Search results for: computer confidence
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 3402

Search results for: computer confidence

2772 The Impact of Political Events on National Archaeological Heritage and Tourism Industry: Study Case of Egypt after January 25th, 2011

Authors: Sabry A. El Azazy

Abstract:

Tourism plays an essential role in supporting the National Economy. Egypt was ranked as one of the most attractive touristic destinations worldwide. Tourism as a service sector affects political events and unstable conditions. Within the revolution of January 25th, 2011, tourism became below standards, and the archeological heritage sites were subject to threat. Because of the political tension and social instability, Egypt's tourism sector has drastically dropped. Currently, Egypt is working on overcoming the crisis caused by political unrest. However, it is expected to take a long time to get back to where it was, especially in terms of regaining the confidence of travelers in the country's ability to guarantee and maintain security and stability. Recently, many great projects have been done, such as; New Administrative Cairo Capital, New Suez Canal logistic project, New City of Al Alamin, New Grand Egyptian Museum, as well as other great projects that reflect positively on the tourism industry and archaeological heritage development in Egypt.

Keywords: archaeology, archaeological heritage, attractions, national economy, political events, touristic destinations, tourism industry

Procedia PDF Downloads 158
2771 Net-Trainer-ST: A Swiss Army Knife for Pentesting, Based on Single Board Computer, for Cybersecurity Professionals and Hobbyists

Authors: K. Hołda, D. Śliwa, K. Daniec, A. Nawrat

Abstract:

This article was created as part of the developed master's thesis. It attempts to present a newly developed device, which will support the work of specialists dealing with broadly understood cybersecurity terms. The device is contrived to automate security tests. In addition, it simulates potential cyberattacks in the most realistic way possible, without causing permanent damage to the network, in order to maximize the quality of the subsequent corrections to the tested network systems. The proposed solution is a fully operational prototype created from commonly available electronic components and a single board computer. The focus of the following article is not only put on the hardware part of the device but also on the theoretical and applicatory way in which implemented cybersecurity tests operate and examples of their results.

Keywords: Raspberry Pi, ethernet, automated cybersecurity tests, ARP, DNS, backdoor, TCP, password sniffing

Procedia PDF Downloads 116
2770 Evaluating the Effectiveness of Science Teacher Training Programme in National Colleges of Education: a Preliminary Study, Perceptions of Prospective Teachers

Authors: A. S. V Polgampala, F. Huang

Abstract:

This is an overview of what is entailed in an evaluation and issues to be aware of when class observation is being done. This study examined the effects of evaluating teaching practice of a 7-day ‘block teaching’ session in a pre -service science teacher training program at a reputed National College of Education in Sri Lanka. Effects were assessed in three areas: evaluation of the training process, evaluation of the training impact, and evaluation of the training procedure. Data for this study were collected by class observation of 18 teachers during 9th February to 16th of 2017. Prospective teachers of science teaching, the participants of the study were evaluated based on newly introduced format by the NIE. The data collected was analyzed qualitatively using the Miles and Huberman procedure for analyzing qualitative data: data reduction, data display and conclusion drawing/verification. It was observed that the trainees showed their confidence in teaching those competencies and skills. Teacher educators’ dissatisfaction has been a great impact on evaluation process.

Keywords: evaluation, perceptions & perspectives, pre-service, science teachering

Procedia PDF Downloads 310
2769 Critical Success Factors of OCOP Business Model in Pattani Province, Thailand: A Qualitative Approach

Authors: Poonsuck Thatchaopas, Nik Kamariah Nik Mat, Nattakarn Eakuru

Abstract:

“One College One Product” OCOP business model is launched by the Vocational Education Commission to encourage college students to choose at least one product for business venture. However, the number of successful OCOP projects is still minimal. The objective of this paper is to identify the critical success factors needed to be a successful OCOP business entrepreneur. This study uses qualitative method by interviewing business partners of an OCOP business called Crispy Roti Krua Acheeva Brand (CRKAB). This project was initiated by three female alumni students of the CRKAB. The finding shows that the main critical success factors are self-confidence, creativity or innovativeness, knowledge, skills and perseverance. Additionally, they reiterated that the keys to business success are product quality, perceived price, promotion, branding, new packaging to increase sales and continuous developments. The results implies for a business SME to be successful, the company should have credible partners and effective marketing plan.

Keywords: new entrepreneurship student model, business incubator, food industry, Pattani Province, Thailand

Procedia PDF Downloads 373
2768 A Survey on Genetic Algorithm for Intrusion Detection System

Authors: Prikhil Agrawal, N. Priyanka

Abstract:

With the increase of millions of users on Internet day by day, it is very essential to maintain highly reliable and secured data communication between various corporations. Although there are various traditional security imparting techniques such as antivirus software, password protection, data encryption, biometrics and firewall etc. But still network security has become the main issue in various leading companies. So IDSs have become an essential component in terms of security, as it can detect various network attacks and respond quickly to such occurrences. IDSs are used to detect unauthorized access to a computer system. This paper describes various intrusion detection techniques using GA approach. The intrusion detection problem has become a challenging task due to the conception of miscellaneous computer networks under various vulnerabilities. Thus the damage caused to various organizations by malicious intrusions can be mitigated and even be deterred by using this powerful tool.

Keywords: genetic algorithm (GA), intrusion detection system (IDS), dataset, network security

Procedia PDF Downloads 291
2767 Electrochemical Behavior and Cathodic Stripping Voltammetric Determination of Dianabol Steroid in Urine at Bare Glassy Carbon Paste Electrode

Authors: N. Al-Orfi, M. S. El-Shahawi, A. S. Bashammakh

Abstract:

The electrochemical response of glassy carbon electrode (GCE) for the sensitive and selective determination of dianabol steroid (DS) in phosphate, Britton-Robinson (B-R) and HEPES buffers of pH 2.0 - 11, 2.0 - 11 and 6.2 - 8.0, respectively using cyclic voltammetry (CV) and differential pulse- adsorptive cathodic stripping voltammetry (DP-CSV) at bare GCE was studied. The dependence of the CV response of the developed cathodic peak potential (Ep, c), peak current (ip, c) and the current function (ip, c / υ1/2) on the scan rate (υ) at the bare GCE revealed the occurrence of electrode coupled chemical reaction of EC type mechanism. The selectivity of the proposed method was assessed in the presence of high concentrations of major interfering species e.g. uric acid, ascorbic acid, citric acid, glucose, fructose, sucrose, starch and ions Na+, K+, PO4-3, NO3- and SO42-. The recovery of the method was not significant where t(critical)=2.20 > texp=1.81-1.93 at 95% confidence. The analytical application of the sensor for the quantification of DS in biological fluids as urine was investigated. The results were demonstrated as recovery percentages in the range 95±2.5-97±4.7% with relative standard deviation (RSD) of 0.5-1.5%.

Keywords: dianabol, determination, modified electrode, urine

Procedia PDF Downloads 268
2766 Does Operating Cash Flow Really Matter in Value Relevance? A Recent Empirical Analysis on the Largest European Companies

Authors: Francesco Paolone

Abstract:

This paper investigates the role of Operating Cash Flow (OCF) and accruals in firm valuation analyzing financial statement information from the largest European companies and evaluating their relation to firm market value. Using a dataset of 500 largest European companies in 2018, the study investigates the relative value-relevance of equity, net income and operating cash flow (OCF). Findings show that the cash flow measure has the same explanatory power and intensity as equity and earnings to explain the market value. This study contributes to the debate on the value relevance of OCF incremental to book value and earnings. It also extends the literature, showing that OCF has information content (value relevance) superior to earnings and book value in the main European markets (Bepari et al., 2013). Finally, the study provides a support that accounting method choice may confuse investors, who have reduced confidence in accounting earnings and book value; in other words, nowadays European investors rely more on cash flows instead of accruals numbers.

Keywords: Cash Flow Statement, Value Relevance, Accounting, Financial Statement Analysis

Procedia PDF Downloads 123
2765 Multisignature Schemes for Reinforcing Trust in Cloud Software-As-A-Service Services

Authors: Mustapha Hedabou, Ali Azougaghe, Ahmed Bentajer, Hicham Boukhris, Mourad Eddiwani, Zakaria Igarramen

Abstract:

Software-as-a-service (SaaS) is emerging as a dominant approach to delivering software. It encompasses a range of business, technical opportunities, issue, and challenges. Trustiness in the cloud services regarding the security and the privacy of the delivered data is the most critical issue with the SaaS model. In this paper, we survey the security concerns related to the SaaS model, and we propose the design of a trusted SaaS model that gives users more confidence into SaaS services by leveraging a trust in a neutral source code certifying authority. The proposed design is based on the use of the multisignature mechanism for signing the source code of the application service. In our model, the cloud provider acts as a root of trust by ensuring the integrity of the application service when it was running on its platform. The proposed design prevents insider attacks from tampering with application service before and after it was launched in a cloud provider platform.

Keywords: cloud computing, SaaS Platform, TPM, trustiness, code source certification, multi-signature schemes

Procedia PDF Downloads 269
2764 An Overview of Risk Types and Risk Management Strategies to Improve Financial Performance

Authors: Azar Baghtaghi

Abstract:

Financial risk management is critically important as it enables companies to maintain stability and profitability amidst market fluctuations and unexpected events. It involves the precise identification of risks that could impact investments, assets, and potential revenues. By implementing effective risk management strategies, companies can insure themselves against adverse market changes and prevent potential losses. In today's era, where markets are highly complex and influenced by various factors such as macroeconomic policies, exchange rate fluctuations, and natural disasters, the need for meticulous planning to cope with these uncertainties is more pronounced. Ultimately, financial risk management means being prepared for the future and the ability to sustain business in changing environments. A company capable of managing its risks not only achieves sustainable profitability but also gains the confidence of shareholders, investors, and business partners, enhancing its competitive position in the market. In this article, the types of financial risk and risk management strategies for improving financial performance were investigated. By identifying the risks stated in this article and their evaluation techniques, it is possible to improve the organization's financial performance.

Keywords: strategy, risk, risk management, financial performance

Procedia PDF Downloads 17
2763 Frequency of Refractive Errors in Squinting Eyes of Children from 4 to 16 Years Presenting at Tertiary Care Hospital

Authors: Maryum Nawaz

Abstract:

Purpose: To determine the frequency of refractive errors in squinting eyes of children from 4 to 16 years presenting at tertiary care hospital. Study Design: A descriptive cross-sectional study was done. Place and Duration: The study was conducted in Pediatric Ophthalmology, Hayatabad Medical Complex, Peshawar. Materials and Methods: The sample size was 146 keeping 41.45%5 proportion of refractive errors in children with squinting eyes, 95% confidence interval and 8% margin of error under WHO sample size calculations. Non-probability consecutive sampling was done. Result: Mean age was 8.57±2.66 years. Male were 89 (61.0%) and female were 57 (39.0%). Refractive error was present in 56 (38.4%) and was not present in 90 (61.6%) of patients. There was no association of gender, age, parent refractive errors, or early usage of electric equipment with the refractive errors. Conclusion: There is a high prevalence of refractive errors in a patient with strabismus. There is no association of age, gender, parent refractive errors, or early usage of electric equipment in the occurrence of refractive errors. Further studies are recommended for confirmation of these.

Keywords: strabismus, refractive error, myopia, hypermetropia, astigmatism

Procedia PDF Downloads 140
2762 Supply Chain Optimization through Vulnerability Control and Risk Prevention in Chicken Meat Use

Authors: Moise A. E., State G., Tudorache M., Custură I., Enea D. N., Osman (Defta) A., Drăgotoiu D.

Abstract:

This scientific paper explores risk management strategies in the food supply chain, with a focus on chicken raw materials, in the context of a company sourcing from the EU and non-EU. The aim of the paper is to adapt the requirements of international standards (IFS, BRC, QS, ITW, FSSC, ISO), proposing efficient methods to identify and remediate non-conformities and corrective and preventive actions. Defining the supply flow and acceptance steps promotes collaboration with suppliers to ensure the quality and safety of raw materials. To assess the risks of suppliers and raw materials, objective criteria are developed and vulnerabilities in the supply chain are analyzed, including the risk of fraud. Active monitoring of international alerts through RASFF helps to identify emerging risks quickly, and regular analysis of international trends and company performance enables continuous adaptation of risk management strategies. Implementing these measures strengthens food safety and consumer confidence in the final products supplied.

Keywords: food supply chain, international standards, quality and safety of raw materials, RASFF

Procedia PDF Downloads 45
2761 Fitness Action Recognition Based on MediaPipe

Authors: Zixuan Xu, Yichun Lou, Yang Song, Zihuai Lin

Abstract:

MediaPipe is an open-source machine learning computer vision framework that can be ported into a multi-platform environment, which makes it easier to use it to recognize the human activity. Based on this framework, many human recognition systems have been created, but the fundamental issue is the recognition of human behavior and posture. In this paper, two methods are proposed to recognize human gestures based on MediaPipe, the first one uses the Adaptive Boosting algorithm to recognize a series of fitness gestures, and the second one uses the Fast Dynamic Time Warping algorithm to recognize 413 continuous fitness actions. These two methods are also applicable to any human posture movement recognition.

Keywords: computer vision, MediaPipe, adaptive boosting, fast dynamic time warping

Procedia PDF Downloads 106
2760 Attitudes of Nurses towards End-of-Life Care for Themselves

Authors: H. N. S. Silva, S. N. Silva

Abstract:

Introduction: 88.3% of physicians decided to choose a ‘no-code’ or a DNR order if hospitalized and would choose to die less aggressively at home. However, their wishes were mostly over ridden. Objective: To assess the attitudes of nurses towards the end-of-the-life care they would like to receive for themselves and their attitudes towards terminal illnesses. Methods: A mixed method approach was used. A closed and open-ended questionnaire was administered to 73 participants and 5 registered nurses, who have more than 10 years of experience, working in hospitals both in Sri Lanka and abroad, were interviewed. Results: 94.1% of the participants stated that they would like to die at home, spending their last hours at home surrounded by their loved ones and engaging in religious activities but 57.7% of unmarried nurse said they would agree on euthanasia if they had a terminal disease, and also 66.2% of them stated they would agree in DNR order if they happen to be admitted to the ICU, but 82.5% wanted to diagnose if they had a terminal illness or cancer but did not agree on euthanasia. Qualitative analysis confirmed the findings and revealed that despite having adequate confidence about the hospital care, nurses would choose to die at home, surrounded by their loved once and engaging in religious activities. Euthanasia was believed to be inappropriate as it is religiously incorrect and as death is a natural process. Conclusion: The perception of death among nurses depends on their religious belief.

Keywords: death, do not resuscitate, euthanasia, nurses

Procedia PDF Downloads 508
2759 Ultra Reliable Communication: Availability Analysis in 5G Cellular Networks

Authors: Yosra Benchaabene, Noureddine Boujnah, Faouzi Zarai

Abstract:

To meet the growing demand of users, the fifth generation (5G) will continue to provide services to higher data rates with higher carrier frequencies and wider bandwidths. As part of the 5G communication paradigm, Ultra Reliable Communication (URC) is envisaged as an important technology pillar for providing anywhere and anytime services to end users. Ultra Reliable Communication (URC) is considered an important technology that why it has become an active research topic. In this work, we analyze the availability of a service in the space domain. We characterize spatially available areas consisting of all locations that meet a performance requirement with confidence, and we define cell availability and system availability, individual user availability, and user-oriented system availability. Poisson point process (PPP) and Voronoi tessellation are adopted to model the spatial characteristics of a cell deployment in heterogeneous networks. Numerical results are presented, also highlighting the effect of different system parameters on the achievable link availability.

Keywords: URC, dependability and availability, space domain analysis, Poisson point process, Voronoi Tessellation

Procedia PDF Downloads 115
2758 BOFSC: A Blockchain Based Decentralized Framework to Ensure the Transparency of Organic Food Supply Chain

Authors: Mifta Ul Jannat, Raju Ahmed, Al Mamun, Jannatul Ferdaus, Ritu Costa, Milon Biswas

Abstract:

Blockchain is an internet-based invention that is coveted in the permanent, scumbled record for its capacity to openly accept, record, and distribute transactions. In a traditional supply chain, there are no trustworthy participants for an organic product. Yet blockchain engineering may provide confidence, transparency, and traceability. Blockchain varies in how companies get real, checked, and lasting information from their supply chain and lock in customers. In an arrangement of cryptographic squares, Blockchain digitizes each connection by sparing it. No one person may alter the documents, and any alteration within the agreement is clear to all. The coming to the record is tamper proof and unchanging, offering a complete history of the object’s life cycle and minimizing opening for extorting. The primary aim of this analysis is to identify the underlying problem that the customer faces. In this post, we will minimize the allocation of fraud data through the ’Smart Contract’ and include a certificate of quality assurance.

Keywords: blockchain technology, food supply chain, Ethereum, smart contract, quality assurance, trustability, security, transparency

Procedia PDF Downloads 147
2757 Analysis of the Performance of State Institutions From 2008-2013 in Pakistan

Authors: Mahrukh Shehzadi

Abstract:

Pakistan is a democratic republic but has spent much time under military rulers; after a few years of independence, Pakistan faced three martial laws in 1958, 1969, and 1977, and the latest in 1999 by General Musharraf. The purpose of this thesis is to analyze the politics, policies and overall performance of Pakistan People’s Party Government from 2008-2013. PPP won a significant victory in the elections of 2008. The co-chairman, Mr. Asif Ali Zardari, announced the end of the fourth dictatorship. It was for the first time in Pakistan’s history that an elected government completed its term (2008-2013). While the completion of its term is an achievement, the performance of the democratically-elected government – federal, provincial and local does not inspire much confidence. Poor governance, persistent confrontational relations between the executive and the judiciary, charges of corruption, and the incompetence of the political leadership to build consensus to combat terrorism continue to cast criticisms on the democratic process and the civilian regime’s capability to sustain democracy. In the present study, the researcher will try to describe and explain the public thinking pattern regarding the policies opted for by the PPP-led government and their impact on the people’s minds of Pakistan.

Keywords: democracy, performance, policies, state, manifesto

Procedia PDF Downloads 50
2756 Computer-Aided Detection of Simultaneous Abdominal Organ CT Images by Iterative Watershed Transform

Authors: Belgherbi Aicha, Hadjidj Ismahen, Bessaid Abdelhafid

Abstract:

Interpretation of medical images benefits from anatomical and physiological priors to optimize computer-aided diagnosis applications. Segmentation of liver, spleen and kidneys is regarded as a major primary step in the computer-aided diagnosis of abdominal organ diseases. In this paper, a semi-automated method for medical image data is presented for the abdominal organ segmentation data using mathematical morphology. Our proposed method is based on hierarchical segmentation and watershed algorithm. In our approach, a powerful technique has been designed to suppress over-segmentation based on mosaic image and on the computation of the watershed transform. Our algorithm is currency in two parts. In the first, we seek to improve the quality of the gradient-mosaic image. In this step, we propose a method for improving the gradient-mosaic image by applying the anisotropic diffusion filter followed by the morphological filters. Thereafter, we proceed to the hierarchical segmentation of the liver, spleen and kidney. To validate the segmentation technique proposed, we have tested it on several images. Our segmentation approach is evaluated by comparing our results with the manual segmentation performed by an expert. The experimental results are described in the last part of this work.

Keywords: anisotropic diffusion filter, CT images, morphological filter, mosaic image, simultaneous organ segmentation, the watershed algorithm

Procedia PDF Downloads 430
2755 The Way Digitized Lectures and Film Presence Coaching Impact Academic Identity: An Expert Facilitated Participatory Action Research Case Study

Authors: Amanda Burrell, Tonia Gary, David Wright, Kumara Ward

Abstract:

This paper explores the concept of academic identity as it relates to the lecture, in particular, the digitized lecture delivered to a camera, in the absence of a student audience. Many academics have the performance aspect of the role thrust upon them with little or no training. For the purpose of this study, we look at the performance of the academic identity and examine tailored film presence coaching for its contributions toward academic identity, specifically in relation to feelings of self-confidence and diminishment of discomfort or stage fright. The case is articulated through the lens of scholar-practitioners, using expert facilitated participatory action research. It demonstrates in our sample of experienced academics, all reported some feelings of uncertainty about presenting lectures to camera prior to coaching. We share how power poses and reframing fear, produced improvements in the ease and competency of all participants. We share exactly how this insight could be adapted for self-coaching by any academic when called to present to a camera and consider the relationship between this and academic identity.

Keywords: academic identity, digitized lecture, embodied learning, performance coaching

Procedia PDF Downloads 332
2754 Safety of Ports, Harbours, Marine Terminals: Application of Quantitative Risk Assessment

Authors: Dipak Sonawane, Sudarshan Daga, Somesh Gupta

Abstract:

Quantitative risk assessment (QRA) is a very precise and consistent approach to defining the likelihood, consequence and severity of a major incident/accident. A variety of hazardous cargoes in bulk, such as hydrocarbons and flammable/toxic chemicals, are handled at various ports. It is well known that most of the operations are hazardous, having the potential of damaging property, causing injury/loss of life and, in some cases, the threat of environmental damage. In order to ensure adequate safety towards life, environment and property, the application of scientific methods such as QRA is inevitable. By means of these methods, comprehensive hazard identification, risk assessment and appropriate implementation of Risk Control measures can be carried out. In this paper, the authors, based on their extensive experience in Risk Analysis for ports and harbors, have exhibited how QRA can be used in practice to minimize and contain risk to tolerable levels. A specific case involving the operation for unloading of hydrocarbon at a port is presented. The exercise provides confidence that the method of QRA, as proposed by the authors, can be used appropriately for the identification of hazards and risk assessment of Ports and Terminals.

Keywords: quantitative risk assessment, hazard assessment, consequence analysis, individual risk, societal risk

Procedia PDF Downloads 76
2753 Performance Evaluation of Single Basin Solar Still

Authors: Prem Singh, Jagdeep Singh

Abstract:

In an attempt to investigate the performance of single basin solar still for climate conditions of Ludhiana a single basin solar still was designed, fabricated and tested. The energy balance equations for various parts of the still are solved by Gauss-Seidel iteration method. Computer model was made and experimentally validated. The validated computer model was used to estimate the annual distillation yield and performance ratio of the still for Ludhiana. The Theoretical and experimental distillation yield were 4318.79 ml and 3850 ml, respectively for the typical day. The predicted distillation yield was 12.5% higher than the experimental yield. The annual distillation yield per square meter aperture area and annual performance ratio for single basin solar still is 1095 liters and 0.43 liters, respectively. The payback period for micro-stepped solar still is 2.5 years.

Keywords: solar distillation, solar still, single basin, still

Procedia PDF Downloads 496
2752 The Effect of Remifentanil on Emergence Agitation after Sevoflurane Anesthesia in Children: A Meta-Analysis

Authors: Jong Yeop Kim, Sung Young Park, Dae Hee Kim, Han Bum Joe, Ji Young Yoo, Jong Bum Choi, Sook Young Lee

Abstract:

Emergence agitation (EA) is commonly reported adverse events after sevoflurane anesthesia in pediatric patients. The efficacy of prophylactic remifentanil, one of mu opioid agonist, in preventing EA is controversial. This meta-analysis assessed the effectiveness of remifentanil to decrease the incidence of EA from sevoflurane anesthesia in children. We searched for randomized controlled trials comparing sevoflurane alone anesthesia with sevoflurane and remifentanil anesthesia to prevent EA in the Cochrane Library, Embase, Pubmed, and KoreaMed, and included 6 studies with 361 patients. The number of patients of reporting EA was summarized using risk ratio (RR) with 95% confidence interval (CI), with point estimates and 95CIs derived from a random effects Mantel-Haenszel method. Overall incidence of EA was about 41%. Compared with sevoflurane alone anesthesia, intravenous infusion of remifentanil with sevoflurane significantly reduced the incidence of EA (RR 0.53, 95% CI 0.39-0.73, P < 0.0001), (heterogeneity, I2 = 0, P = 0.42). This meta-analysis suggested that continuous infusion of remifentanil could be effective in decreasing the EA of about 47% after sevoflurane anesthesia. However, considering limitations of the included studies, more randomized controlled studies are required to verify our results.

Keywords: emergence agitation, meta-analysis, remifentanil, pediatrics

Procedia PDF Downloads 364
2751 TACTICAL: Ram Image Retrieval in Linux Using Protected Mode Architecture’s Paging Technique

Authors: Sedat Aktas, Egemen Ulusoy, Remzi Yildirim

Abstract:

This article explains how to get a ram image from a computer with a Linux operating system and what steps should be followed while getting it. What we mean by taking a ram image is the process of dumping the physical memory instantly and writing it to a file. This process can be likened to taking a picture of everything in the computer’s memory at that moment. This process is very important for tools that analyze ram images. Volatility can be given as an example because before these tools can analyze ram, images must be taken. These tools are used extensively in the forensic world. Forensic, on the other hand, is a set of processes for digitally examining the information on any computer or server on behalf of official authorities. In this article, the protected mode architecture in the Linux operating system is examined, and the way to save the image sample of the kernel driver and system memory to disk is followed. Tables and access methods to be used in the operating system are examined based on the basic architecture of the operating system, and the most appropriate methods and application methods are transferred to the article. Since there is no article directly related to this study on Linux in the literature, it is aimed to contribute to the literature with this study on obtaining ram images. LIME can be mentioned as a similar tool, but there is no explanation about the memory dumping method of this tool. Considering the frequency of use of these tools, the contribution of the study in the field of forensic medicine has been the main motivation of the study due to the intense studies on ram image in the field of forensics.

Keywords: linux, paging, addressing, ram-image, memory dumping, kernel modules, forensic

Procedia PDF Downloads 107
2750 Real-Time Gesture Recognition System Using Microsoft Kinect

Authors: Ankita Wadhawan, Parteek Kumar, Umesh Kumar

Abstract:

Gesture is any body movement that expresses some attitude or any sentiment. Gestures as a sign language are used by deaf people for conveying messages which helps in eliminating the communication barrier between deaf people and normal persons. Nowadays, everybody is using mobile phone and computer as a very important gadget in their life. But there are some physically challenged people who are blind/deaf and the use of mobile phone or computer like device is very difficult for them. So, there is an immense need of a system which works on body gesture or sign language as input. In this research, Microsoft Kinect Sensor, SDK V2 and Hidden Markov Toolkit (HTK) are used to recognize the object, motion of object and human body joints through Touch less NUI (Natural User Interface) in real-time. The depth data collected from Microsoft Kinect has been used to recognize gestures of Indian Sign Language (ISL). The recorded clips are analyzed using depth, IR and skeletal data at different angles and positions. The proposed system has an average accuracy of 85%. The developed Touch less NUI provides an interface to recognize gestures and controls the cursor and click operation in computer just by waving hand gesture. This research will help deaf people to make use of mobile phones, computers and socialize among other persons in the society.

Keywords: gesture recognition, Indian sign language, Microsoft Kinect, natural user interface, sign language

Procedia PDF Downloads 299
2749 A Comparative Study of Generalized Autoregressive Conditional Heteroskedasticity (GARCH) and Extreme Value Theory (EVT) Model in Modeling Value-at-Risk (VaR)

Authors: Longqing Li

Abstract:

The paper addresses the inefficiency of the classical model in measuring the Value-at-Risk (VaR) using a normal distribution or a Student’s t distribution. Specifically, the paper focuses on the one day ahead Value-at-Risk (VaR) of major stock market’s daily returns in US, UK, China and Hong Kong in the most recent ten years under 95% confidence level. To improve the predictable power and search for the best performing model, the paper proposes using two leading alternatives, Extreme Value Theory (EVT) and a family of GARCH models, and compares the relative performance. The main contribution could be summarized in two aspects. First, the paper extends the GARCH family model by incorporating EGARCH and TGARCH to shed light on the difference between each in estimating one day ahead Value-at-Risk (VaR). Second, to account for the non-normality in the distribution of financial markets, the paper applies Generalized Error Distribution (GED), instead of the normal distribution, to govern the innovation term. A dynamic back-testing procedure is employed to assess the performance of each model, a family of GARCH and the conditional EVT. The conclusion is that Exponential GARCH yields the best estimate in out-of-sample one day ahead Value-at-Risk (VaR) forecasting. Moreover, the discrepancy of performance between the GARCH and the conditional EVT is indistinguishable.

Keywords: Value-at-Risk, Extreme Value Theory, conditional EVT, backtesting

Procedia PDF Downloads 316
2748 God, The Master Programmer: The Relationship Between God and Computers

Authors: Mohammad Sabbagh

Abstract:

Anyone who reads the Torah or the Quran learns that GOD created everything that is around us, seen and unseen, in six days. Within HIS plan of creation, HE placed for us a key proof of HIS existence which is essentially computers and the ability to program them. Digital computer programming began with binary instructions, which eventually evolved to what is known as high-level programming languages. Any programmer in our modern time can attest that you are essentially giving the computer commands by words and when the program is compiled, whatever is processed as output is limited to what the computer was given as an ability and furthermore as an instruction. So one can deduce that GOD created everything around us with HIS words, programming everything around in six days, just like how we can program a virtual world on the computer. GOD did mention in the Quran that one day where GOD’s throne is, is 1000 years of what we count; therefore, one might understand that GOD spoke non-stop for 6000 years of what we count, and gave everything it’s the function, attributes, class, methods and interactions. Similar to what we do in object-oriented programming. Of course, GOD has the higher example, and what HE created is much more than OOP. So when GOD said that everything is already predetermined, it is because any input, whether physical, spiritual or by thought, is outputted by any of HIS creatures, the answer has already been programmed. Any path, any thought, any idea has already been laid out with a reaction to any decision an inputter makes. Exalted is GOD!. GOD refers to HIMSELF as The Fastest Accountant in The Quran; the Arabic word that was used is close to processor or calculator. If you create a 3D simulation of a supernova explosion to understand how GOD produces certain elements and fuses protons together to spread more of HIS blessings around HIS skies; in 2022 you are going to require one of the strongest, fastest, most capable supercomputers of the world that has a theoretical speed of 50 petaFLOPS to accomplish that. In other words, the ability to perform one quadrillion (1015) floating-point operations per second. A number a human cannot even fathom. To put in more of a perspective, GOD is calculating when the computer is going through those 50 petaFLOPS calculations per second and HE is also calculating all the physics of every atom and what is smaller than that in all the actual explosion, and it’s all in truth. When GOD said HE created the world in truth, one of the meanings a person can understand is that when certain things occur around you, whether how a car crashes or how a tree grows; there is a science and a way to understand it, and whatever programming or science you deduce from whatever event you observed, it can relate to other similar events. That is why GOD might have said in The Quran that it is the people of knowledge, scholars, or scientist that fears GOD the most! One thing that is essential for us to keep up with what the computer is doing and for us to track our progress along with any errors is we incorporate logging mechanisms and backups. GOD in The Quran said that ‘WE used to copy what you used to do’. Essentially as the world is running, think of it as an interactive movie that is being played out in front of you, in a full-immersive non-virtual reality setting. GOD is recording it, from every angle to every thought, to every action. This brings the idea of how scary the Day of Judgment will be when one might realize that it’s going to be a fully immersive video when we would be getting and reading our book.

Keywords: programming, the Quran, object orientation, computers and humans, GOD

Procedia PDF Downloads 102
2747 Online Creative Writing Courses for Algerian University Students: A Mixed-Methods Study of Benefits, Challenges, and Recommendations

Authors: Wafa Nouari

Abstract:

The paper investigates the advantages and drawbacks of online creative writing courses for Algerian university students, particularly in light of the COVID-19 pandemic. The paper employs a mixed-methods approach, using both quantitative and qualitative data from surveys, interviews, and online course evaluations. The paper examines three online creative writing courses offered by Oxford University, Stanford University, and Coursera. The paper shows that online creative writing courses can improve the student's writing abilities, enthusiasm, and self-confidence, as well as introduce them to various literary forms and cultures. However, the paper also highlights some challenges and obstacles that the students encounter, such as technical problems, language difficulties, cultural gaps, and lack of feedback and interaction. The paper argues that online creative writing courses can be a useful alternative or addition to conventional classroom instruction, especially during the pandemic. The paper also offers some suggestions for enhancing the quality and effectiveness of online creative writing courses, such as giving more direction, support, and feedback to the students, as well as creating a sense of community and cooperation among them.

Keywords: online creative writing courses, Algerian university students, mixed methods approach, benefits and chanllenges

Procedia PDF Downloads 102
2746 Case Study: The Impact of Creative Play on Children's Bilingualism

Authors: Mingxi Xiao

Abstract:

This case study focused on a bilingual child named Emma and her play. Emma was a four-year-old girl born in Australia while her parents were both Chinese. Emma could speak fluent English, while her Mandarin was not as good as her spoken English. With the research question to figure out whether creative play had an impact on children’s bilingualism, this case study mainly used the anecdotes method to observe Emma’s play and this report presented five observations of Emma, describing detailed information about her play and recording her language use. Based on Emma’s interests and daily activities, this case study chose her creative play for observation, which incorporates a whole range of activities from dancing to drawing, as well as playing instruments. From the five observations, it could be seen that Emma often mixed languages to help her express her meaning. It could be seen that Emma made an effort to use her bilingualism in her creative play. In other words, play encouraged Emma to use the two languages. In conclusion, the observations with Emma showed that although her Mandarin was not good enough, she displayed confidence in speaking both languages and had gradually shifted from mixing languages to code-switching. Recommendations were provided to support Emma’s bilingual abilities for further development in the end.

Keywords: bilingual, case study, code-switching, creative play, early childhood

Procedia PDF Downloads 137
2745 Meta-Analysis of Exercise Interventions for Children and Adolescents Diagnosed with Pediatric Metabolic Syndrome

Authors: James M. Geidner

Abstract:

Objective: The purpose of this meta-analysis was to examine the evidence for the effectiveness of exercise interventions on reducing metabolic components in children and/or adolescents diagnosed with Paediatric Metabolic Syndrome. Methods: A computerized search was made from four databases: PubMed, PsycInfo, SPORTDiscus, Cochrane Central Register. The analysis was restricted to children and adolescents with metabolic syndrome examining the effect of exercise interventions on metabolic components. Effect size and 95% confidence interval were calculated and the heterogeneity of the studies was estimated using Cochran’s Q-statistic and I2. Bias was assessed using multiple tools and statistical analyses. Results: Thirteen studies, consisting of 19 separate trials, were selected for the meta-analysis as they fulfilled the inclusion criteria (n=908). Exercise interventions resulted in decreased waist circumference, systolic blood pressure, diastolic blood pressure, fasting glucose, insulin resistance, triglycerides, and High-Density Lipoprotein Cholesterol (HDL-C). Conclusions: This meta-analysis provides insights into the effectiveness of exercise interventions on markers of Paediatric Metabolic Syndrome in children and adolescents.

Keywords: metabolic syndrome, syndrome x, pediatric, meta-analysis

Procedia PDF Downloads 165
2744 Clinical Psychology Interns' Lived Experience with Suicidal Clients

Authors: Elaine Llantos Elayda, John Mark S. Distor

Abstract:

This paper explores the lived experiences of clinical psychology interns' who have encountered suicidal clients during their internship. Employing qualitative phenomenological investigation, semi-structured interviews were conducted and analyzed using interpretative phenomenological analysis (IPA). The study employed purposive sampling to gather valuable data. The results highlighted that those encounters with suicidal clients triggered various reactions among interns, leading to self-doubt and a sense of unpreparedness in handling such cases. Many interns struggled with managing their own emotions, especially when clients' traumas mirrored their own experiences. The study emphasized the importance of a robust support system in helping interns cope with the challenges of their work. Supervision and professional support played critical roles in interns' development, providing guidance and enhancing their confidence in managing distressing situations. Despite the challenges, the interns found purpose in witnessing significant client progress and emphasized the importance of self-care and ongoing training to prepare future clinicians for similar experiences.

Keywords: polytechnic university of the Philippines, clinical psychology interns, suicidal clients, clinical psychology training

Procedia PDF Downloads 12
2743 Shoreline Change Estimation from Survey Image Coordinates and Neural Network Approximation

Authors: Tienfuan Kerh, Hsienchang Lu, Rob Saunders

Abstract:

Shoreline erosion problems caused by global warming and sea level rising may result in losing of land areas, so it should be examined regularly to reduce possible negative impacts. Initially in this study, three sets of survey images obtained from the years of 1990, 2001, and 2010, respectively, are digitalized by using graphical software to establish the spatial coordinates of six major beaches around the island of Taiwan. Then, by overlaying the known multi-period images, the change of shoreline can be observed from their distribution of coordinates. In addition, the neural network approximation is used to develop a model for predicting shoreline variation in the years of 2015 and 2020. The comparison results show that there is no significant change of total sandy area for all beaches in the three different periods. However, the prediction results show that two beaches may exhibit an increasing of total sandy areas under a statistical 95% confidence interval. The proposed method adopted in this study may be applicable to other shorelines of interest around the world.

Keywords: digitalized shoreline coordinates, survey image overlaying, neural network approximation, total beach sandy areas

Procedia PDF Downloads 267