objective : To assess for Psychological Problems. The study was carried out from 1st of December 2004 to 15th
March, 2005.
Mythology : A descriptive comparative study was conducted for elder in the geriatric home and the community;
A questionnaire was constructed to achieve the purposes of the study; it includes two parts dealing with the
elder demographic characteristics and psychological problems.
A purposive (no probability) sampling of (100) elderly include (50) elderly from the Geriatric Home and (50)
elderly from the community.
Data were collected and analyzed through a descriptive statistical approach (frequency, percentage, mean and
mean of scores, Standard deviation, Relative Sufficiency).
Result : the
Recent years have seen an explosion in graph data from a variety of scientific, social and technological fields. From these fields, emotion recognition is an interesting research area because it finds many applications in real life such as in effective social robotics to increase the interactivity of the robot with human, driver safety during driving, pain monitoring during surgery etc. A novel facial emotion recognition based on graph mining has been proposed in this paper to make a paradigm shift in the way of representing the face region, where the face region is represented as a graph of nodes and edges and the gSpan frequent sub-graphs mining algorithm is used to find the frequent sub-structures in the graph database of each emotion. T
... Show MoreCooperation spectrum sensing in cognitive radio networks has an analogy to a distributed decision in wireless sensor networks, where each sensor make local decision and those decision result are reported to a fusion center to give the final decision according to some fusion rules. In this paper the performance of cooperative spectrum sensing examines using new optimization strategy to find optimal weight and threshold curves that enables each secondary user senses the spectrum environment independently according to a floating threshold with respect to his local environment. Our proposed approach depends on proving the convexity of the famous optimization problem in cooperative spectrum sensing that stated maximizing the probability of detec
... Show MoreCognitive radio is observed as a new approach, which could be cope with the spectral limitations. This approach is designed to detect whether a particular segment of the radio spectrum is currently in use and to jump into the temporarily unused spectrum rapidly without interfering with the transmissions of other users. CR is the promising radio technology which aims to detect and utilize the temporally unused spectrum bands by sensing its radio environment in order to improve spectrum utilization. To enhance the sensing performance, cooperative spectrum sensing has been proposed. However, when the number of cognitive user tends to be very large, the bandwidth for reporting sensing results to the common receiver will be very huge. In this pa
... Show MoreFace Identification is an important research topic in the field of computer vision and pattern recognition and has become a very active research area in recent decades. Recently multiwavelet-based neural networks (multiwavenets) have been used for function approximation and recognition, but to our best knowledge it has not been used for face Identification. This paper presents a novel approach for the Identification of human faces using Back-Propagation Adaptive Multiwavenet. The proposed multiwavenet has a structure similar to a multilayer perceptron (MLP) neural network with three layers, but the activation function of hidden layer is replaced with multiscaling functions. In experiments performed on the ORL face database it achieved a
... Show MoreIn this paper a nonlinear adaptive control method is presented for a pH process, which is difficult to control due to the nonlinear and uncertainties. A theoretical and experimental investigation was conducted of the dynamic behavior of neutralization process in a continuous stirred tank reactor (CSTR). The process control was implemented using different control strategies, velocity form of PI control and nonlinear adaptive control. Through simulation studies it has been shown that the estimated parameters are in good agreement with the actual values and that the proposed adaptive controller has excellent tracking and regulation performance.
Face Identification is an important research topic in the field of computer vision and pattern recognition and has become a very active research area in recent decades. Recently multiwavelet-based neural networks (multiwavenets) have been used for function approximation and recognition, but to our best knowledge it has not been used for face Identification. This paper presents a novel approach for the Identification of human faces using Back-Propagation Adaptive Multiwavenet. The proposed multiwavenet has a structure similar to a multilayer perceptron (MLP) neural network with three layers, but the activation function of hidden layer is replaced with multiscaling functions. In experiments performed on the ORL face database it achieved a
... Show MoreIn this work, the nuclear electromagnetic moments for the ground and low-lying excited states for sd shell nuclei have been calculated, resulting in a revised database with 56 magnetic dipole moments and 41 electric quadrupole moments. The shell model calculations are performed for each sd isotope chain, considering the sensitivity of changing the sd two-body effective interactions USDA, USDE, CWH and HBMUSD in the calculation of the one-body transition density matrix elements. The calculations incorporate the single-particle wave functions of the Skyrme interaction to generate a one-body potential in Hartree–Fock theory to calculate the single-particle matrix elements. For most sd shell nuclei, the experimental data are well rep
... Show MoreIn this paper, we discuss physical layer security techniques in downlink networks, including eavesdroppers. The main objective of using physical layer security is delivering a perfectly secure message from a transmitter to an intended receiver in the presence of passive or active eavesdroppers who are trying to wiretap the information or disturb the network stability. In downlink networks, based on the random feature of channels to terminals, opportunistic user scheduling can be exploited as an additional tool for enhancing physical layer security. We introduce user scheduling strategies and discuss the corresponding performances according to different levels of channel state information (CSI) at the base station (BS). We show that the avai
... Show MoreWater absorbent polymers (WAP) are new component in producing building materials. They provide internal curing which reduces autogenous cracking, eliminates autogenous shrinkage, mortar strength increased, enhance early age strength to withstand strain, improve the durability, introduce higher early age compressive strength, have higher performance and reduce the effect of insufficient external curing. This research used different percent of polymer balls to choose the percent that provides good development in compressive strength with time for both water and air curing. The water absorption polymer balls in this research have the ability to absorb water and after usage in concrete they spill out the water (internal curing) and shri
... Show More