Search results for: digital signal process
18072 Stories of Digital Technology and Online Safety: Storytelling as a Tool to Find out Young Children’s Views on Digital Technology and Online Safety
Authors: Lindsey Watson
Abstract:
This research is aimed at facilitating and listening to the voices of younger children, recognising their contributions to research about the things that matter to them. Digital technology increasingly impacts on the lives of young children, therefore this study aimed at increasing children’s agency through recognising and involving their perspectives to help contribute to a wider understanding of younger children’s perceptions of online safety. Using a phenomenological approach, the paper discusses how storytelling as a creative methodological approach enabled an agentic space for children to express their views, knowledge, and perceptions of their engagement with the digital world. Setting and parental informed consent were gained in addition to an adapted approach to child assent through the use of child-friendly language and emoji stickers, which was also recorded verbally. Findings demonstrate that younger children are thinking about many aspects of digital technology and how this impacts on their lives and that storytelling as a research method is a useful tool to facilitate conversations with young children. The paper thus seeks to recognise and evaluate how creative methodologies can provide insights into children’s understanding of online safety and how this can influence practitioners and parents in supporting younger children in a digital world.Keywords: early childhood, family, online safety, phenomenology, storytelling
Procedia PDF Downloads 12918071 Perceptions of Senior Academics in Teacher Education Colleges Regarding the Integration of Digital Games during the Pandemic
Authors: Merav Hayakac, Orit Avidov-Ungarab
Abstract:
The current study adopted an interpretive-constructivist approach to examine how senior academics from a large sample of Israeli teacher education colleges serving general or religious populations perceived the integration of digital games into their teacher instruction and what their policy and vision were in this regard in the context of the COVID-19 pandemic. Half the participants expressed a desire to integrate digital games into their teaching and learning but acknowledged that this practice was uncommon. Only a small minority believed they had achieved successful integration, with doubt and skepticism expressed by some religious colleges. Most colleges had policies encouraging technology integration supported by ongoing funding. Although a considerable gap between policy and implementation remained, the COVID-19 pandemic was viewed as having accelerated the integration of digital games into pre-service teacher instruction. The findings suggest that discussions around technology-related vision and policy and their translation into practice should relate to the specific cultural needs and academic preparedness of the population(s) served by the college.Keywords: COVID-19, digital games, pedagogy, teacher education colleges
Procedia PDF Downloads 9818070 Simulation of 3-D Direction-of-Arrival Estimation Using MUSIC Algorithm
Authors: Duckyong Kim, Jong Kang Park, Jong Tae Kim
Abstract:
DOA (Direction of Arrival) estimation is an important method in array signal processing and has a wide range of applications such as direction finding, beam forming, and so on. In this paper, we briefly introduce the MUSIC (Multiple Signal Classification) Algorithm, one of DOA estimation methods for analyzing several targets. Then we apply the MUSIC algorithm to the two-dimensional antenna array to analyze DOA estimation in 3D space through MATLAB simulation. We also analyze the design factors that can affect the accuracy of DOA estimation through simulation, and proceed with further consideration on how to apply the system.Keywords: DOA estimation, MUSIC algorithm, spatial spectrum, array signal processing
Procedia PDF Downloads 37918069 The Use of Haar Wavelet Mother Signal Tool for Performance Analysis Response of Distillation Column (Application to Moroccan Case Study)
Authors: Mahacine Amrani
Abstract:
This paper aims at reviewing some Moroccan industrial applications of wavelet especially in the dynamic identification of a process model using Haar wavelet mother response. Two recent Moroccan study cases are described using dynamic data originated by a distillation column and an industrial polyethylene process plant. The purpose of the wavelet scheme is to build on-line dynamic models. In both case studies, a comparison is carried out between the Haar wavelet mother response model and a linear difference equation model. Finally it concludes, on the base of the comparison of the process performances and the best responses, which may be useful to create an estimated on-line internal model control and its application towards model-predictive controllers (MPC). All calculations were implemented using AutoSignal Software.Keywords: process performance, model, wavelets, Haar, Moroccan
Procedia PDF Downloads 31718068 The Production, Negotiation and Resistance of Short Video Producers
Abstract:
Based on the question of, "Are short video creators who are digital workers controlled by platform rules?" this study discusses the specific ways of platform rules control and the impact on short video creators. Based on the theory of digital labor, this paper adopts the method of in-depth interview and participant observation and chooses 24 producers of short video content of Tiktok to conduct in-depth interview. At the same time, through entering the short video creation field, the author carries on the four-month field investigation, obtains the creation process related data, and analyzes how the short video creator, as the digital labor, is controlled by the platform rule, as well as the creator in this process of compromise and resistance, a more comprehensive presentation of the short video creators of the labor process. It is found that the short video creators are controlled by the platform rules, mainly in the control of traffic rules, and the creators create content, compromise and resist under the guidance of traffic. First, while the platform seems to offer a flexible and autonomous way for creators to monetize, the threshold for participating in the event is actually very high for creators, and the rules for monetizing the event are vague. Under the influence of the flow rule, the creator is faced unstable incomes and high costs. Therefore, creators have to follow the rules of traffic to guide their own creation, began to flow-oriented content production, mainly reflected in the need to keep up-to-date, the pursuit of traffic to ride on the hot spots, in order to flow regardless, set up people "Born for the show", by the label solidified content creation. Secondly, the irregular working hours lead to the extension and overwork of the working hours, which leads to the internal friction of the short video creators at the spiritual level, and finally leads to the Rat Race of video creation. Thirdly, the video creator has completed the internalization and compromise of the platform rules in practice, which promotes the creator to continue to create independently, and forms the intrinsic motive force of the creator. Finally, the rule-controlled short video creators resist and fight in flexible ways, make use of the mechanism and rules of the platform to carry on the second creation, carry on the routine production, purchase the false flow, transfer the creation position to maintain own creation autonomy.Keywords: short videos, tiktok, production, digital labors
Procedia PDF Downloads 6018067 Digital Forensics Showdown: Encase and FTK Head-to-Head
Authors: Rida Nasir, Waseem Iqbal
Abstract:
Due to the constant revolution in technology and the increase in anti-forensic techniques used by attackers to remove their traces, professionals often struggle to choose the best tool to be used in digital forensic investigations. This paper compares two of the most well-known and widely used licensed commercial tools, i.e., Encase & FTK. The comparison was drawn on various parameters and features to provide an authentic evaluation of licensed versions of these well-known commercial tools against various real-world scenarios. In order to discover the popularity of these tools within the digital forensic community, a survey was conducted publicly to determine the preferred choice. The dataset used is the Computer Forensics Reference Dataset (CFReDS). A total of 70 features were selected from various categories. Upon comparison, both FTK and EnCase produce remarkable results. However, each tool has some limitations, and none of the tools is declared best. The comparison drawn is completely unbiased, based on factual data.Keywords: digital forensics, commercial tools, investigation, forensic evaluation
Procedia PDF Downloads 1918066 Self-Marketing on Line Person-to-Person Social Media
Authors: Chih-Ping Chen
Abstract:
Today, technology does not necessitate change; rather, social media has afforded a new arena and digital tools for users/individuals to be symbolized and marketed in meaningful exchanges of digital identities. We argue that these symbolic interactions may afford individuals the ability to create and present less restricted Line person-to-person (P2P) chats than would be possible in face-to-face communications. Individuals can select flexible influence strategies to market themselves, which enables them to create and present their digital identities and impressions in alternative ways within a dynamic sociocultural context. Therefore, this paper aims to explore the novel phenomenon of how individuals market themselves to manage their digital identities and impressions to connect with other users through the symbolic interactions created by new digital tools (e.g., stickers). A netnographic approach was developed by applying a triangulated methodology consisting of user self-diary reports, in-depth interviews, and observations. Totally, 20 participants (10 females and 10 males) were of Taiwanese origin, and their ages ranged from 20–47 years old. The findings of this research showed that individuals on Line P2P social media where traditional cultural gender norms have shifted. Both male and female participants market their modern digital identities by adopting a combination of flexible influence tactics/strategies when using digital stickers. Some findings showed that their influence tactics/strategies often flouted Taiwanese cultural gender norms or skirted traditional rules to fit individual or P2P needs. Finally, these findings potentially contributed to the literature regarding the consumer culture theory and symbolic interaction theory in digital marketing and social media fields.Keywords: Consumer culture theory, Digital sticker, Self-marketing, Impression, Symbolic interaciton
Procedia PDF Downloads 8018065 The Digital Living Archive and the Construction of a Participatory Cultural Memory in the DARE-UIA Project: Digital Environment for Collaborative Alliances to Regenerate Urban Ecosystems in Middle-Sized Cities
Authors: Giulia Cardoni, Francesca Fabbrii
Abstract:
Living archives perform a function of social memory sharing, which contributes to building social bonds, communities, and identities. This potential lies in the ability to live archives to put together an archival function, which allows the conservation and transmission of memory with an artistic, performative and creative function linked to the present. As part of the DARE-UIA (Digital environment for collaborative alliances to regenerate urban ecosystems in middle-sized cities) project the creation of a living digital archive made it possible to create a narrative that would consolidate the cultural memory of the Darsena district of the city of Ravenna. The aim of the project is to stimulate the urban regeneration of a suburban area of a city, enhancing its cultural memory and identity heritage through digital heritage tools. The methodology used involves various digital storytelling actions necessary for the overall narrative using georeferencing systems (GIS), storymaps and 3D reconstructions for a transversal narration of historical content such as personal and institutional historical photos and to enhance the industrial archeology heritage of the neighborhood. The aim is the creation of an interactive and replicable narrative in similar contexts to the Darsena district in Ravenna. The living archive, in which all the digital contents are inserted, finds its manifestation towards the outside in the form of a museum spread throughout the neighborhood, making the contents usable on smartphones via QR codes and totems inserted on-site, creating thematic itineraries spread around the neighborhood. The construction of an interactive and engaging digital narrative has made it possible to enhance the material and immaterial heritage of the neighborhood by recreating the community that has historically always distinguished it.Keywords: digital living archive, digital storytelling, GIS, 3D, open-air museum, urban regeneration, cultural memory
Procedia PDF Downloads 10618064 Digital Skepticism In A Legal Philosophical Approach
Authors: dr. Bendes Ákos
Abstract:
Digital skepticism, a critical stance towards digital technology and its pervasive influence on society, presents significant challenges when analyzed from a legal philosophical perspective. This abstract aims to explore the intersection of digital skepticism and legal philosophy, emphasizing the implications for justice, rights, and the rule of law in the digital age. Digital skepticism arises from concerns about privacy, security, and the ethical implications of digital technology. It questions the extent to which digital advancements enhance or undermine fundamental human values. Legal philosophy, which interrogates the foundations and purposes of law, provides a framework for examining these concerns critically. One key area where digital skepticism and legal philosophy intersect is in the realm of privacy. Digital technologies, particularly data collection and surveillance mechanisms, pose substantial threats to individual privacy. Legal philosophers must grapple with questions about the limits of state power and the protection of personal autonomy. They must consider how traditional legal principles, such as the right to privacy, can be adapted or reinterpreted in light of new technological realities. Security is another critical concern. Digital skepticism highlights vulnerabilities in cybersecurity and the potential for malicious activities, such as hacking and cybercrime, to disrupt legal systems and societal order. Legal philosophy must address how laws can evolve to protect against these new forms of threats while balancing security with civil liberties. Ethics plays a central role in this discourse. Digital technologies raise ethical dilemmas, such as the development and use of artificial intelligence and machine learning algorithms that may perpetuate biases or make decisions without human oversight. Legal philosophers must evaluate the moral responsibilities of those who design and implement these technologies and consider the implications for justice and fairness. Furthermore, digital skepticism prompts a reevaluation of the concept of the rule of law. In an increasingly digital world, maintaining transparency, accountability, and fairness becomes more complex. Legal philosophers must explore how legal frameworks can ensure that digital technologies serve the public good and do not entrench power imbalances or erode democratic principles. Finally, the intersection of digital skepticism and legal philosophy has practical implications for policy-making. Legal scholars and practitioners must work collaboratively to develop regulations and guidelines that address the challenges posed by digital technology. This includes crafting laws that protect individual rights, ensure security, and promote ethical standards in technology development and deployment. In conclusion, digital skepticism provides a crucial lens for examining the impact of digital technology on law and society. A legal philosophical approach offers valuable insights into how legal systems can adapt to protect fundamental values in the digital age. By addressing privacy, security, ethics, and the rule of law, legal philosophers can help shape a future where digital advancements enhance, rather than undermine, justice and human dignity.Keywords: legal philosophy, privacy, security, ethics, digital skepticism
Procedia PDF Downloads 4318063 A New Approach of Preprocessing with SVM Optimization Based on PSO for Bearing Fault Diagnosis
Authors: Tawfik Thelaidjia, Salah Chenikher
Abstract:
Bearing fault diagnosis has attracted significant attention over the past few decades. It consists of two major parts: vibration signal feature extraction and condition classification for the extracted features. In this paper, feature extraction from faulty bearing vibration signals is performed by a combination of the signal’s Kurtosis and features obtained through the preprocessing of the vibration signal samples using Db2 discrete wavelet transform at the fifth level of decomposition. In this way, a 7-dimensional vector of the vibration signal feature is obtained. After feature extraction from vibration signal, the support vector machine (SVM) was applied to automate the fault diagnosis procedure. To improve the classification accuracy for bearing fault prediction, particle swarm optimization (PSO) is employed to simultaneously optimize the SVM kernel function parameter and the penalty parameter. The results have shown feasibility and effectiveness of the proposed approachKeywords: condition monitoring, discrete wavelet transform, fault diagnosis, kurtosis, machine learning, particle swarm optimization, roller bearing, rotating machines, support vector machine, vibration measurement
Procedia PDF Downloads 43718062 Early Diagnosis of Alzheimer's Disease Using a Combination of Images Processing and Brain Signals
Authors: E. Irankhah, M. Zarif, E. Mazrooei Rad, K. Ghandehari
Abstract:
Alzheimer's prevalence is on the rise, and the disease comes with problems like cessation of treatment, high cost of treatment, and the lack of early detection methods. The pathology of this disease causes the formation of protein deposits in the brain of patients called plaque amyloid. Generally, the diagnosis of this disease is done by performing tests such as a cerebrospinal fluid, CT scan, MRI, and spinal cord fluid testing, or mental testing tests and eye tracing tests. In this paper, we tried to use the Medial Temporal Atrophy (MTA) method and the Leave One Out (LOO) cycle to extract the statistical properties of the three Fz, Pz, and Cz channels of ERP signals for early diagnosis of this disease. In the process of CT scan images, the accuracy of the results is 81% for the healthy person and 88% for the severe patient. After the process of ERP signaling, the accuracy of the results for a healthy person in the delta band in the Cz channel is 81% and in the alpha band the Pz channel is 90%. In the results obtained from the signal processing, the results of the severe patient in the delta band of the Cz channel were 89% and in the alpha band Pz channel 92%.Keywords: Alzheimer's disease, image and signal processing, LOO cycle, medial temporal atrophy
Procedia PDF Downloads 19818061 A Study on the Different Components of a Typical Back-Scattered Chipless RFID Tag Reflection
Authors: Fatemeh Babaeian, Nemai Chandra Karmakar
Abstract:
Chipless RFID system is a wireless system for tracking and identification which use passive tags for encoding data. The advantage of using chipless RFID tag is having a planar tag which is printable on different low-cost materials like paper and plastic. The printed tag can be attached to different items in the labelling level. Since the price of chipless RFID tag can be as low as a fraction of a cent, this technology has the potential to compete with the conventional optical barcode labels. However, due to the passive structure of the tag, data processing of the reflection signal is a crucial challenge. The captured reflected signal from a tag attached to an item consists of different components which are the reflection from the reader antenna, the reflection from the item, the tag structural mode RCS component and the antenna mode RCS of the tag. All these components are summed up in both time and frequency domains. The effect of reflection from the item and the structural mode RCS component can distort/saturate the frequency domain signal and cause difficulties in extracting the desired component which is the antenna mode RCS. Therefore, it is required to study the reflection of the tag in both time and frequency domains to have a better understanding of the nature of the captured chipless RFID signal. The other benefits of this study can be to find an optimised encoding technique in tag design level and to find the best processing algorithm the chipless RFID signal in decoding level. In this paper, the reflection from a typical backscattered chipless RFID tag with six resonances is analysed, and different components of the signal are separated in both time and frequency domains. Moreover, the time domain signal corresponding to each resonator of the tag is studied. The data for this processing was captured from simulation in CST Microwave Studio 2017. The outcome of this study is understanding different components of a measured signal in a chipless RFID system and a discovering a research gap which is a need to find an optimum detection algorithm for tag ID extraction.Keywords: antenna mode RCS, chipless RFID tag, resonance, structural mode RCS
Procedia PDF Downloads 20018060 Musical Tesla Coil with Faraday Box Controlled by a GNU Radio
Authors: Jairo Vega, Fabian Chamba, Jordy Urgiles
Abstract:
In this work, the implementation of a Matlabcontrolled Musical Tesla Coil and external audio signals was presented. First, the audio signal was obtained from a mobile device and processed in Matlab to modify it, adding noise or other desired effects. Then, the processed signal was passed through a preamplifier to increase its amplitude to a level suitable for further amplification through a power amplifier, which was part of the current driver circuit of the Tesla coil. To get the Tesla coil to generate music, a circuit capable of modulating and generating the audio signal by manipulating electrical discharges was used. To visualize and listen to these discharges, a small Faraday cage was built to attenuate the external electric fields. Finally, the implementation of the musical Tesla coil was concluded. However, it was observed that the audio signal volume was very low, and the components used heated up quickly. Due to these limitations, it was determined that the project could not be connected to power for long periods of time.Keywords: Tesla coil, plasma, electrical signals, GNU Radio
Procedia PDF Downloads 9718059 Digital Transformation in Production Planning and Control: Evaluation of the Organizational Readiness
Authors: Tobias Wissing, Peter Burggräf, Johannes Wagner
Abstract:
Cost pressure, competitiveness and the increasing turbulence of globalized saturated markets has been the driver for a variety of research activities in the field of production planning and control (PPC) during the past decades. For some time past an increasing awareness for innovative technologies in terms of Industry 4.0 can be noticed. Although there are many promising approaches a solely installation of those smart solutions will not maximize the PPC performance. To accelerate the successful digital transformation the cooperation between employee and technology also has to be adapted. The existing processes and organizational structures might be not sufficient to maximize the utilization of technological innovations. This paper presents the key results of an extensive study which was conducted by the Laboratory for Machine Tools and Production Engineering (WZL) of the RWTH Aachen University to evaluate the current situation and examine the organizational readiness for this digital transformation.Keywords: cyber-physical production system, digital transformation, industry 4.0, production planning and control
Procedia PDF Downloads 35318058 Restoration Process of Kastamonu - Tufekciler Village Houses for Potential Eco-Tourism Purposes
Authors: Turkan Sultan Yasar Ismail, Mehmet Cetin, M. Danial Ismail, Hakan Sevik
Abstract:
Nowadays, there is a need for the real world to be translated to the virtual environment by three-dimensional visualisation for restoration and promotional modelling of historic sites in protected areas. Visualisation models have also become the very important basis for the creation of three-dimensional Geographic Information System. The protection of historical and cultural heritage and documenting in Turkey as well as all over the world is an important issue. This heritage is a bridge between the past and the future of humanity. Many historical and cultural heritages suffer neglect and for reasons arising from natural causes. This is to determine the current status of the work and documenting information from the selected buildings. This process is important for their conservation and renovation work that might be done in the future. Kastamonu city is one of the historical cities in Turkey with a number of heritage buildings. However, Tufekciler Village is not visited and famous even though it includes several historical buildings and peaceful landscape. Digital terrestrial photogrammetry is one of the most important methods used in the documentation of cultural and historical heritage. Firstly, measurements were made primarily around creating polygon mesh and 3D model drawings of the structures to be modelled on images with the move to digital media such as picture size and by subsequent visualisation process. Secondly, a restoration project is offered to the village with the concept of eco-tourism with all scales such as, interior space to landscape design.Keywords: eco-tourism, restoration, sustainability, cultural village
Procedia PDF Downloads 35118057 Incorporating Anomaly Detection in a Digital Twin Scenario Using Symbolic Regression
Authors: Manuel Alves, Angelica Reis, Armindo Lobo, Valdemar Leiras
Abstract:
In industry 4.0, it is common to have a lot of sensor data. In this deluge of data, hints of possible problems are difficult to spot. The digital twin concept aims to help answer this problem, but it is mainly used as a monitoring tool to handle the visualisation of data. Failure detection is of paramount importance in any industry, and it consumes a lot of resources. Any improvement in this regard is of tangible value to the organisation. The aim of this paper is to add the ability to forecast test failures, curtailing detection times. To achieve this, several anomaly detection algorithms were compared with a symbolic regression approach. To this end, Isolation Forest, One-Class SVM and an auto-encoder have been explored. For the symbolic regression PySR library was used. The first results show that this approach is valid and can be added to the tools available in this context as a low resource anomaly detection method since, after training, the only requirement is the calculation of a polynomial, a useful feature in the digital twin context.Keywords: anomaly detection, digital twin, industry 4.0, symbolic regression
Procedia PDF Downloads 12018056 Anti-Forensic Countermeasure: An Examination and Analysis Extended Procedure for Information Hiding of Android SMS Encryption Applications
Authors: Ariq Bani Hardi
Abstract:
Empowerment of smartphone technology is growing very rapidly in various fields of science. One of the mobile operating systems that dominate the smartphone market today is Android by Google. Unfortunately, the expansion of mobile technology is misused by criminals to hide the information that they store or exchange with each other. It makes law enforcement more difficult to prove crimes committed in the judicial process (anti-forensic). One of technique that used to hide the information is encryption, such as the usages of SMS encryption applications. A Mobile Forensic Examiner or an investigator should prepare a countermeasure technique if he finds such things during the investigation process. This paper will discuss an extension procedure if the investigator found unreadable SMS in android evidence because of encryption. To define the extended procedure, we create and analyzing a dataset of android SMS encryption application. The dataset was grouped by application characteristics related to communication permissions, as well as the availability of source code and the documentation of encryption scheme. Permissions indicate the possibility of how applications exchange the data and keys. Availability of the source code and the encryption scheme documentation can show what the cryptographic algorithm specification is used, how long the key length, how the process of key generation, key exchanges, encryption/decryption is done, and other related information. The output of this paper is an extended or alternative procedure for examination and analysis process of android digital forensic. It can be used to help the investigators while they got a confused cause of SMS encryption during examining and analyzing. What steps should the investigator take, so they still have a chance to discover the encrypted SMS in android evidence?Keywords: anti-forensic countermeasure, SMS encryption android, examination and analysis, digital forensic
Procedia PDF Downloads 12718055 Digital and Technological Transformation of Trekking Routes of Cappadocia Valleys
Authors: Şenay Güngör, Emre Elbaşi, Beyda Sadikoğlu, Utku Eren Bağci, Ömer Uzunel
Abstract:
One of the first places that comes to mind when it comes to tourism in Turkey is the Cappadocia Region. Due to its rich geological and geomorphological heritage, Cappadocia is one of the most visited destinations in the world. In fact, in the first half of 2023, the number of international tourists visiting Cappadocia exceeded 2 million. Considering that the economy of the Cappadocia region is largely based on tourism, it is understood that the quality and technology integration levels of the touristic services offered in the region are of great importance. In this context; as a result of the observations made in Kızılçukur, Meskendir, Güllüdere 1 and Güllüdere 2 valleys, where the important hiking routes of the Cappadocia Region are located, it has been observed that the digital level of the routes is insufficient. It has been observed that the telephone networks in the area are very low or have completely lost their signal strength. In addition, it was determined that the materials such as maps and brochures used by tourism agencies to introduce the valleys are simple and incomplete. It is thought that this situation negatively affects the tourists' orientation and touristic experience in the field. Eliminating these deficiencies identified in the field, improving the digital level of the above-mentioned hiking routes and increasing the added value in destinations are among the main objectives of our study. Within the scope of the study, a mobile application that can work both online and offline on hiking routes has been prepared. 3D modeling of Kızılçukur, Meskendir, Güllüdere 1 and Güllüdere 2 valleys were made using Geographical Information Systems (GIS). In addition, a website has been created to enable tourists to easily access all the above-mentioned information, visuals and technological applications related to the routes. As it is known, the effective use of information and communication technologies in touristic regions not only increases the satisfaction levels of tourists, but also positively affects the attraction of qualified tourists to the region. When the tangible and intangible outputs of this study are evaluated, it is thought that it will serve the social and economic development of the region and set an example for the digital transformation of other routes in the region.Keywords: nevşehir, cappadocia, cappadocia valleys, trekking route
Procedia PDF Downloads 6218054 Analytical Comparison of Conventional Algorithms with Vedic Algorithm for Digital Multiplier
Authors: Akhilesh G. Naik, Dipankar Pal
Abstract:
In today’s scenario, the complexity of digital signal processing (DSP) applications and various microcontroller architectures have been increasing to such an extent that the traditional approaches to multiplier design in most processors are becoming outdated for being comparatively slow. Modern processing applications require suitable pipelined approaches, and therefore, algorithms that are friendlier with pipelined architectures. Traditional algorithms like Wallace Tree, Radix-4 Booth, Radix-8 Booth, Dadda architectures have been proven to be comparatively slow for pipelined architectures. These architectures, therefore, need to be optimized or combined with other architectures amongst them to enhance its performances and to be made suitable for pipelined hardware/architectures. Recently, Vedic algorithm mathematically has proven to be efficient by appearing to be less complex and with fewer steps for its output establishment and have assumed renewed importance. This paper describes and shows how the Vedic algorithm can be better suited for pipelined architectures and also can be combined with traditional architectures and algorithms for enhancing its ability even further. In this paper, we also established that for complex applications on DSP and other microcontroller architectures, using Vedic approach for multiplication proves to be the best available and efficient option.Keywords: Wallace Tree, Radix-4 Booth, Radix-8 Booth, Dadda, Vedic, Single-Stage Karatsuba (SSK), Looped Karatsuba (LK)
Procedia PDF Downloads 16918053 Enhancing Temporal Extrapolation of Wind Speed Using a Hybrid Technique: A Case Study in West Coast of Denmark
Authors: B. Elshafei, X. Mao
Abstract:
The demand for renewable energy is significantly increasing, major investments are being supplied to the wind power generation industry as a leading source of clean energy. The wind energy sector is entirely dependable and driven by the prediction of wind speed, which by the nature of wind is very stochastic and widely random. This s0tudy employs deep multi-fidelity Gaussian process regression, used to predict wind speeds for medium term time horizons. Data of the RUNE experiment in the west coast of Denmark were provided by the Technical University of Denmark, which represent the wind speed across the study area from the period between December 2015 and March 2016. The study aims to investigate the effect of pre-processing the data by denoising the signal using empirical wavelet transform (EWT) and engaging the vector components of wind speed to increase the number of input data layers for data fusion using deep multi-fidelity Gaussian process regression (GPR). The outcomes were compared using root mean square error (RMSE) and the results demonstrated a significant increase in the accuracy of predictions which demonstrated that using vector components of the wind speed as additional predictors exhibits more accurate predictions than strategies that ignore them, reflecting the importance of the inclusion of all sub data and pre-processing signals for wind speed forecasting models.Keywords: data fusion, Gaussian process regression, signal denoise, temporal extrapolation
Procedia PDF Downloads 13518052 Digital And Technological Transformation of Cappadocia Valleys: Kizilçukur, Meskendi̇r, Güllüdere 1, Güllüdere 2
Authors: Şenay Güngör, Emre Elbaşi, Beyda Sadikğlu, Utku Eren Bağci, Ömer Uzunel
Abstract:
One of the first places that comes to mind when it comes to tourism in Turkey is the Cappadocia Region. Due to its rich geological and geomorphological heritage, Cappadocia is one of the most visited destinations in the world. In fact, in the first half of 2023, the number of international tourists visiting Cappadocia exceeded 2 million. Considering that the economy of the Cappadocia region is largely based on tourism, it is understood that the quality and technology integration levels of the touristic services offered in the region are of great importance. In this context; as a result of the observations made in Kızılçukur, Meskendir, Güllüdere 1 and Güllüdere 2 valleys, where the important hiking routes of the Cappadocia Region are located, it has been observed that the digital level of the routes is insufficient. It has been observed that the telephone networks in the area are very low or have completely lost their signal strength. In addition, it was determined that the materials such as maps and brochures used by tourism agencies to introduce the valleys are simple and incomplete. It is thought that this situation negatively affects the tourists' orientation and touristic experience in the field. Eliminating these deficiencies identified in the field, improving the digital level of the above-mentioned hiking routes and increasing the added value in destinations are among the main objectives of our study. Within the scope of the study, a mobile application that can work both online and offline on hiking routes has been prepared. 3D modeling of Kızılçukur, Meskendir, Güllüdere 1 and Güllüdere 2 valleys were made using Geographical Information Systems (GIS). In addition, a website has been created to enable tourists to easily access all the above-mentioned information, visuals and technological applications related to the routes. As it is known, the effective use of information and communication technologies in touristic regions not only increases the satisfaction levels of tourists, but also positively affects the attraction of qualified tourists to the region. When the tangible and intangible outputs of this study are evaluated, it is thought that it will serve the social and economic development of the region and set an example for the digital transformation of other routes in the region.Keywords: nevşehir, cappadocia, cappadocia valleys, tourism route
Procedia PDF Downloads 5618051 Digital Twin for University Campus: Workflow, Applications and Benefits
Authors: Frederico Fialho Teixeira, Islam Mashaly, Maryam Shafiei, Jurij Karlovsek
Abstract:
The ubiquity of data gathering and smart technologies, advancements in virtual technologies, and the development of the internet of things (IoT) have created urgent demands for the development of frameworks and efficient workflows for data collection, visualisation, and analysis. Digital twin, in different scales of the city into the building, allows for bringing together data from different sources to generate fundamental and illuminating insights for the management of current facilities and the lifecycle of amenities as well as improvement of the performance of current and future designs. Over the past two decades, there has been growing interest in the topic of digital twin and their applications in city and building scales. Most such studies look at the urban environment through a homogeneous or generalist lens and lack specificity in particular characteristics or identities, which define an urban university campus. Bridging this knowledge gap, this paper offers a framework for developing a digital twin for a university campus that, with some modifications, could provide insights for any large-scale digital twin settings like towns and cities. It showcases how currently unused data could be purposefully combined, interpolated and visualised for producing analysis-ready data (such as flood or energy simulations or functional and occupancy maps), highlighting the potential applications of such a framework for campus planning and policymaking. The research integrates campus-level data layers into one spatial information repository and casts light on critical data clusters for the digital twin at the campus level. The paper also seeks to raise insightful and directive questions on how digital twin for campus can be extrapolated to city-scale digital twin. The outcomes of the paper, thus, inform future projects for the development of large-scale digital twin as well as urban and architectural researchers on potential applications of digital twin in future design, management, and sustainable planning, to predict problems, calculate risks, decrease management costs, and improve performance.Keywords: digital twin, smart campus, framework, data collection, point cloud
Procedia PDF Downloads 6818050 Randomness in Cybertext: A Study on Computer-Generated Poetry from the Perspective of Semiotics
Authors: Hongliang Zhang
Abstract:
The use of chance procedures and randomizers in poetry-writing can be traced back to surrealist works, which, by appealing to Sigmund Freud's theories, were still logocentrism. In the 1960s, random permutation and combination were extensively used by the Oulipo, John Cage and Jackson Mac Low, which further deconstructed the metaphysical presence of writing. Today, the randomly-generated digital poetry has emerged as a genre of cybertext which should be co-authored by readers. At the same time, the classical theories have now been updated by cybernetics and media theories. N· Katherine Hayles put forward the concept of ‘the floating signifiers’ by Jacques Lacan to be the ‘the flickering signifiers’ , arguing that the technology per se has become a part of the textual production. This paper makes a historical review of the computer-generated poetry in the perspective of semiotics, emphasizing that the randomly-generated digital poetry which hands over the dual tasks of both interpretation and writing to the readers demonstrates the intervention of media technology in literature. With the participation of computerized algorithm and programming languages, poems randomly generated by computers have not only blurred the boundary between encoder and decoder, but also raises the issue of human-machine. It is also a significant feature of the cybertext that the productive process of the text is full of randomness.Keywords: cybertext, digital poetry, poetry generator, semiotics
Procedia PDF Downloads 17518049 Adaptive Multipath Mitigation Acquisition Approach for Global Positioning System Software Receivers
Authors: Animut Meseret Simachew
Abstract:
Parallel Code Phase Search Acquisition (PCSA) Algorithm has been considered as a promising method in GPS software receivers for detection and estimation of the accurate correlation peak between the received Global Positioning System (GPS) signal and locally generated replicas. GPS signal acquisition in highly dense multipath environments is the main research challenge. In this work, we proposed a robust variable step-size (RVSS) PCSA algorithm based on fast frequency transform (FFT) filtering technique to mitigate short time delay multipath signals. Simulation results reveal the effectiveness of the proposed algorithm over the conventional PCSA algorithm. The proposed RVSS-PCSA algorithm equalizes the received carrier wiped-off signal with locally generated C/A code.Keywords: adaptive PCSA, detection and estimation, GPS signal acquisition, GPS software receiver
Procedia PDF Downloads 11718048 A Proposed Framework for Digital Librarianship in Academic Libraries
Authors: Daniel Vaati Nzioka, John Oredo, Dorothy Muthoni Njiraine
Abstract:
The service delivery in academic libraries has been regressing due to the failure of Digital Librarians (DLns) to perform optimally. This study aimed at developing a proposed framework for digital librarianship in academic libraries with special emphasis to three selected public academic institutional libraries. The study’s specific objectives were to determine the roles played by the current DLns’ in academic libraries, establish job description of DLns’ in various academic libraries, ascertain DLns best practices, and to implement a viable digital librarianship conceptual framework. The study used a survey research with open-ended questionnaire designed as per the objectives of the study. A purposively selected sample of 30 Library and Information Science (LIS) professionals from the three selected academic libraries in charge of Digital Information Services (DIS) and managing electronic resources were selected and interviewed. A piloted self-administered questionnaire was used to gather information from these respondents. A total of thirty (30) questionnaires to the LIS professionals-ten from each of the three selected academic libraries were administered. The study developed a proposed conceptual framework for DLns’ that details the pertinent issues currently facing academic libraries when hiring DLns. The study recommended that the provided framework be adopted to guide library managers in identifying the needs of staff training and selecting the most adequate training method as well as settling on the best practices to be sent to staff for training and development.Keywords: digital, academic, libraries, framework
Procedia PDF Downloads 10818047 Fluctuations of Transfer Factor of the Mixer Based on Schottky Diode
Authors: Alexey V. Klyuev, Arkady V. Yakimov, Mikhail I. Ryzhkin, Andrey V. Klyuev
Abstract:
Fluctuations of Schottky diode parameters in a structure of the mixer are investigated. These fluctuations are manifested in two ways. At the first, they lead to fluctuations in the transfer factor that is lead to the amplitude fluctuations in the signal of intermediate frequency. On the basis of the measurement data of 1/f noise of the diode at forward current, the estimation of a spectrum of relative fluctuations in transfer factor of the mixer is executed. Current dependence of the spectrum of relative fluctuations in transfer factor of the mixer and dependence of the spectrum of relative fluctuations in transfer factor of the mixer on the amplitude of the heterodyne signal are investigated. At the second, fluctuations in parameters of the diode lead to the occurrence of 1/f noise in the output signal of the mixer. This noise limits the sensitivity of the mixer to the value of received signal.Keywords: current-voltage characteristic, fluctuations, mixer, Schottky diode, 1/f noise
Procedia PDF Downloads 58618046 Civil Liability for Digital Crimes
Authors: Pál Mészáros
Abstract:
The aim of this research topic is to examine civil law consequences caused by crimes committed in the digital space. During the commission of certain crimes, not only the rights of one person are violated, but also the rights of an entire institution, for example, if the information system of a university is attacked. The consequences of these crimes committed in the digital space may also be that the victim himself is liable to other third parties, for example, in the event that health data comes into the possession of unauthorized persons, and it can be proved that the service provider's IT system was inadequate. An interesting question may also be the civil liability of credit institutions if someone becomes a victim of fraud but is not expected from him/her to notice the fraud. In such a case, the liability of the credit institution may arise if they do not respond in time in the case of unauthorized bank transactions. Based on the above, the main topic of the research is the civil liability of the victim, or another person or company related to the victim in the case of damages caused by crimes.Keywords: civil liability, digital crimes, transfer of responsibility, civil law
Procedia PDF Downloads 6418045 Localization of Buried People Using Received Signal Strength Indication Measurement of Wireless Sensor
Authors: Feng Tao, Han Ye, Shaoyi Liao
Abstract:
City constructions collapse after earthquake and people will be buried under ruins. Search and rescue should be conducted as soon as possible to save them. Therefore, according to the complicated environment, irregular aftershocks and rescue allow of no delay, a kind of target localization method based on RSSI (Received Signal Strength Indication) is proposed in this article. The target localization technology based on RSSI with the features of low cost and low complexity has been widely applied to nodes localization in WSN (Wireless Sensor Networks). Based on the theory of RSSI transmission and the environment impact to RSSI, this article conducts the experiments in five scenes, and multiple filtering algorithms are applied to original RSSI value in order to establish the signal propagation model with minimum test error respectively. Target location can be calculated from the distance, which can be estimated from signal propagation model, through improved centroid algorithm. Result shows that the localization technology based on RSSI is suitable for large-scale nodes localization. Among filtering algorithms, mixed filtering algorithm (average of average, median and Gaussian filtering) performs better than any other single filtering algorithm, and by using the signal propagation model, the minimum error of distance between known nodes and target node in the five scene is about 3.06m.Keywords: signal propagation model, centroid algorithm, localization, mixed filtering, RSSI
Procedia PDF Downloads 30018044 Design of Digital IIR Filter Using Opposition Learning and Artificial Bee Colony Algorithm
Authors: J. S. Dhillon, K. K. Dhaliwal
Abstract:
In almost all the digital filtering applications the digital infinite impulse response (IIR) filters are preferred over finite impulse response (FIR) filters because they provide much better performance, less computational cost and have smaller memory requirements for similar magnitude specifications. However, the digital IIR filters are generally multimodal with respect to the filter coefficients and therefore, reliable methods that can provide global optimal solutions are required. The artificial bee colony (ABC) algorithm is one such recently introduced meta-heuristic optimization algorithm. But in some cases it shows insufficiency while searching the solution space resulting in a weak exchange of information and hence is not able to return better solutions. To overcome this deficiency, the opposition based learning strategy is incorporated in ABC and hence a modified version called oppositional artificial bee colony (OABC) algorithm is proposed in this paper. Duplication of members is avoided during the run which also augments the exploration ability. The developed algorithm is then applied for the design of optimal and stable digital IIR filter structure where design of low-pass (LP) and high-pass (HP) filters is carried out. Fuzzy theory is applied to achieve maximize satisfaction of minimum magnitude error and stability constraints. To check the effectiveness of OABC, the results are compared with some well established filter design techniques and it is observed that in most cases OABC returns better or atleast comparable results.Keywords: digital infinite impulse response filter, artificial bee colony optimization, opposition based learning, digital filter design, multi-parameter optimization
Procedia PDF Downloads 47718043 Efficacy of Learning: Digital Sources versus Print
Authors: Rahimah Akbar, Abdullah Al-Hashemi, Hanan Taqi, Taiba Sadeq
Abstract:
As technology continues to develop, teaching curriculums in both schools and universities have begun adopting a more computer/digital based approach to the transmission of knowledge and information, as opposed to the more old-fashioned use of textbooks. This gives rise to the question: Are there any differences in learning from a digital source over learning from a printed source, as in from a textbook? More specifically, which medium of information results in better long-term retention? A review of the confounding factors implicated in understanding the relationship between learning from the two different mediums was done. Alongside this, a 4-week cohort study involving 76 1st year English Language female students was performed, whereby the participants were divided into 2 groups. Group A studied material from a paper source (referred to as the Print Medium), and Group B studied material from a digital source (Digital Medium). The dependent variables were grading of memory recall indexed by a 4 point grading system, and total frequency of item repetition. The study was facilitated by advanced computer software called Super Memo. Results showed that, contrary to prevailing evidence, the Digital Medium group showed no statistically significant differences in terms of the shift from Remember (Episodic) to Know (Semantic) when all confounding factors were accounted for. The shift from Random Guess and Familiar to Remember occurred faster in the Digital Medium than it did in the Print Medium.Keywords: digital medium, print medium, long-term memory recall, episodic memory, semantic memory, super memo, forgetting index, frequency of repetitions, total time spent
Procedia PDF Downloads 289