Search results for: 3D digital sculpting
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 2795

Search results for: 3D digital sculpting

965 Evaluation of Condyle Alterations after Orthognathic Surgery with a Digital Image Processing Technique

Authors: Livia Eisler, Cristiane C. B. Alves, Cristina L. F. Ortolani, Kurt Faltin Jr.

Abstract:

Purpose: This paper proposes a technically simple diagnosis method among orthodontists and maxillofacial surgeons in order to evaluate discrete bone alterations. The methodology consists of a protocol to optimize the diagnosis and minimize the possibility for orthodontic and ortho-surgical retreatment. Materials and Methods: A protocol of image processing and analysis, through ImageJ software and its plugins, was applied to 20 pairs of lateral cephalometric images obtained from cone beam computerized tomographies, before and 1 year after undergoing orthognathic surgery. The optical density of the images was analyzed in the condylar region to determine possible bone alteration after surgical correction. Results: Image density was shown to be altered in all image pairs, especially regarding the condyle contours. According to measures, condyle had a gender-related density reduction for p=0.05 and condylar contours had their alterations registered in mm. Conclusion: A simple, viable and cost-effective technique can be applied to achieve the more detailed image-based diagnosis, not depending on the human eye and therefore, offering more reliable, quantitative results.

Keywords: bone resorption, computer-assisted image processing, orthodontics, orthognathic surgery

Procedia PDF Downloads 160
964 Enhancing Experiential Learning in a Smart Flipped Classroom: A Case Study

Authors: Fahri Benli, Sitalakshmi Venkartraman, Ye Wei, Fiona Wahr

Abstract:

A flipped classroom which is a form of blended learning shifts the focus from a teacher-centered approach to a learner-centered approach. However, not all learners are ready to take the active role of knowledge and skill acquisition through a flipped classroom and they continue to delve in a passive mode of learning. This challenges educators in designing, scaffolding and facilitating in-class activities for students to have active learning experiences in a flipped classroom environment. Experiential learning theories have been employed by educators in the past in physical classrooms based on the principle that knowledge could be actively developed through direct experience. However, with more of online teaching witnessed recently, there are inherent limitations in designing and simulating an experiential learning activity for an online environment. In this paper, we explore enhancing experiential learning using smart digital tools that could be employed in a flipped classroom within a higher education setting. We present the use of smart collaborative tools online to enhance the experiential learning activity to teach higher-order cognitive concepts of business process modelling as a case study.

Keywords: experiential learning, flipped classroom, smart software tools, online learning higher-order learning attributes

Procedia PDF Downloads 189
963 Trademarks and Non-Fungible Tokens: New Frontiers for Trademark Law

Authors: Dima Basma

Abstract:

The unprecedented expansion in the use of Non-Fungible Tokens (NFTS) has prompted luxury brand owners to file their trademark applications for the use of their marks in the metaverse world. While NFTs provide a favorable tool for product traceability and anti-counterfeiting endeavors, the legal ramifications of such abrupt shift are complex, diverse, and yet to be understood. Practically, a sizable number of NFT creators are minting digital tokens associated with existing trademarks, selling them at strikingly high rates, thus disadvantaging trademark owners who joined and are yet to join the meta-verse world. As a result, multiple luxury brands are filing confusion and dilution lawsuits against alleged artists offering for sale NFTs depicting reputable marks labeling their use as “parody” and “social commentary.” Given the already muddled state of trademark law in relation to both traditional and modern infringement criteria, this paper aims to explore the feasibility of the current system in dealing with the emerging NFT trends. The paper firstly delves into the intersection between trademarks and NFTs. Furthermore, in light of the striking increase in NFT use, the paper sheds critical light on the shortcoming of the current system. Finally, the paper provides recommendations for overcoming current and prospective challenges in this area.

Keywords: trademarks, NFTs, dilution, social commentary

Procedia PDF Downloads 117
962 Perceptions of Educators on the Learners’ Youngest Age for the Introduction of ICTs in Schools: A Personality Theory Approach

Authors: Kayode E. Oyetade, Seraphin D. Eyono Obono

Abstract:

Age ratings are very helpful in providing parents with relevant information for the purchase and use of digital technologies by the children; this is why the non-definition of age ratings for the use of ICT's by children in schools is a major concern; and this problem serves as a motivation for this study whose aim is to examine the factors affecting the perceptions of educators on the learners’ youngest age for the introduction of ICT's in schools. This aim is achieved through two types of research objectives: the identification and design of theories and models on age ratings, and the empirical testing of such theories and models in a survey of educators from the Camperdown district of the South African KwaZulu-Natal province. A questionnaire is used for the collection of the data of this survey whose validity and reliability is checked in SPSS prior to its descriptive and correlative quantitative analysis. The main hypothesis supporting this research is the association between the demographics of educators, their personality, and their perceptions on the learners’ youngest age for the introduction of ICT's in schools; as claimed by existing research; except that the present study looks at personality from three dimensions: self-actualized personalities, fully functioning personalities, and healthy personalities. This hypothesis was fully confirmed by the empirical study conducted by this research except for the demographic factor where only the educators’ grade or class was found to be associated with the personality of educators.

Keywords: age ratings, educators, e-learning, personality theories

Procedia PDF Downloads 237
961 Study of Aerosol Deposition and Shielding Effects on Fluorescent Imaging Quantitative Evaluation in Protective Equipment Validation

Authors: Shinhao Yang, Hsiao-Chien Huang, Chin-Hsiang Luo

Abstract:

The leakage of protective clothing is an important issue in the occupational health field. There is no quantitative method for measuring the leakage of personal protective equipment. This work aims to measure the quantitative leakage of the personal protective equipment by using the fluorochrome aerosol tracer. The fluorescent aerosols were employed as airborne particulates in a controlled chamber with ultraviolet (UV) light-detectable stickers. After an exposure-and-leakage test, the protective equipment was removed and photographed with UV-scanning to evaluate areas, color depth ratio, and aerosol deposition and shielding effects of the areas where fluorescent aerosols had adhered to the body through the protective equipment. Thus, this work built a calculation software for quantitative leakage ratio of protective clothing based on fluorescent illumination depth/aerosol concentration ratio, illumination/Fa ratio, aerosol deposition and shielding effects, and the leakage area ratio on the segmentation. The results indicated that the two-repetition total leakage rate of the X, Y, and Z type protective clothing for subject T were about 3.05, 4.21, and 3.52 (mg/m2). For five-repetition, the leakage rate of T were about 4.12, 4.52, and 5.11 (mg/m2).

Keywords: fluorochrome, deposition, shielding effects, digital image processing, leakage ratio, personal protective equipment

Procedia PDF Downloads 322
960 Sporting Events among the Disabled between Excellence and Ideal in Motor Performance: Analytical Descriptive Study in Some Paralympic Sports

Authors: Guebli Abdelkader, Reguieg Madani, Belkadi Adel, Sbaa Bouabdellah

Abstract:

The identification of mechanical variables in the motor performance trajectory has a prominent role in improving skill performance, error-exceeding, it contributes seriously to solving some problems of learning and training. The study aims to highlight the indicators of motor performance for Paralympic athletes during the practicing sports between modelling and between excellence in motor performance, this by taking into account the distinction of athlete practicing with special behavioral skills for the Paralympic athletes. In the study, we relied on the analysis of some previous research of biomechanical performance indicators during some of the events sports (shooting activities in the Paralympic athletics, shooting skill in the wheelchair basketball). The results of the study highlight the distinction of disabled practitioners of sporting events identified in motor performance during practice, by overcoming some physics indicators in human movement, as a lower center of body weight, increase in offset distance, such resistance which requires them to redouble their efforts. However, the results of the study highlighted the strength of the correlation between biomechanical variables of motor performance and the digital level achievement similar to the other practitioners normal.

Keywords: sports, the disabled, motor performance, Paralympic

Procedia PDF Downloads 283
959 Analysis of Vocal Fold Vibrations from High-Speed Digital Images Based on Dynamic Time Warping

Authors: A. I. A. Rahman, Sh-Hussain Salleh, K. Ahmad, K. Anuar

Abstract:

Analysis of vocal fold vibration is essential for understanding the mechanism of voice production and for improving clinical assessment of voice disorders. This paper presents a Dynamic Time Warping (DTW) based approach to analyze and objectively classify vocal fold vibration patterns. The proposed technique was designed and implemented on a Glottal Area Waveform (GAW) extracted from high-speed laryngeal images by delineating the glottal edges for each image frame. Feature extraction from the GAW was performed using Linear Predictive Coding (LPC). Several types of voice reference templates from simulations of clear, breathy, fry, pressed and hyperfunctional voice productions were used. The patterns of the reference templates were first verified using the analytical signal generated through Hilbert transformation of the GAW. Samples from normal speakers’ voice recordings were then used to evaluate and test the effectiveness of this approach. The classification of the voice patterns using the technique of LPC and DTW gave the accuracy of 81%.

Keywords: dynamic time warping, glottal area waveform, linear predictive coding, high-speed laryngeal images, Hilbert transform

Procedia PDF Downloads 239
958 Leakage Current Analysis of FinFET Based 7T SRAM at 32nm Technology

Authors: Chhavi Saxena

Abstract:

FinFETs can be a replacement for bulk-CMOS transistors in many different designs. Its low leakage/standby power property makes FinFETs a desirable option for memory sub-systems. Memory modules are widely used in most digital and computer systems. Leakage power is very important in memory cells since most memory applications access only one or very few memory rows at a given time. As technology scales down, the importance of leakage current and power analysis for memory design is increasing. In this paper, we discover an option for low power interconnect synthesis at the 32nm node and beyond, using Fin-type Field-Effect Transistors (FinFETs) which are a promising substitute for bulk CMOS at the considered gate lengths. We consider a mechanism for improving FinFETs efficiency, called variable supply voltage schemes. In this paper, we’ve illustrated the design and implementation of FinFET based 4x4 SRAM cell array by means of one bit 7T SRAM. FinFET based 7T SRAM has been designed and analysis have been carried out for leakage current, dynamic power and delay. For the validation of our design approach, the output of FinFET SRAM array have been compared with standard CMOS SRAM and significant improvements are obtained in proposed model.

Keywords: FinFET, 7T SRAM cell, leakage current, delay

Procedia PDF Downloads 455
957 Identifying the Structural Components of Old Buildings from Floor Plans

Authors: Shi-Yu Xu

Abstract:

The top three risk factors that have contributed to building collapses during past earthquake events in Taiwan are: "irregular floor plans or elevations," "insufficient columns in single-bay buildings," and the "weak-story problem." Fortunately, these unsound structural characteristics can be directly identified from the floor plans. However, due to the vast number of old buildings, conducting manual inspections to identify these compromised structural features in all existing structures would be time-consuming and prone to human errors. This study aims to develop an algorithm that utilizes artificial intelligence techniques to automatically pinpoint the structural components within a building's floor plans. The obtained spatial information will be utilized to construct a digital structural model of the building. This information, particularly regarding the distribution of columns in the floor plan, can then be used to conduct preliminary seismic assessments of the building. The study employs various image processing and pattern recognition techniques to enhance detection efficiency and accuracy. The study enables a large-scale evaluation of structural vulnerability for numerous old buildings, providing ample time to arrange for structural retrofitting in those buildings that are at risk of significant damage or collapse during earthquakes.

Keywords: structural vulnerability detection, object recognition, seismic capacity assessment, old buildings, artificial intelligence

Procedia PDF Downloads 89
956 Translingual English: New languages and new identities

Authors: Sender Dovchin

Abstract:

The recent bi/multilingual scholarship shows that the knowledge of ‘translingual English’ is understood in terms of transcultural flows of linguistic, semiotic and cultural resources, where these resources re-transform and are recontextualised to form new specific languages and perform new identities in diverse societal contexts. Drawing on linguistic ethnographic data from contemporary popular music artist in Mongolia, this paper addresses two main critical questions: (1) how new forms of specific languages are created when English becomes translingual English in local contexts; and (2) how new varieties of local identities are constructed and performed when English transforms into translingual English. The paper argues that popular music artists in post-socialist Mongolia should better be understood as active cultural producers, contrary to those dominant discourses which position artists in the periphery as passive recipients of popular culture. Positioned within the creative nature of the global digital resources and the increasing transcultural spread of linguistic and cultural modes and features, these young Mongolian popular music artists produce not only new forms of linguistic practices in the local contexts but also create varied new forms of identities of what it means to be a young Mongolian person in the modern society.

Keywords: multilingualism, translingualism, mongolia, english

Procedia PDF Downloads 62
955 Cyber Security Situational Awareness among Students: A Case Study in Malaysia

Authors: Yunos Zahri, Ab Hamid R. Susanty, Ahmad Mustaffa

Abstract:

This paper explores the need for a national baseline study on understanding the level of cyber security situational awareness among primary and secondary school students in Malaysia. The online survey method was deployed to administer the data collection exercise. The target groups were divided into three categories: Group 1 (primary school aged 7-9 years old), Group 2 (primary school aged 10-12 years old), and Group 3 (secondary school aged 13-17 years old). A different questionnaire set was designed for each group. The survey topics/areas included Internet and digital citizenship knowledge. Respondents were randomly selected from rural and urban areas throughout all 14 states in Malaysia. A total of 9,158 respondents participated in the survey, with most states meeting the minimum sample size requirement to represent the country’s demographics. The findings and recommendations from this baseline study are fundamental to develop teaching modules required for children to understand the security risks and threats associated with the Internet throughout their years in school. Early exposure and education will help ensure healthy cyber habits among millennials in Malaysia.

Keywords: cyber security awareness, cyber security education, cyber security, school students

Procedia PDF Downloads 302
954 Role of Geomatics in Architectural and Cultural Conservation

Authors: Shweta Lall

Abstract:

The intent of this paper is to demonstrate the role of computerized auxiliary science in advancing the desired and necessary alliance of historians, surveyors, topographers, and analysts of architectural conservation and management. The digital era practice of recording architectural and cultural heritage in view of its preservation, dissemination, and planning developments are discussed in this paper. Geomatics include practices like remote sensing, photogrammetry, surveying, Geographic Information System (GIS), laser scanning technology, etc. These all resources help in architectural and conservation applications which will be identified through various case studies analysed in this paper. The standardised outcomes and the methodologies using relevant case studies are listed and described. The main component of geomatics methodology adapted in conservation is data acquisition, processing, and presentation. Geomatics is used in a wide range of activities involved in architectural and cultural heritage – damage and risk assessment analysis, documentation, 3-D model construction, virtual reconstruction, spatial and structural decision – making analysis and monitoring. This paper will project the summary answers of the capabilities and limitations of the geomatics field in architectural and cultural conservation. Policy-makers, urban planners, architects, and conservationist not only need answers to these questions but also need to practice them in a predictable, transparent, spatially explicit and inexpensive manner.

Keywords: architectural and cultural conservation, geomatics, GIS, remote sensing

Procedia PDF Downloads 146
953 Analyzing Speech Acts in Reddit Posts of Formerly Incarcerated Youths

Authors: Yusra Ibrahim

Abstract:

This study explores the online discourse of justice-involved youth on Reddit, focusing on how anonymity and asynchronicity influence their ability to share and reflect on their incarceration experiences within the "Ask Me Anything" (AMA) community. The study utilizes a quantitative analysis of speech acts to examine the varied communication patterns exhibited by youths and commenters across two AMA threads. The results indicate that, although Reddit is not specifically designed for formerly incarcerated youths, its features provide a supportive environment for them to share their incarceration experiences with non-incarcerated individuals. The level of empathy and support from the audience varies based on the audience’s perspectives on incarceration and related traumatic experiences. Additionally, the study identifies a reciprocal relationship where youths benefit from community support while offering insights into the juvenile justice system and helping the audience understand the experience of incarceration. The study also reveals cultural shocks in physical and digital environments that youth experience after release and when using social media platforms and the internet. The study has implications for juvenile justice personnel, policymakers, and researchers in the juvenile justice system.

Keywords: juvenile justice, online discourse, reddit AMA, anonymity, speech acts taxonomy, reintegration, online community support

Procedia PDF Downloads 42
952 Indicators for Success of Obesity Reduction Programs in Adolescents; Body Composition and Body Mass Index: Evaluating a School-Based Health Promotion Project in Iran after 12 Weeks of Intervention

Authors: Saeid Doaei

Abstract:

Background: Obesity in adolescence is a primary risk factor for obesity in adulthood. The objective of this study was the assessment of the effect of a comprehensive lifestyle intervention on different anthropometric indices in 12 to 16 years old boy adolescents. Methods: 96 adolescent boys of two schools of District 5 of Tehran have participated in this study. The schools were randomly assigned as intervention school (n=53) and control school (n=43). The height and weight of students were measured with a calibrated tape line and digital scale respectively and their BMI were calculated. The amounts of body fat percent (BF) and body muscle (BM) percent were determined by Bio Impedance Analyzer (BIA) considering the age, gender and height of students at baseline and after intervention. The intervention was implemented in the intervention school, according to the Ottawa charter principles. Results: 12 weeks of intervention decreased body fat percent in the intervention group in comparison with the control group (decreased by 1.81 % in the intervention group and increased by .39 % in the control group, P < .01). However, weight, BMI and BM did not change significantly. Conclusion: The result of this study showed that the implementation of comprehensive intervention in obese adolescents may improve the body composition, although these changes may not be reflected in BMI. It is possible that BMI is not a good indicator in assessment of the success of obesity management intervention.

Keywords: obesity, childhood, BMI, nutrition

Procedia PDF Downloads 271
951 An Immune-Inspired Web Defense Architecture

Authors: Islam Khalil, Amr El-Kadi

Abstract:

With the increased use of web technologies, microservices, and Application Programming Interface (API) for integration between systems, and with the development of containerization of services on the operating system level as a method of isolating system execution and for easing the deployment and scaling of systems, there is a growing need as well as opportunities for providing platforms that improve the security of such services. In our work, we propose an architecture for a containerization platform that utilizes various concepts derived from the human immune system. The goal of the proposed containerization platform is to introduce the concept of slowing down or throttling suspected malicious digital pathogens (intrusions) to reduce their damage footprint while providing more opportunities for forensic inspection of suspected pathogens in addition to the ability to snapshot, rollback, and recover from possible damage. The proposed platform also leverages existing intrusion detection algorithms by integrating and orchestrating their cooperative operation for more effective intrusion detection. We show how this model reduces the damage footprint of intrusions and gives a greater time window for forensic investigation. Moreover, during our experiments, our proposed platform was able to uncover unintentional system design flaws that resulted in internal DDoS-like attacks by submodules of the system itself rather than external intrusions.

Keywords: containers, human immunity, intrusion detection, security, web services

Procedia PDF Downloads 95
950 Comparing Image Processing and AI Techniques for Disease Detection in Plants

Authors: Luiz Daniel Garay Trindade, Antonio De Freitas Valle Neto, Fabio Paulo Basso, Elder De Macedo Rodrigues, Maicon Bernardino, Daniel Welfer, Daniel Muller

Abstract:

Agriculture plays an important role in society since it is one of the main sources of food in the world. To help the production and yield of crops, precision agriculture makes use of technologies aiming at improving productivity and quality of agricultural commodities. One of the problems hampering quality of agricultural production is the disease affecting crops. Failure in detecting diseases in a short period of time can result in small or big damages to production, causing financial losses to farmers. In order to provide a map of the contributions destined to the early detection of plant diseases and a comparison of the accuracy of the selected studies, a systematic literature review of the literature was performed, showing techniques for digital image processing and neural networks. We found 35 interesting tool support alternatives to detect disease in 19 plants. Our comparison of these studies resulted in an overall average accuracy of 87.45%, with two studies very closer to obtain 100%.

Keywords: pattern recognition, image processing, deep learning, precision agriculture, smart farming, agricultural automation

Procedia PDF Downloads 379
949 Streamline Marketing Strategies for Survival of Librarianship in Developing Countries in the 21st Century: A Study Related to Sri Lanka

Authors: Wilfred Jeyatheese Jeyaraj

Abstract:

Considering the current digital age, Library Marketing, in its entirety, has evolved to elucidate the importance of falling back to the roots of searching for tangible and intangible resources, traversing through pages and references to acquire the required knowledge needs with proper guidance. With the turn of the century, the present generation has deeply entrenched their virtual presence, browsing via search engines for all their information needs. Not fully realizing the adverse effects of the materials available digitally, the authenticity of such resources cannot be verified. So a user might be led to believe false misdirected data. This paper tends to elucidate the prominent strategies to market Sri Lankan libraries in a proper manner so as to captivate a large user base making them aware that all resources and materials that they access without guidance outside the libraries are also available within the libraries with added guidance towards accessing the right data. The main contemplation here is to focus on getting more users to visit libraries in person to copiously apprehend the importance of browsing for materials with the proper direction. The current library marketing strategies in Sri Lankan libraries need to be streamlined to align with the best interest of acquiring the present generations to visit libraries in person to reap its benefits.

Keywords: accessibility, librarianship, marketing, Sri Lanka

Procedia PDF Downloads 284
948 An Image Enhancement Method Based on Curvelet Transform for CBCT-Images

Authors: Shahriar Farzam, Maryam Rastgarpour

Abstract:

Image denoising plays extremely important role in digital image processing. Enhancement of clinical image research based on Curvelet has been developed rapidly in recent years. In this paper, we present a method for image contrast enhancement for cone beam CT (CBCT) images based on fast discrete curvelet transforms (FDCT) that work through Unequally Spaced Fast Fourier Transform (USFFT). These transforms return a table of Curvelet transform coefficients indexed by a scale parameter, an orientation and a spatial location. Accordingly, the coefficients obtained from FDCT-USFFT can be modified in order to enhance contrast in an image. Our proposed method first uses a two-dimensional mathematical transform, namely the FDCT through unequal-space fast Fourier transform on input image and then applies thresholding on coefficients of Curvelet to enhance the CBCT images. Consequently, applying unequal-space fast Fourier Transform leads to an accurate reconstruction of the image with high resolution. The experimental results indicate the performance of the proposed method is superior to the existing ones in terms of Peak Signal to Noise Ratio (PSNR) and Effective Measure of Enhancement (EME).

Keywords: curvelet transform, CBCT, image enhancement, image denoising

Procedia PDF Downloads 300
947 Media Literacy: Information and Communication Technology Impact on Teaching and Learning Methods in Albanian Education System

Authors: Loreta Axhami

Abstract:

Media literacy in the digital age emerges not only as a set of skills to generate true knowledge and information but also as a pedagogy methodology, as a kind of educational philosophy. In addition to such innovations as information integration and communication technologies, media infrastructures, and web usage in the educational system, media literacy enables the change in the learning methods, pedagogy, teaching programs, and school curriculum itself. In this framework, this study focuses on ICT's impact on teaching and learning methods and the degree they are reflected in the Albanian education system. The study is based on a combination of quantitative and qualitative methods of scientific research. Referring to the study findings, it results that student’s limited access to the internet in school, focus on the hardcopy textbooks and the role of the teacher as the only or main source of knowledge and information are some of the main factors contributing to the implementation of authoritarian pedagogical methods in the Albanian education system. In these circumstances, the implementation of media literacy is recommended as an apt educational process for the 21st century, which requires a reconceptualization of textbooks as well as the application of modern teaching and learning methods by integrating information and communication technologies.

Keywords: authoritarian pedagogic model, education system, ICT, media literacy

Procedia PDF Downloads 140
946 CVOIP-FRU: Comprehensive VoIP Forensics Report Utility

Authors: Alejandro Villegas, Cihan Varol

Abstract:

Voice over Internet Protocol (VoIP) products is an emerging technology that can contain forensically important information for a criminal activity. Without having the user name and passwords, this forensically important information can still be gathered by the investigators. Although there are a few VoIP forensic investigative applications available in the literature, most of them are particularly designed to collect evidence from the Skype product. Therefore, in order to assist law enforcement with collecting forensically important information from variety of Betamax VoIP tools, CVOIP-FRU framework is developed. CVOIP-FRU provides a data gathering solution that retrieves usernames, contact lists, as well as call and SMS logs from Betamax VoIP products. It is a scripting utility that searches for data within the registry, logs and the user roaming profiles in Windows and Mac OSX operating systems. Subsequently, it parses the output into readable text and html formats. One superior way of CVOIP-FRU compared to the other applications that due to intelligent data filtering capabilities and cross platform scripting back end of CVOIP-FRU, it is expandable to include other VoIP solutions as well. Overall, this paper reveals the exploratory analysis performed in order to find the key data paths and locations, the development stages of the framework, and the empirical testing and quality assurance of CVOIP-FRU.

Keywords: betamax, digital forensics, report utility, VoIP, VoIPBuster, VoIPWise

Procedia PDF Downloads 297
945 The Potential Threat of Cyberterrorism to the National Security: Theoretical Framework

Authors: Abdulrahman S. Alqahtani

Abstract:

The revolution of computing and networks could revolutionise terrorism in the same way that it has brought about changes in other aspects of life. The modern technological era has faced countries with a new set of security challenges. There are many states and potential adversaries who have the potential and capacity in cyberspace, which makes them able to carry out cyber-attacks in the future. Some of them are currently conducting surveillance, gathering and analysis of technical information, and mapping of networks and nodes and infrastructure of opponents, which may be exploited in future conflicts. This poster presents the results of the quantitative study (survey) to test the validity of the proposed theoretical framework for the cyber terrorist threats. This theoretical framework will help to in-depth understand these new digital terrorist threats. It may also be a practical guide for managers and technicians in critical infrastructure, to understand and assess the threats they face. It might also be the foundation for building a national strategy to counter cyberterrorism. In the beginning, it provides basic information about the data. To purify the data, reliability and exploratory factor analysis, as well as confirmatory factor analysis (CFA) were performed. Then, Structural Equation Modelling (SEM) was utilised to test the final model of the theory and to assess the overall goodness-of-fit between the proposed model and the collected data set.

Keywords: cyberterrorism, critical infrastructure, , national security, theoretical framework, terrorism

Procedia PDF Downloads 405
944 An Acoustical Diagnosis of a Shaft-Wood Phyto-Pathogenic Damage of Sequoiadendron giganteum (Lindl.) Buccholz

Authors: Yuri V. Plugatar, Vladimir P. Koba, Vladimir V. Papelbu, Vladimir N. Gerasimchuk, Tatjana M. Sakhno

Abstract:

Using a supersonic shaft–wood tomography, the evaluation of a shaft-wood phyto-pathogenic damage level of Sequoiadendron giganteum (Lindl.) Buccholz was prosecuted. The digital bivariate reflections of the shaft tissue damage were obtained, the characteristics of comparative parameters of the wood-decay degree were given. The investigation results allowed to show up the role of some edaphic factors in their affection on a vital condition and the level of destructive processes while shaft tissue damaging of S.giganteum. It was pinned up that soil consolidation, and hydro-morphication equally make for a phyto-pathogenic damage of plants. While soil consolidation negative acting the shaft-wood damage is located in an underneath of a shaft. In the conditions of an enlarged hydro-morphication a tissue degradation runs less intensively, the destructive processes more active spread in a vertical section of a shaft. The use of a supersonic tomography method gives wide possibilities to diagnose a shaft-wood phyto-pathogenic damage.

Keywords: Sequoiadendron giganteum (Lindl.) Buccholz, supersonic tomography, diagnosis, phyto-pathogenic damage, a vital condition

Procedia PDF Downloads 213
943 Design and Realization of Double-Delay Line Canceller (DDLC) Using Fpga

Authors: A. E. El-Henawey, A. A. El-Kouny, M. M. Abd –El-Halim

Abstract:

Moving target indication (MTI) which is an anti-clutter technique that limits the display of clutter echoes. It uses the radar received information primarily to display moving targets only. The purpose of MTI is to discriminate moving targets from a background of clutter or slowly-moving chaff particles as shown in this paper. Processing system in these radars is so massive and complex; since it is supposed to perform a great amount of processing in very short time, in most radar applications the response of a single canceler is not acceptable since it does not have a wide notch in the stop-band. A double-delay canceler is an MTI delay-line canceler employing the two-delay-line configuration to improve the performance by widening the clutter-rejection notches, as compared with single-delay cancelers. This canceler is also called a double canceler, dual-delay canceler, or three-pulse canceler. In this paper, a double delay line canceler is chosen for study due to its simplicity in both concept and implementation. Discussing the implementation of a simple digital moving target indicator (DMTI) using FPGA which has distinct advantages compared to other application specific integrated circuit (ASIC) for the purposes of this work. The FPGA provides flexibility and stability which are important factors in the radar application.

Keywords: FPGA, MTI, double delay line canceler, Doppler Shift

Procedia PDF Downloads 644
942 Simulation and Experimental Research on Pocketing Operation for Toolpath Optimization in CNC Milling

Authors: Rakesh Prajapati, Purvik Patel, Avadhoot Rajurkar

Abstract:

Nowadays, manufacturing industries augment their production lines with modern machining centers backed by CAM software. Several attempts are being made to cut down the programming time for machining complex geometries. Special programs/software have been developed to generate the digital numerical data and to prepare NC programs by using suitable post-processors for different machines. By selecting the tools and manufacturing process then applying tool paths and NC program are generated. More and more complex mechanical parts that earlier were being cast and assembled/manufactured by other processes are now being machined. Majority of these parts require lots of pocketing operations and find their applications in die and mold, turbo machinery, aircraft, nuclear, defense etc. Pocketing operations involve removal of large quantity of material from the metal surface. The modeling of warm cast and clamping a piece of food processing parts which the used of Pro-E and MasterCAM® software. Pocketing operation has been specifically chosen for toolpath optimization. Then after apply Pocketing toolpath, Multi Tool Selection and Reduce Air Time give the results of software simulation time and experimental machining time.

Keywords: toolpath, part program, optimization, pocket

Procedia PDF Downloads 287
941 European Drug Serialization: Securing the Pharmaceutical Drug Supply Chain from Counterfeiters

Authors: Vikram Chowdhary, Marek Vins

Abstract:

The profitability of the pharmaceutical drug business has attracted considerable interest, but it also faces significant challenges. Counterfeiters take advantage of the industry's vulnerabilities, which are further exacerbated by the globalization of the market, online trading, and complex supply chains. Governments and organizations worldwide are dedicated to creating a secure environment that ensures a consistent and genuine supply of pharmaceutical products. In 2019, the European authorities implemented regulation EU 2016/161 to strengthen traceability and transparency throughout the entire drug supply chain. This regulation requires the addition of enhanced security features, such as serializing items to the saleable unit level or individual packs. Despite these efforts, the incidents of pharmaceutical counterfeiting continue to rise globally, with regulated territories being particularly affected. This paper examines the effectiveness of the drug serialization system implemented by European authorities. By conducting a systematic literature review, we assess the implementation of drug serialization and explore the potential benefits of integrating emerging digital technologies, such as RFID and Blockchain, to improve traceability and management. The objective is to fortify pharmaceutical supply chains against counterfeiters and manipulators and ensure their security.

Keywords: blockchain, counterfeit drugs, EU drug serialization, pharmaceutical industry, RFID

Procedia PDF Downloads 110
940 Results of the Field-and-Scientific Study in the Water Area of the Estuaries of the Major Rivers of the Black Sea and Sea Ports on the Territory of Georgia

Authors: Ana Gavardashvili

Abstract:

The field-and-scientific studies to evaluate the modern ecological state in the water area of the estuaries of the major water-abundant rivers in the coastal line of the Black Sea (Chorokhi, Kintrishi, Natanebi, Supsa, Khobistskali, Rioni and Enguri) and sea ports (Batumi, Poti) and sea terminals of the oil pipeline (Baku-Tbilisi-Supsa, Kulevi) were accomplished in the months of June and July of 2015. GPS coordinates and GIS programs were used to fix the areas of the estuaries of the above-listed rivers on a digital map, with their values varying within the limits of 0,861 and 20,390 km2. Water samples from the Black Sea were taken from the river estuaries and sea ports during the field works, with their statistical series of 125 points. The temperatures of air (t2) and water in the Black Sea (t1) were measured locally, and their relative value is (t1 /t2 ) = 0,69 – 0,92. 125 water samples taken from the study object in the Black Sea coastal line were subject to laboratory analysis, and it was established that the Black Sea acidity (pH) changes within the limits of 7,71 – 8,22 in the river estuaries and within 8,42 - 8,65 in the port water areas and at oil terminals. As for the Sea water salinity index (TDS), it changes within the limits of 6,15 – 12,67 in the river estuaries, and (TDS) = 11,80 – 13,67 in the port water areas and at oil terminals. By taking the gained data and climatic changes into account, by using the theories of reliability and risk at the following stage, the nature of the changes of the function of the Black Sea ecological parameters will be established.

Keywords: acidity, estuary, salinity, sea

Procedia PDF Downloads 288
939 Usage of “Flowchart of Diagnosis and Treatment” Software in Medical Education

Authors: Boy Subirosa Sabarguna, Aria Kekalih, Irzan Nurman

Abstract:

Introduction: Software in the form of Clinical Decision Support System could help students in understanding the mind set of decision-making in diagnosis and treatment at the stage of general practitioners. This could accelerate and ease the learning process which previously took place by using books and experience. Method: Gather 1000 members of the National Medical Multimedia Digital Community (NM2DC) who use the “flowchart of diagnosis and treatment” software, and analyse factors related to: display, speed in learning, convenience in learning, helpfulness and usefulness in the learning process, by using the Likert Scale through online questionnaire which will further be processed using percentage. Results and Discussions: Out of the 1000 members of NM2DC, apparently: 97.0% of the members use the software and 87.5% of them are students. In terms of the analysed factors related to: display, speed in learning, convenience in learning, helpfulness and usefulness of the software’s usage, the results indicate a 90.7% of fairly good performance. Therefore, the “Flowchart of Diagnosis and Treatment” software has helped students in understanding the decision-making of diagnosis and treatment. Conclusion: the use of “Flowchart of Diagnosis and Treatment” software indicates a positive role in helping students understand decision-making of diagnosis and treatment.

Keywords: usage, software, diagnosis and treatment, medical education

Procedia PDF Downloads 359
938 Detailed Depositional Resolutions in Upper Miocene Sands of HT-3X Well, Nam Con Son Basin, Vietnam

Authors: Vo Thi Hai Quan

Abstract:

Nam Con Son sedimentary basin is one of the very important oil and gas basins in offshore Vietnam. Hai Thach field of block 05-2 contains mostly gas accumulations in fine-grained, sand/mud-rich turbidite system, which was deposited in a turbidite channel and fan environment. Major Upper Miocene reservoir of HT-3X lies above a well-developed unconformity. The main objectives of this study are to reconstruct depositional environment and to assess the reservoir quality using data from 14 meters of core samples and digital wireline data of the well HT-3X. The wireline log and core data showed that the vertical sequences of representative facies of the well mainly range from Tb to Te divisions of Bouma sequences with predominance of Tb and Tc compared to Td and Te divisions. Sediments in this well were deposited in a submarine fan association with very fine to fine-grained, homogeneous sandstones that have high porosity and permeability, high- density turbidity currents with longer transport route from the sediment source to the basin, indicating good quality of reservoir. Sediments are comprised mainly of the following sedimentary structures: massive, laminated sandstones, convoluted bedding, laminated ripples, cross-laminated ripples, deformed sandstones, contorted bedding.

Keywords: Hai Thach field, Miocene sand, turbidite, wireline data

Procedia PDF Downloads 292
937 Using Closed Frequent Itemsets for Hierarchical Document Clustering

Authors: Cheng-Jhe Lee, Chiun-Chieh Hsu

Abstract:

Due to the rapid development of the Internet and the increased availability of digital documents, the excessive information on the Internet has led to information overflow problem. In order to solve these problems for effective information retrieval, document clustering in text mining becomes a popular research topic. Clustering is the unsupervised classification of data items into groups without the need of training data. Many conventional document clustering methods perform inefficiently for large document collections because they were originally designed for relational database. Therefore they are impractical in real-world document clustering and require special handling for high dimensionality and high volume. We propose the FIHC (Frequent Itemset-based Hierarchical Clustering) method, which is a hierarchical clustering method developed for document clustering, where the intuition of FIHC is that there exist some common words for each cluster. FIHC uses such words to cluster documents and builds hierarchical topic tree. In this paper, we combine FIHC algorithm with ontology to solve the semantic problem and mine the meaning behind the words in documents. Furthermore, we use the closed frequent itemsets instead of only use frequent itemsets, which increases efficiency and scalability. The experimental results show that our method is more accurate than those of well-known document clustering algorithms.

Keywords: FIHC, documents clustering, ontology, closed frequent itemset

Procedia PDF Downloads 399
936 Transnational Educators in Japan, Russia, and America: Historical Trends in Global Education in the 1990’s and Early 2000’s

Authors: Peter J. Glinos

Abstract:

The Alternative Education Resource Organization (AERO), one of the largest international hubs for alternative educators led by Jerry Mintz, has had a major impact on the global alternative education movement. The organization’s publications, like the AERO-Gramme Newsletter and its successor, the Education Revolution Magazine, allowed members across the globe to discuss issues, share support, and submit writings on policies and reforms. Stored on AERO's online digital archive, this work uses these publications from 1989 to 2011 to investigate the network's entanglements with America, Canada, Russia, Ukraine, Israel, Palestine, Japan, India, and Guatemala. Inspired by Reinhart Koselleck, this historical analysis will trace AERO’s entanglements within the United States, Japan, and Russia, contextualizing each of these multiple temporalities within the history of each nation’s education system, the developments within AERO, and the global geo-political climate at the time of AERO’s expansion. To help remedy the lack of attention paid by global historians to the role state organizations play supporting global networks, as noted in What is Global History? by Sebastian Conrad, this work will focus on the relationship between AERO and state actors.

Keywords: global history, history of education, neoliberalism, transnational history, alternative education

Procedia PDF Downloads 28