Search results for: Paul Arnold
519 The Desire to Know: Arnold’s Contribution to a Psychological Conceptualization of Academic Motivation
Authors: F. Ruiz-Fuster
Abstract:
Arnold’s redefinition of human motives can sustain a psychology of education which emphasizes the beauty of knowledge and the exercise of intellectual functions. Thus, education instead of focusing on skills and learning by doing would be centered on ‘the widest reaches of the human spirit’. One way to attain it is by developing children’s inherent interest. Arnold takes into account the fact that the desire to know is the inherent interest which leads students to explore and learn. She also emphasizes the need of exercising human functions as thinking, judging and reasoning. According to Arnold, the influence of psychological theories of motivation in education has derived in considering that all learning and school tasks should derive from children’s needs and impulses. The desire to know and the curiosity have not been considered as basic and active as any instinctive drive or basic need, so there has been an attempt to justify and understand how biological drives guide student’s learning. However, understanding motives and motivation not as a drive, an instinct or an impulse guided by our basic needs, but as a want that leads to action can help to understand, from a psychological perspective, how teachers can motivate students to learn, strengthening their desire and interest to reason and discover the whole new world of knowledge.Keywords: academic motivation, interests, desire to know, educational psychology, intellectual functions
Procedia PDF Downloads 152518 Bitplanes Gray-Level Image Encryption Approach Using Arnold Transform
Authors: Ali Abdrhman M. Ukasha
Abstract:
Data security needed in data transmission, storage, and communication to ensure the security. The single step parallel contour extraction (SSPCE) method is used to create the edge map as a key image from the different Gray level/Binary image. Performing the X-OR operation between the key image and each bit plane of the original image for image pixel values change purpose. The Arnold transform used to changes the locations of image pixels as image scrambling process. Experiments have demonstrated that proposed algorithm can fully encrypt 2D Gary level image and completely reconstructed without any distortion. Also shown that the analyzed algorithm have extremely large security against some attacks like salt & pepper and JPEG compression. Its proof that the Gray level image can be protected with a higher security level. The presented method has easy hardware implementation and suitable for multimedia protection in real time applications such as wireless networks and mobile phone services.Keywords: SSPCE method, image compression-salt- peppers attacks, bitplanes decomposition, Arnold transform, lossless image encryption
Procedia PDF Downloads 436517 Bitplanes Image Encryption/Decryption Using Edge Map (SSPCE Method) and Arnold Transform
Authors: Ali A. Ukasha
Abstract:
Data security needed in data transmission, storage, and communication to ensure the security. The single step parallel contour extraction (SSPCE) method is used to create the edge map as a key image from the different Gray level/Binary image. Performing the X-OR operation between the key image and each bit plane of the original image for image pixel values change purpose. The Arnold transform used to changes the locations of image pixels as image scrambling process. Experiments have demonstrated that proposed algorithm can fully encrypt 2D Gary level image and completely reconstructed without any distortion. Also shown that the analyzed algorithm have extremely large security against some attacks like salt & pepper and JPEG compression. Its proof that the Gray level image can be protected with a higher security level. The presented method has easy hardware implementation and suitable for multimedia protection in real time applications such as wireless networks and mobile phone services.Keywords: SSPCE method, image compression, salt and peppers attacks, bitplanes decomposition, Arnold transform, lossless image encryption
Procedia PDF Downloads 497516 Voice Liveness Detection Using Kolmogorov Arnold Networks
Authors: Arth J. Shah, Madhu R. Kamble
Abstract:
Voice biometric liveness detection is customized to certify an authentication process of the voice data presented is genuine and not a recording or synthetic voice. With the rise of deepfakes and other equivalently sophisticated spoofing generation techniques, it’s becoming challenging to ensure that the person on the other end is a live speaker or not. Voice Liveness Detection (VLD) system is a group of security measures which detect and prevent voice spoofing attacks. Motivated by the recent development of the Kolmogorov-Arnold Network (KAN) based on the Kolmogorov-Arnold theorem, we proposed KAN for the VLD task. To date, multilayer perceptron (MLP) based classifiers have been used for the classification tasks. We aim to capture not only the compositional structure of the model but also to optimize the values of univariate functions. This study explains the mathematical as well as experimental analysis of KAN for VLD tasks, thereby opening a new perspective for scientists to work on speech and signal processing-based tasks. This study emerges as a combination of traditional signal processing tasks and new deep learning models, which further proved to be a better combination for VLD tasks. The experiments are performed on the POCO and ASVSpoof 2017 V2 database. We used Constant Q-transform, Mel, and short-time Fourier transform (STFT) based front-end features and used CNN, BiLSTM, and KAN as back-end classifiers. The best accuracy is 91.26 % on the POCO database using STFT features with the KAN classifier. In the ASVSpoof 2017 V2 database, the lowest EER we obtained was 26.42 %, using CQT features and KAN as a classifier.Keywords: Kolmogorov Arnold networks, multilayer perceptron, pop noise, voice liveness detection
Procedia PDF Downloads 39515 An Efficient Encryption Scheme Using DWT and Arnold Transforms
Authors: Ali Abdrhman M. Ukasha
Abstract:
Data security needed in data transmission, storage, and communication to ensure the security. The color image is decomposed into red, green, and blue channels. The blue and green channels are compressed using 3-levels discrete wavelet transform. The Arnold transform uses to changes the locations of red image channel pixels as image scrambling process. Then all these channels are encrypted separately using a key image that has same original size and is generating using private keys and modulo operations. Performing the X-OR and modulo operations between the encrypted channels images for image pixel values change purpose. The extracted contours of color image recovery can be obtained with accepted level of distortion using Canny edge detector. Experiments have demonstrated that proposed algorithm can fully encrypt 2D color image and completely reconstructed without any distortion. It has shown that the color image can be protected with a higher security level. The presented method has easy hardware implementation and suitable for multimedia protection in real time applications such as wireless networks and mobile phone services.Keywords: color image, wavelet transform, edge detector, Arnold transform, lossy image encryption
Procedia PDF Downloads 482514 Robust Data Image Watermarking for Data Security
Authors: Harsh Vikram Singh, Ankur Rai, Anand Mohan
Abstract:
In this paper, we propose secure and robust data hiding algorithm based on DCT by Arnold transform and chaotic sequence. The watermark image is scrambled by Arnold cat map to increases its security and then the chaotic map is used for watermark signal spread in middle band of DCT coefficients of the cover image The chaotic map can be used as pseudo-random generator for digital data hiding, to increase security and robustness .Performance evaluation for robustness and imperceptibility of proposed algorithm has been made using bit error rate (BER), normalized correlation (NC), and peak signal to noise ratio (PSNR) value for different watermark and cover images such as Lena, Girl, Tank images and gain factor .We use a binary logo image and text image as watermark. The experimental results demonstrate that the proposed algorithm achieves higher security and robustness against JPEG compression as well as other attacks such as addition of noise, low pass filtering and cropping attacks compared to other existing algorithm using DCT coefficients. Moreover, to recover watermarks in proposed algorithm, there is no need to original cover image.Keywords: data hiding, watermarking, DCT, chaotic sequence, arnold transforms
Procedia PDF Downloads 515513 Multilevel Gray Scale Image Encryption through 2D Cellular Automata
Authors: Rupali Bhardwaj
Abstract:
Cryptography is the science of using mathematics to encrypt and decrypt data; the data are converted into some other gibberish form, and then the encrypted data are transmitted. The primary purpose of this paper is to provide two levels of security through a two-step process, rather than transmitted the message bits directly, first encrypted it using 2D cellular automata and then scrambled with Arnold Cat Map transformation; it provides an additional layer of protection and reduces the chance of the transmitted message being detected. A comparative analysis on effectiveness of scrambling technique is provided by scrambling degree measurement parameters i.e. Gray Difference Degree (GDD) and Correlation Coefficient.Keywords: scrambling, cellular automata, Arnold cat map, game of life, gray difference degree, correlation coefficient
Procedia PDF Downloads 377512 Fingerprint Image Encryption Using a 2D Chaotic Map and Elliptic Curve Cryptography
Authors: D. M. S. Bandara, Yunqi Lei, Ye Luo
Abstract:
Fingerprints are suitable as long-term markers of human identity since they provide detailed and unique individual features which are difficult to alter and durable over life time. In this paper, we propose an algorithm to encrypt and decrypt fingerprint images by using a specially designed Elliptic Curve Cryptography (ECC) procedure based on block ciphers. In addition, to increase the confusing effect of fingerprint encryption, we also utilize a chaotic-behaved method called Arnold Cat Map (ACM) for a 2D scrambling of pixel locations in our method. Experimental results are carried out with various types of efficiency and security analyses. As a result, we demonstrate that the proposed fingerprint encryption/decryption algorithm is advantageous in several different aspects including efficiency, security and flexibility. In particular, using this algorithm, we achieve a margin of about 0.1% in the test of Number of Pixel Changing Rate (NPCR) values comparing to the-state-of-the-art performances.Keywords: arnold cat map, biometric encryption, block cipher, elliptic curve cryptography, fingerprint encryption, Koblitz’s encoding
Procedia PDF Downloads 204511 Yu Kwang-Chung vs. Yu Kwang-Chung: Untranslatability as the Touchstone of a Poet
Authors: Min-Hua Wu
Abstract:
The untranslatability of an established poet’s tour de force is thoroughly explored by Matthew Arnold (1822-1888). In his On Translating Homer (1861), Arnold lists the four most striking poetic qualities of Homer, namely his rapidity, plainness and directness of style and diction, plainness and directness of ideas, and nobleness. He concludes that such celebrated English translators as Cowper, Pope, Chapman, and Mr. Newman are all doomed, due to their respective failure in rendering the totality of the four Homeric poetic qualities. Why poetic translation always amounts to being proven such a mission impossible for the translator? According to Arnold, it is because there constantly exists a mist interposed between the translator’s own literary self-obsession and the objective artistic qualities that reside in the work of the original author. Foregrounding such a seemingly empowering yet actually detrimental poetic mist, he explains why the aforementioned translators fail in their attempts to bring the Homeric charm to the British reader. Drawing on Arnold’s analytical study on Homeric translation, the research attempts to bring Yu Kwang-chung the poet vis-à-vis Yu Kwang-chung the translator, with an aim not so much to find any similar mist as revealed by Arnold between his Chinese poetry and English translation as to probe into a latent and veiled literary and lingual mist interposed between Chinese and English, if not between Chinese and English literatures. The major work studied and analyzed for this study is Yu’s own Chinese poetry and his own English translation collected in The Night Watchman: Yu Kwang-chung 1958-2004. The research argues that the following critical elements that characterizes Yu’s poetics are to a certain extent 'transformed,' if not 'lost,' in his English translation: a. the Chinese pictographic and ideographic unit terms which so unfailingly characterize the poet’s incredible creativity, allowing him to habitually and conveniently coin concrete textual images or word-scapes almost at his own will; b. the subtle wordplay and punning which appear at a reasonable frequency; c. the parallel contrastive repetitive syntactic structure within a single poetic line; d. the ambiguous and highly associative diction in the adjective and noun categories; e. the literary allusion that harks back to the old times of Chinese literature; f. the alliteration that adds rhythm and smoothness to the lines; g. the rhyming patterns that bring about impressive sonority and lingering echo to the ears of the reader; h. the grandeur-imposing and sublimity-arousing word-scaping which hinges on the employment of verbs; i. the meandering cultural heritage that embraces such elements as Chinese medicine and kung fu; and j. other features of the like. Once we appeal to the Arnoldian tribunal and resort to the strict standards of such a Victorian cultural and literary critic who insists 'to see the object as in itself it really is,' we may serve as a potential judge for the tug of war between Yu Kwang-chung the poet and Yu Kwang-chung the translator, a tug of war that will not merely broaden our understating of Chinese poetics but deepen our apprehension of Chinese-English translatology.Keywords: Yu Kwang-chung, The Night Watchman, poetry translation, Chinese-English translation, translation studies, Matthew Arnold
Procedia PDF Downloads 392510 Executive Function in Youth With ADHD and ASD: A Systematic Review and Meta-analysis
Authors: Parker Townes, Prabdeep Panesar, Chunlin Liu, Soo Youn Lee, Dan Devoe, Paul D. Arnold, Jennifer Crosbie, Russell Schachar
Abstract:
Attention-deficit hyperactivity disorder (ADHD) and autism spectrum disorder (ASD) are impairing childhood neurodevelopmental disorders with problems in executive functions. Executive functions are higher-level mental processes essential for daily functioning and goal attainment. There is genetic and neural overlap between ADHD and ASD. The aim of this meta-analysis was to evaluate if pediatric ASD and ADHD have distinct executive function profiles. This review was completed following Cochrane guidelines. Fifty-eight articles were identified through database searching, followed by a blinded screening in duplicate. A meta-analysis was performed for all task performance metrics evaluated by at least two articles. Forty-five metrics from 24 individual tasks underwent analysis. No differences were found between youth with ASD and ADHD in any domain under direct comparison. However, individuals with ASD and ADHD exhibited deficient attention, flexibility, visuospatial abilities, working memory, processing speed, and response inhibition compared to controls. No deficits in planning were noted in either disorder. Only 11 studies included a group with comorbid ASD+ADHD, making it difficult to determine whether common executive function deficits are a function of comorbidity. Further research is needed to determine if comorbidity accounts for the apparent commonality in executive function between ASD and ADHD.Keywords: autism spectrum disorder, ADHD, neurocognition, executive function, youth
Procedia PDF Downloads 76509 Color Image Compression/Encryption/Contour Extraction using 3L-DWT and SSPCE Method
Authors: Ali A. Ukasha, Majdi F. Elbireki, Mohammad F. Abdullah
Abstract:
Data security needed in data transmission, storage, and communication to ensure the security. This paper is divided into two parts. This work interests with the color image which is decomposed into red, green and blue channels. The blue and green channels are compressed using 3-levels discrete wavelet transform. The Arnold transform uses to changes the locations of red image channel pixels as image scrambling process. Then all these channels are encrypted separately using the key image that has same original size and are generating using private keys and modulo operations. Performing the X-OR and modulo operations between the encrypted channels images for image pixel values change purpose. The extracted contours from color images recovery can be obtained with accepted level of distortion using single step parallel contour extraction (SSPCE) method. Experiments have demonstrated that proposed algorithm can fully encrypt 2D Color images and completely reconstructed without any distortion. Also shown that the analyzed algorithm has extremely large security against some attacks like salt and pepper and Jpeg compression. Its proof that the color images can be protected with a higher security level. The presented method has easy hardware implementation and suitable for multimedia protection in real time applications such as wireless networks and mobile phone services.Keywords: SSPCE method, image compression and salt and peppers attacks, bitplanes decomposition, Arnold transform, color image, wavelet transform, lossless image encryption
Procedia PDF Downloads 518508 Men's Relationships in D. H. Lawrence's 'Sons and Lovers'
Authors: Chaich Hamza Walid
Abstract:
The primary goal of this paper is to question the situation of men’s place in D.H Lawrence’s Sons and Lovers. Our question is what is the role of each man in the novel? And how a mother’s possessiveness had changed the life of all men in the family? David Herbert Lawrence was an important and controversial English writer of the 20th century. He wrote many great works, one of his most popular novels, Sons and Loves, is an autobiographical account of his youth. This novel is about the life of the Morels. The author develops the story by portraying the relationships between many characters, especially the male ones we focus on. ‘Sons and Lovers’ seems to be written especially to women, all what Lawrence wrote is about women but when we go deeper, we see that Lawrence was also interested in men. This work will approach the question in two ways. The first chapter will deal with men’s place in D.H Lawrence’s Sons and Lovers, more exactly with Paul and his father Walter Morel, and with Baxter Dawes. We will focus on each man’s behavior with one another. In the second chapter, we will analyze possessiveness, that is to say, the desire of holding or having someone as one’s own or under one’s control. We will try to prove this view from the spiritual and symbolic possession of different relationships. Our study will be through an intensive psychological analysis of a wife’s possessiveness to her husband, and a mother’s possessiveness to her son’s; William and Paul. The conclusion will review all the important aspects of this analysis. It is very important to know about men’s relationships in D.H Lawrence’s Sons and Lovers this will give us another vision of the novel, and where we can situate Paul’s true relationships, that is to say, his relationships with his father and the other men in the novel.Keywords: language, literature, English, civilisation
Procedia PDF Downloads 461507 Music of a Film City: Interwar Europe in Los Angeles, 1930s
Authors: Alexander Rosenblatt
Abstract:
The musical culture of the city of Los Angeles, as it is seen today, developed not without the influence of outstanding musicians who came from Europe during the period between the world wars. The combination of European modernist ideas with American musical culture, which differed in many ways from European musical culture, led to unique results. During the 1920s and even more so in the 1930s, members of the Austrian-German artistic intelligentsia, particularly those of Jewish origin who felt insecure in their homeland, began to look for a safer place. The United States has become such a place for many, and many of them chose the second largest metropolis—Los Angeles. The most notable figure in this group was the modernist composer Arnold Schoenberg. Other famous musicians were conductors Otto Klemperer and Bruno Walter. The study focused on how these people acclimated to a city whose culture and business revolved around film production; what place the conductors Klemperer and Walter occupied in the city, state, and country; how Schoenberg, whose musical style was little understood by the American public, was able to realize himself; what path he took when he was accepted to two universities as a professor of counterpoint and composition; and whether he revised his own views on the development of Western music. Another aspect was the study of how the composer’s memory was preserved in the universities where he taught. The study is based primarily on materials found in four libraries of two universities located in Los Angeles, UCLA and USC, during my tenure as a visiting scholar at USC Thornton School of Music (August 2023), to be completed during my upcoming visit there in August-September 2024, as well as on interviews with people active in efforts to keep Schoenberg’s memory alive on the USC Campus.Keywords: los angeles, filmmaking, immigrant musicians, arnold schoenberg, otto klemperer, bruno walter
Procedia PDF Downloads 26506 The Executive Functioning Profile of Children and Adolescents with a Diagnosis of OCD: A Systematic Review and Meta-Analysis
Authors: Parker Townes, Aisouda Savadlou, Shoshana Weiss, Marina Jarenova, Suzzane Ferris, Dan Devoe, Russel Schachar, Scott Patten, Tomas Lange, Marlena Colasanto, Holly McGinn, Paul Arnold
Abstract:
Some research suggests obsessive-compulsive disorder (OCD) is associated with impaired executive functioning: higher-level mental processes involved in carrying out tasks and solving problems. Relevant literature was identified systematically through online databases. Meta-analyses were conducted for task performance metrics reported by at least two articles. Results were synthesized by the executive functioning domain measured through each performance metric. Heterogeneous literature was identified, typically involving few studies using consistent measures. From 29 included studies, analyses were conducted on 33 performance metrics from 12 tasks. Results suggest moderate associations of working memory (two out of five tasks presented significant findings), planning (one out of two tasks presented significant findings), and visuospatial abilities (one out of two tasks presented significant findings) with OCD in youth. There was inadequate literature or contradictory findings for other executive functioning domains. These findings suggest working memory, planning, and visuospatial abilities are impaired in pediatric OCD, with mixed results. More work is needed to identify the effect of age and sex on these results. Acknowledgment: This work was supported by the Alberta Innovates Translational Health Chair in Child and Youth Mental Health. The funders had no role in the design, conducting, writing, or decision to submit this article for publication.Keywords: obsessive-compulsive disorder, neurocognition, executive functioning, adolescents, children
Procedia PDF Downloads 99505 Gaussian Operations with a Single Trapped Ion
Authors: Bruna G. M. Araújo, Pedro M. M. Q. Cruz
Abstract:
In this letter, we review the literature of the major concepts that govern Gaussian quantum information. As we work with quantum information and computation with continuous variables, Gaussian states are needed to better describe these systems. Analyzing a single ion locked in a Paul trap we use the interaction picture to obtain a toolbox of Gaussian operations with the ion-laser interaction Hamiltionian. This is achieved exciting the ion through the combination of two lasers of distinct frequencies corresponding to different sidebands of the external degrees of freedom. First we study the case of a trap with 1 mode and then the case with 2 modes. In this way, we achieve different continuous variables gates just by changing the external degrees of freedom of the trap and combining the Hamiltonians of blue and red sidebands.Keywords: Paul trap, ion-laser interaction, Gaussian operations
Procedia PDF Downloads 685504 Cross Analysis of Gender Discrimination in Print Media of Subcontinent via James Paul Gee Model
Authors: Luqman Shah
Abstract:
The myopic gender discrimination is now a well-documented and recognized fact. However, gender is only one facet of an individual’s multiple identities. The aim of this work is to investigate gender discrimination highlighted in print media in the subcontinent with a specific focus on Pakistan and India. In this study, an approach is adopted by using the James Paul Gee model for the identification of gender discrimination. As a matter of fact, gender discrimination is not consistent in its nature and intensity across global societies and varies as social, geographical, and cultural background change. The World has been changed enormously in every aspect of life, and there are also obvious changes towards gender discrimination, prejudices, and biases, but still, the world has a long way to go to recognize women as equal as men in every sphere of life. The history of the world is full of gender-based incidents and violence. Now the time came that this issue must be seriously addressed and to eradicate this evil, which will lead to harmonize society and consequently heading towards peace and prosperity. The study was carried out by a mixed model research method. The data was extracted from the contents of five Pakistani English newspapers out of a total of 23 daily English newspapers, and likewise, five Indian daily English newspapers out of 52 those were published 2018-2019. Two news stories from each of these newspapers, in total, twenty news stories were taken as sampling for this research. Content and semiotic analysis techniques were used to analyze through James Paul Gee's seven building tasks of language. The resources of renowned e-papers are utilized, and the highlighted cases in Pakistani newspapers of Indian gender-based stories and vice versa are scrutinized as per the requirement of this research paper. For analysis of the written stretches of discourse taken from e-papers and processing of data for the focused problem, James Paul Gee 'Seven Building Tasks of Language' is used. Tabulation of findings is carried to pinpoint the issue with certainty. Findings after processing the data showed that there is a gross human rights violation on the basis of gender discrimination. The print media needs a more realistic representation of what is what not what seems to be. The study recommends the equality and parity of genders.Keywords: gender discrimination, print media, Paul Gee model, subcontinent
Procedia PDF Downloads 220503 The Contribution of the Livestock Marketing Programme in Improving Household Food Security in Communal Areas of Umzimkhulu Local Municipality, Kwa-Zulu Natal
Authors: Sibongiseni Peacock, Denver Naidoo, Sikhalazo Dube
Abstract:
The study investigates the impact of the National Red Meat Development Programme on household food security in rural areas of uMzimkhulu. Self-administered questionnaires were employed to gather data from 77 smallholder beef farmers participating in the St. Paul feedlot project. Data analysis utilized the Household Food Insecurity Access Scale (HFIAS) developed by USAID to assess the household food security status of St. Paul feedlot beneficiaries, with descriptive statistics employed for result analysis. Findings indicate that the majority (80.50%) of beneficiaries experienced food insecurity, while (19.50%) were classified as food secure, with most participants falling within the category of moderate food insecurity. Food insecurity predominantly stemmed from challenges faced by farmers unable to sell their cattle or whose cattle were not market-ready due to bureaucratic obstacles hindering the programme. Farmers identified feed shortages as the primary constraint, resulting in missed income opportunities. These findings underscore the critical need to address feed challenges and bureaucratic barriers to enhance the efficacy of the National Red Meat Development Programme in promoting household food security in rural areas.Keywords: National Red Meat Development, household food security, St. Paul feedlot, livestock, HFIAS
Procedia PDF Downloads 55502 On the Mathematical Modelling of Aggregative Stability of Disperse Systems
Authors: Arnold M. Brener, Lesbek Tashimov, Ablakim S. Muratov
Abstract:
The paper deals with the special model for coagulation kernels which represents new control parameters in the Smoluchowski equation for binary aggregation. On the base of the model the new approach to evaluating aggregative stability of disperse systems has been submitted. With the help of this approach the simple estimates for aggregative stability of various types of hydrophilic nano-suspensions have been obtained.Keywords: aggregative stability, coagulation kernels, disperse systems, mathematical model
Procedia PDF Downloads 309501 Building an Absurdist Approach to the Philosophy of Science: Combining Camus and Feyerabend
Authors: Robert Herold
Abstract:
This project aims to begin building out a new approach within the philosophy of science that is based around a combination of insights from Albert Camus and Paul Feyerabend. This approach is one that will be labeled an absurdist approach as it uses, for its foundation, the philosophy of the absurd as discussed by Camus. While Camus didn’t directly discuss the philosophy of science, nor did he offer his own views on the subject in any substantial way, that doesn’t mean that his work doesn’t have applications within the philosophy of science. In fact, as is argued throughout the piece, much of the work done by Paul Feyerabend stems from a similar metaphysical and epistemological foundation as Camus. This foundation is the notion of the absurd and the inability of us as humans to reach some sort of objective truth. In modern times both Camus and Feyerabend have been largely pushed to the wayside, though Feyerabend has undoubtedly received the most unfair treatment of the two, and this is something that serves to act more as a hindrance than anything else. Much of the claims and arguments made by both Camus and Feyerabend have not been truly refuted and have simply been pushed aside by pointing to supposed contradictions or inconsistencies. However, while it would be a monumental task to attempt to discuss all of this past work, perhaps it might be better to move beyond both Camus and Feyerabend and chart a new path. This is the overall goal of this paper. This research will demonstrate that not only are the philosophies of Camus and Feyerabend surprisingly similar and able to mesh well together, they also are able to form into something that is truly more than the sum of its parts. While the task of actually building out an approach is a monumental undertaking, the plan is to use this project as a jumping-off point. As such, this paper will start by examining some of the main claims made by both Camus and Feyerabend. Once this is done, then begin weaving them together and demonstrating where the links between the philosophies of both are. Then this study will end by building out the very begging foundations of the absurdist approach to the philosophy of science.Keywords: philosophy, philosophy of science, albert camus, paul feyerabend
Procedia PDF Downloads 251500 Hermitical Landscapes: The Congregation of Saint Paul of Serra De Ossa
Authors: Rolando Volzone
Abstract:
The Congregation of Saint Paul of Serra de Ossa (Ossa Mountain) was founded in 1482, originated by the eremitic movement of the homens da pobre vida (poor life men), which is documented since 1366. The community of hermits expanded up to the first half of the 15th century, mostly in southern Portugal in the Alentejo region. In 1578, following a process of institutionalization led by the Church, an autonomous congregation was set up, affiliated in the Hungarian Order of Saint Paul the First Hermit, until 1834, when the decree of dissolution of the religious orders disbanded all the convents and monasteries in Portugal. The architectural evidences that reached our days as a legacy of the hermitical movement in Serra de Ossa, although studied and analysed from an historical point of view, are still little known with respect to the architectural characteristics of its physical implantation and its relationship with the natural systems. This research intends to expose the appropriation process of the locus eremus as a starting point for the interpretation of this landscape, evidencing the close relationship between the religious experience and the physical space chosen to reach the perfection of the soul. The locus eremus is thus determined not only by practical aspects such as the absolute and relative location, orography, existence of water resources, or the King’s favoring to the religious and settlement action of the hermits, but also by spiritual aspects related to the symbolism of the physical elements present and the solitary walk of these men. These aspects, combined with the built architectural elements and other exerted human action, may be fertile ground for the definition of a hypothetical hermitical landscape based on the sufficiently distinctive characteristics that sustain it. The landscape built by these hermits is established as a cultural and material heritage, and its preservation is of utmost importance. They deeply understood this place and took advantage of its natural resources, manipulating them in an ecological and economically sustainable way, respecting the place, without overcoming its own genius loci but becoming part of it.Keywords: architecture, congregation of Saint Paul of Serra de Ossa, heremitical landscape, locus eremus
Procedia PDF Downloads 233499 Enigmatic Identity and Alienated Self: Existential Analysis of Paul Auster's the Brooklyn Follies
Authors: Sapna Bhargav
Abstract:
Contemporary fiction is an intricate exercise where novelist acquires the role of a philosopher, a sociologist and a psychologist. The dilemma of fragmented self that a man experiences, is a crucial subject of contemporary fiction. Paul Auster's fiction is exemplary of the merger of Existentialism and Postmodernism, and while both of these movements insist on isolation of the self from all aspects of social affiliation, Auster's unique blend of these concepts presents man in a state which is not just alienated, but stranded in a desolate abyss, rendering even the release of death as questionable. The conundrums of the self is a compulsory consequence of the existentialist alienation that postmodern man is subjected to, and is further accentuated by the fact that existentialist freedom dictates that not only are one's actions not dictated by any form of external entity, but also the onus of one's destiny lies on an individual's own deeds. This paper will analyse Auster's The Brooklyn Follies from an Existentialist perspective, and will attempt to trace the alienation and identity conflicts of the Auster’s characters along with some of the common Austerian themes. An emphasis will be laid on the characters’ endeavour to reconstruct their lost self.Keywords: alienation, existentialism, identity, postmodernism, self
Procedia PDF Downloads 588498 Adsorption of Cd2+ from Aqueous Solutions Using Chitosan Obtained from a Mixture of Littorina littorea and Achatinoidea Shells
Authors: E. D. Paul, O. F. Paul, J. E. Toryila, A. J. Salifu, C. E. Gimba
Abstract:
Adsorption of Cd2+ ions from aqueous solution by Chitosan, a natural polymer, obtained from a mixture of the exoskeletons of Littorina littorea (Periwinkle) and Achatinoidea (Snail) was studied at varying adsorbent dose, contact time, metal ion concentrations, temperature and pH using batch adsorption method. The equilibrium adsorption isotherms were determined between 298 K and 345 K. The adsorption data were adjusted to Langmuir, Freundlich and the pseudo second order kinetic models. It was found that the Langmuir isotherm model most fitted the experimental data, with a maximum monolayer adsorption of 35.1 mgkg⁻¹ at 308 K. The entropy and enthalpy of adsorption were -0.1121 kJmol⁻¹K⁻¹ and -11.43 kJmol⁻¹ respectively. The Freundlich adsorption model, gave Kf and n values consistent with good adsorption. The pseudo-second order reaction model gave a straight line plot with rate constant of 1.291x 10⁻³ kgmg⁻¹ min⁻¹. The qe value was 21.98 mgkg⁻¹, indicating that the adsorption of Cadmium ion by the chitosan composite followed the pseudo-second order kinetic model.Keywords: adsorption, chitosan, littorina littorea, achatinoidea, natural polymer
Procedia PDF Downloads 403497 Efficient Design of Distribution Logistics by Using a Model-Based Decision Support System
Abstract:
The design of distribution logistics has a decisive impact on a company's logistics costs and performance. Hence, such solutions make an essential contribution to corporate success. This article describes a decision support system for analyzing the potential of distribution logistics in terms of logistics costs and performance. In contrast to previous procedures of business process re-engineering (BPR), this method maps distribution logistics holistically under variable distribution structures. Combined with qualitative measures the decision support system will contribute to a more efficient design of distribution logistics.Keywords: decision support system, distribution logistics, potential analyses, supply chain management
Procedia PDF Downloads 406496 Response Solutions of 2-Dimensional Elliptic Degenerate Quasi-Periodic Systems With Small Parameters
Authors: Song Ni, Junxiang Xu
Abstract:
This paper concerns quasi-periodic perturbations with parameters of 2-dimensional degenerate systems. If the equilibrium point of the unperturbed system is elliptic-type degenerate. Assume that the perturbation is real analytic quasi-periodic with diophantine frequency. Without imposing any assumption on the perturbation, we can use a path of equilibrium points to tackle with the Melnikov non-resonance condition, then by the Leray-Schauder Continuation Theorem and the Kolmogorov-Arnold-Moser technique, it is proved that the equation has a small response solution for many sufficiently small parameters.Keywords: quasi-periodic systems, KAM-iteration, degenerate equilibrium point, response solution
Procedia PDF Downloads 86495 A Queer Approach to the National Irish Identity during 'The Troubles' in Belfast in Paul Mcveigh's 'The Good Son'
Authors: Eduardo Garcia Agustin
Abstract:
This paper focuses on how Mickey – the 10-year-old main character and narrator in Paul McVeigh’s novel The Good Son (2015) – becomes aware of his own queerness and its implications in a conflicting place and time such as Belfast during ‘The Troubles’ in the 1980s. Queer theory allows a comparative reading of identity issues such as national and gender discourses. As opposed to some other excluding social constructs that classify identities in an Us-Others binomial, queer has become a sort of umbrella term where there is room for more identities other than LGTBQ. Therefore, it offers some relevant tools to read this highly awarded novel by focusing on the intersectional construction of Mickey’s identity in progress within the social and familiar realms. The aim of this paper is to offer a queer reading of the The Good Son, which was awarded with the Polari First Book Prize in 2016, by showing the key role of Mickey’s conflictive realization of his own queerness in the polarized society of Northern Ireland in the 1980s, where there is no shade of grey. Within such a polarized context, Mickey’s perception of his own internal and external identity conflicts he is exposed to will show how necessary a certain touch of pink is as a potential escape to those conflicts.Keywords: conflict, national identity, Northern Ireland, queer identity
Procedia PDF Downloads 533494 IT Perspective of Service-Oriented e-Government Enterprise
Authors: Anu Paul, Varghese Paul
Abstract:
The focal aspire of e-Government (eGovt) is to offer citizen-centered service delivery. Accordingly, the citizenry consumes services from multiple government agencies through national portal. Thus, eGovt is an enterprise with the primary business motive of transparent, efficient and effective public services to its citizenry and its logical structure is the eGovernment Enterprise Architecture (eGEA). Since eGovt is IT oriented multifaceted service-centric system, EA doesn’t do much on an automated enterprise other than the business artifacts. Service-Oriented Architecture (SOA) manifestation led some governments to pertain this in their eGovts, but it limits the source of business artifacts. The concurrent use of EA and SOA in eGovt executes interoperability and integration and leads to Service-Oriented e-Government Enterprise (SOeGE). Consequently, agile eGovt system becomes a reality. As an IT perspective eGovt comprises of centralized public service artifacts with the existing application logics belong to various departments at central, state and local level. The eGovt is renovating to SOeGE by apply the Service-Orientation (SO) principles in the entire system. This paper explores IT perspective of SOeGE in India which encompasses the public service models and illustrated with a case study the Passport service of India.Keywords: enterprise architecture, service-oriented e-Government enterprise, service interface layer, service model
Procedia PDF Downloads 521493 Scheduling of Cross-Docking Center: An Auction-Based Algorithm
Authors: Eldho Paul, Brijesh Paul
Abstract:
This work proposes an auction mechanism based solution methodology for the optimum scheduling of trucks in a cross-docking centre. The cross-docking centre is an important element of lean supply chain. It reduces the amount of storage and transportation costs in the distribution system compared to an ordinary warehouse. Better scheduling of trucks in a cross-docking center is the best way to reduce storage and transportation costs. Auction mechanism is commonly used for allocation of limited resources in different real-life applications. Here, we try to schedule inbound trucks by integrating auction mechanism with the functioning of a cross-docking centre. A mathematical model is developed for the optimal scheduling of inbound trucks based on the auction methodology. The determination of exact solution for problems involving large number of trucks was found to be computationally difficult, and hence a genetic algorithm based heuristic methodology is proposed in this work. A comparative study of exact and heuristic solutions is done using five classes of data sets. It is observed from the study that the auction-based mechanism is capable of providing good solutions to scheduling problem in cross-docking centres.Keywords: auction mechanism, cross-docking centre, genetic algorithm, scheduling of trucks
Procedia PDF Downloads 412492 Measurement of the Dynamic Modulus of Elasticity of Cylindrical Concrete Specimens Used for the Cyclic Indirect Tensile Test
Authors: Paul G. Bolz, Paul G. Lindner, Frohmut Wellner, Christian Schulze, Joern Huebelt
Abstract:
Concrete, as a result of its use as a construction material, is not only subject to static loads but is also exposed to variables, time-variant, and oscillating stresses. In order to ensure the suitability of construction materials for resisting these cyclic stresses, different test methods are used for the systematic fatiguing of specimens, like the cyclic indirect tensile test. A procedure is presented that allows the estimation of the degradation of cylindrical concrete specimens during the cyclic indirect tensile test by measuring the dynamic modulus of elasticity in different states of the specimens’ fatigue process. Two methods are used in addition to the cyclic indirect tensile test in order to examine the dynamic modulus of elasticity of cylindrical concrete specimens. One of the methods is based on the analysis of eigenfrequencies, whilst the other one uses ultrasonic pulse measurements to estimate the material properties. A comparison between the dynamic moduli obtained using the three methods that operate in different frequency ranges shows good agreement. The concrete specimens’ fatigue process can therefore be monitored effectively and reliably.Keywords: concrete, cyclic indirect tensile test, degradation, dynamic modulus of elasticity, eigenfrequency, fatigue, natural frequency, ultrasonic, ultrasound, Young’s modulus
Procedia PDF Downloads 174491 Gradations in Concentration of Heavy and Mineral Elements with Distance and Depth of Soil in the Vicinity of Auto Mechanic Workshops in Sabon Gari, Kaduna State, Nigeria
Authors: E. D. Paul, H. Otanwa, O. F. Paul, A. J. Salifu, J. E. Toryila, C. E. Gimba
Abstract:
The concentration levels of six heavy metals (Cd, Cr, Fe, Ni, Pb, and Zn) and two mineral elements (Ca and Mg) were determined in soil samples collected from the vicinity of two auto mechanic workshops in Sabon-Gari, Kaduna state, Nigeria, using Atomic Absorption Spectrometry (AAS), in order to compare the gradation of their concentrations with distance and depth of soil from the workshop sites. At site 1, concentrations of lead, chromium, iron, and zinc were generally found to be above the World Health Organization limits, while those of Nickel and Cadmium fell within the limits. Iron had the highest concentration with a range of 176.274 ppm to 489.127 ppm at depths of 5 cm to 15 cm and a distance range of 5 m to 15 m, while the concentration of cadmium was least with a range of 0.001 ppm to 0.008 ppm at similar depth and distance ranges. In addition, there was more of calcium (11.521 ppm to 121.709 ppm), in all the samples, than magnesium (11.293 ppm to 21.635 ppm). Similar results were obtained for site II. The concentrations of all the metals analyzed showed a downward gradient with an increase in depth and distance from both workshop sites except for iron and zinc at site 2. The immediate and remote implications of these findings on the biota are discussed.Keywords: AAS, heavy metals, mechanic workshops, soil, variation
Procedia PDF Downloads 494490 Truthful or Untruthful Social Media Posts: Applying Statement Analysis to Decode online Deception
Authors: Christa L. Arnold, Margaret C. Stewart
Abstract:
This research shares the results of an exploratory study examining Statement Analysis (SA) to detect deception in online truthful and untruthful social media posts. Applying a Law Enforcement methodology SA, used in criminal interview statements, this research analyzes what is stated to assist in evaluating written deceptive information. Preliminary findings reveal qualitative and quantitative nuances for SA in online deception detection and uncover insights regarding digital deceptive behavior. Thus far, findings reveal truthful statements tend to differ from untruthful statements in both content and quality.Keywords: deception detection, online deception, social media content, statement analysis
Procedia PDF Downloads 64