Search results for: pseudo voter identity scheme PVID
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 3326

Search results for: pseudo voter identity scheme PVID

3236 Visible Expression of Social Identity: The Clothing and Fashion

Authors: Nihan Akdemir

Abstract:

Clothes are more than a piece of fabric, and the most visible material item of the fashion symbol is the garment, which carries multiple and various meanings. The dynamism of the clothing symbol can carry open or closed codes depending on culture, gender, and social location. And each one can be the expression of social identity over ethnicity, religious beliefs, age, education and social class. Through observation of clothing styles over these items, the assumptions could be made about a person’s identity. A distinctive and typical style, form or character of the clothing such as ‘zoot suits’, ‘ao dai’, removes the garment from functional and ordinary element to the symbolic area. Clothing is an 'identification' tool that functions in determining the symbolic boundaries between people in a sense. And this paper includes the investigation of the relation between social identity and clothing and also fashion. And this relationship has been taken into consideration over the visual expression because even during the ancient times, the clothes were the basic and simple way of representing the identity and social classes. The visible expression of identity over clothing from Ancient Egypt to today’s clothing and fashion has been researched in this article. And all these items have been explained with visual images and supported by the literature investigations. Then the results have shown that every piece of clothing from fabric to coloring have visual significations about social identity.

Keywords: social identity, clothing, fashion, visual expression, visual signification

Procedia PDF Downloads 576
3235 Tetra Butyl Ammonium Cyanate Mediated Selective Synthesis of Sulfonyltriuret and Their Investigation towards Trypsin Protease Modulation

Authors: Amarjyoti Das Mahapatra, Umesh Kumar, Bhaskar Datta

Abstract:

A pseudo peptide can mimic the biological or structural properties of natural peptides. They have become an increasing attention in medicinal chemistry because of their interesting advantages like more bioavailability and less biodegradation than compare to the physiologically active native peptides which increase their therapeutic applications. Many biologically active compounds contain urea as functional groups, and they have improved pharmacokinetic properties because of their bioavailability and metabolic stability. Recently we have reported a single-step synthesis of sulfonyl urea and sulfonyltriuret from sulfonyl chloride and sodium cyanate. But the yield of sulfonyltriuret was less around 40-60% because of the formation of other products like sulfonamide and sulfonylureas. In the present work, we mainly focused on the selective synthesis of sulfonyltriuret using tetrabutylammonium cyanate and sulfonyl chloride. More precisely, we are interested in the controlled synthesis of oligomeric urea mainly sulfonyltriuret as a new class of pseudo peptide and their application as protease modulators. The distinctive architecture of these molecules in the form of their pseudo-peptide backbone offers promise as a potential pharmacophore. The synthesized molecules have been screened on trypsin enzyme, and we observed that these molecules are the efficient modulator of trypsin enzyme.

Keywords: pseudo peptide, pharmacophore, sulfonyltriuret, trypsin

Procedia PDF Downloads 141
3234 Wage Differentiation Patterns of Households Revisited for Turkey in Same Industry Employment: A Pseudo-Panel Approach

Authors: Yasin Kutuk, Bengi Yanik Ilhan

Abstract:

Previous studies investigate the wage differentiations among regions in Turkey between couples who work in the same industry and those who work in different industries by using the models that is appropriate for cross sectional data. However, since there is no available panel data for this investigation in Turkey, pseudo panels using repeated cross-section data sets of the Household Labor Force Surveys 2004-2014 are employed in order to open a new way to examine wage differentiation patterns. For this purpose, household heads are separated into groups with respect to their household composition. These groups’ membership is assumed to be fixed over time such as age groups, education, gender, and NUTS1 (12 regions) Level. The average behavior of them can be tracked overtime same as in the panel data. Estimates using the pseudo panel data would be consistent with the estimates using genuine panel data on individuals if samples are representative of the population which has fixed composition, characteristics. With controlling the socioeconomic factors, wage differentiation of household income is affected by social, cultural and economic changes after global economic crisis emerged in US. It is also revealed whether wage differentiation is changing among the birth cohorts.

Keywords: wage income, same industry, pseudo panel, panel data econometrics

Procedia PDF Downloads 370
3233 Thai Arts and Culture the Formation of Thai Identity Letter Font Designed

Authors: Kreetha Thumcharoensathit

Abstract:

The purpose of the analysis of Thai Arts and Culture which concerning the formation of Thai identity letter font designed is to identify The Aumphawa local community identity so as to select the suitable letter font which can applicable to the computer software usage. The populated survey was from the group of local people who live in Aumphawa sub-district. The methodological is cluster sampling from 100 surveyed, those 50 were from people who have household registration done in Aumphawa sub-district and other from people who live outside. In order to analyze and design the Thai identity letter font computer software designed for both Thai and English language version, the analysis had been completed by compiling of document and field survey from local people’s opinion on their Arts and Culture identity. The out-put will be submitted to the experts for evaluation.

Keywords: Thai arts, design, font, identity

Procedia PDF Downloads 448
3232 Performance Improvement of Cooperative Scheme in Wireless OFDM Systems

Authors: Ki-Ro Kim, Seung-Jun Yu, Hyoung-Kyu Song

Abstract:

Recently, the wireless communication systems are required to have high quality and provide high bit rate data services. Researchers have studied various multiple antenna scheme to meet the demand. In practical application, it is difficult to deploy multiple antennas for limited size and cost. Cooperative diversity techniques are proposed to overcome the limitations. Cooperative communications have been widely investigated to improve performance of wireless communication. Among diversity schemes, space-time block code has been widely studied for cooperative communication systems. In this paper, we propose a new cooperative scheme using pre-coding and space-time block code. The proposed cooperative scheme provides improved error performance than a conventional cooperative scheme using space-time block coding scheme.

Keywords: cooperative communication, space-time block coding, pre-coding

Procedia PDF Downloads 329
3231 Unified Gas-Kinetic Scheme for Gas-Particle Flow in Shock-Induced Fluidization of Particles Bed

Authors: Zhao Wang, Hong Yan

Abstract:

In this paper, a unified-gas kinetic scheme (UGKS) for the gas-particle flow is constructed. UGKS is a direct modeling method for both continuum and rarefied flow computations. The dynamics of particle and gas are described as rarefied and continuum flow, respectively. Therefore, we use the Bhatnagar-Gross-Krook (BGK) equation for the particle distribution function. For the gas phase, the gas kinetic scheme for Navier-Stokes equation is solved. The momentum transfer between gas and particle is achieved by the acceleration term added to the BGK equation. The new scheme is tested by a 2cm-in-thickness dense bed comprised of glass particles with 1.5mm in diameter, and reasonable agreement is achieved.

Keywords: gas-particle flow, unified gas-kinetic scheme, momentum transfer, shock-induced fluidization

Procedia PDF Downloads 235
3230 Name and Essence of “A Pound of Flesh”: On Identity Anxiety in The Merchant of Venice

Authors: Xiu Zhang

Abstract:

The Merchant of Venice focuses on identity anxiety through the contract of “a pound of flesh” and refers to the economic, legal and religious issues related to identity. The development of the emerging capitalist economy in Venetian society prompted Shylock to become a usurer. The social identity of Shylock’s lender enabled him to use the power of money to consolidate the interdependent relationship with Christians and strive for his position and living space in Venetian society. However, there have long been economical and religious conflicts between Jews and Christians. Therefore, in order to take vengeance on Antonio and take his life, so as to revenge the whole Christian society, Shylock insists on taking a pound of Antonio’s flesh in the name of abiding by the contract and the law. The choice of “a pound of flesh” is essentially the representation of human materialization and commercialization under the background of the rise of capitalism and economic transformation. At the same time, it also symbolizes Shylock’s efforts and attempts to reshape himself and his racial identity.

Keywords: merchant of Venice, ethical choices, Shylock, a pound of flesh, identity anxiety

Procedia PDF Downloads 109
3229 Group Boundaries against and Due to Identity Threat

Authors: Anna Siegler, Sara Bigazzi, Sara Serdult, Ildiko Bokretas

Abstract:

Social identity emerging from group membership defines the representational processes of our social reality. Based on our theoretical assumption the subjective perception of identity threat leads to an instable identity structure. The need to re-establish the positive identity will lead us to strengthen group boundaries. Prejudice in our perspective offer psychological security those who thinking in exclusive barriers, and we suggest that those who identify highly with their ingroup/national identity and less with superordinate identities take distance from others and this is related to their perception of threat. In our study we used a newly developed questionnaire, the Multiple Threat and Prejudice Questionnaire (MTPQ) which measure identity threat at different dimensions of identification (national, existential, gender, religious) and the distancing of different outgroups, over and above we worked with Social Dominance Orientation (SDO) and Identification with All Humanity Scale (IWAH). We conduct one data collection (N=1482) in a Hungarian sample to examine the connection between national threat and distance-taking, and this survey includes the investigation (N=218) of identification with different group categories. Our findings confirmed that those who feel themselves threatened in their national identity aspects are less likely to identify themselves with superordinate groups and this correlation is much stronger when they think about the nation as a bio-cultural unit, while if nation defined as a social-economy entity this connection is less powerful and has just the opposite direction.

Keywords: group boundaries, identity threat, prejudice, superordinate groups

Procedia PDF Downloads 378
3228 Equilibrium and Kinetic Studies of Lead Adsorption on Activated Carbon Derived from Mangrove Propagule Waste by Phosphoric Acid Activation

Authors: Widi Astuti, Rizki Agus Hermawan, Hariono Mukti, Nurul Retno Sugiyono

Abstract:

The removal of lead ion (Pb2+) from aqueous solution by activated carbon with phosphoric acid activation employing mangrove propagule as precursor was investigated in a batch adsorption system. Batch studies were carried out to address various experimental parameters including pH and contact time. The Langmuir and Freundlich models were able to describe the adsorption equilibrium, while the pseudo first order and pseudo second order models were used to describe kinetic process of Pb2+ adsorption. The results show that the adsorption data are seen in accordance with Langmuir isotherm model and pseudo-second order kinetic model.

Keywords: activated carbon, adsorption, equilibrium, kinetic, lead, mangrove propagule

Procedia PDF Downloads 136
3227 The Queer Language: A Case Study of the Hyderabadi Queers

Authors: Sreerakuvandana Vandana

Abstract:

Although the term third gender is relatively new, the language that is in use has already made its way to the concept of identity. With the vast recognition and the transparency in expressing their identity without a tint of embarrassment, it is highly essential to take into account the idea of “identity” and “language”. The community however picks up language as a tool to assert their presence in the “mainstream”, albeit contradictory practices. The paper is an attempt to see how Koti claims and tries to be a language just like any other language. With that, it also identifies how the community wants to be identified as a unique group, but yet want to remain grounded to the ‘mainstream’. The work is an attempt to bring out the secret language of the LGBT community and understand their desire to be recognized as "main stream." The paper is also an attempt to bring into light this language and see if it qualifies to be a language at all.

Keywords: identity, language, queer, transgender

Procedia PDF Downloads 507
3226 A Secure Digital Signature Scheme with Fault Tolerance Based on the Improved RSA System

Authors: H. El-Kamchouchi, Heba Gaber, Fatma Ahmed, Dalia H. El-Kamchouchi

Abstract:

Fault tolerance and data security are two important issues in modern communication systems. In this paper, we propose a secure and efficient digital signature scheme with fault tolerance based on the improved RSA system. The proposed scheme for the RSA cryptosystem contains three prime numbers and overcome several attacks possible on RSA. By using the Chinese Reminder Theorem (CRT) the proposed scheme has a speed improvement on the RSA decryption side and it provides high security also.

Keywords: digital signature, fault tolerance, RSA, security analysis

Procedia PDF Downloads 448
3225 Regained Oral Tradition and Identity Construction in House Made of Dawn

Authors: Yi Hu

Abstract:

House Made of Dawn is famous novelist N. Scott Momaday’s Pulitzer-winning novel in 1968. The novel tells a story of the struggling life of an Indian named Abel, following the pattern of leaving home, coming home, leaving again, and returning home at the closure of the story. It touches upon the theme of the relationship between Indianness, identity, and tradition. Abel’s confusion over his identity and his constant struggle and exploration of his identity are pivoted on the tradition of oral literature in the form of story-telling. Therefore, this paper aims to analyze the important role of oral tradition in constructing Abel’s Indian cultural identity. The significance of the research lies in two aspects: first of all, the research aims to provide an enlightening perspective for Momaday’s House Made of Dawn in order to gain a better understanding of the novel. Secondly, by emphasizing the importance of traditional culture in identity construction, the research hopes to provide some referential value for people who suffer from identity predicament in modern society. Finally, the paper draws a conclusion that alienation from traditional tribal culture will result in a serious physical and psychological crisis for Indian people. Indian people should adhere to their traditional culture in order to construct their unique cultural identity.

Keywords: House Made of Dawn, identity, N.Scott.Momaday, oral tradition

Procedia PDF Downloads 195
3224 Capnography for Detection of Return of Spontaneous Circulation Pseudo-Pea

Authors: Yiyuan David Hu, Alex Lindqwister, Samuel B. Klein, Karen Moodie, Norman A. Paradis

Abstract:

Introduction: Pseudo-Pulseless Electrical Activity (p-PEA) is a lifeless form of profound cardiac shock characterized by measurable cardiac mechanical activity without clinically detectable pulses. Patients in pseudo-PEA carry different prognoses than those in true PEA and may require different therapies. End-tidal carbon dioxide (ET-CO2) is a reliable indicator of the return of spontaneous circulation (ROSC) in ventricular fibrillation and true-PEA but has not been studied p-PEA. Hypothesis: ET-CO2 can be used as an independent indicator of ROSC in p-PEA resuscitation. Methods: 30kg female swine (N = 14) under intravenous anesthesia were instrumented with aortic and right atrial micromanometer pressure. ECG and ET-CO2 were measured continuously. p-PEA was induced by ventilation with 6% oxygen in 94% nitrogen and was defined as a systolic Ao less than 40 mmHg. The statistical relationships between ET-CO2 and ROSC are reported. Results: ET-CO2 during resuscitation strongly correlated with ROSC (Figure 1). Mean ET-CO2 during p-PEA was 28.4 ± 8.4, while mean ET-CO2 in ROSC for 100% O2 cohort was 42.2 ± 12.6 (p < 0.0001), mean ET-CO2 in ROSC for 100% O2 + CPR was 33.0 ± 15.4 (p < 0.0001). Analysis of slope was limited to one minute of resuscitation data to capture local linearity; assessment began 10 seconds after resuscitation started to allow the ventilator to mix 100% O2. Pigs who would recover with 100% O2 had a slope of 0.023 ± 0.001, oxygen + CPR had a slope of 0.018 ± 0.002, and oxygen + CPR + epinephrine had a slope of 0.0050 ± 0.0009. Conclusions: During resuscitation from porcine hypoxic p-PEA, a rise in ET-CO2 is indicative of ROSC.

Keywords: ET-CO2, resuscitation, capnography, pseudo-PEA

Procedia PDF Downloads 162
3223 A Study on the Iterative Scheme for Stratified Shields Gamma Ray Buildup Factors Using Layer-Splitting Technique in Double-Layer Shields

Authors: Sari F. Alkhatib, Chang Je Park, Gyuhong Roh

Abstract:

The iterative scheme which is used to treat buildup factors for stratified shields is being investigated here using the layer-splitting technique. A simple suggested formalism for the scheme based on the Kalos’ formula is introduced, based on which the implementation of the testing technique is carried out. The second layer in a double-layer shield was split into two equivalent layers and the scheme (with the suggested formalism) was implemented on the new “three-layer” shield configuration. The results of such manipulation on water-lead and water-iron shields combinations are presented here for 1 MeV photons. It was found that splitting the second layer introduces some deviation on the overall buildup factor value. This expected deviation appeared to be higher in the case of low Z layer followed by high Z. However, the overall performance of the iterative scheme showed a great consistency and strong coherence even with the introduced changes. The introduced layer-splitting testing technique shows the capability to be implemented in test the iterative scheme with a wide range of formalisms.

Keywords: buildup factor, iterative scheme, stratified shields, layer-splitting tecnique

Procedia PDF Downloads 384
3222 On the Difference between Cultural and Religious Identities

Authors: Mputu Ngandu Simon

Abstract:

Culture and religion are two of the most significant markers of an individual or group's identity. Religion finds its expression in a given culture, and culture is the costume in which a religion is dressed. In other words, there is a crucial relationship between religion and culture which should not be ignored. On the one hand, religion influences the way in which a culture is consumed. A person's consumption of a certain cultural practice is influenced by his/her religious identity. On the other hand, cultural identity plays an important role in how a religion is practiced by its adherents. Some cultural practices become more credible when interpreted in religious terms just as religious doctrines and dogmas need cultural interpretation to be understood by a given people in a given context. This relationship goes so deep that sometimes the boundaries between culture and religion become blurred, and people end up mixing religion and culture. In some cases, the two are considered to be one and the same thing. However, despite this apparent sameness, religion and culture are two distinct aspects of identity, and they should always be considered as such. One results from knowledge, while the other has beliefs as its foundation. This essay explores the difference between cultural and religious identity by drawing from existing literature on this topic as a whole before applying that knowledge to two specific case studies: Christianity and Islam in some African and Asian countries.

Keywords: culture, religion, identity, knowledge, belief

Procedia PDF Downloads 144
3221 Factors Influencing University Students' Online Disinhibition Behavior: The Moderating Effects of Deterrence and Social Identity

Authors: Wang, Kuei-Ing, Jou-Fan Shih

Abstract:

This study adopts deterrence theory as well as social identities as moderators, and explores their moderating affects on online toxic disinhibition. Survey and Experimental methodologies are applied to test the research model and four hypotheses are developed in this study. The controllability of identity positively influenced the behavior of toxic disinhibition both in experimental and control groups while the fluidity of the identity did not have significant influences on online disinhibition. Punishment certainty, punishment severity as well as social identity negatively moderated the relation between the controllability of the identity and the toxic disinhibition. The result of this study shows that internet users hide their real identities when they behave inappropriately on internet, but once they acknowledge that the inappropriate behavior will be found and punished severely, the inappropriate behavior then will be weakened.

Keywords: seductive properties of internet, online disinhibition, punishment certainty, punishment severity, social identity

Procedia PDF Downloads 484
3220 Integrating Individual and Structural Health Risk: A Social Identity Perspective on the HIV/AIDS Pandemic in Sub-Saharan Africa

Authors: Orla Muldoon, Tamaryn Nicolson, Mike Quayle, Aisling O'Donnell

Abstract:

Psychology most often considers the role of experience and behaviour in shaping health at the individual level. On the other hand epidemiology has long considered risk at the wider group or structural level. Here we use the social identity approach to integrate group-level risk with individual level behaviour. Using a social identity approach we demonstrate that group or macro-level factors impact implicitly and profoundly in everyday ways at the level of individuals, via social identities. We illustrate how identities related to race, gender and inequality intersect to affect HIV/AIDS risk and AIDS treatment behaviours; how social identity processes drive stigmatising consequences of HIV and AIDS, and promote positive and effective interventions. We conclude by arguing that the social identity approach offers the field an explanatory framework that conceptualizes how social and political forces intersect with individual identity and agency to affect human health.

Keywords: social identity approach, HIV/AIDS, Africa, HIV risk, race, gender

Procedia PDF Downloads 501
3219 Fixing the Identity Gap in Fashion: Magazines' Role in Consumption of Clothes

Authors: Kateryna Pilyarchuk

Abstract:

A dress has, since times immemorial, been used to communicate the wearer’s identity. When a new trend is born, fashionistas buy it not only with the purpose to beautify themselves, but also to acquire the collective identity. Fashion has become a means of narrating one’s stance and status. Thus, when one spends money on a brand, one pays for some unmaterial components associated with it. This paper will present some ways in which fashion magazines promote consumerism by drawing on women’s craving for collective identity and need to fill in their identity gap by means of a purchase. By applying the method of critical discursive psychology, it will present layers of ideology and positions that become visible in framing of the message in U.S. Harper’s Bazaar. In this context, fashion decisions that are presented to its readers will be critically evaluated from the gender perspective. It will be demonstrated that what is presented as a postfeminist choice in the neoliberal society is still, to a considerable extent, oppressive and driven by the male gaze. As the findings show, the contemporary female identities in fashion are still built on the principles of traditional femininity. Magazines and fashion discourse train women that they should fear being left out of fashion and, by extension, out of the category of the sexually appealing (from the male perspective).

Keywords: collective identity, critical discursive psychology, fashion discourse, identity gap

Procedia PDF Downloads 123
3218 Message Authentication Scheme for Vehicular Ad-Hoc Networks under Sparse RSUs Environment

Authors: Wen Shyong Hsieh, Chih Hsueh Lin

Abstract:

In this paper, we combine the concepts of chameleon hash function (CHF) and identification based cryptography (IBC) to build a message authentication environment for VANET under sparse RSUs. Based on the CHF, TA keeps two common secrets that will be embedded to all identities to be as the evidence of mutual trusting. TA will issue one original identity to every RSU and vehicle. An identity contains one public ID and one private key. The public ID, includes three components: pseudonym, random key, and public key, is used to present one entity and can be verified to be a legal one. The private key is used to claim the ownership of the public ID. Based on the concept of IBC, without any negotiating process, a CHF pairing key multiplied by one private key and other’s public key will be used for mutually trusting and to be utilized as the session key of secure communicating between RSUs and vehicles. To help the vehicles to do message authenticating, the RSUs are assigned to response the vehicle’s temple identity request using two short time secretes that are broadcasted by TA. To light the loading of request information, one day is divided into M time slots. At every time slot, TA will broadcast two short time secretes to all valid RSUs for that time slot. Any RSU can response the temple identity request from legal vehicles. With the collected announcement of public IDs from the neighbor vehicles, a vehicle can set up its neighboring set, which includes the information about the neighbor vehicle’s temple public ID and temple CHF pairing key that can be derived by the private key and neighbor’s public key and will be used to do message authenticating or secure communicating without the help of RSU.

Keywords: Internet of Vehicles (IOV), Vehicular Ad-hoc Networks (VANETs), Chameleon Hash Function (CHF), message authentication

Procedia PDF Downloads 359
3217 A Study on the Iterative Scheme for Stratified Shields Gamma Ray Buildup Factor Using Layer-Splitting Technique in Double-Layer Shield

Authors: Sari F. Alkhatib, Chang Je Park, Gyuhong Roh, Daeseong Jo

Abstract:

The iterative scheme which is used to treat buildup factors for stratified shields of three-layers or more is being investigated here using the layer-splitting technique. The second layer in a double-layer shield was split into two equivalent layers and the scheme was implemented on the new 'three-layer' shield configuration. The results of such manipulation for water-lead and water-iron shields combinations are presented here for 1 MeV photons. It was found that splitting the second layer introduces some deviation on the overall buildup factor. This expected deviation appeared to be higher in the case of low Z layer followed by high Z. However, the iterative scheme showed a great consistency and strong coherence with the introduced changes.

Keywords: build-up factor, iterative scheme, stratified shields, radiation protection

Procedia PDF Downloads 547
3216 Identity and Economics: The Economic Welfare and Behavior of Romani People in Turkey

Authors: Sinem Bagce, Ensar Yilmaz

Abstract:

As a well-known fact, neoclassical economics excludes 'what is humanized' out of the literature for a long time. Rationality is defined in a very narrow context in the mainstream economics. Identity economics is one of the challenges raised against this tradition. The concept of 'identity' has been introduced to economics by Akerlof and Kranton (2000). The identity-based analysis mainly searches the links between economic welfare and decision of the actors in question related to ethnic, racial, gender and immigrant issues. This is more about discrimination and its repercussions on economic decisions of the relevant actors in a social sphere. In this article, we, in the context of identity economics, search the economic welfare and decisions of Romani people in Turkey. It is plainly observed that identity is clearly the major determinant for Romani people in economic and social life. They have their own distinctive rationality in making economic decisions. For a more scrutinized and academic analysis, we aim to trace their economic identity in their real social environment. This study is an extension of surveys conducted on Romani people in Turkey. Using data similar to SILC (Statistics for Income and Living Conditions) conducted on Romani people across the whole Turkey, we look for some questions about the income/welfare distribution among them, consumer preferences/habits, living conditions, occupations, education and as such. For this, by employing econometric and statistical analytical tools, we aim to obtain the answers for these questions. We think these analytic results will provide us to evaluate the links between their economic state and their identity more thoroughly. JEL Codes: D1, J 15, R23.

Keywords: identity economics, Romani people, discrimination, social identity and preferences

Procedia PDF Downloads 173
3215 A Hybrid P2P Storage Scheme Based on Erasure Coding and Replication

Authors: Usman Mahmood, Khawaja M. U. Suleman

Abstract:

A peer-to-peer storage system has challenges like; peer availability, data protection, churn rate. To address these challenges different redundancy, replacement and repair schemes are used. This paper presents a hybrid scheme of redundancy using replication and erasure coding. We calculate and compare the storage, access, and maintenance costs of our proposed scheme with existing redundancy schemes. For realistic behaviour of peers a trace of live peer-to-peer system is used. The effect of different replication, and repair schemes are also shown. The proposed hybrid scheme performs better than existing double coding hybrid scheme in all metrics and have an improved maintenance cost than hierarchical codes.

Keywords: erasure coding, P2P, redundancy, replication

Procedia PDF Downloads 364
3214 The Effects of Architectural Anatomy on Improving the Quality of Place Identity: Case Study of Shiraz Opera Hall

Authors: Hamid Reza Zeraatpisheh, Shamsoddin Hashemi, Farshad Negintaji

Abstract:

This study has examined the effects of the architectural anatomy of opera hall on improving the quality of place identity. By measuring the effects of place identity on the inner aspects of human which are influenced by the physical and social environments it has investigated the results of a balance between internal and external environment. To assess the anatomical effects of urban landscape, two components of subjective landscape including perception and diversity and the component of objective landscape including form and order have been measured. The current survey is descriptive and the statistical population has been Shiraz which is a city in Iran. To analyze the data the SPSS software has been used. The results have been investigated in two levels of descriptive and inferential statistics. In the inferential statistics, Pearson correlation coefficient has been used to evaluate the research hypotheses. The results of this study indicate that between the dimensions of landscape, the component of the subjective landscape has the highest impact on the place identity and in the second place, an objective landscape has the impact on the place identity. Anatomical effects have an important role on improving the quality of place identity of Shiraz citizens and in order to enhance the place identity in the urban landscape it is also required that they will be inspired and operated.

Keywords: architectural anatomy, identity, place identity, urban landscape, perception

Procedia PDF Downloads 512
3213 Issues in the Learning and Construction of a National Music Identity in Multiracial Malaysia: Diversity, Complexity, and Contingency

Authors: Loo Fung Ying, Loo Fung Chiat

Abstract:

The formation of a musical identity that shapes the nation in this multiracial country reveals many complexities, conundrums, and contingencies. Creativity and identity formation at the level of an individual or a collective group further diversified musical expression, representation, and style, which has led to an absence of regularities. In addition, ‘contemporizing accretion,’ borrowing a term used by Schnelle in theology (2009), further complicates musical identity, authenticity, conception, and realization. Thus, in this paper, we attempt to define the issues surrounding the teaching and learning of the multiracial Malaysian national music identity. We also discuss unnecessary power hierarchies, interracial conflicts, and sentiments in the construct of a multiracial national music identity by referring to genetic origins, the evolution of music, and the neglected issues of representation and reception at a global level from a diachronic perspective. Lastly, by synthesizing Ladson-Billings, Gay, Kruger, and West-Burns’s culturally relevant/responsive pedagogical theories, we discuss possible analytic tools for consideration that are more multiculturally relevant and responsive for the teaching, learning, and construction of a multiracial Malaysian national music identity.

Keywords: Malaysia, music, multiracial, national music identity, culturally relevant/responsive pedagogy

Procedia PDF Downloads 177
3212 Reduction of Multiple User Interference for Optical CDMA Systems Using Successive Interference Cancellation Scheme

Authors: Tawfig Eltaif, Hesham A. Bakarman, N. Alsowaidi, M. R. Mokhtar, Malek Harbawi

Abstract:

In Commonly, it is primary problem that there is multiple user interference (MUI) noise resulting from the overlapping among the users in optical code-division multiple access (OCDMA) system. In this article, we aim to mitigate this problem by studying an interference cancellation scheme called successive interference cancellation (SIC) scheme. This scheme will be tested on two different detection schemes, spectral amplitude coding (SAC) and direct detection systems (DS), using partial modified prime (PMP) as the signature codes. It was found that SIC scheme based on both SAC and DS methods had a potential to suppress the intensity noise, that is to say, it can mitigate MUI noise. Furthermore, SIC/DS scheme showed much lower bit error rate (BER) performance relative to SIC/SAC scheme for different magnitude of effective power. Hence, many more users can be supported by SIC/DS receiver system.

Keywords: optical code-division multiple access (OCDMA), successive interference cancellation (SIC), multiple user interference (MUI), spectral amplitude coding (SAC), partial modified prime code (PMP)

Procedia PDF Downloads 492
3211 Narrating Irish Identity: Retrieving ‘Irishness’ in the Works of William Butler Yeats and Seamus Heaney

Authors: Rafik Massoudi

Abstract:

Irish identity continues to be discussed in various fields including social science, culture, literary humanities as well as political debates. In this context, Irishness had been usurped for a long time by the hegemonic power of the British Empire. That is why, Irish writers, in general, and Seamus Heaney along with William Butler Yeats, in particular, endeavored to retrieve this lost identity by shedding light on Irish history, folklore, communal traditions, landscape, indigenous people, language as well as culture. In this context, we may speak of a decolonizing attempt that allowed these writers to represent the autonomous Irish subjectivity by establishing an ethical relationship based on an extraordinary approach to the represented alterity. This article, indeed, places itself within the arena of postmodern, postcolonial discussions of the issue of identity and, particularly, of Irishness.

Keywords: identity, Irishess, narration, postcolonialism

Procedia PDF Downloads 288
3210 Improved Cooperative Communication Scheme in the Edge of Cell Coverage

Authors: Myoung-Jin Kim, Yeong-Seop Ahn, Hyun-Jee Yang, Hyoung-Kyu Song

Abstract:

This paper proposes the new cooperative communication scheme for the wireless communication system. When the receiver is located in the edge of coverage, the signal from the transmitter is distorted by the inter-cell interference (ICI) and power reduction by distance. In order to improve communication performance, the proposed scheme adds the relay. By using the relay, the receiver receives the signal from the transmitter and relay at the same time. Therefore, the new cooperative communication scheme obtains diversity gain and is improved by the relay.

Keywords: cooperative communication, diversity gain, OFDM, MIMO

Procedia PDF Downloads 581
3209 Heroic Villains: An Exploration of the Use of Narrative Plotlines and Emerging Identities within Recovery Stories of Former Substance Abusers

Authors: Tria Moore Aimee Walker-Clarke

Abstract:

The purpose of the study was to develop a deeper understanding of how self-identity is negotiated and reconstructed by people in recovery from substance abuse. The approach draws on the notion that self-identity is constructed through stories. Specifically, dominant narratives of substance abuse involve the 'addict identity' in which the meaning of being an addict is constructed though social interaction and informed by broader social meanings of substance misuse, which are considered deviant. The addict is typically understood as out of control, weak and feckless. Users may unconsciously embody this addict identity which makes recovery less likely. Typical approaches to treatment employ the notion that recovery is much more likely when users change the way they think and feel about themselves by assembling a new identity. Recovery, therefore, involves a reconstruction of the self in a new light, which may mean rejecting a part of the self (the addict identity). One limitation is that previous research on this topic has been quantitative which, while useful, tells us little about how this process is best managed. Should one, for example, reject the past addict identity completely and move on to the new identity, or, is it more effective to accept the past identity and use this in the formation of the new non-user identity? The purpose of this research, then, is to explore how addicts in recovery have managed the transition between their past and current selves and whether this may inform therapeutic practice. Using a narrative approach, data were analyzed from five in-depth interviews with former addicts who had been abstinent for at least a year, and who were in some form of volunteering role at substance treatment services in the UK. Although participants' identified with a previous ‘addict identity,’ and made efforts to disassociate themselves from this, they also recognized that acceptance was an important part of reconstructing their new identity. The participants' narratives used familiar plot lines to structure their stories, in which they positioned themselves as the heroes in their own stories, rather than as victim of circumstance. Instead of rejecting their former addict identity, which would mean rejecting a part of the self, participants used their experience in a reconstructive and restorative way. The findings suggest that encouraging people to tell their story and accept their addict identity are important factors in successful recovery.

Keywords: addiction, identity, narrative, recovery, substance abuse

Procedia PDF Downloads 283
3208 The Identity of the Cairene Public Space: Manifestations of Social and Architectural Heritage in the City Square of Medieval Cairo

Authors: Muhammad Emad Feteha

Abstract:

Cairo has been famous for the unique identity of its medieval architecture, which was formed by multiple dynasties that ruled Egypt. However, only a few researches were done on the identity of its public space. This paper links both the architectural and the socio-political aspects of the Cairene public space and studies how they affected each other. The subject of the study is Maydan Salah al-Din, the main city square of medieval Cairo, which reveals a quite useful information, not only about the architectural identity of the Cairene public space but also about the socio-political patterns that operated within. The analytical framework is based on Lefebvre’s theory, the ‘production of space’, in which he applied 'the Hegelian dialectic' in order to understand how the social practice forms the space, and how, in turn, the space forms the social practice. This framework offers a comprehensive understanding of the identity of the Cairene public space, which does not separate architecture from the social practice.

Keywords: architectural identity, Cairene public space, Islamic architectural history, production of space

Procedia PDF Downloads 329
3207 [Keynote Talk]: Analysis of One Dimensional Advection Diffusion Model Using Finite Difference Method

Authors: Vijay Kumar Kukreja, Ravneet Kaur

Abstract:

In this paper, one dimensional advection diffusion model is analyzed using finite difference method based on Crank-Nicolson scheme. A practical problem of filter cake washing of chemical engineering is analyzed. The model is converted into dimensionless form. For the grid Ω × ω = [0, 1] × [0, T], the Crank-Nicolson spatial derivative scheme is used in space domain and forward difference scheme is used in time domain. The scheme is found to be unconditionally convergent, stable, first order accurate in time and second order accurate in space domain. For a test problem, numerical results are compared with the analytical ones for different values of parameter.

Keywords: Crank-Nicolson scheme, Lax-Richtmyer theorem, stability, consistency, Peclet number, Greschgorin circle

Procedia PDF Downloads 196