Search results for: persuasive discourse functions
2939 Empathy and Yoga Philosophy: Both Eastern and Western Concepts
Authors: Jacqueline Jasmine Kumar
Abstract:
This paper seeks to challenge the predominate Western-centric paradigm concerning empathy by conducting an exploration of its presence within both Western and Eastern philosophical traditions. The primary focus of this inquiry is the examination of the Indian yogic tradition, encompassing the four yogas: bhakti (love/devotion), karma (action), jnāna (knowledge), and rāja (psychic control). Through this examination, it is demonstrated that empathy does not exclusively originate from Western philosophical thought. Rather than superimposing the Western conceptualization of empathy onto the tenets of Indian philosophy, this study endeavours to unearth a distinct array of ideas and concepts within the four yogas, which significantly contribute to our comprehension of empathy as a universally relevant phenomenon. To achieve this objective, an innovative approach is adopted, delving into various facets of empathy, including the propositional, affective/intuitive, perspective-taking, and actionable dimensions. This approach intentionally deviates from conventional Western frameworks, shifting the emphasis towards lived morally as opposed to engagement in abstract theoretical discourse. While it is acknowledged that the explicit term “empathy” may not be overly articulated within the yogic tradition, a scrupulous examination reveals the underlying substance and significance of this phenomenon. Throughout this comparative analysis, the paper aims to lay a robust foundation for the discourse of empathy within the contexts of the human experience. By assimilating insights gleaned from the Indian yogic tradition, it contributes to the expansion of our comprehension of empathy, enabling an exploration of its multifaceted dimensions. Ultimately, this scholarly endeavour facilitates the development of a more comprehensive and inclusive perspective on empathy, transcending cultural boundaries and enriching our collective repository of knowledge.Keywords: Bhakti, Yogic, Jnana, Karma
Procedia PDF Downloads 782938 A Study of Evolutional Control Systems
Authors: Ti-Jun Xiao, Zhe Xu
Abstract:
Controllability is one of the fundamental issues in control systems. In this paper, we study the controllability of second order evolutional control systems in Hilbert spaces with memory and boundary controls, which model dynamic behaviors of some viscoelastic materials. Transferring the control problem into a moment problem and showing the Riesz property of a family of functions related to Cauchy problems for some integrodifferential equations, we obtain a general boundary controllability theorem for these second order evolutional control systems. This controllability theorem is applicable to various concrete 1D viscoelastic systems and recovers some previous related results. It is worth noting that Riesz sequences can be used for numerical computations of the control functions and the identification of new Riesz sequence is of independent interest for the basis-function theory. Moreover, using the Riesz sequences, we obtain the existence and uniqueness of (weak) solutions to these second order evolutional control systems in Hilbert spaces. Finally, we derive the exact boundary controllability of a viscoelastic beam equation, as an application of our abstract theorem.Keywords: evolutional control system, controllability, boundary control, existence and uniqueness
Procedia PDF Downloads 2222937 Caribbean Universities and the Global Educational Market: An Examination of Entrepreneurship and Leadership in an Era of Change
Authors: Paulette Henry
Abstract:
If Caribbean Universities wish to remain sustainable in the global education market they must meet the new demands of the 21st Centuries learners. This means preparing the teaching and learning environment with the human and material and resources so that the University can blossom out into the entrepreneurial University. The entrepreneurial University prepares the learner to become a global citizen, one who is innovative and a critical thinker and has the competencies to create jobs. Entrepreneurship education provides more equitable access to university education building capacity for the local and global economy. The entrepreneurial thinking, the mindset, must therefore be among academic and support staff as well as students. In developing countries where resources are scarce, Universities are grappling with a myriad of financial and non-financial issues. These include increasing costs, Union demands for increased remuneration for staff and reduced subvention from governments which has become the norm. In addition, there is the political pressure against increasing tuition fees and the perceptions on the moral responsibilities of universities in national development. The question is how do small universities carve out their niche, meet both political and consumer demands for a high quality, low lost education, fulfil their development mandate and still remain not only viable but competitive. Themes which are central to this discourse on the transitions necessary for the entrepreneurial university are leadership, governance and staff well-being. This paper therefore presents a case study of a Caribbean University to show how transformational leadership and the change management framework propels change towards an entrepreneurial institution seeking to have a competitive advantage despite its low resourced context. Important to this discourse are the transformational approaches used by the University to prepare staff to move from their traditional psyche to embracing an entrepreneurial mindset whilst equipping students within the same mode to become work ready and creative global citizens. Using the mixed methods approach, opinions were garnered from both members of the University community as well as external stakeholder groups on their perception of the role of the University in the business arena and as a primary stakeholder in national development. One of the critical concepts emanating from the discourse was the need to change the mindset of the those in university governance as well as how national stakeholders engage the university. This paper shows how multiple non-financial factors can contribute to change. A combination of transformational and servant leadership, strengthened institutional structures and developing new ones, rebuilding institutional trust and pride have been among the strategies employed within the change management framework. The university is no longer limited by borders but through international linkages has transcended into a transnational stakeholder.Keywords: competitiveness, context, entrepreneurial, leadership
Procedia PDF Downloads 2092936 Finding the Elastic Field in an Arbitrary Anisotropic Media by Implementing Accurate Generalized Gaussian Quadrature Solution
Authors: Hossein Kabir, Amir Hossein Hassanpour Mati-Kolaie
Abstract:
In the current study, the elastic field in an anisotropic elastic media is determined by implementing a general semi-analytical method. In this specific methodology, the displacement field is computed as a sum of finite functions with unknown coefficients. These aforementioned functions satisfy exactly both the homogeneous and inhomogeneous boundary conditions in the proposed media. It is worth mentioning that the unknown coefficients are determined by implementing the principle of minimum potential energy. The numerical integration is implemented by employing the Generalized Gaussian Quadrature solution. Furthermore, with the aid of the calculated unknown coefficients, the displacement field, as well as the other parameters of the elastic field, are obtainable as well. Finally, the comparison of the previous analytical method with the current semi-analytical method proposes the efficacy of the present methodology.Keywords: anisotropic elastic media, semi-analytical method, elastic field, generalized gaussian quadrature solution
Procedia PDF Downloads 3212935 A Discourse Completion Test Analysis of Email Request Strategies as Used by Tunisian Postgraduate Students
Authors: Imen Aribi Ben Amor
Abstract:
The aim of the present study is to analyze the performance of requests in emails among a group of Tunisian postgraduate students. It also seeks to determine the influence of the social factors on the participants’ requests performance. For this purpose, the data were collected using a discourse completion test (DCT). Accordingly, 42 Tunisian postgraduate students were asked to respond in English to eight different situations in which they carried out the speech act of request in emails. The data were analyzed based on the degree of directness. A detailed analysis of the head acts found in the DCT revealed that Tunisian Postgraduate students use a varied repertoire of request strategies (direct, conventionally indirect and non-conventionally indirect) but at the same time rely heavily on direct request strategies. They tended to address their requestees directly except for distant superiors. DCT results suggest that the participants are to some extent aware of the influence of the ranking of imposition and social distance but fail to acknowledge the weight of social power when performing requests in emails. The preference of the participants to use direct strategies may be the result of the effect of Tunisian culture and the negative transfer of Tunisian communicative strategies. Accordingly, this study suggests some pedagogical implications and suggestions for Tunisian EFL (English as a Foreign Language) instructors. They are required to pay closer attention to the pragmalinguistic nuances of the ways in which requests in emails are realized. Teachers can also help students understand academic email etiquettes by explicitly explaining what they expect in the student email. Thus, EFL teachers and syllabus designers should devote more attention to developing EFL learners’ pragmatic competence through teaching L2 pragmatics.Keywords: directness, ranking of imposition, request strategies, social distance, social power
Procedia PDF Downloads 2312934 Continuous Functions Modeling with Artificial Neural Network: An Improvement Technique to Feed the Input-Output Mapping
Authors: A. Belayadi, A. Mougari, L. Ait-Gougam, F. Mekideche-Chafa
Abstract:
The artificial neural network is one of the interesting techniques that have been advantageously used to deal with modeling problems. In this study, the computing with artificial neural network (CANN) is proposed. The model is applied to modulate the information processing of one-dimensional task. We aim to integrate a new method which is based on a new coding approach of generating the input-output mapping. The latter is based on increasing the neuron unit in the last layer. Accordingly, to show the efficiency of the approach under study, a comparison is made between the proposed method of generating the input-output set and the conventional method. The results illustrated that the increasing of the neuron units, in the last layer, allows to find the optimal network’s parameters that fit with the mapping data. Moreover, it permits to decrease the training time, during the computation process, which avoids the use of computers with high memory usage.Keywords: neural network computing, continuous functions generating the input-output mapping, decreasing the training time, machines with big memories
Procedia PDF Downloads 2832933 Secure Cryptographic Operations on SIM Card for Mobile Financial Services
Authors: Kerem Ok, Serafettin Senturk, Serdar Aktas, Cem Cevikbas
Abstract:
Mobile technology is very popular nowadays and it provides a digital world where users can experience many value-added services. Service Providers are also eager to offer diverse value-added services to users such as digital identity, mobile financial services and so on. In this context, the security of data storage in smartphones and the security of communication between the smartphone and service provider are critical for the success of these services. In order to provide the required security functions, the SIM card is one acceptable alternative. Since SIM cards include a Secure Element, they are able to store sensitive data, create cryptographically secure keys, encrypt and decrypt data. In this paper, we design and implement a SIM and a smartphone framework that uses a SIM card for secure key generation, key storage, data encryption, data decryption and digital signing for mobile financial services. Our frameworks show that the SIM card can be used as a controlled Secure Element to provide required security functions for popular e-services such as mobile financial services.Keywords: SIM card, mobile financial services, cryptography, secure data storage
Procedia PDF Downloads 3122932 Identitarian Speech in Exile by Representatives of Central Europe
Authors: Georgiana Ciobotaru
Abstract:
The experience of exile is a defining one for the mittleeuropean writers, which is also the generator of an identity discourse manifested in the plan of fiction. In exile, the authors often build their marginality in opposition to that deserted mundi center. The Polish Gombrowicz carried out his existence, for more than twenty-three years, in a geographical exile, distancing himself from his country, and, from a cultural point of view, the writing meant a possibility of escape, of plunge into a literary exile that often constituted a way of conditioning the practice of writers. He opted for one of the attitudes that a writer in exile may have, namely he preferred to continue speaking Polish, although he was far from his homeland, turning to the public in his homeland, his entire literary creation in exile being promoted through Kulturia, the Paris-based immigration magazine. The problem of exile must be constantly related to three essential aspects, namely: territory, identity and language. The exile, both the writer and his characters, displays a characteristic attitude towards the abandoned land, but also towards the adoptive, towards the mother tongue, but also towards the idiom encountered, thus proving an original manner in terms of how it asserts, de-builds or re-builds its identity. In these texts written after leaving Poland, a series of open works by Trans-Atlantic, Gombrowicz assumes and internalizes the inadequacy between his self and the reality outside to make it the principle of his perception of the world. The expression of marginality that characterized the texts developed when the writer was still in Poland seems to acquire a certain coherence against the background of a logic imposed on the new experience, namely that of exile. Texts created during his exile in Argentina appear in a different context, in other words, in a situation of inadequacy towards the world: ignorance of the language, poverty, isolation that characterizes especially the first years spent there. This study aims to highlight how the Polish author de-builds and reconstructs his Mittel-European identity profile through language.Keywords: discourse, exile, identity, immigration
Procedia PDF Downloads 1392931 Artificial Intelligent Methodology for Liquid Propellant Engine Design Optimization
Authors: Hassan Naseh, Javad Roozgard
Abstract:
This paper represents the methodology based on Artificial Intelligent (AI) applied to Liquid Propellant Engine (LPE) optimization. The AI methodology utilized from Adaptive neural Fuzzy Inference System (ANFIS). In this methodology, the optimum objective function means to achieve maximum performance (specific impulse). The independent design variables in ANFIS modeling are combustion chamber pressure and temperature and oxidizer to fuel ratio and output of this modeling are specific impulse that can be applied with other objective functions in LPE design optimization. To this end, the LPE’s parameter has been modeled in ANFIS methodology based on generating fuzzy inference system structure by using grid partitioning, subtractive clustering and Fuzzy C-Means (FCM) clustering for both inferences (Mamdani and Sugeno) and various types of membership functions. The final comparing optimization results shown accuracy and processing run time of the Gaussian ANFIS Methodology between all methods.Keywords: ANFIS methodology, artificial intelligent, liquid propellant engine, optimization
Procedia PDF Downloads 5892930 I Post Therefore I Am! Construction of Gendered Identities in Facebook Communication of Pakistani Male and Female Users
Authors: Rauha Salam
Abstract:
In Pakistan, over the past decade, the notion of what counts as a true ‘masculine and feminine’ behaviour has become more complicated with the inspection of social media. Given its strong religious and socio-cultural norms, patriarchal values are entrenched in the local and cultural traditions of the Pakistani society and regulate the social value of gender. However, the increasing use of internet among Pakistani men and women, especially in the form of social media uses by the youth, is increasingly becoming disruptive and challenging to the strict modes of behavioural monitoring and control both at familial and state level. Facebook, being the prime social media communication platform in Pakistan, provide its users a relatively ‘safe’ place to embrace how they want to be perceived by their audience. Moreover, the availability of an array of semiotic resources (e.g. the videos, audios, visuals and gifs) on Facebook makes it possible for the users to create a virtual identity that allows them to describe themselves in detail. By making use of Multimodal Discourse Analysis, I aimed to investigate how men and women in Pakistan construct their gendered identities multimodally (visually and linguistically) through their Facebook posts and how these semiotic modes are interconnected to communicate specific meanings. In case of the female data, the analysis showed an ambivalence as females were found to be conforming to the existing socio-cultural norms of the society and they were also employing social media platforms to deviate from traditional gendered patterns and to voice their opinions simultaneously. Similarly, the male data highlighted the reproduction of the prevalent cultural models of masculinity. However, there were instances in the data that showed a digression from the standard norms and there is a (re)negotiation of the traditional patriarchal representations.Keywords: Facebook, Gendered Identities, Multimodal Discourse Analysis, Pakistan
Procedia PDF Downloads 1172929 Dynamic Reroute Modeling for Emergency Evacuation: Case Study of Brunswick City, Germany
Authors: Yun-Pang Flötteröd, Jakob Erdmann
Abstract:
The human behaviors during evacuations are quite complex. One of the critical behaviors which affect the efficiency of evacuation is route choice. Therefore, the respective simulation modeling work needs to function properly. In this paper, Simulation of Urban Mobility’s (SUMO) current dynamic route modeling during evacuation, i.e. the rerouting functions, is examined with a real case study. The result consistency of the simulation and the reality is checked as well. Four influence factors (1) time to get information, (2) probability to cancel a trip, (3) probability to use navigation equipment, and (4) rerouting and information updating period are considered to analyze possible traffic impacts during the evacuation and to examine the rerouting functions in SUMO. Furthermore, some behavioral characters of the case study are analyzed with use of the corresponding detector data and applied in the simulation. The experiment results show that the dynamic route modeling in SUMO can deal with the proposed scenarios properly. Some issues and function needs related to route choice are discussed and further improvements are suggested.Keywords: evacuation, microscopic traffic simulation, rerouting, SUMO
Procedia PDF Downloads 1942928 Investigating a Deterrence Function for Work Trips for Perth Metropolitan Area
Authors: Ali Raouli, Amin Chegenizadeh, Hamid Nikraz
Abstract:
The Perth metropolitan area and its surrounding regions have been expanding rapidly in recent decades and it is expected that this growth will continue in the years to come. With this rapid growth and the resulting increase in population, consideration should be given to strategic planning and modelling for the future expansion of Perth. The accurate estimation of projected traffic volumes has always been a major concern for the transport modelers and planners. Development of a reliable strategic transport model depends significantly on the inputs data into the model and the calibrated parameters of the model to reflect the existing situation. Trip distribution is the second step in four-step modelling (FSM) which is complex due to its behavioral nature. Gravity model is the most common method for trip distribution. The spatial separation between the Origin and Destination (OD) zones will be reflected in gravity model by applying deterrence functions which provide an opportunity to include people’s behavior in choosing their destinations based on distance, time and cost of their journeys. Deterrence functions play an important role for distribution of the trips within a study area and would simulate the trip distances and therefore should be calibrated for any particular strategic transport model to correctly reflect the trip behavior within the modelling area. This paper aims to review the most common deterrence functions and propose a calibrated deterrence function for work trips within the Perth Metropolitan Area based on the information obtained from the latest available Household data and Perth and Region Travel Survey (PARTS) data. As part of this study, a four-step transport model using EMME software has been developed for Perth Metropolitan Area to assist with the analysis and findings.Keywords: deterrence function, four-step modelling, origin destination, transport model
Procedia PDF Downloads 1682927 Effects of Oral L-Carnitine on Liver Functions after Trans arterial Chemoembolization in Hepatocellular Carcinoma Patients
Authors: Ali Kassem, Aly Taha, Abeer Hassan, Kazuhide Higuchi
Abstract:
Introduction: Trans arterial chemoembolization (TACE) for hepatocellular carcinoma (HCC) is usually followed by hepatic dysfunction that limits its efficacy. L-carnitine is recently studied as hepatoprotective agent. Our aim is to evaluate the L-carnitine effects against the deterioration of liver functions after TACE. Method: 53 patients with intermediate stage HCC were assigned into two groups; L-carnitine group (26 patients) who received L-carnitine 300 mg tablet twice daily from 2 weeks before to 12 weeks after TACE and control group (27 patients) without L-carnitine therapy. 28 of studied patients received branched chain amino acids granules. Results: There were significant differences between L-carnitine Vs. control group in mean serum albumin change from baseline to 1 week and 4 weeks after TACE (p < 0.05). L-Carnitine maintained Child-Pugh score at 1 week after TACE and exhibited improvement at 4 weeks after TACE (p < 0.01 Vs 1 week after TACE). Control group has significant Child-Pugh score deterioration from baseline to 1 week after TACE (p < 0.05) and 12 weeks after TACE (p < 0.05). There were significant differences between L-carnitine and control groups in mean Child-Pugh score change from baseline to 4 weeks (p < 0.05) and 12 weeks after TACE (p < 0.05). L-carnitine displayed improvement in (PT) from baseline to 1 week, 4 w (p < 0.05) and 12 weeks after TACE. PT in control group declined less than baseline along all follow up intervals. Total bilirubin in L-carnitine group decreased at 1 week post TACE while in control group, it significantly increased at 1 week (p = 0.01). ALT and C-reactive protein elevation were suppressed at 1 week after TACE in Lcarnitine group. The hepatoprotective effects of L-carnitine were enhanced by concomitant use of branched chain amino acids. Conclusion: L-carnitine and BCAA combination therapy offer a novel supportive strategy after TACE in HCC patients.Keywords: hepatocellular carcinoma, L-carnitine, liver functions , trans-arterial embolization
Procedia PDF Downloads 1552926 The American Theater: Latinos Performing as American Citizens by Supporting Trump's Ideals
Authors: Mariana Anaya Villafana
Abstract:
The sudden change of a significant percentage of the Latino community in the United States elections towards a Republican political orientation was reflected during the 2016 presidential election. This moment represented a radical change that is happening inside the Latino community in the United States, the support they have given to Trump's campaign only demonstrates their support for new anti-immigration regulations and conservative values, which are causing a division of ideologies inside the Latino community. One of the main goals of the following research is to understand the whole phenomenon 'Why would people join their own oppressor?' Align themselves with the politics that prevent many of their relatives to come to the United States and made the assimilation process difficult for their parents. It is important to prove that a change in the identity has happened, through the use of power relations and the attachment to the desired object. A group of Hispanics/Latinos have decided to vote for Trump in order to belong to a society that hasn’t been able to fully include them within it, an action that can result on the non-intentional harm of the values and aims of the rest of the Latino/Hispanic community. In order to understand their new political beliefs, it is necessary to use the method of discourse analysis to comprehend those comments and interviews that are published on web sites such as: 'Latinos for Trump' and 'GOP Hispanic Division'. Among the results that the research has shown, the notion of the 'American Dream' can be considered as a determinant object for the construction of a new identity that is rooted in hard work and legality. One that is proud of the Latino heritage but still wants to maintain the boundaries between legality and illegality in relation to the immigrants. This discourse results on a contradiction to most of the cases because they mention that their families came to the U.S. as immigrants; the only difference is that they work hard to obtain legal citizenship.Keywords: populism, identity, Latino Community, migration
Procedia PDF Downloads 1282925 Queerness and Gender Representation Through the Lens of Five Ghanaian Artists
Authors: Sela Adjei
Abstract:
This research delves into the nuanced representations of queerness in Ghana, presented through photographs, illustrations, film and music videos on social media and streaming platforms. The study focuses on the works of five Ghanaian artists (Va-Bene Elikem Fiatsi, Angel Maxine, Josephine Kuuire, Bright Ackwerh and Philip Nee Whang) within the context of Ghana's evolving media landscape. Of primary concern is a need to uncover the various aspects of queerness captured within the distinct artistic expressions of these five creatives. This study adopts a qualitative approach by analyzing artistic expressions of queerness in Ghana’s digital media spaces. Content analysis and visual semiotics served as the guiding tools to discuss and decipher the nuanced messages embedded in their works, considering both the visual and narrative aspects. This dual approach takes into account both the visual aesthetics and narrative elements, enhancing our understanding of the complex interplay between queerness and gender representation in the media. This study's contribution is twofold. First, it enriches the discourse surrounding queerness as portrayed by artists within Ghana's vibrant media landscape and situates their works within the broader discourse of global gender identities. Secondly, analyzing the creative output of these five Ghanaian artists broadens our understanding of gender minorities and the various challenges they face in Ghana (currently debating in parliament to pass an anti-LGBTQ+ bill that criminalizes activities related to gender minority groups). While focusing on the intersection of queerness, art, and gender identities, the reflections in this study challenge existing narratives and offer fresh insights into how these artists navigate and challenge societal norms through their creative expressions.Keywords: queer, film, representation, streaming, media, gender
Procedia PDF Downloads 612924 Modified Weibull Approach for Bridge Deterioration Modelling
Authors: Niroshan K. Walgama Wellalage, Tieling Zhang, Richard Dwight
Abstract:
State-based Markov deterioration models (SMDM) sometimes fail to find accurate transition probability matrix (TPM) values, and hence lead to invalid future condition prediction or incorrect average deterioration rates mainly due to drawbacks of existing nonlinear optimization-based algorithms and/or subjective function types used for regression analysis. Furthermore, a set of separate functions for each condition state with age cannot be directly derived by using Markov model for a given bridge element group, which however is of interest to industrial partners. This paper presents a new approach for generating Homogeneous SMDM model output, namely, the Modified Weibull approach, which consists of a set of appropriate functions to describe the percentage condition prediction of bridge elements in each state. These functions are combined with Bayesian approach and Metropolis Hasting Algorithm (MHA) based Markov Chain Monte Carlo (MCMC) simulation technique for quantifying the uncertainty in model parameter estimates. In this study, factors contributing to rail bridge deterioration were identified. The inspection data for 1,000 Australian railway bridges over 15 years were reviewed and filtered accordingly based on the real operational experience. Network level deterioration model for a typical bridge element group was developed using the proposed Modified Weibull approach. The condition state predictions obtained from this method were validated using statistical hypothesis tests with a test data set. Results show that the proposed model is able to not only predict the conditions in network-level accurately but also capture the model uncertainties with given confidence interval.Keywords: bridge deterioration modelling, modified weibull approach, MCMC, metropolis-hasting algorithm, bayesian approach, Markov deterioration models
Procedia PDF Downloads 7282923 Modelling of Heat Generation in a 18650 Lithium-Ion Battery Cell under Varying Discharge Rates
Authors: Foo Shen Hwang, Thomas Confrey, Stephen Scully, Barry Flannery
Abstract:
Thermal characterization plays an important role in battery pack design. Lithium-ion batteries have to be maintained between 15-35 °C to operate optimally. Heat is generated (Q) internally within the batteries during both the charging and discharging phases. This can be quantified using several standard methods. The most common method of calculating the batteries heat generation is through the addition of both the joule heating effects and the entropic changes across the battery. In addition, such values can be derived by identifying the open-circuit voltage (OCV), nominal voltage (V), operating current (I), battery temperature (T) and the rate of change of the open-circuit voltage in relation to temperature (dOCV/dT). This paper focuses on experimental characterization and comparative modelling of the heat generation rate (Q) across several current discharge rates (0.5C, 1C, and 1.5C) of a 18650 cell. The analysis is conducted utilizing several non-linear mathematical functions methods, including polynomial, exponential, and power models. Parameter fitting is carried out over the respective function orders; polynomial (n = 3~7), exponential (n = 2) and power function. The generated parameter fitting functions are then used as heat source functions in a 3-D computational fluid dynamics (CFD) solver under natural convection conditions. Generated temperature profiles are analyzed for errors based on experimental discharge tests, conducted at standard room temperature (25°C). Initial experimental results display low deviation between both experimental and CFD temperature plots. As such, the heat generation function formulated could be easier utilized for larger battery applications than other methods available.Keywords: computational fluid dynamics, curve fitting, lithium-ion battery, voltage drop
Procedia PDF Downloads 952922 A Deterministic Approach for Solving the Hull and White Interest Rate Model with Jump Process
Authors: Hong-Ming Chen
Abstract:
This work considers the resolution of the Hull and White interest rate model with the jump process. A deterministic process is adopted to model the random behavior of interest rate variation as deterministic perturbations, which is depending on the time t. The Brownian motion and jumps uncertainty are denoted as the integral functions piecewise constant function w(t) and point function θ(t). It shows that the interest rate function and the yield function of the Hull and White interest rate model with jump process can be obtained by solving a nonlinear semi-infinite programming problem. A relaxed cutting plane algorithm is then proposed for solving the resulting optimization problem. The method is calibrated for the U.S. treasury securities at 3-month data and is used to analyze several effects on interest rate prices, including interest rate variability, and the negative correlation between stock returns and interest rates. The numerical results illustrate that our approach essentially generates the yield functions with minimal fitting errors and small oscillation.Keywords: optimization, interest rate model, jump process, deterministic
Procedia PDF Downloads 1612921 Loss Function Optimization for CNN-Based Fingerprint Anti-Spoofing
Authors: Yehjune Heo
Abstract:
As biometric systems become widely deployed, the security of identification systems can be easily attacked by various spoof materials. This paper contributes to finding a reliable and practical anti-spoofing method using Convolutional Neural Networks (CNNs) based on the types of loss functions and optimizers. The types of CNNs used in this paper include AlexNet, VGGNet, and ResNet. By using various loss functions including Cross-Entropy, Center Loss, Cosine Proximity, and Hinge Loss, and various loss optimizers which include Adam, SGD, RMSProp, Adadelta, Adagrad, and Nadam, we obtained significant performance changes. We realize that choosing the correct loss function for each model is crucial since different loss functions lead to different errors on the same evaluation. By using a subset of the Livdet 2017 database, we validate our approach to compare the generalization power. It is important to note that we use a subset of LiveDet and the database is the same across all training and testing for each model. This way, we can compare the performance, in terms of generalization, for the unseen data across all different models. The best CNN (AlexNet) with the appropriate loss function and optimizers result in more than 3% of performance gain over the other CNN models with the default loss function and optimizer. In addition to the highest generalization performance, this paper also contains the models with high accuracy associated with parameters and mean average error rates to find the model that consumes the least memory and computation time for training and testing. Although AlexNet has less complexity over other CNN models, it is proven to be very efficient. For practical anti-spoofing systems, the deployed version should use a small amount of memory and should run very fast with high anti-spoofing performance. For our deployed version on smartphones, additional processing steps, such as quantization and pruning algorithms, have been applied in our final model.Keywords: anti-spoofing, CNN, fingerprint recognition, loss function, optimizer
Procedia PDF Downloads 1362920 Religion and Politeness: An Exploratory Study for the Integration of Religious Expressions with Politeness Strategies in Iraqi Computer-Mediated Communication
Authors: Rasha Alsabbah
Abstract:
This study explores the relationship between polite language use and religion in the Iraqi culture in computer mediated communication. It tackles the speech acts where these expressions are employed, the frequency of their occurrence and the aims behind them. It also investigates if they have equivalent expressions in English and the possibility of translating them in intercultural communication. Despite the wide assumption that language is a reflection of culture and religion, it started to grant the attention sociologists during the recent 40 years when scholars have questioned the possible interconnection between religion and language in which religion is used as a mean of producing language and performing pragmatic functions. It is presumed that Arabs in general, and Iraqis in particular, have an inclination to use religious vocabulary in showing politeness in their greeting and other speech acts. Due to Islamic religion and culture’s influences, it is observed that Iraqis are very much concerned of maintaining social solidarity and harmonious relationships which make religion a politeness strategy that operates as the key point of their social behaviours. In addition, religion has found to influence almost all their interactions in which they have a tendency of invoking religious expressions, the lexicon of Allah (God), and Qur’anic verses in their daily politeness discourse. This aspect of Islamic culture may look strange, especially to people who come from individualist societies, such as England. Data collection in this study is based on messaging applications like Viber, WhatsApp, and Facebook. After gaining the approval of the participants, there was an investigation for the different aims behind these expressions and the pragmatic function that they perform. It is found that Iraqis tend to incorporate the lexicon of Allah in most of their communication. Such employment is not only by religious people but also by individuals who do not show strong commitment to religion. Furthermore, the social distance and social power between people do not play a significant role in increasing or reducing the rate of using these expressions. A number of these expressions, though can be translated into English, do not have one to one counterpart or reflect religious feeling. In addition, they might sound odd upon being translated or transliterated in oral and written communication in intercultural communication.Keywords: computer mediated communication (CMC), intercultural communication, politeness, religion, situation bound utterances rituals, speech acts
Procedia PDF Downloads 4022919 Re-Orienting Fashion: Fashionable Modern Muslim Women beyond Western Modernity
Authors: Amany Abdelrazek
Abstract:
Fashion is considered the main feature of modern and postmodern capitalist and consumerist society. Consumer historians maintain that fashion, namely, a sector of people embracing a prevailing clothing style for a short period, started during the Middle Ages but gained popularity later. It symbolised the transition from a medieval society with its solid fixed religious values into a modern society with its secular consumer dynamic culture. Renaissance society was a modern secular society concerning its preoccupation with daily life and changing circumstances. Yet, the late 18th-century industrial revolution revolutionised thought and ideology in Europe. The Industrial Revolution reinforced the Western belief in rationality and strengthened the position of science. In such a rational Western society, modernity, with its new ideas, came to challenge the whole idea of old fixed norms, reflecting the modern secular, rational culture and renouncing the medieval pious consumer. In modern society, supported by the industrial revolution and mass production, fashion encouraged broader sectors of society to integrate into fashion reserved for the aristocracy and royal courts. Moreover, the fashion project emphasizes the human body and its beauty, contradicting Judeo-Christian culture, which tends to abhor and criticize interest in sensuality and hedonism. In mainstream Western discourse, fashionable dress differentiates between emancipated stylish consumerist secular modern female and the assumed oppressed traditional modest religious female. Opposing this discourse, I look at the controversy over what has been called "Islamic fashion" that started during the 1980s and continued to gain popularity in contemporary Egyptian society. I discuss the challenges of being a fashionable and Muslim practicing female in light of two prominent models for female "Islamic fashion" in postcolonial Egypt; Jasmin Mohshen, the first hijabi model in Egypt and Manal Rostom, the first Muslim woman to represent the Nike campaign in the Middle East. The research employs fashion and postcolonial theories to rethink current Muslim women's position on women's emancipation, Western modernity and practising faith in postcolonial Egypt. The paper argues that Muslim women's current innovative and fashionable dress can work as a counter-discourse to the Orientalist and exclusive representation of non-Western Muslim culture as an inherently inert timeless culture. Furthermore, "Islamic" fashionable dress as an aesthetic medium for expressing ideas and convictions in contemporary Egypt interrogates the claim of universal secular modernity and Western fashion theorists' reluctance to consider Islamic fashion as fashion.Keywords: fashion, muslim women, modernity, secularism
Procedia PDF Downloads 1292918 Key Frame Based Video Summarization via Dependency Optimization
Authors: Janya Sainui
Abstract:
As a rapid growth of digital videos and data communications, video summarization that provides a shorter version of the video for fast video browsing and retrieval is necessary. Key frame extraction is one of the mechanisms to generate video summary. In general, the extracted key frames should both represent the entire video content and contain minimum redundancy. However, most of the existing approaches heuristically select key frames; hence, the selected key frames may not be the most different frames and/or not cover the entire content of a video. In this paper, we propose a method of video summarization which provides the reasonable objective functions for selecting key frames. In particular, we apply a statistical dependency measure called quadratic mutual informaion as our objective functions for maximizing the coverage of the entire video content as well as minimizing the redundancy among selected key frames. The proposed key frame extraction algorithm finds key frames as an optimization problem. Through experiments, we demonstrate the success of the proposed video summarization approach that produces video summary with better coverage of the entire video content while less redundancy among key frames comparing to the state-of-the-art approaches.Keywords: video summarization, key frame extraction, dependency measure, quadratic mutual information
Procedia PDF Downloads 2662917 Path Integrals and Effective Field Theory of Large Scale Structure
Authors: Revant Nayar
Abstract:
In this work, we recast the equations describing large scale structure, and by extension all nonlinear fluids, in the path integral formalism. We first calculate the well known two and three point functions using Schwinger Keldysh formalism used commonly to perturbatively solve path integrals in non- equilibrium systems. Then we include EFT corrections due to pressure, viscosity, and noise as effects on the time-dependent propagator. We are able to express results for arbitrary two and three point correlation functions in LSS in terms of differential operators acting on a triple K master intergral. We also, for the first time, get analytical results for more general initial conditions deviating from the usual power law P∝kⁿ by introducing a mass scale in the initial conditions. This robust field theoretic formalism empowers us with tools from strongly coupled QFT to study the strongly non-linear regime of LSS and turbulent fluid dynamics such as OPE and holographic duals. These could be used to capture fully the strongly non-linear dynamics of fluids and move towards solving the open problem of classical turbulence.Keywords: quantum field theory, cosmology, effective field theory, renormallisation
Procedia PDF Downloads 1352916 A Practical and Efficient Evaluation Function for 3D Model Based Vehicle Matching
Authors: Yuan Zheng
Abstract:
3D model-based vehicle matching provides a new way for vehicle recognition, localization and tracking. Its key is to construct an evaluation function, also called fitness function, to measure the degree of vehicle matching. The existing fitness functions often poorly perform when the clutter and occlusion exist in traffic scenarios. In this paper, we present a practical and efficient fitness function. Unlike the existing evaluation functions, the proposed fitness function is to study the vehicle matching problem from both local and global perspectives, which exploits the pixel gradient information as well as the silhouette information. In view of the discrepancy between 3D vehicle model and real vehicle, a weighting strategy is introduced to differently treat the fitting of the model’s wireframes. Additionally, a normalization operation for the model’s projection is performed to improve the accuracy of the matching. Experimental results on real traffic videos reveal that the proposed fitness function is efficient and robust to the cluttered background and partial occlusion.Keywords: 3D-2D matching, fitness function, 3D vehicle model, local image gradient, silhouette information
Procedia PDF Downloads 3992915 The Virtual Container Yard: Identifying the Persuasive Factors in Container Interchange
Authors: L. Edirisinghe, Zhihong Jin, A. W. Wijeratne, R. Mudunkotuwa
Abstract:
The virtual container yard is an effective solution to the container inventory imbalance problem which is a global issue. It causes substantial cost to carriers, which inadvertently adds to the prices of consumer goods. The virtual container yard is rooted in the fundamentals of container interchange between carriers. If carriers opt to interchange their excess containers with those who are deficit, a substantial part of the empty reposition cost could be eliminated. Unlike in other types of ships, cargo cannot be directly loaded to a container ship. Slots and containers are supplementary components; thus, without containers, a carrier cannot ship cargo if the containers are not available and vice versa. Few decades ago, carriers recognized slot (the unit of space in a container ship) interchange as a viable solution for the imbalance of shipping space. Carriers interchange slots among them and it also increases the advantage of scale of economies in container shipping. Some of these service agreements between mega carriers have provisions to interchange containers too. However, the interchange mechanism is still not popular among carriers for containers. This is the paradox that prevails in the liner shipping industry. At present, carriers reposition their excess empty containers to areas where they are in demand. This research applied factor analysis statistical method. The paper reveals that five major components may influence the virtual container yard namely organisation, practice and culture, legal and environment, international nature, and marketing. There are 12 variables that may impact the virtual container yard, and these are explained in the paper.Keywords: virtual container yard, shipping, imbalance, management, inventory
Procedia PDF Downloads 1962914 An Interpolation Tool for Data Transfer in Two-Dimensional Ice Accretion Problems
Authors: Marta Cordero-Gracia, Mariola Gomez, Olivier Blesbois, Marina Carrion
Abstract:
One of the difficulties in icing simulations is for extended periods of exposure, when very large ice shapes are created. As well as being large, they can have complex shapes, such as a double horn. For icing simulations, these configurations are currently computed in several steps. The icing step is stopped when the ice shapes become too large, at which point a new mesh has to be created to allow for further CFD and ice growth simulations to be performed. This can be very costly, and is a limiting factor in the simulations that can be performed. A way to avoid the costly human intervention in the re-meshing step of multistep icing computation is to use mesh deformation instead of re-meshing. The aim of the present work is to apply an interpolation method based on Radial Basis Functions (RBF) to transfer deformations from surface mesh to volume mesh. This deformation tool has been developed specifically for icing problems. It is able to deal with localized, sharp and large deformations, unlike the tools traditionally used for more smooth wing deformations. This tool will be presented along with validation on typical two-dimensional icing shapes.Keywords: ice accretion, interpolation, mesh deformation, radial basis functions
Procedia PDF Downloads 3132913 Development of a Fuzzy Logic Based Model for Monitoring Child Pornography
Authors: Mariam Ismail, Kazeem Rufai, Jeremiah Balogun
Abstract:
A study was conducted to apply fuzzy logic to the development of a monitoring model for child pornography based on associated risk factors, which can be used by forensic experts or integrated into forensic systems for the early detection of child pornographic activities. A number of methods were adopted in the study, which includes an extensive review of related works was done in order to identify the factors that are associated with child pornography following which they were validated by an expert sex psychologist and guidance counselor, and relevant data was collected. Fuzzy membership functions were used to fuzzify the associated variables identified alongside the risk of the occurrence of child pornography based on the inference rules that were provided by the experts consulted, and the fuzzy logic expert system was simulated using the Fuzzy Logic Toolbox available in the MATLAB Software Release 2016. The results of the study showed that there were 4 categories of risk factors required for assessing the risk of a suspect committing child pornography offenses. The results of the study showed that 2 and 3 triangular membership functions were used to formulate the risk factors based on the 2 and 3 number of labels assigned, respectively. The results of the study showed that 5 fuzzy logic models were formulated such that the first 4 was used to assess the impact of each category on child pornography while the last one takes the 4 outputs from the 4 fuzzy logic models as inputs required for assessing the risk of child pornography. The following conclusion was made; there were factors that were related to personal traits, social traits, history of child pornography crimes, and self-regulatory deficiency traits by the suspects required for the assessment of the risk of child pornography crimes committed by a suspect. Using the values of the identified risk factors selected for this study, the risk of child pornography can be easily assessed from their values in order to determine the likelihood of a suspect perpetuating the crime.Keywords: fuzzy, membership functions, pornography, risk factors
Procedia PDF Downloads 1302912 The Intricacies of Local Governance in Local Economic Development: A Case Study of uThukela's Traditional Authority
Authors: Methembe Mdlalose
Abstract:
This paper synthesizes the findings of a study that utilized a purposive sampling methodology laced within a grounded theory analytical framework with LED managers, mayors, and traditional leaders representing six municipalities of uThukela District of KwaZulu-Natal, South Africa. The paper critiques the two institution’s micro-relations within local governance and their overall impact on the general development discourse of rural areas. The study is located in the province of KwaZulu-Natal, a part of South Africa that experiences extremely low levels of development in rural areas and suffers from high rates of inequality, poverty, and unemployment. The paper unpacks the role of two significant stakeholders in the local sphere. Considered as the two dominant stakeholders at the local level, questions of compatibility between traditional leaders and municipal councillors often surge, as the two institutions (who represent two autonomous entities) that operate within the same operational boarders. The discussion around community development lies very deeply on accountability, which assures citizens that fruitless spending is curbed and good governance is maintained. If development is to be assured, it is vital to monitor accountability within government spheres and its departments. It is further essential to monitor the relations within local government. The findings of this research confirmed how relationships between traditional leaders and councillors can and have contributed to economic development or its stagnation thereof in rural areas. In addition, the findings revealed that there is an extensive need for the two stakeholders to work collectively, as this is a vital move in planning for development. Furthermore, the better accountability of local government and a better understanding of how clear policy and its implementation is may be a valuable asset in the discourse of community economic development in rural areas.Keywords: economic development, traditional leadership, democratically elected councillors, local governance
Procedia PDF Downloads 2092911 English Language Teaching Graduate Students' Use of Discussion Moves in Research Articles
Authors: Gamzegul Koca, Evrim Eveyik-Aydin
Abstract:
Genre and discipline-specific knowledge of academic discourse in writing has long been acknowledged as being a core skill to achieve formidable tasks that are expected of graduate students in academic settings. Genre analysis approaches can be adopted to unveil the challenges encountered in these tasks to be able to take instructional actions addressing the aspects of graduate writing that need improvement. In an attempt to find genre-specific academic writing needs of Turkish students enrolled in a graduate program in ELT, this study examines the rhetorical structure of discussion sections of research articles written during the course load stage of their graduate studies. The 35.437-word specialized corpus of graduate papers compiled for the purpose of the study includes discussions of 58 unpublished reports of empirical studies, 31 written in MA courses and 27 in Ph.D. courses by a total of 44 graduate students. The study does sentence-based move structure analysis using the framework developed by Eveyik-Aydın, Karabacak and Akyel in a corpus-based study that analyzed the discussion moves of expert writers in published articles in ELT journals indexed by Social Sciences Citation. The coding of 1577 sentences by three graders using this framework revealed that while the graduate papers included the same moves used in published articles, the rhetorical structure of MA and Ph.D. papers showed considerable differences in terms of the frequency of occurrence of main discussion moves, including interpretation of the results and drawing implications. The implications of these findings will be discussed with respect to the needs of graduate writers and the expectations of discourse community.Keywords: discussion moves, genre-specific rhetorical structure, move analysis, research articles, the specialized corpus of graduate papers
Procedia PDF Downloads 1662910 “Divorced Women are Like Second-Hand Clothes” - Hate Language in Media Discourse
Authors: Sopio Totibadze
Abstract:
Although the legal framework of Georgia reflects the main principles of gender equality and is in line with the international situation, Georgia remains a male-dominated society. This means that men prevail in many areas of social, economic, and political life, which frequently gives women a subordinate status in society and the family. According to the latest studies, “violence against women and girls in Georgia is also recognized as a public problem, and it is necessary to focus on it”. Moreover, the Public Defender's report (2019) reveals that “in the last five years, 151 women were killed in Georgia due to gender and family violence”. Unfortunately, there are frequent cases of crimes based on gender-based oppression in Georgia, which pose a threat not only to women but also to people of any gender whose desires and aspirations do not correspond to the gender norms and roles prevailing in society. It is well-known that language is often used as a tool for gender oppression. Therefore, feminist and gender studies in linguistics ultimately serve to represent the problem, reflect on it, and propose ways to solve it. Together with technical advancement in communication, a new form of discrimination has arisen- hate language against women in electronic media discourse. Due to the nature of social media and the internet, messages containing hate language can spread in seconds and reach millions of people. However, only a few know about the detrimental effects they may have on the addressee and society. This paper aims to analyse the hateful comments directed at women on various media platforms to determine the linguistic strategies used while attacking women and the reasons why women may fall victim to this type of hate language. The data have been collected over six months, and overall, 500 comments will be examined for the paper. Qualitative and quantitative analysis was chosen for the methodology of the study. The comments posted on various media platforms have been selected manually due to several reasons, the most important being the problem of identifying hate speech as it can disguise itself in different ways- humour, memes, etc. The comments on the articles, posts, pictures, and videos selected for sociolinguistic analysis depict a woman, a taboo topic, or a scandalous event centred on a woman that triggered hate language towards the person to whom the post/article was dedicated. The study has revealed that a woman can become a victim of hatred directed at them if they do something considered to be a deviation from a societal norm, namely, get a divorce, be sexually active, be vocal about feministic values, and talk about taboos. Interestingly, people who utilize hate language are not only men trying to “normalize” the prejudiced patriarchal values but also women who are equally active in bringing down a "strong" woman. The paper also aims to raise awareness about the hate language directed at women, as being knowledgeable about the issue at hand is the first step to tackling it.Keywords: femicide, hate language, media discourse, sociolinguistics
Procedia PDF Downloads 85