Abstract: Auditory hallucinations among the most invalidating
and distressing experiences reported by patients diagnosed with
schizophrenia, leading to feelings of powerlessness and helplessness
towards their illness. In more severe cases, these auditory
hallucinations can take the form of commanding voices, which are
often related to high suicidality rates in these patients. Several
authors propose that the meanings attributed to the hallucinatory
experience, rather than characteristics like form and content, can be
determinant in patients’ reactions to hallucinatory activity,
particularly in the case of voice-hearing experiences. In this study, 48
patients diagnosed with paranoid schizophrenia presenting auditory
hallucinations were studied. Multiple regression analyses were
computed to study the influence of several developmental aspects,
such as family and social dynamics, bullying, depression, and sociocognitive
variables on the auditory hallucinations, on patients’
attributions and relationships with their voices, and on the resulting
invalidation of hallucinatory experience. Overall, results showed how
relationships with voices can mirror several aspects of interpersonal
relationship with others, and how self-schemas, depression and actual
social relationships help shaping the voice-hearing experience. Early
experiences of victimization and submission help predict the
attributions of omnipotence of the voices, and increased hostility
from parents seems to increase the malevolence of the voices,
suggesting that socio-cognitive factors can significantly contribute to
the etiology and maintenance of auditory hallucinations. The
understanding of the characteristics of auditory hallucinations and the
relationships patients established with their voices can allow the
development of more promising therapeutic interventions that can be
more effective in decreasing invalidation caused by this devastating
mental illness.
Abstract: This paper describes an optimization tool-based
design strategy for a Current Mode Logic CML divide-by-2 circuit.
Representing a building block for output frequency generation in a
RFID protocol based-frequency synthesizer, the circuit was designed
to minimize the power consumption for driving of multiple loads
with unbalancing (at transceiver level). Implemented with XFAB
XC08 180 nm technology, the circuit was optimized through
MunEDA WiCkeD tool at Cadence Virtuoso Analog Design
Environment ADE.
Abstract: The chemical and physical characteristics of rainwater
harvested from a typical rooftop were progressively studied. The
samples of rainwater collected were analyzed for pH, major ion
concentrations, TDS, turbidity, conductivity. All the Physicochemical
constituents fell within the WHO guideline limits at some points as
rainfall progresses except the pH. All the components of rainwater
quality measured during the study showed higher concentrations
during the early stages of rainfall and reduce as time progresses.
There was a downward trend in terms of pH as rain progressed, with
18% of the samples recording pH below the WHO limit of 6.5-8.0. It
was observed that iron concentration was above the WHO threshold
value of 0.3 mg/l on occasions of heavy rains. The results revealed
that most of physicochemical characteristics of rainwater samples
were generally below the WHO threshold, as such, the rainwater
characteristics showed satisfactory conditions in terms of
physicochemical constituents.
Abstract: Rapid growth of Information Technologies (IT) has
had huge influence on enterprises, and it has contributed to its
promotion and increasingly extensive use in enterprises. Information
Technologies have to a large extent determined the processes taking
place in an enterprise; what is more, IT development has brought the
need to adopt a brand new approach to human resources management
in an enterprise. The use of IT in human resource management
(HRM) is of high importance due to the growing role of information
and information technologies. The aim of this paper is to evaluate the
use of information technologies in human resources management in
enterprises. These practices will be presented in the following areas:
recruitment and selection, development and training, employee
assessment, motivation, talent management, personnel service.
Results of conducted survey show diversity of solutions applied in
particular areas of human resource management. In the future, further
development in this area should be expected, as well as integration of
individual HRM areas, growing mobile-enabled HR processes and
their transfer into the cloud. Presented IT solutions applied in HRM
are highly innovative, which is of great significance due to their
possible implementation in other enterprises.
Abstract: In this research, TRACE model of Chinshan BWR/4
nuclear power plant (NPP) has been developed for the simulation and
analysis of ultimate response guideline (URG).The main actions of
URG are the depressurization and low pressure water injection of
reactor and containment venting. This research focuses to verify the
URG efficiency under Fukushima-like conditions. TRACE analysis
results show that the URG can keep the PCT below the criteria
1088.7 K under Fukushima-like conditions. It indicated that Chinshan
NPP was safe.
Abstract: In statistics parameter theory, usually the
parameter estimations have two kinds, one is the least-square
estimation (LSE), and the other is the best linear unbiased
estimation (BLUE). Due to the determining theorem of
minimum variance unbiased estimator (MVUE), the parameter
estimation of BLUE in linear model is most ideal. But since
the calculations are complicated or the covariance is not
given, people are hardly to get the solution. Therefore, people
prefer to use LSE rather than BLUE. And this substitution
will take some losses. To quantize the losses, many scholars
have presented many kinds of different relative efficiencies in
different views. For the linear weighted regression model, this
paper discusses the relative efficiencies of LSE of β to BLUE
of β. It also defines two new relative efficiencies and gives
their lower bounds.
Abstract: Froth flotation remains to date as one of the most used
metallurgical processes for concentrating metal-bearing minerals in
ores. Oxide ores are relatively less amenable to froth flotation and
require a judicious choice of reagents for the recovery of metals to be
optimised. Laboratory batch flotation tests were conducted to
determine the effect of two types of gasoil-rinkalore mixtures on the
flotation response of a copper cobalt oxide ore sample. The head
assay conducted on the initial ore sample showed that it contained
about 2.90% of Cu, 0.12% of Co.
Upon the flotation test work, the results obtained indicated that the
concentrate obtained with use of the mixture gazoil-rinkalore RX
yielded 8.24% Cu and 0.22% Co concentrate grades with recoveries
of 76.0% Cu and 78.0% Co respectively. But, the concentrate
obtained by use of the mixture gazoil-rinkalore RX3 yielded
relatively bad results with 5.92% Cu and 0.18% Cu concentrate
grades with recoveries of 70.3% Cu and 65.3% Co respectively.
Abstract: Software fault prediction models are created by using
the source code, processed metrics from the same or previous version
of code and related fault data. Some company do not store and keep
track of all artifacts which are required for software fault prediction.
To construct fault prediction model for such company, the training
data from the other projects can be one potential solution. Earlier we
predicted the fault the less cost it requires to correct. The training
data consists of metrics data and related fault data at function/module
level. This paper investigates fault predictions at early stage using the
cross-project data focusing on the design metrics. In this study,
empirical analysis is carried out to validate design metrics for cross
project fault prediction. The machine learning techniques used for
evaluation is Naïve Bayes. The design phase metrics of other projects
can be used as initial guideline for the projects where no previous
fault data is available. We analyze seven datasets from NASA
Metrics Data Program which offer design as well as code metrics.
Overall, the results of cross project is comparable to the within
company data learning.
Abstract: The Speexx results revealed four main factors
affecting the success of 190 Thai sophomores as follows: 1) Future
English training should be pursued in applied Speexx development.
2) Thai students didn’t see the benefit of having an Online Language
Training Program. 3) There is a great need to educate the next
generation of learners on the benefits of Speexx within the
community. 4) A great majority of Thai Sophomores didn't know
what Speexx was.
A guideline for self-reliance planning consisted of four aspects: 1)
Development planning: by arranging groups to further improve
English abilities with the Speexx Language Training program and
encourage using Speexx into every day practice. Local communities
need to develop awareness of the usefulness of Speexx and share the
value of using the program among family and friends. 2) Humanities
and Social Science staff should develop skills using this Online
Language Training Program to expand on the benefits of Speexx
within their departments. 3) Further research should be pursued on
the Thai Students progression with Speexx and how it helps them
improve their language skills with Business English. 4) University’s
and Language centers should focus on using Speexx to encourage
learning for any language, not just English.
Abstract: This paper presents the design and characterization of
analog readout interface circuits for ion sensitive field effect
transistor (ISFET) and ion selective electrode (ISE) based sensor.
These interface circuits are implemented using MIMOS’s 0.35um
CMOS technology and experimentally characterized under 24-leads
QFN package. The characterization evaluates the circuit’s
functionality, output sensitivity and output linearity. Commercial
sensors for both ISFET and ISE are employed together with glass
reference electrode during testing. The test result shows that the
designed interface circuits manage to readout signals produced by
both sensors with measured sensitivity of ISFET and ISE sensor are
54mV/pH and 62mV/decade, respectively. The characterized output
linearity for both circuits achieves above 0.999 Rsquare. The readout
also has demonstrated reliable operation by passing all qualifications
in reliability test plan.
Abstract: The concept of national security in Iran is a
permanently effective factor in acceptance or rejection of many
international obligations. These obligations had been defined
according to the type of legislation of Iran in many aspects.
Therefore, there are several treaties at international level which
requires Iran’s security to come in contact with obligations in these
treaties in a way that an obstacle to join to them and their passage in
parliament. This issue is a typical category which every country pays
attention to be accepted in treaties or to include their national
security in that treaties and also they can see the related treaties from
this perspective, but this issue that 'what is the concept of Iran’s
national security', and 'To what extent it is changed in recent years,
especially after Islamic Revolution' are important issues that can be
criticized. Thus, this study is trying to assess singed treaties from the
perspective of Iran’s national security according of the true meaning
of treaty and to investigate how the international treaties may be in
conflict with Iran’s national security.
Abstract: While emerging technologies continue to emerge,
research into their use in learning contexts often focuses on a subset
of educational practices and ways of using technologies. In this study
we begin to explore the extent to which educational designs are
influenced by larger societal and education-related factors not usually
explicitly considered when designing or identifying technology-supported
education experiences for research study. We examine
patterns within and between factors via a content analysis across ten
years and 19 different journals of published peer-reviewed research
on technology-supported writing. Our findings have implications for
how researchers, designers, and educators approach technology-supported
educational design within and beyond the field of writing
and literacy.
Abstract: Removal of the widespread used drug paracetamol
from water was investigated using activated carbon originated from
dende coconut mesocarp and babassu coconut mesocarp. Kinetic and
equilibrium data were obtained at different values of pH. Both
activated carbons showed high efficiency when pH ≤ pHPZC as the
carbonil group of paracetamol molecule are adsorbed due to
positively charged carbon surface. Microporosity also played an
important role in such process. Pseudo-second order model was better
adjusted to the kinetic results. Equilibrium data may be represented
by Langmuir equation.
Abstract: This paper investigates simple implicit force control
algorithms realizable with industrial robots. A lot of approaches
already published are difficult to implement in commercial robot
controllers, because the access to the robot joint torques is necessary
or the complete dynamic model of the manipulator is used. In
the past we already deal with explicit force control of a position
controlled robot. Well known schemes of implicit force control are
stiffness control, damping control and impedance control. Using such
algorithms the contact force cannot be set directly. It is further
the result of controller impedance, environment impedance and
the commanded robot motion/position. The relationships of these
properties are worked out in this paper in detail for the chosen
implicit approaches. They have been adapted to be implementable
on a position controlled robot. The behaviors of stiffness control
and damping control are verified by practical experiments. For this
purpose a suitable test bed was configured. Using the full mechanical
impedance within the controller structure will not be practical in the
case when the robot is in physical contact with the environment. This
fact will be verified by simulation.
Abstract: Heat transfer due to forced convection of copper water
based nanofluid has been predicted by Artificial Neural network
(ANN). The present nanofluid is formed by mixing copper
nanoparticles in water and the volume fractions are considered here
are 0% to 15% and the Reynolds number are kept constant at 100.
The back propagation algorithm is used to train the network. The
present ANN is trained by the input and output data which has been
obtained from the numerical simulation, performed in finite volume
based Computational Fluid Dynamics (CFD) commercial software
Ansys Fluent. The numerical simulation based results are compared
with the back propagation based ANN results. It is found that the
forced convection heat transfer of water based nanofluid can be
predicted correctly by ANN. It is also observed that the back
propagation ANN can predict the heat transfer characteristics of
nanofluid very quickly compared to standard CFD method.
Abstract: Thousands of organisations store important and
confidential information related to them, their customers, and their
business partners in databases all across the world. The stored data
ranges from less sensitive (e.g. first name, last name, date of birth) to
more sensitive data (e.g. password, pin code, and credit card
information). Losing data, disclosing confidential information or
even changing the value of data are the severe damages that
Structured Query Language injection (SQLi) attack can cause on a
given database. It is a code injection technique where malicious SQL
statements are inserted into a given SQL database by simply using a
web browser. In this paper, we propose an effective pattern
recognition neural network model for detection and classification of
SQLi attacks. The proposed model is built from three main elements
of: a Uniform Resource Locator (URL) generator in order to generate
thousands of malicious and benign URLs, a URL classifier in order
to: 1) classify each generated URL to either a benign URL or a
malicious URL and 2) classify the malicious URLs into different
SQLi attack categories, and a NN model in order to: 1) detect either a
given URL is a malicious URL or a benign URL and 2) identify the
type of SQLi attack for each malicious URL. The model is first
trained and then evaluated by employing thousands of benign and
malicious URLs. The results of the experiments are presented in
order to demonstrate the effectiveness of the proposed approach.
Abstract: The purpose of the paper is to estimate the US small
wind turbines market potential and forecast the small wind turbines
sales in the US. The forecasting method is based on the application of
the Bass model and the generalized Bass model of innovations
diffusion under replacement purchases. In the work an exponential
distribution is used for modeling of replacement purchases. Only one
parameter of such distribution is determined by average lifetime of
small wind turbines. The identification of the model parameters is
based on nonlinear regression analysis on the basis of the annual
sales statistics which has been published by the American Wind
Energy Association (AWEA) since 2001 up to 2012. The estimation
of the US average market potential of small wind turbines (for
adoption purchases) without account of price changes is 57080
(confidence interval from 49294 to 64866 at P = 0.95) under average
lifetime of wind turbines 15 years, and 62402 (confidence interval
from 54154 to 70648 at P = 0.95) under average lifetime of wind
turbines 20 years. In the first case the explained variance is 90,7%,
while in the second - 91,8%. The effect of the wind turbines price
changes on their sales was estimated using generalized Bass model.
This required a price forecast. To do this, the polynomial regression
function, which is based on the Berkeley Lab statistics, was used. The
estimation of the US average market potential of small wind turbines
(for adoption purchases) in that case is 42542 (confidence interval
from 32863 to 52221 at P = 0.95) under average lifetime of wind
turbines 15 years, and 47426 (confidence interval from 36092 to
58760 at P = 0.95) under average lifetime of wind turbines 20 years.
In the first case the explained variance is 95,3%, while in the second
– 95,3%.
Abstract: Transportation of long turbine blades from one place
to another is a difficult process. Hence a feasibility study of
modularization of wind turbine blade was taken from structural
standpoint through finite element analysis. Initially, a non-segmented
blade is modeled and its structural behavior is evaluated to serve as
reference. The resonant, static bending and fatigue tests are simulated
in accordance with IEC61400-23 standard for comparison purpose.
The non-segmented test blade is separated at suitable location based
on trade off studies and the segments are joined with an innovative
double strap bonded joint configuration. The adhesive joint is
modeled by adopting cohesive zone modeling approach in ANSYS.
The developed blade model is analyzed for its structural response
through simulation. Performances of both the blades are found to be
similar, which indicates that, efficient segmentation of the long blade
is possible which facilitates easy transportation of the blades and on
site reassembling. The location selected for segmentation and
adopted joint configuration has resulted in an efficient segmented
blade model which proves the methodology adopted for segmentation
was quite effective. The developed segmented blade appears to be the
viable alternative considering its structural response specifically in
fatigue within considered assumptions.
Abstract: The area of liberty, security and justice within the
European Union is still a work in progress. No one can deny that the
EU struggles between a monistic and a dualist approach.
The aim of our essay is to first review how the European law is
perceived by the rest of the international scene. It will then discuss
two main mechanisms at play: the interpretation of larger
international treaties and the penal mechanisms of European law.
Finally, it will help us understand the role of a penal Europe on the
international scene with concrete examples.
Special attention will be paid to cases that deal with fundamental
rights as they represent an interesting case study in Europe and in the
rest of the World. It could illustrate the aforementioned duality
currently present in the Union’s interpretation of international public
law. On the other hand, it will explore some specific European penal
mechanism through mutual recognition and the European arrest
warrant in the transnational criminality frame.
Concerning the interpretation of the treaties, it will first, underline
the ambiguity and the general nature of some treaties that leave the
EU exposed to tension and misunderstanding then it will review the
validity of an EU act (whether or not it is compatible with the rules of
International law).
Finally, it will focus on the most complete manifestation of liberty,
security and justice through the principle of mutual recognition. Used
initially in commercial matters, it has become “the cornerstone” of
European construction. It will see how it is applied in judicial
decisions (its main event and achieving success is via the European
arrest warrant) and how European member states have managed to
develop this cooperation.
Abstract: A new steganographic method via the use of numeric
data on public websites with a self-authentication capability is
proposed. The proposed technique transforms a secret message into
partial shares by Shamir’s (k, n)-threshold secret sharing scheme with
n = k + 1. The generated k+1 partial shares then are embedded into the
numeric items to be disguised as part of the website’s numeric content,
yielding the stego numeric content. Afterward, a receiver links to the
website and extracts every k shares among the k+1 ones from the stego
numeric content to compute k+1 copies of the secret, and the
phenomenon of value consistency of the computed k+1 copies is taken
as an evidence to determine whether the extracted message is authentic
or not, attaining the goal of self-authentication of the extracted secret
message. Experimental results and discussions are provided to show
the feasibility and effectiveness of the proposed method.