Search results for: digital tools
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 6369

Search results for: digital tools

5559 July 15 Coup Attempt and the Use of New Communication Technologies

Authors: Yasemin Gulsen Yilmaz, Suleyman Hakan Yilmaz, Muhammet Erbay

Abstract:

The new communication technologies have gradually improved its efficiency in all fields of life and made its presence irreplaceable. These technologies which appear in every aspect of life differently showed itself during the failed coup attempt in Turkey too. The evening of July 15, 2016, have already taken its place in the Turkish political history. In the evening of July 15, Turkish nation confronted to a coup attempted by a group within the Turkish Armed Forces. That evening, the scene of the confrontation between the coup attempters and the resisting civilians were watched minute-by-minute by the people using the new communication technologies. Pro-coup soldiers and the resisting groups that came face to face in the streets of metropolitan cities, made their in-group communications by using new media tools very actively. New media turned into the most important weapon both for coup plotters and for those who resisted. In the morning of next day, whoever used these tools better had the upper hand. The civilians were successful in protecting democracy not only by resisting against tanks and bullets but also by following the internet, organising in social media, sharing information-photos on the net and telling large masses their experiences through these technologies. In this study, we focused on and analysed the use of new media both by coup soldiers and resisting civilians during the failed coup attempt in July 15. Within the scope of this study, coup attempt news that took place in printed media within one week were examined; the information about the use of new media tools during the night of failed coup were compiled; and it was determined how, to what extend and what for these tools were used and how effective they were.

Keywords: communication, July 15, new media, media

Procedia PDF Downloads 244
5558 A Comprehensive Methodology for Voice Segmentation of Large Sets of Speech Files Recorded in Naturalistic Environments

Authors: Ana Londral, Burcu Demiray, Marcus Cheetham

Abstract:

Speech recording is a methodology used in many different studies related to cognitive and behaviour research. Modern advances in digital equipment brought the possibility of continuously recording hours of speech in naturalistic environments and building rich sets of sound files. Speech analysis can then extract from these files multiple features for different scopes of research in Language and Communication. However, tools for analysing a large set of sound files and automatically extract relevant features from these files are often inaccessible to researchers that are not familiar with programming languages. Manual analysis is a common alternative, with a high time and efficiency cost. In the analysis of long sound files, the first step is the voice segmentation, i.e. to detect and label segments containing speech. We present a comprehensive methodology aiming to support researchers on voice segmentation, as the first step for data analysis of a big set of sound files. Praat, an open source software, is suggested as a tool to run a voice detection algorithm, label segments and files and extract other quantitative features on a structure of folders containing a large number of sound files. We present the validation of our methodology with a set of 5000 sound files that were collected in the daily life of a group of voluntary participants with age over 65. A smartphone device was used to collect sound using the Electronically Activated Recorder (EAR): an app programmed to record 30-second sound samples that were randomly distributed throughout the day. Results demonstrated that automatic segmentation and labelling of files containing speech segments was 74% faster when compared to a manual analysis performed with two independent coders. Furthermore, the methodology presented allows manual adjustments of voiced segments with visualisation of the sound signal and the automatic extraction of quantitative information on speech. In conclusion, we propose a comprehensive methodology for voice segmentation, to be used by researchers that have to work with large sets of sound files and are not familiar with programming tools.

Keywords: automatic speech analysis, behavior analysis, naturalistic environments, voice segmentation

Procedia PDF Downloads 281
5557 The Interoperability between CNC Machine Tools and Robot Handling Systems Based on an Object-Oriented Framework

Authors: Pouyan Jahanbin, Mahmoud Houshmand, Omid Fatahi Valilai

Abstract:

A flexible manufacturing system (FMS) is a manufacturing system having the capability of handling the variations of products features that is the result of ever-changing customer demands. The flexibility of the manufacturing systems help to utilize the resources in a more effective manner. However, the control of such systems would be complicated and challenging. FMS needs CNC machines and robots and other resources for establishing the flexibility and enhancing the efficiency of the whole system. Also it needs to integrate the resources to reach required efficiency and flexibility. In order to reach this goal, an integrator framework is proposed in which the machining data of CNC machine tools is received through a STEP-NC file. The interoperability of the system is achieved by the information system. This paper proposes an information system that its data model is designed based on object oriented approach and is implemented through a knowledge-based system. The framework is connected to a database which is filled with robot’s control commands. The framework programs the robots by rules embedded in its knowledge based system. It also controls the interactions of CNC machine tools for loading and unloading actions by robot. As a result, the proposed framework improves the integration of manufacturing resources in Flexible Manufacturing Systems.

Keywords: CNC machine tools, industrial robots, knowledge-based systems, manufacturing recourses integration, flexible manufacturing system (FMS), object-oriented data model

Procedia PDF Downloads 455
5556 Enhancing Residential Architecture through Generative Design: Balancing Aesthetics, Legal Constraints, and Environmental Considerations

Authors: Milena Nanova, Radul Shishkov, Martin Georgiev, Damyan Damov

Abstract:

This research paper presents an in-depth exploration of the use of generative design in urban residential architecture, with a dual focus on aligning aesthetic values with legal and environmental constraints. The study aims to demonstrate how generative design methodologies can innovate residential building designs that are not only legally compliant and environmentally conscious but also aesthetically compelling. At the core of our research is a specially developed generative design framework tailored for urban residential settings. This framework employs computational algorithms to produce diverse design solutions, meticulously balancing aesthetic appeal with practical considerations. By integrating site-specific features, urban legal restrictions, and environmental factors, our approach generates designs that resonate with the unique character of urban landscapes while adhering to regulatory frameworks. The paper explores how modern digital tools, particularly computational design, and algorithmic modelling, can optimize the early stages of residential building design. By creating a basic parametric model of a residential district, the paper investigates how automated design tools can explore multiple design variants based on predefined parameters (e.g., building cost, dimensions, orientation) and constraints. The paper aims to demonstrate how these tools can rapidly generate and refine architectural solutions that meet the required criteria for quality of life, cost efficiency, and functionality. The study utilizes computational design for database processing and algorithmic modelling within the fields of applied geodesy and architecture. It focuses on optimizing the forms of residential development by adjusting specific parameters and constraints. The results of multiple iterations are analysed, refined, and selected based on their alignment with predefined quality and cost criteria. The findings of this research will contribute to a modern, complex approach to residential area design. The paper demonstrates the potential for integrating BIM models into the design process and their application in virtual 3D Geographic Information Systems (GIS) environments. The study also examines the transformation of BIM models into suitable 3D GIS file formats, such as CityGML, to facilitate the visualization and evaluation of urban planning solutions. In conclusion, our research demonstrates that a generative parametric approach based on real geodesic data and collaborative decision-making could be introduced in the early phases of the design process. This gives the designers powerful tools to explore diverse design possibilities, significantly improving the qualities of the investment during its entire lifecycle.

Keywords: architectural design, residential buildings, urban development, geodesic data, generative design, parametric models, workflow optimization

Procedia PDF Downloads 7
5555 Randomness in Cybertext: A Study on Computer-Generated Poetry from the Perspective of Semiotics

Authors: Hongliang Zhang

Abstract:

The use of chance procedures and randomizers in poetry-writing can be traced back to surrealist works, which, by appealing to Sigmund Freud's theories, were still logocentrism. In the 1960s, random permutation and combination were extensively used by the Oulipo, John Cage and Jackson Mac Low, which further deconstructed the metaphysical presence of writing. Today, the randomly-generated digital poetry has emerged as a genre of cybertext which should be co-authored by readers. At the same time, the classical theories have now been updated by cybernetics and media theories. N· Katherine Hayles put forward the concept of ‘the floating signifiers’ by Jacques Lacan to be the ‘the flickering signifiers’ , arguing that the technology per se has become a part of the textual production. This paper makes a historical review of the computer-generated poetry in the perspective of semiotics, emphasizing that the randomly-generated digital poetry which hands over the dual tasks of both interpretation and writing to the readers demonstrates the intervention of media technology in literature. With the participation of computerized algorithm and programming languages, poems randomly generated by computers have not only blurred the boundary between encoder and decoder, but also raises the issue of human-machine. It is also a significant feature of the cybertext that the productive process of the text is full of randomness.

Keywords: cybertext, digital poetry, poetry generator, semiotics

Procedia PDF Downloads 175
5554 Weapon-Being: Weaponized Design and Object-Oriented Ontology in Hypermodern Times

Authors: John Dimopoulos

Abstract:

This proposal attempts a refabrication of Heidegger’s classic thing-being and object-being analysis in order to provide better ontological tools for understanding contemporary culture, technology, and society. In his work, Heidegger sought to understand and comment on the problem of technology in an era of rampant innovation and increased perils for society and the planet. Today we seem to be at another crossroads in this course, coming after postmodernity, during which dreams and dangers of modernity augmented with critical speculations of the post-war era take shape. The new era which we are now living in, referred to as hypermodernity by researchers in various fields such as architecture and cultural theory, is defined by the horizontal implementation of digital technologies, cybernetic networks, and mixed reality. Technology today is rapidly approaching a turning point, namely the point of no return for humanity’s supervision over its creations. The techno-scientific civilization of the 21st century creates a series of problems, progressively more difficult and complex to solve and impossible to ignore, climate change, data safety, cyber depression, and digital stress being some of the most prevalent. Humans often have no other option than to address technology-induced problems with even more technology, as in the case of neuron networks, machine learning, and AI, thus widening the gap between creating technological artifacts and understanding their broad impact and possible future development. As all technical disciplines and particularly design, become enmeshed in a matrix of digital hyper-objects, a conceptual toolbox that allows us to handle the new reality becomes more and more necessary. Weaponized design, prevalent in many fields, such as social and traditional media, urban planning, industrial design, advertising, and the internet in general, hints towards an increase in conflicts. These conflicts between tech companies, stakeholders, and users with implications in politics, work, education, and production as apparent in the cases of Amazon workers’ strikes, Donald Trump’s 2016 campaign, Facebook and Microsoft data scandals, and more are often non-transparent to the wide public’s eye, thus consolidating new elites and technocratic classes and making the public scene less and less democratic. The new category proposed, weapon-being, is outlined in respect to the basic function of reducing complexity, subtracting materials, actants, and parameters, not strictly in favor of a humanistic re-orientation but in a more inclusive ontology of objects and subjects. Utilizing insights of Object-Oriented Ontology (OOO) and its schematization of technological objects, an outline for a radical ontology of technology is approached.

Keywords: design, hypermodernity, object-oriented ontology, weapon-being

Procedia PDF Downloads 152
5553 Digital Forgery Detection by Signal Noise Inconsistency

Authors: Bo Liu, Chi-Man Pun

Abstract:

A novel technique for digital forgery detection by signal noise inconsistency is proposed in this paper. The forged area spliced from the other picture contains some features which may be inconsistent with the rest part of the image. Noise pattern and the level is a possible factor to reveal such inconsistency. To detect such noise discrepancies, the test picture is initially segmented into small pieces. The noise pattern and level of each segment are then estimated by using various filters. The noise features constructed in this step are utilized in energy-based graph cut to expose forged area in the final step. Experimental results show that our method provides a good illustration of regions with noise inconsistency in various scenarios.

Keywords: forgery detection, splicing forgery, noise estimation, noise

Procedia PDF Downloads 461
5552 Investigating Best Strategies Towards Creating Alternative Assessment in Literature

Authors: Sandhya Rao Mehta

Abstract:

As ChatGpt and other Artificial Intelligence (AI) forms are becoming part of our regular academic world, the consequences are being gradually discussed. The extent to which an essay written by a student is itself of any value if it has been downloaded by some form of AI is perhaps central to this discourse. A larger question is whether writing should be taught as an academic skill at all. In literature classrooms, this has major consequences as writing a traditional paper is still the single most preferred form of assessment. This study suggests that it is imperative to investigate alternative forms of assessment in literature, not only because the existing forms can be written by AI, but in a larger sense, students are increasingly skeptical of the purpose of such work. The extent to which an essay actually helps the students professionally is a question that academia has not yet answered. This paper suggests that using real-world tasks like creating podcasts, video tutorials, and websites is a far better way to evaluate students' critical thinking and application of ideas, as well as to develop digital skills which are important to their future careers. Using the example of a course in literature, this study will examine the possibilities and challenges of creating digital projects as a way of confronting the complexities of student evaluation in the future. The study is based on a specific university English as a Foreign Language (EFL) context.

Keywords: assessment, literature, digital humanities, chatgpt

Procedia PDF Downloads 86
5551 Decolonizing Print Culture and Bibliography Through Digital Visualizations of Artists’ Books at the University of Miami

Authors: Alejandra G. Barbón, José Vila, Dania Vazquez

Abstract:

This study seeks to contribute to the advancement of library and archival sciences in the areas of records management, knowledge organization, and information architecture, particularly focusing on the enhancement of bibliographical description through the incorporation of visual interactive designs aimed to enrich the library users’ experience. In an era of heightened awareness about the legacy of hiddenness across special and rare collections in libraries and archives, along with the need for inclusivity in academia, the University of Miami Libraries has embarked on an innovative project that intersects the realms of print culture, decolonization, and digital technology. This proposal presents an exciting initiative to revitalize the study of Artists’ Books collections by employing digital visual representations to decolonize bibliographic records of some of the most unique materials and foster a more holistic understanding of cultural heritage. Artists' Books, a dynamic and interdisciplinary art form, challenge conventional bibliographic classification systems, making them ripe for the exploration of alternative approaches. This project involves the creation of a digital platform that combines multimedia elements for digital representations, interactive information retrieval systems, innovative information architecture, trending bibliographic cataloging and metadata initiatives, and collaborative curation to transform how we engage with and understand these collections. By embracing the potential of technology, we aim to transcend traditional constraints and address the historical biases that have influenced bibliographic practices. In essence, this study showcases a groundbreaking endeavor at the University of Miami Libraries that seeks to not only enhance bibliographic practices but also confront the legacy of hiddenness across special and rare collections in libraries and archives while strengthening conventional bibliographic description. By embracing digital visualizations, we aim to provide new pathways for understanding Artists' Books collections in a manner that is more inclusive, dynamic, and forward-looking. This project exemplifies the University’s dedication to fostering critical engagement, embracing technological innovation, and promoting diverse and equitable classifications and representations of cultural heritage.

Keywords: decolonizing bibliographic cataloging frameworks, digital visualizations information architecture platforms, collaborative curation and inclusivity for records management, engagement and accessibility increasing interaction design and user experience

Procedia PDF Downloads 74
5550 Air Handling Units Power Consumption Using Generalized Additive Model for Anomaly Detection: A Case Study in a Singapore Campus

Authors: Ju Peng Poh, Jun Yu Charles Lee, Jonathan Chew Hoe Khoo

Abstract:

The emergence of digital twin technology, a digital replica of physical world, has improved the real-time access to data from sensors about the performance of buildings. This digital transformation has opened up many opportunities to improve the management of the building by using the data collected to help monitor consumption patterns and energy leakages. One example is the integration of predictive models for anomaly detection. In this paper, we use the GAM (Generalised Additive Model) for the anomaly detection of Air Handling Units (AHU) power consumption pattern. There is ample research work on the use of GAM for the prediction of power consumption at the office building and nation-wide level. However, there is limited illustration of its anomaly detection capabilities, prescriptive analytics case study, and its integration with the latest development of digital twin technology. In this paper, we applied the general GAM modelling framework on the historical data of the AHU power consumption and cooling load of the building between Jan 2018 to Aug 2019 from an education campus in Singapore to train prediction models that, in turn, yield predicted values and ranges. The historical data are seamlessly extracted from the digital twin for modelling purposes. We enhanced the utility of the GAM model by using it to power a real-time anomaly detection system based on the forward predicted ranges. The magnitude of deviation from the upper and lower bounds of the uncertainty intervals is used to inform and identify anomalous data points, all based on historical data, without explicit intervention from domain experts. Notwithstanding, the domain expert fits in through an optional feedback loop through which iterative data cleansing is performed. After an anomalously high or low level of power consumption detected, a set of rule-based conditions are evaluated in real-time to help determine the next course of action for the facilities manager. The performance of GAM is then compared with other approaches to evaluate its effectiveness. Lastly, we discuss the successfully deployment of this approach for the detection of anomalous power consumption pattern and illustrated with real-world use cases.

Keywords: anomaly detection, digital twin, generalised additive model, GAM, power consumption, supervised learning

Procedia PDF Downloads 154
5549 China's Soft Power and Its Strategy in West Asia

Authors: Iman Shabanzadeh

Abstract:

The economic growth and the special model of development in China have caused sensitivity in the public opinion of the world regarding the nature of this growth and development. In this regard, the Chinese have tried to put an end to such alarming procedures by using all the tools at their disposal and seek to present a peaceful and cooperative image of themselves. In this way, one of the most important diplomatic tools that Beijing has used to reduce the concerns caused by the Threat Theory has been the use of soft power resources and its tools in its development policies. This article begins by analyzing the concept of soft power and examining its foundations in international relations, and continues to examine the components of soft power in its Chinese version. The main purpose of the article is to figure out about the position of West Asia in China's soft power strategy and resources China use to achieve its goals in this region. In response to the main question, the paper's hypothesis is that soft power in its Chinese version had significant differences from Joseph Nye's original idea. In fact, the Chinese have imported the American version of soft power and adjusted, strengthened and, in other words, internalized it with their abilities, capacities and political philosophy. Based on this, China's software presence in West Asia can be traced in three areas. The first source of China's soft power in this region of West Asia is cultural in nature and is realized through strategies such as "use of educational tools and methods", "media methods" and "tourism industry". The second source is related to political soft power, which is applied through the policy of "balance of influence" and the policy of "mediation" and relying on the "ideological foundations of Confucianism". The third source also refers to China's economic soft power and is realized through three tools: "energy exchanges", "foreign investments" and "Belt-Road initiative". The research method of this article is descriptive-analytical.

Keywords: soft power, cooperative power, china, west asia

Procedia PDF Downloads 60
5548 Implementation of ALD in Product Development: Study of ROPS to Improve Energy Absorption Performance Using Absorption Part

Authors: Zefry Darmawan, Shigeyuki Haruyama, Ken Kaminishi

Abstract:

Product development is a big issue in the industrial competition and takes a serious part in development of technology. Product development process could adapt high changes of market needs and transform into engineering concept in order to produce high-quality product. One of the latest methods in product development is Analysis-Led-Design (ALD). It utilizes digital engineering design tools with finite analysis to perform product robust analysis and valuable for product reliability assurance. Heavy machinery which operates under severe condition should maintain safety to the customer when faced with potential hazard. Cab frame should able to absorb the energy while collision. Through ALD, a series of improvement of cab frame to increase energy absorption was made and analyzed. Improvement was made by modifying shapes of frame and-or install absorption device in certain areas. Simulation result showed that install absorption device could increase absorption energy than modifying shape.

Keywords: ALD, ROPS, energy absorption, cab frame

Procedia PDF Downloads 371
5547 Spatial Information and Urbanizing Futures

Authors: Mohammad Talei, Neda Ranjbar Nosheri, Reza Kazemi Gorzadini

Abstract:

Today municipalities are searching for the new tools for increasing the public participation in different levels of urban planning. This approach of urban planning involves the community in planning process using participatory approaches instead of the long traditional top-down planning methods. These tools can be used to obtain the particular problems of urban furniture form the residents’ point of view. One of the tools that is designed with this goal is public participation GIS (PPGIS) that enables citizen to record and following up their feeling and spatial knowledge regarding main problems of the city, specifically urban furniture, in the form of maps. However, despite the good intentions of PPGIS, its practical implementation in developing countries faces many problems including the lack of basic supporting infrastructure and services and unavailability of sophisticated public participatory models. In this research we develop a PPGIS using of Web 2 to collect voluntary geodataand to perform spatial analysis based on Spatial OnLine Analytical Processing (SOLAP) and Spatial Data Mining (SDM). These tools provide urban planners with proper informationregarding the type, spatial distribution and the clusters of reported problems. This system is implemented in a case study area in Tehran, Iran and the challenges to make it applicable and its potential for real urban planning have been evaluated. It helps decision makers to better understand, plan and allocate scarce resources for providing most requested urban furniture.

Keywords: PPGIS, spatial information, urbanizing futures, urban planning

Procedia PDF Downloads 726
5546 Estimating X-Ray Spectra for Digital Mammography by Using the Expectation Maximization Algorithm: A Monte Carlo Simulation Study

Authors: Chieh-Chun Chang, Cheng-Ting Shih, Yan-Lin Liu, Shu-Jun Chang, Jay Wu

Abstract:

With the widespread use of digital mammography (DM), radiation dose evaluation of breasts has become important. X-ray spectra are one of the key factors that influence the absorbed dose of glandular tissue. In this study, we estimated the X-ray spectrum of DM using the expectation maximization (EM) algorithm with the transmission measurement data. The interpolating polynomial model proposed by Boone was applied to generate the initial guess of the DM spectrum with the target/filter combination of Mo/Mo and the tube voltage of 26 kVp. The Monte Carlo N-particle code (MCNP5) was used to tally the transmission data through aluminum sheets of 0.2 to 3 mm. The X-ray spectrum was reconstructed by using the EM algorithm iteratively. The influence of the initial guess for EM reconstruction was evaluated. The percentage error of the average energy between the reference spectrum inputted for Monte Carlo simulation and the spectrum estimated by the EM algorithm was -0.14%. The normalized root mean square error (NRMSE) and the normalized root max square error (NRMaSE) between both spectra were 0.6% and 2.3%, respectively. We conclude that the EM algorithm with transmission measurement data is a convenient and useful tool for estimating x-ray spectra for DM in clinical practice.

Keywords: digital mammography, expectation maximization algorithm, X-Ray spectrum, X-Ray

Procedia PDF Downloads 730
5545 Interfacing and Replication of Electronic Machinery Using MATLAB/SIMULINK

Authors: Abdulatif Abdulsalam, Mohamed Shaban

Abstract:

This paper introduces interfacing and replication of electronic tools based on the MATLAB/ SIMULINK mock-up package. Mock-up components contain dc-dc converters, power issue rectifiers, motivation machines, dc gear, synchronous gear, and more entire systems. Power issue rectifier model includes solid state device models. The tools are the clear-cut structure and mock-up of complex energetic systems connecting with power electronic machines.

Keywords: power electronics, machine, MATLAB, simulink

Procedia PDF Downloads 357
5544 A Comparative Study between Digital Mammography, B Mode Ultrasound, Shear-Wave and Strain Elastography to Distinguish Benign and Malignant Breast Masses

Authors: Arjun Prakash, Samanvitha H.

Abstract:

BACKGROUND: Breast cancer is the commonest malignancy among women globally, with an estimated incidence of 2.3 million new cases as of 2020, representing 11.7% of all malignancies. As per Globocan data 2020, it accounted for 13.5% of all cancers and 10.6% of all cancer deaths in India. Early diagnosis and treatment can improve the overall morbidity and mortality, which necessitates the importance of differentiating benign from malignant breast masses. OBJECTIVE: The objective of the present study was to evaluate and compare the role of Digital Mammography (DM), B mode Ultrasound (USG), Shear Wave Elastography (SWE) and Strain Elastography (SE) in differentiating benign and malignant breast masses (ACR BI-RADS 3 - 5). Histo-Pathological Examination (HPE) was considered the Gold standard. MATERIALS & METHODS: We conducted a cross-sectional study on 53 patients with 64 breast masses over a period of 10 months. All patients underwent DM, USG, SWE and SE. These modalities were individually assessed to know their accuracy in differentiating benign and malignant masses. All Digital Mammograms were done using the Fujifilm AMULET Innovality Digital Mammography system and all Ultrasound examinations were performed on SAMSUNG RS 80 EVO Ultrasound system equipped with 2 to 9 MHz and 3 – 16 MHz linear transducers. All masses were subjected to HPE. Independent t-test and Chi-square or Fisher’s exact test were used to assess continuous and categorical variables, respectively. ROC analysis was done to assess the accuracy of diagnostic tests. RESULTS: Of 64 lesions, 51 (79.68%) were malignant and 13 (20.31%) (p < 0.0001) were benign. SE was the most specific (100%) (p < 0.0001) and USG (98%) (p < 0.0001) was the most sensitive of all the modalities. E max, E mean, E max ratio, E mean ratio and Strain Ratio of the malignant masses significantly differed from those of the benign masses. Maximum SWE value showed the highest sensitivity (88.2%) (p < 0.0001) among the elastography parameters. A combination of USG, SE and SWE had good sensitivity (86%) (p < 0.0001). CONCLUSION: A combination of USG, SE and SWE improves overall diagnostic yield in differentiating benign and malignant breast masses. Early diagnosis and treatment of breast carcinoma will reduce patient mortality and morbidity.

Keywords: digital mammography, breast cancer, ultrasound, elastography

Procedia PDF Downloads 106
5543 TACTICAL: Ram Image Retrieval in Linux Using Protected Mode Architecture’s Paging Technique

Authors: Sedat Aktas, Egemen Ulusoy, Remzi Yildirim

Abstract:

This article explains how to get a ram image from a computer with a Linux operating system and what steps should be followed while getting it. What we mean by taking a ram image is the process of dumping the physical memory instantly and writing it to a file. This process can be likened to taking a picture of everything in the computer’s memory at that moment. This process is very important for tools that analyze ram images. Volatility can be given as an example because before these tools can analyze ram, images must be taken. These tools are used extensively in the forensic world. Forensic, on the other hand, is a set of processes for digitally examining the information on any computer or server on behalf of official authorities. In this article, the protected mode architecture in the Linux operating system is examined, and the way to save the image sample of the kernel driver and system memory to disk is followed. Tables and access methods to be used in the operating system are examined based on the basic architecture of the operating system, and the most appropriate methods and application methods are transferred to the article. Since there is no article directly related to this study on Linux in the literature, it is aimed to contribute to the literature with this study on obtaining ram images. LIME can be mentioned as a similar tool, but there is no explanation about the memory dumping method of this tool. Considering the frequency of use of these tools, the contribution of the study in the field of forensic medicine has been the main motivation of the study due to the intense studies on ram image in the field of forensics.

Keywords: linux, paging, addressing, ram-image, memory dumping, kernel modules, forensic

Procedia PDF Downloads 117
5542 An Experimental Study of Bolt Inclination in a Composite Single Bolted Joint

Authors: Youcef Faci, Djillali Allou, Ahmed Mebtouche, Badredine Maalem

Abstract:

The inclination of the bolt in a fastened joint of composite material during a tensile test can be influenced by several parameters, including material properties, bolt diameter and length, the type of composite material being used, the size and dimensions of the bolt, bolt preload, surface preparation, the design and configuration of the joint, and finally testing conditions. These parameters should be carefully considered and controlled to ensure accurate and reliable results during tensile testing of composite materials with fastened joints. Our work focuses on the effect of the stacking sequence and the geometry of specimens. An experimental test is carried out to obtain the inclination of a bolt during a tensile test of a composite material using acoustic emission and digital image correlation. Several types of damage were obtained during load. Digital image correlation techniques permit to obtain the inclination of bolt angle value during tensile test. We concluded that the inclination of the bolt during a tensile test of a composite material can be related to the damage that occurs in the material. It can cause stress concentrations and localized deformation in the material, leading to damage such as delamination, fiber breakage, matrix cracking, and other forms of failure.

Keywords: damage, digital image correlation, bolt inclination angle, joint

Procedia PDF Downloads 68
5541 The Impact of Neuroscience Knowledge on the Field of Education

Authors: Paula Andrea Segura Delgado, Martha Helena Ramírez-Bahena

Abstract:

Research on how the brain learns has a transcendental application in the educational context. It is crucial for teacher training to understand the nature of brain changes and their direct influence on learning processes. This communication is based on a literature review focused on neuroscience, neuroeducation, and the impact of digital technology on the human brain. Information was gathered from both English and Spanish language sources, using online journals, books and reports. The general objective was to analyze the role of neuroscience knowledge in enriching our understanding of the learning process. In fact, the authors have focused on the impact of digital technology on the human brain as well as its influence in the field of education..Neuroscience knowledge can contribute significantly to improving the training of educators and therefore educational practices. Education as an instrument of change and school as an agent of socialization, it is necessary to understand what it aims to transform: the human brain. Understanding the functioning of the human brain has important repercussions on education: this elucidates cognitive skills, psychological processes and elements that influence the learning process (memory, executive functions, emotions and the circadian cycle); helps identify psychological and neurological deficits that can impede learning processes (dyslexia, autism, hyperactivity); It allows creating environments that promote brain development and contribute to the advancement of brain capabilities in alignment with the stages of neurobiological development. The digital age presents diverse opportunities to every social environment. The frequent use of digital technology (DT) has had a significant and abrupt impact on both the cognitive abilities and physico-chemical properties of the brain, significantly influencing educational processes. Hence, educational community, with the insights from advances in neuroscience, aspire to identify the positive and negative effects of digital technology on the human brain. This knowledge helps ensure the alignment of teacher training and practices with these findings. The knowledge of neuroscience enables teachers to develop teaching methods that are aligned with the way the brain works. For example, neuroscience research has shown that digital technology is having a significant impact on the human brain (addition, anxiety, high levels of dopamine, circadian cycle disorder, decrease in attention, memory, concentration, problems with their social relationships). Therefore, it is important to understand the nature of these changes, their impact on the learning process, and how educators should effectively adapt their approaches based on these brain's changes.

Keywords: digital technology, learn process, neuroscience knowledge, neuroeducation, training proffesors

Procedia PDF Downloads 62
5540 Comparison Between a Droplet Digital PCR and Real Time PCR Method in Quantification of HBV DNA

Authors: Surangrat Srisurapanon, Chatchawal Wongjitrat, Navin Horthongkham, Ruengpung Sutthent

Abstract:

HBV infection causes a potential serious public health problem. The ability to detect the HBV DNA concentration is of the importance and improved continuously. By using quantitative Polymerase Chain Reaction (qPCR), several factors in standardized; source of material, calibration standard curve and PCR efficiency are inconsistent. Digital PCR (dPCR) is an alternative PCR-based technique for absolute quantification using Poisson's statistics without requiring a standard curve. Therefore, the aim of this study is to compare the data set of HBV DNA generated between dPCR and qPCR methods. All samples were quantified by Abbott’s real time PCR and 54 samples with 2 -6 log10 HBV DNA were selected for comparison with dPCR. Of these 54 samples, there were two outlier samples defined as negative by dPCR. Of these two, samples were defined as negative by dPCR, whereas 52 samples were positive by both the tests. The difference between the two assays was less than 0.25 log IU/mL in 24/52 samples (46%) of paired samples; less than 0.5 log IU/mL in 46/52 samples (88%) and less than 1 log in 50/52 samples (96%). The correlation coefficient was r=0.788 and P-value <0.0001. Comparison to qPCR, data generated by dPCR tend to be the overestimation in the sample with low HBV DNA concentration and underestimated in the sample with high viral load. The variation in DNA by dPCR measurement might be due to the pre-amplification bias, template. Moreover, a minor drawback of dPCR is the large quantity of DNA had to be used when compare to the qPCR. Since the technology is relatively new, the limitations of this assay will be improved.

Keywords: hepatitis B virus, real time PCR, digital PCR, DNA quantification

Procedia PDF Downloads 481
5539 Automatic Music Score Recognition System Using Digital Image Processing

Authors: Yuan-Hsiang Chang, Zhong-Xian Peng, Li-Der Jeng

Abstract:

Music has always been an integral part of human’s daily lives. But, for the most people, reading musical score and turning it into melody is not easy. This study aims to develop an Automatic music score recognition system using digital image processing, which can be used to read and analyze musical score images automatically. The technical approaches included: (1) staff region segmentation; (2) image preprocessing; (3) note recognition; and (4) accidental and rest recognition. Digital image processing techniques (e.g., horizontal /vertical projections, connected component labeling, morphological processing, template matching, etc.) were applied according to musical notes, accidents, and rests in staff notations. Preliminary results showed that our system could achieve detection and recognition rates of 96.3% and 91.7%, respectively. In conclusion, we presented an effective automated musical score recognition system that could be integrated in a system with a media player to play music/songs given input images of musical score. Ultimately, this system could also be incorporated in applications for mobile devices as a learning tool, such that a music player could learn to play music/songs.

Keywords: connected component labeling, image processing, morphological processing, optical musical recognition

Procedia PDF Downloads 419
5538 Using ePortfolios to Mapping Social Work Graduate Competencies

Authors: Cindy Davis

Abstract:

Higher education is changing globally and there is increasing pressure from professional social work accreditation bodies for academic programs to demonstrate how students have successfully met mandatory graduate competencies. As professional accreditation organizations increase their demand for evidence of graduate competencies, strategies to document and recording learning outcomes becomes increasingly challenging for academics and students. Studies in higher education have found support for the pedagogical value of ePortfolios, a flexible personal learning space that is owned by the student and include opportunity for assessment, feedback and reflection as well as a virtual space to store evidence of demonstration of professional competencies and graduate attributes. Examples of institutional uses of ePortfolios include e-administration of a diverse student population, assessment of student learning, and the demonstration of graduate attributes attained and future student career preparation. The current paper presents a case study on the introduction of ePortfolios for social work graduates in Australia as part of an institutional approach to technology-enhanced learning and e-learning. Social work graduates were required to submit an ePortfolio hosted on PebblePad. The PebblePad platform was selected because it places the student at the center of their learning whilst providing powerful tools for staff to structure, guide and assess that learning. The ePortofolio included documentation and evidence of how the student met each graduate competency as set out by the social work accreditation body in Australia (AASW). This digital resource played a key role in the process of external professional accreditation by clearly documenting and evidencing how students met required graduate competencies. In addition, student feedback revealed a positive outcome on how this resource provided them with a consolidation of their learning experiences and assisted them in obtaining employment post-graduation. There were also significant institutional factors that were key to successful implementation such as investment in the digital technology, capacity building amongst academics, and technical support for staff and students.

Keywords: accreditation, social work, teaching, technology

Procedia PDF Downloads 139
5537 Power System Cyber Security Risk in the Era of Digital Transformation

Authors: Rafat Rob, Khaled Alotaibi, Dana Nour, Abdullah Albadrani, Abdulmohsen Mulhim

Abstract:

Power systems digitization solutions provides a comprehensive smart, cohesive, interconnected network, extensive connectivity between digital assets, physical power plants, and resources to form digital economies. However, digitization has exposed the classical air gapped power plants to the rapid spread of cyber threats and attacks in the process delaying and forcing many organizations to rethink their cyber security policies and standards before they can augment their operation the new advanced digital devices. Cyber Security requirements for power systems (and industry control systems therein) demand a new approach, unique methodology, and design process that is completely different to Cyber Security measures designed for the IT systems. In practice, Cyber Security strategy, as applied to power systems, tends to be closely aligned to those measures applied for IT system purposes. The differentiator for Cyber Security in terms of power systems are the physical assets and applications used, alongside the ever-growing rate of expansion within the industry controls sector (in comparison to the relatively saturated growth observed for corporate IT systems). These factors increase the magnitude of the cyber security risk within such systems. The introduction of smart devices and sensors along the grid initiate vulnerable entry points to the systems. Every installed Smart Meter is a target; the way these devices communicate with each other may instigate a Denial of Service (DoS) and Distributed Denial of Service (DDoS) attack. Attacking one sensor or meter has the potential to propagate itself throughout the power grid reaching the IT network, where it may manifest itself as a malware infiltration.

Keywords: supply chain, cybersecurity, maturity model, risk, smart grid

Procedia PDF Downloads 114
5536 Homogenization of Culture and Its Effect on Preferred Reading of Media Communications Aimed at Members of Generation Z

Authors: Philip Katz

Abstract:

The research examines preferred reading of contemporary ads aimed at Generation Z through digital media. A qualitative analysis of focus groups consisting of members of Generation Z from 13 countries in Europe, the Middle East, South America and Asia has shown that, among this cohort, the influence of national culture does not create a strong impediment to understanding media communications targeting Generation Z. The familiarity of members of Generation Z with other countries’ popular culture through the spread of digital media has allowed a homogenizing effect and allowed a greater understanding of those cultures among this generation that lessens the impact of geographic separation.

Keywords: audience, Generation Z, marketing communication, preferred reading

Procedia PDF Downloads 177
5535 Forensic Analysis of Signal Messenger on Android

Authors: Ward Bakker, Shadi Alhakimi

Abstract:

The amount of people moving towards more privacy focused instant messaging applications has grown significantly. Signal is one of these instant messaging applications, which makes Signal interesting for digital investigators. In this research, we evaluate the artifacts that are generated by the Signal messenger for Android. This evaluation was done by using the features that Signal provides to create artifacts, whereafter, we made an image of the internal storage and the process memory. This image was analysed manually. The manual analysis revealed the content that Signal stores in different locations during its operation. From our research, we were able to identify the artifacts and interpret how they were used. We also examined the source code of Signal. Using our obtain knowledge from the source code, we developed a tool that decrypts some of the artifacts using the key stored in the Android Keystore. In general, we found that most artifacts are encrypted and encoded, even after decrypting some of the artifacts. During data visualization, some artifacts were found, such as that Signal does not use relationships between the data. In this research, two interesting groups of artifacts were identified, those related to the database and those stored in the process memory dump. In the database, we found plaintext private- and group chats, and in the memory dump, we were able to retrieve the plaintext access code to the application. Nevertheless, we conclude that Signal contains a wealth of artifacts that could be very valuable to a digital forensic investigation.

Keywords: forensic, signal, Android, digital

Procedia PDF Downloads 82
5534 Application of a Universal Distortion Correction Method in Stereo-Based Digital Image Correlation Measurement

Authors: Hu Zhenxing, Gao Jianxin

Abstract:

Stereo-based digital image correlation (also referred to as three-dimensional (3D) digital image correlation (DIC)) is a technique for both 3D shape and surface deformation measurement of a component, which has found increasing applications in academia and industries. The accuracy of the reconstructed coordinate depends on many factors such as configuration of the setup, stereo-matching, distortion, etc. Most of these factors have been investigated in literature. For instance, the configuration of a binocular vision system determines the systematic errors. The stereo-matching errors depend on the speckle quality and the matching algorithm, which can only be controlled in a limited range. And the distortion is non-linear particularly in a complex imaging acquisition system. Thus, the distortion correction should be carefully considered. Moreover, the distortion function is difficult to formulate in a complex imaging acquisition system using conventional models in such cases where microscopes and other complex lenses are involved. The errors of the distortion correction will propagate to the reconstructed 3D coordinates. To address the problem, an accurate mapping method based on 2D B-spline functions is proposed in this study. The mapping functions are used to convert the distorted coordinates into an ideal plane without distortions. This approach is suitable for any image acquisition distortion models. It is used as a prior process to convert the distorted coordinate to an ideal position, which enables the camera to conform to the pin-hole model. A procedure of this approach is presented for stereo-based DIC. Using 3D speckle image generation, numerical simulations were carried out to compare the accuracy of both the conventional method and the proposed approach.

Keywords: distortion, stereo-based digital image correlation, b-spline, 3D, 2D

Procedia PDF Downloads 498
5533 L2 Anxiety, Proficiency, and L2 Willingness to Communicate in the Classroom, Outside the Classroom, and in Digital Setting: Insights from Ethiopian Preparatory Schools

Authors: Merih Welay Welesilassie, Marianne Nikolov

Abstract:

Research into second and foreign language (L2) acquisitions has demonstrated that L2 anxiety, perceived proficiency, and L2 willingness to communicate (L2WTC) profoundly impact language learning outcomes. However, the complex interplay between these variables has yet to be fully explored, as these factors are dynamic and context-specific and can vary across different learners and learning environments. This study, therefore, utilized a cross-sectional quantitative survey research design to scrutinise the causal relationships between L2 anxiety, English proficiency, and L2WTC of 609 Ethiopian preparatory school students. The model for the L2WTC, both inside and outside the classroom, has been expanded to include an additional sub-scale known as the L2WTC in a digital setting. Moreover, in contrast to the commonly recognised debilitative-focused L2 anxiety, the construct of L2 anxiety has been divided into facilitative and debilitative anxiety. This method allows to measure not only the presence or absence of anxiety but also evaluate if anxiety helps or hinders the L2 learning experience. A self-assessment proficiency measure was also developed specifically for Ethiopian high school students. The study treated facilitative and debilitative anxiety as independent variables while considering self-assessed English proficiency and L2WTC in the classroom, outside the classroom, and in digital settings as dependent variables. Additionally, self-assessed English proficiency was used as an independent variable to predict L2WTC in these three settings. The proposed model, including these variables, was tested using structural equation modelling (SEM). According to the descriptive analysis, the mean scores of L2WTC in the three settings were generally low, ranging from 2.30 to 2.84. Debilitative anxiety casts a shadow on the positive aspects of anxiety. Self-assessed English proficiency was also too low. According to SEM, debilitative anxiety displayed a statistically significant negative impact on L2WTC inside the classroom, outside the classroom, in digital settings, and in self-assessed levels of English proficiency. In contrast, facilitative anxiety was found to positively contribute to L2WTC outside the classroom, in digital settings, and in self-assessed English proficiency. Self-assessed English proficiency made a statistically significant and positive contribution to L2WTC within the classroom, outside the classroom, and in digital contexts. L2WTC inside the classroom was found to positively contribute to L2WTC outside the classrooms and in digital contexts. The findings were systematically compared with existing studies, and the pedagogical implications, limitations, and potential avenues for future research were elucidated. The outcomes of the study have the potential to significantly contribute to the advancement of theoretical and empirical knowledge about improving English education, learning, and communication not only in Ethiopia but also in similar EFL contexts, thereby providing valuable insights for educators, researchers, and policymakers.

Keywords: debilitative anxiety, facilitative anxiety, L2 willingness to communicate, self-assessed English proficiency

Procedia PDF Downloads 14
5532 Exploring Critical Thinking Skill Development in the 21st Century College Classroom: A Multi-Case Study

Authors: Kimberlyn Greene

Abstract:

Employers today expect college graduates to not only develop and demonstrate content-specific knowledge but also 21st century skillsets such as critical thinking. International assessments suggest students enrolled in United States (U.S.) educational institutions are underperforming in comparison to their global peers in areas such as critical thinking and technology. This multi-case study examined how undergraduate digital literacy courses at a four-year university in the U.S., as implemented by instructors, fostered students’ development of critical thinking skills. The conceptual framework for this study presumed that as students engaged in complex thinking within the context of a digital literacy course, their ability to deploy critical thinking was contingent upon whether the course was designed with the expectation for students to use critical thinking skills as well as the instructor’s approach to implementing the course. Qualitative data collected from instructor interviews, classroom observations, and course documents were analyzed with an emphasis on exploring the course design and instructional methods that provided opportunities to foster critical thinking skill development. Findings from the cross-case analysis revealed that although the digital literacy courses were designed and implemented with the expectation students would deploy critical thinking; there was no explicit support for students to develop these skills. The absence of intentional skill development resulted in inequitable opportunities for all students to engage in complex thinking. The implications of this study suggest that if critical thinking is to remain a priority, then universities must expand their support of pedagogical and instructional training for faculty regarding how to support students’ critical thinking skill development.

Keywords: critical thinking skill development, curriculum design, digital literacy, pedagogy

Procedia PDF Downloads 294
5531 Experiences of Online Opportunities and Risks: Examining Internet Use and Digital Literacy of Young People in Nigeria

Authors: Isah Yahaya Aliyu

Abstract:

Research on Internet use has often approached beneficial uses (online opportunities) of the Internet as separate from the risky encounters (online risks) of young people online. However, empirical evidence from diverse contexts appears to increasingly support the fusion of the two sets of online activities. Hence, the current research investigates the correlation between Internet use (IU) and digital literacy (DL) with online opportunities (OP) and risks (OR), using data from a Nigerian context, where there appears a paucity of research and literature on integrating opportunities and risks in the same study. A web-based data collection method was used to administer a survey to 335 undergraduate students in Northeastern Nigeria. Underpinned to Livingstone and Helsper model, findings are largely consistent with existing literature; IU and DL influence OP (R2 = 0.791, SE = 0.265, F-Stats = 626.566, P-value <.001), equally IU and DL influence OR as well (R2 = 0.343, SE = 0.465, F-Stats = 86.671, P-value <.001). OP and OR were found to strongly correlate positively (r = .667, n = 335, p < 0.01). This study has provided buttressing evidence from a Nigerian context of the fusion of benefits and risks of the Internet among young people. It has also upheld the argument for improved literacy as strategy for minimizing risks/harm rather than restricting use. Other theoretical and policy implications of the findings have been discussed in line with local and global debates about the Internet and its attendant effects.

Keywords: digital, internet, literacy, opportunities, risks

Procedia PDF Downloads 87
5530 Festivals and Weddings in India during Corona Pandemic

Authors: Arul Aram, Vishnu Priya, Monicka Karunanithi

Abstract:

In India, in particular, festivals are the occasions of celebrations. They create beautiful moments to cherish. Mostly, people pay a visit to their native places to celebrate with their loved ones. So are wedding celebrations. The Covid-19 pandemic came upon us unexpectedly, and to fight it, the festivals and weddings are celebrated unusually. Crowded places are deserted. Mass gatherings are avoided, changes and alterations are made in our rituals and celebrations. The warmth usually people have at their heart during any festival and wedding has disappeared. Some aspects of the celebrations become virtual/digital rather than real -- for instance, digital greetings/invitations, digital conduct of ceremonies by priests, YouTube worship, online/digital cash gifts, and digital audience for weddings. Each festival has different rituals which are followed with the divine nature in every family, but the pandemic warranted some compromises on the traditions. Likewise, a marriage is a beautiful bond between two families where a lot of traditional customs are followed. The wedding ceremonies are colorful and celebrations may extend for several days. People in India spend financial resources to prepare and celebrate weddings. The bride's and the groom's homes are fully decorated with colors, balloons and other decorations. The wedding rituals and celebrations vary by religion, region, preference and the resources of the groom, bride and their families. They can range from one day to multiple-days events. But the Covid-19 pandemic situation changes the mindset of people over ceremonies. This lockdown has affected those weddings and industries that support them and make the people postpone or at times advance without fanfare their 'big day.' People now adopt the protocols, guidelines and safety measures to reduce the risk and minimize the fear during celebrations. The study shall look into: how the pandemic shattered the expectations of people celebrating; problems faced economically by people/service providers who are benefited by the celebrations; and identify the alterations made in the rituals or the practices of our culture for the safety of families. The study shall employ questionnaires, interviews and visual ethnography to collect data. The study found that during a complete lockdown, people have not bought new clothes, sweets, or snacks, as they generally do before a pandemic. Almost all of them kept their celebrations low-key, and some did not celebrate at all. Digital media played a role in keeping the celebration alive, as people used it to wish their friends and families virtually. During partial unlock, the situation was under control, and people began to go out and see a few family and friends. They went shopping and bought new clothes and needs, but they did it while following safety precautions. There is also an equal percentage of people who shopped online. Although people continue to remain disappointed, they were less stressed up as life was returning to normal.

Keywords: covid-19, digital, festivals, India, wedding

Procedia PDF Downloads 186