359 research outputs found

    A Book Review in the Form of a Polemic Chad Elias's Posthumous Images: Contemporary Art and Memory Politics in Post-Civil War Lebanon and the Old New World Order

    Get PDF
    Chad Elias' 2018 book Posthumous Images: Contemporary Art and Memory Politics in Post-Civil War Lebanon attempts to deal with the question of post-civil war representation, image-making and contemporary art from the perspective of memory studies in Lebanon. Dealing with a particular group of artists working since the 1990's in installation, video, film, and performance, the book attempts to create a relation between their artistic propositions and narratives on the one hand, and the post-war reckoning with the missing and disappeared, the history of former Leftist combatants, neglected space programs, reconstruction and urban space, on the other. The book has a series of shortcomings and structural, theoretical blind spots that this review essay attempts to redress. For instance, Posthumous Images has no framework for the notions of communities of witnessing, collective memory, or post-war amnesia that seems to underpin its claims, as they seem to figure only nominally. In these theoretical omissions, the essay argues, the book adopts and furthers the ideology human rights as this relates to the politics of remembrance, as well as to Lebanon's neoliberal post-war realities. Moreover, it lacks a rigorous art historical frame to study the given artworks formally, or theoretically, leaving the book open to a post-historical method that disavows a critical, social history of art needed for an analysis of post-civil war and post-Cold war art forms in Lebanon and beyond

    IEEE 802.11e (EDCA) analysis in the presence of hidden stations

    Get PDF
    AbstractThe key contribution of this paper is the combined analytical analysis of both saturated and non-saturated throughput of IEEE 802.11e networks in the presence of hidden stations. This approach is an extension to earlier works by other authors which provided Markov chain analysis to the IEEE 802.11 family under various assumptions. Our approach also modifies earlier expressions for the probability that a station transmits a packet in a vulnerable period. The numerical results provide the impact of the access categories on the channel throughput. Various throughput results under different mechanisms are presented

    Praziquantel as the gold standard of schistosomiasis control Drug delivery and Nanotechnological strategies

    Get PDF
    The poor rate of drug discovery for the control of Neglected tropical diseases (NTDs) including schistosomiasis has necessitated effective management of existing drugs by modulating their delivery. Nanotechnology-based colloidal drug carriers have been explored to improve the activity and safety profile of drugs for NTDs including parasitic diseases. In developing new drug delivery systems for schistosomiasis, research efforts have focused mainly on Praziquantel (PZQ) as the sole antischistosomal agent in current clinical practice. Carrier systems of the polymer, inorganic and lipid-based type have been investigated for the delivery of PZQ. However, promising results were obtained using lipid-based delivery systems including liposomes, solid lipid nanoparticles, nanostructured lipid carriers and nanoemulsions. Selection of these lipid carrier systems has been based on the lipophilicity of PZQ, controlled drug release, potential increase in its bioavailability by promoting lymphatic absorption to bypass the extensive first pass effect biodistribution to the host liver and enhancement of PZQ interaction with the worm tegument of a similar phospholipid nature.

    An Improved ADI-DQM Based on Bernstein Polynomial for Solving Two-Dimensional Convection-Diffusion Equations

    Get PDF
    In this article, we presented an improved formulations based on Bernstein polynomial in calculate the weighting coefficients of DQM and alternating direction implicit-differential quadrature method (ADI-DQM) that is presented by (Al-Saif and Al-Kanani (2012-2013)), for solving convection-diffusion equations with appropriate initial and boundary conditions. Using the exact same proof for stability analysis as in (Al-Saif and Al-Kanani 2012-2013), the new scheme has reasonable stability. The improved ADI-DQM is then tested by numerical examples. Results show that the convergence of the new scheme is faster and the solutions are much more accurate than those obtained in literature. Keywords: Differential quadrature method, Convection-diffusion, Bernstein polynomial, ADI, Accuracy

    The Numerical Technique Based on Shifted Jacobi-Gauss-Lobatto Polynomials for Solving Two Dimensional Multi-Space Fractional Bioheat Equations

    Get PDF
        يتناول هذا البحث، الخوارزمية التقريبية لحل معادلة الحرارة الحيوية ثنائية البعد متعددة الرتبة الكسورية المكانية (M-SFBHE). سوف نوسع تطبيق طريقة التجميع لتقديم التقنية العددية لحل M-SFBHE مؤسسة على متعددات حدود جاكوبي- كاوس- لوباتو (SJ-GL-Ps) بالصيغة المصفوفية.  استخدمنا صيغة Caputo لتقريب المشتقة الكسرية و لإثبات فائدتها ودقتها, طبقنا الخوارزمية المقترحة على مثالين. النتائج العددية أظهرت أن النهج المستخدم فعال للغاية ويعطي دقة عالية وتقارب جيد.This article deals with the approximate algorithm for two dimensional multi-space fractional bioheat equations (M-SFBHE). The application of the collection method will be expanding for presenting a numerical technique for solving M-SFBHE based on “shifted Jacobi-Gauss-Labatto polynomials” (SJ-GL-Ps) in the matrix form. The Caputo formula has been utilized to approximate the fractional derivative and to demonstrate its usefulness and accuracy, the proposed methodology was applied in two examples. The numerical results revealed that the used approach is very effective and gives high accuracy and good convergence

    Cyber Infrastructure Protection: Vol. III

    Get PDF
    Despite leaps in technological advancements made in computing system hardware and software areas, we still hear about massive cyberattacks that result in enormous data losses. Cyberattacks in 2015 included: sophisticated attacks that targeted Ashley Madison, the U.S. Office of Personnel Management (OPM), the White House, and Anthem; and in 2014, cyberattacks were directed at Sony Pictures Entertainment, Home Depot, J.P. Morgan Chase, a German steel factory, a South Korean nuclear plant, eBay, and others. These attacks and many others highlight the continued vulnerability of various cyber infrastructures and the critical need for strong cyber infrastructure protection (CIP). This book addresses critical issues in cybersecurity. Topics discussed include: a cooperative international deterrence capability as an essential tool in cybersecurity; an estimation of the costs of cybercrime; the impact of prosecuting spammers on fraud and malware contained in email spam; cybersecurity and privacy in smart cities; smart cities demand smart security; and, a smart grid vulnerability assessment using national testbed networks.https://press.armywarcollege.edu/monographs/1412/thumbnail.jp

    Konstruksi Berita Politik Tentang Pemilukada Serentak Sulawesi Selatan Tahun 2015 dalam Siaran VE Channel News Malam

    Get PDF
    Hasil penelitian ini menunjukkan bahwa VE Channel dalam membingkai berita politik tentang pemilukada serentak Sulawesi Selatan tahun 2015 adalah cenderung menonjolkan salah satu figure. Hal ini dimaksudkan untuk meningkatkan intensitas pencitraan dalam membentuk opini publik. Hal ini bersesuaian dengan teorikonstruksi sosial Peter L Berger dan Thomas Luckman yang berpandangan bahwa realitas memiliki dimensi subjektif dan objektif dimana manusia merupakan instrument dalam menciptakan realitas yang subjetif dan objektif melalui proses eksternalisasi, sebagaimana ia memengaruhi melalui proses internalisasi yang mencerminkan realitas yang subjektif.VE Channel dalam membingkai berita pilkada akan menonjolkan salah satu figur dan seolah membawa masyarakat yang bisa mengakses siaran VE Channel untuk berpandangan sama dengannya

    Rethinking the Witness: Art After the Lebanese Wars

    Get PDF
    This thesis offers a critical investigation of art after the declared end of the Lebanese civil wars and their prolongation through various discourses and politics. This violence, insidious and structural, was said to have foreclosed certain forms of representation and of speech. The subsequent hijacking of time and space would demanded a rethinking of the witness, of representation, and of the politics of form in art. This rethinking asks what particular tactics in art, attentive to form and apparatus as much as to content, can oppose the ideologies in war and post-war discourse, but can produce and become the conditions of possibility for a politics of art. The declared end of the Lebanese wars coincided with the end of the Cold War and its concomitant muffling of a long history of revolution and counter-revolution, naturally also in the Lebanese post-civil war context. The thesis addresses how certain nascent artistic propositions challenged the crises of historical representation, legacies of witnessing, as well as the heart of testimony as fiction. It argues that certain Lebanese artists in the post-civil war era were attentive to form and to world in such as a way as to extend from waves of political modernism. Through tactics such as parody, direct modes of address, alienation effect, use of text and vernacular modes, to name but a few, they foregrounded an awareness of the ideologies of their apparatus, and brought forth a rethinking of witnessing as a political and historical position from which to speak

    Topology Control Using Distributed Power Management Algorithm for Mobile Ad Hoc Networks

    Get PDF
    In order to be strongly connected in the network, a node may increase its power indiscriminately causing interference. Since interference is one of the major problems in wireless network, the proposed algorithm will co-operatively reduce inter-node interference in the network. Further, uni-directional links are a major source of interference as most of the routing protocol only utilizes bi-directional links. The algorithm will attempt to prevent such links or if required convert them into bi-directional links. We will show that the proposed algorithm provides strongly connected and more reliable network over dynamic physical channel modeled by log-distance path loss model, log-normal shadowing model and rayleigh fading model. It stabilizes node connectivity over the dynamic network and environment and even, to a certain extent, prevent node from being completely disconnected from the network. For the selected simulation environment, we will show that the proposed algorithm provides a shorter packet delay, improves the network throughput by as much as 37%, decreases the routing overhead and reduces interference
    corecore