Search results for: original KNN
1482 The Translation Of Original Metaphor In Literature
Authors: Esther Matthews
Abstract:
This paper looks at ways of translating new metaphors: those conceived and created by authors, which are often called ‘original’ metaphors in the world of Translation Studies. An original metaphor is the most extreme form of figurative language, often dramatic and shocking in effect. It displays unexpected juxtapositions of language, suggesting there could be as many different translations as there are translators. However, some theorists say original metaphors should be translated ‘literally’ or ‘word for word’ as far as possible, suggesting a similarity between translators’ solutions. How do literary translators approach this challenge? This study focuses on Spanish-English translations of a novel full of original metaphors: Nada by Carmen Laforet (1921 – 2004). Original metaphors from the text were compared to the four published English translations by Inez Muñoz, Charles Franklin Payne, Glafyra Ennis, and Edith Grossman. These four translators employed a variety of translation methods, but they translated ‘literally’ in well over half of the original metaphors studied. In a two-part translation exercise and questionnaire, professional literary translators were asked to translate a number of these metaphors. Many different methods were employed, but again, over half of the original metaphors were translated literally. Although this investigation was limited to one author and language pair, it gives a clear indication that, although literary translators’ solutions vary, on the whole, they prefer to translate original metaphors as literally as possible within the confines of English grammar and syntax. It also reveals literary translators’ desire to reproduce the distinctive character of an author’s work as accurately as possible for the target reader.Keywords: translation, original metaphor, literature, translator training
Procedia PDF Downloads 2741481 Original and the Translated: A Comparative Evaluation of Native and Non-Native English Translations of Faiz
Authors: Anam Nawaz
Abstract:
The present study is an attempt to compare the translations of Faiz’s poetry made by native and non-native translators, to determine the role of the translator in terms of preserving the cultural ethos of the original text. Peter Newmark and Katharine Reiss’s approaches to translation criticism have been used to provide a theoretical framework for the study. This study also emphasizes those cultural and semantic aspects of the original which are translated more convincingly by a native translator, and contrasting those features which the non-natives can tackle more ably. The research also highlights the linguistic sockets, ignored by the interpreters in the translation process. The analysis showed that both native and non-native translators have made an admirable effort to stay as close to the original as possible. The natives with their advantage of belonging to the same culture have excelled in preserving the original subject matter, whereas the non-native renderings have been presented in a much rhythmic and poetic manner with an excellent choice of words. Though none of the four translators has been successfully able to recreate Faiz’s magic, however V. G. Kiernan and Sarvat Rahman’s translations can be regarded as the closest to the original. Whereas V. G. Kiernan with his outstanding command over English mesmerizes the readers, Sarvat Rahman’s profound understanding of cultural ties helps establish her translations as a brilliant example of faithful re-renderings.Keywords: comparative translations, linguistic and cultural constraints, native translators, non-native translators, poetry and translation, Faiz Ahmad Faiz
Procedia PDF Downloads 2611480 Understanding Lacan’s ‘Name of the Father’ Concept, the Original Introject, and Personality Functioning
Authors: Chloe T. Cohen, Sarah Johnson
Abstract:
Psychoanalytic literature has traditionally focused on the theoretical explanations of psychological phenomena rather than empirical research to support those ideas. Many clinicians assume a lack of empirical verification of the theories that underpin psychoanalytic treatment disqualifies psychoanalytic psychotherapy as an effective clinical technique. One such theory is Lacan’s ‘Name of the Father’, which extended Freud’s idea of the importance of a successful resolution of the Oedipal problem, situating it even earlier in psychological development. Lacan posited that the Name of the Father construct (establishing psychological structure and preventing psychosis) was best represented in language use, metaphor, and linguistic structure. However, no study to date has empirically examined the Name of the Father construct. The current study attempts to measure Lacan’s ‘Name of the Father’ construct through linguistic structure and metaphor use and to compare it with Freud’s ‘original introject’. We will then investigate whether they relate to adult personality functioning (measured using the Rorschach Inkblot Test). We aim to contribute to the empirical study of psychoanalytic concepts by operationalizing and validating the Name of the Father empirically. We also aim to examine the relationship of the Name of the Father construct to Freud’s concept of the original introject and to adult pathology. We hypothesize that measures of the original introject will mediate the pathway between linguistic indicators of Lacan’s Name of the Father construct and personality functioning.Keywords: Lacan, Name of the Father, original introject, personality functioning, psychoanalysis
Procedia PDF Downloads 2001479 Investigating Differential Psychological Impact of Translated Movies: An Experimental Design
Authors: Sonakshi Saxena, Moosath Harishankar Vasudevan
Abstract:
The current study seeks to investigate the differences in the psychological impact of movies in their original and translated versions. International cinema is exemplar of the success of globalization. The multitude of languages in the global village does not seem to impede the common cinematic goal of filmmakers across linguistic boundaries. To understand, hence, whether the psychological impact of movies, intentional or otherwise, is preserved when the original is translated into a different language, an experimental design was adopted. Multilingual participants in the age group 18-25 years were recruited for the same. A control group and an experimental group were randomly assigned and the psychological impacts of movies were studied under two conditions- a) watching the movie in its original language, and b) watching the movie in its original language as well as translated version. For the second condition, the experimental group was further divided into two groups randomly to balance order effects. The major aspects of psychological impact assessed were emotional impact and attitude towards the movie. The scores were compared for the two groups. It is further discussed whether the experience is salient across language or do languages inherently possess the ability to alter experiences of the audience.Keywords: experimental design, movies, psychological impact, translation
Procedia PDF Downloads 3971478 A Study on the Importance and Contributions of Transforming from OEM to ODM in Malaysian Furniture Industry
Authors: Nurul Ain Haron, Saiful Hazmi Bachek, Hafez Zainudin
Abstract:
This study is aimed to establish the importance and contribution of Original Design Manufacturing (ODM) in Malaysian Furniture Industry and to close the gap between the players in the industry. The study confirms that today’s furniture industry favor Original Equipment Manufacturing (OEM) basis. Thus, resulting in the local industry lacking the expertise of designing furniture to a state of no contest. This study method used consists of literature reviews, observation, questionnaire and sessions of interviews. The result shows that the public has from minimum to almost no knowledge of the term Original Design Manufacturing (ODM) concept and the impact towards our current future industry. The manufacturers however, prefers Original Equipment Manufacturing (OEM) concept due to its easy and fast investment returns with the need of product designing process, while the interviews carried out with the authorized council had some convincing urges of doing their part promoting the awareness through trainings and seminars. Findings show that, in the rush of archiving ODM status needs extensive cooperation from many parties that are authorized council, furniture manufacturers, designers and also the public perceptions of labeling local made goods as the black goat. The current mind set of OEM manufacturers need to be change for industry’s future. As Malaysia’s living status constantly increases, so will the demands of a better salary. If these current issues are not resolved, OEM international buyers will definitely have to shift to some other lower cost manufacturer like China or Taiwan. When vendors stopped to order, today’s OEM manufacturers will no longer exist in the future.Keywords: design manufacturing, furniture design, original design manufacturing, original equipment manufacturing
Procedia PDF Downloads 4451477 Secure E-Pay System Using Steganography and Visual Cryptography
Authors: K. Suganya Devi, P. Srinivasan, M. P. Vaishnave, G. Arutperumjothi
Abstract:
Today’s internet world is highly prone to various online attacks, of which the most harmful attack is phishing. The attackers host the fake websites which are very similar and look alike. We propose an image based authentication using steganography and visual cryptography to prevent phishing. This paper presents a secure steganographic technique for true color (RGB) images and uses Discrete Cosine Transform to compress the images. The proposed method hides the secret data inside the cover image. The use of visual cryptography is to preserve the privacy of an image by decomposing the original image into two shares. Original image can be identified only when both qualified shares are simultaneously available. Individual share does not reveal the identity of the original image. Thus, the existence of the secret message is hard to be detected by the RS steganalysis.Keywords: image security, random LSB, steganography, visual cryptography
Procedia PDF Downloads 3301476 Creating New Designs from Watercolor Paintings in Suan Sunandha Palace
Authors: Taechit Cheuypoung
Abstract:
This research is done to create new compositions for designs finding inspirations from watercolor artworks displayed in SuanSunandha Palace. The researcher made a study in the history of the landmark, its importance, the paintings in the Palace, the types and characteristics of the flower painted, as well as the artistic elements and principles of designs that went into the paintings. The information obtained led to the creation of six totally new designs. The designs incorporated standard international designs and artistic principles, and still kept to the original style of the watercolor paintings in SuanSunandha Palace. Following the paintings, the designs are divided into three categories: Orchids, Roses and Flowers from Literatures. The researcher used the components of the flowers including: rounded-petal flowers, wavy-edged petals, flowers with pointed petals, leaves, vines, and branches. All of them represented in the original paintings. Upon the original, the researcher switched these elements and its proportion around to create a more modern designs. The original forms are used as references since they contain the characteristics of each flower species. The work created achieved an updated trait and simultaneously, reflects the charms and timeless beauty of the watercolor paintings displayed in SuanSunandha Palace, which still exists in today’s world.Keywords: watercolor, painting, flower, Suan Sunandha
Procedia PDF Downloads 3411475 Secure Proxy Signature Based on Factoring and Discrete Logarithm
Authors: H. El-Kamchouchi, Heba Gaber, Fatma Ahmed, Dalia H. El-Kamchouchi
Abstract:
A digital signature is an electronic signature form used by an original signer to sign a specific document. When the original signer is not in his office or when he/she travels outside, he/she delegates his signing capability to a proxy signer and then the proxy signer generates a signing message on behalf of the original signer. The two parties must be able to authenticate one another and agree on a secret encryption key, in order to communicate securely over an unreliable public network. Authenticated key agreement protocols have an important role in building a secure communications network between the two parties. In this paper, we present a secure proxy signature scheme over an efficient and secure authenticated key agreement protocol based on factoring and discrete logarithm problem.Keywords: discrete logarithm, factoring, proxy signature, key agreement
Procedia PDF Downloads 3071474 High Capacity Reversible Watermarking through Interpolated Error Shifting
Authors: Hae-Yeoun Lee
Abstract:
Reversible watermarking that not only protects the copyright but also preserve the original quality of the digital content have been intensively studied. In particular, the demand for reversible watermarking has increased. In this paper, we propose a reversible watermarking scheme based on interpolation-error shifting and error precompensation. The intensity of a pixel is interpolated from the intensities of neighbouring pixels, and the difference histogram between the interpolated and the original intensities is obtained and modified to embed the watermark message. By restoring the difference histogram, the embedded watermark is extracted and the original image is recovered by compensating for the interpolation error. The overflow and underflow are prevented by error precompensation. To show the performance of the method, the proposed algorithm is compared with other methods using various test images.Keywords: reversible watermarking, high capacity, high quality, interpolated error shifting, error precompensation
Procedia PDF Downloads 3211473 Preschool Story Retelling: Actions and Verb Use
Authors: Eva Nwokah, Casey Taliancich-Klinger, Lauren Luna, Sarah Rodriguez
Abstract:
Story-retelling is a technique frequently used to assess children’s language skills and support their development of narratives. Fourteen preschool children listened to one of two stories from the wordless, illustrated Frog book series and then retold the story using the pictures. A comparison of three verb types (action, mental and other) in the original story model, and children's verb use in their retold stories revealed the salience of action events. The children's stories contained a similar proportion of verb types to the original story. However, the action verbs they used were rarely those they had heard in the original. The implications for the process of lexical encoding and narrative recall are discussed, as well as suggestions for the use of wordless picture books and the language teaching of new verbs.Keywords: story re-telling, verb use, preschool language, wordless picture books
Procedia PDF Downloads 2701472 Common Sense Leadership in the Example of Turkish Political Leader Devlet Bahçeli
Authors: B. Gültekin, T. Gültekin
Abstract:
Peace diplomacy is the most important international tool to maintain peace all over the World. This study consists of three parts. In the first part, the leadership of Devlet Bahçeli, leader of the Nationalist Movement Party, will be introduced as a tool of peace communication and peace management. Also, in this part, peace communication will be explained by the peace leadership traits of Devlet Bahçeli, who is one of the efficient political leaders representing the concepts of compromise and agreement on different sides of politics. In the second part of study, it is aimed to analyze Devlet Bahçeli’s leadership within the frame of peace communication and the final part of this study is about creating an original public communication model for public diplomacy based on Devlet Bahçeli as an example. As a result, the main purpose of this study is to develop an original peace communication model including peace modules, peace management projects, original dialogue procedures and protocols exhibited in the policies of Devlet Bahçeli. The political leadership represented by Devlet Bahçeli inspires political leaders to provide peace communication. In this study, principles and policies of peace leadership of Devlet Bahçeli will be explained as an original model on a peace communication platform.Keywords: public diplomacy, dialogue management, peace leadership, peace diplomacy
Procedia PDF Downloads 1661471 The Effect of Artificial Intelligence on Decoration
Authors: Ashraf Fayz Bekhet Abaskron
Abstract:
This research is done to create new compositions for designs, finding inspiration from watercolor artworks displayed in SuanSunandha Palace. The researcher made a study in the history of the landmark, its importance, the paintings in the Palace, the types and characteristics of the flowers painted, as well as the artistic elements and principles of designs that went into the paintings. The information obtained led to the creation of six totally new designs. The designs incorporated standard international designs and artistic principles and still kept to the original style of the watercolor paintings in SuanSunandha Palace. Following the paintings, the designs are divided into three categories: Orchids, Roses, and Flowers from literature. The researcher used the components of the flowers including rounded-petal flowers, wavy-edged petals, flowers with pointed petals, leaves, vines, and branches. All of them are represented in the original paintings. Upon the original, the researcher switched these elements and their proportions around to create a more modern design. The original forms are used as references since they contain the characteristics of each flower species. The work created achieved an updated trait and simultaneously reflects the charms and timeless beauty of the watercolor paintings displayed in SuanSunandha Palace, which still exists in today’s world.Keywords: art, craft, design, Oman, weaving watercolor, painting, flower, Suan Sunandhagolden ratio, Fibonacci numbers, textile design, designs
Procedia PDF Downloads 341470 The Long – Term Effects of a Prevention Program on the Number of Critical Incidents and Sick Leave Days: A Decade Perspective
Authors: Valerie Isaak
Abstract:
Background: This study explores the effectiveness of refresher training sessions of an intervention program at reducing the employees’ risk of injury due to patient violence in a forensic psychiatric hospital. Methods: The original safety intervention program that consisted of a 3 days’ workshop was conducted in the maximum-security ward of a psychiatric hospital in Israel. Ever since the original intervention, annual refreshers were conducted, highlighting one of the safety elements covered in the original intervention. The study examines the effect of the intervention program along with the refreshers over a period of 10 years in four wards. Results: Analysis of the data demonstrates that beyond the initial reduction following the original intervention, refreshers seem to have an additional positive long-term effect, reducing both the number of violent incidents and the number of actual employee injuries in a forensic psychiatric hospital. Conclusions: We conclude that such an intervention program followed by refresher training would promote employees’ wellbeing. A healthy work environment is part of management’s commitment to improving employee wellbeing at the workplace.Keywords: wellbeing, violence at work, intervention program refreshers, public sector mental healthcare
Procedia PDF Downloads 1371469 Modification Encryption Time and Permutation in Advanced Encryption Standard Algorithm
Authors: Dalal N. Hammod, Ekhlas K. Gbashi
Abstract:
Today, cryptography is used in many applications to achieve high security in data transmission and in real-time communications. AES has long gained global acceptance and is used for securing sensitive data in various industries but has suffered from slow processing and take a large time to transfer data. This paper suggests a method to enhance Advance Encryption Standard (AES) Algorithm based on time and permutation. The suggested method (MAES) is based on modifying the SubByte and ShiftRrows in the encryption part and modification the InvSubByte and InvShiftRows in the decryption part. After the implementation of the proposal and testing the results, the Modified AES achieved good results in accomplishing the communication with high performance criteria in terms of randomness, encryption time, storage space, and avalanche effects. The proposed method has good randomness to ciphertext because this method passed NIST statistical tests against attacks; also, (MAES) reduced the encryption time by (10 %) than the time of the original AES; therefore, the modified AES is faster than the original AES. Also, the proposed method showed good results in memory utilization where the value is (54.36) for the MAES, but the value for the original AES is (66.23). Also, the avalanche effects used for calculating diffusion property are (52.08%) for the modified AES and (51.82%) percentage for the original AES.Keywords: modified AES, randomness test, encryption time, avalanche effects
Procedia PDF Downloads 2471468 Equality, Friendship, and Violence in Slash or Yaoi Fan Art
Authors: Proud Arunrangsiwed
Abstract:
Slash or Yaoi fan art is the artwork that contains a homosexual relationship between fictional male characters, which were heterosexual in the original media. Previous belief about Slash or Yaoi fan art is that the fan fiction writers and the fan artists need to see the equality in romantic relationship. They do not prefer the pairing of man and woman, since both genders are not equal. The objectives of the current study are to confirm this belief, and to examine the relationship between equality found in Slash fan art, friendship in original media, and violence contained in fan art. Mean comparisons show that equality could be found in the pairing of hero and hero, but rarely found in the pairing of hero and villain. Regression analysis shows that the level of equality in fan art and friendship in original media are significant predictors of violence contained in fan art. Since villain-related pairings yield a high level of violence in fan art and a low level of equality, researchers of future studies should find the strategies to prevent fans to include villains in their Slash or Yaoi fan art.Keywords: equality, fan art, slash, violence, yaoi
Procedia PDF Downloads 2531467 Additive Manufacturing’s Impact on Product Design and Development: An Industrial Case Study
Authors: Ahmed Abdelsalam, Daniel Roozbahani, Marjan Alizadeh, Heikki Handroos
Abstract:
The aim of this study was to redesign a pressing air nozzle with lower weight and improved efficiency utilizing Selective Laser Melting (SLM) technology based on Design for Additive Manufacturing (DfAM) methods. The original pressing air nozzle was modified in SolidWorks 3D CAD, and two design concepts were introduced considering the DfAM approach. In the proposed designs, the air channels were amended. 3D models for the original pressing air nozzle and introduced designs were created to obtain the flow characteristic data using Ansys software. Results of CFD modeling for the original and two proposed designs were extracted, compared, and analyzed to demonstrate the impact of design on the development of a more efficient pressing air nozzle by AM process. Improved airflow was achieved by optimizing the pressing air nozzle's internal channel for both design concepts by providing 30% and 50.6% fewer pressure drops than the original design. Moreover, utilizing the presented designs, a significant reduction in product weight was attained. In addition, by applying the proposed designs, 48.3% and 70.3% reduction in product weight was attained compared to the original design. Therefore, pressing air nozzle with enhanced productivity and lowered weight was generated utilizing the DfAM-driven designs developed in this study. The main contribution of this study is to investigate the additional possibilities that can be achieved in designing modern parts using the advantage of SLM technology in producing that part. The approach presented in this study can be applied to almost any similar industrial application.Keywords: additive manufacturing, design for additive manufacturing, design methods, product design, pressing air nozzle
Procedia PDF Downloads 1651466 Optimization and Design of Current-Mode Multiplier Circuits with Applications in Analog Signal Processing for Gas Industrial Package Systems
Authors: Mohamad Baqer Heidari, Hefzollah.Mohammadian
Abstract:
This brief presents two original implementations of improved accuracy current-mode multiplier/divider circuits. Besides the advantage of their simplicity, these original multiplier/divider structures present the advantage of very small linearity errors that can be obtained as a result of the proposed design techniques (0.75% and 0.9%, respectively, for an extended range of the input currents). The original multiplier/divider circuits permit a facile reconfiguration, the presented structures representing the functional basis for implementing complex function synthesizer circuits. The proposed computational structures are designed for implementing in 0.18-µm CMOS technology, with a low-voltage operation (a supply voltage of 1.2 V). The circuits’ power consumptions are 60 and 75 µW, respectively, while their frequency bandwidths are 79.6 and 59.7 MHz, respectively.Keywords: analog signal processing, current-mode operation, functional core, multiplier, reconfigurable circuits, industrial package systems
Procedia PDF Downloads 3741465 Facial Biometric Privacy Using Visual Cryptography: A Fundamental Approach to Enhance the Security of Facial Biometric Data
Authors: Devika Tanna
Abstract:
'Biometrics' means 'life measurement' but the term is usually associated with the use of unique physiological characteristics to identify an individual. It is important to secure the privacy of digital face image that is stored in central database. To impart privacy to such biometric face images, first, the digital face image is split into two host face images such that, each of it gives no idea of existence of the original face image and, then each cover image is stored in two different databases geographically apart. When both the cover images are simultaneously available then only we can access that original image. This can be achieved by using the XM2VTS and IMM face database, an adaptive algorithm for spatial greyscale. The algorithm helps to select the appropriate host images which are most likely to be compatible with the secret image stored in the central database based on its geometry and appearance. The encryption is done using GEVCS which results in a reconstructed image identical to the original private image.Keywords: adaptive algorithm, database, host images, privacy, visual cryptography
Procedia PDF Downloads 1301464 Creative Peace Diplomacy Model by the Perspective of Dialogue Management for International Relations
Authors: Bilgehan Gültekin, Tuba Gültekin
Abstract:
Peace diplomacy is the most important international tool to keep peace all over the world. The study titled “peace diplomacy for international relations” is consist of three part. In the first part, peace diplomacy is going to be introduced as a tool of peace communication and peace management. And, in this part, peace communication will be explained by international communication perspective. In the second part of the study,public relations events and communication campaigns will be developed originally for peace diplomacy. In this part, it is aimed original public communication dialogue management tools for peace diplomacy. the aim of the final part of the study, is to produce original public communication model for international relations. The model includes peace modules, peace management projects, original dialogue procedures and protocols, dialogue education, dialogue management strategies, peace actors, communication models, peace team management and public diplomacy steps. The creative part of the study aims to develop a model used for international relations for all countries. Creative Peace Diplomacy Model will be developed in the case of Turkey-Turkey-France and Turkey-Greece relations. So, communication and public relations events and campaigns are going to be developed as original for only this study.Keywords: peace diplomacy, public communication model, dialogue management, international relations
Procedia PDF Downloads 5411463 Optimizing the Readability of Orthopaedic Trauma Patient Education Materials Using ChatGPT-4
Authors: Oscar Covarrubias, Diane Ghanem, Christopher Murdock, Babar Shafiq
Abstract:
Introduction: ChatGPT is an advanced language AI tool designed to understand and generate human-like text. The aim of this study is to assess the ability of ChatGPT-4 to re-write orthopaedic trauma patient education materials at the recommended 6th-grade level. Methods: Two independent reviewers accessed ChatGPT-4 (chat.openai.com) and gave identical instructions to simplify the readability of provided text to a 6th-grade level. All trauma-related articles by the Orthopaedic Trauma Association (OTA) and American Academy of Orthopaedic Surgeons (AAOS) were sequentially provided. The academic grade level was determined using the Flesh-Kincaid Grade Level (FKGL) and Flesch Reading Ease (FRE). Paired t-tests and Wilcox-rank sum tests were used to compare the FKGL and FRE between the ChatGPT-4 revised and original text. Inter-rater correlation coefficient (ICC) was used to assess variability in ChatGPT-4 generated text between the two reviewers. Results: ChatGPT-4 significantly reduced FKGL and increased FRE scores in the OTA (FKGL: 5.7±0.5 compared to the original 8.2±1.1, FRE: 76.4±5.7 compared to the original 65.5±6.6, p < 0.001) and AAOS articles (FKGL: 5.8±0.8 compared to the original 8.9±0.8, FRE: 76±5.5 compared to the original 56.7±5.9, p < 0.001). On average, 14.6% of OTA and 28.6% of AAOS articles required at least two revisions by ChatGPT-4 to achieve a 6th-grade reading level. ICC demonstrated poor reliability for FKGL (OTA 0.24, AAOS 0.45) and moderate reliability for FRE (OTA 0.61, AAOS 0.73). Conclusion: This study provides a novel, simple and efficient method using language AI to optimize the readability of patient education content which may only require the surgeon’s final proofreading. This method would likely be as effective for other medical specialties.Keywords: artificial intelligence, AI, chatGPT, patient education, readability, trauma education
Procedia PDF Downloads 721462 A Safety-Door for Earthquake Disaster Prevention - Part II
Authors: Daniel Y. Abebe, Jaehyouk Choi
Abstract:
The safety of door has not given much attention. The main problem of doors during and after earthquake is that they are unable to be opened because deviation from its original position by the lateral load. The aim of this research is to develop and evaluate a safety door that keeps the door frame in its original position or keeps its edge angles perpendicular during and post-earthquake. Nonlinear finite element analysis was conducted in order to evaluate the structural performance and behavior of the proposed door under both monotonic and cyclic loading.Keywords: safety-door, earthquake disaster, low yield point steel, passive energy dissipating device, FE analysis
Procedia PDF Downloads 4731461 Using Printouts as Social Media Evidence and Its Authentication in the Courtroom
Authors: Chih-Ping Chang
Abstract:
Different from traditional objective evidence, social media evidence has its own characteristics with easily tampering, recoverability, and cannot be read without using other devices (such as a computer). Simply taking a screenshot from social network sites must be questioned its original identity. When the police search and seizure digital information, a common way they use is to directly print out digital data obtained and ask the signature of the parties at the presence, without taking original digital data back. In addition to the issue on its original identity, this conduct to obtain evidence may have another two results. First, it will easily allege that is tampering evidence because the police wanted to frame the suspect and falsified evidence. Second, it is not easy to discovery hidden information. The core evidence associated with crime may not appear in the contents of files. Through discovery the original file, data related to the file, such as the original producer, creation time, modification date, and even GPS location display can be revealed from hidden information. Therefore, how to show this kind of evidence in the courtroom will be arguably the most important task for ruling social media evidence. This article, first, will introduce forensic software, like EnCase, TCT, FTK, and analyze their function to prove the identity with another digital data. Then turning back to the court, the second part of this article will discuss legal standard for authentication of social media evidence and application of that forensic software in the courtroom. As the conclusion, this article will provide a rethinking, that is, what kind of authenticity is this rule of evidence chase for. Does legal system automatically operate the transcription of scientific knowledge? Or furthermore, it wants to better render justice, not only under scientific fact, but through multivariate debating.Keywords: federal rule of evidence, internet forensic, printouts as evidence, social media evidence, United States v. Vayner
Procedia PDF Downloads 2901460 Evaluating the Suitability and Performance of Dynamic Modulus Predictive Models for North Dakota’s Asphalt Mixtures
Authors: Duncan Oteki, Andebut Yeneneh, Daba Gedafa, Nabil Suleiman
Abstract:
Most agencies lack the equipment required to measure the dynamic modulus (|E*|) of asphalt mixtures, necessitating the need to use predictive models. This study compared measured |E*| values for nine North Dakota asphalt mixes using the original Witczak, modified Witczak, and Hirsch models. The influence of temperature on the |E*| models was investigated, and Pavement ME simulations were conducted using measured |E*| and predictions from the most accurate |E*| model. The results revealed that the original Witczak model yielded the lowest Se/Sy and highest R² values, indicating the lowest bias and highest accuracy, while the poorest overall performance was exhibited by the Hirsch model. Using predicted |E*| as inputs in the Pavement ME generated conservative distress predictions compared to using measured |E*|. The original Witczak model was recommended for predicting |E*| for low-reliability pavements in North Dakota.Keywords: asphalt mixture, binder, dynamic modulus, MEPDG, pavement ME, performance, prediction
Procedia PDF Downloads 461459 The Bernstein Expansion for Exponentials in Taylor Functions: Approximation of Fixed Points
Authors: Tareq Hamadneh, Jochen Merker, Hassan Al-Zoubi
Abstract:
Bernstein's expansion for exponentials in Taylor functions provides lower and upper optimization values for the range of its original function. these values converge to the original functions if the degree is elevated or the domain subdivided. Taylor polynomial can be applied so that the exponential is a polynomial of finite degree over a given domain. Bernstein's basis has two main properties: its sum equals 1, and positive for all x 2 (0; 1). In this work, we prove the existence of fixed points for exponential functions in a given domain using the optimization values of Bernstein. The Bernstein basis of finite degree T over a domain D is defined non-negatively. Any polynomial p of degree t can be expanded into the Bernstein form of maximum degree t ≤ T, where we only need to compute the coefficients of Bernstein in order to optimize the original polynomial. The main property is that p(x) is approximated by the minimum and maximum Bernstein coefficients (Bernstein bound). If the bound is contained in the given domain, then we say that p(x) has fixed points in the same domain.Keywords: Bernstein polynomials, Stability of control functions, numerical optimization, Taylor function
Procedia PDF Downloads 1351458 Degraded Document Analysis and Extraction of Original Text Document: An Approach without Optical Character Recognition
Authors: L. Hamsaveni, Navya Prakash, Suresha
Abstract:
Document Image Analysis recognizes text and graphics in documents acquired as images. An approach without Optical Character Recognition (OCR) for degraded document image analysis has been adopted in this paper. The technique involves document imaging methods such as Image Fusing and Speeded Up Robust Features (SURF) Detection to identify and extract the degraded regions from a set of document images to obtain an original document with complete information. In case, degraded document image captured is skewed, it has to be straightened (deskew) to perform further process. A special format of image storing known as YCbCr is used as a tool to convert the Grayscale image to RGB image format. The presented algorithm is tested on various types of degraded documents such as printed documents, handwritten documents, old script documents and handwritten image sketches in documents. The purpose of this research is to obtain an original document for a given set of degraded documents of the same source.Keywords: grayscale image format, image fusing, RGB image format, SURF detection, YCbCr image format
Procedia PDF Downloads 3771457 An IM-COH Algorithm Neural Network Optimization with Cuckoo Search Algorithm for Time Series Samples
Authors: Wullapa Wongsinlatam
Abstract:
Back propagation algorithm (BP) is a widely used technique in artificial neural network and has been used as a tool for solving the time series problems, such as decreasing training time, maximizing the ability to fall into local minima, and optimizing sensitivity of the initial weights and bias. This paper proposes an improvement of a BP technique which is called IM-COH algorithm (IM-COH). By combining IM-COH algorithm with cuckoo search algorithm (CS), the result is cuckoo search improved control output hidden layer algorithm (CS-IM-COH). This new algorithm has a better ability in optimizing sensitivity of the initial weights and bias than the original BP algorithm. In this research, the algorithm of CS-IM-COH is compared with the original BP, the IM-COH, and the original BP with CS (CS-BP). Furthermore, the selected benchmarks, four time series samples, are shown in this research for illustration. The research shows that the CS-IM-COH algorithm give the best forecasting results compared with the selected samples.Keywords: artificial neural networks, back propagation algorithm, time series, local minima problem, metaheuristic optimization
Procedia PDF Downloads 1521456 Replication of Meaningful Gesture Study for N400 Detection Using a Commercial Brain-Computer Interface
Authors: Thomas Ousterhout
Abstract:
In an effort to test the ability of a commercial grade EEG headset to effectively measure the N400 ERP, a replication study was conducted to see if similar results could be produced as that which used a medical grade EEG. Pictures of meaningful and meaningless hand postures were borrowed from the original author and subjects were required to perform a semantic discrimination task. The N400 was detected indicating semantic processing of the meaningfulness of the hand postures. The results corroborate those of the original author and support the use of some commercial grade EEG headsets for non-critical research applications.Keywords: EEG, ERP, N400, semantics, congruency, gestures, emotiv
Procedia PDF Downloads 2631455 Effect of Cooling Approaches on Chemical Compositions, Phases, and Acidolysis of Panzhihua Titania Slag
Authors: Bing Song, Kexi Han, Xuewei Lv
Abstract:
Titania slag is a high quality raw material containing titanium in the subsequent process of titanium pigment. The effects of cooling approaches of granulating, water cooling, and air cooling on chemical, phases, and acidolysis of Panzhihua titania slag were investigated. Compared to the original slag which was prepared by the conventional processing route, the results show that the titania slag undergoes oxidation of Ti3+during different cooling ways. The Ti2O3 content is 17.50% in the original slag, but it is 16.55% and 16.84% in water cooled and air-cooled slag, respectively. Especially, the Ti2O3 content in granulated slag is decreased about 27.6%. The content of Fe2O3 in granulated slag is approximately 2.86% also obviously higher than water (<0.5%) or air-cooled slag (<0.5%). Rutile in cooled titania slag was formed because of the oxidation of Ti3+. The rutile phase without a noticeable change in water cooled and air-cooled slag after the titania slag was cooled, but increased significantly in the granulated slag. The rate of sulfuric acid acidolysis of cooled slag is less than the original slag. The rate of acidolysis is 90.61% and 92.46% to the water-cooled slag and air-cooled slag, respectively. However, the rate of acidolysis of the granulated slag is less than that of industry slag about 20%, only 74.72%.Keywords: cooling approaches, titania slag, granulating, sulfuric acid acidolysis
Procedia PDF Downloads 2381454 “A Built-In, Shockproof, Shit Detector”: Major Challenges and Peculiarities of Translating Ernest Hemingway’s Short Stories Into Georgian
Authors: Natia Kvachakidze
Abstract:
Translating fiction is a complicated and multidimensional issue. However, studying and analyzing literary translations is not less challenging. This becomes even more complex due to the existence of several alternative translations of one and the same literary work. However, this also makes the research process more interesting at the same time. The aim of the given work is to distinguish major obstacles and challenges translators come across while working on Ernest Hemingway’s short fiction, as well as to analyze certain peculiarities and characteristic features of some existing Georgian translations of the writer’s work (especially in the context of various alternative versions of some well-known short stories). Consequently, the focus is on studying how close these translations come to the form and the context of the original text in order to see if the linguistic and stylistic characteristics of the original author are preserved. Moreover, it is interesting not only to study the relevance of each translation to the original text but also to present a comparative analysis of some major peculiarities of the given translations, which are naturally characterized by certain strengths and weaknesses. The latter is at times inevitable, but in certain cases, there is room for improvement. The given work also attempts to humbly suggest certain ways of possible improvements of some translation inadequacies, as this can provide even more opportunities for deeper and detailed studies in the future.Keywords: Hemingway, short fiction, translation, Georgian
Procedia PDF Downloads 881453 Use of Recycled PVB as a Protection against Carbonation
Authors: Michael Tupý, Vít Petránek
Abstract:
The paper is focused on testing of the poly(vinyl butyral) (PVB) layer which had the function of a CO2 insulating protection against concrete and mortar carbonation. The barrier efficiency of PVB was verified by the measurement of diffusion characteristics. Two different types of PVB were tested; original extruded PVB sheet and PVB sheet made from PVB dispersion which was obtained from recycled windshields. The work deals with the testing CO2 diffusion when polymer sheets were exposed to a CO2 atmosphere (10% v/v CO2) with 0% RH. The excellent barrier capability against CO2 permeability of original and also recycled types of PVB layers was observed. This application of PVB waste can bring advantageous use in civil engineering and significant environmental contribution.Keywords: windshield, poly(vinyl butyral), mortar, diffusion, carbonatation, polymer waste
Procedia PDF Downloads 423