Search results for: detecting architectural tactics
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1696

Search results for: detecting architectural tactics

1696 Detecting Heartbeat Architectural Tactic in Source Code Using Program Analysis

Authors: Ananta Kumar Das, Sujit Kumar Chakrabarti

Abstract:

Architectural tactics such as heartbeat, ping-echo, encapsulate, encrypt data are techniques that are used to achieve quality attributes of a system. Detecting architectural tactics has several benefits: it can aid system comprehension (e.g., legacy systems) and in the estimation of quality attributes such as safety, security, maintainability, etc. Architectural tactics are typically spread over the source code and are implicit. For large codebases, manual detection is often not feasible. Therefore, there is a need for automated methods of detection of architectural tactics. This paper presents a formalization of the heartbeat architectural tactic and a program analytic approach to detect this tactic in source code. The experiment of the proposed method is done on a set of Java applications. The outcome of the experiment strongly suggests that the method compares well with a manual approach in terms of its sensitivity and specificity, and far supersedes a manual exercise in terms of its scalability.

Keywords: software architecture, architectural tactics, detecting architectural tactics, program analysis, AST, alias analysis

Procedia PDF Downloads 158
1695 Follower Upward Influence Tactics: A Review of Quantitative Studies

Authors: Najla Alshenaifi, Nicholas Clarke

Abstract:

Interest in how followers may influence their leaders in order to achieve their goals can be traced to studies in the late 1970s. The last major review of the literature was published over a decade ago in 2002. It would seem timely then to take stock of the literature and consider what we have learned since then. In so doing, our aim is to derive an empirically-based framework for understanding the effects of upward influence tactics to underpin future research in the field. Many factors are identified as having a major effect on upward influence processes including goals of influence, culture, gender, leadership style and the outcome of influence. A key conclusion from our review is that although upward influence tactics can result in positive outcomes for followers, the results from many studies are more often than inconclusive.

Keywords: upward influence tactics, influence tactics, influence strategies, followership

Procedia PDF Downloads 384
1694 The Effect of Socialization Tactics on Job Satisfaction of Employees, Regarding to Personality Types in Tehran University of Medical Science’s Employees

Authors: Maryam Hoorzad, Narges Shokry, Mandan Momeni

Abstract:

According to importance of socialization in effectiveness of organizations and on the other hand assessing the impact of individual differences on socialization tactics by measuring employees satisfaction, can be assessed for each of the personality types which socialization tactics is the more effective. The aim of this paper is to investigate how organizational socialization tactics affect job satisfaction of employees according to personality types. A survey was conducted using a measurement tool based on Van Maanen and Schein’s theory on organizational socialization tactics and Myers Briggs’ measurement tools of personality types. The respondents were employees with more than 3 years backward in Tehran University of Medical Science. Data collection was performed using both library and field, the data collection instrument was questionnaires and data were analysed using the Spss and Lisrel programs. It was found that investiture and serial tactics has a significant effect on employees satisfaction, any increase in investiture and serial tactics led to increase in job satisfaction and any increase in divestiture and disjunctive tactics led to reduction of job satisfaction. Investiture tactic has the most effect on employees satisfaction. Also based on the results, personality types affect the relationship between socialization tactics and job satisfaction. In the ESFJ personality type the effect of investiture tactic on employee satisfaction is the most.

Keywords: organizational socialization, organizational socialization tactics, personality types, job satisfaction

Procedia PDF Downloads 440
1693 The Influence of Online Marketing Tactics in Tourist Destination Reputation: Egypt as a Case Study

Authors: Alyaa Darwish, Peter Burns, Sofia Reino

Abstract:

Online marketing has been the key focus of attention for the majority of destinations since the Internet became the primarily information tool for travel marketing. Tourism is a reputation-dependent industry; potential travelers who do not have previous experience with the destination face numerous risks during the process of decision-making. An accurate perception of the destination’s reputation helps to minimize risk against unsatisfying travel experiences. However, there has been limited investigation with regards to the reputation of tourist destination. Taking the importance of reputation to the tourism industry, this research aims to: 1) Develop a destination reputation model; 2) Assess the tourist destination approach towards online marketing tactics; 3) Evaluate the impact of differentiated online marketing tactics on reputation; and 4) Measure the potential for using online marketing tactics to manage the destination’s online reputation. This research follows an interpretivism epistemological research approach through using four research methods; interviews, questionnaire, content analysis, and experiment to achieve the research goals.

Keywords: destination reputation, online marketing, reputation, tactics

Procedia PDF Downloads 354
1692 An Architectural Model for APT Detection

Authors: Nam-Uk Kim, Sung-Hwan Kim, Tai-Myoung Chung

Abstract:

Typical security management systems are not suitable for detecting APT attack, because they cannot draw the big picture from trivial events of security solutions. Although SIEM solutions have security analysis engine for that, their security analysis mechanisms need to be verified in academic field. Although this paper proposes merely an architectural model for APT detection, we will keep studying on correlation analysis mechanism in the future.

Keywords: advanced persistent threat, anomaly detection, data mining

Procedia PDF Downloads 527
1691 Alterations in Habitation and Architectural Education Due to the COVID-19 Pandemic: The Operation of the Architectural Studio as a Crossroad

Authors: Chrysi K. Nikoloutsou, Gianna Th. Siapati

Abstract:

The pandemic limitations have altered architectural education as the discourse shifted towards virtual studios and blended learning. In addition, lockdown conditions and remote working have affected habitation. Adaptability is now a key factor. The architectural studio needs to adjust to these new terms both in education and in inhabitation. This paper will investigate the operation of an architectural studio in relation to how one experiences their house due to the pandemic, based on a literature review and qualitative research methods (interviews & workshops with students). Zenetos’ prophetic ideas of ‘Electronic Urbanism’ and ‘tele-activities’ are now more present than ever.

Keywords: architectural education, pandemic, residential design, studio pedagogy

Procedia PDF Downloads 104
1690 A Study on the Impacts of Computer Aided Design on the Architectural Design Process

Authors: Halleh Nejadriahi, Kamyar Arab

Abstract:

Computer-aided design (CAD) tools have been extensively used by the architects for the several decades. It has evolved from being a simple drafting tool to being an intelligent architectural software and a powerful means of communication for architects. CAD plays an essential role in the profession of architecture and is a basic tool for any architectural firm. It is not possible for an architectural firm to compete without taking the advantage of computer software, due to the high demand and competition in the architectural industry. The aim of this study is to evaluate the impacts of CAD on the architectural design process from conceptual level to final product, particularly in architectural practice. It examines the range of benefits of integrating CAD into the industry and discusses the possible defects limiting the architects. Method of this study is qualitatively based on data collected from the professionals’ perspective. The identified benefits and limitations of CAD on the architectural design process will raise the awareness of professionals on the potentials of CAD and proper utilization of that in the industry, which would result in a higher productivity along with a better quality in the architectural offices.

Keywords: architecture, architectural practice, computer aided design (CAD), design process

Procedia PDF Downloads 359
1689 Identification of Architectural Design Error Risk Factors in Construction Projects Using IDEF0 Technique

Authors: Sahar Tabarroki, Ahad Nazari

Abstract:

The design process is one of the most key project processes in the construction industry. Although architects have the responsibility to produce complete, accurate, and coordinated documents, architectural design is accompanied by many errors. A design error occurs when the constraints and requirements of the design are not satisfied. Errors are potentially costly and time-consuming to correct if not caught early during the design phase, and they become expensive in either construction documents or in the construction phase. The aim of this research is to identify the risk factors of architectural design errors, so identification of risks is necessary. First, a literature review in the design process was conducted and then a questionnaire was designed to identify the risks and risk factors. The questions in the form of the questionnaire were based on the “similar service description of study and supervision of architectural works” published by “Vice Presidency of Strategic Planning & Supervision of I.R. Iran” as the base of architects’ tasks. Second, the top 10 risks of architectural activities were identified. To determine the positions of possible causes of risks with respect to architectural activities, these activities were located in a design process modeled by the IDEF0 technique. The research was carried out by choosing a case study, checking the design drawings, interviewing its architect and client, and providing a checklist in order to identify the concrete examples of architectural design errors. The results revealed that activities such as “defining the current and future requirements of the project”, “studies and space planning,” and “time and cost estimation of suggested solution” has a higher error risk than others. Moreover, the most important causes include “unclear goals of a client”, “time force by a client”, and “lack of knowledge of architects about the requirements of end-users”. For error detecting in the case study, lack of criteria, standards and design criteria, and lack of coordination among them, was a barrier, anyway, “lack of coordination between architectural design and electrical and mechanical facility”, “violation of the standard dimensions and sizes in space designing”, “design omissions” were identified as the most important design errors.

Keywords: architectural design, design error, risk management, risk factor

Procedia PDF Downloads 130
1688 Social Movements and the Diffusion of Tactics and Repertoires: Activists' Network in Anti-Globalism Movement

Authors: Kyoko Tominaga

Abstract:

Non-Government Organizations (NGOs), Non-Profit Organizations (NPOs), Social Enterprises and other actors play an important role in political decisions in governments at the international levels. Especially, such organizations’ and activists’ network in civil society is quite important to effect to the global politics. To solve the complex social problems in global era, diverse actors should corporate each other. Moreover, network of protesters is also contributes to diffuse tactics, information and other resources of social movements. Based on the findings from the study of International Trade Fairs (ITFs), the author analyzes the network of activists in anti-globalism movement. This research focuses the transition of 54 activists’ whole network in the “protest event” against 2008 G8 summit in Japan. Their network is examined at the three periods: Before protest event phase, during protest event phase and after event phase. A mixed method is used in this study: the author shows the hypothesis from social network analysis and evaluates that with interview data analysis. This analysis gives the two results. Firstly, the more protesters participate to the various events during the protest event, the more they build the network. After that, active protesters keep their network as well. From interview data, we can understand that the active protesters can build their network and diffuse the information because they communicate with other participants and understand that diverse issues are related. This paper comes to same conclusion with previous researches: protest events activate the network among the political activists. However, some participants succeed to build their network, others do not. “Networked” activists are participated in the various events for short period of time and encourage the diffusion of information and tactics of social movements.

Keywords: social movement, global justice movement, tactics, diffusion

Procedia PDF Downloads 382
1687 Architectural Thinking in a Time of Climate Emergency

Authors: Manoj Parmar

Abstract:

The article uses reflexivity as a research method to investigate and propose an architectural theory plan for climate change. It hypothecates that to discuss or formulate discourse on "Architectural Thinking in a Time of Climate Emergency," firstly, we need to understand the modes of integration that enable architectural thinking with climate change. The study intends to study the various integration modes that have evolved historically and situate them in time. Subsequently, it analyses the integration pattern, challenges the existing model, and finds a way towards climate change as central to architectural thinking. The study is fundamental on-premises that ecology and climate change scholarship has consistently out lashed the asymmetrical and nonlinear knowledge and needs approaches for architecture that are less burden to climate change to people and minimize its impact on ecology.

Keywords: climate change, architectural theory, reflexivity, modernity

Procedia PDF Downloads 284
1686 Ethics and Military Defections in Nonviolent Resistance Campaigns

Authors: Adi Levy

Abstract:

Military and security personnel defections during nonviolent resistance (NVR) campaigns are recognized as an effective way of undermining the regime’s power, but they also may generate moral dilemmas that contradict the moral standing of NVR tactics. NVR campaigns have been primarily praised for their adherence to moral and legal norms, yet some of NVR tactics raise serious ethical concerns. This paper focuses on NVR tactics that seek to promote defections and disobedience within military and security personnel to sustain their campaign. Academic literature regarding NVR tactics indicates that compared to violent forms of resistance, defections are more likely to occur when security forces confront nonviolent activists. Indeed, defections play a strategically fundamental role in nonviolent campaigns, particularly against authoritarian regimes, as it enables activists to undermine the regime’s central pillars of support. This study examines the events of the Arab Spring and discusses the ethical problems that arise in nonviolent activists’ promotion of defections and disobedience. The cases of Syria and Egypt suggest that the strategic promotion of defections and disobedience was significantly effective in sustaining the campaign. Yet, while such defections enhance nonviolent activists’ resilience, how they are promoted can be morally contentious and the consequences can be dire. Defections are encouraged by social, moral and emotional appeals that use the power disparities between unarmed civilians and powerful regimes to affect soldiers and security personnel’s process of decision-making. In what is commonly referred to as dilemma action, nonviolent activists deliberately entangle security forces in a moral dilemma that compels them to follow a moral code to protect unarmed civilians. In this way, activists sustain their struggle and even gain protection. Nonviolent activists are likely to be completely defeated when confronted with armed forces. Therefore they rely on the military and security personnel’s moral conscious of convincing them to refrain from using force against them. While this is effective, it also leaves soldiers and security forces exposed to the implications and punishments that might follow their disobedience or defection. As long as they remain nonviolent, activists enjoy civilian immunity despite using morally contentious tactics. But the severe implications brought upon defectors. As a result, demand a deep examination of this tactic’s moral permissibility and a discussion that assesses culpability for the moral implications of its application.

Keywords: culpability, defections, nonviolence, permissibility

Procedia PDF Downloads 117
1685 Engaging the Terrorism Problematique in Africa: Discursive and Non-Discursive Approaches to Counter Terrorism

Authors: Cecil Blake, Tolu Kayode-Adedeji, Innocent Chiluwa, Charles Iruonagbe

Abstract:

National, regional and international security threats have dominated the twenty-first century thus far. Insurgencies that utilize “terrorism” as their primary strategy pose the most serious threat to global security. States in turn adopt terrorist strategies to resist and even defeat insurgents who invoke the legitimacy of statehood to justify their action. In short, the era is dominated by the use of terror tactics by state and non-state actors. Globally, there is a powerful network of groups involved in insurgencies using Islam as the bastion for their cause. In Africa, there are Boko Haram, Al Shabaab and Al Qaeda in the Maghreb representing Islamic groups utilizing terror strategies and tactics to prosecute their wars. The task at hand is to discover and to use multiple ways of handling the present security threats, including novel approaches to policy formulation, implementation, monitoring and evaluation that would pay significant attention to the important role of culture and communication strategies germane for discursive means of conflict resolution. In other to achieve this, the proposed research would address inter alia, root causes of insurgences that predicate their mission on Islamic tenets particularly in Africa; discursive and non-discursive counter-terrorism approaches fashioned by African governments, continental supra-national and regional organizations, recruitment strategies by major non-sate actors in Africa that rely solely on terrorist strategies and tactics and sources of finances for the groups under study. A major anticipated outcome of this research is a contribution to answers that would lead to the much needed stability required for development in African countries experiencing insurgencies carried out by the use of patterned terror strategies and tactics. The nature of the research requires the use of triangulation as the methodological tool.

Keywords: counter-terrorism, discourse, Nigeria, security, terrorism

Procedia PDF Downloads 485
1684 Using Autoencoder as Feature Extractor for Malware Detection

Authors: Umm-E-Hani, Faiza Babar, Hanif Durad

Abstract:

Malware-detecting approaches suffer many limitations, due to which all anti-malware solutions have failed to be reliable enough for detecting zero-day malware. Signature-based solutions depend upon the signatures that can be generated only when malware surfaces at least once in the cyber world. Another approach that works by detecting the anomalies caused in the environment can easily be defeated by diligently and intelligently written malware. Solutions that have been trained to observe the behavior for detecting malicious files have failed to cater to the malware capable of detecting the sandboxed or protected environment. Machine learning and deep learning-based approaches greatly suffer in training their models with either an imbalanced dataset or an inadequate number of samples. AI-based anti-malware solutions that have been trained with enough samples targeted a selected feature vector, thus ignoring the input of leftover features in the maliciousness of malware just to cope with the lack of underlying hardware processing power. Our research focuses on producing an anti-malware solution for detecting malicious PE files by circumventing the earlier-mentioned shortcomings. Our proposed framework, which is based on automated feature engineering through autoencoders, trains the model over a fairly large dataset. It focuses on the visual patterns of malware samples to automatically extract the meaningful part of the visual pattern. Our experiment has successfully produced a state-of-the-art accuracy of 99.54 % over test data.

Keywords: malware, auto encoders, automated feature engineering, classification

Procedia PDF Downloads 72
1683 Integration of Magnetoresistance Sensor in Microfluidic Chip for Magnetic Particles Detection

Authors: Chao-Ming Su, Pei-Sheng Wu, Yu-Chi Kuo, Yin-Chou Huang, Tan-Yueh Chen, Jefunnie Matahum, Tzong-Rong Ger

Abstract:

Application of magnetic particles (MPs) has been applied in biomedical field for many years. There are lots of advantages through this mediator including high biocompatibility and multi-diversified bio-applications. However, current techniques for evaluating the quantity of the magnetic-labeled sample assays are rare. In this paper, a Wheatstone bridge giant magnetoresistance (GMR) sensor integrated with a homemade detecting system was fabricated and used to quantify the concentration of MPs. The homemade detecting system has shown high detecting sensitivity of 10 μg/μl of MPs with optimized parameter vertical magnetic field 100 G, horizontal magnetic field 2 G and flow rate 0.4 ml/min.

Keywords: magnetic particles, magnetoresistive sensors, microfluidics, biosensor

Procedia PDF Downloads 398
1682 Thinking about Drawing: The Evolution of Architectural Education in China After 1949

Authors: Wang Yanze

Abstract:

Architectural design results from the interaction between space and drawing. Stemming from the Beaux-Arts architectural education, drawing kept its dominant position in teaching and learning process for centuries. However, this education system is being challenged in the present time due to the development of the times. Based on the architectural education of China after 1949, a brief introduction to the history of the evolution of the design concept and drawing is given in this paper. Illustrating with the reference to the students’ works in Nanjing Institute of Technology, the predecessor of Southeast University, in China, the paper analyses the relationship between concept and representation, as well as the participation of Space, the modernism discourse. This process contains the transmission of the character of architects, the renovation of drawing skills and the profound social background. With different purposes, the emphasis on representation tends to be combined with the operation on space, and the role of drawing in architectural design process also changes. Therefore, based on the continuity of the traditional architectural education system, the discussion on the “Drawing of Space” in contemporary education system is proposed.

Keywords: architectural education, beaux-arts, drawing, modernism

Procedia PDF Downloads 485
1681 Methods of Categorizing Architectural Technical Debt

Authors: Blessing Igbadumhe

Abstract:

The continuous long- and short-term delivery of value to customers continues to be the overarching objective of software organizations. Software engineering professionals and organizations face challenges in the maintenance and evolution of software as a result of architectural, technical debt. The issues of architectural, technical debt continue to receive a significant amount of attention because of its important impact on successful system implementation. The cost of doing nothing as far as architectural, technical debt is concerned can be significant both in financial terms and impacts on customers. Different architectural, technical debt issues exist, and this qualitative research design reviewed existing literature on the subject to identify and categorize them. This research intends to contribute to the existing bludgeoning body of knowledge on categorizations and descriptive model of technical debt related issues related to system architecture. The results identify the most common characteristics of architectural and technical debt categories. Raising awareness of the intricacies of architectural and technical debt helps technology stakeholders reduce negative consequences and increase the system success rate.

Keywords: architecture, categorizing TD, system design, technical debt

Procedia PDF Downloads 89
1680 Implementing Activity-Based Costing in Architectural Aluminum Projects: Case Study and Lessons Learned

Authors: Amer Momani, Tarek Al-Hawari, Abdallah Alakayleh

Abstract:

This study explains how to construct an actionable activity-based costing and management system to accurately track and account the total costs of architectural aluminum projects. Two ABC models were proposed to accomplish this purpose. First, the learning and development model was introduced to examine how to apply an ABC model in an architectural aluminum firm for the first time and to be familiar with ABC concepts. Second, an actual ABC model was built on the basis of the results of the previous model to accurately trace the actual costs incurred on each project in a year, and to be able to provide a quote with the best trade-off between competitiveness and profitability. The validity of the proposed model was verified on a local architectural aluminum company.

Keywords: activity-based costing, activity-based management, construction, architectural aluminum

Procedia PDF Downloads 101
1679 Web Service Architectural Style Selection in Multi-Criteria Requirements

Authors: Ahmad Mohsin, Syda Fatima, Falak Nawaz, Aman Ullah Khan

Abstract:

Selection of an appropriate architectural style is vital to the success of target web service under development. The nature of architecture design and selection for service-oriented computing applications is quite different as compared to traditional software. Web Services have complex and rigorous architectural styles to choose. Due to this, selection for accurate architectural style for web services development has become a more complex decision to be made by architects. Architectural style selection is a multi-criteria decision and demands lots of experience in service oriented computing. Decision support systems are good solutions to simplify the selection process of a particular architectural style. Our research suggests a new approach using DSS for selection of architectural styles while developing a web service to cater FRs and NFRs. Our proposed DSS helps architects to select right web service architectural pattern according to the domain and non-functional requirements. In this paper, a rule base DSS has been developed using CLIPS (C Language Integrated Production System) to support decisions using multi-criteria requirements. This DSS takes architectural characteristics, domain requirements and software architect preferences for NFRs as input for different architectural styles in use today in service-oriented computing. Weighted sum model has been applied to prioritize quality attributes and domain requirements. Scores are calculated using multiple criterions to choose the final architecture style.

Keywords: software architecture, web-service, rule-based, DSS, multi-criteria requirements, quality attributes

Procedia PDF Downloads 362
1678 Emulation Model in Architectural Education

Authors: Ö. Şenyiğit, A. Çolak

Abstract:

It is of great importance for an architectural student to know the parameters through which he/she can conduct his/her design and makes his/her design effective in architectural education. Therefore; an empirical application study was carried out through the designing activity using the emulation model to support the design and design approaches of architectural students. During the investigation period, studies were done on the basic design elements and principles of the fall semester, and the emulation model, one of the designing methods that constitute the subject of the study, was fictionalized as three phased “recognition-interpretation-application”. As a result of the study, it was observed that when students were given a key method during the design process, their awareness increased and their aspects improved as well.

Keywords: basic design, design education, design methods, emulation

Procedia PDF Downloads 235
1677 Architectural Design Studio (ADS) as an Operational Synthesis in Architectural Education

Authors: Francisco A. Ribeiro Da Costa

Abstract:

Who is responsible for teaching architecture; consider various ways to participate in learning, manipulating various pedagogical tools to streamline the creative process. The Architectural Design Studio (ADS) should become a holistic, systemic process responding to the complexity of our world. This essay corresponds to a deep reflection developed by the author on the teaching of architecture. The outcomes achieved are the corollary of experimentation; discussion and application of pedagogical methods that allowed consolidate the creativity applied by students. The purpose is to show the conjectures that have been considered effective in creating an intellectual environment that nurtures the subject of Architectural Design Studio (ADS), as an operational synthesis in the final stage of the degree. These assumptions, which are part of the proposed model, displaying theories and teaching methodologies that try to respect the learning process based on student learning styles Kolb, ensuring their latent specificities and formulating the structure of the ASD discipline. In addition, the assessing methods are proposed, which consider the architectural Design Studio as an operational synthesis in the teaching of architecture.

Keywords: teaching-learning, architectural design studio, architecture, education

Procedia PDF Downloads 388
1676 A Machine Learning Approach to Detecting Evasive PDF Malware

Authors: Vareesha Masood, Ammara Gul, Nabeeha Areej, Muhammad Asif Masood, Hamna Imran

Abstract:

The universal use of PDF files has prompted hackers to use them for malicious intent by hiding malicious codes in their victim’s PDF machines. Machine learning has proven to be the most efficient in identifying benign files and detecting files with PDF malware. This paper has proposed an approach using a decision tree classifier with parameters. A modern, inclusive dataset CIC-Evasive-PDFMal2022, produced by Lockheed Martin’s Cyber Security wing is used. It is one of the most reliable datasets to use in this field. We designed a PDF malware detection system that achieved 99.2%. Comparing the suggested model to other cutting-edge models in the same study field, it has a great performance in detecting PDF malware. Accordingly, we provide the fastest, most reliable, and most efficient PDF Malware detection approach in this paper.

Keywords: PDF, PDF malware, decision tree classifier, random forest classifier

Procedia PDF Downloads 89
1675 Study on the Influence of Cladding and Finishing Materials of Apartment Buildings on the Architectural Identity of Amman

Authors: Asil Zureigat, Ayat Odat

Abstract:

Analyzing the old and bringing in the new is an ever ongoing process in driving innovations in architecture. This paper looks at the excessive use of stone in apartment buildings in Amman and speculates on the existing possibilities of changing the cladding material. By looking at architectural exceptions present in Amman the paper seeks to make the exception, the rule by adding new materials to the architectural library of Amman and in turn, project a series of possible new identities to the existing stone scape. Through distributing a survey, conducting a photographic study on exceptional buildings and shedding light on the historical narrative of stone, the paper highlights the ways in which new finishing materials such as plaster, paint and stone variations could be introduced in an attempt to project a new architectural identity to Amman.

Keywords: architectural city identity, cladding materials, façade architecture, image of the city

Procedia PDF Downloads 224
1674 Establishment of a Test Bed for Integrated Map of Underground Space and Verification of GPR Exploration Equipment

Authors: Jisong Ryu, Woosik Lee, Yonggu Jang

Abstract:

The paper discusses the process of establishing a reliable test bed for verifying the usability of Ground Penetrating Radar (GPR) exploration equipment based on an integrated underground spatial map in Korea. The aim of this study is to construct a test bed consisting of metal and non-metal pipelines to verify the performance of GPR equipment and improve the accuracy of the underground spatial integrated map. The study involved the design and construction of a test bed for metal and non-metal pipe detecting tests. The test bed was built in the SOC Demonstration Research Center (Yeoncheon) of the Korea Institute of Civil Engineering and Building Technology, burying metal and non-metal pipelines up to a depth of 5m. The test bed was designed in both vehicle-type and cart-type GPR-mounted equipment. The study collected data through the construction of the test bed and conducting metal and non-metal pipe detecting tests. The study analyzed the reliability of GPR detecting results by comparing them with the basic drawings, such as the underground space integrated map. The study contributes to the improvement of GPR equipment performance evaluation and the accuracy of the underground spatial integrated map, which is essential for urban planning and construction. The study addressed the question of how to verify the usability of GPR exploration equipment based on an integrated underground spatial map and improve its performance. The study found that the test bed is reliable for verifying the performance of GPR exploration equipment and accurately detecting metal and non-metal pipelines using an integrated underground spatial map. The study concludes that the establishment of a test bed for verifying the usability of GPR exploration equipment based on an integrated underground spatial map is essential. The proposed Korean-style test bed can be used for the evaluation of GPR equipment performance and support the construction of a national non-metal pipeline exploration equipment performance evaluation center in Korea.

Keywords: Korea-style GPR testbed, GPR, metal pipe detecting, non-metal pipe detecting

Procedia PDF Downloads 99
1673 Research on Architectural Steel Structure Design Based on BIM

Authors: Tianyu Gao

Abstract:

Digital architectures use computer-aided design, programming, simulation, and imaging to create virtual forms and physical structures. Today's customers want to know more about their buildings. They want an automatic thermostat to learn their behavior and contact them, such as the doors and windows they want to open with a mobile app. Therefore, the architectural display form is more closely related to the customer's experience. Based on the purpose of building informationization, this paper studies the steel structure design based on BIM. Taking the Zigan office building in Hangzhou as an example, it is divided into four parts, namely, the digital design modulus of the steel structure, the node analysis of the steel structure, the digital production and construction of the steel structure. Through the application of BIM software, the architectural design can be synergized, and the building components can be informationized. Not only can the architectural design be feedback in the early stage, but also the stability of the construction can be guaranteed. In this way, the monitoring of the entire life cycle of the building and the meeting of customer needs can be realized.

Keywords: digital architectures, BIM, steel structure, architectural design

Procedia PDF Downloads 193
1672 Role of Geomatics in Architectural and Cultural Conservation

Authors: Shweta Lall

Abstract:

The intent of this paper is to demonstrate the role of computerized auxiliary science in advancing the desired and necessary alliance of historians, surveyors, topographers, and analysts of architectural conservation and management. The digital era practice of recording architectural and cultural heritage in view of its preservation, dissemination, and planning developments are discussed in this paper. Geomatics include practices like remote sensing, photogrammetry, surveying, Geographic Information System (GIS), laser scanning technology, etc. These all resources help in architectural and conservation applications which will be identified through various case studies analysed in this paper. The standardised outcomes and the methodologies using relevant case studies are listed and described. The main component of geomatics methodology adapted in conservation is data acquisition, processing, and presentation. Geomatics is used in a wide range of activities involved in architectural and cultural heritage – damage and risk assessment analysis, documentation, 3-D model construction, virtual reconstruction, spatial and structural decision – making analysis and monitoring. This paper will project the summary answers of the capabilities and limitations of the geomatics field in architectural and cultural conservation. Policy-makers, urban planners, architects, and conservationist not only need answers to these questions but also need to practice them in a predictable, transparent, spatially explicit and inexpensive manner.

Keywords: architectural and cultural conservation, geomatics, GIS, remote sensing

Procedia PDF Downloads 143
1671 Multimedia Firearms Training System

Authors: Aleksander Nawrat, Karol Jędrasiak, Artur Ryt, Dawid Sobel

Abstract:

The goal of the article is to present a novel Multimedia Firearms Training System. The system was developed in order to compensate for major problems of existing shooting training systems. The designed and implemented solution can be characterized by five major advantages: algorithm for automatic geometric calibration, algorithm of photometric recalibration, firearms hit point detection using thermal imaging camera, IR laser spot tracking algorithm for after action review analysis, and implementation of ballistics equations. The combination of the abovementioned advantages in a single multimedia firearms training system creates a comprehensive solution for detecting and tracking of the target point usable for shooting training systems and improving intervention tactics of uniformed services. The introduced algorithms of geometric and photometric recalibration allow the use of economically viable commercially available projectors for systems that require long and intensive use without most of the negative impacts on color mapping of existing multi-projector multimedia shooting range systems. The article presents the results of the developed algorithms and their application in real training systems.

Keywords: firearms shot detection, geometric recalibration, photometric recalibration, IR tracking algorithm, thermography, ballistics

Procedia PDF Downloads 221
1670 Diagnostic Evaluation of Micro Rna (miRNA-21, miRNA-215 and miRNA-378) in Patients with Colorectal Cancer

Authors: Ossama Abdelmotaal, Olfat Shaker, Tarek Salman, Lamiaa Nabeel, Mostafa Shabayek

Abstract:

Colorectal Cancer (CRC) is an important worldwide health problem. Colonoscopy is used in detecting CRC suffer from drawbacks where colonoscopy is an invasive method. This study validates easier and less time-consuming techniques to evaluate the usefulness of detecting miRNA-21, miRNA-215 and miRNA-378 in the sera of colorectal cancer patients as new diagnostic tools. This study includes malignant (Colo Rectal Cancer patients, n= 64)) and healthy (n=27) groups. The studied groups were subjected to colonoscopic examination and estimation of miRNA-21, miRNA-215 and miRNA-378 in sera by RT-PCR. miRNA-21 showed the statistically significantly highest median fold change. miRNA-378 showed statistically significantly lower value (Both showed over-expression). miRNA-215 showed the statistically significantly lowest median fold change (It showed down-regulation). Overall the miRNA (21-215 and 378) appear to be promising method of detecting CRC and evaluating its stages.

Keywords: colorectal cancer, miRNA-21, miRNA-215, miRNA-378

Procedia PDF Downloads 301
1669 Applying the Integrative Design Process in Architectural Firms: An Analytical Study on Egyptian Firms

Authors: Carole A. El Raheb, Hassan K. Abdel-Salam, Ingi Elcherif

Abstract:

An architect carrying the design process alone is the main reason for the deterioration of the quality of the architectural product as the complexity of the projects makes it a multi-disciplinary work; then, the Integrative Design Process (IDP) must be applied in the architectural firm especially from the early design phases to improve the product’s quality and to eliminate the ignorance of the principles of design causing the occurrence of low-grade buildings. The research explores the Integrative Design (ID) principles that fit in the architectural practice. Constraints facing this application are presented with strategies and solutions to overcome them. A survey questionnaire was conducted to collect data from a number of recognized Egyptian Architecture, Engineering and Construction (AEC) firms that explores their opinions on using the IDP. This survey emphasizes the importance of the IDP in firms and presents the reasons preventing the firms from applying the IDP. The aim here is to investigate the potentials of integrating this approach into architectural firms emphasizing the importance of this application which ensures the realization of the project’s goal and eliminates the reduction in the project’s quality.

Keywords: application, architectural firms, integrative design principles, integrative design process, the project quality

Procedia PDF Downloads 229
1668 Variability of the Speaker's Verbal and Non-Verbal Behaviour in the Process of Changing Social Roles in the English Marketing Discourse

Authors: Yuliia Skrynnik

Abstract:

This research focuses on the interaction of verbal, non-verbal, and super-verbal communicative components used by the speaker changing social roles in the marketing discourse. The changing/performing of social roles is implemented through communicative strategies and tactics, the structural, semantic, and linguo-pragmatic means of which are characterized by specific features and differ for the performance of either a role of a supplier or a customer. Communication within the marketing discourse is characterized by symmetrical roles’ relation between communicative opponents. The strategy of a supplier’s social role realization and the strategy of a customer’s role realization influence the discursive personality's linguistic repertoire in the marketing discourse. This study takes into account that one person can be both a supplier and a customer under different circumstances, thus, exploring the one individual who can be both a supplier and a customer. Cooperative and non-cooperative tactics are the instruments for the implementation of these strategies. In the marketing discourse, verbal and non-verbal behaviour of the speaker performing a customer’s social role is highly informative for speakers who perform the role of a supplier. The research methods include discourse, context-situational, pragmalinguistic, pragmasemantic analyses, the method of non-verbal components analysis. The methodology of the study includes 5 steps: 1) defining the configurations of speakers’ social roles on the selected material; 2) establishing the type of the discourse (marketing discourse); 3) describing the specific features of a discursive personality as a subject of the communication in the process of social roles realization; 4) selecting the strategies and tactics which direct the interaction in different roles configurations; 5) characterizing the structural, semantic and pragmatic features of the strategies and tactics realization, including the analysis of interaction between verbal and non-verbal components of communication. In the marketing discourse, non-verbal behaviour is usually spontaneous but not purposeful. Thus, the adequate decoding of a partner’s non-verbal behavior provides more opportunities both for the supplier and the customer. Super-verbal characteristics in the marketing discourse are crucial in defining the opponent's social status and social role at the initial stage of interaction. The research provides the scenario of stereotypical situations of the play of a supplier and a customer. The performed analysis has perspectives for further research connected with the study of discursive variativity of speakers' verbal and non-verbal behaviour considering the intercultural factor influencing the process of performing the social roles in the marketing discourse; and the formation of the methods for the scenario construction of non-stereotypical situations of social roles realization/change in the marketing discourse.

Keywords: discursive personality, marketing discourse, non-verbal component of communication, social role, strategy, super-verbal component of communication, tactic, verbal component of communication

Procedia PDF Downloads 120
1667 Detecting Cyberbullying, Spam and Bot Behavior and Fake News in Social Media Accounts Using Machine Learning

Authors: M. D. D. Chathurangi, M. G. K. Nayanathara, K. M. H. M. M. Gunapala, G. M. R. G. Dayananda, Kavinga Yapa Abeywardena, Deemantha Siriwardana

Abstract:

Due to the growing popularity of social media platforms at present, there are various concerns, mostly cyberbullying, spam, bot accounts, and the spread of incorrect information. To develop a risk score calculation system as a thorough method for deciphering and exposing unethical social media profiles, this research explores the most suitable algorithms to our best knowledge in detecting the mentioned concerns. Various multiple models, such as Naïve Bayes, CNN, KNN, Stochastic Gradient Descent, Gradient Boosting Classifier, etc., were examined, and the best results were taken into the development of the risk score system. For cyberbullying, the Logistic Regression algorithm achieved an accuracy of 84.9%, while the spam-detecting MLP model gained 98.02% accuracy. The bot accounts identifying the Random Forest algorithm obtained 91.06% accuracy, and 84% accuracy was acquired for fake news detection using SVM.

Keywords: cyberbullying, spam behavior, bot accounts, fake news, machine learning

Procedia PDF Downloads 35