharing the unlicensed spectrum with Wi-Fi, in order to enhance the overall system throughput. The decision criteria for the dynamic adjustment of CW are based on the collision evaluation, derived from the collision probability of the system. The overall performance can be improved due to the adaptive adjustment of the CW. Simulation results show that our proposed scheme outperforms the Distributed Coordination Function (DCF) mechanism of IEEE 802.11 MAC. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=spectrum%20sharing" title="spectrum sharing">spectrum sharing</a>, <a href="https://publications.waset.org/abstracts/search?q=adaptive%20opportunistic%20transmission" title=" adaptive opportunistic transmission"> adaptive opportunistic transmission</a>, <a href="https://publications.waset.org/abstracts/search?q=unlicensed%20bands" title=" unlicensed bands"> unlicensed bands</a>, <a href="https://publications.waset.org/abstracts/search?q=heterogeneous%20networks" title=" heterogeneous networks"> heterogeneous networks</a> </p> <a href="https://publications.waset.org/abstracts/51830/an-adaptive-opportunistic-transmission-for-unlicensed-spectrum-sharing-in-heterogeneous-networks" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/51830.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">350</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">37</span> A Phenomenological-Hermeneutic Account of Design Thinking by Way of an Exposition of Four Species of Negatite: &#039;Not Being&#039;, &#039;Non-Being&#039;, &#039;Absence&#039;, &#039;Non-Existence&#039;</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Soheil%20Ashrafi">Soheil Ashrafi</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In this paper, it is attempted to chart and exposit terra incognito of the transcendental intuition of ‘non-being’, a peculiar species of négatité and a form of consciousness which underpins the phenomenal capacity for design thinking, and which serves as the ground of the ‘designing being-relation to the world’. The paper’s contention is that the transcendental intuition of the non-being indwells the agent’s being-relation to the world as a continual tension in that neither does the agent relinquish its ontological leverage and submit altogether to the world’s curbs and dictates, nor is it able to subdue satisfactorily or settle into the world once and for all. By way of phenomenological-hermeneutic analysis, it is endeavoured to argue that design thinking occurs by virtue of a phenomenal transition between the a priori ‘not-being’, the basis of ‘that-which-is’, and the transcendental intuition of non-being through which that-which-is-not-yet announces itself. Along with this, the other two species of négatité as ‘absence’ and ‘non-existence’ are clarified and contrasted with not-being and non-being, which have widely been used in the literature interchangeably as identical terms. In conclusion, it is argued that not only has design thinking in its unadulterated, originary mode historically preceded scientific thinking, but it also has served as the foundation of its emergence. In short, scientific thinking is a derivative, reformed application of design thinking; it indeed supervenes upon it. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=design%20thinking" title="design thinking">design thinking</a>, <a href="https://publications.waset.org/abstracts/search?q=designing%20being-relation%20to%20the%20world" title=" designing being-relation to the world"> designing being-relation to the world</a>, <a href="https://publications.waset.org/abstracts/search?q=n%C3%A9gatit%C3%A9" title=" négatité"> négatité</a>, <a href="https://publications.waset.org/abstracts/search?q=not-being" title=" not-being"> not-being</a>, <a href="https://publications.waset.org/abstracts/search?q=non-being" title=" non-being"> non-being</a> </p> <a href="https://publications.waset.org/abstracts/112250/a-phenomenological-hermeneutic-account-of-design-thinking-by-way-of-an-exposition-of-four-species-of-negatite-not-being-non-being-absence-non-existence" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/112250.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">170</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">36</span> Barriers to Competitive Tenders in Building Conservation Works</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Yoke-Mui%20Lim">Yoke-Mui Lim</a>, <a href="https://publications.waset.org/abstracts/search?q=Yahaya%20Ahmad"> Yahaya Ahmad</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Conservation works in Malaysia that is procured by public organisation usually follow the traditional approach where the works are tendered based on Bills of Quantities (BQ). One of the purposes of tendering is to enable the selection of a competent contractor that offers a competitive price. While competency of the contractors are assessed by their technical knowledge, experience and track records, the assessment of pricing will be dependent on the tender amount. However, the issue currently faced by the conservation works sector is the difficulty in assessing the competitiveness and reasonableness of the tender amount due to the high variance between the tenders amount. Thus, this paper discusses the factors that cause difficulty to the tenderers in pricing competitively in a bidding exercise for conservation tenders. Data on tendering is collected from interviews with conservation works contractors to gain in-depth understanding of the barriers faced in pricing tenders of conservation works. Findings from the study lent support to the contention that the variance of tender amount is very high amongst tenderers. The factors identified in the survey are the format of BQ, hidden works, experience and labour and material costs. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=building%20conservation" title="building conservation">building conservation</a>, <a href="https://publications.waset.org/abstracts/search?q=Malaysia" title=" Malaysia"> Malaysia</a>, <a href="https://publications.waset.org/abstracts/search?q=bill%20of%20quantities" title=" bill of quantities"> bill of quantities</a>, <a href="https://publications.waset.org/abstracts/search?q=tender" title=" tender"> tender</a> </p> <a href="https://publications.waset.org/abstracts/19339/barriers-to-competitive-tenders-in-building-conservation-works" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/19339.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">386</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">35</span> Illuminating Regional Identity: An Interdisciplinary Exploration in Saskatchewan</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Anne%20Gibbons">Anne Gibbons</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Both inside and outside of academia, people have sought to understand the “sense of place” of various regions, many times over and for many different reasons. The concept of regional identity is highly complex and surrounded by considerable contention. There are multiple bodies of research on regional identity theory in many different disciplines and even across sub-disciplinary classifications. Each discipline takes a slightly different angle or perspective on regional identity, resulting in a fragmented body of work on this topic overall. There is a need to consolidate this body of increasingly fragmented theory through interdisciplinary integration. For the purpose of this study, the province of Saskatchewan will serve as an exemplar for exploring regional identity in a concrete context. Saskatchewan can be thought of as a ‘functional region,’ with clear boundaries and clear residency, from which regional identity can be studied. This thesis shares the outcomes of a qualitative study grounded in a series of group interviews with askatchewan residents, from which it is concluded that the use of interdisciplinary theory is an appropriate approach to the study of regional identity. Regional identity cannot be compartmentalized; it is a web of characteristics, attributes, and feelings that are inextricably linked. The thesis thus concludes by offering lessons learned about how we might better understand regional identity, as illuminated through both interdisciplinary theory and the lived experiences and imaginations of people living in the region of Saskatchewan. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=interdisciplinary" title="interdisciplinary">interdisciplinary</a>, <a href="https://publications.waset.org/abstracts/search?q=regional%20identity" title=" regional identity"> regional identity</a>, <a href="https://publications.waset.org/abstracts/search?q=Saskatchewan" title=" Saskatchewan"> Saskatchewan</a>, <a href="https://publications.waset.org/abstracts/search?q=tourism%20studies" title=" tourism studies"> tourism studies</a> </p> <a href="https://publications.waset.org/abstracts/39847/illuminating-regional-identity-an-interdisciplinary-exploration-in-saskatchewan" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/39847.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">532</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">34</span> Scaffold on Trial: The Rhetorical Controversy of a Public Artifact in Minneapolis</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Cynthia%20Pope">Cynthia Pope</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Though traditional art has been strong on showcasing aesthetics to imbue pleasantries, modern public art has been breaking trends to push citizens beyond the pleasure of seeing beauty. Contemporary public sculpture, in particular, has been the impetus of provoking questions about community standards, identity, and race relations. A phenomenon involving Scaffold, a sculpture by artist Sam Durant, became the focal point of contention within Minneapolis, Minnesota, recently. With intentions to better understand the power public sculpture has to disrupt community identity, in this book, It will use primarily rhetorical theory to explain how all parties involved—The Walker Art Museum, the Dakota Nation, Durant, and local citizens—participated in a controversy touching on racial politics, identity, culture, history and public art. This mixed-methods case study examines the public artifact contextually through historical and cultural frameworks. Findings in this project will reveal Scaffold to be represented as a tool of empowered Caucasians to the exclusion of marginalized people. This project also informs the fields of public rhetoric and political identity, marginalized voices, and community and social justice initiatives to include the difficult topic of race and identity. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=public%20art%20controversy" title="public art controversy">public art controversy</a>, <a href="https://publications.waset.org/abstracts/search?q=technical%20communication" title=" technical communication"> technical communication</a>, <a href="https://publications.waset.org/abstracts/search?q=community%20narrative" title=" community narrative"> community narrative</a>, <a href="https://publications.waset.org/abstracts/search?q=ambient%20rhetoric" title=" ambient rhetoric"> ambient rhetoric</a> </p> <a href="https://publications.waset.org/abstracts/172241/scaffold-on-trial-the-rhetorical-controversy-of-a-public-artifact-in-minneapolis" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/172241.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">83</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">33</span> Wireless Sensor Network Energy Efficient and QoS-Aware MAC Protocols: A Survey</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Bashir%20Abdu%20Muzakkari">Bashir Abdu Muzakkari</a>, <a href="https://publications.waset.org/abstracts/search?q=Mohamad%20Afendee%20Mohamad"> Mohamad Afendee Mohamad</a>, <a href="https://publications.waset.org/abstracts/search?q=Mohd%20Fadzil%20Abdul%20Kadir"> Mohd Fadzil Abdul Kadir</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Wireless Sensor Networks (WSNs) is an aggregation of several tiny, low-cost sensor nodes, spatially distributed to monitor physical or environmental status. WSN is constantly changing because of the rapid technological advancements in sensor elements such as radio, battery and operating systems. The Medium Access Control (MAC) protocols remain very vital in the WSN because of its role in coordinating communication amongst the sensors. Other than battery consumption, packet collision, network lifetime and latency are factors that largely depend on WSN MAC protocol and these factors have been widely treated in recent days. In this paper, we survey some latest proposed WSN Contention-based, Scheduling-based and Hybrid MAC protocols while presenting an examination, correlation of advantages and limitations of each protocol. Concentration is directed towards investigating the treatment of Quality of Service (QoS) performance metrics within these particular protocols. The result shows that majority of the protocols leaned towards energy conservation. We, therefore, believe that other performance metrics of guaranteed QoS such as latency, throughput, packet loss, network and bandwidth availability may play a critical role in the design of future MAC protocols for WSNs. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=WSN" title="WSN">WSN</a>, <a href="https://publications.waset.org/abstracts/search?q=QoS" title=" QoS"> QoS</a>, <a href="https://publications.waset.org/abstracts/search?q=energy%20consumption" title=" energy consumption"> energy consumption</a>, <a href="https://publications.waset.org/abstracts/search?q=MAC%20protocol" title=" MAC protocol"> MAC protocol</a> </p> <a href="https://publications.waset.org/abstracts/54561/wireless-sensor-network-energy-efficient-and-qos-aware-mac-protocols-a-survey" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/54561.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">400</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">32</span> Dependence of the Structural, Electrical and Magnetic Properties of YBa2Cu3O7−δ Bulk Superconductor on the Sm Doping</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Raheleh%20Hajilou">Raheleh Hajilou</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In this study, we report the synthesis and characterization of YBa2Cu3O7-δ (YBCO) high-temperature superconductor prepared by solid-state method and doped with Sm in different weight percentages, 0, 0.01, 0.02 and 0.05 wt. The result of X-ray diffraction (XRD) analysis conforms to the formation of an orthorhombic phase of superconductivity in our samples. This is an important finding and indicates that the samples may exhibit superconductivity properties at certain conditions. Our results unequivocally point to a different structural order or disorder in SM/Y samples as compared to Sm based samples. We suggest that different site preferences of oxygen vacancies, predominantly created in CuO2 planes (CuO chains) of Y and Sm-based samples, might be responsible for the observed difference in the behavior. This contention is supported by a host of other considerations and experimental observations. The study investigated the effects of Sm doping on the YBCO system on various properties such as structural, critical temperature (Tc), scanning electron microscope (SEM), irresistibility line(IL), critical current density, jc, and flux line pinning force. It Seems the sample x=0.05 undergoes an insulator transition, which suppresses its superconducting transition temperature (Tc). Additionally, magnetization was measured as a function of temperature (M-T) and magnetic loops (M-H) at constant temperatures of 10. 20, 30, 40, 50 and 60K up to 10KG. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=high-Tc%20superconductors" title="high-Tc superconductors">high-Tc superconductors</a>, <a href="https://publications.waset.org/abstracts/search?q=Scanning%20electron%20microscopy" title=" Scanning electron microscopy"> Scanning electron microscopy</a>, <a href="https://publications.waset.org/abstracts/search?q=X-ray%20scattering" title=" X-ray scattering"> X-ray scattering</a>, <a href="https://publications.waset.org/abstracts/search?q=Irreversibility%20line" title=" Irreversibility line"> Irreversibility line</a> </p> <a href="https://publications.waset.org/abstracts/189384/dependence-of-the-structural-electrical-and-magnetic-properties-of-yba2cu3o7d-bulk-superconductor-on-the-sm-doping" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/189384.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">15</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">31</span> Performance Evaluation of Clustered Routing Protocols for Heterogeneous Wireless Sensor Networks</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Awatef%20Chniguir">Awatef Chniguir</a>, <a href="https://publications.waset.org/abstracts/search?q=Tarek%20Farah"> Tarek Farah</a>, <a href="https://publications.waset.org/abstracts/search?q=Zouhair%20Ben%20Jemaa"> Zouhair Ben Jemaa</a>, <a href="https://publications.waset.org/abstracts/search?q=Safya%20Belguith"> Safya Belguith</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Optimal routing allows minimizing energy consumption in wireless sensor networks (WSN). Clustering has proven its effectiveness in organizing WSN by reducing channel contention and packet collision and enhancing network throughput under heavy load. Therefore, nowadays, with the emergence of the Internet of Things, heterogeneity is essential. Stable election protocol (SEP) that has increased the network stability period and lifetime is the first clustering protocol for heterogeneous WSN. SEP and its descendants, namely SEP, Threshold Sensitive SEP (TSEP), Enhanced TSEP (ETSSEP) and Current Energy Allotted TSEP (CEATSEP), were studied. These algorithms&rsquo; performance was evaluated based on different metrics, especially first node death (FND), to compare their stability. Simulations were conducted on the MATLAB tool considering two scenarios: The first one demonstrates the fraction variation of advanced nodes by setting the number of total nodes. The second considers the interpretation of the number of nodes while keeping the number of advanced nodes permanent. CEATSEP outperforms its antecedents by increasing stability and, at the same time, keeping a low throughput. It also operates very well in a large-scale network. Consequently, CEATSEP has a useful lifespan and energy efficiency compared to the other routing protocol for heterogeneous WSN. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=clustering" title="clustering">clustering</a>, <a href="https://publications.waset.org/abstracts/search?q=heterogeneous" title=" heterogeneous"> heterogeneous</a>, <a href="https://publications.waset.org/abstracts/search?q=stability" title=" stability"> stability</a>, <a href="https://publications.waset.org/abstracts/search?q=scalability" title=" scalability"> scalability</a>, <a href="https://publications.waset.org/abstracts/search?q=IoT" title=" IoT"> IoT</a>, <a href="https://publications.waset.org/abstracts/search?q=WSN" title=" WSN"> WSN</a> </p> <a href="https://publications.waset.org/abstracts/126349/performance-evaluation-of-clustered-routing-protocols-for-heterogeneous-wireless-sensor-networks" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/126349.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">131</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">30</span> Re-Defining Food Waste and Food Waste Management in the Food Service Sector: A Case Study in a University Food Service Unit</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Boineelo%20P.%20Lefadola">Boineelo P. Lefadola</a>, <a href="https://publications.waset.org/abstracts/search?q=Annemarie%20T.%20Viljoen"> Annemarie T. Viljoen</a>, <a href="https://publications.waset.org/abstracts/search?q=Gerrie%20E.%20Du%20Rand"> Gerrie E. Du Rand</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The food service sector wastes staggering quantities of food. More than one-third of food produced today gets wasted. This is both perplexing and daunting given that not all that is wasted is accounted for when measuring food waste. It is recognised that the present food waste definitions are ambiguous and do not really take into account all food waste generated. The contention is that food waste in the food service sector can be prevented or reduced if we have an explicit food waste definition in the context of food service. This study, therefore, explores the definition of the concept of food waste in the food service sector and its implications on sustainable food waste management strategies. An ethnographic research approach was adopted. A university food service unit was selected as a research site. Data collection techniques employed included document analyses, participant observations, focus group discussions with front-of-house and back-of-house staff, and one-on-one interviews with staff on managerial positions. A grounded theory approach was applied to analyse data. The concept of food waste was constructed differently by different levels of staff. Whereas managers raised discussion from a financial perspective, BOH and FOH staff drew upon socio-cultural implications. This study lays the foundation for a harmonised definition of the concept of food waste in food service. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=food%20service" title="food service">food service</a>, <a href="https://publications.waset.org/abstracts/search?q=food%20waste" title=" food waste"> food waste</a>, <a href="https://publications.waset.org/abstracts/search?q=food%20waste%20management" title=" food waste management"> food waste management</a>, <a href="https://publications.waset.org/abstracts/search?q=sustainability" title=" sustainability"> sustainability</a> </p> <a href="https://publications.waset.org/abstracts/85967/re-defining-food-waste-and-food-waste-management-in-the-food-service-sector-a-case-study-in-a-university-food-service-unit" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/85967.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">274</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">29</span> Impact of Capture Effect on Receiver Initiated Collision Detection with Sequential Resolution in WLAN</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Sethu%20Lekshmi">Sethu Lekshmi</a>, <a href="https://publications.waset.org/abstracts/search?q=Shahanas"> Shahanas</a>, <a href="https://publications.waset.org/abstracts/search?q=Prettha%20P."> Prettha P.</a> </p> <p class="card-text"><strong>Abstract:</strong></p> All existing protocols in wireless networks are mainly based on Carrier Sense Multiple Access with Collision avoidance. By applying collision detection in wireless networks, the time spent on collision can be reduced and thus improves system throughput. However in a real WLAN scenario due to the use of nonlinear modulation techniques only receiver can decided whether a packet loss take place, even there are multiple transmissions. In this proposed method, the receiver or Access Point detects the collision when multiple data packets are transmitted from different wireless stations. Whenever the receiver detects a collision, it transmits a jamming signal to all the transmitting stations so that they can immediately stop their on-going transmissions. We also provide preferential access to all collided packet to reduce unfairness and to increase system throughput by reducing contention. However, this preferential access will not block the channel for the long time. Here, an in-band transmission is considered in which both the data frames and control frames are transmitted in the same channel. We also provide a simple mathematical model for the proposed protocol and give the simulation result of WLAN scenario under various capture thresholds. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=802.11" title="802.11">802.11</a>, <a href="https://publications.waset.org/abstracts/search?q=WLAN" title=" WLAN"> WLAN</a>, <a href="https://publications.waset.org/abstracts/search?q=capture%20effect" title=" capture effect"> capture effect</a>, <a href="https://publications.waset.org/abstracts/search?q=collision%20detection" title=" collision detection"> collision detection</a>, <a href="https://publications.waset.org/abstracts/search?q=collision%20resolution" title=" collision resolution"> collision resolution</a>, <a href="https://publications.waset.org/abstracts/search?q=receiver%20initiated" title=" receiver initiated"> receiver initiated</a> </p> <a href="https://publications.waset.org/abstracts/31968/impact-of-capture-effect-on-receiver-initiated-collision-detection-with-sequential-resolution-in-wlan" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/31968.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">359</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">28</span> Investigating Message Timing Side Channel Attacks on Networks on Chip with Ring Topology</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Mark%20Davey">Mark Davey</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Communications on a Network on Chip (NoC) produce timing information, i.e., network injection delays, packet traversal times, throughput metrics, and other attributes relating to the traffic being sent across the chip. The security requirements of a platform encompass each node to operate with confidentiality, integrity, and availability (ISO 27001). Inherently, a shared NoC interconnect is exposed to analysis of timing patterns created by contention for the network components, i.e., links and switches/routers. This phenomenon is defined as information leakage, which represents a ‘side channel’ of sensitive information that can be correlated to platform activity. The key algorithm presented in this paper evaluates how an adversary can control two platform neighbouring nodes of a target node to obtain sensitive information about communication with the target node. The actual information obtained is the period value of a periodic task communication. This enacts a breach of the expected confidentiality of a node operating in a multiprocessor platform. An experimental investigation of the side channel is undertaken to judge the level and significance of inferred information produced by access times to the NoC. Results are presented with a series of expanding task set scenarios to evaluate the efficacy of the side channel detection algorithm as the network load increases. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=embedded%20systems" title="embedded systems">embedded systems</a>, <a href="https://publications.waset.org/abstracts/search?q=multiprocessor" title=" multiprocessor"> multiprocessor</a>, <a href="https://publications.waset.org/abstracts/search?q=network%20on%20chip" title=" network on chip"> network on chip</a>, <a href="https://publications.waset.org/abstracts/search?q=side%20channel" title=" side channel"> side channel</a> </p> <a href="https://publications.waset.org/abstracts/171019/investigating-message-timing-side-channel-attacks-on-networks-on-chip-with-ring-topology" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/171019.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">71</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">27</span> Surgical Applied Anatomy: Alive and Kicking</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Jake%20Hindmarch">Jake Hindmarch</a>, <a href="https://publications.waset.org/abstracts/search?q=Edward%20Farley"> Edward Farley</a>, <a href="https://publications.waset.org/abstracts/search?q=Norman%20Eizenberg"> Norman Eizenberg</a>, <a href="https://publications.waset.org/abstracts/search?q=Mark%20Midwinter"> Mark Midwinter</a> </p> <p class="card-text"><strong>Abstract:</strong></p> There is a need to bring the anatomical knowledge of medical students up to the standards required by surgical specialties. Contention exists amongst anatomists, clinicians, and surgeons about the standard of anatomical knowledge medical students need. The aim of this study was to explore the standards which the Royal Australasian College of Surgeons are applying knowledge of anatomy. Furthermore, to align medical school teaching to what the surgical profession requires from graduates.: The 2018 volume of the ANZ Journal of Surgery was narrowed down to 254 articles by applying the search term “Anatomy”. The main topic was then extracted from each paper. The content of the paper was assessed for ‘novel description’ or ‘application’ of anatomical knowledge’ and classified accordingly. The majority of papers with an anatomical focus was from the general surgery specialty, which focused on surgical techniques, outcomes and management. Vascular surgery had the highest percentage of papers with a novel description and application of anatomy. Cardiothoracic and paediatric surgery had no papers with a novel description of anatomy. Finally, a novel application of anatomy was the main focus of each speciality. Firstly, a high proportion of novel applications and descriptions of anatomy are in general surgery. Secondly, vascular surgery had the largest proportion of novel application and description of anatomy, namely due to the rise of therapeutic imaging and endovascular techniques. Finally, all disciplines demonstrated a trend towards having a higher proportion of novel application of anatomical knowledge <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=anatomical%20knowledge" title="anatomical knowledge">anatomical knowledge</a>, <a href="https://publications.waset.org/abstracts/search?q=anatomy" title=" anatomy"> anatomy</a>, <a href="https://publications.waset.org/abstracts/search?q=surgery" title=" surgery"> surgery</a>, <a href="https://publications.waset.org/abstracts/search?q=novel%20anatomy" title=" novel anatomy"> novel anatomy</a> </p> <a href="https://publications.waset.org/abstracts/146624/surgical-applied-anatomy-alive-and-kicking" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/146624.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">118</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">26</span> The Ethio-Eritrea Claims Commission on Use of Force: Issue of Self-Defense or Violation of Sovereignty</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Isaias%20Teklia%20Berhe">Isaias Teklia Berhe</a> </p> <p class="card-text"><strong>Abstract:</strong></p> A decision that deals with international disputes, be it arbitral or judicial, has to properly reflect objectivity and coherence with existing rules of international law. This paper shows the decision of the Ethio-Eritrea Claims Commission on the <em>jus ad bellum</em> case is bereft of objectivity and coherence, which contributed a disservice to international law on many aspects. The Commission&rsquo;s decision that holds Eritrea in contravention to Art 2(4) of the UN Charter based on Ethiopia&rsquo;s contention is flawed. It fails to consider: the illegitimacy of an actual authority established over contested territory through hostile acts, the proper determination of <em>effectivites</em> under international law, the sanctity of colonially determined boundaries, Ethiopia&rsquo;s prior firm political recognition and undergirds to respect colonial boundary, and Ethio-Eritrea Border Commission&rsquo;s decision. The paper will also argue that the Commission confused Eritrea&rsquo;s right of self-defense with the rule against the non-use of force to settle territorial disputes; wherefore its decision sanitizes or sterilizes unlawful change of territory resulted through unlawful use of force to the effect of advantaging aggressions. The paper likewise argues that the decision is so sacrilegious that it disregards the ossified legal finality of colonial boundaries. Moreover, its approach toward armed attack does not reflect the peculiarity of the <em>jus ad bellum</em> case rather it brings about definitional uncertainties and sustains the perception that the law on self-defense is unsettled. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=armed%20attack" title="armed attack">armed attack</a>, <a href="https://publications.waset.org/abstracts/search?q=Eritrea" title=" Eritrea"> Eritrea</a>, <a href="https://publications.waset.org/abstracts/search?q=Ethiopia" title=" Ethiopia"> Ethiopia</a>, <a href="https://publications.waset.org/abstracts/search?q=self-defense" title=" self-defense"> self-defense</a>, <a href="https://publications.waset.org/abstracts/search?q=territorial%20integrity" title=" territorial integrity"> territorial integrity</a>, <a href="https://publications.waset.org/abstracts/search?q=use%20of%20force" title=" use of force"> use of force</a> </p> <a href="https://publications.waset.org/abstracts/46715/the-ethio-eritrea-claims-commission-on-use-of-force-issue-of-self-defense-or-violation-of-sovereignty" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/46715.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">278</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">25</span> Improve B-Tree Index’s Performance Using Lock-Free Hash Table</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Zhanfeng%20Ma">Zhanfeng Ma</a>, <a href="https://publications.waset.org/abstracts/search?q=Zhiping%20Xiong"> Zhiping Xiong</a>, <a href="https://publications.waset.org/abstracts/search?q=Hu%20Yin"> Hu Yin</a>, <a href="https://publications.waset.org/abstracts/search?q=Zhengwei%20She"> Zhengwei She</a>, <a href="https://publications.waset.org/abstracts/search?q=Aditya%20P.%20Gurajada"> Aditya P. Gurajada</a>, <a href="https://publications.waset.org/abstracts/search?q=Tianlun%20Chen"> Tianlun Chen</a>, <a href="https://publications.waset.org/abstracts/search?q=Ying%20Li"> Ying Li</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Many RDBMS vendors use B-tree index to achieve high performance for point queries and range queries, and some of them also employ hash index to further enhance the performance as hash table is more efficient for point queries. However, there are extra overheads to maintain a separate hash index, for example, hash mapping for all data records must always be maintained, which results in more memory space consumption; locking, logging and other mechanisms are needed to guarantee ACID, which affects the concurrency and scalability of the system. To relieve the overheads, Hash Cached B-tree (HCB) index is proposed in this paper, which consists of a standard disk-based B-tree index and an additional in-memory lock-free hash table. Initially, only the B-tree index is constructed for all data records, the hash table is built on the fly based on runtime workload, only data records accessed by point queries are indexed using hash table, this helps reduce the memory footprint. Changes to hash table are done using compare-and-swap (CAS) without performing locking and logging, this helps improve the concurrency and avoid contention. The hash table is also optimized to be cache conscious. HCB index is implemented in SAP ASE database, compared with the standard B-tree index, early experiments and customer adoptions show significant performance improvement. This paper provides an overview of the design of HCB index and reports the experimental results. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=B-tree" title="B-tree">B-tree</a>, <a href="https://publications.waset.org/abstracts/search?q=compare-and-swap" title=" compare-and-swap"> compare-and-swap</a>, <a href="https://publications.waset.org/abstracts/search?q=lock-free%20hash%20table" title=" lock-free hash table"> lock-free hash table</a>, <a href="https://publications.waset.org/abstracts/search?q=point%20queries" title=" point queries"> point queries</a>, <a href="https://publications.waset.org/abstracts/search?q=range%20queries" title=" range queries"> range queries</a>, <a href="https://publications.waset.org/abstracts/search?q=SAP%20ASE%20database" title=" SAP ASE database"> SAP ASE database</a> </p> <a href="https://publications.waset.org/abstracts/72665/improve-b-tree-indexs-performance-using-lock-free-hash-table" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/72665.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">286</span> </span> </div> </div> <ul class="pagination"> <li class="page-item disabled"><span class="page-link">&lsaquo;</span></li> <li class="page-item active"><span class="page-link">1</span></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=frequency-domain%20contention&amp;page=2">2</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=frequency-domain%20contention&amp;page=2" rel="next">&rsaquo;</a></li> </ul> </div> </main> <footer> <div id="infolinks" class="pt-3 pb-2"> <div class="container"> <div style="background-color:#f5f5f5;" class="p-3"> <div class="row"> <div class="col-md-2"> <ul class="list-unstyled"> About <li><a href="https://waset.org/page/support">About Us</a></li> <li><a href="https://waset.org/page/support#legal-information">Legal</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/WASET-16th-foundational-anniversary.pdf">WASET celebrates its 16th foundational anniversary</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Account <li><a href="https://waset.org/profile">My Account</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Explore <li><a href="https://waset.org/disciplines">Disciplines</a></li> <li><a href="https://waset.org/conferences">Conferences</a></li> <li><a href="https://waset.org/conference-programs">Conference Program</a></li> <li><a href="https://waset.org/committees">Committees</a></li> <li><a href="https://publications.waset.org">Publications</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Research <li><a href="https://publications.waset.org/abstracts">Abstracts</a></li> <li><a href="https://publications.waset.org">Periodicals</a></li> <li><a href="https://publications.waset.org/archive">Archive</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Open Science <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Philosophy.pdf">Open Science Philosophy</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Award.pdf">Open Science Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Society-Open-Science-and-Open-Innovation.pdf">Open Innovation</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Postdoctoral-Fellowship-Award.pdf">Postdoctoral Fellowship Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Scholarly-Research-Review.pdf">Scholarly Research Review</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Support <li><a href="https://waset.org/page/support">Support</a></li> <li><a href="https://waset.org/profile/messages/create">Contact Us</a></li> <li><a href="https://waset.org/profile/messages/create">Report Abuse</a></li> </ul> </div> </div> </div> </div> </div> <div class="container text-center"> <hr style="margin-top:0;margin-bottom:.3rem;"> <a href="https://creativecommons.org/licenses/by/4.0/" target="_blank" class="text-muted small">Creative Commons Attribution 4.0 International License</a> <div id="copy" class="mt-2">&copy; 2024 World Academy of Science, Engineering and Technology</div> </div> </footer> <a href="javascript:" id="return-to-top"><i class="fas fa-arrow-up"></i></a> <div class="modal" id="modal-template"> <div class="modal-dialog"> <div class="modal-content"> <div class="row m-0 mt-1"> <div class="col-md-12"> <button type="button" class="close" data-dismiss="modal" aria-label="Close"><span aria-hidden="true">&times;</span></button> </div> </div> <div class="modal-body"></div> </div> </div> </div> <script src="https://cdn.waset.org/static/plugins/jquery-3.3.1.min.js"></script> <script src="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/js/bootstrap.bundle.min.js"></script> <script src="https://cdn.waset.org/static/js/site.js?v=150220211556"></script> <script> jQuery(document).ready(function() { /*jQuery.get("https://publications.waset.org/xhr/user-menu", function (response) { jQuery('#mainNavMenu').append(response); });*/ jQuery.get({ url: "https://publications.waset.org/xhr/user-menu", cache: false }).then(function(response){ jQuery('#mainNavMenu').append(response); }); }); </script> </body> </html>

Pages: 1 2 3 4 5 6 7 8 9 10