1,241 research outputs found

    AN ANALYSIS OF THE SOCIAL PROBLEMS ON THE CRANBERRIES SONG LYRICS

    Get PDF
    Song’s lyrics have similar form with poem. In some currant usage, lyrics still retain to sense of poem to set music. By music, people get some lesson as far as they understand and are able to catch the content or idea of the song. Song has its own characteristic and content that makes it different one and another. One of the song’s contents could be social problem. In this case, the writer took the Cranberries song, as the subject of analysis, which discusses more about the social problem. This study covers the problems of study: (1) What are social problems found in the Cranberries song’s lyrics? and (2) What is the most dominant of social problem in the song?. This research used descriptive design because the study to obtained information concerning the social problems in the Cranberries song. The approach used in this study was expressive approach for the writer of the thesis only concerned with the author in expressing the idea into his work. The population of research is lyrics of the Cranberries song in the album of Animal Instinct 1996, in which this album consisted of 15 songs. The writer took 6 songs from the album as sample using purposive random sampling. The study showed that the social problems revealed in the six songs as follows: Firstly, ‘Woman Without Pride’ song involves sex role and family problems. Secondly, ‘Ode to My Family’ has family problem. Thirdly, ‘Bosnia’ has warfare and international conflicts, ethnic minorities and violence. Fourthly, ‘Zombie’ reveals warfare and international conflicts, and violence. Fifthly, ‘Salvation’ consists of drug abuse problems. Finally, ‘Fee fi fo’ song reveals problems of sexual behavior and violence. Based on the result above, it can be concluded that the most dominant social problem is violence

    Adaesogn Of Retractable Spread Breakers

    Get PDF
    This report concerns with the design of retractable speed breakers. It consists of six chapters that cover the introduction, the project literature review, project methodology, results and discussion, conclusion, references and finally the relevant appendices. The introduction part briefly describes the background study of the problem governing the invention of the speed breakers. It also discussed the problem arose by using the permanent speed breakers and the objective and scope of study of the design of retractable speed breaker. For the second part, the literature review which describe the type of speed breakers and the type of road commonly used. For the third part, the focus is more on the methodology and project work. Then results and discussion discuss about the propose alternative design which can be adopted for the project. It includes drawing and analysis using the Matlab Simulation Tools. The final model and the control mechanism also included. Then several recommendations propose at the end of this report. The project conclusion is also stated in the report together with the references used while doing research work on this project

    Silica Fume and Microwave Incinerated Rice Husk Ash (MIRHA) as a Multiple Binder in Concrete

    Get PDF
    Concrete is a construction material composed of cement as well as other cementitious materials such as fly ash and slag cement, aggregate, sand, water, and chemical admixtures. The word concrete comes from the Latin word "concretus". which means "hardened" or "hard". Concrete can be designed to withstand the harshest environments while taking on the most inspirational forms. Engineers are continuously pushing the limits with the help of innovative chemical admixtures and supplementary cernentitious materials often incorporated in the concrete mix to reduce cement contents, improve workability, increase strength and enhance durability. There are many types of admixtures being used in concrete. Strict air-pollution controls and regulations have produced an abundance of industrial byproducts that can be used as admixtures such as silica fume and rice husk ash. The use of such byproducts in concrete construction not only enhances the properties of concrete, but it also reduces cost, keep environment clean, and can avoid the byproducts form being land-filled. Furthermore, admixtures can replace a portion of the cement content and it will greatly reduce the cost especially for mass amount of concret

    Knowledge sharing in a non-native language context : challenges and strategies

    Get PDF
    Knowledge sharing is a language-based activity. With the rise of multilingual workforces and the adoption of common corporate languages such as English, knowledge sharing is happening in non-native language contexts more than ever before. This paper explores the challenges and strategies of knowledge sharing in a non-native language at the individual level. For this purpose, an exploratory case study was conducted in a multinational organization. Results show that the use of a non-native language can make knowledge sharing an ambiguous and costly process, eroding some of the benefits of knowledge sharing. It was found that employees adopt three different strategies to deal with problems in the knowledge-sharing process caused by the use of a nonnative language. These strategies—namely discourse adjustment, language adjustment, and media adjustment—play an important role in the successful exchange of knowledge between linguistically diverse individuals

    Traffic Congestion Detection System Using Wireless Sensor Network

    Get PDF
    Traffic congestion has been a problem for a long time. It is known that traffic congestion would cause delays, high fuel consumption and high pollution index. In order to avoid high levels of road traffic congestion, a reliable and accurate detection system is needed. By using traffic parameters such as speed and density of vehicles the road, an application of Wireless Sensor Network (WSN) could be utilised. The evaluation of the road traffic congestion detection system includes the presence of congestion and the level of congestion itself. This detection system will be implemented on a scaled-down prototype/modelling in order to test the effectiveness

    Intrusion Detection in Mobile Ad Hoc Networks Using Transductive Machine Learning Techniques

    Get PDF
    This thesis presents a research whose objective is to design an intrusion detection model for Mobile Ad hoc NETworks (MANET). MANET is an autonomous system consisting of a group of mobile nodes with no infrastructure support. The MANET environment is particularly vulnerable because of the characteristics of mobile ad hoc networks such as open medium, dynamic topology, distributed cooperation, and constrained capability. Unfortunately, the traditional mechanisms designed for protecting networks are not directly applicable to MANETs without modifications. In the past decades, machine learning methods have been successfully used in several intrusion detection methods because of their ability to discover and detect novel attacks. This research investigates the use of a promising technique from machine learning to designing the most suitable intrusion detection for this challenging network type. The proposed algorithm employs a combined model that uses two different measures (nonconformity metric measures and Local Distance-based Outlier Factor (LDOF)) to improve its detection ability. Moreover, the algorithm can provide a graded confidence that indicates the reliability of the classification. In machine learning algorithm, choosing the most relevant features for each attack is a very important requirement, especially in mobile ad hoc networks where the network topology dynamically changes. Feature selection is undertaken to select the relevant subsets of features to build an efficient prediction model and improve intrusion detection performance by removing irrelevant features. The transductive conformal prediction and outlier detection have been employed for feature selection algorithm. Traditional intrusion detection techniques have had trouble dealing with dynamic environments. In particular, issues such as collects real time attack related audit data and cooperative global detection. Therefore, the researcher is motivated to design a new intrusion detection architecture which involves new detection technique to efficiently detect the abnormalities in the ad hoc networks. The proposed model has distributed and cooperative hierarchical architecture, where nodes communicate with their region gateway node to make decisions. To validate the research, the researcher presents case study using GLOMOSIM simulation platform with AODV ad hoc routing protocols. Various active attacks are implemented. A series of experimental results demonstrate that the proposed intrusion detection model can effectively detect anomalies with low false positive rate, high detection rate and achieve high detection accuracy

    The Production of Rencong Souvenir Based on Reused Brass Metal Waste

    Get PDF
    The Traditional metal forming in fabricating rencong as souvenir requires high demands of energy, time, and accuracy skills from the blacksmith, but the quality that has been obtained is quite low, which includes colors diversity, and non-uniformity of brightness. The raw materials of brass metal are importantly needed for manufacturers, so that the cost of productions is relatively expensive. This study aims to improve the technology for fabricating rencong souvenir, which is expected to increase the production efficiency as well as conserving and improving the cultural and economic sectors. The simple casting techniques were conducted to be taught to the craftsmen from designing, mold and field training. This technology was able to be adopted very well by the craftsmen, while the rencong blades were produced in large scale by utilizing the brass metal waste. The diversity of sizes and shapes were obtained in small size and shapes blades, and the uniformity of color brightness was produced, so that the quality of souvenirs increases. Thus, the application of this technology can increase the income of craftsmen and the quality of souvenirs
    • …
    corecore