Search results for: Jihad Mohammad
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1412

Search results for: Jihad Mohammad

1412 Understanding the Caliphate and Jihad to Prevent Radicalization That Lead to Terrorism: The Role of Social Community in Southeast Asia

Authors: Jordan Daud, Satriya Wibawa, Wahyu Wardhana

Abstract:

In the summer of 2014, the leaders of the Islamic State of Iraq and Syria proclaimed the founding of religious-political system known as the caliphate which titled Islamic State (IS). As Caliph, Abu Bakr Baghdadi advocated Jihad from the Ummah (the Muslim community) to defend the Islamic state from unbelievers. This call for Jihad by IS had encouraged some radical organization in Southeast Asia pledge allegiance to IS and established bases for IS operation in Southeast Asia. This development had increased security concern for possible terrorism action in Southeast Asia, which currently not very active due to counterterrorism efforts from ASEAN member states and its cooperation with the world. This paper firstly tries to draw understanding from Ulema (Muslim cleric) about the conception of caliphate and Jihad based on Quran and Hadith. Secondly, this paper will elaborate counterterrorism efforts from ASEAN countries to prevent radicalization and terrorism act in addressing the call for jihad to establish IS in Southeast Asia. The third, this paper will recommend the role of the social community, especially Ulema, in Southeast Asia to prevent the misunderstanding of Jihad which usually used by terrorist to justify their action. Hopefully, this social community role will decrease the radicalization of Muslim community in Southeast Asia alongside with the counterterrorism efforts to create secure and stable ASEAN community based on shared norm and values.

Keywords: caliphate, jihad, ASEAN, counterterrorism, social community

Procedia PDF Downloads 232
1411 Presuppositions and Implicatures in Four Selected Speeches of Osama Bin Laden's Legitimisation of 'Jihad'

Authors: Sawsan Al-Saaidi, Ghayth K. Shaker Al-Shaibani

Abstract:

This paper investigates certain linguistics properties of four selected speeches by Al-Qaeda’s former leader Osama bin Laden who legitimated the use of jihad by Muslims in various countries when he was alive. The researchers adopt van Dijk’s (2009; 1998) Socio-Cognitive approach and Ideological Square theory respectively. Socio-Cognitive approach revolves around various cognitive, socio-political, and discursive aspects that can be found in political discourse as in Osama bin Laden’s one. The political discourse can be defined in terms of textual properties and contextual models. Pertaining to the ideological square, it refers to positive self-presentation and negative other-presentation which help to enhance the textual and contextual analyses. Therefore, among the most significant properties in Osama bin Laden’s discourse are the use of presuppositions and implicatures which are based on background knowledge and contextual models as well. Thus, the paper concludes that Osama bin Laden used a number of manipulative strategies which augmented and embellished the use of ‘jihad’ in order to develop a more effective discourse for his audience. In addition, the findings have revealed that bin Laden used different implicit and embedded interpretations of different topics which have been accepted as taken-for-granted truths for him to legitimate Jihad against his enemies. There are many presuppositions in the speeches analysed that result in particular common-sense assumptions and a world-view about the selected speeches. More importantly, the assumptions in the analysed speeches help consolidate the ideological analysis in terms of in-group and out-group members.

Keywords: Al-Qaeda, cognition, critical discourse analysis, Osama Bin Laden, jihad, implicature, legitimisation, presupposition, political discourse

Procedia PDF Downloads 238
1410 Islamic State: Franchising Jihad through the New Caliphate

Authors: Janiel David Melamed Visbal

Abstract:

The Islamic State has become one of the most remarkable threats for international security through their religious extremism and their establishment of a new caliphate by force. The main objective of this organization is to obtain territorial expansions beyond the Middle East and eventually to consolidate an Islamic global order based on their extremist ideology. This paper will conduct an analysis regarding how, over the past year, many jihadist organizations worldwide have pledged their alliagance to the Islamic State, transforming it into the most important jihadist franchise globally.

Keywords: Islamic state, franchise, jihad, Islamic fundamentalism, caliphate

Procedia PDF Downloads 357
1409 West African Islamic Civilization: Sokoto Caliphate and Science Education

Authors: Hassan Attahiru Gwandu

Abstract:

This study aims at surveying and analyzing the contribution of Sokoto scholars or Sokoto Caliphate in the development of science and technology in West Africa. Today, it is generally accepted that the 19th century Islamic revivalism in Hausaland was a very important revolution in the history of Hausa society and beyond. It is therefore, as a result of this movement or Jihad; the Hausaland (West Africa in general) witnessed several changes and transformations. These changes were in different sectors of life from politics, economy to social and religious aspect. It is these changes especially on religion that will be given considerations in this paper. The jihad resulted is the establishment of an Islamic state of Sokoto Caliphate, the revival Islam and development of learning and scholarship. During the existence of this Caliphate, a great deal of scholarship on Islamic laws were revived, written and documented by mostly, the three Jihad leaders; Usmanu Danfodiyo, his brother Abdullahi Fodiyo and his son Muhammad Bello. The trio had written more than one thousand books and made several verdicts on Islamic medicine. This study therefore, seeks to find out the contributions of these scholars or the Sokoto caliphate in the development of science in West Africa.

Keywords: Sokoto caliphate, scholarship, science and technology, West Africa

Procedia PDF Downloads 292
1408 Chamba Encroachment into Jukum Territory and Its Impact 1830-1900

Authors: Iliya Ibrahim Gimba

Abstract:

The period between the late 18th and early 19th centuries was characterized by conflict of ethnic nationalities in the Benue valley region. This conflict was exacerbated by the introduction of the Fulani jihad that began in Hausa land into the Benue valley region. Fulani in this region launched the Jihad movement which pushed out some ethnic groups from their natural abode or ancestral home to live a nomad live until they could settle and established a stayed in a particular place. The Chamba were being displaced by the Fulani jihad that took place around Faro deo in about 1809. It was from there that most of the Chamba migrated out, some into the Cameroon republic, while others moved into the Benue valley region. Among those that entered into the Benue valley region are the Sama, Kola, Gayam etc, and could be found in Donga local Government area of Taraba state. Those Chamba clan that later on cameo into the Benue Valley are Pyeri, Kashimbila etc. The sudden movement of the Chamba or migrations into the Jukun territory co-in ceded with the period that the Jihad had already had a severe and consequential effect or impact on the Jukun territory cause by Yakubu Ibrahim of Bzuchi, and Buba Yero of Gombe, and Hamaruwa of Muri Emirate. This ne authorities in Kwararafa Kingdom cut the Jukun King out of contact with Borno and Hausa-land. This paper set to examine the chiefdom that the Chamba established right within the Jukun headquarters of Wukari. Sources to be used are published books, Journals, Archival materials, and M.A. Thesis to enable us know the impact of Chamba migrations on the Jukun territory and reactions of the Jukun’s to this new comers.

Keywords: Chamba people, encroachment, migration, ethnic nationalities

Procedia PDF Downloads 456
1407 The Female Jihad: A Case Study of Jamaah Islamiyah’s Women in Indonesia

Authors: Milda Istiqomah

Abstract:

The current trends demonstrate that the number of women involved in terrorism is steadily increasing. There are at least two types of roles that women assume in terrorism; the ‘visible role’ and ‘invisible role’. Both roles are very important to the sustainability of terrorism and terrorist organizations. The findings of this paper are based on the analysis of multiple case study from two terrorism verdicts in Indonesia, media reports and academic journals. This paper argues that women in Jemaah Islamiyah (JI) play an important role in both categories. They are involved in this organization by marital and kinship linkages which aim to secure the networks and regenerate the Jihadi ideology within JI. Finally, this paper states that the role of women in JI is significant due to its importance in delivering the idea of Jihad to younger generations.

Keywords: terrorism, women, jihadi movement, case study

Procedia PDF Downloads 124
1406 The Impacts of Technology on Operations Costs: The Mediating Role of Operation Flexibility

Authors: Fazli Idris, Jihad Mohammad

Abstract:

The study aims to determine the impact of technology and service operations flexibility, which is divided into external flexibility and internal robustness, on operations costs. A mediation model is proposed that links technology to operations costs via operation flexibility. Drawing on a sample of 475 of operations managers of various service sectors in Malaysia and South Africa, Structural Equation Modeling (SEM) was employed to test the relationship using Smart-PLS procedures. It was found that a significant relationship was established between technologies to operations costs via both operations flexibility dimensions. Theoretical and managerial implications are offered to explain the results.

Keywords: Operations flexibility, technology, costs, mediation

Procedia PDF Downloads 611
1405 ISIS after the Defeat of the Islamic Caliphate: The Rise of Cyber-Jihad

Authors: Spyridon Plakoudas

Abstract:

After the capture of Al-Raqqah and the defeat of the short-lived Islamic Caliphate in 2017, everyone predicted the end of ISIS. However, ISIS proved far more resilient than initially thought. The militant group quickly regrouped from its defeat and started a low-intensity guerrilla campaign in central Iraq (near Kirkuk and Mosul) and north-eastern Syria (near Deir ez-Zorr). At the same time, ISIS doubled down on its cyber-campaign; actually, ISIS is as active on the cyber-domain as during the peak of its power in 2015. This paper, a spin-off paper from a co-authored book on the Syrian Civil War (due to be published by Rowman and Littlefield), intends to examine how ISIS operates in the cyber-domain and how this "Cyber-Caliphate" under re-construction is associated with its post-2017 strategy. This paper will draw on the discipline of War Studies (with an emphasis on Cyber-Security and Insurgency / Counter-Insurgency) and will benefit from the insights of interviewed experts on the field (e.g., Hassan Hasssan). This paper will explain how the successful operation of ISIS in the cyber-space preserves the myth of the “caliphate” amongst its worldwide followers (against the odds) and sustains the group’s ongoing insurgency in Syria and Iraq; in addition, this paper will suggest how this cyber-threat can be countered best.

Keywords: ISIS, cyber-jihad, Syrian Civil War, cyber-terrorism, insurgency and counter-insurgency

Procedia PDF Downloads 132
1404 Contributions of Women to the Development of Hausa Literature as an Effective Means of Public Enlightenment: The Case of a 19th Century Female Scholar Maryam Bint Uthman Ibn Foduye

Authors: Balbasatu Ibrahim

Abstract:

In the 19th century, Hausaland an Islamic revolution known as the Sokoto Jihad took place that led to the establishment of the Sokoto Caliphate in 1804 under the leadership of the famous Sheik Uthman Bn Fodiye. Before the Jihad movement in Hausaland (now Northern Nigeria), women were left in ignorance and were used and dumped like old kitchen utensils. The sheik and his followers did their best to actualising women’s right to education by using their female family members as role models who were highly educated and renowned scholars. After the Jihad with the establishment of an Islamic state, the women scholars initiated different strategies to teach the generality of the women. The most efficient strategy was the ‘Yantaru Movement founded by Nana Asma’u the daughter of Sheikh Uthman Bn Fodiye in collaboration with her sisters around 1840. The ‘Yantaru movement is a women’s educational movement aimed at enlightening women in rural and urban areas. The move helped in massively mobilizing women for education. In addition to town pupils, women from villages and throughout the nooks and crannies of metropolitan Sokoto participated in the movement in the search for knowledge. Thus, the birth of the ‘Yantaru system of women’s education. The ‘Yantaru operates the three-tier system at village, town and the metropolitan capital of Sokoto. ‘Yantaru functions include imparting knowledge to elderly women and young girls. Step down enlightenment program on returning home. The most effective medium of communication in the ‘Yantaru movement was through poetry where scholars composed educational poems which were memorized by the ‘Yantaru, who on return recite it to fellow women at home. Through this system, many women were educated. This paper translated and examines one of such educative poems written by the second leader of the ‘Yantaru Movement Maryam Bn Uthman Bn Fodiye in 1855.

Keywords: English, Hausa language, public enlightenment, Maryam Bint Uthman Ibn Foduye

Procedia PDF Downloads 362
1403 The English Translation of Arabic Metaphors in the Holy Qura’n

Authors: Mohammad Hamzah Alshehab

Abstract:

Metaphor is a substitute expression in everyday life in languages, thoughts and actions. It has an original value in language use with different conceptual, grammatical and properties. In addition, it is a central concept in literary studies. The present paper aims at investigating metaphor’s types imbedded in some Holy Verses (HV). For achieving the objectives of this paper, two English versions were chosen , the first is the Translation of the Meanings of the Noble Qura’n in the English Language by Mohammad AlHilali and Mohammad Khan, and the second version is the English Translation of the Holy Qura’n by Mohammad Ali were used. The researcher selected (20) Holy Verses include metaphors to be analyzed and investigated. Metaphor types were categorized by an assessment of the two translations followed by a discussion between the two versions of translation.

Keywords: metaphor, metaphor’s types, Holy Qura’n, Holy Verses

Procedia PDF Downloads 652
1402 Arabic Scholar’s Governance Advocacy and Nigeria’s National Security in Nigeria: Perspective of Al-Shaykh Usman Bin Fodio

Authors: Mohammad Jamiu Abdullahi, Shykh Ahmed Abdussalam

Abstract:

The emergence of Arabic on the shore of West Africa heralded the practise of Islam and advocation for a just and egalitarian society. Islam, it was argued, has been perverted and subverted by the Hausa leadership. This necessitated the call for reforming Islam. Al-Shaykh Usman Bin Fodio grabbed the opportunity and fought the perverts to restore the glory of Islam and establish shari'ah way of life. This was the practice, especially in the northern part of Nigeria until the incursion of colonialism. The conquest of the colonial master halted the rule of jihadi leaderships and subjected them to colonialism under which only some aspects of Islamic system considered potentially beneficial to the British interest were retained. The current socio-political and economic crises in Nigeria has necessitated the need to look inwardly to the bulk of works, in Arabic, left behind by the Muslim scholars to help to salvage the country from its present political crisis, economic paralysis and legal decadence. This paper, therefore, examines the relevance of Arabic literary works that housed political/legal theories to salvaging the country from its present political crises, economic paralysis and legal decadence.

Keywords: Arabic Fodio Nigeria security, advocacy governance scholar Usman, British colonial perspective shaykh, leadership Islam jihad politics

Procedia PDF Downloads 334
1401 Remarks on the Lattice Green's Function for the Anisotropic Face Cantered Cubic Lattice

Authors: Jihad H. Asad

Abstract:

An expression for the Green’s function (GF) of anisotropic face cantered cubic (IFCC) lattice is evaluated analytically and numerically for a single impurity problem. The density of states (DOS), phase shift and scattering cross section are expressed in terms of complete elliptic integrals of the first kind.

Keywords: lattice Green's function, elliptic integral, physics, cubic lattice

Procedia PDF Downloads 466
1400 Revenge: Dramaturgy and the Tragedy of Jihad

Authors: Myriam Benraad

Abstract:

On 5 July 2016, just days before the bloody terrorist attack on the Promenade des Anglais in Nice, the Al-Hayat media centre, one of the official propaganda branches of the Islamic State, broadcast a French nasheed which paid tribute to the Paris and Brussels attacks of November 2015 and March 2016. Entitled 'My Revenge', the terrorist anthem was of rare vehemence. It mentioned, sequentially, 'huddled bodies', in a reference to the civilian casualties of Western air strikes in the Iraqi-Syrian zone, 'explosive belts', 'sharp knives', 'large-calibre weapons' as well as 'localised targets'. France was accused of bearing the responsibility for the wave of attacks on its territory since the Charlie Hebdo massacre of January 2015 due to its 'ruthless war' against the Muslim world. Evoking an 'old aggression' and the 'crimes and spoliations' of which France has made itself guilty, the jihadist hymn depicted the rebirth of the caliphate as 'laudable revenge'. The notion of revenge has always been central to contemporary jihadism, understood both as a revolutionary ideology and a global militant movement. In recent years, the attacks carried out in Europe and elsewhere in the world have, for most, been claimed in its name. Whoever says jihad, says drama, yet few studies, if any, have looked at its dramatic and emotional elements, most notably its tragic vengefulness. This seems all the more astonishing that jihad is filled with drama; it could even be seen as a drama in its own right. The jihadists perform a script and take on roles inspired by their respective group’s culture (norms, values, beliefs, and symbols). The militants stage and perform such a script for a designated audience, either partisan, sympathising or hostile towards them and their cause. This research paper will examine the dramaturgy of jihadism and in particular, the genre that best characterises its violence: revenge tragedy. Theoretically, the research will rely on the tools of social movement theory and the sociology of emotions. Methodologically, it will draw from dramaturgical analysis and a combination of qualitative and quantitative tools to attain valuable observations of a number of developments, trends, and patterns. The choice has been made to focus mainly – however not exclusively – on the attacks which have taken place since 2001 in the European Union and more specific member states that have been significantly hit by jihadist terrorism. The research looks at a number of representative longitudinal samples identifying continuities and discontinuities, similarities, but also substantial differences. The preliminary findings tend to establish the relevance and validity of this approach in helping make better sense of sensitisation, mobilisation, and survival dynamics within jihadist groups, and motivations among individuals who have embraced violence. Besides, they illustrate their pertinence for counterterrorism policymakers and practitioners. Through drama, jihadist groups ensure the unceasing regeneration of their militant cause as well as their legitimation among their partisans. Without drama, and without the spectacular ideological staging of reality, they would not be able to maintain their attraction potential and power of persuasion.

Keywords: Jihadism, dramaturgy, revenge, tragedy

Procedia PDF Downloads 134
1399 Refinery Sulfur as an Alternative Agent to Decrease Pesticide Exposure in Pistachio Orchards and Common Pistachio Psylla’s Control

Authors: Mehdi Basirat, Mohammad Rouhani, Shahla Borzouei, Majid Zarangi, Asma Abolghasemi, Mohammad Fazel Soltani, Mohammad Gorji, Mohammad Amin Samih

Abstract:

The common pistachio psylla, Agonoscena pistaciae Burckhardt and Lauterer (Hemiptera: Aphalaridae), as one of the most detrimental pests in all pistachio producing regions, causes great economic damages to pistachio trees. Nowadays, various pesticides are used to control the common pistachio psylla and robust pesticide exposure has occurred in orchards. In this study, field experiments were conducted during 2018–2021 to assess the effects of sulfur on A. pistaciae. This study compared sulfur with asafoetida extract and pesticide (acetamiprid) on A. pistaciae based on complete randomized blocks with three replications. The analysis results of variance showed that the effect of treatments on egg (F2,24 = 17.61, P = 0.00) and nymphs (F2,24 = 18.29, P = 0.00) had a significant difference at a 1% level. The results demonstrated that sulfur had the highest measure of control on eggs and nymphs significantly compared to the plant extract and pesticide (negative control). These results provide support to the potential use of sulfur as an alternative pest management tool against A. pistaciae. The results clearly indicated that sulfur could control the common pistachio psylla population for six weeks at least.

Keywords: Agonoscena pistaciae, pesticide exposure, pistachio, sulfur

Procedia PDF Downloads 164
1398 Risk Based on Computer Auditing and Measures of ‎Prevention

Authors: Mohammad Hadi Khorashadi Zadeh, Amin Karkon, Seyd Mohammad Reza Mashhoori

Abstract:

The technology of computer audit played a major role in the progress and prospects of a proper application to improve the quality and efficiency of audit work. But due to the technical complexity and the specific risks of computer audit, it should be shown effective in audit and preventive action. Mainly through research in this paper, we propose the causes of audit risk in a computer environment and the risk of further proposals for measures to control, to some extent reduce the risk of computer audit and improve the audit quality.

Keywords: computer auditing, risk, measures to prevent, information management

Procedia PDF Downloads 524
1397 Boko Haram Insurrection and Religious Revolt in Nigeria: An Impact Assessment-{2009-2015}

Authors: Edwin Dankano

Abstract:

Evident by incessant and sporadic attacks on Nigerians poise a serious threat to the unity of Nigeria, and secondly, the single biggest security nightmare to confront Nigeria since after amalgamation of the Southern and Northern protectorates by the British colonialist in 1914 is “Boko Haram” a terrorist organization also known as “Jama’atul Ahli Sunnah Lidda’wati wal Jihad”, or “people committed to the propagation of the Prophet’s teachings and jihad”. The sect also upholds an ideology translated as “Western Education is forbidden”, or rejection of Western civilization and institutions. By some estimates, more than 5,500 people were killed in Boko Haram attacks in 2014, and Boko Haram attacks have already claimed hundreds of lives and territories {caliphates}in early 2015. In total, the group may have killed more than 10,000 people since its emergence in the early 2000s. More than 1 million Nigerians have been displaced internally by the violence, and Nigerian refugee figures in neighboring countries continue to rise. This paper is predicated on secondary sources of data and anchored on the Huntington’s theory of clash of civilization. As such, the paper argued that the rise of Boko Haram with its violent disposition against Western values is a counter response to Western civilization that is fast eclipsing other civilizations. The paper posits that the Boko Haram insurrection going by its teachings, and destruction of churches is a validation of the propagation of the sect as a religious revolt which has resulted in dire humanitarian situation in Adamawa, Borno, Yobe, Bauchi, and Gombe states all in north eastern Nigeria as evident in human casualties, human right abuses, population displacement, refugee debacle, livelihood crisis, and public insecurity. The paper submits that the Nigerian state should muster the needed political will in terms of a viable anti-terrorism measures and build strong legitimate institutions that can adequately curb the menace of corruption that has engulfed the military hierarchy, respond proactively to the challenge of terrorism in Nigeria and should embrace a strategic paradigm shift from anti-terrorism to counter-terrorism as a strategy for containing the crisis that today threatens the secular status of Nigeria.

Keywords: Boko Haram, civilization, fundamentalism, Islam, religion revolt, terror

Procedia PDF Downloads 398
1396 Risk-Based Computer Auditing and Measures of Prevention

Authors: Mohammad Hadi Khorashadi Zadeh, Amin Karkon, Seyd Mohammad Reza Mashhoori ‎

Abstract:

the technology of Computer audit played a major role in the progress and ‎prospects of a proper application to improve the quality and efficiency of audit ‎work. But due to the technical complexity and the specific risks of computer ‎audit, it should be shown effective in audit and preventive action. Mainly through ‎research in this paper, we proposes the causes of audit risk in a computer ‎environment and the risk of further proposals for measures to control, to some ‎extent reduce the risk of computer audit and improve the audit quality.‎

Keywords: computer auditing, risk, measures to prevent, information technology

Procedia PDF Downloads 488
1395 Literature and the Extremism: Case Study on and Qualitative Analysis of the Impact of Literature on Extremism in Afghanistan

Authors: Mohibullah Zegham

Abstract:

In conducting a case study to analyze the impact of literature on extremism and fundamentalism in Afghanistan, the author of this paper uses qualitative research method. For this purpose the author of the paper has a glance at the history of extremism and fundamentalism in Afghanistan, as well the major causes and predisposing factors of it; then analyzes the impact of literature on extremism and fundamentalism using qualitative method. This study relies on the moral engagement theory to reveal how some extreme-Islamists quit the ideological interpretation of Islam and return to normal life by reading certain literary works. The goal of this case study is to help fighting extremism and fundamentalism by using literature. The research showed that literary works are useful in this regard and there are several evidences of its effectiveness.

Keywords: extremism, fundamentalism, communist, jihad, madrasa, literature

Procedia PDF Downloads 273
1394 Evaluate the Changes in Stress Level Using Facial Thermal Imaging

Authors: Amin Derakhshan, Mohammad Mikaili, Mohammad Ali Khalilzadeh, Amin Mohammadian

Abstract:

This paper proposes a stress recognition system from multi-modal bio-potential signals. For stress recognition, Support Vector Machines (SVM) and LDA are applied to design the stress classifiers and its characteristics are investigated. Using gathered data under psychological polygraph experiments, the classifiers are trained and tested. The pattern recognition method classifies stressful from non-stressful subjects based on labels which come from polygraph data. The successful classification rate is 96% for 12 subjects. It means that facial thermal imaging due to its non-contact advantage could be a remarkable alternative for psycho-physiological methods.

Keywords: stress, thermal imaging, face, SVM, polygraph

Procedia PDF Downloads 484
1393 Flood Scenarios for Hydrological and Hydrodynamic Modelling

Authors: M. Sharif Imam Ibne Amir, Mohammad Masud Kamal Khan, Mohammad Golam Rasul, Raj H. Sharma, Fatema Akram

Abstract:

Future flood can be predicted using the probable maximum flood (PMF). PMF is calculated using the historical discharge or rainfall data considering the other climatic parameter stationary. However, climate is changing globally and the key climatic variables are temperature, evaporation, rainfall and sea level rise (SLR). To develop scenarios to a basin or catchment scale these important climatic variables should be considered. Nowadays scenario based on climatic variables is more suitable than PMF. Six scenarios were developed for a large Fitzroy basin and presented in this paper.

Keywords: climate change, rainfall, potential evaporation, scenario, sea level rise (SLR), sub-catchment

Procedia PDF Downloads 530
1392 Modern Literary Authors and Samuel Beckett's Trace of Lost Self in Modernity

Authors: Mohammad Mehdi Mazaheri, Mohammad Motiee Lahromi

Abstract:

In a depression after world wars, Beckett's plays presented a picture of the world fragmented and disrupted. Among other modern literary works, Beckett's path-breakingly innovative literature presented the parodies of pointlessness of human actions and thoughts in the world. This new dramatic style catapulted Beckett to the centre stage of modern drama, though it should be mentioned that he may not have been influenced in this without the prevailing climate of ideas. The prevailing literary attitude of Modernism indicates that the modern world is irrational and incoherent. The present study explores Samuel Beckett's literary approach to modern drama and shows how the author could create the characters stuck in a lifelong suspicious about the Self.

Keywords: modern drama, absurdity, the theatre of the absurd, existentialism, self searching

Procedia PDF Downloads 528
1391 Secrecy Analysis in Downlink Cellular Networks in the Presence of D2D Pairs and Hardware Impairment

Authors: Mahdi Rahimi, Mohammad Mahdi Mojahedian, Mohammad Reza Aref

Abstract:

In this paper, a cellular communication scenario with a transmitter and an authorized user is considered to analyze its secrecy in the face of eavesdroppers and the interferences propagated unintentionally through the communication network. It is also assumed that some D2D pairs and eavesdroppers are randomly located in the cell. Assuming hardware impairment, perfect connection probability is analytically calculated, and upper bound is provided for the secrecy outage probability. In addition, a method based on random activation of D2Ds is proposed to improve network security. Finally, the analytical results are verified by simulations.

Keywords: physical layer security, stochastic geometry, device-to-device, hardware impairment

Procedia PDF Downloads 178
1390 Micropropagation of Pelargonium odoratissimum (L.) L’Her., Using Petiole and Leaf Explants

Authors: Mohammad Ali Aazami Mavaloo, Mohammad Bagher Hassanpouraghdam

Abstract:

Intact leaves, leaf segments and petiole sections derived from nodal explants in vitro were employed for the optimization of Pelargonium odoratissimum micropropagation. MS and ½ MS media enriched with BAP (1, 1.5, 2 and 4.5 mg/l) and NAA (0.1, 1 and 1.5 mg/l) were the treatment combinations used for. With leaf segments, the lowest browning incidence, the greatest callogenesis and the highest number of shoots were obtained with the media containing 1.5 mg/L BAP and 1 mg/L NAA. Two mg/L BAP + 0.1 mg/L NAA hold the same results for petiole explants. Intact leaves showed the best results for the three before-mentioned traits with 1 mg/L BAP + 1 mg/L NAA. 0.2 mg/L NAA caused the highest rooting percentage and the greatest mean data for the number and length of the roots. Rooted plantlets were transferred to the pots containing 1:1 peat-moss and perlite. Acclimatization of the plantlets was followed by 90 percent of survival rate in the greenhouse.

Keywords: Pelargonium odoratissimum, micropropagation, BAP, NAA

Procedia PDF Downloads 395
1389 Development Framework Based on Mobile Augmented Reality for Pre-Literacy Kit

Authors: Nazatul Aini Abd Majid, Faridah Yunus, Haslina Arshad, Mohammad Farhan Mohammad Johari

Abstract:

Mobile technology, augmented reality, and game-based learning are some of the key learning technologies that can be fully optimized to promote pre-literacy skills. The problem is how to design an effective pre-literacy kit that utilizes some of the learning technologies. This paper presents a framework based on mobile augmented reality for the development of pre-literacy kit. This pre-literacy kit incorporates three main components which are contents, design, and tools. A prototype of a mobile app based on the three main components was developed for promoting pre-literacy. The results show that the children and teachers gave positive feedbacks after using the mobile app for the pre-literacy.

Keywords: framework, mobile technology, augmented reality, pre-literacy skills

Procedia PDF Downloads 594
1388 Investigating and Comparing the Performance of Baseboard and Panel Radiators by Calculating the Thermal Comfort Coefficient

Authors: Mohammad Erfan Doraki, Mohammad Salehi

Abstract:

In this study, to evaluate the performance of Baseboard and Panel radiators with thermal comfort coefficient, A room with specific dimensions was modeled with Ansys fluent and DesignBuilder, then calculated the speed and temperature parameters in different parts of the room in two modes of using Panel and Baseboard radiators and it turned out that use of Baseboard radiators has a more uniform temperature and speed distribution, but in a Panel radiator, the room is warmer. Then, by calculating the thermal comfort indices, It was shown that using a Panel radiator is a more favorable environment and using a Baseboard radiator is a more uniform environment in terms of thermal comfort.

Keywords: Radiator, Baseboard, optimal, comfort coefficient, heat

Procedia PDF Downloads 166
1387 Peat Soil Stabilization Methods: A Review

Authors: Mohammad Saberian, Mohammad Ali Rahgozar, Reza Porhoseini

Abstract:

Peat soil is formed naturally through the accumulation of organic matter under water and it consists of more than 75% organic substances. Peat is considered to be in the category of problematic soil, which is not suitable for construction, due to its high compressibility, high moisture content, low shear strength, and low bearing capacity. Since this kind of soil is generally found in many countries and different regions, finding desirable techniques for stabilization of peat is absolutely essential. The purpose of this paper is to review the various techniques applied for stabilizing peat soil and discuss outcomes of its improved mechanical parameters and strength properties. Recognizing characterization of stabilized peat is one of the most significant factors for architectural structures; as a consequence, various strategies for stabilization of this susceptible soil have been examined based on the depth of peat deposit.

Keywords: peat soil, stabilization, depth, strength, unconfined compressive strength (USC)

Procedia PDF Downloads 571
1386 Modeling and Control of a 4DoF Robotic Assistive Device for Hand Rehabilitation

Authors: Christopher Spiewak, M. R. Islam, Mohammad Arifur Rahaman, Mohammad H. Rahman, Roger Smith, Maarouf Saad

Abstract:

For those who have lost the ability to move their hand, going through repetitious motions with the assistance of a therapist is the main method of recovery. We have been developed a robotic assistive device to rehabilitate the hand motions in place of the traditional therapy. The developed assistive device (RAD-HR) is comprised of four degrees of freedom enabling basic movements, hand function, and assists in supporting the hand during rehabilitation. We used a nonlinear computed torque control technique to control the RAD-HR. The accuracy of the controller was evaluated in simulations (MATLAB/Simulink environment). To see the robustness of the controller external disturbance as modelling uncertainty (±10% of joint torques) were added in each joints.

Keywords: biorobotics, rehabilitation, robotic assistive device, exoskeleton, nonlinear control

Procedia PDF Downloads 478
1385 Structure and Optical Properties of Potassium Doped Zinc Oxide

Authors: Lila A. Alkhattaby, Norah A. Alsayegh, Mohammad S. Ansari, Mohammad O. Ansari

Abstract:

In this work, we doped zinc oxide ZnO with potassium K we have synthesized using the sol-gel method. Structural properties were depicted by X-ray diffractometer (XRD) and energy distribution spectroscopy, X-ray diffraction studies confirm the nanosized of the particles and favored orientations along the (100), (002), (101), (102), (110), (103), (200), and (112) planes confirm the hexagonal wurtzite structure of ZnO NPs. The optical properties study using the UV-Vis spectroscopy. The band gap decreases from 4.05 eV to 3.88 eV, the lowest band gap at 10% doped concentration. The photoluminescence (PL) spectroscopy results show two main peaks, a sharp peak at ≈ 384 nm in the UV region and a broad peak around 479 nm in the visible region. The highest intensity of the band-edge luminescence was for 2% doped concentration because of the combined effect of the decreased probability of nonradiative recombination and has better crystallinity.

Keywords: K doped ZnO, photoluminescence spectroscopy, UV-Vis spectroscopy, x-ray spectroscopy

Procedia PDF Downloads 239
1384 An investigation of Leading Edge and Trailing Edge Corrugation for Low Reynolds Number Application

Authors: Syed Hassan Raza Shah, Mohammad Mohammad Ali

Abstract:

The flow over a smoothly profiled airfoil at a low Reynolds number is highly susceptible to separate even at a very low angle of attack. An investigation was made to study the effect of leading-edge and trailing-edge corrugation with the spanwise change in the ridges resulted due to the change in the chord length for an infinite wing. The wind tunnel results using NACA0018 wings revealed that leading and trailing edge corrugation did not have any benefit in terms of aerodynamic efficiency or delayed stall. The leading edge and trailing edge corrugation didn't change the lift curve slope, with the leading edge corrugation wing stalling first in the range of Reynolds number of 50,000 to 125,000.

Keywords: leading and trailing edge corrugations, low reynolds number, wind tunnel testing, NACA0018

Procedia PDF Downloads 290
1383 Statistical Modeling of Mobile Fading Channels Based on Triply Stochastic Filtered Marked Poisson Point Processes

Authors: Jihad S. Daba, J. P. Dubois

Abstract:

Understanding the statistics of non-isotropic scattering multipath channels that fade randomly with respect to time, frequency, and space in a mobile environment is very crucial for the accurate detection of received signals in wireless and cellular communication systems. In this paper, we derive stochastic models for the probability density function (PDF) of the shift in the carrier frequency caused by the Doppler Effect on the received illuminating signal in the presence of a dominant line of sight. Our derivation is based on a generalized Clarke’s and a two-wave partially developed scattering models, where the statistical distribution of the frequency shift is shown to be consistent with the power spectral density of the Doppler shifted signal.

Keywords: Doppler shift, filtered Poisson process, generalized Clark’s model, non-isotropic scattering, partially developed scattering, Rician distribution

Procedia PDF Downloads 371