Search results for: digital part file
7910 The General Evolution of Today's Mosque Architecture in Turkey: The Case of Mekke Mosque
Authors: Hatice Derya Arslan
Abstract:
Religious buildings in terms of architectural features are known as the most repeated building types. Mosques representing Islam religion shows big differences in terms of architecture. In Turkey, every year many mosques are built all over the country and a majority of the mosques being built are inspired by the Ottoman and Seljuk architecture. Unfortunately, inspired by the architecture of the mosque made from traditional mosque architecture is often inadequate. In this study, first of all, the evolution of the mosque architecture in Turkey has been examined chronologically and shortly. After that, in the other part of the paper, Mekke Mosque which was built in Kutahya City Center of Turkey is discussed in terms of architectural properties. In this mosque, quasi-postmodern design was preferred. Generally preferred classical Ottoman architecture has been abandoned in this mosque. However, there exists a lot of issue in the interior and exterior design of the mosque was criticized in the conclusion part of the paper in a comparative manner.Keywords: architectural criticism, mosque, ottoman and seljuk architecture, religious building
Procedia PDF Downloads 4837909 Extending the AOP Joinpoint Model for Memory and Type Safety
Authors: Amjad Nusayr
Abstract:
Software security is a general term used to any type of software architecture or model in which security aspects are incorporated in this architecture. These aspects are not part of the main logic of the underlying program. Software security can be achieved using a combination of approaches, including but not limited to secure software designs, third part component validation, and secure coding practices. Memory safety is one feature in software security where we ensure that any object in memory has a valid pointer or a reference with a valid type. Aspect-Oriented Programming (AOP) is a paradigm that is concerned with capturing the cross-cutting concerns in code development. AOP is generally used for common cross-cutting concerns like logging and DB transaction managing. In this paper, we introduce the concepts that enable AOP to be used for the purpose of memory and type safety. We also present ideas for extending AOP in software security practices.Keywords: aspect oriented programming, programming languages, software security, memory and type safety
Procedia PDF Downloads 1357908 The Three-dimensional Response of Mussel Plaque Anchoring to Wet Substrates under Directional Tensions
Authors: Yingwei Hou, Tao Liu, Yong Pang
Abstract:
The paper explored the three-dimensional deformation of mussel plaques anchor to wet polydimethylsiloxane (PDMS) substrates under tension stress with different angles. Mussel plaques exhibiting natural adhesive structures, have attracted significant attention for their remarkable adhesion properties. Understanding their behavior under mechanical stress, particularly in a three-dimensional context, holds immense relevance for biomimetic material design and bio-inspired adhesive development. This study employed a novel approach to investigate the 3D deformation of the PDMS substrates anchored by mussel plaques subjected to controlled tension. Utilizing our customized stereo digital image correlation technique and mechanical mechanics analyses, we found the distributions of the displacement and resultant force on the substrate became concentrated under the plaque. Adhesion and sucking mechanisms were analyzed for the mussel plaque-substrate system under tension until detachment. The experimental findings were compared with a developed model using finite element analysis and the results provide new insights into mussels’ attachment mechanism. This research not only contributes to the fundamental understanding of biological adhesion but also holds promising implications for the design of innovative adhesive materials with applications in fields such as medical adhesives, underwater technologies, and industrial bonding. The comprehensive exploration of mussel plaque behavior in three dimensions is important for advancements in biomimicry and materials science, fostering the development of adhesives that emulate nature's efficiency.Keywords: adhesion mechanism, mytilus edulis, mussel plaque, stereo digital image correlation
Procedia PDF Downloads 647907 Eco-Index for Assessing Ecological Disturbances at Downstream of a Hydropower Project
Authors: Chandra Upadhyaya, Arup Kumar Sarma
Abstract:
In the North Eastern part of India several hydro power projects are being proposed and execution for some of them are already initiated. There are controversies surrounding these constructions. Impact of these dams in the downstream part of the rivers needs to be assessed so that eco-system and people living downstream are protected by redesigning the projects if it becomes necessary. This may result in reducing the stresses to the affected ecosystem and people living downstream. At present many index based ecological methods are present to assess impact on ecology. However, none of these methods are capable of assessing the affect resulting from dam induced diurnal variation of flow in the downstream. We need environmental flow methodology based on hydrological index which can address the affect resulting from dam induced diurnal variation of flow and play an important role in a riverine ecosystem management and be able to provide a qualitative idea about changes in the habitat for aquatic and riparian species.Keywords: ecosystem, environmental flow assessment, entropy, IHA, TNC
Procedia PDF Downloads 3897906 Stability of Solutions of Semidiscrete Stochastic Systems
Authors: Ramazan Kadiev, Arkadi Ponossov
Abstract:
Semidiscrete systems contain both continuous and discrete components. This means that the dynamics is mostly continuous, but at certain instants, it is exposed to abrupt influences. Such systems naturally appear in applications, for example, in biological and ecological models as well as in the control theory. Therefore, the study of semidiscrete systems has recently attracted the attention of many specialists. Stochastic effects are an important part of any realistic approach to modeling. For example, stochasticity arises in the population dynamics, demographic and ecological due to a change in time of factors external to the system affecting the survival of the population. In control theory, random coefficients can simulate inaccuracies in measurements. It will be shown in the presentation how to incorporate such effects into semidiscrete systems. Stability analysis is an essential part of modeling real-world problems. In the presentation, it will be explained how sufficient conditions for the moment stability of solutions in terms of the coefficients for linear semidiscrete stochastic equations can be derived using non-Lyapunov technique.Keywords: abrupt changes, exponential stability, regularization, stochastic noises
Procedia PDF Downloads 1947905 Subsurface Structures Related to the Hydrocarbon Migration and Accumulation in the Afghan Tajik Basin, Northern Afghanistan: Insights from Seismic Attribute Analysis
Authors: Samim Khair Mohammad, Takeshi Tsuji, Chanmaly Chhun
Abstract:
The Afghan Tajik (foreland) basin, located in the depression zone between mountain axes, is under compression and deformation during the collision of India with the Eurasian plate. The southern part of the Afghan Tajik basin in the Northern part of Afghanistan has not been well studied and explored, but considered for the significant potential for oil and gas resources. The Afghan Tajik basin depositional environments (< 8km) resulted from mixing terrestrial and marine systems, which has potential prospects of Jurrasic (deep) and Tertiary (shallow) petroleum systems. We used 2D regional seismic profiles with a total length of 674.8 km (or over an area of 2500 km²) in the southern part of the basin. To characterize hydrocarbon systems and structures in this study area, we applied advanced seismic attributes such as spectral decomposition (10 - 60Hz) based on time-frequency analysis with continuous wavelet transform. The spectral decomposition results yield the (averaging 20 - 30Hz group) spectral amplitude anomaly. Based on this anomaly result, seismic, and structural interpretation, the potential hydrocarbon accumulations were inferred around the main thrust folds in the tertiary (Paleogene+Neogene) petroleum systems, which appeared to be accumulated around the central study area. Furthermore, it seems that hydrocarbons dominantly migrated along the main thrusts and then concentrated around anticline fold systems which could be sealed by mudstone/carbonate rocks.Keywords: The Afghan Tajik basin, seismic lines, spectral decomposition, thrust folds, hydrocarbon reservoirs
Procedia PDF Downloads 1217904 Revisiting the Link between Corporate Social Performance and Corporate Financial Performance Post 2008 Global Economic Crisis
Authors: Anand Choudhary
Abstract:
Following the global economic crisis in 2008, businesses and more especially the big multinational conglomerates were increasingly viewed by the people world over as one of the major causes of the economic problems faced by millions globally, in terms of job loss and lifetime savings being wiped out as banks and pension funds went bankrupt and people stared at an insecure financial future. This caused a lot of resentment in the public against big businesses and fueled several protest movements by the people such as “Occupy Wall Street” in different parts of the world. This forced the big businesses to respond to the challenge by adopting more people-centric policies and initiatives for local communities in societies where they operate as part of their corporate social responsibility (CSR), in order to regain their social acceptance among the people whilst earning their ‘social license to operate’. The current paper studies many of such large MNCs across the United States of America, India and South Africa, which changed the way they did business earlier, following the global economic crisis in 2008, by incorporating capacity building initiatives for local communities as part of their CSR strategy and explores whether it has contributed to improving their financial performance. It is a conceptual research paper using secondary source data. The findings reveal that there is a positive correlation between the companies’ corporate social performance and corporate financial performance. In addition, the findings also bring to light that the MNCs examined as part of the current paper have improved their image in the eyes of their stakeholders following the change in their CSR strategy and initiatives.Keywords: corporate social responsibility (CSR), Corporate Social Performance (CSP), Corporate Financial Performance (CFP), local communities
Procedia PDF Downloads 3417903 TACTICAL: Ram Image Retrieval in Linux Using Protected Mode Architecture’s Paging Technique
Authors: Sedat Aktas, Egemen Ulusoy, Remzi Yildirim
Abstract:
This article explains how to get a ram image from a computer with a Linux operating system and what steps should be followed while getting it. What we mean by taking a ram image is the process of dumping the physical memory instantly and writing it to a file. This process can be likened to taking a picture of everything in the computer’s memory at that moment. This process is very important for tools that analyze ram images. Volatility can be given as an example because before these tools can analyze ram, images must be taken. These tools are used extensively in the forensic world. Forensic, on the other hand, is a set of processes for digitally examining the information on any computer or server on behalf of official authorities. In this article, the protected mode architecture in the Linux operating system is examined, and the way to save the image sample of the kernel driver and system memory to disk is followed. Tables and access methods to be used in the operating system are examined based on the basic architecture of the operating system, and the most appropriate methods and application methods are transferred to the article. Since there is no article directly related to this study on Linux in the literature, it is aimed to contribute to the literature with this study on obtaining ram images. LIME can be mentioned as a similar tool, but there is no explanation about the memory dumping method of this tool. Considering the frequency of use of these tools, the contribution of the study in the field of forensic medicine has been the main motivation of the study due to the intense studies on ram image in the field of forensics.Keywords: linux, paging, addressing, ram-image, memory dumping, kernel modules, forensic
Procedia PDF Downloads 1217902 Virtual Life: Fashion, Expression, and Identity in the Digital World
Authors: Elizabeth Bourgeois
Abstract:
During social distancing, fashion and self-expression have been pushed further into virtual environments. In VR spaces, identities can be curated easily, untethered from the necessities of life and work. Personal styles reach a wider audience and follow new rules. Digital platforms leave some, but not all, 'real world' clothing constraints behind. Virtual aesthetics are set by the user and the software. Gen Z is a native user, applying face filters on Instagram and Snapchat and styling outfits and skins in apps like Gacha Life, Roblox, and Fortnite. These games cultivate space for community and personal style. Loosely tied to human forms, each app has physical aesthetics, with clear vernacular dress defining it. There are ecosystems of makers, consumers, and critics. Designer-modelers create original assets, brands, and luxury items. Fashion and beauty are ephemeral but always reflect the idealization of form and self. Online communities have already established new beauty ideals that impact live fashion trends. Fashion houses develop AR filters, gaming hairstyles challenge real-world colorists, and musicians perform virtual concerts in their avatar forms. In these times, social media and gaming communities promote the expression of public identity. The online dress is no longer tied to 'real' bodies or cloth. In virtual worlds, there are still tribes, status symbols, gender identities, and roles, but free of fabric, form, and static social structure, there is room for fantastic invention.Keywords: virtual reality, fashion, Gen Z, social media, gaming
Procedia PDF Downloads 1407901 Part of Geomatics Technology in the Capability to Implement an on Demand Transport in Oran Wilaya (the Northwestern of Algeria)
Authors: N. Brahmia
Abstract:
The growing needs of displacements led advanced countries in this field install new specific transport systems, able to palliate any deficiencies, especially when regular public transport does not adequately meet the requests of users. In this context, on-demand transport systems (ODT) are very efficient; they rely on techniques based on the location of trip generators which should be assured effectively with the use of operators responsible of the advance reservation, planning and organization, and studying the different ODT criteria. As the advanced countries in the field of transport, some developing countries are involved in the adaptation of the new technologies to reduce the deficit in their communication system. This communication presents the study of an ODT implementation in the west of Algeria, by developing the Geomatics side of the study. This part requires the use of specific systems such as Geographic Information System (GIS), Road Database Management System (RDBMS)… so we developed the process through an application in an environment of mobility by using the computer tools dedicated to the management of the entities related to the transport field.Keywords: geomatics, GIS, ODT, transport systems
Procedia PDF Downloads 6097900 Effect of Accelerated Ions Interacted with Al Targets Using Plasma Focus Device
Authors: Morteza Habibi, Reza Amrollahi
Abstract:
The Aluminum made targets were placed at the central part of a Fillipov type (90KJ) plasma focus cathode. These targets were exposed to perpendicular dense plasma stream incidence. Melt layer erosion by melt motion, surface smoothing, and bubble formation were some of different effects caused by diverse working conditions. Micro hardness of surface layer tends to decrease particularly in the central region of the sample where destruction is more intense. The most pronouced melt motion is registered in the region of the maximum gradient of pressure and the etching of aluminium surface is noticeable in the central part of target. The crater with a maximum depth of 200µm, and the diameter of about 8.5mm is observed close to the mountains. Adding Krypton admixture to the Deuterium gas lead to collapsing bubbles and greater surface damage.Keywords: fillipov type plasma focus, al target interaction, bubbling effect, melt layer motion, surface smoothing
Procedia PDF Downloads 5427899 Hybrid Precoder Design Based on Iterative Hard Thresholding Algorithm for Millimeter Wave Multiple-Input-Multiple-Output Systems
Authors: Ameni Mejri, Moufida Hajjaj, Salem Hasnaoui, Ridha Bouallegue
Abstract:
The technology advances have most lately made the millimeter wave (mmWave) communication possible. Due to the huge amount of spectrum that is available in MmWave frequency bands, this promising candidate is considered as a key technology for the deployment of 5G cellular networks. In order to enhance system capacity and achieve spectral efficiency, very large antenna arrays are employed at mmWave systems by exploiting array gain. However, it has been shown that conventional beamforming strategies are not suitable for mmWave hardware implementation. Therefore, new features are required for mmWave cellular applications. Unlike traditional multiple-input-multiple-output (MIMO) systems for which only digital precoders are essential to accomplish precoding, MIMO technology seems to be different at mmWave because of digital precoding limitations. Moreover, precoding implements a greater number of radio frequency (RF) chains supporting more signal mixers and analog-to-digital converters. As RF chain cost and power consumption is increasing, we need to resort to another alternative. Although the hybrid precoding architecture has been regarded as the best solution based on a combination between a baseband precoder and an RF precoder, we still do not get the optimal design of hybrid precoders. According to the mapping strategies from RF chains to the different antenna elements, there are two main categories of hybrid precoding architecture. Given as a hybrid precoding sub-array architecture, the partially-connected structure reduces hardware complexity by using a less number of phase shifters, whereas it sacrifices some beamforming gain. In this paper, we treat the hybrid precoder design in mmWave MIMO systems as a problem of matrix factorization. Thus, we adopt the alternating minimization principle in order to solve the design problem. Further, we present our proposed algorithm for the partially-connected structure, which is based on the iterative hard thresholding method. Through simulation results, we show that our hybrid precoding algorithm provides significant performance gains over existing algorithms. We also show that the proposed approach reduces significantly the computational complexity. Furthermore, valuable design insights are provided when we use the proposed algorithm to make simulation comparisons between the hybrid precoding partially-connected structure and the fully-connected structure.Keywords: alternating minimization, hybrid precoding, iterative hard thresholding, low-complexity, millimeter wave communication, partially-connected structure
Procedia PDF Downloads 3267898 Degradation of Hydrocarbons by Surfactants and Biosurfactants
Authors: Samira Ferhat, Redha Alouaoui, Leila Trifi, Abdelmalek Badis
Abstract:
The objective of this work is the use of natural surfactant (biosurfactant) and synthetic (sodium dodecyl sulfate and tween 80) for environmental application. In fact the solubility of the polycyclic hydrocarbon (naphthalene) and the desorption of the heavy metals in the presence of surfactants. The microorganisms selected in this work are bacterial strain (Bacillus licheniformis) for the production of biosurfactant for use in this study. In the first part of this study, we evaluated the effectiveness of surfactants solubilization certain hydrocarbons few soluble in water such as polyaromatic (case naphthalene). Tests have shown that from the critical micelle concentration, decontamination is performed. The second part presents the results on the desorption of heavy metals (for copper) by the three surfactants, using concentrations above the critical micelle concentration. The comparison between the desorption of copper by the three surfactants, it is shown that the biosurfactant is more effective than tween 80 and sodium dodecyl sulfate.Keywords: surfactants, biosurfactant, naphthalene, copper, critical micelle concentration, solubilization, desorption
Procedia PDF Downloads 3997897 Orientia Tsutsugamushi an Emerging Etiology of Acute Encephalitis Syndrome in Northern Part of India
Authors: Amita Jain, Shantanu Prakash, Suruchi Shukla
Abstract:
Introduction: Acute encephalitis syndrome (AES) is a complex multi etiology syndrome posing a great public health problem in the northern part of India. Japanese encephalitis (JE) virus is an established etiology of AES in this region. Recently, Scrub typhus (ST) is being recognized as an emerging aetiology of AES in JE endemic belt. This study was conducted to establish the direct evidence of Central nervous system invasion by Orientia tsutsugamushi leading to AES. Methodology: A total of 849 cases with clinical diagnosis of AES were enrolled from six districts (Deoria and its adjoining area) of the traditional north Indian Japanese encephalitis (JE) belt. Serum and Cerebrospinal fluid samples were collected and tested for major agent causing acute encephalitis. AES cases either positive for anti-ST IgM antibodies or negative for all tested etiologies were investigated for ST-DNA by real-time PCR. Results: Of these 505 cases, 250 patients were laboratory confirmed for O. tsutsugamushi infection either by anti-ST IgM antibodies positivity (n=206) on serum sample or by ST-DNA detection by real-time PCR assay on CSF sample (n=2) or by both (n=42).Total 29 isolate could be sequenced for 56KDa gene. Conclusion: All the strains were found to cluster with Gilliam strains. The majority of the isolates showed a 97–99% sequence similarity with Thailand and Cambodian strains. Gilliam strain of O.tsusugamushi is an emerging as one of the major aetiologies leading to AES in northern part of India.Keywords: acute encephalitis syndrome, O. tsutsugamushi, Gilliam strain, North India, cerebrospinal fluid
Procedia PDF Downloads 2547896 Memorizing Music and Learning Strategies
Authors: Elisabeth Eder
Abstract:
Memorizing music plays an important role for instrumentalists and has been researched very little so far. Almost every musician is confronted with memorizing music in the course of their musical career. For numerous competitions, examinations (e.g., at universities, music schools), solo performances, and the like, memorization is a requirement. Learners are often required to learn a piece by heart but are rarely given guidance on how to proceed. This was also confirmed by Eder's preliminary study to examine the topicality and relevance of the topic, in which 111 instrumentalists took part. The preliminary study revealed a great desire for more knowledge or information about learning strategies as well as a greater sense of security when performing by heart on stage through the use of learning strategies by those musicians who use learning strategies. Eder’s research focuses on learning strategies for memorizing music. As part of a large-scale empirical study – an online questionnaire translated into 10 languages was used to conduct the study – 1091 musicians from 64 different countries described how they memorize. The participants in the study also evaluated their learning strategies and justified their choice in terms of their degree of effectiveness. Based on the study and pedagogical literature, 100 learning strategies were identified and categorized; the strategies were examined with regard to their effectiveness, and instrument-specific, age-specific, country-specific, gender-specific, and education-related differences and similarities concerning the choice of learning strategies were investigated. Her research also deals with forms and models of memory and how music-related information can be stored and retrieved and also forgotten again. A further part is devoted to the possibilities that teachers and learners have to support the process of memorization independently of learning strategies. The findings resulting from Elisabeth Eder's research should enable musicians and instrumental students to memorize faster and more confidently.Keywords: memorizing music, learning strategies, empirical study, effectiveness of strategies
Procedia PDF Downloads 457895 An Analytic Network Process Approach towards Academic Staff Selection
Authors: Nasrullah khan
Abstract:
Today business environment is very dynamic and most of organizations are in tough competition for their added values and sustainable hold in market. To achieve such objectives, organizations must have dynamic and creative people as optimized process. To get these people, there should strong human resource management system in organizations. There are multiple approaches have been devised in literature to hire more job relevant and more suitable people. This study proposed an ANP (Analytic Network Process) approach to hire faculty members for a university system. This study consists of two parts. In fist part, a through literature survey and universities interview are conducted in order to find the common criteria for the selection of academic staff. In second part the available candidates are prioritized on the basis of the relative values of these criteria. According to results the GRE & foreign language, GPA and research paper writing were most important factors for the selection of academic staff.Keywords: creative people, ANP, academic staff, business environment
Procedia PDF Downloads 4197894 A Study of Gender Differences in Expressing Pain
Authors: A. Estaji
Abstract:
The first part of the present paper studies the role of language in expressing pain. Pain is usually described as a personal and mental experience, so language has an important role in describing, expressing and measuring pain and sometimes it is believed that language is the only device for accessing this personal experience. The second part of this paper studies gender differences in expressing pain. Considering the biological, psychological and social differences between men and women, we raise this question whether men and women express their pain in the same way or differently. To answer this question, we asked 44 Farsi speaking participants to write about the most painful experience they had in the past. Qualitative analysis of the data shows that women, have expressed their pain more severely, have expressed their feelings about pain instead of describing the pain itself, have made their pain more personal and have given more details about the circumstances in which they experienced pain, while men have given a more neutral description of their pain and have given a description of their pain by distancing themselves from the painful event. Knowing these gender differences in expressing pain can help medical practitioners in assessing the pain level.Keywords: discourse analysis, expressing pain, measuring pain, gender
Procedia PDF Downloads 4007893 Characterizing the Rectification Process for Designing Scoliosis Braces: Towards Digital Brace Design
Authors: Inigo Sanz-Pena, Shanika Arachchi, Dilani Dhammika, Sanjaya Mallikarachchi, Jeewantha S. Bandula, Alison H. McGregor, Nicolas Newell
Abstract:
The use of orthotic braces for adolescent idiopathic scoliosis (AIS) patients is the most common non-surgical treatment to prevent deformity progression. The traditional method to create an orthotic brace involves casting the patient’s torso to obtain a representative geometry, which is then rectified by an orthotist to the desired geometry of the brace. Recent improvements in 3D scanning technologies, rectification software, CNC, and additive manufacturing processes have given the possibility to compliment, or in some cases, replace manual methods with digital approaches. However, the rectification process remains dependent on the orthotist’s skills. Therefore, the rectification process needs to be carefully characterized to ensure that braces designed through a digital workflow are as efficient as those created using a manual process. The aim of this study is to compare 3D scans of patients with AIS against 3D scans of both pre- and post-rectified casts that have been manually shaped by an orthotist. Six AIS patients were recruited from the Ragama Rehabilitation Clinic, Colombo, Sri Lanka. All patients were between 10 and 15 years old, were skeletally immature (Risser grade 0-3), and had Cobb angles between 20-45°. Seven spherical markers were placed at key anatomical locations on each patient’s torso and on the pre- and post-rectified molds so that distances could be reliably measured. 3D scans were obtained of 1) the patient’s torso and pelvis, 2) the patient’s pre-rectification plaster mold, and 3) the patient’s post-rectification plaster mold using a Structure Sensor Mark II 3D scanner (Occipital Inc., USA). 3D stick body models were created for each scan to represent the distances between anatomical landmarks. The 3D stick models were used to analyze the changes in position and orientation of the anatomical landmarks between scans using Blender open-source software. 3D Surface deviation maps represented volume differences between the scans using CloudCompare open-source software. The 3D stick body models showed changes in the position and orientation of thorax anatomical landmarks between the patient and the post-rectification scans for all patients. Anatomical landmark position and volume differences were seen between 3D scans of the patient’s torsos and the pre-rectified molds. Between the pre- and post-rectified molds, material removal was consistently seen on the anterior side of the thorax and the lateral areas below the ribcage. Volume differences were seen in areas where the orthotist planned to place pressure pads (usually at the trochanter on the side to which the lumbar curve was tilted (trochanter pad), at the lumbar apical vertebra (lumbar pad), on the rib connected to the apical vertebrae at the mid-axillary line (thoracic pad), and on the ribs corresponding to the upper thoracic vertebra (axillary extension pad)). The rectification process requires the skill and experience of an orthotist; however, this study demonstrates that the brace shape, location, and volume of material removed from the pre-rectification mold can be characterized and quantified. Results from this study can be fed into software that can accelerate the brace design process and make steps towards the automated digital rectification process.Keywords: additive manufacturing, orthotics, scoliosis brace design, sculpting software, spinal deformity
Procedia PDF Downloads 1517892 Enhanced Acquisition Time of a Quantum Holography Scheme within a Nonlinear Interferometer
Authors: Sergio Tovar-Pérez, Sebastian Töpfer, Markus Gräfe
Abstract:
The work proposes a technique that decreases the detection acquisition time of quantum holography schemes down to one-third; this allows the possibility to image moving objects. Since its invention, quantum holography with undetected photon schemes has gained interest in the scientific community. This is mainly due to its ability to tailor the detected wavelengths according to the needs of the scheme implementation. Yet this wavelength flexibility grants the scheme a wide range of possible applications; an important matter was yet to be addressed. Since the scheme uses digital phase-shifting techniques to retrieve the information of the object out of the interference pattern, it is necessary to acquire a set of at least four images of the interference pattern along with well-defined phase steps to recover the full object information. Hence, the imaging method requires larger acquisition times to produce well-resolved images. As a consequence, the measurement of moving objects remains out of the reach of the imaging scheme. This work presents the use and implementation of a spatial light modulator along with a digital holographic technique called quasi-parallel phase-shifting. This technique uses the spatial light modulator to build a structured phase image consisting of a chessboard pattern containing the different phase steps for digitally calculating the object information. Depending on the reduction in the number of needed frames, the acquisition time reduces by a significant factor. This technique opens the door to the implementation of the scheme for moving objects. In particular, the application of this scheme in imaging alive specimens comes one step closer.Keywords: quasi-parallel phase shifting, quantum imaging, quantum holography, quantum metrology
Procedia PDF Downloads 1177891 Unveiling Subconscious Autopoietic Reflexive Feedback Mechanisms of Second Order Governance from the Narration of Cognitive Autobiography of an ICT Lab during the Digital Revolution
Authors: Gianni Jacucci
Abstract:
We present a retrospective on the development of a research group over the past 30+ years. We reflect on a change in observing the experience (1990-2024) of a university sociotechnical research group dedicated to instill change for innovation in client organisations and enterprises. Its cognitive and action trajectory is influenced by subjective factors: intention and interpretation. Continuity and change are both present: the trajectory of the group exhibits the dynamic interplay of two components of subjectivity, a change of focus in persistence of scheme, and a tension between stability and change. The paper illustrates the meanings the group gave to their practice while laying down mission-critical theoretical considerations – autopoiesis-. The aim of the work is to experience a fragment of phenomenological understanding (PU) of the cognitive dynamics of an STS-aware ICT uptake Laboratory during the digital revolution. PU is an intuitive going along the meaning, while staying close and present to the total situation of the phenomenon. Reading the codes that we observers invent in order to codify what nature is about, thus unveiling subconscious, autopoietic, reflexive feedback mechanisms of second order governance from work published over three decades by the ICT Lab, as if it were the narration of its cognitive autobiography. The paper brings points of discussion and insights of relevance for the STS community. It could be helpful in understanding the history of the community and in providing a platform for discussions on future developments. It can also serve as an inspiration and a historical capture for those entering the field.Keywords: phenomenology, subjectivity, autopoiesis, interpretation schemes, change for innovation, socio technical research, social study of information systems
Procedia PDF Downloads 387890 An Efficient Traceability Mechanism in the Audited Cloud Data Storage
Authors: Ramya P, Lino Abraham Varghese, S. Bose
Abstract:
By cloud storage services, the data can be stored in the cloud, and can be shared across multiple users. Due to the unexpected hardware/software failures and human errors, which make the data stored in the cloud be lost or corrupted easily it affected the integrity of data in cloud. Some mechanisms have been designed to allow both data owners and public verifiers to efficiently audit cloud data integrity without retrieving the entire data from the cloud server. But public auditing on the integrity of shared data with the existing mechanisms will unavoidably reveal confidential information such as identity of the person, to public verifiers. Here a privacy-preserving mechanism is proposed to support public auditing on shared data stored in the cloud. It uses group signatures to compute verification metadata needed to audit the correctness of shared data. The identity of the signer on each block in shared data is kept confidential from public verifiers, who are easily verifying shared data integrity without retrieving the entire file. But on demand, the signer of the each block is reveal to the owner alone. Group private key is generated once by the owner in the static group, where as in the dynamic group, the group private key is change when the users revoke from the group. When the users leave from the group the already signed blocks are resigned by cloud service provider instead of owner is efficiently handled by efficient proxy re-signature scheme.Keywords: data integrity, dynamic group, group signature, public auditing
Procedia PDF Downloads 3957889 Contribution to the Compliance Study of Drugs for Herbal Teas Sold in Pharmacies
Authors: Mahiout Tassadit
Abstract:
As part of the study of a compliance and quality aspect concerning one of the plant-based products: drugs for herbal teas sold in pharmacies, a survey targeting: the general population (100 people of different age groups) as well as dispensary pharmacists (40 pharmacists from rural or urban areas) of the wilaya of Tizi-Ouzou (central Algeria) was carried out followed by a macroscopic and microscopic analysis of 4 samples of the said drugs, the survey carried out using two questionnaires, the data of which were collected and then analyzed, made it possible to estimate the population's use of herbal products and medicinal plants, and the place occupied by herbal medicine in our pharmacies. The second part made it possible to control and evaluate the information present on the packaging of drugs for herbal teas; anomalies concerning the packaging, labeling and composition of these products were noted. As a result, it is more than necessary to establish regulations for this type of product; the community pharmacist again places himself as an essential element for the proper dispensation of these remedies.Keywords: drugs, herbal teas, macroscopic analysis, microscopic analysis
Procedia PDF Downloads 867888 Threats and Preventive Methods to Avoid Bird Strikes at the Deblin Military Airfield, Poland
Authors: J. Cwiklak, M. Grzegorzewski, M. Adamski
Abstract:
The paper presents results of the project conducted in Poland devoted to study on bird strikes at military airfields. The main aim of this project was to develop methods of aircraft protection against threats from birds. The studies were carried out using two methods. One by transect and the other one by selected sector scanning. During the research, it was recorded, that 104 species of birds in the number about of 36000 were observed. The most frequent ones were starling Sturnus vulgaris (31.0%), jackdaw Corvus monedula (18.3%), rook Corvus frugilegus (15.9 %), lapwing Vanellus vanellus (6.2%). Moreover, it was found, that starlings constituted the most serious threat. It resulted from their relatively high attendance at the runway (about 300 individuals). Possible repellent techniques concerning of the Deblin military airfield were discussed. The analysis of the birds’ concentration depending on the altitude, part of the day, year, part of the airfield constituted a base to work out critical flight phase and appropriate procedures to prevent bird strikes.Keywords: airport, bird strikes, flight safety, preventive methods
Procedia PDF Downloads 4087887 Anti-Forensic Countermeasure: An Examination and Analysis Extended Procedure for Information Hiding of Android SMS Encryption Applications
Authors: Ariq Bani Hardi
Abstract:
Empowerment of smartphone technology is growing very rapidly in various fields of science. One of the mobile operating systems that dominate the smartphone market today is Android by Google. Unfortunately, the expansion of mobile technology is misused by criminals to hide the information that they store or exchange with each other. It makes law enforcement more difficult to prove crimes committed in the judicial process (anti-forensic). One of technique that used to hide the information is encryption, such as the usages of SMS encryption applications. A Mobile Forensic Examiner or an investigator should prepare a countermeasure technique if he finds such things during the investigation process. This paper will discuss an extension procedure if the investigator found unreadable SMS in android evidence because of encryption. To define the extended procedure, we create and analyzing a dataset of android SMS encryption application. The dataset was grouped by application characteristics related to communication permissions, as well as the availability of source code and the documentation of encryption scheme. Permissions indicate the possibility of how applications exchange the data and keys. Availability of the source code and the encryption scheme documentation can show what the cryptographic algorithm specification is used, how long the key length, how the process of key generation, key exchanges, encryption/decryption is done, and other related information. The output of this paper is an extended or alternative procedure for examination and analysis process of android digital forensic. It can be used to help the investigators while they got a confused cause of SMS encryption during examining and analyzing. What steps should the investigator take, so they still have a chance to discover the encrypted SMS in android evidence?Keywords: anti-forensic countermeasure, SMS encryption android, examination and analysis, digital forensic
Procedia PDF Downloads 1307886 Digital Athena – Contemporary Commentaries and Greek Mythology Explored through 3D Printing
Authors: Rose Lastovicka, Bernard Guy, Diana Burton
Abstract:
Greek myth and art acted as tools to think with, and a lens through which to explore complex topics as a form of social media. In particular, coins were a form of propaganda to communicate the wealth and power of the city-states they originated from as they circulated from person to person. From this, how can the application of 3D printing technologies explore the infusion of ancient forms with contemporary commentaries to promote discussion? The digital reconstruction of artifacts is a topic that has been researched by various groups all over the globe. Yet, the exploration of Greek myth through artifacts infused with contemporary issues is currently unexplored in this medium. Using the Stratasys J750 3D printer - a multi-material, full-colour 3D printer - a series of coins inspired by ancient Greek currency and myth was created to present commentaries on the adversities surrounding individuals in the LGBT+ community. Using the J750 as the medium for expression allows for complete control and precision of the models to create complex high-resolution iconography. The coins are printed with a hard, translucent material with coloured 3D visuals embedded into the coin to then be viewed in close contact by the audience. These coins as commentaries present an avenue for wider understanding by drawing perspectives not only from sources concerned with the contemporary LGBT+ community but also from sources exploring ancient homosexuality and the perception and regulation of it in antiquity. By displaying what are usually points of contention between anti- and pro-LGBT+ parties, this visual medium opens up a discussion to both parties, suggesting heritage can play a vital interpretative role in the contemporary world.Keywords: 3D printing, design, Greek mythology, LGBT+ community
Procedia PDF Downloads 1227885 Testing Method of Soil Failure Pattern of Sand Type as an Effort to Minimize the Impact of the Earthquake
Authors: Luthfi Assholam Solamat
Abstract:
Nowadays many people do not know the soil failure pattern as an important part in planning the under structure caused by the loading occurs. This is because the soil is located under the foundation, so it cannot be seen directly. Based on this study, the idea occurs to do a study for testing the soil failure pattern, especially the type of sand soil under the foundation. The necessity of doing this to the design of building structures on the land which is the initial part of the foundation structure that met with waves/vibrations during an earthquake. If the underground structure is not strong it is feared the building thereon more vulnerable to the risk of building damage. This research focuses on the search of soil failure pattern, which the most applicable in the field with the loading periodic re-testing of a particular time with the help of the integrated video visual observations performed. The results could be useful for planning under the structure in an effort to try the upper structure is minimal risk of the earthquake.Keywords: soil failure pattern, earthquake, under structure, sand soil testing method
Procedia PDF Downloads 3657884 New Methods to Acquire Grammatical Skills in A Foreign Language
Authors: Indu ray
Abstract:
In today’s digital world the internet is already flooded with information on how to master grammar in a foreign language. It is well known that one cannot master a language without grammar. Grammar is the backbone of any language. Without grammar there would be no structure to help you speak/write or listen/read. Successful communication is only possible if the form and function of linguistic utterances are firmly related to one another. Grammar has its own rules of use to formulate an easier-to-understand language. Like a tool, grammar formulates our thoughts and knowledge in a meaningful way. Every language has its own grammar. With grammar, we can quickly analyze whether there is any action in this text: (Present, past, future). Knowledge of grammar is an important prerequisite for mastering a foreign language. What’s most important is how teachers can make grammar lessons more interesting for students and thus promote grammar skills more successfully. Through this paper, we discuss a few important methods like (Interactive Grammar Exercises between students, Interactive Grammar Exercise between student to teacher, Grammar translation method, Audio -Visual Method, Deductive Method, Inductive Method). This paper is divided into two sections. In the first part, brief definitions and principles of these approaches will be provided. Then the possibility and the case of combination of this approach will be analyzed. In the last section of the paper, I would like to present a survey result conducted at my university on a few methods to quickly learn grammar in Foreign Language. We divided the Grammatical Skills in six Parts. 1.Grammatical Competence 2. Speaking Skills 3. Phonology 4. The syntax and the Semantics 5. Rule 6. Cognitive Function and conducted a survey among students. From our survey results, we can observe that phonology, speaking ability, syntax and semantics can be improved by inductive method, Audio-visual Method, and grammatical translation method, for grammar rules and cognitive functions we should choose IGE (teacher-student) method. and the IGE method (pupil-pupil). The study’s findings revealed, that the teacher delivery Methods should be blend or fusion based on the content of the Grammar.Keywords: innovative method, grammatical skills, audio-visual, translation
Procedia PDF Downloads 807883 A Deleuzean Feminist Analysis of the Everyday, Gendered Performances of Teen Femininity: A Case Study on Snaps and Selfies in East London
Authors: Christine Redmond
Abstract:
This paper contributes to research on gendered, digital identities by exploring how selfies offer scope for disrupting and moving through gendered and racial ideals of feminine beauty. The selfie involves self-presentation, filters, captions, hashtags, online publishing, likes and more, constituting the relationship between subjectivity, practice and social use of selfies a complex process. Employing qualitative research methods on youth selfies in the UK, the author investigates interdisciplinary entangling between studies of social media and fields within gender, media and cultural studies, providing a material discursive treatment of the selfie as an embodied practice. Drawing on data collected from focus groups with teenage girls in East London, the study explores how girls experience and relate to selfies and snaps in their everyday lives. The author’s Deleuzean feminist approach suggests that bodies and selfies are not individual, disembodied entities between which there is a mediating inter-action. Instead, bodies and selfies are positioned as entangled to a point where it becomes unclear as to where a selfie ends and a body begins. Recognising selfies not just as images but as material and social assemblages opens up possibilities for unpacking the selfie in ways that move beyond the representational model in some studies of socially mediated digital images. The study reveals how the selfie functions to enable moments of empowerment within limiting, dominant ideologies of Euro-centrism, patriarchy and heteronormativity.Keywords: affect theory, femininity, gender, heteronormativity, photography, selfie, snapchat
Procedia PDF Downloads 2517882 Social Network Roles in Organizations: Influencers, Bridges, and Soloists
Authors: Sofia Dokuka, Liz Lockhart, Alex Furman
Abstract:
Organizational hierarchy, traditionally composed of individual contributors, middle management, and executives, is enhanced by the understanding of informal social roles. These roles, identified with organizational network analysis (ONA), might have an important effect on organizational functioning. In this paper, we identify three social roles – influencers, bridges, and soloists, and provide empirical analysis based on real-world organizational networks. Influencers are employees with broad networks and whose contacts also have rich networks. Influence is calculated using PageRank, initially proposed for measuring website importance, but now applied in various network settings, including social networks. Influencers, having high PageRank, become key players in shaping opinions and behaviors within an organization. Bridges serve as links between loosely connected groups within the organization. Bridges are identified using betweenness and Burt’s constraint. Betweenness quantifies a node's control over information flows by evaluating its role in the control over the shortest paths within the network. Burt's constraint measures the extent of interconnection among an individual's contacts. A high constraint value suggests fewer structural holes and lesser control over information flows, whereas a low value suggests the contrary. Soloists are individuals with fewer than 5 stable social contacts, potentially facing challenges due to reduced social interaction and hypothetical lack of feedback and communication. We considered social roles in the analysis of real-world organizations (N=1,060). Based on data from digital traces (Slack, corporate email and calendar) we reconstructed an organizational communication network and identified influencers, bridges and soloists. We also collected employee engagement data through an online survey. Among the top-5% of influencers, 10% are members of the Executive Team. 56% of the Executive Team members are part of the top influencers group. The same proportion of top influencers (10%) is individual contributors, accounting for just 0.6% of all individual contributors in the company. The majority of influencers (80%) are at the middle management level. Out of all middle managers, 19% hold the role of influencers. However, individual contributors represent a small proportion of influencers, and having information about these individuals who hold influential roles can be crucial for management in identifying high-potential talents. Among the bridges, 4% are members of the Executive Team, 16% are individual contributors, and 80% are middle management. Predominantly middle management acts as a bridge. Bridge positions of some members of the executive team might indicate potential micromanagement on the leader's part. Recognizing the individuals serving as bridges in an organization uncovers potential communication problems. The majority of soloists are individual contributors (96%), and 4% of soloists are from middle management. These managers might face communication difficulties. We found an association between being an influencer and attitude toward a company's direction. There is a statistically significant 20% higher perception that the company is headed in the right direction among influencers compared to non-influencers (p < 0.05, Mann-Whitney test). Taken together, we demonstrate that considering social roles in the company might indicate both positive and negative aspects of organizational functioning that should be considered in data-driven decision-making.Keywords: organizational network analysis, social roles, influencer, bridge, soloist
Procedia PDF Downloads 1117881 Reading as Moral Afternoon Tea: An Empirical Study on the Compensation Effect between Literary Novel Reading and Readers’ Moral Motivation
Authors: Chong Jiang, Liang Zhao, Hua Jian, Xiaoguang Wang
Abstract:
The belief that there is a strong relationship between reading narrative and morality has generally become the basic assumption of scholars, philosophers, critics, and cultural critics. The virtuality constructed by literary novels inspires readers to regard the narrative as a thinking experiment, creating the distance between readers and events so that they can freely and morally experience the positions of different roles. Therefore, the virtual narrative combined with literary characteristics is always considered as a "moral laboratory." Well-established findings revealed that people show less lying and deceptive behaviors in the morning than in the afternoon, called the morning morality effect. As a limited self-regulation resource, morality will be constantly depleted with the change of time rhythm under the influence of the morning morality effect. It can also be compensated and restored in various ways, such as eating, sleeping, etc. As a common form of entertainment in modern society, literary novel reading gives people more virtual experience and emotional catharsis, just as a relaxing afternoon tea that helps people break away from fast-paced work, restore physical strength, and relieve stress in a short period of leisure. In this paper, inspired by the compensation control theory, we wonder whether reading literary novels in the digital environment could replenish a kind of spiritual energy for self-regulation to compensate for people's moral loss in the afternoon. Based on this assumption, we leverage the social annotation text content generated by readers in digital reading to represent the readers' reading attention. We then recognized the semantics and calculated the readers' moral motivation expressed in the annotations and investigated the fine-grained dynamics of the moral motivation changing in each time slot within 24 hours of a day. Comprehensively comparing the division of different time intervals, sufficient experiments showed that the moral motivation reflected in the annotations in the afternoon is significantly higher than that in the morning. The results robustly verified the hypothesis that reading compensates for moral motivation, which we called the moral afternoon tea effect. Moreover, we quantitatively identified that such moral compensation can last until 14:00 in the afternoon and 21:00 in the evening. In addition, it is interesting to find that the division of time intervals of different units impacts the identification of moral rhythms. Dividing the time intervals by four-hour time slot brings more insights of moral rhythms compared with that of three-hour and six-hour time slot.Keywords: digital reading, social annotation, moral motivation, morning morality effect, control compensation
Procedia PDF Downloads 152