Search results for: computer simulated person
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 5338

Search results for: computer simulated person

5158 The Implications of Person-Organisation Spirituality Fit on Employees’ Ethical and Spiritual Leadership Behaviours: Insights from Jordan

Authors: Tamer Koburtay, Radi Haloub

Abstract:

Person-Organization fit theory concerns how people flourish in a workplace that is congruence with their values and other traits. This paper seeks to highlight the theoretical relevance that workplace spirituality may add to the existing theory development of the P-O fit. In specific, it aims to empirically test the emerged framework that encompasses how workplace and self-spirituality match may enhance the perceived P-O fit, and how such a fit can enhance both employees’ ethical behaviors (i.e., humanism and honesty) and spiritual leadership behaviors. Drawing on a survey of the private and public sectors in Jordan, the results reveal that increasing the match in workplace and employees’ spirituality positively enhances the perceived P-O fit. Further, ethical and spiritual behaviors were found to be positively linked with a higher P-O fit. The importance of this paper is by generating a concept (i.e., P-O spirituality fit) beyond the already vast literature on P-O fit.

Keywords: ethical behavior, leadership, P-O fit, spirituality, leadership

Procedia PDF Downloads 156
5157 Modern Era Applications of Mathematics and Computer Science

Authors: Ogunrinde Roseline Bosede, Ogunrinde Rowland Rotimi

Abstract:

Just as the development of ideas of early mathematics was essentially motivated by social needs, the invention of the computer was equally inspired by social needs. The early years of the twenty-first century have been remarkable in advances in mathematical and computer sciences. Mathematical and computer sciences work are fast becoming an increasingly integral and essential components of a growing catalogues of areas of interests in biology, business, military, medicine, social sciences, advanced design, advanced materials, climate, banking and finance, and many other fields of disciplines. This paper seeks to highlight the trend and impacts of the duo in the technological advancements being witnessed in our today's world.

Keywords: computer, impacts, mathematics, modern society

Procedia PDF Downloads 400
5156 Acquisition of Overt Pronoun Constraint in L2 Turkish by Adult Korean Speakers

Authors: Oktay Cinar

Abstract:

The aim of this study is to investigate the acquisition of Overt Pronoun Constraint (OPC) by adult Korean L2 Turkish speakers in order to find out how constraints regulating the syntax of null and overt subjects are acquired. OPC is claimed to be a universal feature of all null subject languages restricting the co-indexation between overt embedded pronoun and quantified or wh-question antecedents. However, there is no such restriction when the embedded subject is null or the antecedent is a referential subject. Considered as a principle of Universal Grammar (UG), OPC knowledge of L2 speakers has been widely tested with different language pairs. In the light of previous studies on OPC, it can be argued that L2 learners display early sensitivity to OPC constraints during their interlanguage grammar development. Concerning this, the co-indexation between overt embedded pronoun o (third person pronoun) and referential matrix subject is claimed to be controversial in Turkish, which poses problems with the universality of OPC. However, the current study argues against this claim by providing evidence from advanced Korean speakers that OPC is universal to all null subject languages and OPC knowledge can be accessed with direct access to UG. In other words, the performances of adult Korean speakers on the syntax of null and overt subjects are tested to support this claim. In order to test this, OPC task is used. 15 advanced speakers and a control group of adult native Turkish participants are instructed to determine the co-reference relationship between the subject of embedded clause, either overt pronominal o or null, and the subject of the matrix clause, either quantified pronoun and wh-question or referential antecedent. They are asked to select the interpretation of the embedded subject, either as the same person as in the matrix subject or another person who is not the same person in the matrix subject. These relations are represented with four conditions, and each condition has four questions (16 questions in total). The results claim that both control group and Korean L2 Turkish speakers display sensitivity to all constraints that OPC has, which suggests that OPC works in Turkish as well.

Keywords: adult Korean speakers, binding theory, generative second language acquisition, overt pronoun constraint

Procedia PDF Downloads 309
5155 Design and Study of a Low Power High Speed 8 Transistor Based Full Adder Using Multiplexer and XOR Gates

Authors: Biswarup Mukherjee, Aniruddha Ghoshal

Abstract:

In this paper, we propose a new technique for implementing a low power high speed full adder using 8 transistors. Full adder circuits are used comprehensively in Application Specific Integrated Circuits (ASICs). Thus it is desirable to have high speed operation for the sub components. The explored method of implementation achieves a high speed low power design for the full adder. Simulated results indicate the superior performance of the proposed technique over conventional 28 transistor CMOS full adder. Detailed comparison of simulated results for the conventional and present method of implementation is presented.

Keywords: high speed low power full adder, 2-T MUX, 3-T XOR, 8-T FA, pass transistor logic, CMOS (complementary metal oxide semiconductor)

Procedia PDF Downloads 348
5154 Code Switching and Code Mixing among Adolescents in Kashmir

Authors: Sarwat un Nisa

Abstract:

One of the remarkable gifts that a human being is blessed with is the ability to speak using a combination of sounds. Different combinations of sounds combine to form a word which in turn make a sentence and therefore give birth to a language. A person can either be a monolingual, i.e., can speak one language or bilingual, i.e., can speak more than one language. Whether a person speaks one language or multiple languages or in whatever language a person speaks, the main aim is to communicate, express ideas, feelings or thoughts. Sometimes the choice of a language is deliberate and sometimes it is a habitual act. The language which is used to put our ideas across speaks many things about our cultural, linguistic and ethnic identities. It can never be claimed that bilinguals are better than monolinguals in terms of linguistic skills, bilinguals or multilinguals have more than one language at their disposal. Therefore, how effectively two languages are used by the same person keeps linguists always intrigued. The most prominent and common features found in the speech of bilingual speakers are code switching and code mixing. The aim of the present paper is to explore these features among the adolescent speakers of Kashmir. The reason for studying the linguistics behavior of adolescents is the age when a person is neither an adult nor a child. They want to drift away from the norms and make a new norm for themselves. Therefore, how their linguistics skills are influenced by their age is of great interest because it can set the trend for the future generation. Kashmir is a multilingual society where three languages, i.e., Kashmiri, Urdu, and English are regularly used by the speakers, especially the educated ones. Kashmiri is widely used at home or mostly among adults. Urdu is the official language, and English is used in schools and for most of the written official correspondences. Thus, it is not uncommon to find these three languages coming in contact with each other quite frequently. The language contact results in the code switching and code mixing. In this paper different aspects of code switching and code mixing are discussed. Research Method: The data were collected from the different districts of Kashmir. The informants did not have prior knowledge of the survey. The situation was spontaneous and natural. The topics were introduced by the interviewer to the group of informants which comprised of three participants. They were asked to discuss the topic, most of the times without any intervention of the interviewer. Along with conversations, the informants also filled in written questionnaires comprising sociolinguistic questions. Questionnaires were analysed to get an idea about the sociolinguistic attitude of the informants. Percentage, frequency, and average were used as statistical tools to analyse the data. Conclusions were drawn taking into consideration of interpretations of both speech samples and questionnaires.

Keywords: code mixing, code switching, Kashmir, bilingualism

Procedia PDF Downloads 144
5153 Connecting MRI Physics to Glioma Microenvironment: Comparing Simulated T2-Weighted MRI Models of Fixed and Expanding Extracellular Space

Authors: Pamela R. Jackson, Andrea Hawkins-Daarud, Cassandra R. Rickertsen, Kamala Clark-Swanson, Scott A. Whitmire, Kristin R. Swanson

Abstract:

Glioblastoma Multiforme (GBM), the most common primary brain tumor, often presents with hyperintensity on T2-weighted or T2-weighted fluid attenuated inversion recovery (T2/FLAIR) magnetic resonance imaging (MRI). This hyperintensity corresponds with vasogenic edema, however there are likely many infiltrating tumor cells within the hyperintensity as well. While MRIs do not directly indicate tumor cells, MRIs do reflect the microenvironmental water abnormalities caused by the presence of tumor cells and edema. The inherent heterogeneity and resulting MRI features of GBMs complicate assessing disease response. To understand how hyperintensity on T2/FLAIR MRI may correlate with edema in the extracellular space (ECS), a multi-compartmental MRI signal equation which takes into account tissue compartments and their associated volumes with input coming from a mathematical model of glioma growth that incorporates edema formation was explored. The reasonableness of two possible extracellular space schema was evaluated by varying the T2 of the edema compartment and calculating the possible resulting T2s in tumor and peripheral edema. In the mathematical model, gliomas were comprised of vasculature and three tumor cellular phenotypes: normoxic, hypoxic, and necrotic. Edema was characterized as fluid leaking from abnormal tumor vessels. Spatial maps of tumor cell density and edema for virtual tumors were simulated with different rates of proliferation and invasion and various ECS expansion schemes. These spatial maps were then passed into a multi-compartmental MRI signal model for generating simulated T2/FLAIR MR images. Individual compartments’ T2 values in the signal equation were either from literature or estimated and the T2 for edema specifically was varied over a wide range (200 ms – 9200 ms). T2 maps were calculated from simulated images. T2 values based on simulated images were evaluated for regions of interest (ROIs) in normal appearing white matter, tumor, and peripheral edema. The ROI T2 values were compared to T2 values reported in literature. The expanding scheme of extracellular space is had T2 values similar to the literature calculated values. The static scheme of extracellular space had a much lower T2 values and no matter what T2 was associated with edema, the intensities did not come close to literature values. Expanding the extracellular space is necessary to achieve simulated edema intensities commiserate with acquired MRIs.

Keywords: extracellular space, glioblastoma multiforme, magnetic resonance imaging, mathematical modeling

Procedia PDF Downloads 235
5152 Fault Location Identification in High Voltage Transmission Lines

Authors: Khaled M. El Naggar

Abstract:

This paper introduces a digital method for fault section identification in transmission lines. The method uses digital set of the measured short circuit current to locate faults in electrical power systems. The digitized current is used to construct a set of overdetermined system of equations. The problem is then constructed and solved using the proposed digital optimization technique to find the fault distance. The proposed optimization methodology is an application of simulated annealing optimization technique. The method is tested using practical case study to evaluate the proposed method. The accurate results obtained show that the algorithm can be used as a powerful tool in the area of power system protection.

Keywords: optimization, estimation, faults, measurement, high voltage, simulated annealing

Procedia PDF Downloads 392
5151 Enhanced Test Scheme based on Programmable Write Time for Future Computer Memories

Authors: Nor Zaidi Haron, Fauziyah Salehuddin, Norsuhaidah Arshad, Sani Irwan Salim

Abstract:

Resistive random access memories (RRAMs) are one of the main candidates for future computer memories. However, due to their tiny size and immature device technology, the quality of the outgoing RRAM chips is seen as a serious issue. Defective RRAM cells might behave differently than existing semiconductor memories (Dynamic RAM, Static RAM, and Flash), meaning that they are difficult to be detected using existing test schemes. This paper presents an enhanced test scheme, referred to as Programmable Short Write Time (PSWT) that is able to improve the detection of faulty RRAM cells. It is developed by applying multiple weak write operations, each with different time durations. The test circuit embedded in the RRAM chip is made programmable in order to supply different weak write times during testing. The RRAM electrical model is described using Verilog-AMS language and is simulated using HSPICE simulation tools. Simulation results show that the proposed test scheme offers better open-resistive fault detection compared to existing test schemes.

Keywords: memory fault, memory test, design-for-testability, resistive random access memory

Procedia PDF Downloads 387
5150 Toward the Destigmatizing the Autism Label: Conceptualizing Celebratory Technologies

Authors: LouAnne Boyd

Abstract:

From the perspective of self-advocates, the biggest unaddressed problem is not the symptoms of an autism spectrum diagnosis but the social stigma that accompanies autism. This societal perspective is in contrast to the focus on the majority of interventions. Autism interventions, and consequently, most innovative technologies for autism, aim to improve deficits that occur within the person. For example, the most common Human-Computer Interaction research projects in assistive technology for autism target social skills from a normative perspective. The premise of the autism technologies is that difficulties occur inside the body, hence, the medical model focuses on ways to improve the ailment within the person. However, other technological approaches to support people with autism do exist. In the realm of Human Computer Interaction, there are other modes of research that provide critique of the medical model. For example, critical design, whose intended audience is industry or other HCI researchers, provides products that are the opposite of interventionist work to bring attention to the misalignment between the lived experience and the societal perception of autism. For example, parodies of interventionist work exist to provoke change, such as a recent project called Facesavr, a face covering that helps allistic adults be more independent in their emotional processing. Additionally, from a critical disability studies’ perspective, assistive technologies perpetuate harmful normalizing behaviors. However, these critical approaches can feel far from the frontline in terms of taking direct action to positively impact end users. From a critical yet more pragmatic perspective, projects such as Counterventions lists ways to reduce the likelihood of perpetuating ableism in interventionist’s work by reflectively analyzing a series of evolving assistive technology projects through a societal lens, thus leveraging the momentum of the evolving ecology of technologies for autism. Therefore, all current paradigms fall short of addressing the largest need—the negative impact of social stigma. The current work introduces a new paradigm for technologies for autism, borrowing from a paradigm introduced two decades ago around changing the narrative related to eating disorders. It is the shift from reprimanding poor habits to celebrating positive aspects of eating. This work repurposes Celebratory Technology for Neurodiversity and intended to reduce social stigma by targeting for the public at large. This presentation will review how requirements were derived from current research on autism social stigma as well as design sessions with autistic adults. Congruence between these two sources revealed three key design implications for technology: provide awareness of the autistic experience; generate acceptance of the neurodivergence; cultivate an appreciation for talents and accomplishments of neurodivergent people. The current pilot work in Celebratory Technology offers a new paradigm for supporting autism by shifting the burden of change from the person with autism to address changing society’s biases at large. Shifting the focus of research outside of the autistic body creates a new space for a design that extends beyond the bodies of a few and calls on all to embrace humanity as a whole.

Keywords: neurodiversity, social stigma, accessibility, inclusion, celebratory technology

Procedia PDF Downloads 72
5149 Hybrid System Configurations and Charging Strategies for Isolated Electric Tuk-Tuk Charging Station in South Africa

Authors: L. Bokopane, K. Kusakana, H. J. Vermaark

Abstract:

The success of renewable powered electric vehicle charging station in isolated areas depends highly on the availability and sustainability of renewable resources all year round at a selected location. The main focus of this paper is to discuss the possible charging strategies that could be implemented to find the best possible configuration of an electric Tuk-Tuk charging station at a given location within South Africa. The charging station is designed, modeled and simulated to evaluate its performances. The techno-economic analysis of different feasible supply configurations of the charging station using renewable energies is simulated using HOMER software and the results compared in order to select the best possible charging strategies in terms of cost of energy consumed.

Keywords: electric tuk-tuk, renewable energy, energy Storage, hybrid systems, HOMER

Procedia PDF Downloads 513
5148 Dynamic Building Simulation Based Study to Understand Thermal Behavior of High-Rise Structural Timber Buildings

Authors: Timothy O. Adekunle, Sigridur Bjarnadottir

Abstract:

Several studies have investigated thermal behavior of buildings with limited studies focusing on high-rise buildings. Of the limited investigations that have considered thermal performance of high-rise buildings, only a few studies have considered thermal behavior of high-rise structural sustainable buildings. As a result, this study investigates the thermal behavior of a high-rise structural timber building. The study aims to understand the thermal environment of a high-rise structural timber block of apartments located in East London, UK by comparing the indoor environmental conditions at different floors (ground and upper floors) of the building. The environmental variables (temperature and relative humidity) were measured at 15-minute intervals for a few weeks in the summer of 2012 to generate data that was considered for calibration and validation of the simulated results. The study employed mainly dynamic thermal building simulation using DesignBuilder by EnergyPlus and supplemented with environmental monitoring as major techniques for data collection and analysis. The weather file (Test Reference Years- TRYs) for the 2000s from the weather generator carried out by the Prometheus Group was considered for the simulation since the study focuses on investigating thermal behavior of high-rise structural timber buildings in the summertime and not in extreme summertime. In this study, the simulated results (May-September of the 2000s) will be the focus of discussion, but the results will be briefly compared with the environmental monitoring results. The simulated results followed a similar trend with the findings obtained from the short period of the environmental monitoring at the building. The results revealed lower temperatures are often predicted (at least 1.1°C lower) at the ground floor than the predicted temperatures at the upper floors. The simulated results also showed that higher temperatures are predicted in spaces at southeast facing (at least 0.5°C higher) than spaces in other orientations across the floors considered. There is, however, a noticeable difference between the thermal environment of spaces when the results obtained from the environmental monitoring are compared with the simulated results. The field survey revealed higher temperatures were recorded in the living areas (at least 1.0°C higher) while higher temperatures are predicted in bedrooms (at least 0.9°C) than living areas for the simulation. In addition, the simulated results showed spaces on lower floors of high-rise structural timber buildings are predicted to provide more comfortable thermal environment than spaces on upper floors in summer, but this may not be the same in wintertime due to high upward movement of hot air to spaces on upper floors.

Keywords: building simulation, high-rise, structural timber buildings, sustainable, temperatures, thermal behavior

Procedia PDF Downloads 177
5147 Simulation of Mid Infrared Supercontinuum Generation in Silicon Germanium Photonic Waveguides for Gas Spectroscopy

Authors: Proficiency Munsaka, Peter Baricholo, Erich Rohwer

Abstract:

Pulse evolutions along the 5 cm long, 6.0 ×4.2 μm² cross-section silicon germanium (SiGe) photonic waveguides were simulated and compared with experiments. Simulations were carried out by solving a generalized nonlinear Schrodinger equation (GNLSE) for an optical pulse evolution along the length of the SiGe photonic waveguides by the split-step Fourier method (SSFM). The solution obtained from the SSFM gave the pulse envelope in both time and spectral domain calculated at each distance step along the propagation direction. The SiGe photonic waveguides were pumped in an anomalous group velocity dispersion (GVD) regime using a 4.7 μm, 210 fs femtosecond laser to produce a significant supercontinuum (SC). The simulated propagation of ultrafast pulse along the SiGe photonic waveguides produced an SC covering the atmospheric window (2.5-8.5 μm) containing the molecular fingerprints for important gases. Thus, the mid-infrared supercontinuum generation in SiGe photonic waveguides system can be commercialized for gas spectroscopy for detecting gases that include CO₂, CH₄, H₂O, SO₂, SO₃, NO₂, H₂S, CO, and NO at trace level using absorption spectroscopy technique. The simulated profile evolutions are spectrally and temporally similar to those obtained by other researchers. Obtained evolution profiles are characterized by pulse compression, Soliton fission, dispersive wave generation, stimulated Raman Scattering, and Four Wave mixing.

Keywords: silicon germanium photonic waveguide, supercontinuum generation, spectroscopy, mid infrared

Procedia PDF Downloads 131
5146 Simulation of Corn Yield in Carmen, North Cotabato, Philippines Using Aquacrop Model

Authors: Marilyn S. Painagan

Abstract:

This general objective of the study was to apply the AquaCrop model to the conditions in the municipality of Carmen, North Cotabato in terms of predicting corn yields in this area and determine the influence of rainfall and soil depth on simulated yield. The study revealed wide disparity in monthly yields as a consequence of similarly varying monthly rainfall magnitudes. It also found out that simulated yield varies with the depth of soil, which in this case was clay loam, the predominant soil in the study area. The model was found to be easy to use even with limited data and shows a vast potential for various farming and policy applications, such as formulation of a cropping calendar.

Keywords: aquacrop, evapotranspiration, crop modelling, crop simulation

Procedia PDF Downloads 251
5145 The Effect of Supplementary Cementitious Materials on the Quality of Passive Oxide Film Developed on Steel Reinforcement Bars in Simulated Concrete Pore Solution

Authors: M. S. Ashraf, Raja Rizwan Hussain, A. M. Alhozaimy, A. I. Al-Negheimish

Abstract:

The effect of supplementary cementitious materials (SCMs) with concrete pore solution on the protective properties of the oxide films that form on reinforcing steel bars has been experimentally investigated using electrochemical impedance spectroscopy (EIS) and Tafel Scan. The tests were conducted on oxide films grown in saturated calcium hydroxide solutions that included different representative amounts of NaOH and KOH which are the compounds commonly observed in ordinary portland cement concrete pore solution. In addition to that, commonly used mineral admixtures (silica fume, natural pozzolan and fly ash) were also added to the simulated concrete pore solution. The results of electrochemical tests show that supplementary cementitious materials do have an effect on the protective properties of the passive oxide film. In particular, silica fume has been shown to have a negative influence on the film quality though it has positive effect on the concrete properties. Fly ash and natural pozzolan increase the protective qualities of the passive film. The research data in this area is very limited in the past and needed further investigation.

Keywords: supplementary cementitious materials (SCMs), passive film, EIS, Tafel scan, rebar, concrete, simulated concrete pore solution (SPS)

Procedia PDF Downloads 394
5144 Adsorption Performance of Hydroxyapatite Powder in the Removal of Dyes in Wastewater

Authors: Aderonke A. Okoya, Oluwaseun A. Somoye, Omotayo S. Amuda, Ifeanyi E. Ofoezie

Abstract:

This study assessed the efficiency of Hydroxyapatite Powder (HAP) in the removal of dyes in wastewater in comparison with Commercial Activated Carbon (CAC). This was with a view to developing cost effective method that could be more environment friendly. The HAP and CAC were used as adsorbent while Indigo dye was used as the adsorbate. The batch adsorption experiment was carried out by varying initial concentrations of the indigo dye, contact time and adsorbent dosage. Adsorption efficiency was classified by adsorption Isotherms using Langmuir, Freundlich and D-R isotherm models. Physicochemical parameters of a textile industry wastewater were determined before and after treatment with the adsorbents. The results from the batch experiments showed that at initial concentration of 125 mg/L of adsorbate in simulated wastewater, 0.9276 ± 0.004618 mg/g and 3.121 ± 0.006928 mg/g of indigo adsorbed per unit time (qt) of HAP and CAC respectively. The ratio of HAP to CAC required for the removal of indigo dye in simulated wastewater was 2:1. The isotherm model of the simulated wastewater fitted well to Freundlich model, the adsorption intensity (1/n) presented 1.399 and 0.564 for HAP and CAC, respectively. This revealed that the HAP had weaker bond than the electrostatic interactions which were present in CAC. The values of some physicochemical parameters (acidity, COD, Cr, Cd) of textile wastewater when treated with HAP decreased. The study concluded that HAP, an environment-friendly adsorbent, could be effectively used to remove dye from textile industrial wastewater with added advantage of being regenerated.

Keywords: adsorption isotherm, commercial activated carbon, hydroxyapatite powder, indigo dye, textile wastewater

Procedia PDF Downloads 242
5143 Deployment of Information and Communication Technology (ICT) to Reduce Occurrences of Terrorism in Nigeria

Authors: Okike Benjamin

Abstract:

Terrorism is the use of violence and threat to intimidate or coerce a person, group, society or even government especially for political purposes. Terrorism may be a way of resisting government by some group who may feel marginalized. It could also be a way of expressing displeasure over the activities of government. On 26th December, 2009, US placed Nigeria as a terrorist nation. Recently, the occurrences of terrorism in Nigeria have increased considerably. In Jos, Plateau state, Nigeria, there was a bomb blast which claimed many lives on the eve of 2010 Christmas. Similarly, there was another bomb blast in Mugadishi (Sani Abacha) Barracks Mammy market on the eve of 2011 New Year. For some time now, it is no longer news that bomb exploded in some Northern part of Nigeria. About 25 years ago, stopping terrorism in America by the Americans relied on old-fashioned tools such as strict physical security at vulnerable places, intelligence gathering by government agents, or individuals, vigilance on the part of all citizens, and a sense of community in which citizens do what could be done to protect each other. Just as technology has virtually been used to better the way many other things are done, so also this powerful new weapon called computer technology can be used to detect and prevent terrorism not only in Nigeria, but all over the world. This paper will x-ray the possible causes and effects of bomb blast, which is an act of terrorism and suggest ways in which Explosive Detection Devices (EDDs) and computer software technology could be deployed to reduce the occurrences of terrorism in Nigeria. This become necessary with the abduction of over 200 schoolgirls in Chibok, Borno State from their hostel by members of Boko Haram sect members on 14th April, 2014. Presently, Barrack Obama and other world leaders have sent some of their military personnel to help rescue those innocent schoolgirls whose offence is simply seeking to acquire western education which the sect strongly believe is forbidden.

Keywords: terrorism, bomb blast, computer technology, explosive detection devices, Nigeria

Procedia PDF Downloads 261
5142 Saadi: The Matter of Reality and Imagination

Authors: Mozhde Shafie, Nahid Naderi, Mandana Mangeli

Abstract:

Is it true to say that Saadi was an idealized embodiment of his moral teachings in Gulistan and Boustan? The body of criticism on Saadi’s works suggests that his biography provides no clear and valid information to judge about the extent to which Saadi acted what he preached. His moral teachings depict a sort of individual and social morality which is defined in relation to power and falls in the category of political ethics. Political ethics appear as for the noble and the subordinate in Gulistan and Boustan. Ethics for the noble include all his teachings for governors and rulers in eulogies. On the other hand, ethics for the subordinate include all his suggestions for the public in relation to power position. Here, Saadi puts forward some conservative recommendations that trigger some contemporary critical commentaries. However, there are some cases where he takes up a third person narrative position to narrate the story of a king and a mendicant. In these stories, the mendicant is a witty man with bitter criticism on society, implying that one should relinquish earthly pleasures and advantages if he wants his criticism to be acceptable. First person narratives fall in two categories determinate and indeterminate narratives. Indirect speeches reflecting biographical facts are indeterminate narratives which give no information about the poet’s personality. Other narratives are more of an autobiography that report probable observations. These latter narratives demonstrate Saadi as a man quick at repartee that feels free to disclose his poverty and some cases of impiety. Therefore, they provide no idealized picture of the poet in terms of ethical principles.

Keywords: Saadi, ethics, Boustan, Gulistan, first-person narrative

Procedia PDF Downloads 402
5141 An ANOVA-based Sequential Forward Channel Selection Framework for Brain-Computer Interface Application based on EEG Signals Driven by Motor Imagery

Authors: Forouzan Salehi Fergeni

Abstract:

Converting the movement intents of a person into commands for action employing brain signals like electroencephalogram signals is a brain-computer interface (BCI) system. When left or right-hand motions are imagined, different patterns of brain activity appear, which can be employed as BCI signals for control. To make better the brain-computer interface (BCI) structures, effective and accurate techniques for increasing the classifying precision of motor imagery (MI) based on electroencephalography (EEG) are greatly needed. Subject dependency and non-stationary are two features of EEG signals. So, EEG signals must be effectively processed before being used in BCI applications. In the present study, after applying an 8 to 30 band-pass filter, a car spatial filter is rendered for the purpose of denoising, and then, a method of analysis of variance is used to select more appropriate and informative channels from a category of a large number of different channels. After ordering channels based on their efficiencies, a sequential forward channel selection is employed to choose just a few reliable ones. Features from two domains of time and wavelet are extracted and shortlisted with the help of a statistical technique, namely the t-test. Finally, the selected features are classified with different machine learning and neural network classifiers being k-nearest neighbor, Probabilistic neural network, support-vector-machine, Extreme learning machine, decision tree, Multi-layer perceptron, and linear discriminant analysis with the purpose of comparing their performance in this application. Utilizing a ten-fold cross-validation approach, tests are performed on a motor imagery dataset found in the BCI competition III. Outcomes demonstrated that the SVM classifier got the greatest classification precision of 97% when compared to the other available approaches. The entire investigative findings confirm that the suggested framework is reliable and computationally effective for the construction of BCI systems and surpasses the existing methods.

Keywords: brain-computer interface, channel selection, motor imagery, support-vector-machine

Procedia PDF Downloads 50
5140 Hybrid Approach for the Min-Interference Frequency Assignment

Authors: F. Debbat, F. T. Bendimerad

Abstract:

The efficient frequency assignment for radio communications becomes more and more crucial when developing new information technologies and their applications. It is consists in defining an assignment of frequencies to radio links, to be established between base stations and mobile transmitters. Separation of the frequencies assigned is necessary to avoid interference. However, unnecessary separation causes an excess requirement for spectrum, the cost of which may be very high. This problem is NP-hard problem which cannot be solved by conventional optimization algorithms. It is therefore necessary to use metaheuristic methods to solve it. This paper proposes Hybrid approach based on simulated annealing (SA) and Tabu Search (TS) methods to solve this problem. Computational results, obtained on a number of standard problem instances, testify the effectiveness of the proposed approach.

Keywords: cellular mobile communication, frequency assignment problem, optimization, tabu search, simulated annealing

Procedia PDF Downloads 385
5139 Familiarity with Nursing and Description of Nurses Duties

Authors: Narges Solaymani

Abstract:

Definition of Nurse: Nurse: A person who is educated and skilled in the field of scientific principles and professional skills of health care, treatment, and medical training of patients. Nursing is a very important profession in the societies of the world. Although in the past, all caregivers of the sick and disabled were called nurses, nowadays, a nurse is a person who has a university education in this field. There are nurses in bachelor's, master's, and doctoral degrees in nursing. New courses have been launched in the master's degree based on duty-oriented nurses. A nurse cannot have an independent treatment center but is a member of the treatment team in established treatment centers such as hospitals, clinics, or offices. Nurses can establish counseling centers and provide nursing services at home. According to the standards, the number of nurses should be three times the number of doctors or twice the number of hospital beds, or there should be three nurses for every thousand people. Also, international standards show that in the internal and surgical department, every 4 to 6 patients should have a nurse.

Keywords: nurse, intensive care, CPR, bandage

Procedia PDF Downloads 68
5138 Evaluation of Ceres Wheat and Rice Model for Climatic Conditions in Haryana, India

Authors: Mamta Rana, K. K. Singh, Nisha Kumari

Abstract:

The simulation models with its soil-weather-plant atmosphere interacting system are important tools for assessing the crops in changing climate conditions. The CERES-Wheat & Rice vs. 4.6 DSSAT was calibrated and evaluated for one of the major producers of wheat and rice state- Haryana, India. The simulation runs were made under irrigated conditions and three fertilizer applications dose of N-P-K to estimate crop yield and other growth parameters along with the phenological development of the crop. The genetic coefficients derived by iteratively manipulating the relevant coefficients that characterize the phenological process of wheat and rice crop to the best fit match between the simulated and observed anthesis, physological maturity and final grain yield. The model validated by plotting the simulated and remote sensing derived LAI. LAI product from remote sensing provides the edge of spatial, timely and accurate assessment of crop. For validating the yield and yield components, the error percentage between the observed and simulated data was calculated. The analysis shows that the model can be used to simulate crop yield and yield components for wheat and rice cultivar under different management practices. During the validation, the error percentage was less than 10%, indicating the utility of the calibrated model for climate risk assessment in the selected region.

Keywords: simulation model, CERES-wheat and rice model, crop yield, genetic coefficient

Procedia PDF Downloads 305
5137 2D Monte Carlo Simulation of Grain Growth under Transient Conditions

Authors: K. R. Phaneesh, Anirudh Bhat, G. Mukherjee, K. T. Kashyap

Abstract:

Extensive Monte Carlo Potts model simulations were performed on 2D square lattice to investigate the effects of simulated higher temperatures effects on grain growth kinetics. A range of simulation temperatures (KTs) were applied on a matrix of size 10002 with Q-state 64, dispersed with a wide range of second phase particles, ranging from 0.001 to 0.1, and then run to 100,000 Monte Carlo steps. The average grain size, the largest grain size and the grain growth exponent were evaluated for all particle fractions and simulated temperatures. After evaluating several growth parameters, the critical temperature for a square lattice, with eight nearest neighbors, was found to be KTs = 0.4.

Keywords: average grain size, critical temperature, grain growth exponent, Monte Carlo steps

Procedia PDF Downloads 524
5136 Changes of First-Person Pronoun Pragmatic Functions in Three Historical Chinese Texts

Authors: Cher Leng Lee

Abstract:

The existence of multiple first-person pronouns (1PPs) in classical Chinese is an issue that has not been resolved despite linguists using the grammatical perspective. This paper proposes pragmatics as a viable solution. There is also a lack of research exploring the evolving usage patterns of 1PPs within the historical context of Chinese language use. Such research can help us comprehend the changes and developments of these linguistic elements. To fill these research gaps, we use the diachronic pragmatics approach to contrast the functions of Chinese 1PPs in three representative texts from three different historical periods: The Analects (The Spring and Autumn Period), The Grand Scribe’s Records (Grand Records) (Qin and Han Period), and A New Account of Tales of the World (New Account) (The Wei, Jin and Southern and Northern Period). The 1PPs of these texts are manually identified and classified according to the pragmatic functions in the given contexts to observe their historical changes, understand the factors that contribute to these changes, and provide possible answers to the development of how wo became the only 1PP in today’s spoken Mandarin.

Keywords: historical, Chinese, pronouns, pragmatics

Procedia PDF Downloads 54
5135 A Digital Filter for Symmetrical Components Identification

Authors: Khaled M. El-Naggar

Abstract:

This paper presents a fast and efficient technique for monitoring and supervising power system disturbances generated due to dynamic performance of power systems or faults. Monitoring power system quantities involve monitoring fundamental voltage, current magnitudes, and their frequencies as well as their negative and zero sequence components under different operating conditions. The proposed technique is based on simulated annealing optimization technique (SA). The method uses digital set of measurements for the voltage or current waveforms at power system bus to perform the estimation process digitally. The algorithm is tested using different simulated data to monitor the symmetrical components of power system waveforms. Different study cases are considered in this work. Effects of number of samples, sampling frequency and the sample window size are studied. Results are reported and discussed.

Keywords: estimation, faults, measurement, symmetrical components

Procedia PDF Downloads 465
5134 Dynamic Analysis and Design of Lower Extremity Power-Assisted Exoskeleton

Authors: Song Shengli, Tan Zhitao, Li Qing, Fang Husheng, Ye Qing, Zhang Xinglong

Abstract:

Lower extremity power-assisted exoskeleton (LEPEX) is a kind of wearable electromechanical integration intelligent system, walking in synchronization with the wearer, which can assist the wearer walk by means of the driver mounted in the exoskeleton on each joint. In this paper, dynamic analysis and design of the LEPEX are performed. First of all, human walking process is divided into single leg support phase, double legs support phase and ground collision model. The three kinds of dynamics modeling is established using the Lagrange method. Then, the flat walking and climbing stairs dynamic information such as torque and power of lower extremity joints is derived for loading 75kg according to scholar Stansfield measured data of flat walking and scholars R. Riener measured data of climbing stair respectively. On this basis, the joint drive way in the sagittal plane is determined, and the structure of LEPEX is designed. Finally, the designed LEPEX is simulated under ADAMS by using a person’s joint sports information acquired under flat walking and climbing stairs. The simulation result effectively verified the correctness of the structure.

Keywords: kinematics, lower extremity exoskeleton, simulation, structure

Procedia PDF Downloads 425
5133 Civil Liability for Digital Crimes

Authors: Pál Mészáros

Abstract:

The aim of this research topic is to examine civil law consequences caused by crimes committed in the digital space. During the commission of certain crimes, not only the rights of one person are violated, but also the rights of an entire institution, for example, if the information system of a university is attacked. The consequences of these crimes committed in the digital space may also be that the victim himself is liable to other third parties, for example, in the event that health data comes into the possession of unauthorized persons, and it can be proved that the service provider's IT system was inadequate. An interesting question may also be the civil liability of credit institutions if someone becomes a victim of fraud but is not expected from him/her to notice the fraud. In such a case, the liability of the credit institution may arise if they do not respond in time in the case of unauthorized bank transactions. Based on the above, the main topic of the research is the civil liability of the victim, or another person or company related to the victim in the case of damages caused by crimes.

Keywords: civil liability, digital crimes, transfer of responsibility, civil law

Procedia PDF Downloads 64
5132 Investigation of Heat Affected Zone of Steel P92 Using the Thermal Cycle Simulator

Authors: Petr Mohyla, Ivo Hlavatý, Jiří Hrubý, Lucie Krejčí

Abstract:

This work is focused on mechanical properties and microstructure of heat affected zone (HAZ) of steel P92. The thermal cycle simulator was used for modeling a fine grained zone of HAZ. Hardness and impact toughness were measured on simulated samples. Microstructural analysis using optical microscopy was performed on selected samples. Achieved results were compared with the values of a real welded joint. The thermal cycle simulator allows transferring the properties of very small HAZ to the sufficiently large sample where the tests of the mechanical properties can be performed. A satisfactory accordance was found when comparing the microstructure and mechanical properties of real welds and simulated samples.

Keywords: heat affected zone, impact test, thermal cycle simulator, time of tempering

Procedia PDF Downloads 302
5131 Gender Recognition with Deep Belief Networks

Authors: Xiaoqi Jia, Qing Zhu, Hao Zhang, Su Yang

Abstract:

A gender recognition system is able to tell the gender of the given person through a few of frontal facial images. An effective gender recognition approach enables to improve the performance of many other applications, including security monitoring, human-computer interaction, image or video retrieval and so on. In this paper, we present an effective method for gender classification task in frontal facial images based on deep belief networks (DBNs), which can pre-train model and improve accuracy a little bit. Our experiments have shown that the pre-training method with DBNs for gender classification task is feasible and achieves a little improvement of accuracy on FERET and CAS-PEAL-R1 facial datasets.

Keywords: gender recognition, beep belief net-works, semi-supervised learning, greedy-layer wise RBMs

Procedia PDF Downloads 453
5130 The Effect of Bottom Shape and Baffle Length on the Flow Field in Stirred Tanks in Turbulent and Transitional Flow

Authors: Jie Dong, Binjie Hu, Andrzej W Pacek, Xiaogang Yang, Nicholas J. Miles

Abstract:

The effect of the shape of the vessel bottom and the length of baffles on the velocity distributions in a turbulent and in a transitional flow has been simulated. The turbulent flow was simulated using standard k-ε model and simulation was verified using LES whereas transitional flow was simulated using only LES. It has been found that both the shape of tank bottom and the baffles’ length has significant effect on the flow pattern and velocity distribution below the impeller. In the dished bottom tank with baffles reaching the edge of the dish, the large rotating volume of liquid was formed below the impeller. Liquid in this rotating region was not fully mixing. A dead zone was formed here. The size and the intensity of circulation within this zone calculated by k-ε model and LES were practically identical what reinforces the accuracy of the numerical simulations. Both types of simulations also show that employing full-length baffles can reduce the size of dead zone formed below the impeller. The LES was also used to simulate the velocity distribution below the impeller in transitional flow and it has been found that secondary circulation loops were formed near the tank bottom in all investigated geometries. However, in this case the length of baffles has smaller effect on the volume of rotating liquid than in the turbulent flow.

Keywords: baffles length, dished bottom, dead zone, flow field

Procedia PDF Downloads 295
5129 Numerical Analysis of Effect of Crack Location on the Crack Breathing Behavior

Authors: H. M. Mobarak, Helen Wu, Keqin Xiao

Abstract:

In this work, a three-dimensional finite element model was developed to investigate the crack breathing behavior at different crack locations considering the effect of unbalance force. A two-disk rotor with a crack is simulated using ABAQUS. The duration of each crack status (open, closed and partially open/closed) during a full shaft rotation was examined to analyse the crack breathing behavior. Unbalanced shaft crack breathing behavior was found to be different at different crack locations. The breathing behavior of crack along the shaft length is divided into different regions depending on the unbalance force and crack location. The simulated results in this work can be further utilised to obtain the time-varying stiffness matrix of the cracked shaft element under the influence of unbalance force.

Keywords: crack breathing, crack location, slant crack, unbalance force, rotating shaft

Procedia PDF Downloads 272