Search results

Filters

  • Journals
  • Authors
  • Keywords
  • Date
  • Type

Search results

Number of results: 31
items per page: 25 50 75
Sort by:

Abstract

Is the fact that the majority of the population in the Middle East belongs to Islam actually the reason why human rights in Muslim-majority countries appear to be so difficult to work out and enforce? Are Islam and human rights not basically compatible? Historically it cannot be disputed that the thought of human rights first took shape in the European and Western context. Over the course of several centuries, it became widely accepted, and finally the thought of human rights also became a political reality as they were implemented in democratic states and constitutions. However, it would be a wrong conslusion, as for instance has been emphasized by Heiner Bielefeldt, the former United Nations Special Rapporteur on freedom of religion or belief, to say that the ability to implement human rights, in particular thoughts about freedom and the equality of all people, is a one-sided affair and can only occur in the Western-Christian context. As far as Heiner Bielefeldt is concerned, this historic development, however, justifies neither the assertion that it had to happen as it did, nor does it justify Western representatives’ taking sole occupation of considerations relating to human rights thinking. Viewed from this perspective, human rights cannot boast a “Western” origin or a “Christian” character in a way that they would be incompatible with notions justified by Islam. Having that said, one is still to a large degree able to recognize a desolate situation in matters relating to human rights in Muslim-majority countries. But conflicts between Islam and human rights do not arise automatically out of the religious affiliation of a majority of the people. They certainly do stand out in those places where for political decision-making authorities Sharia law ranks higher than human rights and the granting of human rights is made dependent upon a traditional interpretation of the Sharia. Apart from the societal advocacy of human rights, there is the question as to the framework within which theological assessments of human rights questions occur. The following article aims at pointing to three discernable positions about human rights in the context of Islamic theologians, the a) the inclusive position, b) the pragmatic position, and c) the progressive position.
Go to article

Abstract

It is difficult to give an unambiguous answer for the question presented in the title. J.B. Glubb considered himself to be a friend of Arabs and the Arab issue. At the same time he was a loyal officer of the British Army. He did not see any contradiction in this. J.B. Glubb began his work in the Transjordan Emirate in 1931. In the beginning he commanded the border guard made of Bedouins and since 1939 the whole army of Transjordan, namely the Arab Legion. During World War II he considerably developed these armed forces. In 1946 Transjordan gained independence. Despite this J.B. Glubb maintained his command over the Arab Army until 1956. In 1948 he commanded the army during the conflict with Israel that was coming into being. During his military service he attempted to care about the interests of the House of Hashimites. Basically, he associated the Arab issue with the interests of this house. He believed that it was possible to permanently combine Arab interests viewed in that perspective with the influence of the British in the Middle East. Such reasoning turned out to be an absolute misconception. The officer was becoming more and more hated by a large part of Arabs. For many he was a symbol of being enslaved by the British. His reasoning of the Arab issue was becoming an anachronism. Eventually, he became a nuisance also for the Hashimites. Therefore, in march 1956 young king Husayn took the command from him and removed him from Jordan. Despite such ending of his military and political career one must admit that he was one of more interesting figures of the late British Empire.
Go to article

Abstract

At the turn of the twentieth and twenty-first century, the field of Arabic and Islamic studies became enriched by a number of multi-facetted scholarly theories challenging the traditional account on the early centuries of Islam. An author of one of them was the Israeli scholar Yehuda D. Nevo (1932–1992), working in archaeology, epigraphy and historiography. He devoted much of his career to the studying of Arabic rock inscriptions in the Negev desert, as well as to investigating literary and numismatic evidence of nascent Islam. In his theory, the gradual development of the Islamic faith, inspired by Abrahamism with an admixture of Judeo-Christianity, went through a stage of “indeterminate monotheism”. Not earlier than since the end of the second century A.H. one can speak of the formation of the dogmatic pillars of Islam, similar to those we know today. This paper is an attempt to sum up Nevo’s insightful input into the field of modern Islamic & Quranic studies today. Although controversial and unorthodox, many later researchers repeatedly refered to Nevo’s plenty of inspiring theses in their quest for facts on Islamic genesis lost in the maze of time and shifting memory of generations.
Go to article

Abstract

The aim of the article is to present the issue of loneliness of Iraqi women on the basis of selected novels written by Iraqi female writers in the 21st century. The first part of the article, which is preceded by an introduction to the topic, includes general information about the development of novels by Iraqi women writers since the second half of the 1990s and some remarks about their methods of portraying female characters. The second part of the article provides examples of lonely women in their narratives whereas the third part depicts a story of Riyām, the heroine in the novel Riyām wa-Kafā (Riyam and Kafa, 2014) by Hadiya Husayn, in a more detailed way.
Go to article

Abstract

The 13th-century Persian poet Saʿdi from Shiraz is considered to be one of the most prominent representatives of medieval Persian ethical literature. His works full of moralizing anecdotes were well known and widely read not only in Persia, but in the other parts of the Islamic world as well. Due to his highly humanistic approach, the relations between people were one of the most important issues discussed by the poet. This article is an attempt to define the status of ‘speech’ in Saʿdi’s moral imagination and to show how it becomes a key instrument in shaping relations with others. In the poet’s opinion, the right words reasonably spoken, just like an appropriate silence, shape the relationship between people and help them avoid conflict and open dispute. Quarrels and confrontations, according to the poet, not only damage a person literally by exposing his flaws and imperfections of character, thereby compromising his reputation (aberu), but may also undermine the basis of social life, generating hostility between people. That is why Saʿdi urges his readers to use soft and gentle speech in dealing with people and always behave in a conciliatory manner in response to aggression and rudeness. Highlighting the moral aspect of speech, Saʿdi shows how kind words form an invisible veil between people, which should be preserved if man desires to maintain his image, good name and dignity.
Go to article

Abstract

In this work, the design of current mode Fractional order filter using VDTAs (Voltage differencing trans-conductance amplifier) as an active element with grounded capacitors has been proposed. The approximate transfer functions of low and high pass filters of fractional order on the basis of the integer order transfer has been shown and the form of those functions of filters is also implemented using VDTA as an active building block. In this work, filters of the different sequence have been realized. The frequency domain simulation results of the proposed filters are obtained on Matlab and PSPICE with TSMC CMOS 180 nm technology parameters. Stability and sensitivity is also verified.
Go to article

Abstract

Nonlinearities in optical fibers deteriorate system performances and become a major performancelimiting issue. This article aims to investigate the compensation of nonlinear distortions in optical communication systems based on different wavelength propagations over few-mode fiber (FMF). The study adopted Space Division Multiplexing (SDM) based on decision feedback equalizer (DFE). Various transmission wavelength of the FMF system is applied to mitigate the attenuation effect on the system. In this paper, different wavelengths (780, 850 and 1550 nm) are used in SDM. Extensive simulation is performed to assess the attenuation and Bit Error Rate (BER) in each case. The results show that the wavelength of 1550 nm produces higher power and less attenuation in the transmission. Furthermore, this wavelength produces the best distance with less BER compared to 780 nm and 850 nm wavelengths. Moreover, the validations show improvement in BER and eye diagram.
Go to article

Abstract

This paper presents active inductor based VCO design for wireless applications based on analysis of active inductor models (Weng-Kuo Cascode active inductor & Liang Regular Cascode active inductor) with feedback resistor technique. Embedment of feedback resistor results in the increment of inductance as well as the quality factor whereas the values are 125.6@2.4GHz (Liang) and 98.7@3.4GHz (Weng-Kuo). The Weng-Kuo active inductor based VCO shows a tuning frequency of 1.765GHz ~2.430GHz (31.7%), while consuming a power of 2.60 mW and phase noise of -84.15 dBc/Hz@1MHz offset. On the other hand, Liang active inductor based VCO shows a frequency range of 1.897GHz ~2.522GHz (28.28%), while consuming a power of 1.40 mW and phase noise of -80.79 dBc/Hz@1MHz offset. Comparing Figure-of-Merit (FoM), power consumption, output power and stability in performance, designed active inductor based VCOs outperform with the stateof- the-art.
Go to article

Abstract

The paper considers the technique of modeling and formation educational components of the planned training of CDIO Syllabus, realized in the form of the educational adaptive environment of engineering education. The following key concepts of the methodology have been accepted: competence models of the stages of the CDIO initiative, the method of project training, syntax for describing the concepts of the domain, models for mapping support concepts in the form of expressions of knowledge and ontological engineering.
Go to article

Abstract

We address one of the weaknesses of the RSA ciphering systems i.e. the existence of the private keys that are relatively easy to compromise by the attacker. The problem can be mitigated by the Internet services providers, but it requires some computational effort. We propose the proof of concept of the GPGPU-accelerated system that can help detect and eliminate users’ weak keys. We have proposed the algorithms and developed the GPU-optimised program code that is now publicly available and substantially outperforms the tested CPU processor. The source code of the OpenSSL library was adapted for GPGPU, and the resulting code can perform both on the GPU and CPU processors. Additionally, we present the solution how to map a triangular grid into the GPU rectangular grid – the basic dilemma in many problems that concern pair-wise analysis for the set of elements. Also, the comparison of two data caching methods on GPGPU leads to the interesting general conclusions. We present the results of the experiments of the performance analysis of the selected algorithms for the various RSA key length, configurations of GPU grid, and size of the tested key set.
Go to article

Abstract

A robust and highly imperceptible audio watermarking technique is presented to secure the electronic patient record of Parkinson’s Disease (PD) affected patient. The proposed DCT-SVD based watermarking technique introduces minimal changes in speech such that the accuracy in classification of PD affected person’s speech and healthy person’s speech is retained. To achieve high imperceptibility the voiced part of the speech is considered for embedding the watermark. It is shown that the proposed watermarking technique is robust to common signal processing attacks. The practicability of the proposed technique is tested: by creating an android application to record & watermark the speech signal. The classification of PD affected speech is done using Support Vector Machine (SVM) classifier in cloud server.
Go to article

Abstract

The paper presents the use of visual evoked potentials VEP to the objective assessment of visual acuity. Methods of using visual evoked potentials (VEP) rely on the assessment of changes of the electrical action potentials generated within the cortex. To diagnose the degree of weakening eyesight a series of studies on healthy people and visually impaired ones were made. Electrophysiological studies of the eye, using noninvasive VEP examination allow a noninvasive and objective assessment of visual acuity. The use of visual evoked potentials gives the objectivity in assessment of visual acuity what may be very important in ophthalmology. This particularly may concern children examination, people with mental retardation and suspected of simulation.
Go to article

Abstract

The paper presents a method for wireless measurement of car wheel air pressure and temperature using the Tire Pressure Monitoring System, or TPMS module - one of the latest safety systems introduced by the automotive industry - with readings taken on a specifically designed test bench. The paper describes the structure and operating principle of the test bench key elements and how they work with the sensors, the TPMS module, and reference instruments, as well as the data format and accuracy of data transmission between TPMS and the host computer. The software designed for an embedded system emulating the real on-board computer allows for observing raw sensor readings and the effect of calibration in two points of the characteristics.
Go to article

Abstract

GNSS systems are susceptible to radio interference despite then operating in a spread spectrum. The commerce jammers power up to 2 watts that can block the receiver function at a distance of up to 15 kilometers in free space. Two original methods for GNSS receiver testing were developed. The first method is based on the usage of a GNSS simulator for generation of the satellite signals and a vector signal RF generator for generating different types of interference signals. The second software radio method is based on a software GNSS simulator and a signal processing in Matlab. The receivers were tested for narrowband CW interference, FM modulated signal and chirp jamming signals and scenarios. The signal to noise ratio usually drops down to 27 dBc-Hz while the jamming to signal ratio is different for different types of interference. The chirp signal is very effective. The jammer signal is well propagated in free space while in the real mobile urban and suburban environment it is usually strongly attenuated.
Go to article

Abstract

Multiple input multiple output (MIMO) is a multiple antenna technology used extensively in wireless communication systems. With the ever increasing demand in high data rates, MIMO system is the necessity of wireless communication. In MIMO wireless communication system, where the multiple antennas are placed on base station and mobile station, the major problem is the constant power of base station, which has to be allocated to data streams optimally. This problem is referred as a power allocation problem. In this research, singular value decomposition (SVD) is used to decouple the MIMO system in the presence of channel state information (CSI) at the base station and forms parallel channels between base station and mobile station. This practice parallel channel ensures the simultaneous transmission of parallel data streams between base station and mobile station. Along with this, water filling algorithm is used in this research to allocate power to each data stream optimally. Further the relationship between the channel capacity of MIMO wireless system and the number of antennas at the base station and the mobile station is derived mathematically. The performance comparison of channel capacity for MIMO systems, both in the presence and absence of CSI is done. Finally, the effect of channel correlation because of antennas at the base stations and the mobile stations in the MIMO systems is also measured.
Go to article

Abstract

A novel non-orthogonal multiple access (NOMA) scheme is proposed to improve the throughput and the outage probability of the cognitive radio (CR) inspired system which has been implemented to adapt multiple services in the nextgeneration network (5G). In the proposed scheme, the primary source (PS) had sent a superposition code symbol with a predefined power allocation to relays, it decoded and forwarded (DF) a new superposition coded symbol to the destination with the other power allocation. By using a dual antenna at relays, it will be improved the bandwidth efficiency in such CR NOMA scheme. The performance of the system is evaluated based on the outage probability and the throughput with the assumption of the Rayleigh fading channels. According to the results obtained, it is shown that the outage probability and throughput of the proposed full-duplex (FD) in CR-NOMA with reasonable parameters can be able deploy in practical design as illustration in numerical results section.
Go to article

Abstract

One of the crucial advancements in next-generation 5G wireless networks is the use of high-frequency signals specifically those are in the millimeter wave (mm-wave) bands. Using mmwave frequency will allow more bandwidth resulting higher user data rates in comparison to the currently available network. However, several challenges are emerging (such as fading, scattering, propagation loss etc.), whenever we utilize mm-wave frequency wave bands for signal propagation. Optimizing propagation parameters of the mm-wave channels system are much essential for implementing in the real-world scenario. To keep this in mind, this paper presents the potential abilities of high frequencies signals by characterizing the indoor small cell propagation channel for 28, 38, 60 and 73 GHz frequency band, which is considered as the ultimate frequency choice for many of the researchers. The most potential Close-In (CI) propagation model for mm-wave frequencies is used as a Large-scale path loss model. Results and outcomes directly affecting the user experience based on fairness index, average cell throughput, spectral efficiency, cell-edge user’s throughput and average user throughput. The statistical results proved that these mm-wave spectrum gives a sufficiently greater overall performance and are available for use in the next generation 5G mobile communication network.
Go to article

Abstract

Performance of standard Direction of Arrival (DOA) estimation techniques degraded under real-time signal conditions. The classical algorithms are Multiple Signal Classification (MUSIC), and Estimation of Signal Parameters via Rotational Invariance Technique (ESPRIT). There are many signal conditions hamper on its performance, such as closely spaced and coherent signals caused due to the multipath propagations of signals results in a decrease of the signal to noise ratio (SNR) of the received signal. In this paper, a novel DOA estimation technique named CW-PCA MUSIC is proposed using Principal Component Analysis (PCA) to threshold the nearby correlated wavelet coefficients of Dual-Tree Complex Wavelet transform (DTCWT) for denoising the signals before applying to MUSIC algorithm. The proposed technique improves the detection performance under closely spaced, and coherent signals with relatively low SNR conditions. Also, this method requires fewer snapshots, and less antenna array elements compared with standard MUSIC and wavelet-based DOA estimation algorithms.
Go to article

Abstract

In this paper, we propose a new algorithm that improves the performance of the operation of Handover (HO) in LTE-Advanced (LTE-A) networks. As recognized, Mobility Management (MM) is an important pillar in LTE/LTE-A systems to provide high quality of service to users on the move. The handover algorithms define the method and the steps to follow to ensure a reliable transfer of the UEs from one cell to another without interruption or degradation of the services offered by the network. In this paper, the authors proposed a new handover algorithm for LTE/LTE-A networks based on the measurement and calculation of two important parameters, namely the available bandwidth and the Received Power (RSRP) at the level of eNodeBs. The proposed scheme named LTE Available Bandwidth and RSRP Based Handover Algorithm (LABRBHA) was tested in comparison with well-known algorithms in the literature as the LHHA, LHHAARC and the INTEGRATOR scheme using the open source simulator LTE-Sim. Finally, the network performances were investigated via three indicators: the number of lost packets during the handover operation, the latency as well as the maximum system throughput. The results reported that our algorithm shows remarkable improvements over other transfer schemes.
Go to article

This page uses 'cookies'. Learn more