Search results for: nonequilibrium states
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 2965

Search results for: nonequilibrium states

2155 U.S. Supreme Court Decision-Making and Bounded Rationality

Authors: Joseph Ignagni, Rebecca Deen

Abstract:

In this study, the decision making of the Justices of the United States Supreme Court will be considered in terms of constrained maximization and cognitive-cybernetic theory. This paper will integrate research in such fields as law, psychology, political science, economics and decision-making theory. It will be argued that due to its heavy workload, the Supreme Court may be forced to make decisions in a boundedly rational manner. The ideas and theory put forward here will be considered in the area of the Court’s decisions involving religion. Therefore, the cases involving the U.S. Constitution’s Free Exercise Clause and Establishment Clause will be analyzed.

Keywords: bounded rationality, cognitive-cybernetic, US supreme court, religion

Procedia PDF Downloads 386
2154 A Study of Environmental Test Sequences for Electrical Units

Authors: Jung Ho Yang, Yong Soo Kim

Abstract:

Electrical units are operated by electrical and electronic components. An environmental test sequence is useful for testing electrical units to reduce reliability issues. This study introduces test sequence guidelines based on relevant principles and considerations for electronic testing according to international standard IEC-60068-1 and the United States military standard MIL-STD-810G. Then, test sequences were proposed based on the descriptions for each test. Finally, General Motors (GM) specification GMW3172 was interpreted and compared to IEC-60068-1 and MIL-STD-810G.

Keywords: reliability, environmental test sequence, electrical units, IEC 60068-1, MIL-STD-810G

Procedia PDF Downloads 504
2153 Political Perspectives Regarding International Laws

Authors: Hamid Vahidkia

Abstract:

This exposition investigates the connection between two viewpoints on the nature of human rights. Agreeing with the “political” or “practical” point of view, human rights are claims that people have against certain regulation structures in specific present-day states, in the ethicalness of interface they have in settings that incorporate them. Agreeing with the more conventional “humanist” or “naturalistic” viewpoint, human rights are pre-institutional claims that people have against all other people in the ethicalness of interface characteristic of their common humankind. This paper contends that once we recognize the two viewpoints in their best light, we are able to see that they are complementary, and, in reality, we require both to form a great standardizing sense of the modern home of human rights. It clarifies how humanist and political contemplations can and ought to work in couple to account for the concept, substance, and legitimization of human rights.

Keywords: politics, human rights, humanities, mankind, law

Procedia PDF Downloads 59
2152 Science behind Quantum Teleportation

Authors: Ananya G., B. Varshitha, Shwetha S., Kavitha S. N., Praveen Kumar Gupta

Abstract:

Teleportation is the ability to travel by just reappearing at some other spot. Though teleportation has never been achieved, quantum teleportation is possible. Quantum teleportation is a process of transferring the quantum state of a particle onto another particle, under the circumstance that one does not get to know any information about the state in the process of transformation. This paper presents a brief overview of quantum teleportation, discussing the topics like Entanglement, EPR Paradox, Bell's Theorem, Qubits, elements for a successful teleport, some examples of advanced teleportation systems (also covers few ongoing experiments), applications (that includes quantum cryptography), and the current hurdles for future scientists interested in this field. Finally, major advantages and limitations to the existing teleportation theory are discussed.

Keywords: teleportation, quantum teleportation, quantum entanglement, qubits, EPR paradox, bell states, quantum particles, spooky action at a distance

Procedia PDF Downloads 117
2151 Seismic Fragility Assessment of Continuous Integral Bridge Frames with Variable Expansion Joint Clearances

Authors: P. Mounnarath, U. Schmitz, Ch. Zhang

Abstract:

Fragility analysis is an effective tool for the seismic vulnerability assessment of civil structures in the last several years. The design of the expansion joints according to various bridge design codes is almost inconsistent, and only a few studies have focused on this problem so far. In this study, the influence of the expansion joint clearances between the girder ends and the abutment backwalls on the seismic fragility assessment of continuous integral bridge frames is investigated. The gaps (ranging from 60 mm, 150 mm, 250 mm and 350 mm) are designed by following two different bridge design code specifications, namely, Caltrans and Eurocode 8-2. Five bridge models are analyzed and compared. The first bridge model serves as a reference. This model uses three-dimensional reinforced concrete fiber beam-column elements with simplified supports at both ends of the girder. The other four models also employ reinforced concrete fiber beam-column elements but include the abutment backfill stiffness and four different gap values. The nonlinear time history analysis is performed. The artificial ground motion sets, which have the peak ground accelerations (PGAs) ranging from 0.1 g to 1.0 g with an increment of 0.05 g, are taken as input. The soil-structure interaction and the P-Δ effects are also included in the analysis. The component fragility curves in terms of the curvature ductility demand to the capacity ratio of the piers and the displacement demand to the capacity ratio of the abutment sliding bearings are established and compared. The system fragility curves are then obtained by combining the component fragility curves. Our results show that in the component fragility analysis, the reference bridge model exhibits a severe vulnerability compared to that of other sophisticated bridge models for all damage states. In the system fragility analysis, the reference curves illustrate a smaller damage probability in the earlier PGA ranges for the first three damage states, they then show a higher fragility compared to other curves in the larger PGA levels. In the fourth damage state, the reference curve has the smallest vulnerability. In both the component and the system fragility analysis, the same trend is found that the bridge models with smaller clearances exhibit a smaller fragility compared to that with larger openings. However, the bridge model with a maximum clearance still induces a minimum pounding force effect.

Keywords: expansion joint clearance, fiber beam-column element, fragility assessment, time history analysis

Procedia PDF Downloads 435
2150 Concentration of Some Hazardous Metals (Cd, Pb and Ni) in Egg Samples Analysed from Poultry Farms Located near Automechanics Workshops, Industrial Areas and Roadsides in Kano and Kaduna

Authors: M. I. Mohammed, A. M. Sani, A. S. Bayero

Abstract:

The aim of this work is to study the effect of farm site location by determining the levels of hazardous metals in poultry eggs samples collected near auto mechanics, industrial areas and roadsides in Kaduna and Kano States of Nigeria. Atomic absorption spectrophotometer was used for the analysis of the metals. The mean concentration ranges of the metals analysed in egg white and egg yolk were Pb: 0.05-0.10mgkg⁻¹, Ni: 0.10-0.30mgkg⁻¹ and Cd: not detected -0.03mgkg⁻¹. It was concluded that farm site locations has very low significant effect on the concentration of hazardous metals level.

Keywords: albumen, Egg, hazardous metals, poultry farms

Procedia PDF Downloads 263
2149 Going Horizontal: Confronting the Challenges When Transitioning to Cloud

Authors: Harvey Hyman, Thomas Hull

Abstract:

As one of the largest cancer treatment centers in the United States, we continuously confront the challenge of how to leverage the best possible technological solutions, in order to provide the highest quality of service to our customers – the doctors, nurses and patients at Moffitt who are fighting every day for the prevention and cure of cancer. This paper reports on the transition from a vertical to a horizontal IT infrastructure. We discuss how the new frameworks and methods such as public, private and hybrid cloud, brokering cloud services are replacing the traditional vertical paradigm for computing. We also report on the impact of containers, micro services, and the shift to continuous integration/continuous delivery. These impacts and changes in delivery methodology for computing are driving how we accomplish our strategic IT goals across the enterprise.

Keywords: cloud computing, IT infrastructure, IT architecture, healthcare

Procedia PDF Downloads 380
2148 The Role of Risk Attitudes and Networks on the Migration Decision: Empirical Evidence from the United States

Authors: Tamanna Rimi

Abstract:

A large body of literature has discussed the determinants of migration decision. However, the potential role of individual risk attitudes on migration decision has so far been overlooked. The research on migration literature has studied how the expected income differential influences migration flows for a risk neutral individual. However, migration takes place when there is no expected income differential or even the variability of income appears as lower than in the current location. This migration puzzle motivates a recent trend in the literature that analyzes how attitudes towards risk influence the decision to migrate. However, the significance of risk attitudes on migration decision has been addressed mostly in a theoretical perspective in the mainstream migration literature. The efficient outcome of labor market and overall economy are largely influenced by migration in many countries. Therefore, attitudes towards risk as a determinant of migration should get more attention in empirical studies. To author’s best knowledge, this is the first study that has examined the relationship between relative risk aversion and migration decision in US market. This paper considers movement across United States as a means of migration. In addition, this paper also explores the network effect due to the increasing size of one’s own ethnic group to a source location on the migration decision and how attitudes towards risk vary with network effect. Two ethnic groups (i.e. Asian and Hispanic) have been considered in this regard. For the empirical estimation, this paper uses two sources of data: 1) U.S. census data for social, economic, and health research, 2010 (IPUMPS) and 2) University of Michigan Health and Retirement Study, 2010 (HRS). In order to measure relative risk aversion, this study uses the ‘Two Sample Two-Stage Instrumental Variable (TS2SIV)’ technique. This is a similar method of Angrist (1990) and Angrist and Kruegers’ (1992) ‘Two Sample Instrumental Variable (TSIV)’ technique. Using a probit model, the empirical investigation yields the following results: (i) risk attitude has a significantly large impact on migration decision where more risk averse people are less likely to migrate; (ii) the impact of risk attitude on migration varies by other demographic characteristics such as age and sex; (iii) people with higher concentration of same ethnic households living in a particular place are expected to migrate less from their current place; (iv) the risk attitudes on migration vary with network effect. The overall findings of this paper relating risk attitude, migration decision and network effect can be a significant contribution addressing the gap between migration theory and empirical study in migration literature.

Keywords: migration, network effect, risk attitude, U.S. market

Procedia PDF Downloads 162
2147 Analyzing Political Cartoons in Arabic-Language Media after Trump's Jerusalem Move: A Multimodal Discourse Perspective

Authors: Inas Hussein

Abstract:

Communication in the modern world is increasingly becoming multimodal due to globalization and the digital space we live in which have remarkably affected how people communicate. Accordingly, Multimodal Discourse Analysis (MDA) is an emerging paradigm in discourse studies with the underlying assumption that other semiotic resources such as images, colours, scientific symbolism, gestures, actions, music and sound, etc. combine with language in order to  communicate meaning. One of the effective multimodal media that combines both verbal and non-verbal elements to create meaning is political cartoons. Furthermore, since political and social issues are mirrored in political cartoons, these are regarded as potential objects of discourse analysis since they not only reflect the thoughts of the public but they also have the power to influence them. The aim of this paper is to analyze some selected cartoons on the recognition of Jerusalem as Israel's capital by the American President, Donald Trump, adopting a multimodal approach. More specifically, the present research examines how the various semiotic tools and resources utilized by the cartoonists function in projecting the intended meaning. Ten political cartoons, among a surge of editorial cartoons highlighted by the Anti-Defamation League (ADL) - an international Jewish non-governmental organization based in the United States - as publications in different Arabic-language newspapers in Egypt, Saudi Arabia, UAE, Oman, Iran and UK, were purposively selected for semiotic analysis. These editorial cartoons, all published during 6th–18th December 2017, invariably suggest one theme: Jewish and Israeli domination of the United States. The data were analyzed using the framework of Visual Social Semiotics. In accordance with this methodological framework, the selected visual compositions were analyzed in terms of three aspects of meaning: representational, interactive and compositional. In analyzing the selected cartoons, an interpretative approach is being adopted. This approach prioritizes depth to breadth and enables insightful analyses of the chosen cartoons. The findings of the study reveal that semiotic resources are key elements of political cartoons due to the inherent political communication they convey. It is proved that adequate interpretation of the three aspects of meaning is a prerequisite for understanding the intended meaning of political cartoons. It is recommended that further research should be conducted to provide more insightful analyses of political cartoons from a multimodal perspective.

Keywords: Multimodal Discourse Analysis (MDA), multimodal text, political cartoons, visual modality

Procedia PDF Downloads 240
2146 Investigating English Dominance in a Chinese-English Dual Language Program: Teachers' Language Use and Investment

Authors: Peizhu Liu

Abstract:

Dual language education, also known as immersion education, differs from traditional language programs that teach a second or foreign language as a subject. Instead, dual language programs adopt a content-based approach, using both a majority language (e.g., English, in the case of the United States) and a minority language (e.g., Spanish or Chinese) as a medium of instruction to teach math, science, and social studies. By granting each language of instruction equal status, dual language education seeks to educate not only meaningfully but equitably and to foster tolerance and appreciation of diversity, making it essential for immigrants, refugees, indigenous peoples, and other marginalized students. Despite the cognitive and academic benefits of dual language education, recent literature has revealed that English is disproportionately privileged across dual language programs. Scholars have expressed concerns about the unbalanced status of majority and minority languages in dual language education, as favoring English in this context may inadvertently reaffirm its dominance and moreover fail to serve the needs of children whose primary language is not English. Through a year-long study of a Chinese-English dual language program, the extensively disproportionate use of English has also been observed by the researcher. However, despite the fact that Chinese-English dual language programs are the second-most popular program type after Spanish in the United States, this issue remains underexplored in the existing literature on Chinese-English dual language education. In fact, the number of Chinese-English dual language programs being offered in the U.S. has grown rapidly, from 8 in 1988 to 331 as of 2023. Using Norton and Darvin's investment model theory, the current study investigates teachers' language use and investment in teaching Chinese and English in a Chinese-English dual language program at an urban public school in New York City. The program caters to a significant number of minority children from working-class families. Adopting an ethnographic and discourse analytic approach, this study seeks to understand language use dynamics in the program and how micro- and macro-factors, such as students' identity construction, parents' and teachers' language ideologies, and the capital associated with each language, influence teachers' investment in teaching Chinese and English. The research will help educators and policymakers understand the obstacles that stand in the way of the goal of dual language education—that is, the creation of a more inclusive classroom, which is achieved by regarding both languages of instruction as equally valuable resources. The implications for how to balance the use of the majority and minority languages will also be discussed.

Keywords: dual language education, bilingual education, language immersion education, content-based language teaching

Procedia PDF Downloads 84
2145 A Comparative Study between Japan and the European Union on Software Vulnerability Public Policies

Authors: Stefano Fantin

Abstract:

The present analysis outcomes from the research undertaken in the course of the European-funded project EUNITY, which targets the gaps in research and development on cybersecurity and privacy between Europe and Japan. Under these auspices, the research presents a study on the policy approach of Japan, the EU and a number of Member States of the Union with regard to the handling and discovery of software vulnerabilities, with the aim of identifying methodological differences and similarities. This research builds upon a functional comparative analysis of both public policies and legal instruments from the identified jurisdictions. The result of this analysis is based on semi-structured interviews with EUNITY partners, as well as by the participation of the researcher to a recent report from the Center for EU Policy Study on software vulnerability. The European Union presents a rather fragmented legal framework on software vulnerabilities. The presence of a number of different legislations at the EU level (including Network and Information Security Directive, Critical Infrastructure Directive, Directive on the Attacks at Information Systems and the Proposal for a Cybersecurity Act) with no clear focus on such a subject makes it difficult for both national governments and end-users (software owners, researchers and private citizens) to gain a clear understanding of the Union’s approach. Additionally, the current data protection reform package (general data protection regulation), seems to create legal uncertainty around security research. To date, at the member states level, a few efforts towards transparent practices have been made, namely by the Netherlands, France, and Latvia. This research will explain what policy approach such countries have taken. Japan has started implementing a coordinated vulnerability disclosure policy in 2004. To date, two amendments can be registered on the framework (2014 and 2017). The framework is furthermore complemented by a series of instruments allowing researchers to disclose responsibly any new discovery. However, the policy has started to lose its efficiency due to a significant increase in reports made to the authority in charge. To conclude, the research conducted reveals two asymmetric policy approaches, time-wise and content-wise. The analysis therein will, therefore, conclude with a series of policy recommendations based on the lessons learned from both regions, towards a common approach to the security of European and Japanese markets, industries and citizens.

Keywords: cybersecurity, vulnerability, European Union, Japan

Procedia PDF Downloads 156
2144 The Roles of ECOWAS Parliament on Regional Integration of the West African Sub-Region

Authors: Sani Shehu, Mohd Afandi Salleh

Abstract:

Parliament is a law making body which provided at national, state, province and territorial level playing a parliamentary role of representing people, law making, peace, and conflict resolution, ratifying and incorporating international convention into municipal law. Parliaments are created globally to give solid legitimacy to good governance under democratic system of government, and the representatives must be elected by the people, so the ECOWAS parliament is entitled to have this legitimacy, where members must be elected by adult people among the citizens of ECOWAS member states. This paper will discuss on the roles that ECOWAS parliament plays for the achievement of regional integration and economic goals of development and cooperation in the sub-region.

Keywords: ECOWAS parliament, composition, competence, power

Procedia PDF Downloads 479
2143 Effect of the Applied Bias on Miniband Structures in Dimer Fibonacci Inas/Ga1-Xinxas Superlattices

Authors: Z. Aziz, S. Terkhi, Y. Sefir, R. Djelti, S. Bentata

Abstract:

The effect of a uniform electric field across multibarrier systems (InAs/InxGa1-xAs) is exhaustively explored by a computational model using exact airy function formalism and the transfer-matrix technique. In the case of biased DFHBSL structure a strong reduction in transmission properties was observed and the width of the miniband structure linearly decreases with the increase of the applied bias. This is due to the confinement of the states in the miniband structure, which becomes increasingly important (Wannier-Stark Effect).

Keywords: dimer fibonacci height barrier superlattices, singular extended state, exact airy function, transfer matrix formalism

Procedia PDF Downloads 305
2142 User Experience in Relation to Eye Tracking Behaviour in VR Gallery

Authors: Veslava Osinska, Adam Szalach, Dominik Piotrowski

Abstract:

Contemporary VR technologies allow users to explore virtual 3D spaces where they can work, socialize, learn, and play. User's interaction with GUI and the pictures displayed implicate perceptual and also cognitive processes which can be monitored due to neuroadaptive technologies. These modalities provide valuable information about the users' intentions, situational interpretations, and emotional states, to adapt an application or interface accordingly. Virtual galleries outfitted by specialized assets have been designed using the Unity engine BITSCOPE project in the frame of CHIST-ERA IV program. Users interaction with gallery objects implies the questions about his/her visual interests in art works and styles. Moreover, an attention, curiosity, and other emotional states are possible to be monitored and analyzed. Natural gaze behavior data and eye position were recorded by built-in eye-tracking module within HTC Vive headset gogle for VR. Eye gaze results are grouped due to various users’ behavior schemes and the appropriate perpetual-cognitive styles are recognized. Parallelly usability tests and surveys were adapted to identify the basic features of a user-centered interface for the virtual environments across most of the timeline of the project. A total of sixty participants were selected from the distinct faculties of University and secondary schools. Users’ primary knowledge about art and was evaluated during pretest and this way the level of art sensitivity was described. Data were collected during two months. Each participant gave written informed consent before participation. In data analysis reducing the high-dimensional data into a relatively low-dimensional subspace ta non linear algorithms were used such as multidimensional scaling and novel technique technique t-Stochastic Neighbor Embedding. This way it can classify digital art objects by multi modal time characteristics of eye tracking measures and reveal signatures describing selected artworks. Current research establishes the optimal place on aesthetic-utility scale because contemporary interfaces of most applications require to be designed in both functional and aesthetical ways. The study concerns also an analysis of visual experience for subsamples of visitors, differentiated, e.g., in terms of frequency of museum visits, cultural interests. Eye tracking data may also show how to better allocate artefacts and paintings or increase their visibility when possible.

Keywords: eye tracking, VR, UX, visual art, virtual gallery, visual communication

Procedia PDF Downloads 42
2141 Crisis, Identity and Challenge: Next Steps for the ‘English’ Constitution

Authors: Carol Howells, Edwin Parks

Abstract:

This paper explores the existing and evolving constitutional arrangements within the United Kingdom and within the wider international context of the EU. It considers the nature of an ‘English’ constitution and internal colonialism that underpins it. The debates over the UK’s exit from the EU have been many however the constitutional position of the devolved nations (Scotland, Northern Ireland and Wales) is little understood or explored. Their constitutional position has been touched upon in academic debate (but not widely) and is only now beginning to receive attention. The paper considers the constitutional role of the legislatures within the UK; the UK Parliament Bill for exiting the European Union and provides a commentary on the Brexit process in relation to constitutional arrangements within the UK and EU. Questions arise over the constitutional framework and, whether, having delegated competencies, the UK Parliament can now legislate in relation to delegated competencies without the consent. The Scottish Parliament and Welsh Assembly are a permanent and a fixed feature of the UK’s constitution, but their position is set within the traditional concept of the ‘English’ constitution. The current situation is opaque and complex and raises significant constitutional questions. In relation to exit from the EU two of the nations did not vote in favour of Brexit and the third is in receipt of an inequitable funding settlement. Questions arise as to whether the work of modernising the UK’s constitution over the past twenty years in recognising the Nations and governments within those nations is now being unpicked and whether the piecemeal and unequal process of devolution and new constitutional arrangements hold weight. Questions of democratic legitimacy arise throughout. An advisory referendum (where no definition of the EU was provided) in which two of the four nations voted to leave the EU and two voted to remain has led the UK Government negotiating a wholesale exit from the EU based on ‘English’ constitutional law principles. Previous constitutional referendums in relation to devolution within the UK have been treated differently. Within the EU questions are being raised in relation to the focus on member states. The goals of the EU mention member countries and its purpose is seen as being to promote greater social, political and economic harmony among the nations of Europe. The emphasis on member states is proving challenging and has led flawed processes. Scrutiny of legislative proposals, historical developments, and social commentary reveal distinct national identities within the UK. Analysis of the debate, legislation and case law surrounding the exiting process from the EU reveal a muddled picture of a constitution in crisis and significant challenges to principles underpinning the rule of law. Suggestions are made for future reforms and a move towards new constitutional arrangements beyond the current ‘English’ constitution.

Keywords: English, constitution, parliament, devolved

Procedia PDF Downloads 124
2140 A Case Study of Limited Dynamic Voltage Frequency Scaling in Low-Power Processors

Authors: Hwan Su Jung, Ahn Jun Gil, Jong Tae Kim

Abstract:

Power management techniques are necessary to save power in the microprocessor. By changing the frequency and/or operating voltage of processor, DVFS can control power consumption. In this paper, we perform a case study to find optimal power state transition for DVFS. We propose the equation to find the optimal ratio between executions of states while taking into account the deadline of processing time and the power state transition delay overhead. The experiment is performed on the Cortex-M4 processor, and average 6.5% power saving is observed when DVFS is applied under the deadline condition.

Keywords: deadline, dynamic voltage frequency scaling, power state transition

Procedia PDF Downloads 456
2139 Responsibility to Protect: The Continuing Post-Colonial Western Hegemony

Authors: Helyeh Doutaghi

Abstract:

In 2005, the doctrine of Responsibility to Protect (R2P) was created by the UN Member States agreeing to not only to have the primary responsibility to protect their civilians from genocide, war crimes, crimes against humanity and ethnic cleansing, but also to be responsible towards those civilians whose State was found manifestly failing in that regard. This paper will assess the doctrine of R2P and will argue that R2P too, just like humanitarian intervention, suffers from a lack of legal basis and political will to implement it. Or better said, it is being selectively used by the hegemon’s power to achieve its political will. In doing so, the origin and development shall be explained. Furthermore, it will be submitted that R2P has failed to achieve its purpose due to the unresolved Security Council’s deadlock. Lastly, the concept of legal morality entailed in R2P and its use in real life cases since 2005 will be examined.

Keywords: responsibility to protect, humanitarian intervention, United Nations, legitimacy, legality

Procedia PDF Downloads 340
2138 Terrorism: Definition, History and Different Approaches in the Analysis of Terrorism Phenomenon

Authors: Shabnam Dadparvar, Laijin Shen, Farzad Ravanbod

Abstract:

Nowadays, the political phenomenon of terrorism is considered as an effective factor on political, social, and economic changes. It has replaced the recognized political phenomena such as revolutions, wars (total war among two or more political units with distinct identities in the form of national states), coups d’état, insurgencies and etc. and has challenged political life in all its levels (sub national, national, and international political groups). In this paper by using descriptive-analytical method, the authors try to explain the spread of this political phenomenon across the world, its definition and types, also analyze different approaches to understand it. The authors believe that the Logical-Rational approach is the best way to explain and understand this phenomenon.

Keywords: logical approach, psychological- social approach, religious approach, terrorism

Procedia PDF Downloads 335
2137 Application of Optical Method Based on Laser Devise as Non-Destructive Testing for Calculus of Mechanical Deformation

Authors: R. Daïra, V. Chalvidan

Abstract:

We present the speckle interferometry method to determine the deformation of a piece. This method of holographic imaging using a CCD camera for simultaneous digital recording of two states object and reference. The reconstruction is obtained numerically. This latest method has the advantage of being simpler than the methods currently available, and it does not suffer the holographic configuration faults online. Furthermore, it is entirely digital and avoids heavy analysis after recording the hologram. This work was carried out in the laboratory HOLO 3 (optical metrology laboratory in Saint Louis, France) and it consists in controlling qualitatively and quantitatively the deformation of object by using a camera CCD connected to a computer equipped with software of Fringe Analysis.

Keywords: speckle, nondestructive testing, interferometry, image processing

Procedia PDF Downloads 497
2136 Code Switching: A Case Study Of Lebanon

Authors: Wassim Bekai

Abstract:

Code switching, as its name states, is altering between two or more languages in one sentence. The speaker tends to use code switching in his/her speech for better clarification of his/her message to the receiver. It is commonly used in sociocultural countries such as Lebanon because of the various cultures that have come across its lands through history, considering Lebanon is geographically located in the heart of the world, and hence between many cultures and languages. In addition, Lebanon was occupied by Turkish authorities for about 400 years, and later on by the French mandate, where both of these countries forced their languages in official papers and in the Lebanese educational system. In this paper, the importance of code switching in the Lebanese workplace will be examined, stressing the efficiency and amount of the production resulting from code switching in the workplace (factories, universities among other places) in addition to exploring the social, education, religious and cultural factors behind this phenomenon in Lebanon.

Keywords: code switching, Lebanon, cultural, factors

Procedia PDF Downloads 287
2135 Sludge Marvel (Densification): The Ultimate Solution For Doing More With Less Effort!

Authors: Raj Chavan

Abstract:

At present, the United States is home to more than 14,000 Water Resource Recovery Facilities (WRRFs), of which approximately 35% have implemented nutrient limits of some kind. These WRRFs contribute 10 to 15% of the total nutrient burden to surface rivers in the United States and account for approximately 1% of total power demand and 2% of total greenhouse gas emissions (GHG). There are several factors that have influenced the development of densification technologies in the direction of more compact and energy-efficient nutrient removal processes. Prior to surface water discharge, existing facilities that necessitate capacity expansion or biomass densification for greater treatability within the same footprint are being subjected to stricter nutrient removal requirements. Densification of activated sludge as a method for nutrient removal and process intensification at WRRFs has garnered considerable attention in recent times. The biological processes take place within the aerobic sediment granules, which form the basis of the technology. The possibility of generating granular sludge through continuous (or conventional) activated sludge processes (CAS) or densification of biomass through the transfer of activated sludge flocs to a denser biomass aggregate as an exceptionally efficient intensification technique has generated considerable interest. This presentation aims to furnish attendees with a foundational comprehension of densification through the illustration of practical concerns and insights. The subsequent subjects will be deliberated upon. What are some potential techniques for producing and preserving densified granules? What processes are responsible for the densification of biological flocs? How do physical selectors contribute to the process of biological flocs becoming denser? What viable strategies exist for the management of densified biological flocs, and which design parameters of physical selection influence the retention of densified biological flocs? determining operational solutions for floc and granule customization in order to meet capacity and performance objectives? The answers to these pivotal questions will be derived from existing full-scale treatment facilities, bench-scale and pilot-scale investigations, and existing literature data. By the conclusion of the presentation, the audience will possess a fundamental comprehension of the densification concept and its significance in attaining effective effluent treatment. Additionally, case studies pertaining to the design and operation of densification procedures will be incorporated into the presentation.

Keywords: densification, intensification, nutrient removal, granular sludge

Procedia PDF Downloads 74
2134 Contemporary Mexican Shadow Politics: The War on Drugs and the Issue of Security

Authors: Lisdey Espinoza Pedraza

Abstract:

Organised crime in Mexico evolves faster that our capacity to understand and explain it. Organised gangs have become successful entrepreneurs in many ways ad they have somehow mimicked the working ways of the authorities and in many cases, they have successfully infiltrated the governmental spheres. This business model is only possible under a clear scheme of rampant impunity. Impunity, however, is not exclusive to the PRI. Nor the PRI, PAN, or PRD can claim the monopoly of corruption, but what is worse is that none can claim full honesty in their acts either. The current security crisis in Mexico shows a crisis in the Mexican political party system. Corruption today is not only a problem of dishonesty and the correct use of public resources. It is the principal threat to Mexican democracy, governance, and national security.

Keywords: security, war on drugs, drug trafficking, Mexico, Latin America, United States

Procedia PDF Downloads 417
2133 Politico-Religious Connections to the January 6th Insurrection

Authors: Kirk Johnson, Gabriel Rubin

Abstract:

The January 6th Insurrection on the United States Capitol Building has been one of the most disturbing expressions of violence in American history. While there are numerous reasons that led to such aggression, there are destructive politico-religious ideologies and understandings, known as Christian Nationalism, White Christian Nationalism, and Christian Dominionism that influenced the actions of the January 6th insurrectionists. Such ideas are deeply rooted in the unification of church and state, a theocracy, embedded within the understanding that Biblical scripture is the blueprint on which the functioning of the American government should follow. In addition, the concept of racial hierarchy is embedded in politico-religious principles of White Christian Nationalism. This paper will examine how Christian Dominionism is one factor that influenced the January 6th Insurrection.

Keywords: January 6th insurrection, dominionism, Christian nationalism, polygenism

Procedia PDF Downloads 77
2132 Undeserving Hybrids: The Enduring Legacy of Eugenics in Conservation

Authors: Maria-Vittoria Carminati

Abstract:

Conservations laws do not protect hybrids. From the United States’ Endangered Species Act to the European Union’s conservation policies to the International Union for the Conservation of Nature’s Red List, hybrids don’t get the benefit of human preservation efforts. This paper tests the hypothesis that this practice is a byproduct of the co-birth of eugenics and conservation as twin fields and that while the first has been discredited and abandoned, the latter still bears the marks of its unfortunate primordial association. The research explores historical perspectives from so-called conservation luminaries such as Madison Grant, Ernst Mayr, and Charles Davenport and sheds light on how these influences continue to shape contemporary conservation approaches. The paper provides a comprehensive analysis of the implications of these factors on biodiversity conservation and the ethical considerations surrounding hybrid species protection.

Keywords: conservation, hybridization, eugenics, speciation, evolution

Procedia PDF Downloads 90
2131 A Contribution to Human Activities Recognition Using Expert System Techniques

Authors: Malika Yaici, Soraya Aloui, Sara Semchaoui

Abstract:

This paper deals with human activity recognition from sensor data. It is an active research area, and the main objective is to obtain a high recognition rate. In this work, a recognition system based on expert systems is proposed; the recognition is performed using the objects, object states, and gestures and taking into account the context (the location of the objects and of the person performing the activity, the duration of the elementary actions and the activity). The system recognizes complex activities after decomposing them into simple, easy-to-recognize activities. The proposed method can be applied to any type of activity. The simulation results show the robustness of our system and its speed of decision.

Keywords: human activity recognition, ubiquitous computing, context-awareness, expert system

Procedia PDF Downloads 118
2130 Performance Evaluation of the Classic seq2seq Model versus a Proposed Semi-supervised Long Short-Term Memory Autoencoder for Time Series Data Forecasting

Authors: Aswathi Thrivikraman, S. Advaith

Abstract:

The study is aimed at designing encoders for deciphering intricacies in time series data by redescribing the dynamics operating on a lower-dimensional manifold. A semi-supervised LSTM autoencoder is devised and investigated to see if the latent representation of the time series data can better forecast the data. End-to-end training of the LSTM autoencoder, together with another LSTM network that is connected to the latent space, forces the hidden states of the encoder to represent the most meaningful latent variables relevant for forecasting. Furthermore, the study compares the predictions with those of a traditional seq2seq model.

Keywords: LSTM, autoencoder, forecasting, seq2seq model

Procedia PDF Downloads 155
2129 Transformational Leadership in the United States to Negate Current Ethnocentrisms

Authors: Molly Meadows

Abstract:

Following the presidency of Donald J. Trump, Americans have become hyperaware of ethnocentrisms that plague the culture. The president's egoist ethics encouraged a divide between what the citizens of the US identified as just or unjust. In the race for global supremacy and leading ideology, fears have arisen, exacerbated by the ethnocentricity of the country's leader, pointing to the possible harmful ethical standards of competing nations. Due to the concept of ethical absolutism, an international code of ethics would not be possible, and the changes needed to eliminate the stigma surrounding other cultures of thought would need to come from the governing body of the US. As the current leading global ideology, the US would need its government to embody a transformational leadership style in order to unite the motivations of the citizens and encourage intercultural tolerance.

Keywords: ethics, transformational leadership, American politics, egoism, cultural intelligence, ethical relativism

Procedia PDF Downloads 95
2128 The Importance of Parental Projective Care in Perceived Parenting Effectiveness in African American Upper Middle Class Families

Authors: Susan D. Toliver

Abstract:

Within the professional research literature on parenting in the United States, there is a paucity of research on parenting within the African American or Black community. Research on parenting focused on African Americans within the upper middle class, who constitute a critical and growing sector within the African American population, is all but non-existent. Research to address this void is needed. Despite the progress that has been made toward eliminating the long-standing racial divides in U.S. society, these divides persist and continue to affect different experiences and opportunity structures for White Americans versus Black Americans, including those in the upper middle class. Achievement of middle and upper middle class status of adult heads of families has generally been seen as the route to greater success and well-being for their children. While higher family class status is positively correlated with these factors, the strength of the relationship between higher social class and success and well-being is weaker for Black American families as compared to White American families. In light of the realities of racial inequality, African American parents, including those who have achieved higher status, have unique concerns for their children. African American parents, on the basis of their own experiences and their sense of the world as being highly racialized, anticipate the kinds of experiences that their children are likely to encounter as they grow and mature from childhood to adulthood and beyond. Racial discrimination and macro and micro racial aggressions are continued sources of concern for these parents. On the basis of in-depth personal interviews with upper middle class African American parents, findings suggest that the parenting goals and strategies of African American parents are influenced by the continuing significance of race as a social divide, including in higher socio-economic strata, in the United States. Black American families' parenting practices differ from those of White American families and are inclusive of the unique factors that threaten the well-being of African American children. Specifically, parenting practices are shaped by parents' fears about the racial experiences that they anticipate that their children will encounter. Parents' perceptions of parental effectiveness are linked to their ability to prepare their children for success in confronting, understanding, and contextualizing racial inequalities and aggressions. Theories of Parental Projective Care are useful in understanding the special considerations and unique parenting goals and behaviors of higher status African Americans.

Keywords: African American parenting, parental projective care, parenting effectiveness, racial socialization, upper middle class parenting

Procedia PDF Downloads 141
2127 The Principle of a Thought Formation: The Biological Base for a Thought

Authors: Ludmila Vucolova

Abstract:

The thought is a process that underlies consciousness and cognition and understanding its origin and processes is a longstanding goal of many academic disciplines. By integrating over twenty novel ideas and hypotheses of this theoretical proposal, we can speculate that thought is an emergent property of coded neural events, translating the electro-chemical interactions of the body with its environment—the objects of sensory stimulation, X, and Y. The latter is a self- generated feedback entity, resulting from the arbitrary pattern of the motion of a body’s motor repertory (M). A culmination of these neural events gives rise to a thought: a state of identity between an observed object X and a symbol Y. It manifests as a “state of awareness” or “state of knowing” and forms our perception of the physical world. The values of the variables of a construct—X (object), S1 (sense for the perception of X), Y (object), S2 (sense for perception of Y), and M (motor repertory that produces Y)—will specify the particular conscious percept at any given time. The proposed principle of interaction between the elements of a construct (X, Y, S1, S2, M) is universal and applies for all modes of communication (normal, deaf, blind, deaf and blind people) and for various language systems (Chinese, Italian, English, etc.). The particular arrangement of modalities of each of the three modules S1 (5 of 5), S2 (1 of 3), and M (3 of 3) defines a specific mode of communication. This multifaceted paradigm demonstrates a predetermined pattern of relationships between X, Y, and M that passes from generation to generation. The presented analysis of a cognitive experience encompasses the key elements of embodied cognition theories and unequivocally accords with the scientific interpretation of cognition as the mental action or process of acquiring knowledge and understanding through thought, experience, and the senses, and cognition means thinking and awareness. By assembling the novel ideas presented in twelve sections, we can reveal that in the invisible “chaos”, there is an order, a structure with landmarks and principles of operations and mental processes (thoughts) are physical and have a biological basis. This innovative proposal explains the phenomenon of mental imagery; give the first insight into the relationship between mental states and brain states, and support the notion that mind and body are inseparably connected. The findings of this theoretical proposal are supported by the current scientific data and are substantiated by the records of the evolution of language and human intelligence.

Keywords: agent, awareness, cognitive, element, experience, feedback, first person, imagery, language, mental, motor, object, sensory, symbol, thought

Procedia PDF Downloads 384
2126 Market Integration in the ECCAS Sub-Region

Authors: Mouhamed Mbouandi Njikam

Abstract:

This work assesses the trade potential of countries in the Economic Community of Central Africa States (ECCAS). The gravity model of trade is used to evaluate the trade flows of member countries, and to compute the trade potential index of ECCAS during 1995-2010. The focus is on the removal of tariffs and non-tariff barriers in the sub-region. Estimates from the gravity model are used for the calculation of the sub-region’s commercial potential. Its three main findings are: (i) the background research shows a low level of integration in the sub-region and open economies; (ii) a low level of industrialization and diversification are the main factors reducing trade potential in the sub-region; (iii) the trade creation predominate on the deflections of trade between member countries.

Keywords: gravity model, ECCAS, trade flows, trade potential, regional cooperation

Procedia PDF Downloads 426