Search results for: singular extended state
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 8288

Search results for: singular extended state

8138 Islamic State: Franchising Jihad through the New Caliphate

Authors: Janiel David Melamed Visbal

Abstract:

The Islamic State has become one of the most remarkable threats for international security through their religious extremism and their establishment of a new caliphate by force. The main objective of this organization is to obtain territorial expansions beyond the Middle East and eventually to consolidate an Islamic global order based on their extremist ideology. This paper will conduct an analysis regarding how, over the past year, many jihadist organizations worldwide have pledged their alliagance to the Islamic State, transforming it into the most important jihadist franchise globally.

Keywords: Islamic state, franchise, jihad, Islamic fundamentalism, caliphate

Procedia PDF Downloads 324
8137 Recognition by the Voice and Speech Features of the Emotional State of Children by Adults and Automatically

Authors: Elena E. Lyakso, Olga V. Frolova, Yuri N. Matveev, Aleksey S. Grigorev, Alexander S. Nikolaev, Viktor A. Gorodnyi

Abstract:

The study of the children’s emotional sphere depending on age and psychoneurological state is of great importance for the design of educational programs for children and their social adaptation. Atypical development may be accompanied by violations or specificities of the emotional sphere. To study characteristics of the emotional state reflection in the voice and speech features of children, the perceptual study with the participation of adults and the automatic recognition of speech were conducted. Speech of children with typical development (TD), with Down syndrome (DS), and with autism spectrum disorders (ASD) aged 6-12 years was recorded. To obtain emotional speech in children, model situations were created, including a dialogue between the child and the experimenter containing questions that can cause various emotional states in the child and playing with a standard set of toys. The questions and toys were selected, taking into account the child’s age, developmental characteristics, and speech skills. For the perceptual experiment by adults, test sequences containing speech material of 30 children: TD, DS, and ASD were created. The listeners were 100 adults (age 19.3 ± 2.3 years). The listeners were tasked with determining the children’s emotional state as “comfort – neutral – discomfort” while listening to the test material. Spectrographic analysis of speech signals was conducted. For automatic recognition of the emotional state, 6594 speech files containing speech material of children were prepared. Automatic recognition of three states, “comfort – neutral – discomfort,” was performed using automatically extracted from the set of acoustic features - the Geneva Minimalistic Acoustic Parameter Set (GeMAPS) and the extended Geneva Minimalistic Acoustic Parameter Set (eGeMAPS). The results showed that the emotional state is worse determined by the speech of TD children (comfort – 58% of correct answers, discomfort – 56%). Listeners better recognized discomfort in children with ASD and DS (78% of answers) than comfort (70% and 67%, respectively, for children with DS and ASD). The neutral state is better recognized by the speech of children with ASD (67%) than by the speech of children with DS (52%) and TD children (54%). According to the automatic recognition data using the acoustic feature set GeMAPSv01b, the accuracy of automatic recognition of emotional states for children with ASD is 0.687; children with DS – 0.725; TD children – 0.641. When using the acoustic feature set eGeMAPSv01b, the accuracy of automatic recognition of emotional states for children with ASD is 0.671; children with DS – 0.717; TD children – 0.631. The use of different models showed similar results, with better recognition of emotional states by the speech of children with DS than by the speech of children with ASD. The state of comfort is automatically determined better by the speech of TD children (precision – 0.546) and children with ASD (0.523), discomfort – children with DS (0.504). The data on the specificities of recognition by adults of the children’s emotional state by their speech may be used in recruitment for working with children with atypical development. Automatic recognition data can be used to create alternative communication systems and automatic human-computer interfaces for social-emotional learning. Acknowledgment: This work was financially supported by the Russian Science Foundation (project 18-18-00063).

Keywords: autism spectrum disorders, automatic recognition of speech, child’s emotional speech, Down syndrome, perceptual experiment

Procedia PDF Downloads 160
8136 Definition, Structure, and Core Functions of the State Image

Authors: Rosa Nurtazina, Yerkebulan Zhumashov, Maral Tomanova

Abstract:

Humanity is entering an era when 'virtual reality' as the image of the world created by the media with the help of the Internet does not match the reality in many respects, when new communication technologies create a fundamentally different and previously unknown 'global space'. According to these technologies, the state begins to change the basic technology of political communication of the state and society, the state and the state. Nowadays, image of the state becomes the most important tool and technology. Image is a purposefully created image granting political object (person, organization, country, etc.) certain social and political values and promoting more emotional perception. Political image of the state plays an important role in international relations. The success of the country's foreign policy, development of trade and economic relations with other countries depends on whether it is positive or negative. Foreign policy image has an impact on political processes taking place in the state: the negative image of the countries can be used by opposition forces as one of the arguments to criticize the government and its policies.

Keywords: image of the country, country's image classification, function of the country image, country's image components

Procedia PDF Downloads 394
8135 Transdermal Medicated- Layered Extended-Release Patches for Co-delivery of Carbamazepine and Pyridoxine

Authors: Sarah K. Amer, Walaa Alaa

Abstract:

Epilepsy is an important cause of mortality and morbidity, according to WHO statistics. It is characterized by the presence of frequent seizures occurring more than 24 hours apart. Carbamazepine (CBZ) is considered first-line treatment for epilepsy. However, reports have shown that CBZ oral formulations failed to achieve optimum systemic delivery, minimize side effects, and enhance patient compliance. Besides, the literature has signified the lack of therapeutically efficient CBZ transdermal formulation and the urge for its existence owing to its ease and convenient method of application and highlighted capability to attain higher bioavailability and more extended-release profiles compared to conventional oral CBZ tablets. This work aims to prepare CBZ microspheres (MS) that are embedded in a transdermal gel containing Vitamin B to be co-delivered. MS were prepared by emulsion-solvent diffusion method using Eudragit S as core forming polymer and hydroxypropyl methylcellulose (HPMC) polymer. The MS appeared to be spherical and porous in nature, offering a large surface area and high entrapment efficiency of CBZ. The transdermal gel was prepared by solvent-evaporation technique using HPMC that, offered high entrapment efficiency and Eudragit S that provided an extended-release profile. Polyethylene glycol, Span 80 and Pyridoxine were also added. Data indicated that combinations of CBZ with pyridoxine can reduce epileptic seizures without affecting motor coordination. Extended-release profiles were evident for this system. The patches were furthermore tested for thickness, moisture content, folding endurance, spreadability and viscosity measurements. This novel pharmaceutical formulation would be of great influence on seizure control, offering better therapeutic effects.

Keywords: epilepsy, carbamazepine, pyridoxine, transdermal

Procedia PDF Downloads 28
8134 Cytotoxic Activity against MCF-7 Breast Cancer Cells and Antioxidant Property of Aqueous Tempe Extracts from Extended Fermentation

Authors: Zatil Athaillah, Anastasia Devi, Dian Muzdalifah, Wirasuwasti Nugrahani, Linar Udin

Abstract:

During tempe fermentation, some chemical changes occurred and they contributed to sensory, appearance, and health benefits of soybeans. Many studies on health properties of tempe have specialized on their isoflavones. In this study, other components of tempe, particularly water soluble chemicals, was investigated for their biofunctionality. The study was focused on the ability to suppress MCF-7 breast cancer cell growth and antioxidant activity, as expressed by DPPH radical scavenging activity, total phenols and total flavonoids, of the water extracts. Fermentation time of tempe was extended up to 120 hr to increase the possibility to find the functional components. Extraction yield and soluble nitrogen content were also quantified as accompanying data. Our findings suggested that yield of water extraction of tempe increased as fermentation was extended up to 120 hr, except for a slight decrease at 72 hr. Water extracts of tempe showed inhibition of MCF-7 breast cancer cell growth, as shown by lower IC50 values when compared to control (unfermented soybeans). Among the varied fermentation timescales, 60-hr period showed the highest activity (IC50 of 8.7 ± 4.95 µg/ml). The anticancer activity of extracts obtained from different fermentation time was positively correlated with total soluble nitrogens, but less relevant with antioxidant data. During 48-72 hr fermentation, at which cancer suppression activity was significant, the antioxidant properties from the three assays were not higher than control. These findings indicated that water extracts of tempe from extended fermentation could inhibit breast cancer cell growth but further study to determine the mechanism and compounds that play important role in the activity should be conducted.

Keywords: tempe, anticancer, antioxidant, phenolic compounds

Procedia PDF Downloads 217
8133 Directors’ Liability for Losses Incurred in the Management of PT Merpati Nusantara Airlines, Persero

Authors: Eny Suastuti

Abstract:

This paper is about state’s capital equity in establishing State-owned Company (PT Merpati Persero). Under private law regime, PT Merpati Persero equity is a state asset allocated separately from the State Budget. Consequently, it is no longer a state asset; rather, it becomes a part of company assets. The adoption of Act No. 17 of 2003 on State Finance, Act No. 31 of 1999, which is amended by Act No. 20 of 2001 on Eradication of Corrupt Practices, Act No. 15 of 2004 on Auditing, Management, and Accountability of State Finance, and Act No. 15 of 2006 Audit Board raises legal issues of whether State-owned Company’s (PT Merpati Persero) loss may be deemed as loss on state finance made by the Directors of PT Merpati Persero, which implication leads to corrupt practices conducted by the Directors. The principle of civil law states that state assets are separated from the state budget is not a government asset. Therefore the case of a lease agreement 2 (two) units of Boeing 737-400 and Boeing 737-500 between PT Merpati Nusantara Airlines with companies Third Stone Aircraft Leasing Group (TALG) the United States cannot be prosecuted under Articles 2 and 3 of Act No. 31 of 1999 Jo Act No. 20 of 2001 on Eradication of Corrupt Practices (Law PTPK). From this paper, three things are found. First, state’s capital equity, which has been allocated separately from state assets in establishing the PT Merpati Perserois not state asset; rather, it is company’s asset. Second, in the case of mismanagement leading to company loss, the Directors of PT Merpati Persero may not be charged with committing corrupt practice as prescribed in Articles 2 and 3 of Corrupt Practices Eradication Law. Third, misperception has been made by judicial practices since the courts consider loss in certain transaction made by Directors of PT Merpati Persero to be loss of state finance whose implication is applicability of Articles 2 and 3 of Corrupt Practices Eradication Law.

Keywords: corrupt practice, loss, state's capital equity, state finance (PT Merpati Persero)

Procedia PDF Downloads 236
8132 Deep Learning Based, End-to-End Metaphor Detection in Greek with Recurrent and Convolutional Neural Networks

Authors: Konstantinos Perifanos, Eirini Florou, Dionysis Goutsos

Abstract:

This paper presents and benchmarks a number of end-to-end Deep Learning based models for metaphor detection in Greek. We combine Convolutional Neural Networks and Recurrent Neural Networks with representation learning to bear on the metaphor detection problem for the Greek language. The models presented achieve exceptional accuracy scores, significantly improving the previous state-of-the-art results, which had already achieved accuracy 0.82. Furthermore, no special preprocessing, feature engineering or linguistic knowledge is used in this work. The methods presented achieve accuracy of 0.92 and F-score 0.92 with Convolutional Neural Networks (CNNs) and bidirectional Long Short Term Memory networks (LSTMs). Comparable results of 0.91 accuracy and 0.91 F-score are also achieved with bidirectional Gated Recurrent Units (GRUs) and Convolutional Recurrent Neural Nets (CRNNs). The models are trained and evaluated only on the basis of training tuples, the related sentences and their labels. The outcome is a state-of-the-art collection of metaphor detection models, trained on limited labelled resources, which can be extended to other languages and similar tasks.

Keywords: metaphor detection, deep learning, representation learning, embeddings

Procedia PDF Downloads 117
8131 Solid-State Sodium Conductor for Solid-State Battery

Authors: Yumei Wang, Xiaoyu Xu, Li Lu

Abstract:

Solid-state battery adopts solid-state electrolyte such as oxide- and composite-based solid electrolytes. With the adaption of nonflammable or less flammable solid electrolytes, the safety of solid-state batteries can be largely increased. NASICON (Na₃Zr₂Si₂PO₁₂, NZSP) is one of the sodium ion conductors that possess relatively high ionic conductivity, wide electrochemical stable range and good chemical stability. Therefore, it has received increased attention. We report the development of high-density NZSP through liquid phase sintering and its organic-inorganic composite electrolyte. Through reactive liquid phase sintering, the grain boundary conductivity can be largely enhanced while using an organic-inorganic composite electrolyte, interfacial wetting and impedance can be largely reduced hence being possible to fabricate scalable solid-state batteries.

Keywords: solid-state electrolyte, composite electrolyte, electrochemical performance, conductivity

Procedia PDF Downloads 80
8130 Assessment of Household Livelihood Diversification and Fisheries Conservation Strategies among Fishermen in Coastal Areas of Ogun State, Nigeria

Authors: Adeosun, Festus Idowu; Omoniyi, Isaac Tunde, Adeosun, Olamide Modinat

Abstract:

This study assessed the association between household livelihood diversification and fisheries conservation policies among fishermen in coastal areas of Ogun State, Nigeria by adopting a multistage sampling procedure. The sample size was 90 fishermen from six randomly selected fishing communities (Abureji, Agbalegiyo, Ilamo, Imosan, Iseku and Wharf) along the coastline in Ogun State, Nigeria. Data were collected using pre-validated interview schedule and subjected to descriptive and inferential analytical techniques. Results revealed that majority of the fishermen were married (98.9%), in the age bracket of 41-60 years (71.1%) with mean age of 49 years, had household size of 6-15 persons (91.1%) with mean household size being 9 persons, from extended families (90.0%), either either no formal (43.3%) or only primary education (41.1%), were non-members of social groups (62.2%), and had no other occupations (93.3%). It was also reported that there was generally low level of household livelihood diversification across the fishing communities. Gill nets were the most commonly used fishing gears across the fishing communities (80.0%). This was followed by seine nets (63.3%), traps (56.7%) and trawl nets (53.3%) while fish aggregating devices (35.6%), cast nets (37.8%) and hook and line (24.4%) were the least used fishing gears in the study locations. Results further revealed that coastal fishery was characterised by conflicts among water users (64.4%), absence of protected fishing areas (81.1%), and experience of water pollution (36.7%). Majority (71.1%) of the fishermen across the study locations agreed with closed season policy as a coastal fisheries conservation strategy. This was followed by gear restriction (30.0%). Results of Chi-square analysis revealed that there were significant associations between level of household livelihood diversification and fishermen’s agreement with gear restriction (χ2 = 15.545, df = 5), and closed season (χ2 = 11.214, df = 4). The study concluded that coastal fisheries is in a poor state and that it could be improved through the introduction of gear restriction and closed season policies. The study recommended that youths in the coastal areas should venture into fishing, and that government and non-governmental agencies should organize sensitization programmes on fisheries conservation policies across the coastal areas in Ogun State.

Keywords: coastal, fisheries, conservation, livelihood

Procedia PDF Downloads 47
8129 Genesis and Achievements of Madhesh Movement in Nepal

Authors: Deepak Chaudhary

Abstract:

The main objective of the study is to explore the genesis and achievements of the Madhesh movement. Madhesh Movement is a social movement that brought massive political changes and contributed a lot to the nation-building process in the modern history of Nepal. This movement erupted in January 2007 in the Tarai/Madhesh region following the promulgation of the Interim Constitution that left the incorporation of federalism and proportional representation in the Constitution. The most excluded community in Nepal- Madheshi community, seemed to have angered against state-sponsored discrimination and exclusion that have been occurred for centuries. Since Madheshis were treated as non-Nepali, though the history of Nepal’s Tarai/Madhesh has been ancient. In the beginning, this movement was against Maoist, but later, it went against the state's prejudices and discriminations. It extended across the Tarai/Madhesh region of Nepal for a month. The movement was spontaneous to a large extent. A researcher himself is a witness to the movement. Key Informant Interviews with participants, including politicians, journalists, and activists, have mainly carried out for the study. This movement ensured Madheshi identity first. Secondly, the number of electoral constituencies was increased as it reached 120 in Tarai/Madhesh while it was 80 only. As a result, Madheshi representation in the Constitution Assembly reached 35 %, while it was 20% only. The main thing that this movement played a major role in ensuring the federalism as a political system in Nepal.

Keywords: dignity, exclusion, federalism, inclusion, Madhesh movement, nation-building

Procedia PDF Downloads 140
8128 Extended Boolean Petri Nets Generating N-Ary Trees

Authors: Riddhi Jangid, Gajendra Pratap Singh

Abstract:

Petri nets, a mathematical tool, is used for modeling in different areas of computer sciences, biological networks, chemical systems and many other disciplines. A Petri net model of a given system is created by the graphical representation that describes the properties and behavior of the system. While looking for the behavior of any system, 1-safe Petri nets are of particular interest to many in the application part. Boolean Petri nets correspond to those class in 1- safe Petri nets that generate all the binary n-vectors in their reachability analysis. We study the class by changing different parameters like the token counts in the places and how the structure of the tree changes in the reachability analysis. We discuss here an extended class of Boolean Petri nets that generates n-ary trees in their reachability-based analysis.

Keywords: marking vector, n-vector, petri nets, reachability

Procedia PDF Downloads 54
8127 Application of the Extended Kantorovich Method to Size-Dependent Vibrational Analysis of Fully Clamped Rectangular Micro-Plates

Authors: Amir R. Askari, Masoud Tahani

Abstract:

The objective of the present paper is to investigate the effect of size on the vibrational behavior of fully clamped rectangular micro-plates based on the modified couple stress theory (MCST). To this end, a size-dependent Kirchhoff plate model is considered and the equation of motion which accounts for the effect of residual and couple stress components is derived using the Hamilton's principle. The eigenvalue problem associated with the free vibrations of fully clamped micro-plates is extracted and solved analytically using the extended Kantorovich method (EKM). The present findings are compared and validated by available results in the literature and an excellent agreement between them is observed. A parametric study is also conducted to show the significant effects of couple stress components on natural frequencies of fully clamped micro-plates. It is found that the ratio of MCST natural frequencies to those obtained by the classical theory (CT) only depends on the Poisson's ratio of the plate and is totally independent of plate's aspect ratio for cases with no residual stresses.

Keywords: vibrational analysis, modified couple stress theory, fully clamped rectangular micro-plates, extended Kantorovich method.

Procedia PDF Downloads 360
8126 On Disaggregation and Consolidation of Imperfect Quality Shipments in an Extended EPQ Model

Authors: Hung-Chi Chang

Abstract:

For an extended EPQ model with random yield, the existent study revealed that both the disaggregating and consolidating shipment policies for the imperfect quality items are independent of holding cost, and recommended a model with economic benefit by comparing the least total cost for each of the three models investigated. To better capture the real situation, we generalize the existent study to include different holding costs for perfect and imperfect quality items. Through analysis, we show that the above shipment policies are dependent on holding costs. Furthermore, we derive a simple decision rule solely based on the thresholds of problem parameters to select a superior model. The results are illustrated analytically and numerically.

Keywords: consolidating shipments, disaggregating shipments, EPQ, imperfect quality, inventory

Procedia PDF Downloads 348
8125 A Method for Identifying Unusual Transactions in E-commerce Through Extended Data Flow Conformance Checking

Authors: Handie Pramana Putra, Ani Dijah Rahajoe

Abstract:

The proliferation of smart devices and advancements in mobile communication technologies have permeated various facets of life with the widespread influence of e-commerce. Detecting abnormal transactions holds paramount significance in this realm due to the potential for substantial financial losses. Moreover, the fusion of data flow and control flow assumes a critical role in the exploration of process modeling and data analysis, contributing significantly to the accuracy and security of business processes. This paper introduces an alternative approach to identify abnormal transactions through a model that integrates both data and control flows. Referred to as the Extended Data Petri net (DPNE), our model encapsulates the entire process, encompassing user login to the e-commerce platform and concluding with the payment stage, including the mobile transaction process. We scrutinize the model's structure, formulate an algorithm for detecting anomalies in pertinent data, and elucidate the rationale and efficacy of the comprehensive system model. A case study validates the responsive performance of each system component, demonstrating the system's adeptness in evaluating every activity within mobile transactions. Ultimately, the results of anomaly detection are derived through a thorough and comprehensive analysis.

Keywords: database, data analysis, DPNE, extended data flow, e-commerce

Procedia PDF Downloads 24
8124 Analyzing the Politico-Religious Order of The 'Islamic State'

Authors: Galit Truman Zinman

Abstract:

The 'Islamic State' (IS) is one of the most successful jihadist groups in the modern history. The 'Islamic State' strives to realize the idea of erasing the borders between Muslim countries and establishing a wide Islamic caliphate. The 'Islamic State' is based on religious unity and opposition to existing political order. In this paper, the main argument is that the 'Islamic State' is characterized by two significant tendencies of state-building: preservation and change. The methodology of this study is based on the process tracing method and the analysis of primary sources: decisions, announcements and speeches of religious leaders of the Islamic State, slogans, rituals and symbols, audio and video clips produced by the Al-Hayat Media Center, films distributed on YouTube, as well as the content analysis of Dabiq`s articles (IS official Journal) and nasheeds (jihadi songs). The major findings of this study indicate that in practice the 'Islamic State' uses the same socio-political functions typical to the modern state (preservation), but introduces a different religious-ideological content (change). On the one hand, there is a preservation of the principles of existing modern state. Even with the rejection of secularization, globalization, and nationalism, there is an establishment of typical modern nation-state patterns. It is still a state entity, which has an ideological infrastructure, territory, population, governance and a monopoly on the use of violence, security services, justice system, tax collection, etc. All these functions characterize the modern state, and despite the desire of the 'Islamic State' to create a new kind of state, it reminds patterns of the typical modern nation-state. As for the religious-ideological content of the new state, here we can see a tendency of great change. The 'Islamic State' aims to create an Islamic caliphate which would allow the establishment of religious law and order, under a big commitment to return civilization to a seventh-century environment. The 'Islamic State' favors the fight against Western culture and its liberal ideology. It supports the struggle for global jihad against the unbelievers. Today, despite the territorial 'contraction' and the undermining of the organization's governance in Iraq and Syria, the 'Islamic State' continues to maintain its brand among jihadist activists around the world.

Keywords: Islamic State, Islamic caliphate, modern nation-state, religious law and order

Procedia PDF Downloads 159
8123 Positive Obligations of the State Concerning the Protection of Human Rights

Authors: Monika Florczak-Wator

Abstract:

The model of positive obligations of the state concerning the protection of the rights of an individual was created within the jurisdiction of the German Federal Constitutional Court in the 1970s. That model assumes that the state should protect an individual against infringement of their fundamental rights by another individual. It is based on the idea concerning the modification of the function and duties of the state towards an individual and society. Initially the state was perceived as the main infringer of the fundamental rights of an individual formulating the individual’s obligations of negative nature (obligation of noninterference), however, at present the state is perceived as a guarantor and protector of the fundamental rights of an individual of positive nature (obligation of protection). Examination of the chosen judicial decisions of that court will enable us to determine what the obligation of protection is specifically about, when it is updated and whether it is accompanied by claims of an individual requesting the state to take actions protecting their fundamental rights against infringement by the private entities. The comparative perspective for the German model of positive obligations of the state will be an analogous model present in the jurisdiction of the European Court of Human Rights. It is justified to include it in the research as the Convention, similarly to the constitution, focuses on the protection of an individual against the infringement of their rights by the state and both models have been developed within the jurisdiction for several dozens of years. Analysis of the provisions of the Constitution of the Republic of Poland as well as judgements of the Polish Constitutional Tribunal will allow for the presentation of the application the model of the protective duties of the state in Poland.

Keywords: human rights, horizontal relationships, constitution, state protection

Procedia PDF Downloads 457
8122 Correlates of Tourism and Power Alleviation: A Case Study of Osun Osogbo

Authors: Mohood A. Bamidele, Fadairo O. Olokesunsi, Muhammed A. Yunus

Abstract:

This research work focuses on tourism and poverty alleviation in Osun State, it delves in the tourism resources of the state and strategic framework that has been put in place to manage the cultural base tourism that is most prominent in the state. The major instrument used for data collection was questionnaire which was designed for the area and data collected were analyzed using statistical table and chi-square analysis. The result revealed that tourism is under development in Osun State and the tourism potential of the state is yet to be exploited, this is due to lack of appropriate policy to master the development and management of tourism resources, poor publicity, awareness, and lack of adequate basic infrastructure. The research work, therefore, recommended, that, there should be proper and appropriate policy, and that the government should take a leading step to develop tourism in Osun State by creating a workable environment to the private sector and given a substantial budgetary allocation to the tourism in the state.

Keywords: appropriate policy, poor publicity, poverty alleviation, substantial budgetary allocation

Procedia PDF Downloads 260
8121 Improving the Accuracy of Stress Intensity Factors Obtained by Scaled Boundary Finite Element Method on Hybrid Quadtree Meshes

Authors: Adrian W. Egger, Savvas P. Triantafyllou, Eleni N. Chatzi

Abstract:

The scaled boundary finite element method (SBFEM) is a semi-analytical numerical method, which introduces a scaling center in each element’s domain, thus transitioning from a Cartesian reference frame to one resembling polar coordinates. Consequently, an analytical solution is achieved in radial direction, implying that only the boundary need be discretized. The only limitation imposed on the resulting polygonal elements is that they remain star-convex. Further arbitrary p- or h-refinement may be applied locally in a mesh. The polygonal nature of SBFEM elements has been exploited in quadtree meshes to alleviate all issues conventionally associated with hanging nodes. Furthermore, since in 2D this results in only 16 possible cell configurations, these are precomputed in order to accelerate the forward analysis significantly. Any cells, which are clipped to accommodate the domain geometry, must be computed conventionally. However, since SBFEM permits polygonal elements, significantly coarser meshes at comparable accuracy levels are obtained when compared with conventional quadtree analysis, further increasing the computational efficiency of this scheme. The generalized stress intensity factors (gSIFs) are computed by exploiting the semi-analytical solution in radial direction. This is initiated by placing the scaling center of the element containing the crack at the crack tip. Taking an analytical limit of this element’s stress field as it approaches the crack tip, delivers an expression for the singular stress field. By applying the problem specific boundary conditions, the geometry correction factor is obtained, and the gSIFs are then evaluated based on their formal definition. Since the SBFEM solution is constructed as a power series, not unlike mode superposition in FEM, the two modes contributing to the singular response of the element can be easily identified in post-processing. Compared to the extended finite element method (XFEM) this approach is highly convenient, since neither enrichment terms nor a priori knowledge of the singularity is required. Computation of the gSIFs by SBFEM permits exceptional accuracy, however, when combined with hybrid quadtrees employing linear elements, this does not always hold. Nevertheless, it has been shown that crack propagation schemes are highly effective even given very coarse discretization since they only rely on the ratio of mode one to mode two gSIFs. The absolute values of the gSIFs may still be subject to large errors. Hence, we propose a post-processing scheme, which minimizes the error resulting from the approximation space of the cracked element, thus limiting the error in the gSIFs to the discretization error of the quadtree mesh. This is achieved by h- and/or p-refinement of the cracked element, which elevates the amount of modes present in the solution. The resulting numerical description of the element is highly accurate, with the main error source now stemming from its boundary displacement solution. Numerical examples show that this post-processing procedure can significantly improve the accuracy of the computed gSIFs with negligible computational cost even on coarse meshes resulting from hybrid quadtrees.

Keywords: linear elastic fracture mechanics, generalized stress intensity factors, scaled finite element method, hybrid quadtrees

Procedia PDF Downloads 114
8120 Necro-Power, Paramilitarism, and Sovereignty: An Interpretation of Colombian Paramilitarism as Symptom of the Formation Process of the (Neo)Liberal Democratic State

Authors: Julian David Rios Acuna

Abstract:

This paper seeks to argue that the phenomenon of ‘paramilitarism’ in Colombia exhibits the role of violence as constitutive of the political process of state formation in the country. In order to do this, it takes as its point of departure a landmark moment in the long history of private armies known as the ‘paramilitary’ in Colombia. In 2001, paramilitary commanders, politicians, and members of the military and other branches of state power singed what is known as the ‘Pact of Ralito.’ In this pact, the paramilitary appropriated constitutional and legal language. The paper argues that this appropriation shows that the paramilitary and the state express the same claim to sovereign power and therefore have the same foundation. More precisely, paramilitary power shows itself to base its power on the same foundation as the legal order, namely, extreme forms of violence where death is generative of power. In this sense, the paper shows how, by sharing its foundation, Colombian paramilitarism exhibits that state power in Colombia can be characterized as necro-power as Achille Mbembe understands it. The paper argues that paramilitarism shows state power as necro-power by constituting itself as a symptom understood, following Zizek, as that which both shows and overthrows its own foundation. In this way, paramilitarism shows the foundation of the state, thereby reconfiguring this very state. This reconfiguration, explicitly based on necro-power, the paper concludes, transforms the state into a form more appropriate to the political demands of neo-liberalism. By exhibiting its foundation in necro-power through paramilitarism, the Colombian State turns from a liberal into a (neo)liberal democracy.

Keywords: necro-power, necropolitics, paramilitarism in Colombia, state formation, state power, sovereign power

Procedia PDF Downloads 111
8119 Tools for Transparency: The Role of Civic Technology in Increasing the Transparency of the State

Authors: Rebecca Rumbul

Abstract:

The operation of the state can often appear opaque to citizens wishing to access official information, who have to negotiate a path through numerous levels of bureaucracy rationalized through institutional policy to acquire what information they want. Even where individual states have 'Right to Information' legislation guaranteeing citizen access to information, public sector conformity to such laws vary between states and between state organizations. In response to such difficulties in bringing citizens and information together, many NGO's around the world have begun designing and hosting digital portals to facilitate the requesting and receiving of official information. How then, are these 'civic technology' tools affecting the behavior of the state? Are they increasing the transparency of the state? This study looked at 5 Right to Information civic technology sites in Chile, Uruguay, Ukraine, Hungary and the UK, and found that such sites were providing a useful platform to publish official information, but that states were still reluctant to comply with all requests. It concludes that civic technology can be an important tool in increasing the transparency of the state, but that the state must have an institutional commitment to information rights for this to be fully effective.

Keywords: digital, ICT, transparency, civic technology

Procedia PDF Downloads 629
8118 Qualitative Modeling of Transforming Growth Factor Beta-Associated Biological Regulatory Network: Insight into Renal Fibrosis

Authors: Ayesha Waqar Khan, Mariam Altaf, Jamil Ahmad, Shaheen Shahzad

Abstract:

Kidney fibrosis is an anticipated outcome of possibly all types of progressive chronic kidney disease (CKD). Epithelial-mesenchymal transition (EMT) signaling pathway is responsible for production of matrix-producing fibroblasts and myofibroblasts in diseased kidney. In this study, a discrete model of TGF-beta (transforming growth factor) and CTGF (connective tissue growth factor) was constructed using Rene Thomas formalism to investigate renal fibrosis turn over. The kinetic logic proposed by Rene Thomas is a renowned approach for modeling of Biological Regulatory Networks (BRNs). This modeling approach uses a set of constraints which represents the dynamics of the BRN thus analyzing the pathway and predicting critical trajectories that lead to a normal or diseased state. The molecular connection between TGF-beta, Smad 2/3 (transcription factor) phosphorylation and CTGF is modeled using GenoTech. The order of BRN is CTGF, TGF-B, and SMAD3 respectively. The predicted cycle depicts activation of TGF-B (TGF-β) via cleavage of its own pro-domain (0,1,0) and presentation to TGFR-II receptor phosphorylating SMAD3 (Smad2/3) in the state (0,1,1). Later TGF-B is turned off (0,0,1) thereby activating SMAD3 that further stimulates the expression of CTGF in the state (1,0,1) and itself turns off in (1,0,0). Elevated CTGF expression reactivates TGF-B (1,1,0) and the cycle continues. The predicted model has generated one cycle and two steady states. Cyclic behavior in this study represents the diseased state in which all three proteins contribute to renal fibrosis. The proposed model is in accordance with the experimental findings of the existing diseased state. Extended cycle results in enhanced CTGF expression through Smad2/3 and Smad4 translocation in the nucleus. The results suggest that the system converges towards organ fibrogenesis if CTGF remains constructively active along with Smad2/3 and Smad 4 that plays an important role in kidney fibrosis. Therefore, modeling regulatory pathways of kidney fibrosis will escort to the progress of therapeutic tools and real-world useful applications such as predictive and preventive medicine.

Keywords: CTGF, renal fibrosis signaling pathway, system biology, qualitative modeling

Procedia PDF Downloads 151
8117 Evaluation of Critical State Behavior of Granular Soil in Confined Compression Tests

Authors: Rabia Chaudhry, Andrew Dawson

Abstract:

Identification of steady/critical state of coarse granular soil is challenging at conventional pressures. This study examines the drained and undrained triaxial tests for large strains on loose to dense, uniformly graded, Leighton Buzzard Fraction A sand. The triaxial tests are conducted under controlled test conditions. The comparison of soil behavior on shear strength characteristics at different effective stresses has been studied at the medium to large strains levels and the uniqueness of the critical state was discussed. The test results showed that there were two steady/critical state lines for drained and undrained conditions at confining pressures less than 1000 kPa. A critical state friction angle is not constant and the overall scatter in the steady/critical state line for the tested sand is ±0.01 in terms of void ratio at stress levels less than 1000 kPa.

Keywords: critical state, stress strain behavior, fabric/structure, triaxial tests

Procedia PDF Downloads 391
8116 Concentric Circle Detection based on Edge Pre-Classification and Extended RANSAC

Authors: Zhongjie Yu, Hancheng Yu

Abstract:

In this paper, we propose an effective method to detect concentric circles with imperfect edges. First, the gradient of edge pixel is coded and a 2-D lookup table is built to speed up normal generation. Then we take an accumulator to estimate the rough center and collect plausible edges of concentric circles through gradient and distance. Later, we take the contour-based method, which takes the contour and edge intersection, to pre-classify the edges. Finally, we use the extended RANSAC method to find all the candidate circles. The center of concentric circles is determined by the two circles with the highest concentricity. Experimental results demonstrate that the proposed method has both good performance and accuracy for the detection of concentric circles.

Keywords: concentric circle detection, gradient, contour, edge pre-classification, RANSAC

Procedia PDF Downloads 108
8115 Definite Article Errors and Effect of L1 Transfer

Authors: Bimrisha Mali

Abstract:

The present study investigates the type of errors English as a second language (ESL) learners produce using the definite article ‘the’. The participants were provided a questionnaire on the learner's ability test. The questionnaire consists of three cloze tests and two free composition tests. Each participant's response was received in the form of written data. A total of 78 participants from three government schools participated in the study. The participants are high-school students from Rural Assam. Assam is a north-eastern state of India. Their age ranged between 14-15. The medium of instruction and the communication among the students take place in the local language, i.e., Assamese. Pit Corder’s steps for conducting error analysis have been followed for the analysis procedure. Four types of errors were found (1) deletion of the definite article, (2) use of the definite article as modifiers as adjectives, (3) incorrect use of the definite article with singular proper nouns, (4) substitution of the definite article by the indefinite article ‘a’. Classifiers in Assamese that express definiteness is used with nouns, adjectives, and numerals. It is found that native language (L1) transfer plays a pivotal role in the learners’ errors. The analysis reveals the learners' inability to acquire the semantic connotation of definiteness in English due to native language (L1) interference.

Keywords: definite article error, l1 transfer, error analysis, ESL

Procedia PDF Downloads 102
8114 Quantization of Damped Systems Based on the Doubling of Degrees of Freedom

Authors: Khaled I. Nawafleh

Abstract:

In this paper, it provide the canonical approach for studying dissipated oscillators based on the doubling of degrees of freedom. Clearly, expressions for Lagrangians of the elementary modes of the system are given, which ends with the familiar classical equations of motion for the dissipative oscillator. The equation for one variable is the time reversed of the motion of the second variable. it discuss in detail the extended Bateman Lagrangian specifically for a dual extended damped oscillator time-dependent. A Hamilton-Jacobi analysis showing the equivalence with the Lagrangian approach is also obtained. For that purpose, the techniques of separation of variables were applied, and the quantization process was achieved.

Keywords: doubling of degrees of freedom, dissipated harmonic oscillator, Hamilton-Jacobi, time-dependent lagrangians, quantization

Procedia PDF Downloads 40
8113 Extending Early High Energy Physics Studies with a Tri-Preon Model

Authors: Peter J. Riley

Abstract:

Introductory courses in High Energy Physics (HEP) can be extended with the Tri-Preon (TP) model to both supplements and challenge the Standard Model (SM) theory. TP supplements by simplifying the tracking of Conserved Quantum Numbers at an interaction vertex, e.g., the lepton number can be seen as a di-preon current. TP challenges by proposing extended particle families to three generations of particle triplets for leptons, quarks, and weak bosons. There are extensive examples discussed at an introductory level in six arXiv publications, including supersymmetry, hyper color, and the Higgs. Interesting exercises include pion decay, kaon-antikaon mixing, neutrino oscillations, and K+ decay to muons. It is a revealing exercise for students to weigh the pros and cons of parallel theories at an early stage in their HEP journey.

Keywords: HEP, particle physics, standard model, Tri-Preon model

Procedia PDF Downloads 50
8112 On a Transient Magnetohydrodynamics Heat Transfer Within Radiative Porous Channel Due to Convective Boundary Condition

Authors: Bashiru Abdullahi, Isah Bala Yabo, Ibrahim Yakubu Seini

Abstract:

In this paper, the steady/transient MHD heat transfer within radiative porous channel due to convective boundary conditions is considered. The solution of the steady-state and that of the transient version were conveyed by Perturbation and Finite difference methods respectively. The heat transfer mechanism of the present work ascertains the influence of Biot number〖(B〗_i1), magnetizing parameter (M), radiation parameter(R), temperature difference, suction/injection(S) Grashof number (Gr) and time (t) on velocity (u), temperature(θ), skin friction(τ), and Nusselt number (Nu). The results established were discussed with the help of a line graph. It was found that the velocity, temperature, and skin friction decay with increasing suction/injection and magnetizing parameters while the Nusselt number upsurges with suction/injection at y = 0 and falls at y =1. The steady-state solution was in perfect agreement with the transient version for a significant value of time t. It is interesting to report that the Biot number has a cogent influence consequently, as its values upsurge the result of the present work slant the extended literature.

Keywords: heat transfer, thermal radiation, porous channel, MHD, transient, convective boundary condition

Procedia PDF Downloads 92
8111 Steady-State Behavior of a Multi-Phase M/M/1 Queue in Random Evolution Subject to Catastrophe Failure

Authors: Reni M. Sagayaraj, Anand Gnana S. Selvam, Reynald R. Susainathan

Abstract:

In this paper, we consider stochastic queueing models for Steady-state behavior of a multi-phase M/M/1 queue in random evolution subject to catastrophe failure. The arrival flow of customers is described by a marked Markovian arrival process. The service times of different type customers have a phase-type distribution with different parameters. To facilitate the investigation of the system we use a generalized phase-type service time distribution. This model contains a repair state, when a catastrophe occurs the system is transferred to the failure state. The paper focuses on the steady-state equation, and observes that, the steady-state behavior of the underlying queueing model along with the average queue size is analyzed.

Keywords: M/G/1 queuing system, multi-phase, random evolution, steady-state equation, catastrophe failure

Procedia PDF Downloads 289
8110 Active Disturbance Rejection Control for Wind System Based on a DFIG

Authors: R. Chakib, A. Essadki, M. Cherkaoui

Abstract:

This paper proposes the study of a robust control of the doubly fed induction generator (DFIG) used in a wind energy production. The proposed control is based on the linear active disturbance rejection control (ADRC) and it is applied to the control currents rotor of the DFIG, the DC bus voltage and active and reactive power exchanged between the DFIG and the network. The system under study and the proposed control are simulated using MATLAB/SIMULINK.

Keywords: doubly fed induction generator (DFIG), active disturbance rejection control (ADRC), vector control, MPPT, extended state observer, back-to-back converter, wind turbine

Procedia PDF Downloads 458
8109 Redefining State Security Using Gender: Case Study of the United States of America Post-Cold War

Authors: E. K. Linsenmayer

Abstract:

Traditional international relations theorists define state security, the principal national interest, as a state’s military force. However, many political theorists argue the current definition of security is not comprehensive and therefore, problematic. This paper argues that women’s physical security is not only linked but also necessary to achieve state security. In today’s unipolar political international system, the United States continues to accredit national security to its military. However, in one of the most militarized countries, women remain insecure. Through a case study method of the United States, this paper illuminates a necessary political prescription: the empowerment of women through an inside-out, feminist theoretical approach that makes state security attainable. The research through empirical testing, drawing from several databases, shows the positive effects of women’s physical security on state security. Women’s physical security is defined in terms of equal legal practices, health, education, and female representation in the government. State security is measured by the relative peace of a state, its involvement in conflict and a state’s relations with neighboring states. This paper shows that empowering women, 50% of the world’s population, is necessary for ending the current vicious circle of militarization, war, and insecurity. Without undoing gender power dynamics at the individual and societal level, security at all levels remains unattainable.

Keywords: gender inequality, politics, state security, women's security

Procedia PDF Downloads 180