Search results for: John Hardy
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 666

Search results for: John Hardy

666 Grief and Repenting: The Engaging Remembrance in Thomas Hardy’s ‘Poems of 1912-13’

Authors: Chih-Chun Tang

Abstract:

Nostalgia, to some people, may seem foolhardy in a way. However, nostalgia is a completely and intensely private but social, collective emotion. It has continuing consequence and outgrowth for our lives as social actions. It leads people to hunt and explore remembrance of persons and places of our past in an effort to confer meaning of persons and places of present. In the ‘Poems of 1912-13’ Thomas Hardy, a British poet, composed a series of poems after the unexpected death of his long-disaffected wife, Emma. The series interprets the cognitive and emotional concussion of Emma’s death on Hardy, concerning his mind and real visit to the landscape in Cornwall, England. Both spaces perform the author’s innermost in thought to his late wife and to the landscape. They present an apparent counterpart of the poet and his afflicted conscience. After Emma had died, Hardy carried her recollections alive by roaming about in the real visit and whimsical land (space) they once had drifted and meandered. This paper highlights the nostalgias and feds that seem endlessly to crop up.

Keywords: Thomas Hardy, remembrance, psychological, poems 1912-13, Fred Davis, nostalgia

Procedia PDF Downloads 236
665 Notes on Frames in Weighted Hardy Spaces and Generalized Weighted Composition Operators

Authors: Shams Alyusof

Abstract:

This work is to enrich the studies of the frames due to their prominent role in pure mathematics as well as in applied mathematics and many applications in computer science and engineering. Recently, there are remarkable studies of operators that preserve frames on some spaces, and this research could be considered as an extension of such studies. Indeed, this paper is to we characterize weighted composition operators that preserve frames in weighted Hardy spaces on the open unit disk. Moreover, it shows that this characterization does not apply to generalized weighted composition operators on such spaces. Nevertheless, this study could be extended to provide more specific characterizations.

Keywords: frames, generalized weighted composition operators, weighted Hardy spaces, analytic functions

Procedia PDF Downloads 80
664 Approximation to the Hardy Operator on Topological Measure Spaces

Authors: Kairat T. Mynbaev, Elena N. Lomakina

Abstract:

We consider a Hardy-type operator generated by a family of open subsets of a Hausdorff topological space. The family is indexed with non-negative real numbers and is totally ordered. For this operator, we obtain two-sided bounds of its norm, a compactness criterion, and bounds for its approximation numbers. Previously, bounds for its approximation numbers have been established only in the one-dimensional case, while we do not impose any restrictions on the dimension of the Hausdorff space. The bounds for the norm and conditions for compactness earlier have been found using different methods by G. Sinnamon and K. Mynbaev. Our approach is different in that we use domain partitions for all problems under consideration.

Keywords: approximation numbers, boundedness and compactness, multidimensional Hardy operator, Hausdorff topological space

Procedia PDF Downloads 64
663 Comparison between Hardy-Cross Method and Water Software to Solve a Pipe Networking Design Problem for a Small Town

Authors: Ahmed Emad Ahmed, Zeyad Ahmed Hussein, Mohamed Salama Afifi, Ahmed Mohammed Eid

Abstract:

Water has a great importance in life. In order to deliver water from resources to the users, many procedures should be taken by the water engineers. One of the main procedures to deliver water to the community is by designing pressurizer pipe networks for water. The main aim of this work is to calculate the water demand of a small town and then design a simple water network to distribute water resources among the town with the smallest losses. Literature has been mentioned to cover the main point related to water distribution. Moreover, the methodology has introduced two approaches to solve the research problem, one by the iterative method of Hardy-cross and the other by water software Pipe Flow. The results have introduced two main designs to satisfy the same research requirements. Finally, the researchers have concluded that the use of water software provides more abilities and options for water engineers.

Keywords: looping pipe networks, hardy cross networks accuracy, relative error of hardy cross method

Procedia PDF Downloads 121
662 Hardy Type Inequalities of Two-Dimensional on Time Scales via Steklov Operator

Authors: Wedad Albalawi

Abstract:

The mathematical inequalities have been the core of mathematical study and used in almost all branches of mathematics as well in various areas of science and engineering. The inequalities by Hardy, Littlewood and Polya were the first significant composition of several science. This work presents fundamental ideas, results and techniques and it has had much influence on research in various branches of analysis. Since 1934, various inequalities have been produced and studied in the literature. Furthermore, some inequalities have been formulated by some operators; in 1989, weighted Hardy inequalities have been obtained for integration operators. Then, they obtained weighted estimates for Steklov operators that were used in the solution of the Cauchy problem for the wave equation. They were improved upon in 2011 to include the boundedness of integral operators from the weighted Sobolev space to the weighted Lebesgue space. Some inequalities have been demonstrated and improved using the Hardy–Steklov operator. Recently, a lot of integral inequalities have been improved by differential operators. Hardy inequality has been one of the tools that is used to consider integrity solutions of differential equations. Then dynamic inequalities of Hardy and Coposon have been extended and improved by various integral operators. These inequalities would be interesting to apply in different fields of mathematics (functional spaces, partial differential equations, mathematical modeling). Some inequalities have been appeared involving Copson and Hardy inequalities on time scales to obtain new special version of them. A time scale is defined as a closed subset contains real numbers. Then the inequalities of time scales version have received a lot of attention and has had a major field in both pure and applied mathematics. There are many applications of dynamic equations on time scales to quantum mechanics, electrical engineering, neural networks, heat transfer, combinatorics, and population dynamics. This study focuses on double integrals to obtain new time-scale inequalities of Copson driven by Steklov operator. They will be applied in the solution of the Cauchy problem for the wave equation. The proof can be done by introducing restriction on the operator in several cases. In addition, the obtained inequalities done by using some concepts in time scale version such as time scales calculus, theorem of Fubini and the inequality of H¨older.

Keywords: time scales, inequality of Hardy, inequality of Coposon, Steklov operator

Procedia PDF Downloads 42
661 New Hardy Type Inequalities of Two-Dimensional on Time Scales via Steklov Operator

Authors: Wedad Albalawi

Abstract:

The mathematical inequalities have been the core of mathematical study and used in almost all branches of mathematics as well in various areas of science and engineering. The inequalities by Hardy, Littlewood and Polya were the first significant composition of several science. This work presents fundamental ideas, results and techniques, and it has had much influence on research in various branches of analysis. Since 1934, various inequalities have been produced and studied in the literature. Furthermore, some inequalities have been formulated by some operators; in 1989, weighted Hardy inequalities have been obtained for integration operators. Then, they obtained weighted estimates for Steklov operators that were used in the solution of the Cauchy problem for the wave equation. They were improved upon in 2011 to include the boundedness of integral operators from the weighted Sobolev space to the weighted Lebesgue space. Some inequalities have been demonstrated and improved using the Hardy–Steklov operator. Recently, a lot of integral inequalities have been improved by differential operators. Hardy inequality has been one of the tools that is used to consider integrity solutions of differential equations. Then, dynamic inequalities of Hardy and Coposon have been extended and improved by various integral operators. These inequalities would be interesting to apply in different fields of mathematics (functional spaces, partial differential equations, mathematical modeling). Some inequalities have been appeared involving Copson and Hardy inequalities on time scales to obtain new special version of them. A time scale is an arbitrary nonempty closed subset of the real numbers. Then, the dynamic inequalities on time scales have received a lot of attention in the literature and has become a major field in pure and applied mathematics. There are many applications of dynamic equations on time scales to quantum mechanics, electrical engineering, neural networks, heat transfer, combinatorics, and population dynamics. This study focuses on Hardy and Coposon inequalities, using Steklov operator on time scale in double integrals to obtain special cases of time-scale inequalities of Hardy and Copson on high dimensions. The advantage of this study is that it uses the one-dimensional classical Hardy inequality to obtain higher dimensional on time scale versions that will be applied in the solution of the Cauchy problem for the wave equation. In addition, the obtained inequalities have various applications involving discontinuous domains such as bug populations, phytoremediation of metals, wound healing, maximization problems. The proof can be done by introducing restriction on the operator in several cases. The concepts in time scale version such as time scales calculus will be used that allows to unify and extend many problems from the theories of differential and of difference equations. In addition, using chain rule, and some properties of multiple integrals on time scales, some theorems of Fubini and the inequality of H¨older.

Keywords: time scales, inequality of hardy, inequality of coposon, steklov operator

Procedia PDF Downloads 53
660 On Boundary Values of Hardy Space Banach Space-Valued Functions

Authors: Irina Peterburgsky

Abstract:

Let T be a unit circumference of a complex plane, E be a Banach space, E* and E** be its conjugate and second conjugate, respectively. In general, a Hardy space Hp(E), p ≥1, where functions act from the open unit disk to E, could contain a function for which even weak nontangential (angular) boundary value in the space E** does not exist at any point of the unit circumference T (C. Grossetete.) The situation is "better" when certain restrictions to the Banach space of values are applied (more or less resembling a classical case of scalar-valued functions depending on constrains, as shown by R. Ryan.) This paper shows that, nevertheless, in the case of a Banach space of a general type, the following positive statement is true: Proposition. For any function f(z) from Hp(E), p ≥ 1, there exists a function F(eiθ) on the unit circumference T to E** whose Poisson (in the Pettis sense) is integral regains the function f(z) on the open unit disk. Some characteristics of the function F(eiθ) are demonstrated.

Keywords: hardy spaces, Banach space-valued function, boundary values, Pettis integral

Procedia PDF Downloads 211
659 A Psycholinguistic Analysis of John Nash’s Hallucinations as Represented in the Film “A Beautiful Mind”

Authors: Rizkia Shafarini

Abstract:

The film A Beautiful Mind explores hallucination in this study. A Beautiful Mind depicts the tale of John Nash, a university student who dislikes studying in class or prefers to study alone. Throughout his life, John Nash has hallucinated, or what is known as schizophrenia, as depicted in the film A Beautiful Mind. The goal of this study was to figure out what hallucinations were, what caused them, and how John Nash managed his hallucinations. In general, this study examines the link between language and mind, or the linguistic relationship portrayed in John Nash's character's speech, as evidenced by his conduct. This study takes a psycholinguistic approach to data analysis by employing qualitative methodologies. Data sources include talks and scenes from the film A Beautiful Mind. Hearing, seeing, and feeling are the scientific results of John Nash's hallucinations in the film A Beautiful Mind. Second, dreams, aspirations, and sickness are the sources of John Nash's hallucinations. Third, John Nash's method of managing hallucinations is to see a doctor without medical or distracting assistance.

Keywords: A Beautiful Mind, hallucination, psycholinguistic, John Nash

Procedia PDF Downloads 117
658 Association Analysis of Putative Loci with Coronary Artery Disease

Authors: Asma Naseer Cheema, Attya Bhatti, Jabar Ali, John Peter

Abstract:

Background: High cholesterol levels, endothelial dysfunction, inefficient coagulation cascade and hyper inflammatory response all are the basis of coronary artery disease (CAD). Several studies are carried out to see the genetic influence of these factors on disease outcome. Objective: The objective of our study was to see the association of 10 putative loci with coronary artery disease in our population. Materials & Methods: We screened our population for 10 putative loci of CAD showing significant association (p < 5x10-8) with candidate genes (regulating the cholesterol metabolism, endothelial function, coagulation cascade and inflammatory response of body). Hardy-Weinberg equilibrium and linkage disequilibrium in cases and controls s were estimated separately. Approximately 5-10 ng of dried DNA in 384 well plate format was used to genotype each sample on the Sequenom iPLEX assay at University of Pittsburgh Genomics and Proteomics Core Laboratories. It was built on single-base primer extension with the MALDI-TOF MS detection possessing high sensitivity and specificity. The SNPs were genotyped through Taqman assay. Hardy Weinberg test was applied. The 10 SNPs were selected as genetic markers for this study (rs579459, rs1561198, rs2954029, rs1122608, rs17114036, rs9515203, rs10947789, rs7173743, rs2895811, rs2075650). Results: Mean age of the patient was 52 ± 11 years. Blood pressure and positive family history was found a significant risk factor for CAD. None of the selected SNPs showed significant association with coronary artery disease in our population (p>0.05). Conclusion: rs579459, rs1561198, rs2954029, rs1122608, rs17114036, rs9515203, rs10947789, rs7173743, rs2895811, rs2075650 are not significant genetic markers for CAD in our population.

Keywords: CAD, genetic markers, loci, risk factors

Procedia PDF Downloads 336
657 Donoho-Stark’s and Hardy’s Uncertainty Principles for the Short-Time Quaternion Offset Linear Canonical Transform

Authors: Mohammad Younus Bhat

Abstract:

The quaternion offset linear canonical transform (QOLCT), which isa time-shifted and frequency-modulated version of the quaternion linear canonical transform (QLCT), provides a more general framework of most existing signal processing tools. For the generalized QOLCT, the classical Heisenberg’s and Lieb’s uncertainty principles have been studied recently. In this paper, we first define the short-time quaternion offset linear canonical transform (ST-QOLCT) and drive its relationship with the quaternion Fourier transform (QFT). The crux of the paper lies in the generalization of several well-known uncertainty principles for the ST-QOLCT, including Donoho-Stark’s uncertainty principle, Hardy’s uncertainty principle, Beurling’s uncertainty principle, and the logarithmic uncertainty principle.

Keywords: Quaternion Fourier transform, Quaternion offset linear canonical transform, short-time quaternion offset linear canonical transform, uncertainty principle

Procedia PDF Downloads 159
656 Molecular Characterization of Ardi Goat Assisted by Microsatellite Markers

Authors: M. F. Elzarei, A. M. Alseaf

Abstract:

Hundred uncorrelated animal and thirty six markers were used in this study to study the molecular characterization of Saudi native Ardi goat (BM18189, ILSTS030, INRA005, OarFCB48, BM2113, ILSTS033, INRA023, RM088, CSRD247, ILSTS034, INRA063, SRCRSP1, ILSTS002, ILSTS044, INRA172, SRCRSP5, ILSTS005, ILSTS049, MAF70, SRCRSP8, ILSTS011, ILSTS058, OarAE54, SRCRSP9, ILSTS019, ILSTS059, OARCP34, TGLA53, ILSTS022, ILSTS082, OARE129, TGLA73, ILSTS029, ILSTS087, OARE193, and RM004). Ardi goat showed high variability. The mean number of alleles per locus ranged from 5 in SRCRSP1 locus to 13.5 in CSRD247 locus. Gene diversities varied within a wide range, from 0.53 in ILSTS002 locus to 0.86 in RM088 locus. Hardy-Weinberg equilibrium was tested in order to evaluate the significance of inbreeding occurring in each locus in Ardi population. Only SRCRSP9, INRA005, ILSTS030 loci showed significance in this way.

Keywords: molecular characterization, microsatellite markers, Ardi goats, Hardy-Weinberg equilibrium

Procedia PDF Downloads 301
655 Gabriel Mtsire’s "The Golden Spring" and Its Primary Sources, Textual and Content Changes Based on Cultural Development in the Context of the 4th-20th Centuries

Authors: Georgi Kalandadze

Abstract:

For studying the development of world civilizations, textual sources that have undergone textological and worldview changes are of great importance. The conference will discuss the collection of the XVIII century "The Golden Spring", compiled by Gabriel Mtsire, which includes texts of John Chrysostom. John Chrysostom lived in the 4th century and his writings correspond to the culture of readers of that time. In the 10th-11th centuries, the works of John Chrysostom were translated into Georgian by Euthymius of Athos. These texts correspond to the requirements of the Georgian society of the 10th-11th centuries. In the 18th century, Gabriel Mtsire collected and edited these texts to make them more understandable to his modern readers. In the 20th century, these texts were again adapted. Thus, the present study provides an opportunity to evaluate and outline the linguistic and content transformation process of the same work over 16 centuries.

Keywords: gabriel mtsire, john chrysostom, euthymius the athonite, the golden spring

Procedia PDF Downloads 43
654 When Talk Is the Cure for the Morning After: Talking Therapy in Conor Mcpherson’s Dublin Carol and Shining City

Authors: Maha Hamoud Alatawi

Abstract:

Drawing on the work of John McLeod and Ariel Watson, this paper explains the relationship between narrative and psychotherapy in two plays by the Irish playwright Conor McPherson. Dublin Carol presents John’s chequered past through his reminiscences of alcohol addiction and Shining City tells the story of John who is haunted by the ghost of his wife, recently died in a car accident, and who seeks the help of Ian, a therapist. At first, the significance of storytelling as an integral part of Irish culture is highlighted. Such a tradition features prominently in contemporary Irish drama. The paper concludes that it is the power of narrative and its therapeutic impact and not the act of psychotherapy and treatment which brings signs of change to characters’ lives.

Keywords: Conor McPherson, drama, psychotherapy, storytelling

Procedia PDF Downloads 273
653 An East-West Trans-Cultural Study: Zen Enlightenment in Asian and John Cage's Visual Arts

Authors: Yu-Shun Elisa Pong

Abstract:

American composer John Cage (1912-1992) is an influential figure in musical, visual and performing arts after World War II and has also been claimed as a forerunner of the western avant-garde in the artistic field. However, the crucial factors contributed to his highly acclaimed achievements include the Zen enlightenment, which he mainly got from Japanese Zen master D. T. Suzuki (1870-1966). As a kind of reflection and afterthought of the Zen inspiration, John Cage created various forms of arts in which visual arts have recently attracted more and more attention and discussion, especially from the perspectives of Zen. John Cage had started to create visual art works since he was 66 years old and the activity had lasted until his death. The quality and quantity of the works are worthy of in-depth study— the 667 pieces of print, 114 pieces of water color, and about 150 pieces of sketch. Cage’s stylistic changes during the 14 years of creation are quite obvious, and the Zen elements in the later works seem to be omnipresent. Based on comparative artistic study, a historical and conceptual view of Zen art that was formed initially in the traditional Chinese and Japanese visual arts will be discussed. Then, Chinese and Japanese representative Zen works will be mentioned, and the technique aspect, as well as stylistic analysis, will be revealed. Finally, a comprehensive comparison of the original Oriental Zen works with John Cage’s works and focus on the influence, and art transformation will be addressed. The master pieces from Zen tradition by Chinese artists like Liang Kai (d. 1210) and Ma Yuan (1160-1225) from Southern Sung Dynasty, the Japanese artists like Sesshū (1420-1506), Miyamoto Musashi (1584-1645) and some others would be discussed. In the current study, these art works from different periods of historical development in Zen will serve as the basis of analogy, interpretation, and criticism to Cage's visual art works. Through the perspectives of the Zen authenticity from Asia, we see how John Cage appropriated the eastern culture to his innovation, which changed the art world forever. And it is believed that through a transition from inter-, cross-, toward trans-cultural inspiration, John Cage set up a unique pathway of art innovations.

Keywords: John Cage, Chinese Zen art, Japanese Zen art, visual art

Procedia PDF Downloads 492
652 Plant as an Alternative for Anti Depressant Drugs St John's Wort

Authors: Mahdi Akhbardeh

Abstract:

St John's wort plant can help to treat depression disease through decreasing this disease symptom, due to having some similar features of Prozac (Fluoxetine Hcl) pill. People suffering from slight depression who have fear of using antidepressants side effects can use St John's wort drops under doctor observation. This method of treatment is proposed specially to those women who are spending menopause or depression resulted from this period. St John's wort plant have proposed traditional and plant medicine as newest researches in treating mood disorders compared to Prozac (Fluoxetine Hcl) drug in treating depression disease which is being administrated in clinic research center of Washington. Objective: the aim of this study is to find an alternative treatment method in people suffering from depression which are treated with Prozac (Fluoxetine Hcl). Almost 70 percent of treatment failures with Prozac (Fluoxetine Hcl) drug in patients suffering from slight to normal depression is due to intensive side effects including: decrease in blood pressure, reduce in sexual desire and 30 percent of it is due to this drug affectless in treatment procedure which leads to leaving treatment. Results of Hypercuim plant function are exactly similar to antidepressants. Increase in serotonin amount in brain synopsis terminal end causes increase in existence time of this material in this part. In fact these two drugs have similar function. Though side effects of Hypercuim plant(St John's wort) including headache and slight nausea tolerable. Results: St John's wort plant can be used lonely in slight to normal depressions in which patients are avoiding Prozac (Fluoxetine Hcl) drug due to it's side effects. In intensive depressions through which general patients don’t indicate positive response to drug, it is probably expected relative or even complete treatment through combining antidepressants drugs with this plant. This treatment method has been investigated and confirmed in clinical tests and researches.

Keywords: depression, St John's wort, Prozac, antidepressant

Procedia PDF Downloads 455
651 John Cunningham Virus Interaction with Multiple Sclerosis Disease Progression

Authors: Sina Mahdavi

Abstract:

Background and Objective: Multiple sclerosis (MS) is the most common inflammatory autoimmune disease of the central nervous system (CNS) that affects the myelination process in the CNS. Complex interactions of various "environmental or infectious" factors may act as triggers in autoimmunity and disease progression. The association between viral infections, especially the John Cunningham virus (JCV) and MS is one potential cause that is not well understood. This study aims to summarize the available data on JCV infection in MS disease progression. Materials and Methods: For this study, the keywords "Multiple sclerosis", " John Cunningham virus ", and "central nervous system" in the databases PubMed, Google Scholar, Sid, and MagIran between 2019 and 2022 were searched, and 12 articles were chosen, studied, and analyzed. Results: MS patients are candidates for natalizumab therapy, which inhibits lymphocyte migration and increases the risk of progressive multifocal leukoencephalopathy (PML), a rare lytic infection of glial cells caused by JCV. Oligodendrocytes may be the target of JCV infection in the central nervous system (CNS). Conclusion: There is a high expression of JCV during the natalizumab treatment period for MS patients, suggesting that the virus may play a role in the development of MS by inducing an inflammatory state. Therefore, it is necessary to evaluate anti-JCV antibody serum as an important risk factor for the development of PML before deciding on the treatment course for these patients.

Keywords: multiple sclerosis, John Cunningham virus, central nervous system, autoimmunity

Procedia PDF Downloads 97
650 The Evolution of Strike and Intelligence Functions in Special Operations Forces

Authors: John Hardy

Abstract:

The expansion of special operations forces (SOF) in the twenty-first century is often discussed in terms of the size and disposition of SOF units. Research regarding the number SOF personnel, the equipment SOF units procure, and the variety of roles and mission that SOF fulfill in contemporary conflicts paints a fascinating picture of changing expectations for the use of force. A strong indicator of the changing nature of SOF in contemporary conflicts is the fusion of strike and intelligence functions in the SOF in many countries. What were once more distinct roles on the kind of battlefield generally associated with the concept of conventional warfare have become intermingled in the era of persistent conflict which SOF face. This study presents a historical analysis of the co-evolution of the intelligence and direct action functions carried out by SOF in counterterrorism, counterinsurgency, and training and mentoring missions between 2004 and 2016. The study focuses primarily on innovation in the US military and the diffusion of key concepts to US allies first, and then more broadly afterward. The findings show that there were three key phases of evolution throughout the period of study, each coinciding with a process of innovation and doctrinal adaptation. The first phase was characterized by the fusion of intelligence at the tactical and operational levels. The second phase was characterized by the industrial counterterrorism campaigns used by US SOF against irregular enemies in Iraq and Afghanistan. The third phase was characterized by increasing forward collection of actionable intelligence by SOF force elements in the course of direct action raids. The evolution of strike and intelligence functions in SOF operations between 2004 and 2016 was significantly influenced by reciprocity. Intelligence fusion led to more effective targeting, which then increased intelligence collection. Strike and intelligence functions were then enhanced by greater emphasis on intelligence exploitation during operations, which further increased the effectiveness of both strike and intelligence operations.

Keywords: counterinsurgency, counterterrorism, intelligence, irregular warfare, military operations, special operations forces

Procedia PDF Downloads 231
649 Eliminating Arm, Neck and Leg Fatigue of United Asia International Plastics Corporation Workers through Rapid Entire Body Assessment

Authors: John Cheferson R. De Belen, John Paul G. Elizares, Ronald John G. Raz, Janina Elyse A. Reyes, Charie G. Salengua, Aristotle L. Soriano

Abstract:

Plastic is a type of synthetic or man-made polymer that can readily be molded into a variety of products. Its usage over the past century has enabled society to make huge technological advances. The workers of United Asia International Plastics Corporation (UAIPC), a plastic manufacturing company performs manual packaging which causes fatigue and stress on their arm, neck, and legs due to extended periods of standing and repetitive motions. With the use of the Fishbone Diagram, Five-Why Analysis, Rapid Entire Body Assessment (REBA), and Anthropometry, the stressful tasks and activities were identified and analyzed. Given the anthropometric measurements obtained from the workers, improved dimensions for the tables and chairs should be used and provide a new packaging machine. The validation of this proposal shall follow after its implementation. By eliminating fatigue during working hours in the production, the workers will be at ease at performing their work properly; productivity will increase that will lead to more profit. Further areas for study include measurement and comparison of the worker’s anthropometric measurement with the industry standard.

Keywords: anthropometry, fishbone diagram, five-why analysis, rapid entire body assessment

Procedia PDF Downloads 228
648 Creating a Virtual Perception for Upper Limb Rehabilitation

Authors: Nina Robson, Kenneth John Faller II, Vishalkumar Ahir, Arthur Ricardo Deps Miguel Ferreira, John Buchanan, Amarnath Banerjee

Abstract:

This paper describes the development of a virtual-reality system ARWED, which will be used in physical rehabilitation of patients with reduced upper extremity mobility to increase limb Active Range of Motion (AROM). The ARWED system performs a symmetric reflection and real-time mapping of the patient’s healthy limb on to their most affected limb, tapping into the mirror neuron system and facilitating the initial learning phase. Using the ARWED, future experiments will test the extension of the action-observation priming effect linked to the mirror-neuron system on healthy subjects and then stroke patients.

Keywords: physical rehabilitation, mirror neuron, virtual reality, stroke therapy

Procedia PDF Downloads 395
647 The Co-Existence of Multidominance and Movement in the Syntax of Chinese Bi-Comparatives

Authors: Yaqing Hu

Abstract:

This paper puts forward a syntactic analysis involving multidominance and rightward movement in Chinese bi-comparatives, as in 'Yuehan bi Mali gao (John is taller than Mary).' It is argued here that the predicate of comparison is a shared constituent in two small clauses, namely one for the target and one for the standard; and then it moves rightward to form a degree phrase with the comparative morpheme. This proposal comes from four aspects. First, the example above can also be expressed in this way, 'A: Yuehan he Mali, shui gao? (John and Mary, who is taller?) B: Yuehan gao./Yuehan geng gao. (John is taller).' This shows that the gradable adjective is predicated of the target. In addition, according to a constraint on Chinese bi-comparatives, namely the target and the standard must be arguments of the predicate simultaneously, it is not unreasonable to assume that the gradable adjective may also be predicated of the standard. Second, subcomparatives are totally disallowed in Chinese, as in '*zhe-zhang zhuozi bi zhe-zhang yizi kuan chang. (This table is longer than this chair is wide.)' In order to save it from ungrammaticality, the target and the standard should be compared along the same dimension denoted by the gradable adjective. It may follow that in Chinese comparatives, having equal roles in the same eventuality, the target and the standard bear the same thematic relationship with the predicate of comparison. Third, verb-copy can appear in Chinese bi-comparatives, as in 'Yuehan qi ma bi Mali qi ma qi de kuai. (John rides horses faster than Mary does.)' The predicate qi seems to form a small clause with both the target and the standard. This might be supporting evidence that both the target and the standard share the predicate of comparison. Fourth, Chinese comparatives do have comparative morphemes, as in 'Yuehan bi Mali geng gao. (John is taller than Mary)', which is semantically equivalent to the first example above. Thus, it follows that one feature of Chinese comparative morphemes is that they can remain overt or covert in the syntax, which will not affect semantics. This further shows that comparative morphemes in bi-comparatives may not be able to saturate the degree argument denoted by the predicate of comparison due to its optionality in the structure. These four aspects present a challenge to the Direct Analysis used in Chinese comparatives since this approach would presume that the target and the standard somehow show independency with the predicate in the syntax. Meanwhile, this study also rejects the previous analysis of multidomiance in bi-comparatives in which the degree phrase comprised of the comparative morpheme and the gradable adjective may be shared by the standard when the comparative morpheme is covert. This syntactic analysis proposed in this study will therefore offer a different perspective of how to treat degree phrase in Chinese comparatives and may offer evidence to argue whether there is degree phrase movement in bi-comparatives as in its English counterparts.

Keywords: Chinese comparatives, degree phrase, movement, multidominance, syntactic analysis

Procedia PDF Downloads 300
646 Conceptualizing Conflict in the Gray Zone: A Comparative Analysis of Diplomatic, Military and Political Lenses

Authors: John Hardy, Paul Lushenko

Abstract:

he twenty-first century international security order has been fraught with challenges to the credibility and stability of the post-Cold War status quo. Although the American-led international system has rarely been threatened directly by dissatisfied states, an underlying challenge to the international security order has emerged in the form of a slow-burning abnegation of small but significant aspects of the status quo. Meanwhile, those security challenges which have threatened to destabilize order in the international system have not clearly belonged to the traditional notions of diplomacy and armed conflict. Instead, the main antagonists have been both states and non-state actors, the issues have crossed national and international boundaries, and contestation has occurred in a ‘gray zone’ between peace and war. Gray zone conflicts are not easily categorized as military operations, national security policies or political strategies, because they often include elements of diplomacy, military operations, and statecraft in complex combinations. This study applies three approaches to conceptualizing the gray zone in which many contemporary conflicts take place. The first approach frames gray zone conflicts as a form of coercive diplomacy, in which armed force is used to add credibility and commitment to political threats. The second approach frames gray zone conflicts as a form of discrete military operation, in which armed force is used sparingly and is limited to a specific issue. The third approach frames gray zones conflicts as a form of proxy war, in which armed force is used by or through third parties, rather than directly between belligerents. The study finds that each approach to conceptualizing the gray zone accounts for only a narrow range of issues which fall within the gap between traditional notions of peace and war. However, in combination, all three approaches are useful in explicating the gray zone and understanding the character of contemporary security challenges which defy simple categorization. These findings suggest that coercive diplomacy, discrete military operations, and proxy warfare provide three overlapping lenses for conceptualizing the gray zone and for understanding the gray zone conflicts which threaten international security in the early twenty-first century.

Keywords: gray zone, international security, military operations, national security, strategy

Procedia PDF Downloads 131
645 Detection of Polymorphism of Growth Hormone Gene in Holstein Cattle

Authors: Emine Şahin, Murat Soner Balcıoğlu

Abstract:

The aim of this study was to determine the growth hormone (bGH) gene polymorphism in the Holstein cattle growing around Antalya in Turkey. In order to determine the bGH-AluI polymorphism, polymerase chain reaction - restriction fragment length polymorphism (PCR-RFLP) method was performed. A 891 bp fragment of bGH was amplified and two types of alleles C and D for bGH were observed. In this study, the frequencies of C and D alleles were 0.8438 and 0.1562, respectively. The genotype frequencies for CC, CD and DD were 0.787, 0.191 and 0.022, respectively. According to the results of the chi-square test, a significant deviation from the Hardy-Weinberg equilibrium was not determined for the bGH locus in the population.

Keywords: Growth Hormone Gene, Holstein , Polymorphism, RFLP

Procedia PDF Downloads 340
644 Political Coercion from Within: Theoretical Convergence in the Strategies of Terrorist Groups, Insurgencies, and Social Movements

Authors: John Hardy

Abstract:

The early twenty-first century national security environment has been characterized by political coercion. Despite an abundance of political commentary on the various forms of non-state coercion leveraged against the state, there is a lack of literature which distinguishes between the mechanisms and the mediums of coercion. Frequently non-state movements seeking to coerce the state are labelled by their tactics, not their strategies. Terrorists, insurgencies and social movements are largely defined by the ways in which they seek to influence the state, rather than by their political aims. This study examines the strategies of coercion used by non-state actors against states. This approach includes terrorist groups, insurgencies, and social movements who seek to coerce state politics. Not all non-state actors seek political coercion, so not all examples of different group types are considered. This approach also excludes political coercion by states, focusing on the non-state actor as the primary unit of analysis. The study applies a general theory of political coercion, which is defined as attempts to change the policies or action of a polity against its will, to the strategies employed by terrorist groups, insurgencies, and social movements. This distinguishes non-state actors’ strategic objectives from their actions and motives, which are variables that are often used to differentiate between types of non-state actors and the labels commonly used to describe them. It also allows for a comparative analysis of theoretical perspectives from the disciplines of terrorism, insurgency and counterinsurgency, and social movements. The study finds that there is a significant degree of overlap in the way that different disciplines conceptualize the mechanism of political coercion by non-state actors. Studies of terrorism and counterterrorism focus more on the notions of cost tolerance and collective punishment, while studies of insurgency focus on a contest of legitimacy between actors, and social movement theory tend to link political objectives, social capital, and a mechanism of influence to leverage against the state. Each discipline has a particular vernacular for the mechanism of coercion, which is often linked to the means of coercion, but they converge on three core theoretical components of compelling a polity to change its policies or actions: exceeding resistance to change, using political or violent punishments, and withholding legitimacy or consent from a government.

Keywords: counter terrorism, homeland security, insurgency, political coercion, social movement theory, terrorism

Procedia PDF Downloads 146
643 Some Considerations about the Theory of Spatial-Motor Thinking Applied to a Traditional Fife Band in Brazil

Authors: Murilo G. Mendes

Abstract:

This text presents part of the results presented in the Ph.D. thesis that has used John Baily's theory and method as well as its ethnographic application in the context of the fife flutes of the Banda Cabaçal dos Irmãos Aniceto in the state of Ceará, northeast of Brazil. John Baily is a British ethnomusicologist dedicated to studying the relationships between music, musical gesture, and embodied cognition. His methodology became a useful tool to highlight historical-social aspects present in the group's instrumental music. Remaining indigenous and illiterate, these musicians played and transmitted their music from generation to generation, for almost two hundred years, without any nomenclature or systematization of the fingering performed on the flute. In other words, his music, free from any theorization, is learned, felt, perceived, and processed directly through hearing and through the relationship between the instrument's motor skills and its sound result. For this reason, Baily's assumptions became fundamental in the analysis processes. As the author's methodology recommends, classes were held with the natives and provided technical musical learning and some important concepts. Then, transcriptions and analyses of musical aspects were made from patterns of movement on the instrument incorporated by repetitions and/or by the intrinsic facility of the instrument. As a result, it was discovered how the group reconciled its indigenous origins with the demand requested by the public power and the interests of the local financial elite from the mid-twentieth century. The article is structured from the cultural context of the group, where local historical and social aspects influence the social and musical practices of the group. Then, will be present the methodological conceptions of John Baily and, finally, their application in the music of the Irmãos Aniceto. The conclusion points to the good results of identifying, through this methodology and analysis, approximations between discourse, historical-social factors, and musical text. Still, questions are raised about its application in other contexts.

Keywords: Banda Cabaçal dos Irmãos Aniceto, John Baily, pífano, spatial-motor thinking

Procedia PDF Downloads 96
642 Navigating Politics of Black Marginalization: A Critical Reflection of the Guardian by John Grisham

Authors: Fayaz Ali Shah, Aleena Shehzad

Abstract:

The incidents of race or racial discrimination is still a part of the advanced and the so-called twenty-first-century America. It not only affects America's society but also greatly influences the third world countries due to the colonial approach by the British and America. Due to this discrimination, hundreds of Blacks in the US have been disappeared or prisoned for crimes they have not committed. The same sort of inequality can be seen in Pakistan due to the discrimination and prejudice by the Pakistani government and militants. Especially the tribal areas of Pakistan have been facing the worst in such situations. Thousands of people have been disappeared since 9/11 due to the adulterous approach by the government and military. The article is an approach to show the still racist view or Black marginalization, on the paradigm of racism, in the novel 'The Guardian' written by John Grisham. Also, it will enlighten readers about Pakistan's military and government approach towards discrimination, which creates great chaos in the country nowadays. The research will be qualitative and will use Critical Race Theory by Delgado and Steffencic for analysis.

Keywords: blacks, colonial, discrimination, disappeared, prison

Procedia PDF Downloads 152
641 Understanding John H. Johnson and Ebony Magazine Financial Responsiveness to Rise of Black Power in the U.S, 1966

Authors: Sid Ahmed Ziane

Abstract:

This paper argues for Johnson's financial responsiveness to the rise of Black Power and its advocate, 'Stokely Carmichael' in 1966. John H. Johnson was a Black businessman and the owner of Ebony magazine, one of the widely read Black magazines in the U.S. His magazine, however, was designed only to promoting Black fashion, aesthetic, marketing, and consumerism. In mid-1966, the mainstream of the Civil Rights movement was heading into two distinct camps when some of its advocates, led by Stokely Carmichael, began to question the slow pace of the Civil Rights and sought to pursue a more radical approach to bring about upheaval to the Black community. Their new approach, however, propelled the national media into paying close attention to their activities, their new methods, and their radical orientations. In fact, the major White-oriented media discredited Carmichael and distorted his public image via sensational stories and race-mongering reports. However, the Black owned outlets such as The Liberator advocated his agendas, whereas other magazines such as The Crisis rejected them. Based on such oral sources and Ebony’s online issues, this paper adds and argues that Johnson had also responded to the rise of Black Power and Carmichael. This reaction had, in fact, aimed at scooping and selling Carmichael and his new orientation as well as advertising him in his magazine to attract the readers who showed a strong tendency to hear and read about the heyday and even the ferment of Black Power. This paper is part of an ongoing project which aims at framing our understanding of how the Black print media and the modern Black liberation struggle were correlated and could shape each other by appraising their agendas, milestones, and their pivotal figures.

Keywords: Black power, Ebony magazine, John Johson, Stokely Carmichael

Procedia PDF Downloads 133
640 The Internet of Things Ecosystem: Survey of the Current Landscape, Identity Relationship Management, Multifactor Authentication Mechanisms, and Underlying Protocols

Authors: Nazli W. Hardy

Abstract:

A critical component in the Internet of Things (IoT) ecosystem is the need for secure and appropriate transmission, processing, and storage of the data. Our current forms of authentication, and identity and access management do not suffice because they are not designed to service cohesive, integrated, interconnected devices, and service applications. The seemingly endless opportunities of IoT are in fact circumscribed on multiple levels by concerns such as trust, privacy, security, loss of control, and related issues. This paper considers multi-factor authentication (MFA) mechanisms and cohesive identity relationship management (IRM) standards. It also surveys messaging protocols that are appropriate for the IoT ecosystem.

Keywords: identity relation management, multifactor authentication, protocols, survey of internet of things ecosystem

Procedia PDF Downloads 324
639 Therapeutic Management of Toxocara canis Induced Hepatitis in Dogs

Authors: Milind D. Meshram

Abstract:

Ascarids are the most frequent worm parasite of dogs and cats. There are two species that commonly infect dogs: Toxocara canis and Toxascaris leonina. Adult roundworms live in the stomach and intestines and can grow to 7 inches (18 cm) long. A female may lay 200,000 eggs in a day. The eggs are protected by a hard shell. They are extremely hardy and can live for months or years in the soil. A dog aged about 6 years, from Satara was referred to Teaching Veterinary Clinical Complex (TVCC) with a complaint of abdominal pain, anorexia, loss of condition and dull body coat with mucous pale membrane. The clinical examination revealed Anaemia, palpation of abdomen revealed enlargement of liver, slimy feel of the intestine loop, diarrhea.

Keywords: therapeutic management, Toxocara canis, induced hepatitis, dogs

Procedia PDF Downloads 562
638 Applications of Multi-Path Futures Analyses for Homeland Security Assessments

Authors: John Hardy

Abstract:

A range of future-oriented intelligence techniques is commonly used by states to assess their national security and develop strategies to detect and manage threats, to develop and sustain capabilities, and to recover from attacks and disasters. Although homeland security organizations use future's intelligence tools to generate scenarios and simulations which inform their planning, there have been relatively few studies of the methods available or their applications for homeland security purposes. This study presents an assessment of one category of strategic intelligence techniques, termed Multi-Path Futures Analyses (MPFA), and how it can be applied to three distinct tasks for the purpose of analyzing homeland security issues. Within this study, MPFA are categorized as a suite of analytic techniques which can include effects-based operations principles, general morphological analysis, multi-path mapping, and multi-criteria decision analysis techniques. These techniques generate multiple pathways to potential futures and thereby generate insight into the relative influence of individual drivers of change, the desirability of particular combinations of pathways, and the kinds of capabilities which may be required to influence or mitigate certain outcomes. The study assessed eighteen uses of MPFA for homeland security purposes and found that there are five key applications of MPFA which add significant value to analysis. The first application is generating measures of success and associated progress indicators for strategic planning. The second application is identifying homeland security vulnerabilities and relationships between individual drivers of vulnerability which may amplify or dampen their effects. The third application is selecting appropriate resources and methods of action to influence individual drivers. The fourth application is prioritizing and optimizing path selection preferences and decisions. The fifth application is informing capability development and procurement decisions to build and sustain homeland security organizations. Each of these applications provides a unique perspective of a homeland security issue by comparing a range of potential future outcomes at a set number of intervals and by contrasting the relative resource requirements, opportunity costs, and effectiveness measures of alternative courses of action. These findings indicate that MPFA enhances analysts’ ability to generate tangible measures of success, identify vulnerabilities, select effective courses of action, prioritize future pathway preferences, and contribute to ongoing capability development in homeland security assessments.

Keywords: homeland security, intelligence, national security, operational design, strategic intelligence, strategic planning

Procedia PDF Downloads 116
637 Application of Western and Islamic Philosophy to Business Ethics

Authors: Elmamy Ahmedsalem

Abstract:

The world has witnessed the collapse of many corporate giants as a result of unethical behavior in recent decades. This has induced a series of questions by the global community on why such occurrences could happen, even with corporate governance in place. This paper attempts to propose a philosophical approach from an Islamic perspective to be consolidated with current corporate governance in order to confront contemporary dilemmas. In this paper, ethical theories are presented as a discussion followed by their applications to modern cases of financial collapses. Virtue ethics by Aristotle, justice and fairness by John Rawls, deontology by Immanuel Kant, and utilitarianism by John Stuart Mill, are the four theories which can then be contrasted with the paradigm of Muslim scholars. Despite the differences between the fundamental principles of Islamic and Western worldviews, their ethical theories are aimed at making right decisions and solving ethical dilemmas based on what is good for society. Therefore, Islamic principles should be synthesized with Western philosophy to form a more coherent framework. The integration of Islamic and western ethical theories into business is important for sound corporate governance.

Keywords: business ethics, Islamic philosophy, western philosophy, Western and Islamic worldview of ethics

Procedia PDF Downloads 446