Search results for: symmetric half-plane digital filter
3047 Satellite LiDAR-Based Digital Terrain Model Correction using Gaussian Process Regression
Authors: Keisuke Takahata, Hiroshi Suetsugu
Abstract:
Forest height is an important parameter for forest biomass estimation, and precise elevation data is essential for accurate forest height estimation. There are several globally or nationally available digital elevation models (DEMs) like SRTM and ASTER. However, its accuracy is reported to be low particularly in mountainous areas where there are closed canopy or steep slope. Recently, space-borne LiDAR, such as the Global Ecosystem Dynamics Investigation (GEDI), have started to provide sparse but accurate ground elevation and canopy height estimates. Several studies have reported the high degree of accuracy in their elevation products on their exact footprints, while it is not clear how this sparse information can be used for wider area. In this study, we developed a digital terrain model correction algorithm by spatially interpolating the difference between existing DEMs and GEDI elevation products by using Gaussian Process (GP) regression model. The result shows that our GP-based methodology can reduce the mean bias of the elevation data from 3.7m to 0.3m when we use airborne LiDAR-derived elevation information as ground truth. Our algorithm is also capable of quantifying the elevation data uncertainty, which is critical requirement for biomass inventory. Upcoming satellite-LiDAR missions, like MOLI (Multi-footprint Observation Lidar and Imager), are expected to contribute to the more accurate digital terrain model generation.Keywords: digital terrain model, satellite LiDAR, gaussian processes, uncertainty quantification
Procedia PDF Downloads 1823046 Sensitivity and Specificity of Clinical Testing for Digital Nerve Injury
Authors: Guy Rubin, Ravit Shay, Nimrod Rozen
Abstract:
The accuracy of a diagnostic test used to classify a patient as having disease or being disease-free is a valuable piece of information to be used by the physician when making treatment decisions. Finger laceration, suspected to have nerve injury is a challenging decision for the treating surgeon. The purpose of this study was to evaluate the sensitivity, specificity and predictive values of six clinical tests in the diagnosis of digital nerve injury. The six clinical tests included light touch, pin prick, static and dynamic 2-point discrimination, Semmes Weinstein monofilament and wrinkle test. Data comparing pre-surgery examination with post-surgery results of 42 patients with 52 digital nerve injury was evaluated. The subjective examinations, light touch, pin prick, static and dynamic 2-point discrimination and Semmes-Weinstein monofilament were not sensitive (57.6, 69.7, 42.4, 40 and 66.8% respectively) and specific (36.8, 36.8, 47.4, 42.1 and 31.6% respectively). Wrinkle test, the only objective examination, was the most sensitive (78.1%) and specific (55.6%). This result gives no pre-operative examination the ability to predict the result of explorative surgery.Keywords: digital nerve, injury, nerve examination, Semmes-Weinstein monofilamen, sensitivity, specificity, two point discrimination, wrinkle test
Procedia PDF Downloads 3443045 Academic Literacy: A Study of L2 Academic Reading Literacy among a Group of EFL/ESL Postgraduate Arab Learners in a British University
Authors: Hanadi Khadawardi
Abstract:
The current study contributes to research on foreign/second language (L2) academic reading by presenting a significant case study, which seeks to investigate specific groups of international (Arab) postgraduate students’ L2 academic reading practices in the UK educational context. In particular, the study scrutinises postgraduate students’ L2 paper-based and digital-based academic reading strategies, and their use of digital aids while engaged in L2 academic reading. To this end, the study investigates Arab readers’ attitudes toward digital L2 academic reading. The study aims to compare between paper and digital L2 academic reading strategies that the students employ and which reading formats they prefer. This study tracks Masters-level students and examines the way in which their reading strategies and attitudes change throughout their Masters programme in the UK educational context. The academic reading strategies and attitudes of five students from four different disciplines (Health Science, Psychology, Management, and Education) are investigated at two points during their one-year Masters programmes. In addition, the study investigates the same phenomenon with 15 Saudi PhD students drawn from seven different disciplines (Computer Science, Engineering, Psychology, Management, Marketing, Health Science, and Applied Linguistics) at one period of their study in the same context. The study uses think-aloud protocol, field notes, stimulated recall, and semi-structured interviews to collect data. The data is analysed qualitatively. The results of the study will explain the process of learning in terms of reading L2 paper and digital academic texts in the L2 context.Keywords: EFL: English as a foreign language, ESL: English as a second language, L: Language
Procedia PDF Downloads 3813044 A High Time Resolution Digital Pulse Width Modulator Based on Field Programmable Gate Array’s Phase Locked Loop Megafunction
Authors: Jun Wang, Tingcun Wei
Abstract:
The digital pulse width modulator (DPWM) is the crucial building block for digitally-controlled DC-DC switching converter, which converts the digital duty ratio signal into its analog counterpart to control the power MOSFET transistors on or off. With the increase of switching frequency of digitally-controlled DC-DC converter, the DPWM with higher time resolution is required. In this paper, a 15-bits DPWM with three-level hybrid structure is presented; the first level is composed of a7-bits counter and a comparator, the second one is a 5-bits delay line, and the third one is a 3-bits digital dither. The presented DPWM is designed and implemented using the PLL megafunction of FPGA (Field Programmable Gate Arrays), and the required frequency of clock signal is 128 times of switching frequency. The simulation results show that, for the switching frequency of 2 MHz, a DPWM which has the time resolution of 15 ps is achieved using a maximum clock frequency of 256MHz. The designed DPWM in this paper is especially useful for high-frequency digitally-controlled DC-DC switching converters.Keywords: DPWM, digitally-controlled DC-DC switching converter, FPGA, PLL megafunction, time resolution
Procedia PDF Downloads 4803043 Evolutionary Methods in Cryptography
Authors: Wafa Slaibi Alsharafat
Abstract:
Genetic algorithms (GA) are random algorithms as random numbers that are generated during the operation of the algorithm determine what happens. This means that if GA is applied twice to optimize exactly the same problem it might produces two different answers. In this project, we propose an evolutionary algorithm and Genetic Algorithm (GA) to be implemented in symmetric encryption and decryption. Here, user's message and user secret information (key) which represent plain text to be transferred into cipher text.Keywords: GA, encryption, decryption, crossover
Procedia PDF Downloads 4453042 Challenges of the Implementation of Real Time Online Learning in a South African Context
Authors: Thifhuriwi Emmanuel Madzunye, Patricia Harpur, Ephias Ruhode
Abstract:
A review of the pertinent literature identified a gap concerning the hindrances and opportunities accompanying the implementation of real-time online learning systems (RTOLs) in rural areas. Whilst RTOLs present a possible solution to teaching and learning issues in rural areas, little is known about the implementation of digital strategies among schools in isolated communities. This study explores associated guidelines that have the potential to inform decision-making where Internet-based education could improve educational opportunities. A systematic literature review has the potential to consolidate and focus on disparate literature served to collect interlinked data from specific sources in a structured manner. During qualitative data analysis (QDA) of selected publications via the application of a QDA tool - ATLAS.ti, the following overarching themes emerged: digital divide, educational strategy, human factors, and support. Furthermore, findings from data collection and literature review suggest that signiant factors include a lack of digital knowledge, infrastructure shortcomings such as a lack of computers, poor internet connectivity, and handicapped real-time online may limit students’ progress. The study recommends that timeous consideration should be given to the influence of the digital divide. Additionally, the evolution of educational strategy that adopts digital approaches, a focus on training of role-players and stakeholders concerning human factors, and the seeking of governmental funding and support are essential to the implementation and success of RTOLs.Keywords: communication, digital divide, digital skills, distance, educational strategy, government, ICT, infrastructures, learners, limpopo, lukalo, network, online learning systems, political-unrest, real-time, real-time online learning, real-time online learning system, pass-rate, resources, rural area, school, support, teachers, teaching and learning and training
Procedia PDF Downloads 3343041 The Instrumentalization of Digital Media in the Context of Sexualized Violence
Authors: Katharina Kargel, Frederic Vobbe
Abstract:
Sexual online grooming is generally defined as digital interactions for the purpose of sexual exploitation of children or minors, i.e. as a process for preparing and framing sexual child abuse. Due to its conceptual history, sexual online grooming is often associated with perpetrators who are previously unknown to those affected. While the strategies of perpetrators and the perception of those affected are increasingly being investigated, the instrumentalisation of digital media has not yet been researched much. Therefore, the present paper aims at contributing to this research gap by examining in what kind of ways perpetrators instrumentalise digital media. Our analyses draw on 46 case documentations and 18 interviews with those affected. The cases and the partly narrative interviews were collected by ten cooperating specialist centers working on sexualized violence in childhood and youth. For this purpose, we designed a documentation grid allowing for a detailed case reconstruction i.e. including information on the violence, digital media use and those affected. By using Reflexive Grounded Theory, our analyses emphasize a) the subjective benchmark of professional practitioners as well as those affected and b) the interpretative implications resulting from our researchers’ subjective and emotional interaction with the data material. It should first be noted that sexualized online grooming can result in both online and offline sexualized violence as well as hybrid forms. Furthermore, the perpetrators either come from the immediate social environment of those affected or are unknown to them. The perpetrator-victim relationship plays a more important role with regard to the question of the instrumentalisation of digital media than the question of the space (on vs. off) in which the primary violence is committed. Perpetrators unknown to those affected instrumentalise digital media primarily to establish a sexualized system of norms, which is usually embedded in a supposed love relationship. In some cases, after an initial exchange of sexualized images or video recordings, a latent play on the position of power takes place. In the course of the grooming process, perpetrators from the immediate social environment increasingly instrumentalise digital media to establish an explicit relationship of power and dependence, which is directly determined by coercion, threats and blackmail. The knowledge of possible vulnerabilities is strategically used in the course of maintaining contact. The above explanations lead to the conclusion that the motive for the crime plays an essential role in the question of the instrumentalisation of digital media. It is therefore not surprising that it is mostly the near-field perpetrators without commercial motives who initiate a spiral of violence and stress by digitally distributing sexualized (violent) images and video recordings within the reference system of those affected.Keywords: sexualized violence, children and youth, grooming, offender strategies, digital media
Procedia PDF Downloads 1833040 The Effect of Filter Cake Powder on Soil Stability Enhancement in Active Sand Dunes, In the Long and Short Term
Authors: Irit Rutman Halili, Tehila Zvulun, Natali Elgabsi, Revaya Cohen, Shlomo Sarig
Abstract:
Active sand dunes (ASD) may cause significant damage to field crops and livelihood, and therefore, it is necessary to find a treatment that would enhance ADS soil stability. Biological soil crusts (biocrusts) contain microorganisms on the soil surface. Metabolic polysaccharides secreted by biocrust cyanobacteria glue the soil particles into aggregates, thereby stabilizing the soil surface. Filter cake powder (FCP) is a waste by-product in the final stages of the production of sugar from sugarcane, and its disposal causes significant environmental pollution. FCP contains high concentrations of polysaccharides and has recently been shown to be soil stability enhancing agent in ASD. It has been reported that adding FCP to the ASD soil surface by dispersal significantly increases the level of penetration resistance of soil biocrust (PRSB) nine weeks after a single treatment. However, it was not known whether a similar effect could be obtained by administering the FCP in liquid form by means of spraying. It has now been found that spraying a water solution of FCP onto the ASD soil surface significantly increased the level of penetration resistance of soil biocrust (PRSB) three weeks after a single treatment. These results suggest that FCP spraying can be used as a short-term soil stability-enhancing agent for ASD, while administration by dispersal might be more efficient over the long term. Finally, an additional benefit of using FCP as a soil stabilizer, either by dispersal or by spraying, is the reduction in environmental pollution that would otherwise result from the disposal of FCP solid waste.Keywords: active sand dunes, filter cake powder, biological soil crusts, penetration resistance of soil biocrust
Procedia PDF Downloads 1643039 The Digital Library and Its Influential Role in Developing the Establishment of the Grand Egyptian Museum
Authors: Gourg Ebrahim Shafik Eskandar
Abstract:
The essential role of the digital library in developing museum display methods, recording ancient Egyptian antiquities, facilitating scientific research and storing antiquities in the Grand Egyptian Museum, which helped and saved a lot of time and money spent to equip the Grand Egyptian Museum. The technology of digital library, linking it to ancient Egyptian antiquities and the latest results, which scientific research has reached in the field of libraries and its impact on many areas of tourism and antiquities. The research also aims to show the main role of the digital library and the Arab countries emulating European countries in digitizing libraries and recent developments in Egyptian libraries and their role in many areas of life and linking them to Egyptology. The research will also explain how the museum display methods will be developed in the Grand Egyptian Museum, and the recording of ancient Egyptian antiquities in order to facilitate the process of scientific research and methods of storing antiquities, and it will also work to save time and effort for researchers. The research will also deal with lighting, and its prominent role in the display in the interior design and coordination of the Grand Egyptian Museum, through which the unique artifacts and artifacts displayed can be displayed, and they can be used in a strong or simple form. Depending on the condition of the piece to be displayed. The research will also go to show the role of the digital library in how the Grand Egyptian Museum contains gathering areas and how to distribute spaces, guidance, information, reception, libraries, lecture halls, restaurants, cafeterias, shops, permanent and temporary galleries, and bathrooms.Keywords: grand egyptian museum, egyptian, museum, egyptian museum
Procedia PDF Downloads 203038 Investigating Elements That Influence Higher Education Institutions’ Digital Maturity
Authors: Zarah M. Bello, Nathan Baddoo, Mariana Lilley, Paul Wernick
Abstract:
In this paper, we present findings from a multi-part study to evaluate candidate elements reflecting the level of digital capability maturity (DCM) in higher education and the relationship between these elements. We will use these findings to propose a model of DCM for educational institutions. We suggest that the success of learning in higher education is dependent in part on the level of maturity of digital capabilities of institutions as well as the abilities of learners and those who support the learning process. It is therefore important to have a good understanding of the elements that underpin this maturity as well as their impact and interactions in order to better exploit the benefits that technology presents to the modern learning environment and support its continued improvement. Having identified ten candidate elements of digital capability that we believe support the level of a University’s maturity in this area as well as a number of relevant stakeholder roles, we conducted two studies utilizing both quantitative and qualitative research methods. In the first of these studies, 85 electronic questionnaires were completed by various stakeholders in a UK university, with a 100% response rate. We also undertook five in-depth interviews with management stakeholders in the same university. We then utilized statistical analysis to process the survey data and conducted a textual analysis of the interview transcripts. Our findings support our initial identification of candidate elements and support our contention that these elements interact in a multidimensional manner. This multidimensional dynamic suggests that any proposal for improvement in digital capability must reflect the interdependency and cross-sectional relationship of the elements that contribute to DCM. Our results also indicate that the notion of DCM is strongly data-centric and that any proposed maturity model must reflect the role of data in driving maturity and improvement. We present these findings as a key step towards the design of an operationalisable DCM maturity model for universities.Keywords: digital capability, elements, maturity, maturity framework, university
Procedia PDF Downloads 1433037 AI as a Tool Hindering Digital Education
Authors: Justyna Żywiołek, Marek Matulewski
Abstract:
The article presents the results of a survey conducted among students from various European countries. The aim of the study was to understand how artificial intelligence (AI) affects educational processes in a digital environment. The survey covered a wide range of topics, including students' understanding and use of AI, its impact on motivation and engagement, interaction and support issues, accessibility and equity, and data security and privacy concerns. Most respondents admitted having difficulties comprehending the advanced functions of AI in educational tools. Many students believe that excessive use of AI in education can decrease their motivation for self-study and active participation in classes. Additionally, students reported that interaction with AI-based tools is often less satisfying compared to direct contact with teachers. Furthermore, the survey highlighted inequalities in access to advanced AI tools, which can widen the educational gap between students from different economic backgrounds. Students also expressed concerns about the security and privacy of their personal data collected and processed by AI systems. The findings suggest that while AI has the potential to support digital education, significant challenges need to be addressed to make these tools more effective and acceptable for students. Recommendations include increasing training for students and teachers on using AI, providing more interactive and engaging forms of education, and implementing stricter regulations on data protection.Keywords: AI, digital education, education tools, motivation and engagement
Procedia PDF Downloads 283036 Diminishing Constitutional Hyper-Rigidity by Means of Digital Technologies: A Case Study on E-Consultations in Canada
Authors: Amy Buckley
Abstract:
The purpose of this article is to assess the problem of constitutional hyper-rigidity to consider how it and the associated tensions with democratic constitutionalism can be diminished by means of using digital democratic technologies. In other words, this article examines how digital technologies can assist us in ensuring fidelity to the will of the constituent power without paying the price of hyper-rigidity. In doing so, it is impossible to ignore that digital strategies can also harm democracy through, for example, manipulation, hacking, ‘fake news,’ and the like. This article considers the tension between constitutional hyper-rigidity and democratic constitutionalism and the relevant strengths and weaknesses of digital democratic strategies before undertaking a case study on Canadian e-consultations and drawing its conclusions. This article observes democratic constitutionalism through the lens of the theory of deliberative democracy to suggest that the application of digital strategies can, notwithstanding their pitfalls, improve a constituency’s amendment culture and, thus, diminish constitutional hyper-rigidity. Constitutional hyper-rigidity is not a new or underexplored concept. At a high level, a constitution can be said to be ‘hyper-rigid’ when its formal amendment procedure is so difficult to enact that it does not take place or is limited in its application. This article claims that hyper-rigidity is one problem with ordinary constitutionalism that fails to satisfy the principled requirements of democratic constitutionalism. Given the rise and development of technology that has taken place since the Digital Revolution, there has been a significant expansion in the possibility for digital democratic strategies to overcome the democratic constitutionalism failures resulting from constitutional hyper-rigidity. Typically, these strategies have included, inter alia, e- consultations, e-voting systems, and online polling forums, all of which significantly improve the ability of politicians and judges to directly obtain the opinion of constituents on any number of matters. This article expands on the application of these strategies through its Canadian e-consultation case study and presents them as a solution to poor amendment culture and, consequently, constitutional hyper-rigidity. Hyper-rigidity is a common descriptor of many written and unwritten constitutions, including the United States, Australian, and Canadian constitutions as just some examples. This article undertakes a case study on Canada, in particular, as it is a jurisdiction less commonly cited in academic literature generally concerned with hyper-rigidity and because Canada has to some extent, championed the use of e-consultations. In Part I of this article, I identify the problem, being that the consequence of constitutional hyper-rigidity is in tension with the principles of democratic constitutionalism. In Part II, I identify and explore a potential solution, the implementation of digital democratic strategies as a means of reducing constitutional hyper-rigidity. In Part III, I explore Canada’s e-consultations as a case study for assessing whether digital democratic strategies do, in fact, improve a constituency’s amendment culture thus reducing constitutional hyper-rigidity and the associated tension that arises with the principles of democratic constitutionalism. The idea is to run a case study and then assess whether I can generalise the conclusions.Keywords: constitutional hyper-rigidity, digital democracy, deliberative democracy, democratic constitutionalism
Procedia PDF Downloads 763035 Open Data for e-Governance: Case Study of Bangladesh
Authors: Sami Kabir, Sadek Hossain Khoka
Abstract:
Open Government Data (OGD) refers to all data produced by government which are accessible in reusable way by common people with access to Internet and at free of cost. In line with “Digital Bangladesh” vision of Bangladesh government, the concept of open data has been gaining momentum in the country. Opening all government data in digital and customizable format from single platform can enhance e-governance which will make government more transparent to the people. This paper presents a well-in-progress case study on OGD portal by Bangladesh Government in order to link decentralized data. The initiative is intended to facilitate e-service towards citizens through this one-stop web portal. The paper further discusses ways of collecting data in digital format from relevant agencies with a view to making it publicly available through this single point of access. Further, possible layout of this web portal is presented.Keywords: e-governance, one-stop web portal, open government data, reusable data, web of data
Procedia PDF Downloads 3553034 Design and Implementation of Flexible Metadata Editing System for Digital Contents
Authors: K. W. Nam, B. J. Kim, S. J. Lee
Abstract:
Along with the development of network infrastructures, such as high-speed Internet and mobile environment, the explosion of multimedia data is expanding the range of multimedia services beyond voice and data services. Amid this flow, research is actively being done on the creation, management, and transmission of metadata on digital content to provide different services to users. This paper proposes a system for the insertion, storage, and retrieval of metadata about digital content. The metadata server with Binary XML was implemented for efficient storage space and retrieval speeds, and the transport data size required for metadata retrieval was simplified. With the proposed system, the metadata could be inserted into the moving objects in the video, and the unnecessary overlap could be minimized by improving the storage structure of the metadata. The proposed system can assemble metadata into one relevant topic, even if it is expressed in different media or in different forms. It is expected that the proposed system will handle complex network types of data.Keywords: video, multimedia, metadata, editing tool, XML
Procedia PDF Downloads 1713033 The Impact of Digital Transformation on the Construction Industry in Kuwait
Authors: M. Aladwani, Y. Alarfaj
Abstract:
The construction industry is currently experiencing a shift towards digitisation. This transformation is driven by adopting technologies like Building Information Modelling (BIM), drones, and augmented reality (AR). These advancements are revolutionizing the process of designing, constructing, and operating projects. BIM, for instance, is a new way of communicating and exploiting technology such as software and machinery. It enables the creation of a replica or virtual model of buildings or infrastructure projects. It facilitates simulating construction procedures, identifying issues beforehand, and optimizing designs accordingly. Drones are another tool in this revolution, as they can be utilized for site surveys, inspections, and even deliveries. Moreover, AR technology provides real-time information to workers involved in the project. Implementing these technologies in the construction industry has brought about improvements in efficiency, safety measures, and sustainable practices. BIM helps minimize rework and waste materials, while drones contribute to safety by reducing workers' exposure to areas. Additionally, AR plays a role in worker safety by delivering instructions and guidance during operations. Although the digital transformation within the construction industry is still in its early stages, it holds the potential to reshape project delivery methods entirely. By embracing these technologies, construction companies can boost their profitability while simultaneously reducing their environmental impact and ensuring safer practices.Keywords: BIM, digital construction, construction technologies, digital transformation
Procedia PDF Downloads 863032 Crosssampler: A Digital Convolution Cross Synthesis Instrument
Authors: Jimmy Eadie
Abstract:
Convolutional Cross Synthesis (CCS) has emerged as a powerful technique for blending input signals to create hybrid sounds. It has significantly expanded the horizons of digital signal processing, enabling artists to explore audio effects. However, the conventional applications of CCS primarily revolve around reverberation and room simulation rather than being utilized as a creative synthesis method. In this paper, we present the design of a digital instrument called CrossSampler that harnesses a parametric approach to convolution cross-synthesis, which involves using adjustable parameters to control the blending of audio signals through convolution. These parameters allow for customization of the resulting sound, offering greater creative control and flexibility. It enables users to shape the output by manipulating factors such as duration, intensity, and spectral characteristics. This approach facilitates experimentation and exploration in sound design and opens new sonic possibilities.Keywords: convolution, synthesis, sampling, virtual instrument
Procedia PDF Downloads 643031 Smartphone Video Source Identification Based on Sensor Pattern Noise
Authors: Raquel Ramos López, Anissa El-Khattabi, Ana Lucila Sandoval Orozco, Luis Javier García Villalba
Abstract:
An increasing number of mobile devices with integrated cameras has meant that most digital video comes from these devices. These digital videos can be made anytime, anywhere and for different purposes. They can also be shared on the Internet in a short period of time and may sometimes contain recordings of illegal acts. The need to reliably trace the origin becomes evident when these videos are used for forensic purposes. This work proposes an algorithm to identify the brand and model of mobile device which generated the video. Its procedure is as follows: after obtaining the relevant video information, a classification algorithm based on sensor noise and Wavelet Transform performs the aforementioned identification process. We also present experimental results that support the validity of the techniques used and show promising results.Keywords: digital video, forensics analysis, key frame, mobile device, PRNU, sensor noise, source identification
Procedia PDF Downloads 4283030 Digital Forensics Analysis Focusing on the Onion Router Browser Artifacts in Windows 10
Authors: Zainurrasyid Abdullah, Mohamed Fadzlee Sulaiman, Muhammad Fadzlan Zainal, M. Zabri Adil Talib, Aswami Fadillah M. Ariffin
Abstract:
The Onion Router (Tor) browser is a well-known tool and widely used by people who seeking for web anonymity when browsing the internet. Criminals are taking this advantage to be anonymous over the internet. Accessing the dark web could be the significant reason for the criminal in order for them to perform illegal activities while maintaining their anonymity. For a digital forensic analyst, it is crucial to extract the trail of evidence in proving that the criminal’s computer has used Tor browser to conduct such illegal activities. By applying the digital forensic methodology, several techniques could be performed including application analysis, memory analysis, and registry analysis. Since Windows 10 is the latest operating system released by Microsoft Corporation, this study will use Windows 10 as the operating system platform that running Tor browser. From the analysis, significant artifacts left by Tor browser were discovered such as the execution date, application installation date and browsing history that can be used as an evidence. Although Tor browser was designed to achieved anonymity, there is still some trail of evidence can be found in Windows 10 platform that can be useful for investigation.Keywords: artifacts analysis, digital forensics, forensic analysis, memory analysis, registry analysis, tor browser, Windows 10
Procedia PDF Downloads 1703029 A Discussion on the Design Practice of College Students for Virtual Avatars in Social Media Ecology
Authors: Mei-Chun Chang
Abstract:
Due to digital transformation and social media development in recent years, various real-time interactive digital tools have been developed to meet the design demands for virtual reality avatars, which also promote digital content learners' active participation in the creation process. As a result, new social media design tools have the characteristics of intuitive operation with a simplified interface for fast production, from which works can be simply created. This study carried out observations, records, questionnaire surveys, and interviews on the creation and learning of visual avatars made by students of the National Taiwan University of Science and Technology (NTUST) with the VRoid Studio 3D modeling tool so as to explore their learning effectiveness on the design of visual avatars. According to the results of this study, the VRoid Studio 3D character modeling tool has a positive impact on the learners and helps to improve their learning effectiveness. Students with low academic achievements said that they could complete the conceived modeling with their own thinking by using the design tool, which increased their sense of accomplishment. Conclusions are drawn according to the results, and relevant future suggestions are put forward.Keywords: virtual avatar, character design, social media, vroid studio, creation, digital learning
Procedia PDF Downloads 1903028 Non-Invasive Imaging of Tissue Using Near Infrared Radiations
Authors: Ashwani Kumar Aggarwal
Abstract:
NIR Light is non-ionizing and can pass easily through living tissues such as breast without any harmful effects. Therefore, use of NIR light for imaging the biological tissue and to quantify its optical properties is a good choice over other invasive methods. Optical tomography involves two steps. One is the forward problem and the other is the reconstruction problem. The forward problem consists of finding the measurements of transmitted light through the tissue from source to detector, given the spatial distribution of absorption and scattering properties. The second step is the reconstruction problem. In X-ray tomography, there is standard method for reconstruction called filtered back projection method or the algebraic reconstruction methods. But this method cannot be applied as such, in optical tomography due to highly scattering nature of biological tissue. A hybrid algorithm for reconstruction has been implemented in this work which takes into account the highly scattered path taken by photons while back projecting the forward data obtained during Monte Carlo simulation. The reconstructed image suffers from blurring due to point spread function. This blurred reconstructed image has been enhanced using a digital filter which is optimal in mean square sense.Keywords: least-squares optimization, filtering, tomography, laser interaction, light scattering
Procedia PDF Downloads 3163027 A Subband BSS Structure with Reduced Complexity and Fast Convergence
Authors: Salah Al-Din I. Badran, Samad Ahmadi, Ismail Shahin
Abstract:
A blind source separation method is proposed; in this method, we use a non-uniform filter bank and a novel normalisation. This method provides a reduced computational complexity and increased convergence speed comparing to the full-band algorithm. Recently, adaptive sub-band scheme has been recommended to solve two problems: reduction of computational complexity and increase the convergence speed of the adaptive algorithm for correlated input signals. In this work, the reduction in computational complexity is achieved with the use of adaptive filters of orders less than the full-band adaptive filters, which operate at a sampling rate lower than the sampling rate of the input signal. The decomposed signals by analysis bank filter are less correlated in each subband than the input signal at full bandwidth, and can promote better rates of convergence.Keywords: blind source separation, computational complexity, subband, convergence speed, mixture
Procedia PDF Downloads 5793026 Cybersecurity Challenges in Africa
Authors: Chimmoe Fomo Michelle Larissa
Abstract:
The challenges of cybersecurity in Africa are increasingly significant as the continent undergoes rapid digital transformation. With the rise of internet connectivity, mobile phone usage, and digital financial services, Africa faces unique cybersecurity threats. The significance of this study lies in understanding these threats and the multifaceted challenges that hinder effective cybersecurity measures across the continent. The methodologies employed in this study include a comprehensive analysis of existing cybersecurity frameworks in various African countries, surveys of key stakeholders in the digital ecosystem, and case studies of cybersecurity incidents. These methodologies aim to provide a detailed understanding of the current cybersecurity landscape, identify gaps in existing policies, and evaluate the effectiveness of implemented security measures. Major findings of the study indicate that Africa faces numerous cybersecurity challenges, including inadequate regulatory frameworks, insufficient cybersecurity awareness, and a shortage of skilled professionals. Additionally, the prevalence of cybercrime, such as financial fraud, data breaches, and ransomware attacks, exacerbates the situation. The study also highlights the role of international cooperation and regional collaboration in addressing these challenges and improving overall cybersecurity resilience. In conclusion, addressing cybersecurity challenges in Africa requires a multifaceted approach that involves strengthening regulatory frameworks, enhancing public awareness, and investing in cybersecurity education and training. The study underscores the importance of regional and international collaboration in building a robust cybersecurity infrastructure capable of mitigating the risks associated with the continent's digital growth.Keywords: Africa, cybersecurity, challenges, digital infrastructure, cybercrime
Procedia PDF Downloads 403025 Islamic Geometric Design: Infinite Point or Creativity through Compass and Digital
Authors: Ridzuan Hussin, Mohd Zaihidee Arshad
Abstract:
The creativity of earlier artists and sculptors in designing geometric is extraordinary provided with only a compass. Indeed, geometric in Islamic art and design are unique and have their own aesthetic values. In order to further understand geometric, self-learning with the approach of hands on would be appropriate. For this study, Islamic themed geometric designed and created, concerning only; i. The Square Repetition Unit and √2, ii. The Hexagonal Repetition Unit and √3 and iii. Double Hexagon. The aim of this research is to evaluate the creativity of Islamic geometric pattern artworks, through Fundamental Arts and Gestalt theory. Data was collected using specific tasks, and this research intends to identify the difference of Islamic geometric between 21 untitled selected geometric artworks (conventional design method), and 25 digital untitled geometric pattern artworks method. The evaluation of creativity, colors, layout, pattern and unity is known to be of utmost importance, although there are differences in the conventional or the digital approach.Keywords: Islamic geometric design, Gestalt, fundamentals of art, patterns
Procedia PDF Downloads 2483024 The Meaningful Pixel and Texture: Exploring Digital Vision and Art Practice Based on Chinese Cosmotechnics
Authors: Xingdu Wang, Charlie Gere, Emma Rose, Yuxuan Zhao
Abstract:
The study introduces a fresh perspective on the digital realm through an examination of the Chinese concept of Xiang, elucidating how it can build an understanding of pixels and textures on screens as digital trigrams. This concept attempts to offer an outlook on the intersection of digital technology and the natural world, thereby contributing to discussions about the harmonious relationship between humans and technology. The study looks for the ancient Chinese theory of Xiang as a key to establishing the theories and practices to respond to the problem of Contemporary Chinese technics. Xiang is a Chinese method of understanding the essentials of things through appearances, which differs from the method of science in the Westen. Xiang, the basement of Chinese visual art, is rooted in ancient Chinese philosophy and connected to the eight trigrams. The discussion of Xiang connects art, philosophy, and technology. This paper connects the meaning of Xiang with the 'truth appearing' philosophically through the analysis of the concepts of phenomenon and noumenon and the unique Chinese way of observing. Hereafter, the historical interconnection between ancient painting and writing in China emphasizes their relationship between technical craftsmanship and artistic expression. In digital, the paper blurs the traditional boundaries between images and text on digital screens in theory. Lastly, this study identified an ensemble concept relating to pixels and textures in computer vision, drawing inspiration from AI image recognition in Chinese paintings. In art practice, by presenting a fluid visual experience in the form of pixels, which mimics the flow of lines in traditional calligraphy and painting, it is hoped that the viewer will be brought back to the process of the truth appearing as defined by the 'Xiang’.Keywords: Chinese cosmotechnics, computer vision, contemporary Neo-Confucianism, texture and pixel, Xiang
Procedia PDF Downloads 643023 Design and Implementation of A 10-bit SAR ADC with A Programmable Reference
Authors: Hasmayadi Abdul Majid, Yuzman Yusoff, Noor Shelida Salleh
Abstract:
This paper presents the development of a single-ended 38.5 kS/s 10-bit programmable reference SAR ADC which is realized in MIMOS’s 0.35 µm CMOS process. The design uses a resistive DAC, a dynamic comparator with pre-amplifier and a SAR digital logic to create 10 effective bits ADC. A programmable reference circuitry allows the ADC to operate with different input range from 0.6 V to 2.1 V. A single ended 38.5 kS/s 10-bit programmable reference SAR ADC was proposed and implemented in a 0.35 µm CMOS technology and consumed less than 7.5 mW power with a 3 V supply.Keywords: successive approximation register analog-to-digital converter, SAR ADC, resistive DAC, programmable reference
Procedia PDF Downloads 5183022 Oil Water Treatment by Nutshell and Dates Pits
Authors: Abdalrahman D. Alsulaili, Sheikha Y. Aljeraiwi, Athba N. Almanaie, Raghad Y. Alhajeri, Mariam Z. Almijren
Abstract:
The water accompanying oil in the oil production process is increasing and due to its increasing rates a problem with handling it occurred. Current solutions like discharging into the environment, dumping water in evaporation pits, usage in the industry and reinjection in oil reservoirs to enhance oil production are used worldwide. The water injection method has been introduced to the oil industry with a process that either immediately injects water to the reservoir or goes to the filtration process before injection all depending on the porosity of the soil. Reinjection of unfiltered effluent water with high Total Suspended Solid (TSS) and Oil in Water (O/W) into soils with low porosity cause a blockage of pores, whereas soils with high porosity do not need high water quality. Our study mainly talks about the filtration and adsorption of the water using organic media as the adsorbent. An adsorbent is a substance that has the ability to physically hold another substance in its surface. Studies were done on nutshell and date pits with different surface areas and flow rates by using a 10inch filter connected with three tanks to perform as one system for the filtration process. Our approach in the filtration process using different types of medias went as follow: starting first with crushed nutshell, second with ground nutshell, and third using carbonized date pits with medium flow rate then high flow rate to compare different results. The result came out nearly as expected from our study where both O/W and TSS were reduced from our oily water sample by using this organic material. The effect of specific area was noticed when using nutshell as the filter media, where the crushed nutshell gave us better results than ground nutshell. The effect of flow rate was noticed when using carbonized date pits as the filter media whereas the treated water became more acceptable when the flow rate was on the medium level.Keywords: date pits, nutshell, oil water, TSS
Procedia PDF Downloads 1563021 Analytical Slope Stability Analysis Based on the Statistical Characterization of Soil Shear Strength
Authors: Bernardo C. P. Albuquerque, Darym J. F. Campos
Abstract:
Increasing our ability to solve complex engineering problems is directly related to the processing capacity of computers. By means of such equipments, one is able to fast and accurately run numerical algorithms. Besides the increasing interest in numerical simulations, probabilistic approaches are also of great importance. This way, statistical tools have shown their relevance to the modelling of practical engineering problems. In general, statistical approaches to such problems consider that the random variables involved follow a normal distribution. This assumption tends to provide incorrect results when skew data is present since normal distributions are symmetric about their means. Thus, in order to visualize and quantify this aspect, 9 statistical distributions (symmetric and skew) have been considered to model a hypothetical slope stability problem. The data modeled is the friction angle of a superficial soil in Brasilia, Brazil. Despite the apparent universality, the normal distribution did not qualify as the best fit. In the present effort, data obtained in consolidated-drained triaxial tests and saturated direct shear tests have been modeled and used to analytically derive the probability density function (PDF) of the safety factor of a hypothetical slope based on Mohr-Coulomb rupture criterion. Therefore, based on this analysis, it is possible to explicitly derive the failure probability considering the friction angle as a random variable. Furthermore, it is possible to compare the stability analysis when the friction angle is modelled as a Dagum distribution (distribution that presented the best fit to the histogram) and as a Normal distribution. This comparison leads to relevant differences when analyzed in light of the risk management.Keywords: statistical slope stability analysis, skew distributions, probability of failure, functions of random variables
Procedia PDF Downloads 3383020 Improving Young Learners' Vocabulary Acquisition: A Pilot Program in a Game-Based Environment
Authors: Vasiliki Stratidou
Abstract:
Modern simulation mobile games have the potential to enhance students’ interest, motivation and creativity. Research conducted on the effectiveness of digital games for educational purposes has shown that such games are also ideal at providing an appropriate environment for language learning. The paper examines the issue of simulation mobile games in regard to the potential positive impacts on L2 vocabulary learning. Sixteen intermediate level students, aged 10-14, participated in the experimental study for four weeks. The participants were divided into experimental (8 participants) and control group (8 participants). The experimental group was planned to learn some new vocabulary words via digital games while the control group used a reading passage to learn the same vocabulary words. The study investigated the effect of mobile games as well as the traditional learning methods on Greek EFL learners’ vocabulary learning in a pre-test, an immediate post-test, and a two-week delayed retention test. A teacher’s diary and learners’ interviews were also used as tools to estimate the effectiveness of the implementation. The findings indicated that the experimental group outperformed the control group in acquiring new words through mobile games. Therefore, digital games proved to be an effective tool in learning English vocabulary.Keywords: control group, digital games, experimental group, second language vocabulary learning, simulation games
Procedia PDF Downloads 2383019 The Application of Video Segmentation Methods for the Purpose of Action Detection in Videos
Authors: Nassima Noufail, Sara Bouhali
Abstract:
In this work, we develop a semi-supervised solution for the purpose of action detection in videos and propose an efficient algorithm for video segmentation. The approach is divided into video segmentation, feature extraction, and classification. In the first part, a video is segmented into clips, and we used the K-means algorithm for this segmentation; our goal is to find groups based on similarity in the video. The application of k-means clustering into all the frames is time-consuming; therefore, we started by the identification of transition frames where the scene in the video changes significantly, and then we applied K-means clustering into these transition frames. We used two image filters, the gaussian filter and the Laplacian of Gaussian. Each filter extracts a set of features from the frames. The Gaussian filter blurs the image and omits the higher frequencies, and the Laplacian of gaussian detects regions of rapid intensity changes; we then used this vector of filter responses as an input to our k-means algorithm. The output is a set of cluster centers. Each video frame pixel is then mapped to the nearest cluster center and painted with a corresponding color to form a visual map. The resulting visual map had similar pixels grouped. We then computed a cluster score indicating how clusters are near each other and plotted a signal representing frame number vs. clustering score. Our hypothesis was that the evolution of the signal would not change if semantically related events were happening in the scene. We marked the breakpoints at which the root mean square level of the signal changes significantly, and each breakpoint is an indication of the beginning of a new video segment. In the second part, for each segment from part 1, we randomly selected a 16-frame clip, then we extracted spatiotemporal features using convolutional 3D network C3D for every 16 frames using a pre-trained model. The C3D final output is a 512-feature vector dimension; hence we used principal component analysis (PCA) for dimensionality reduction. The final part is the classification. The C3D feature vectors are used as input to a multi-class linear support vector machine (SVM) for the training model, and we used a multi-classifier to detect the action. We evaluated our experiment on the UCF101 dataset, which consists of 101 human action categories, and we achieved an accuracy that outperforms the state of art by 1.2%.Keywords: video segmentation, action detection, classification, Kmeans, C3D
Procedia PDF Downloads 773018 Immature Palm Tree Detection Using Morphological Filter for Palm Counting with High Resolution Satellite Image
Authors: Nur Nadhirah Rusyda Rosnan, Nursuhaili Najwa Masrol, Nurul Fatiha MD Nor, Mohammad Zafrullah Mohammad Salim, Sim Choon Cheak
Abstract:
Accurate inventories of oil palm planted areas are crucial for plantation management as this would impact the overall economy and production of oil. One of the technological advancements in the oil palm industry is semi-automated palm counting, which is replacing conventional manual palm counting via digitizing aerial imagery. Most of the semi-automated palm counting method that has been developed was limited to mature palms due to their ideal canopy size represented by satellite image. Therefore, immature palms were often left out since the size of the canopy is barely visible from satellite images. In this paper, an approach using a morphological filter and high-resolution satellite image is proposed to detect immature palm trees. This approach makes it possible to count the number of immature oil palm trees. The method begins with an erosion filter with an appropriate window size of 3m onto the high-resolution satellite image. The eroded image was further segmented using watershed segmentation to delineate immature palm tree regions. Then, local minimum detection was used because it is hypothesized that immature oil palm trees are located at the local minimum within an oil palm field setting in a grayscale image. The detection points generated from the local minimum are displaced to the center of the immature oil palm region and thinned. Only one detection point is left that represents a tree. The performance of the proposed method was evaluated on three subsets with slopes ranging from 0 to 20° and different planting designs, i.e., straight and terrace. The proposed method was able to achieve up to more than 90% accuracy when compared with the ground truth, with an overall F-measure score of up to 0.91.Keywords: immature palm count, oil palm, precision agriculture, remote sensing
Procedia PDF Downloads 76