Search results for: schwartz primitive
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 93

Search results for: schwartz primitive

93 Fused Deposition Modeling Printing of Bioinspired Triply Periodic Minimal Surfaces Based Polyvinylidene Fluoride Materials for Scaffold Development in Biomedical Application

Authors: Farusil Najeeb Mullaveettil, Rolanas Dauksevicius

Abstract:

Cellular structures produced by additive manufacturing have earned wide research attention due to their unique specific strength and energy absorption potentiality. The literature review concludes that pattern type and density are vital parameters that affect the mechanical properties of parts formed by additive manufacturing techniques and have an influence on printing time and material consumption. Fused deposition modeling technique (FDM) is used here to produce Polyvinylidene fluoride (PVDF) parts. In this work, patterns are based on triply periodic minimal surfaces (TPMS) produced by PVDF-based filaments using the FDM technique. PVDF homopolymer filament Fluorinar-H™ and PVDF copolymer filament Fluorinar-C™ are printed with three types of TPMS patterns. The patterns printed are Gyroid, Schwartz diamond, and Schwartz primitive. Tensile, flexural, and compression tests under quasi-static loading conditions are performed in compliance with ISO standards. The investigation elucidates the deformation mechanisms and a study that establishes a relationship between the printed and nominal specimens' dimensional accuracy. In comparison to the examined TPMS pattern, Schwartz diamond showed a higher relative elastic modulus and strength than the other patterns in tensile loading, and the Gyroid pattern showed the highest mechanical characteristics in flexural loading. The concluded results could be utilized to produce informed cellular designs for biomedical and mechanical applications.

Keywords: additive manufacturing, FDM, PVDF, gyroid, schwartz primitive, schwartz diamond, TPMS, tensile, flexural

Procedia PDF Downloads 109
92 Existence of Rational Primitive Normal Pairs with Prescribed Norm and Trace

Authors: Soniya Takshak, R. K. Sharma

Abstract:

Let q and n be positive integers, then Fᵩ denotes the finite field of q elements, and Fqn denotes the extension of Fᵩ of degree n. Also, Fᵩ* represents the multiplicative group of non-zero elements of Fᵩ, and the generators of Fᵩ* are called primitive elements. A normal element α of a finite field Fᵩⁿ is such that {α, αᵠ, . . . , αᵠⁿ⁻¹} forms a basis for Fᵩⁿ over Fᵩ. Primitive normal elements have several applications in coding theory and cryptography. So, establishing the existence of primitive normal elements under certain conditions is both theoretically important and a natural issue. In this article, we provide a sufficient condition for the existence of a primitive normal element α in Fᵩⁿ of a prescribed primitive norm and non-zero trace over Fᵩ such that f(α) is also primitive, where f(x) ∈ Fᵩⁿ(x) is a rational function of degree sum m. Particularly, we investigated the rational functions of degree sum 4 over Fᵩⁿ, where q = 11ᵏ and demonstrated that there are only 3 exceptional pairs (q, n), n ≥ 7 for which such kind of primitive normal elements may not exist. In general, we show that such elements always exist except for finitely many choices of (q, n). To arrive to our conclusion, we used additive and multiplicative character sums.

Keywords: finite field, primitive element, normal element, norm, trace, character

Procedia PDF Downloads 62
91 The Primitive Code-Level Design Patterns for Distributed Programming

Authors: Bing Li

Abstract:

The primitive code-level design patterns (PDP) are the rudimentary programming elements to develop any distributed systems in the generic distributed programming environment, GreatFree. The PDP works with the primitive distributed application programming interfaces (PDA), the distributed modeling, and the distributed concurrency for scaling-up. They not only hide developers from underlying technical details but also support sufficient adaptability to a variety of distributed computing environments. Programming with them, the simplest distributed system, the lightweight messaging two-node client/server (TNCS) system, is constructed rapidly with straightforward and repeatable behaviors, copy-paste-replace (CPR). As any distributed systems are made up of the simplest ones, those PDAs, as well as the PDP, are generic for distributed programming.

Keywords: primitive APIs, primitive code-level design patterns, generic distributed programming, distributed systems, highly patterned development environment, messaging

Procedia PDF Downloads 148
90 Linear Codes Afforded by the Permutation Representations of Finite Simple Groups and Their Support Designs

Authors: Amin Saeidi

Abstract:

Using a representation-theoretic approach and considering G to be a finite primitive permutation group of degree n, our aim is to determine linear codes of length n that admit G as a permutation automorphism group. We can show that in some cases, every binary linear code admitting G as a permutation automorphism group is a submodule of a permutation module defined by a primitive action of G. As an illustration of the method, we consider the sporadic simple group M₁₁ and the unitary group U(3,3). We also construct some point- and block-primitive 1-designs from the supports of some codewords of the codes in the discussion.

Keywords: linear code, permutation representation, support design, simple group

Procedia PDF Downloads 46
89 Co-Integrated Commodity Forward Pricing Model

Authors: F. Boudet, V. Galano, D. Gmira, L. Munoz, A. Reina

Abstract:

Commodities pricing needs a specific approach as they are often linked to each other and so are expectedly doing their prices. They are called co-integrated when at least one stationary linear combination exists between them. Though widespread in economic literature, and even if many equilibrium relations and co-movements exist in the economy, this principle of co-movement is not developed in derivatives field. The present study focuses on the following problem: How can the price of a forward agreement on a commodity be simulated, when it is co-integrated with other ones? Theoretical analysis is developed from Gibson-Schwartz model and an analytical solution is given for short maturities contracts and under risk-neutral conditions. The application has been made to crude oil and heating oil energy commodities and result confirms the applicability of proposed method.

Keywords: co-integration, commodities, forward pricing, Gibson-Schwartz

Procedia PDF Downloads 249
88 The Connection between the Schwartz Theory of Basic Values and Ethical Principles in Clinical Psychology

Authors: Matej Stritesky

Abstract:

The research deals with the connection between the Schwartz Theory of Basic Values and the ethical principles in psychology, on which the meta-code of ethics the European Federation of Psychological Associations is based. The research focuses on ethically problematic situations in clinical psychology in the Czech Republic. Based on the analysis of papers that identified ethically problematic situations faced by clinical psychologists, a questionnaire of ethically problematic situations in clinical psychology (EPSCP) was created for the purposes of the research. The questionnaire was created to represent situations that correspond to the 4 principles on which the meta-code of ethics the European Federation of Psychological Associations is based. The questionnaire EPSCP consists of descriptions of 32 situations that respondents evaluate on a scale from 1 (psychologist's behaviour is ethically perfectly fine) to 10 (psychologist's behaviour is ethically completely unacceptable). The EPSCP questionnaire, together with Schwartz's PVQ questionnaire, will be presented to 60 psychology students. The relationship between principles in clinical psychology and the values on Schwartz´s value continuum will be described using multidimensional scaling. A positive correlation is assumed between the higher-order value of openness to change and problematic ethical situations related to the principle of integrity; a positive correlation between the value of the higher order of self-transcendence and the principle of respect and responsibility; a positive correlation between the value of the higher order of conservation and the principle of competence; and negative correlation between the value of the higher order of ego strengthening and sensitivity to ethically problematic situations. The research also includes an experimental part. The first half of the students are presented with the code of ethics of the Czech Association of Clinical Psychologists before completing the questionnaires, and to the second half of the students is the code of ethics presented after completing the questionnaires. In addition to reading the code of ethics, students describe the three rules of the code of ethics that they consider most important and state why they chose these rules. The output of the experimental part will be to determine whether the presentation of the code of ethics leads to greater sensitivity to ethically problematic situations.

Keywords: clinical psychology, ethically problematic situations in clinical psychology, ethical principles in psychology, Schwartz theory of basic values

Procedia PDF Downloads 85
87 Modern Human and His Needy to the Prophecy (Case Study of AyatuAllah Mottahari Views)

Authors: Mohsen Nouraei, Mohammad Molavi

Abstract:

Muslim scholars for a long time have tried to prove the necessity of prophecy through the Qur'an verses, Hadith's concepts, and rational arguments. According to them, the human being cannot find his welfare way based on wisdom only. They emphasize that divine teaching of the prophets accompanied by wisdom (reason) helps people to find the best way of life and consequently they achieve perfection. In contrast, some believe that mentioned necessity is helpful for primitive and ancient societies, and, matured man in the modern era has flourished his wisdom and reached the peak of maturity. Hence, the modern human can recognize good and evil rely on the individual and social wisdom and as a result they can reach to the perfection without revelation and prophetic teaching. The essay via descriptive-analytical method has attempted to analyze and critic this thought through the study of Mottahari's works as a modern prominent scholars. Findings show that AyatuAllah Mottahari believes that not only modern human intellectual development is not needless of prophecy, but also they need religion and revelation teaching exactly like primitive and ancient societies. Wisdom inherent limitations common between primitive and modern human are the main reason of AyatuAllah Mottahari.

Keywords: wisdom, modernity, prophecy, AyatuAllah Mottahari

Procedia PDF Downloads 323
86 From Shallow Semantic Representation to Deeper One: Verb Decomposition Approach

Authors: Aliaksandr Huminski

Abstract:

Semantic Role Labeling (SRL) as shallow semantic parsing approach includes recognition and labeling arguments of a verb in a sentence. Verb participants are linked with specific semantic roles (Agent, Patient, Instrument, Location, etc.). Thus, SRL can answer on key questions such as ‘Who’, ‘When’, ‘What’, ‘Where’ in a text and it is widely applied in dialog systems, question-answering, named entity recognition, information retrieval, and other fields of NLP. However, SRL has the following flaw: Two sentences with identical (or almost identical) meaning can have different semantic role structures. Let consider 2 sentences: (1) John put butter on the bread. (2) John buttered the bread. SRL for (1) and (2) will be significantly different. For the verb put in (1) it is [Agent + Patient + Goal], but for the verb butter in (2) it is [Agent + Goal]. It happens because of one of the most interesting and intriguing features of a verb: Its ability to capture participants as in the case of the verb butter, or their features as, say, in the case of the verb drink where the participant’s feature being liquid is shared with the verb. This capture looks like a total fusion of meaning and cannot be decomposed in direct way (in comparison with compound verbs like babysit or breastfeed). From this perspective, SRL looks really shallow to represent semantic structure. If the key point in semantic representation is an opportunity to use it for making inferences and finding hidden reasons, it assumes by default that two different but semantically identical sentences must have the same semantic structure. Otherwise we will have different inferences from the same meaning. To overcome the above-mentioned flaw, the following approach is suggested. Assume that: P is a participant of relation; F is a feature of a participant; Vcp is a verb that captures a participant; Vcf is a verb that captures a feature of a participant; Vpr is a primitive verb or a verb that does not capture any participant and represents only a relation. In another word, a primitive verb is a verb whose meaning does not include meanings from its surroundings. Then Vcp and Vcf can be decomposed as: Vcp = Vpr +P; Vcf = Vpr +F. If all Vcp and Vcf will be represented this way, then primitive verbs Vpr can be considered as a canonical form for SRL. As a result of that, there will be no hidden participants caught by a verb since all participants will be explicitly unfolded. An obvious example of Vpr is the verb go, which represents pure movement. In this case the verb drink can be represented as man-made movement of liquid into specific direction. Extraction and using primitive verbs for SRL create a canonical representation unique for semantically identical sentences. It leads to the unification of semantic representation. In this case, the critical flaw related to SRL will be resolved.

Keywords: decomposition, labeling, primitive verbs, semantic roles

Procedia PDF Downloads 336
85 Achieving Better Security by Using Nonlinear Cellular Automata as a Cryptographic Primitive

Authors: Swapan Maiti, Dipanwita Roy Chowdhury

Abstract:

Nonlinear functions are essential in different cryptoprimitives as they play an important role on the security of the cipher designs. Rule 30 was identified as a powerful nonlinear function for cryptographic applications. However, an attack (MS attack) was mounted against Rule 30 Cellular Automata (CA). Nonlinear rules as well as maximum period CA increase randomness property. In this work, nonlinear rules of maximum period nonlinear hybrid CA (M-NHCA) are studied and it is shown to be a better crypto-primitive than Rule 30 CA. It has also been analysed that the M-NHCA with single nonlinearity injection proposed in the literature is vulnerable against MS attack, whereas M-NHCA with multiple nonlinearity injections provide maximum length cycle as well as better cryptographic primitives and they are also secure against MS attack.

Keywords: cellular automata, maximum period nonlinear CA, Meier and Staffelbach attack, nonlinear functions

Procedia PDF Downloads 280
84 The Online Power of Values: Adolescents’ Values as Predicting Factors of Their Online Bystanders’ Behavior While Witnessing Cyberbullying

Authors: Sharon Cayzer-Haller, Shir Ginosar-Yaari, Ariel Knafo-Noam

Abstract:

The 21st century emerged as the digital century, and it is marked by a wide range of technological developments and changes, followed by potential changes in human communication skills. This technological revolution has changed human means of communication in many different ways: children and adolescents are spending much of their time in front of screens, participating in all sorts of online activities (even more so since the outbreak of COVID-19). The current study focuses on the role of values in adolescents' online bystanders' behavior. Values are cognitive, abstract representations of desirable goals that motivate behavior, and we hypothesized finding significant associations between specific values and differential online bystanders' feelings and behavior. Data was collected through online questionnaires that measured the participants' values, using Schwartz's short version of the Portrait Values Questionnaire (Schwartz, 2012). Participants’ online behavior was assessed in a questionnaire addressing reactions to situations of cyber shaming and cyberbullying, and specifically positive feelings and pro-social behavior (e.g., more supportive reactions) toward the victims, as opposed to different offensive behavioral reactions (such as laughing at the victim or ignoring the situation). Participants were recruited with a commercial research panel company, and 308 Israeli adolescents' values and online behavior were examined (mean age 15.2). As hypothesized, results show significant associations between self-transcendence values (universalism and benevolence) and conservation values (conformity, tradition, and security). These two groups of values were positively correlated with pro-social bystanders' feelings and behavior. On the opposite side of the values scale, the value of power was negatively associated with the participants' pro-social behavior, and positively associated with offensive behavioral reactions. Further research is needed, but we conclude that values serve as crucial guiding factors in directing adolescents' online feelings and behavior.

Keywords: adolescents, values, cyberbullying, online behavior, power

Procedia PDF Downloads 31
83 Histogenesis of the Stomach of Pre-Hatching Quail: A Light and Electron Microscopic Study

Authors: Soha A Soliman, Yasser A Ahmed, Mohamed A Khalaf

Abstract:

Although the enormous literature describing the histology of the stomach of different avian species during the posthatching development, the available literature on the pre-hatching development of quail stomach development is scanty. Thus, the current study was undertaken to provide a careful description of the main histological events during the embryonic development of quail stomach. To achieve this aim, daily histological specimens from the stomach of quail of 4 days post-incubation till the day 17 (few hours before hatching) were examined with light microscopy. The current study showed that the primitive gut tube of the embryonic quail appeared at the 4th day post incubation, and both parts of stomach (proventriculus and gizzard) were similar in structure and composed of endodermal epithelium of pseudostratified type surrounded by undifferentiated mesenchymal tissue. The sequences of the developmental events in the gut tube were preceded in a cranio-caudal pattern. By the 5th day, the endodermal covering of the primitive proventriculus gave rise to sac-like invaginations. The primitive gizzard was distinguished into thick-walled bodies and thin-walled sacs. In the 6th day, the prospective proventricular glandular epithelium became canalized and the muscular layer was developed in the cranial part of the proventriculus, whereas the primitive muscular coat of the gizzard was represented by a layer of condensed mesenchyme. In the 7th day, the proventricular glandular epithelial invaginations increased in depth and number, while, the muscularis mucosa and the muscular layer began to be distinguished. In the 8th day, the myoblasts differentiated into spindle shaped smooth muscle fibers. In the 10th day, branching of the proventricular glands began. The branching continued later on. The surface and the glandular epithelium were transformed into simple columnar type in the 12th day. The epithelial covering of the gizzard gave rise to tubular invaginations lined by simple cuboidal epithelium and the surface epithelium became simple columnar. Canalization of the tubular glands was recognized in the 14th day. In the 15th day, the proventricular surface epithelium invaginated in an concentric manner around a central cavity to form immature secretory units. The central cavity was lined by eosinophilic cells which form the ductal epithelia. The peripheral lamellae were lined by basophilic cells; the undifferentiated oxyntico-peptic cells. Entero-endocrine cells stained positive for silver impregnation in the proventricular glands. The mucosal folding in the gizzard appeared in the 15th day to form the plicae and the sulci. The wall of the proventriculus and gizzard in the 17th day acquired the main histological features of post-hatching birds, but neither the surface nor the ductal epithelium were differentiated to mucous producing cells. The current results shoed be considered in the molecular developmental studies.

Keywords: quail, proventriculus, gizzard, pre-hatching, histology

Procedia PDF Downloads 587
82 A Compared Approach between Moderate Islamic Values and Basic Human Values

Authors: Adel Bessadok

Abstract:

The theory of values postulates that each human has a set of values, or attractive and trans-situational goals, that drive their actions. The Basic Human Values as an incentive construct that apprehends human's values have been shown to govern a wide range of human behaviors. Individuals within and within societies have very different value preferences that reflect their enculturation, their personal experiences, their social places and their genetic heritage. Using a focus group composed by Islamic religious Preachers and a sample of 800 young students; this ongoing study will establish Moderate Islamic Values parameters. We analyze later, for the same students sample the difference between Moderate Islamic Values and Schwartz’s Basic Human Values. Keywords—Moderate Islamic Values, Basic Human Values, Exploratory Factor Analysis and Confirmatory Factor Analysis.

Keywords: moderate Islamic values, basic human values, exploratory factor analysis, confirmatory factor analysis

Procedia PDF Downloads 350
81 Overcoming 4-to-1 Decryption Failure of the Rabin Cryptosystem

Authors: Muhammad Rezal Kamel Ariffin, Muhammad Asyraf Asbullah

Abstract:

The square root modulo problem is a known primitive in designing an asymmetric cryptosystem. It was first attempted by Rabin. Decryption failure of the Rabin cryptosystem caused by the 4-to-1 decryption output is overcome efficiently in this work. The proposed scheme to overcome the decryption failure issue (known as the AAβ-cryptosystem) is constructed using a simple mathematical structure, it has low computational requirements and would enable communication devices with low computing power to deploy secure communication procedures efficiently.

Keywords: Rabin cryptosystem, 4-to-1 decryption failure, square root modulo problem, integer factorization problem

Procedia PDF Downloads 425
80 An Algorithm Based on the Nonlinear Filter Generator for Speech Encryption

Authors: A. Belmeguenai, K. Mansouri, R. Djemili

Abstract:

This work present a new algorithm based on the nonlinear filter generator for speech encryption and decryption. The proposed algorithm consists on the use a linear feedback shift register (LFSR) whose polynomial is primitive and nonlinear Boolean function. The purpose of this system is to construct Keystream with good statistical properties, but also easily computable on a machine with limited capacity calculated. This proposed speech encryption scheme is very simple, highly efficient, and fast to implement the speech encryption and decryption. We conclude the paper by showing that this system can resist certain known attacks.

Keywords: nonlinear filter generator, stream ciphers, speech encryption, security analysis

Procedia PDF Downloads 264
79 Simscape Library for Large-Signal Physical Network Modeling of Inertial Microelectromechanical Devices

Authors: S. Srinivasan, E. Cretu

Abstract:

The information flow (e.g. block-diagram or signal flow graph) paradigm for the design and simulation of Microelectromechanical (MEMS)-based systems allows to model MEMS devices using causal transfer functions easily, and interface them with electronic subsystems for fast system-level explorations of design alternatives and optimization. Nevertheless, the physical bi-directional coupling between different energy domains is not easily captured in causal signal flow modeling. Moreover, models of fundamental components acting as building blocks (e.g. gap-varying MEMS capacitor structures) depend not only on the component, but also on the specific excitation mode (e.g. voltage or charge-actuation). In contrast, the energy flow modeling paradigm in terms of generalized across-through variables offers an acausal perspective, separating clearly the physical model from the boundary conditions. This promotes reusability and the use of primitive physical models for assembling MEMS devices from primitive structures, based on the interconnection topology in generalized circuits. The physical modeling capabilities of Simscape have been used in the present work in order to develop a MEMS library containing parameterized fundamental building blocks (area and gap-varying MEMS capacitors, nonlinear springs, displacement stoppers, etc.) for the design, simulation and optimization of MEMS inertial sensors. The models capture both the nonlinear electromechanical interactions and geometrical nonlinearities and can be used for both small and large signal analyses, including the numerical computation of pull-in voltages (stability loss). Simscape behavioral modeling language was used for the implementation of reduced-order macro models, that present the advantage of a seamless interface with Simulink blocks, for creating hybrid information/energy flow system models. Test bench simulations of the library models compare favorably with both analytical results and with more in-depth finite element simulations performed in ANSYS. Separate MEMS-electronic integration tests were done on closed-loop MEMS accelerometers, where Simscape was used for modeling the MEMS device and Simulink for the electronic subsystem.

Keywords: across-through variables, electromechanical coupling, energy flow, information flow, Matlab/Simulink, MEMS, nonlinear, pull-in instability, reduced order macro models, Simscape

Procedia PDF Downloads 110
78 TRNG Based Key Generation for Certificateless Signcryption

Authors: S.Balaji, R.Sujatha, M. Ramakrishnan

Abstract:

Signcryption is a cryptographic primitive that fulfills both the functions of digital signature and public key encryption simultaneously in low cost when compared with the traditional signature-then-encryption approach. In this paper, we propose a novel mouse movement based key generation technique to generate secret keys which is secure against the outer and insider attacks. Tag Key Encapsulation Mechanism (KEM) process is implemented using True Random Number Generator (TRNG) method. This TRNG based key is used for data encryption in the Data Encapsulation Mechanism (DEM). We compare the statistical reports of the proposed system with the previous methods which implements TKEM based on pseudo random number generator

Keywords: pseudo random umber generator, signcryption, true random number generator, node deployment

Procedia PDF Downloads 309
77 Some Theoretical Approaches on the Style of Lyrical Subject of the Confessional Poetry

Authors: Lemac Tin

Abstract:

This paper deals with the lyrical subject of the confessional poetry which is the main part of her stylistic strucuture. We concluded two types of this subject in the classical confessional poetic discourse; reflexive and authentic subject. We offer the model of their genesis, textual features and appeareance realisations. Genesis is related to the theories of deriving poetry from emotion and magic and their similar position in the primitive lyrics and lyrics of the ancient civilizations. Textual features are related to the emotive and semiotic analysis of each type. Appearance realisations of these two types are I-subject, We-subject, transvocal and objectified subject. We check this approaches on some of the poems from World literature.

Keywords: confessional poetry, confessional lyrical subject, magic, emotion, emotive analysis, semiotic analysis

Procedia PDF Downloads 241
76 Muslims as the Cultural ‘Other’ in Europe and the Crisis of Multiculturalism

Authors: Tatia Tavkhelidze

Abstract:

The European agenda on multiculturalism has undermined Muslim communities through cultural repulsion. Muslims have been labeled as primitive and dangerous people. They experience discrimination at university, workplace, or in the public sphere on a daily basis. Keeping this in view, the proposed research argues that the coining of Muslimness as a problem in modern European societies indicates the crisis of multiculturalism and it could be explained by the anthropological theory of cultural othering. To prove this assumption, the research undertakes a content analysis of modern policy discourse about Muslims and Islam in different European countries (e.g. France, Austria, Denmark, and Hungary). It focuses on the speech of populist politicians, right-wing party leaders and state officials. The research findings are of great significance as they elucidate that the European societies forgot to respect their own values of toleration, religious liberty and democracy; and undermine the European motto 'unity in diversity.

Keywords: assimilation, islamophobia, multiculturalism, populism

Procedia PDF Downloads 168
75 A Dialectical Behavioral Therapy Adaptation in Reducing Depression, Anxiety, and Self-Harm in Older Adults

Authors: Valerie Alexander, Amanda Gutierrez, Veronica Campbell, Dara Schwartz, B. Charles Tatum

Abstract:

It has long been assumed that personality disorders (PD) originate in adolescence or early adulthood and that the maladaptive behaviors significantly attenuate over time. The Diagnostic and Statistical Manual of Mental Disorders-5 supports early onset of PD and views the pattern of behaviors as enduring and stable. The premise of this study is that PD may not always begin early in life, that behaviors may change over the lifespan, and that current treatment modalities may be beneficial in seniors. Self-injurious behaviors (SIB) exhibited earlier in life may, in older adults, be manifested in less overt high-risk behaviors but by refusal to take medication and get necessary medical treatment. Dialectical Behavioral Therapy is a well-known treatment modality for teaching emotional regulation and distress tolerance and thus reducing self-injurious behaviors yet very little has been studied about SIB and treatment in older adults. The population for this study was older adults, with a history of SIB, a PD, and depression and/or anxiety. Participants learned an adapted version of Dialectical Behavioral Therapy (DBT) as developed by DBT trained therapists. The results provided clinical potentials for the efficacy of DBT to reduce SIB, decrease depression and anxiety in the older adult population.

Keywords: anxiety, depression, dialectical behavioral therapy, personality disorders, self-harm behavior, treatment in older adults

Procedia PDF Downloads 276
74 Understanding the Selectional Preferences of the Twitter Mentions Network

Authors: R. Sudhesh Solomon, P. Y. K. L. Srinivas, Abhay Narayan, Amitava Das

Abstract:

Users in social networks either unicast or broadcast their messages. At mention is the popular way of unicasting for Twitter whereas general tweeting could be considered as broadcasting method. Understanding the information flow and dynamics within a Social Network and modeling the same is a promising and an open research area called Information Diffusion. This paper seeks an answer to a fundamental question - understanding if the at-mention network or the unicasting pattern in social media is purely random in nature or is there any user specific selectional preference? To answer the question we present an empirical analysis to understand the sociological aspects of Twitter mentions network within a social network community. To understand the sociological behavior we analyze the values (Schwartz model: Achievement, Benevolence, Conformity, Hedonism, Power, Security, Self-Direction, Stimulation, Traditional and Universalism) of all the users. Empirical results suggest that values traits are indeed salient cue to understand how the mention-based communication network functions. For example, we notice that individuals possessing similar values unicast among themselves more often than with other value type people. We also observe that traditional and self-directed people do not maintain very close relationship in the network with the people of different values traits.

Keywords: information diffusion, personality and values, social network analysis, twitter mentions network

Procedia PDF Downloads 341
73 Non-Interactive XOR Quantum Oblivious Transfer: Optimal Protocols and Their Experimental Implementations

Authors: Lara Stroh, Nikola Horová, Robert Stárek, Ittoop V. Puthoor, Michal Mičuda, Miloslav Dušek, Erika Andersson

Abstract:

Oblivious transfer (OT) is an important cryptographic primitive. Any multi-party computation can be realised with OT as a building block. XOR oblivious transfer (XOT) is a variant where the sender Alice has two bits, and a receiver, Bob, obtains either the first bit, the second bit, or their XOR. Bob should not learn anything more than this, and Alice should not learn what Bob has learned. Perfect quantum OT with information-theoretic security is known to be impossible. We determine the smallest possible cheating probabilities for unrestricted dishonest parties in non-interactive quantum XOT protocols using symmetric pure states and present an optimal protocol which outperforms classical protocols. We also "reverse" this protocol so that Bob becomes the sender of a quantum state and Alice the receiver who measures it while still implementing oblivious transfer from Alice to Bob. Cheating probabilities for both parties stay the same as for the unreversed protocol. We optically implemented both the unreversed and the reversed protocols and cheating strategies, noting that the reversed protocol is easier to implement.

Keywords: oblivious transfer, quantum protocol, cryptography, XOR

Procedia PDF Downloads 78
72 Ab Initio Study of Structural, Elastic, Electronic and Thermal Properties of Full Heusler

Authors: M. Khalfa, H. Khachai, F. Chiker, K. Bougherara, R. Khenata, G. Murtaza, M. Harmel

Abstract:

A theoretical study of structural, elastic, electronic and thermodynamic properties of Fe2VX, (with X = Al and Ga), were studied by means of the full-relativistic version of the full-potential augmented plane wave plus local orbitals method. For exchange and correlation potential we used both generalized-gradient approximation (GGA) and local-density approximation (LDA). Our calculated ground state properties like as lattice constants, bulk modulus and elastic constants appear more accurate when we employed the GGA rather than the LDA approximation, and these results agree very well with the available experimental and theoretical data. Further, prediction of the thermal effects on some macroscopic properties of Fe2VAl and Fe2VGa are given in this paper using the quasi-harmonic Debye model in which the lattice vibrations are taken into account. We have obtained successfully the variations of the primitive cell volume, volume expansion coefficient, heat capacities and Debye temperature with pressure and temperature in the ranges of 0–40 GPa and 0–1500 K.

Keywords: full Heusler, FP-LAPW, electronic properties, thermal properties

Procedia PDF Downloads 457
71 Early Requirement Engineering for Design of Learner Centric Dynamic LMS

Authors: Kausik Halder, Nabendu Chaki, Ranjan Dasgupta

Abstract:

We present a modelling framework that supports the engineering of early requirements specifications for design of learner centric dynamic Learning Management System. The framework is based on i* modelling tool and Means End Analysis, that adopts primitive concepts for modelling early requirements (such as actor, goal, and strategic dependency). We show how pedagogical and computational requirements for designing a learner centric Learning Management system can be adapted for the automatic early requirement engineering specifications. Finally, we presented a model on a Learner Quanta based adaptive Courseware. Our early requirement analysis shows that how means end analysis reveals gaps and inconsistencies in early requirements specifications that are by no means trivial to discover without the help of formal analysis tool.

Keywords: adaptive courseware, early requirement engineering, means end analysis, organizational modelling, requirement modelling

Procedia PDF Downloads 466
70 Visualization of Quantitative Thresholds in Stocks

Authors: Siddhant Sahu, P. James Daniel Paul

Abstract:

Technical analysis comprised by various technical indicators is a holistic way of representing price movement of stocks in the market. Various forms of indicators have evolved from the primitive ones in the past decades. There have been many attempts to introduce volume as a major determinant to determine strong patterns in market forecasting. The law of demand defines the relationship between the volume and price. Most of the traders are familiar with the volume game. Including the time dimension to the law of demand provides a different visualization to the theory. While attempting the same, it was found that there are different thresholds in the market for different companies. These thresholds have a significant influence on the price. This article is an attempt in determining the thresholds for companies using the three dimensional graphs for optimizing the portfolios. It also emphasizes on the magnitude of importance of volumes as a key factor for determining of predicting strong price movements, bullish and bearish markets. It uses a comprehensive data set of major companies which form a major chunk of the Indian automotive sector and are thus used as an illustration.

Keywords: technical analysis, expert system, law of demand, stocks, portfolio analysis, Indian automotive sector

Procedia PDF Downloads 280
69 Rural Households' Sources of Water and Willingness to Pay for Improved Water Services in South-West, Nigeria

Authors: Alaba M. Dare, Idris A. Ayinde, Adebayo M. Shittu, Sam O. Sam-Wobo

Abstract:

Households' source of water is one of the core development indicators recently gaining pre-eminence in Nigeria. This study examined rural households' sources of water, Willingness to Pay (WTP) and factors influencing mean WTP. A cross-sectional survey which involved the use of questionnaire was used. A dichotomous choice (DC) with follow up was used as elicitation method. A multi-stage random sampling technique was used to select 437 rural households. Descriptive statistics and Tobit model were used for data estimation. The result revealed that about 70% fetched from unimproved water sources. Most (74.4%) respondents showed WTP for improved water sources. Age (p < 0.01), sex (p < 0.01), education (p < 0.01), occupation (p < 0.01), income (p < 0.01), price of water (P < 0.01), quantity of water (p < 0.01), household size (p < 0.01) and distance (p < 0.01) to existing water sources significantly influenced rural households' WTP for these services. The inference from this study showed that rural dweller sources of water is highly primitive and deplorable. Governments and stakeholders should prioritize the provision of rural water at an affordable price by rural dwellers.

Keywords: households, source of water, willingness to pay (WTP), tobit model

Procedia PDF Downloads 349
68 Anatomical and Pathological Evaluation of Anomaly Cases Presented to the Department of Pathology at the Kafkas University Faculty of Veterinary Medicine, between 2017 and 2019

Authors: Gülseren Kırbaş Doğan, Emin Karakurt, Mushap Kuru, Hilmi Nuhoğlu

Abstract:

Developmental anomalies can be caused by defects in bone tissue, cartilage tissue, or primitive mesenchymal tissue. Genetic-, environmental-, teratogenic-, faulty breeding selection–, or feeding-related anomalies can be observed either locally or systemically. This study aimed to evaluate in detail the various anomalies in six calves according to pathological and anatomical investigations. Six calves were delivered to the Department of Pathology at the Kafkas University Faculty of Veterinary Medicine between 2017 and 2019. These calves comprised one with anencephaly, one with the diencephalic syndrome, one with Schistosoma reflexum, two with anasarca, and one with nasal and calvarium openings. After necropsy, samples were taken from the organs, foreseen, and routine pathological examinations were performed. Following these procedures, the calves were brought to the anatomy laboratory and anatomically examined. As a result, various anomalies in 6 calves were evaluated according to pathological and anatomical investigations. These findings are believed to contribute to the literature.

Keywords: anatomy, anomaly, calf, pathology

Procedia PDF Downloads 139
67 The Risk of Hyperglycemia Associated with Use of Dolutegravir among Adults Living with HIV in Kampala, Uganda: A Case Control Study

Authors: Daphine Namara, Jeremy I. Schwartz, Andrew K. Tusubira, Willi McFarland, Caroline Birungi, Fred C. Semitala, Martin Muddu

Abstract:

Emerging evidence suggests a possible association between hyperglycemia and dolutegravir (DTG), a preferred first-line antiretroviral agent in sub-Saharan Africa (SSA). There is a need for rigorous studies to validate this association in the face of increasing DTG use and the burden of non-communicable diseases among people living with HIV (PLHIV). We conducted a case-control study to assess the risk of hyperglycemia associated with the use of DTG among PLHIV attending Mulago ISS Clinic in Kampala. Cases had hyperglycemia, while controls had no hyperglycemia, as confirmed by fasting plasma glucose and oral glucose tolerance tests. Demographic, laboratory, and clinical data were collected using interviewer-administered questionnaires and medical record abstraction. The analysis compared cases and controls on DTG use prior to diagnosis of hyperglycemia while controlling for potential confounders using multivariable logistic regression. We included 204 cases and 231 controls. In multivariable analysis, patients with prior DTG use had seven times greater odds of subsequent diagnosis of hyperglycemia compared to those who had non-DTG-based regimens (adjusted odds ratio [aOR] 7.01, 95% CI 1.96-25.09). The odds of hyperglycemia also increased with age (56 years and above vs. 18-35, aOR 12.38, 95% CI 3.79-40.50) and hypertension (aOR 5.78, 95% CI 2.53-13.21). Our study demonstrates a strong association between prior DTG exposure and subsequent diagnosis of hyperglycemia. Given the benefits of DTG, wide-scale use, and the growing burden of diabetes mellitus (DM) in SSA, there is a need for systematic screening for hyperglycemia and consideration of alternate regimens for those at risk for DM.

Keywords: HIV, hyperglycemia, doluteravir, diabetes

Procedia PDF Downloads 55
66 Transmission of Values among Polish Young Adults and Their Parents: Pseudo Dyad Analysis and Gender Differences

Authors: Karolina Pietras, Joanna Fryt, Aleksandra Gronostaj, Tomasz Smolen

Abstract:

Young women and men differ from their parents in preferred values. Those differences enable their adaptability to a new socio-cultural context and help with fulfilling developmental tasks specific to young adulthood. At the same time core values, with special importance to family members, are transmitted within families. Intergenerational similarities in values may thus be both an effect of value transmission within a family and a consequence of sharing the same socio-cultural context. These processes are difficult to separate. In our study we assessed similarities and differences in values within four intergenerational family dyads (mothers-daughters, fathers-daughters, mothers-sons, fathers-sons). Sixty Polish young adults (30 women and 30 men aged 19-25) along with their parents (a total of 180 participants) completed the Schwartz’ Portrait Value Questionnaire (PVQ-21). To determine which values may be transmitted within families, we used a correlation analysis and pseudo dyad analysis that allows for the estimation of a baseline likeness between all tested subjects and consequently makes it possible to determine if similarities between actual family members are greater than chance. We also assessed whether different strategies of measuring similarity between family members render different results, and checked whether resemblances in family dyads are influenced by child’s and parent’s gender. Reported similarities were interpreted in light of the evolutionary and the value salience perspective.

Keywords: intergenerational differences in values, gender differences, pseudo dyad analysis, transmission of values

Procedia PDF Downloads 480
65 Religion: The Human Entropy

Authors: Abul Kayum Zarzis Alam

Abstract:

Death is not a terminal; it is just a junction. From Agamas to Vedas, from Buddhism to Judaism, all the major scriptures and religions of the world always do converge to this hypothesis of death. Death is the ultimate catastrophe of life and it is the genesis of every religion on this Earth. Several hundred thousand years ago, the Homo Sapiens in Paleolithic age introduced the notion of religion on this Earth in its most primitive form just to escape from death and natural catastrophes through their belief in supernatural things which created the sense of superstition among the Homo Sapiens which has only increased over time. This sense of superstition and belief in supernatural things are building blocks of religion. Religion is like entropy, a degree of disorder. Entropy for an irreversible system like our own Universe always increases. Same is happening to our human civilization where the disorder had been increasing over time. The degree of this disorder of human civilization is religion divides and conquers over the human civilization of Earth. Religion is the human entropy which had been governing and will govern us. Just like entropy, religion is also an essential intrinsic property of the system which makes the system evolved. We have to optimize this ambivalence of the human entropy to make our civilization an inclusive and sustainable one.

Keywords: death, earth, entropy, Homo sapiens, religion and human entropy

Procedia PDF Downloads 143
64 Autoimmune Diseases Associated to Autoimmune Hepatitis: A Retrospective Study of 24 Tunisian Patients

Authors: Soumaya Mrabet, Imen Akkari, Amira Atig, Elhem Ben Jazia

Abstract:

Introduction: Autoimmune hepatitis (AIH) is a chronic inflammatory liver disease of unknown cause. Concomitant autoimmune disorders have been described in 30–50% of patients with AIH. The aim of our study is to determine the prevalence and the type of autoimmune disorders associated with AIH. Material and Methods: It is a retrospective study over a period of 16 years (2000-2015) including all patients followed for AIH. The diagnosis of AHI was based on the criteria of the revised International AIH group scoring system (IAIHG). Results: Twenty-for patients (21 women and 3 men) followed for AIH were collected. The mean age was 39 years (17-65 years). Among these patients, 11 patients(45.8%) had at least one autoimmune disease associated to AIH. These diseases were Hashimoto's thyroiditis (n = 5), Gougerot Sjogren syndrome (n=5), Primary biliary cirrhosis (n=2), Primitive sclerosant Cholangitis (n=1), Addison disease (n = 1) and systemic sclerosis (n=1). Patients were treated with corticosteroids alone or with azathioprine associated to the specific treatment of associated diseases with complete remission of AIH in 90% of cases and clinical improvement of other diseases. Conclusion: In our study, the prevalence of autoimmune diseases in AIH patients was 45.8%. These diseases were dominated by autoimmune thyroiditis and Gougerot Sjogren syndrome. The investigation of autoimmune diseases in autoimmune hepatitis must be systematic because of their frequency and the importance of adequate management.

Keywords: autoimmune diseases, autoimmune hepatitis, autoimmune thyroiditis, gougerot sjogren syndrome

Procedia PDF Downloads 233