Search results for: multi-temporal image classification
1380 Electrical and Structural Properties of Polyaniline-Fullerene Nanocomposite
Authors: M. Nagaraja, H. M. Mahesh, K. Rajanna, M. Z. Kurian, J. Manjanna
Abstract:
In recent years, composites of conjugated polymers with fullerenes (C60) has attracted considerable scientific and technological attention in the field of organic electronics because they possess a novel combination of electrical, optical, ferromagnetic, mechanical and sensor properties. These properties represent major advances in the design of organic electronic devices. With the addition of C60 in the conjugated polymer matrix, the primary photo-excitation of the conjugated polymer undergoes an ultrafast electron transfer, and it has been demonstrated that fullerene molecules may serve as efficient electron acceptors in polymeric solar cells. The present paper includes the systematic studies on the effect of electrical, structural and sensor properties of polyaniline (PANI) matrix by the presence of C60. Polyaniline-fullerene (PANI/C60) composite is prepared by the introduction of fullerene during polymerization of aniline with ammonium persulfate and dodechyl benzene sulfonic acid as oxidant and dopant respectively. FTIR spectroscopy indicated the interaction between PANI and C60. X-ray diffraction proved the formation of a PANI/C60 complex. SEM image shows the highly branched chain structure of the PANI in the presence of C60. The conductivity of the PANI/C60 was found to be more than ten orders of magnitude over the pure PANI.Keywords: conductivity, fullerene, nanocomposite, polyaniline
Procedia PDF Downloads 2171379 A Static Android Malware Detection Based on Actual Used Permissions Combination and API Calls
Authors: Xiaoqing Wang, Junfeng Wang, Xiaolan Zhu
Abstract:
Android operating system has been recognized by most application developers because of its good open-source and compatibility, which enriches the categories of applications greatly. However, it has become the target of malware attackers due to the lack of strict security supervision mechanisms, which leads to the rapid growth of malware, thus bringing serious safety hazards to users. Therefore, it is critical to detect Android malware effectively. Generally, the permissions declared in the AndroidManifest.xml can reflect the function and behavior of the application to a large extent. Since current Android system has not any restrictions to the number of permissions that an application can request, developers tend to apply more than actually needed permissions in order to ensure the successful running of the application, which results in the abuse of permissions. However, some traditional detection methods only consider the requested permissions and ignore whether it is actually used, which leads to incorrect identification of some malwares. Therefore, a machine learning detection method based on the actually used permissions combination and API calls was put forward in this paper. Meanwhile, several experiments are conducted to evaluate our methodology. The result shows that it can detect unknown malware effectively with higher true positive rate and accuracy while maintaining a low false positive rate. Consequently, the AdaboostM1 (J48) classification algorithm based on information gain feature selection algorithm has the best detection result, which can achieve an accuracy of 99.8%, a true positive rate of 99.6% and a lowest false positive rate of 0.Keywords: android, API Calls, machine learning, permissions combination
Procedia PDF Downloads 3291378 Horizontal Development of Built-up Area and Its Impacts on the Agricultural Land of Peshawar City District (1991-2014)
Authors: Pukhtoon Yar
Abstract:
Peshawar City is experiencing a rapid spatial urban growth primarily as a result of high rate of urbanization along with economic development. This paper was designed to understand the impacts of urbanization on agriculture land use change by particularly focusing on land use change trajectories from the past (1991-2014). We used Landsat imageries (30 meters) for1991along with Spot images (2.5 meters) for year 2014. . The ground truthing of the satellite data was performed by collecting information from Peshawar Development Authority, revenue department, real estate agents and interviews with the officials of city administration. The temporal satellite images were processed by applying supervised maximum likelihood classification technique in ArcGIS 9.3. The procedure resulted into five main classes of land use i.e. built-up area, farmland, barren land, cultivable-wasteland and water bodies. The analysis revealed that, in Peshawar City the built-up environment has been doubled from 8.1 percent in 1991 to over 18.2 percent in 2014 by predominantly encroaching land producing food. Furthermore, the CA-Markov Model predicted that the area under impervious surfaces would continue to flourish during the next three decades. This rapid increase in built-up area is accredited to the lack of proper land use planning and management, which has caused chaotic urban sprawl with detrimental social and environmental consequences.Keywords: Urban Expansion, Land use, GIS, Remote Sensing, Markov Model, Peshawar City
Procedia PDF Downloads 1861377 Entrepreneurial Orientation and Customer Satisfaction: Evidences nearby Khao San Road
Authors: Vichada Chokesikarin
Abstract:
The study aims to determine which factors account for customer satisfaction and to investigate the relationship between entrepreneurial orientation and business success, in particular, context of the information understanding of hostel business in Pranakorn district, Bangkok and the significant element of entrepreneurship in tourism industry. This study covers 352 hostels customers and 61 hostel owners/managers nearby Khao San Road. Data collection methods were used by survey questionnaire and a series of hypotheses were developed from services marketing literature. The findings suggest the customer satisfaction most influenced by image, service quality, room quality and price accordingly. Furthermore the findings revealed that significant relationships exist between entrepreneurial orientation and business success; while competitive aggressiveness was found unrelated. The ECSI model’s generic measuring customer satisfaction was found partially mediate the business success. A reconsideration of other variables applicable should be supported with the model of hostel business. The study provides context and overall view of hostel business while discussing from the entrepreneurial orientation to customer satisfaction, thereby reducing decision risk on hostel investment.Keywords: customer satisfaction, ECSI model, entrepreneurial orientation, small hotel, hostel, business performance
Procedia PDF Downloads 3361376 Motion-Based Detection and Tracking of Multiple Pedestrians
Authors: A. Harras, A. Tsuji, K. Terada
Abstract:
Tracking of moving people has gained a matter of great importance due to rapid technological advancements in the field of computer vision. The objective of this study is to design a motion based detection and tracking multiple walking pedestrians randomly in different directions. In our proposed method, Gaussian mixture model (GMM) is used to determine moving persons in image sequences. It reacts to changes that take place in the scene like different illumination; moving objects start and stop often, etc. Background noise in the scene is eliminated through applying morphological operations and the motions of tracked people which is determined by using the Kalman filter. The Kalman filter is applied to predict the tracked location in each frame and to determine the likelihood of each detection. We used a benchmark data set for the evaluation based on a side wall stationary camera. The actual scenes from the data set are taken on a street including up to eight people in front of the camera in different two scenes, the duration is 53 and 35 seconds, respectively. In the case of walking pedestrians in close proximity, the proposed method has achieved the detection ratio of 87%, and the tracking ratio is 77 % successfully. When they are deferred from each other, the detection ratio is increased to 90% and the tracking ratio is also increased to 79%.Keywords: automatic detection, tracking, pedestrians, counting
Procedia PDF Downloads 2571375 Other-Generated Disclosure: A Challenge to Privacy on Social Network Sites
Authors: Tharntip Tawnie Chutikulrungsee, Oliver Kisalay Burmeister, Maumita Bhattacharya, Dragana Calic
Abstract:
Sharing on social network sites (SNSs) has rapidly emerged as a new social norm and has become a global phenomenon. Billions of users reveal not only their own information (self disclosure) but also information about others (other-generated disclosure), resulting in a risk and a serious threat to either personal or informational privacy. Self-disclosure (SD) has been extensively researched in the literature, particularly regarding control of individual and existing privacy management. However, far too little attention has been paid to other-generated disclosure (OGD), especially by insiders. OGD has a strong influence on self-presentation, self-image, and electronic word of mouth (eWOM). Moreover, OGD is more credible and less likely manipulated than SD, but lacks privacy control and legal protection to some extent. This article examines OGD in depth, ranging from motivation to both online and offline impacts, based upon lived experiences from both ‘the disclosed’ and ‘the discloser’. Using purposive sampling, this phenomenological study involves an online survey and in-depth interviews. The findings report the influence of peer disclosure as well as users’ strategies to mitigate privacy issues. This article also calls attention to the challenge of OGD privacy and inadequacies in the law related to privacy protection in the digital domain.Keywords: facebook, online privacy, other-generated disclosure, social networks sites (SNSs)
Procedia PDF Downloads 2511374 Designing and Using a 3-D Printed Dynamic Upper Extremity Orthosis (DUEO) with Children with Cerebral Palsy and Severe Upper Extremity Involvement
Authors: Justin Lee, Siraj Shaikh, Alice Chu MD
Abstract:
Children with cerebral palsy (CP) commonly present with upper extremity impairment, affecting one or both extremities, and are classified using the Manual Ability Classification Scale (MACS). The MACS defines bimanual hand abilities for children ages 4-18 years in everyday tasks and is a gradient scale, with I being nearly normal and V requiring total assistance. Children with more severe upper extremity impairment (MACS III-V) are often underrepresented, and relatively few effective therapies have been identified for these patients. Current orthoses are static and are only meant to prevent the progression of contractures in these patients. Other limitations include cost, comfort, accessibility, and longevity of the orthoses. Taking advantage of advances in 3D printing technology, we have created a highly customizable upper extremity orthotic that can be produced at a low cost. Iterations in our design have resulted in an orthotic that is custom fit to the patient based on scans of their arm, made of rigid polymer when needed to provide support, flexible material where appropriate to allow for comfort, and designed with a mechanical pulley system to allow for some functional use of the arm while in the orthotic. Preliminary data has shown that our orthotic can be built at a fraction of the cost of current orthoses and provide clinically significant improvement in assisting hand assessment (AHA) and pediatric quality of life scores (PedsQL).Keywords: upper extremity orthosis, upper extremity, orthosis, 3-D printing, cerebral palsy, occupational therapy, spasticity, customizable
Procedia PDF Downloads 3071373 A Methodology for Automatic Diversification of Document Categories
Authors: Dasom Kim, Chen Liu, Myungsu Lim, Su-Hyeon Jeon, ByeoungKug Jeon, Kee-Young Kwahk, Namgyu Kim
Abstract:
Recently, numerous documents including unstructured data and text have been created due to the rapid increase in the usage of social media and the Internet. Each document is usually provided with a specific category for the convenience of the users. In the past, the categorization was performed manually. However, in the case of manual categorization, not only can the accuracy of the categorization be not guaranteed but the categorization also requires a large amount of time and huge costs. Many studies have been conducted towards the automatic creation of categories to solve the limitations of manual categorization. Unfortunately, most of these methods cannot be applied to categorizing complex documents with multiple topics because the methods work by assuming that one document can be categorized into one category only. In order to overcome this limitation, some studies have attempted to categorize each document into multiple categories. However, they are also limited in that their learning process involves training using a multi-categorized document set. These methods therefore cannot be applied to multi-categorization of most documents unless multi-categorized training sets are provided. To overcome the limitation of the requirement of a multi-categorized training set by traditional multi-categorization algorithms, we previously proposed a new methodology that can extend a category of a single-categorized document to multiple categorizes by analyzing relationships among categories, topics, and documents. In this paper, we design a survey-based verification scenario for estimating the accuracy of our automatic categorization methodology.Keywords: big data analysis, document classification, multi-category, text mining, topic analysis
Procedia PDF Downloads 2721372 Glorification Trap in Combating Human Trafficking in Indonesia: An Application of Three-Dimensional Model of Anti-Trafficking Policy
Authors: M. Kosandi, V. Susanti, N. I. Subono, E. Kartini
Abstract:
This paper discusses the risk of glorification trap in combating human trafficking, as it is shown in the case of Indonesia. Based on a research on Indonesian combat against trafficking in 2017-2018, this paper shows the tendency of misinterpretation and misapplication of the Indonesian anti-trafficking law into misusing the law for glorification, to create an image of certain extent of achievement in combating human trafficking. The objective of this paper is to explain the persistent occurrence of human trafficking crimes despite the significant progress of anti-trafficking efforts of Indonesian government. The research was conducted in 2017-2018 by qualitative approach through observation, depth interviews, discourse analysis, and document study, applying the three-dimensional model for analyzing human trafficking in the source country. This paper argues that the drive for glorification of achievement in the combat against trafficking has trapped Indonesian government in the loop of misinterpretation, misapplication, and misuse of the anti-trafficking law. In return, the so-called crime against humanity remains high and tends to increase in Indonesia.Keywords: human trafficking, anti-trafficking policy, transnational crime, source country, glorification trap
Procedia PDF Downloads 1671371 Employing QR Code as an Effective Educational Tool for Quick Access to Sources of Kindergarten Concepts
Authors: Ahmed Amin Mousa, M. Abd El-Salam
Abstract:
This study discusses a simple solution for the problem of shortage in learning resources for kindergarten teachers. Occasionally, kindergarten teachers cannot access proper resources by usual search methods as libraries or search engines. Furthermore, these methods require a long time and efforts for preparing. The study is expected to facilitate accessing learning resources. Moreover, it suggests a potential direction for using QR code inside the classroom. The present work proposes that QR code can be used for digitizing kindergarten curriculums and accessing various learning resources. It investigates using QR code for saving information related to the concepts which kindergarten teachers use in the current educational situation. The researchers have established a guide for kindergarten teachers based on the Egyptian official curriculum. The guide provides different learning resources for each scientific and mathematical concept in the curriculum, and each learning resource is represented as a QR code image that contains its URL. Therefore, kindergarten teachers can use smartphone applications for reading QR codes and displaying the related learning resources for students immediately. The guide has been provided to a group of 108 teachers for using inside their classrooms. The results showed that the teachers approved the guide, and gave a good response.Keywords: kindergarten, child, learning resources, QR code, smart phone, mobile
Procedia PDF Downloads 2891370 Scanning Electron Microscopy of Cement Clinkers Produced Using Alternative Fuels
Authors: Sorour Semsari Parapari, Mehmet Ali Gülgün, Melih Papila
Abstract:
Cement production is one of the most energy-intensive processes consuming a high amount of thermal energy. Nowadays, alternative fuels are being used in cement manufacturing in a large scale as a help to provide the necessary energy. The alternative fuels could consist of any disposal like waste plastics, used tires and biomass. It has been suggested that the clinker properties might be affected by using these fuels because of foreign elements incorporation to the composition. Studying the distribution of clinker phases and their chemical composition is possible with scanning electron microscopy (SEM). In this study, clinker samples were produced using different alternative fuels in cement firing kilns. The microstructural observations by back-scattered electrons (BSE) mode in SEM (JEOL JSM-6010LV) showed that the clinker phase distribution was dissimilar in samples prepared with different alternative fuels. The alite to belite (a/b) phase content of samples was quantified by image analysis. The results showed that the a/b varied between 5.2 and 1.5 among samples as the average value for six clinker nodules. The elemental analysis by energy-dispersive x-ray spectroscopy (EDS) mounted on SEM indicated the variation in chemical composition among samples. Higher amounts of sulfur and alkalis seemed to reduce the alite phase formation in clinkers.Keywords: alternative fuels, cement clinker, microstructure, SEM
Procedia PDF Downloads 3651369 Ag-Cu and Bi-Cd Eutectics Ribbons under Superplastic Tensile Test Regime
Authors: Edgar Ochoa, G. Torres-Villasenor
Abstract:
Superplastic deformation is shown by materials with a fine grain size, usually less than 10 μm, when they are deformed within the strain rate range 10-5 10-1 s-1 at temperatures greater than 0.5Tm, where Tm is the melting point in Kelvin. According to the constitutive equation for superplastic flow, refinement of the grain size would be expected to increase the optimum strain rate and decrease the temperature required for superplastic flow. Ribbons of eutectic Ag-Cu and Bi-Cd alloys were manufactured by using a single roller melt-spinning technique to obtain a fine grain structure for later test in superplastic regime. The eutectics ribbons were examined by scanning electron microscopy and X-Ray diffraction, and the grain size was determined using the image analysis software ImageJ. The average grain size was less than 1 μm. Tensile tests were carried out from 10-4 to 10-1 s-1, at room temperature, to evaluate the superplastic behavior. The largest deformation was shown by the Bi-Cd eutectic ribbons, Ɛ=140 %, despite that these ribbons have a hexagonal unit cell. On the other hand, Ag-Cu eutectic ribbons have a minor grain size and cube unit cell, however they showed a lower deformation in tensile test under the same conditions than Bi-Cd ribbons. This is because the Ag-Cu grew in a strong cube-cube orientation relationship.Keywords: eutectic ribbon, fine grain, superplastic deformation, cube-cube orientation
Procedia PDF Downloads 1691368 Cheiloscopy: A Study on Predominant Lip Print Patterns among the Gujarati Population
Authors: Pooja Ahuja, Tejal Bhutani, M. S. Dahiya
Abstract:
Cheiloscopy, the study of lip prints, is a tool in forensic investigation technique that deals with identification of individuals based on lips patterns. The objective of this study is to determine predominant lip print pattern found among the Gujarati population, to evaluate whether any sex difference exists and to study the permanence of the pattern over six months duration. The study comprised of 100 healthy individuals (50 males and 50 females), in the age group of 18 to 25 years of Gujarati population of the Gandhinagar region of the Gujarat state, India. By using Suzuki and Tsuchihashi classification, Lip prints were then divided into four quadrants and also classified on the basis of peripheral shape of the lips. Materials used to record the lip prints were dark brown colored lipstick, cellophane tape, and white bond paper. Lipstick was applied uniformly, and lip prints were taken on the glued portion of cellophane tape and then stuck on to a white bond paper. These lip prints were analyzed with magnifying lens and virtually with stereo microscope. On the analysis of the subject population, results showed Branched pattern Type II (29.57 percentage) to be most predominant in the Gujarati population. Branched pattern Type II (35.60 percentage) and long vertical Type I (28.28 percentage) were most prevalent in males and females respectively and large full lips were most predominantly present in both the sexes. The study concludes that lip prints in any form can be an effective tool for identification of an individual in a closed or open group forms.Keywords: cheiloscopy, lip pattern, predomianant, Gujarati population
Procedia PDF Downloads 2981367 Estimating Leaf Area and Biomass of Wheat Using UAS Multispectral Remote Sensing
Authors: Jackson Parker Galvan, Wenxuan Guo
Abstract:
Unmanned aerial vehicle (UAV) technology is being increasingly adopted in high-throughput plant phenotyping for applications in plant breeding and precision agriculture. Winter wheat is an important cover crop for reducing soil erosion and protecting the environment in the Southern High Plains. Efficiently quantifying plant leaf area and biomass provides critical information for producers to practice site-specific management of crop inputs, such as water and fertilizers. The objective of this study was to estimate wheat biomass and leaf area index using UAV images. This study was conducted in an irrigated field in Garza County, Texas. High-resolution images were acquired on three dates (February 18, March 25, and May 15th ) using a multispectral sensor onboard a Matrice 600 UAV. On each data of image acquisition, 10 random plant samples were collected and measured for biomass and leaf area. Images were stitched using Pix4D, and ArcGIS was applied to overlay sampling locations and derive data for sampling locations.Keywords: precision agriculture, UAV plant phenotyping, biomass, leaf area index, winter wheat, southern high plains
Procedia PDF Downloads 951366 Investor Sentiment and Satisfaction in Automated Investment: A Sentimental Analysis of Robo-Advisor Platforms
Authors: Vertika Goswami, Gargi Sharma
Abstract:
The rapid evolution of fintech has led to the rise of robo-advisor platforms that utilize artificial intelligence (AI) and machine learning to offer personalized investment solutions efficiently and cost-effectively. This research paper conducts a comprehensive sentiment analysis of investor experiences with these platforms, employing natural language processing (NLP) and sentiment classification techniques. The study investigates investor perceptions, engagement, and satisfaction, identifying key drivers of positive sentiment such as clear communication, low fees, consistent returns, and robust security. Conversely, negative sentiment is linked to issues like inconsistent performance, hidden fees, poor customer support, and a lack of transparency. The analysis reveals that addressing these pain points—through improved transparency, enhanced customer service, and ongoing technological advancements—can significantly boost investor trust and satisfaction. This paper contributes valuable insights into the fields of behavioral finance and fintech innovation, offering actionable recommendations for stakeholders, practitioners, and policymakers. Future research should explore the long-term impact of these factors on investor loyalty, the role of emerging technologies, and the effects of ethical investment choices and regulatory compliance on investor sentiment.Keywords: artificial intelligence in finance, automated investment, financial technology, investor satisfaction, investor sentiment, robo-advisors, sentimental analysis
Procedia PDF Downloads 181365 Visual and Chemical Servoing of a Hexapod Robot in a Confined Environment Using Jacobian Estimator
Authors: Guillaume Morin-Duponchelle, Ahmed Nait Chabane, Benoit Zerr, Pierre Schoesetters
Abstract:
Industrial inspection can be achieved through robotic systems, allowing visual and chemical servoing. A popular scheme for visual servo-controlled robotic is the image-based servoing sys-tems. In this paper, an approach of visual and chemical servoing of a hexapod robot using a visual and chemical Jacobian matrix are proposed. The basic idea behind the visual Jacobian matrix is modeling the differential relationship between the camera system and the robotic control system to detect and track accurately points of interest in confined environments. This approach allows the robot to easily detect and navigates to the QR code or seeks a gas source localization using surge cast algorithm. To track the QR code target, a visual servoing based on Jacobian matrix is used. For chemical servoing, three gas sensors are embedded on the hexapod. A Jacobian matrix applied to the gas concentration measurements allows estimating the direction of the main gas source. The effectiveness of the proposed scheme is first demonstrated on simulation. Finally, a hexapod prototype is designed and built and the experimental validation of the approach is presented and discussed.Keywords: chemical servoing, hexapod robot, Jacobian matrix, visual servoing, navigation
Procedia PDF Downloads 1251364 Review of Research on Effectiveness Evaluation of Technology Innovation Policy
Authors: Xue Wang, Li-Wei Fan
Abstract:
The technology innovation has become the driving force of social and economic development and transformation. The guidance and support of public policies is an important condition to promote the realization of technology innovation goals. Policy effectiveness evaluation is instructive in policy learning and adjustment. This paper reviews existing studies and systematically evaluates the effectiveness of policy-driven technological innovation. We used 167 articles from WOS and CNKI databases as samples to clarify the measurement of technological innovation indicators and analyze the classification and application of policy evaluation methods. In general, technology innovation input and technological output are the two main aspects of technological innovation index design, among which technological patents are the focus of research, the number of patents reflects the scale of technological innovation, and the quality of patents reflects the value of innovation from multiple aspects. As for policy evaluation methods, statistical analysis methods are applied to the formulation, selection and evaluation of the after-effect of policies to analyze the effect of policy implementation qualitatively and quantitatively. The bibliometric methods are mainly based on the public policy texts, discriminating the inter-government relationship and the multi-dimensional value of the policy. Decision analysis focuses on the establishment and measurement of the comprehensive evaluation index system of public policy. The economic analysis methods focus on the performance and output of technological innovation to test the policy effect. Finally, this paper puts forward the prospect of the future research direction.Keywords: technology innovation, index, policy effectiveness, evaluation of policy, bibliometric analysis
Procedia PDF Downloads 701363 Man Eaters and the Eaten Men: A Study of the Portrayal of Indians in the Writings of Jim Corbett
Authors: Iti Roychowdhury
Abstract:
India to the Colonial mind was a crazy quilt of multicoloured patchwork- a land of untold wealth and bejewelled maharajas, of snake charmers and tight rope walkers. India was also the land that offered unparalled game. Indeed Shikar (hunting) was de rigueur for the Raj experience. Tales of shootings and trophies were told and retold in clubs and in company. Foremost among the writers of this genre is Jim Corbett – tracker, hunter, writer, conservationist. Corbett is best known for the killing of man eating tigers and his best known books are Man eaters of Kumaon, The Temple Tiger, Man eating Leopard of Rudraprayag etc. The stories of Jim Corbett are stories of hunting, with no palpable design, no subtext of hegemony, or white man’s burden. The protagonists are the cats. Nevertheless from his writings emerge a vibrant picture of Indian villages, of men, women and children toiling for a livelihood under the constant shadow of the man eaters. Corbett shared a symbiotic relationship with the villagers. They needed him to kill the predators while Corbett needed the support of the locals as drum beaters, coolies and runners to accomplish his tasks. The aim of the present paper is to study the image of Indians in the writings of Jim Corbett and to examine them in the light of colonial perception of Indians.Keywords: hegemony, orientalism, Shikar literature, White Man's Burden
Procedia PDF Downloads 2771362 A Lesson in the Social Welfare System in Mexico: Limited Resources for Unlimited Needs
Authors: Vanessa L. Haro
Abstract:
Beginning with a historical foundation of Mexico, this marks the start of a close examination of this major Latin American country by providing the context needed to understand the reasons for Mexico’s strengths and struggles today, specific to their response to the issue of gender violence. Responding to the challenge of combating gender violence and inequality, Mexico has created social programs and initiatives in hopes of addressing these issues and modernizing their gender norms, which currently disempower and dehumanize women, while simultaneously denying women the necessary tools needed to fight back or bring balance to the gender scales. Nevertheless, women in Mexico have made their voices heard with the most salient image of that of the mothers protesting while holding the photos of their young daughters who lost their lives. This case study on gender issues in Mexico works to acknowledge the diverse forces that contribute to the issue of gender violence, and to make a statement that this is a crisis that requires a more dynamic response within Mexico’s social welfare policies, and should not be allowed to continue to progress as a normative phenomenon. As the advocacy groups and protesters cry out, “Ni una menos! (Not one less), meaning we will not lose one more woman and making the statement that all women’s lives matter.Keywords: gender issues, Mexico, poverty, social welfare
Procedia PDF Downloads 2651361 AI-Based Autonomous Plant Health Monitoring and Control System with Visual Health-Scoring Models
Authors: Uvais Qidwai, Amor Moursi, Mohamed Tahar, Malek Hamad, Hamad Alansi
Abstract:
This paper focuses on the development and implementation of an advanced plant health monitoring system with an AI backbone and IoT sensory network. Our approach involves addressing the critical environmental factors essential for preserving a plant’s well-being, including air temperature, soil moisture, soil temperature, soil conductivity, pH, water levels, and humidity, as well as the presence of essential nutrients like nitrogen, phosphorus, and potassium. Central to our methodology is the utilization of computer vision technology, particularly a night vision camera. The captured data is then compared against a reference database containing different health statuses. This comparative analysis is implemented using an AI deep learning model, which enables us to generate accurate assessments of plant health status. By combining the AI-based decision-making approach, our system aims to provide precise and timely insights into the overall health and well-being of plants, offering a valuable tool for effective plant care and management.Keywords: deep learning image model, IoT sensing, cloud-based analysis, remote monitoring app, computer vision, fuzzy control
Procedia PDF Downloads 541360 An Accurate Brain Tumor Segmentation for High Graded Glioma Using Deep Learning
Authors: Sajeeha Ansar, Asad Ali Safi, Sheikh Ziauddin, Ahmad R. Shahid, Faraz Ahsan
Abstract:
Gliomas are most challenging and aggressive type of tumors which appear in different sizes, locations, and scattered boundaries. CNN is most efficient deep learning approach with outstanding capability of solving image analysis problems. A fully automatic deep learning based 2D-CNN model for brain tumor segmentation is presented in this paper. We used small convolution filters (3 x 3) to make architecture deeper. We increased convolutional layers for efficient learning of complex features from large dataset. We achieved better results by pushing convolutional layers up to 16 layers for HGG model. We achieved reliable and accurate results through fine-tuning among dataset and hyper-parameters. Pre-processing of this model includes generation of brain pipeline, intensity normalization, bias correction and data augmentation. We used the BRATS-2015, and Dice Similarity Coefficient (DSC) is used as performance measure for the evaluation of the proposed method. Our method achieved DSC score of 0.81 for complete, 0.79 for core, 0.80 for enhanced tumor regions. However, these results are comparable with methods already implemented 2D CNN architecture.Keywords: brain tumor segmentation, convolutional neural networks, deep learning, HGG
Procedia PDF Downloads 2561359 Multi-Temporal Mapping of Built-up Areas Using Daytime and Nighttime Satellite Images Based on Google Earth Engine Platform
Authors: S. Hutasavi, D. Chen
Abstract:
The built-up area is a significant proxy to measure regional economic growth and reflects the Gross Provincial Product (GPP). However, an up-to-date and reliable database of built-up areas is not always available, especially in developing countries. The cloud-based geospatial analysis platform such as Google Earth Engine (GEE) provides an opportunity with accessibility and computational power for those countries to generate the built-up data. Therefore, this study aims to extract the built-up areas in Eastern Economic Corridor (EEC), Thailand using day and nighttime satellite imagery based on GEE facilities. The normalized indices were generated from Landsat 8 surface reflectance dataset, including Normalized Difference Built-up Index (NDBI), Built-up Index (BUI), and Modified Built-up Index (MBUI). These indices were applied to identify built-up areas in EEC. The result shows that MBUI performs better than BUI and NDBI, with the highest accuracy of 0.85 and Kappa of 0.82. Moreover, the overall accuracy of classification was improved from 79% to 90%, and error of total built-up area was decreased from 29% to 0.7%, after night-time light data from the Visible and Infrared Imaging Suite (VIIRS) Day Night Band (DNB). The results suggest that MBUI with night-time light imagery is appropriate for built-up area extraction and be utilize for further study of socioeconomic impacts of regional development policy over the EEC region.Keywords: built-up area extraction, google earth engine, adaptive thresholding method, rapid mapping
Procedia PDF Downloads 1261358 Voice Liveness Detection Using Kolmogorov Arnold Networks
Authors: Arth J. Shah, Madhu R. Kamble
Abstract:
Voice biometric liveness detection is customized to certify an authentication process of the voice data presented is genuine and not a recording or synthetic voice. With the rise of deepfakes and other equivalently sophisticated spoofing generation techniques, it’s becoming challenging to ensure that the person on the other end is a live speaker or not. Voice Liveness Detection (VLD) system is a group of security measures which detect and prevent voice spoofing attacks. Motivated by the recent development of the Kolmogorov-Arnold Network (KAN) based on the Kolmogorov-Arnold theorem, we proposed KAN for the VLD task. To date, multilayer perceptron (MLP) based classifiers have been used for the classification tasks. We aim to capture not only the compositional structure of the model but also to optimize the values of univariate functions. This study explains the mathematical as well as experimental analysis of KAN for VLD tasks, thereby opening a new perspective for scientists to work on speech and signal processing-based tasks. This study emerges as a combination of traditional signal processing tasks and new deep learning models, which further proved to be a better combination for VLD tasks. The experiments are performed on the POCO and ASVSpoof 2017 V2 database. We used Constant Q-transform, Mel, and short-time Fourier transform (STFT) based front-end features and used CNN, BiLSTM, and KAN as back-end classifiers. The best accuracy is 91.26 % on the POCO database using STFT features with the KAN classifier. In the ASVSpoof 2017 V2 database, the lowest EER we obtained was 26.42 %, using CQT features and KAN as a classifier.Keywords: Kolmogorov Arnold networks, multilayer perceptron, pop noise, voice liveness detection
Procedia PDF Downloads 391357 Hand Gesture Recognition for Sign Language: A New Higher Order Fuzzy HMM Approach
Authors: Saad M. Darwish, Magda M. Madbouly, Murad B. Khorsheed
Abstract:
Sign Languages (SL) are the most accomplished forms of gestural communication. Therefore, their automatic analysis is a real challenge, which is interestingly implied to their lexical and syntactic organization levels. Hidden Markov models (HMM’s) have been used prominently and successfully in speech recognition and, more recently, in handwriting recognition. Consequently, they seem ideal for visual recognition of complex, structured hand gestures such as are found in sign language. In this paper, several results concerning static hand gesture recognition using an algorithm based on Type-2 Fuzzy HMM (T2FHMM) are presented. The features used as observables in the training as well as in the recognition phases are based on Singular Value Decomposition (SVD). SVD is an extension of Eigen decomposition to suit non-square matrices to reduce multi attribute hand gesture data to feature vectors. SVD optimally exposes the geometric structure of a matrix. In our approach, we replace the basic HMM arithmetic operators by some adequate Type-2 fuzzy operators that permits us to relax the additive constraint of probability measures. Therefore, T2FHMMs are able to handle both random and fuzzy uncertainties existing universally in the sequential data. Experimental results show that T2FHMMs can effectively handle noise and dialect uncertainties in hand signals besides a better classification performance than the classical HMMs. The recognition rate of the proposed system is 100% for uniform hand images and 86.21% for cluttered hand images.Keywords: hand gesture recognition, hand detection, type-2 fuzzy logic, hidden Markov Model
Procedia PDF Downloads 4621356 A Bayesian Network Approach to Customer Loyalty Analysis: A Case Study of Home Appliances Industry in Iran
Authors: Azam Abkhiz, Abolghasem Nasir
Abstract:
To achieve sustainable competitive advantage in the market, it is necessary to provide and improve customer satisfaction and Loyalty. To reach this objective, companies need to identify and analyze their customers. Thus, it is critical to measure the level of customer satisfaction and Loyalty very carefully. This study attempts to build a conceptual model to provide clear insights of customer loyalty. Using Bayesian networks (BNs), a model is proposed to evaluate customer loyalty and its consequences, such as repurchase and positive word-of-mouth. BN is a probabilistic approach that predicts the behavior of a system based on observed stochastic events. The most relevant determinants of customer loyalty are identified by the literature review. Perceived value, service quality, trust, corporate image, satisfaction, and switching costs are the most important variables that explain customer loyalty. The data are collected by use of a questionnaire-based survey from 1430 customers of a home appliances manufacturer in Iran. Four scenarios and sensitivity analyses are performed to run and analyze the impact of different determinants on customer loyalty. The proposed model allows businesses to not only set their targets but proactively manage their customer behaviors as well.Keywords: customer satisfaction, customer loyalty, Bayesian networks, home appliances industry
Procedia PDF Downloads 1401355 Media Coverage of the Turkish Armenian Journalist Hrant Dink Assassination: The Analysis of Media News in the Aftermath of the Assassination
Authors: Nusret Mesut Sahin
Abstract:
Hrant Dink, a prominent Turkish-Armenian journalist, and editor-in-chief of the bilingual Turkish-Armenian newspaper Agos, was assassinated in Istanbul on January 19th, 2007 by a nationalist extremist, Ogun Samast. Dink had been voicing the atrocities against the Armenians between 1915 and 1922 during the Ottoman rule, and his comments on the issue appeared in the Turkish media many times before his assassination. Despite intensive media coverage of his assassination, there is not enough research analyzing how national and international media presented Dink’s assassination. In this research, a content analysis of national and international news articles (N= 139) is conducted to identify whether there is a significant difference in national and international media’s coverage of the assassination. The content of the newspaper articles is categorized and coded according to the topics covered. The findings of this research suggested that Dink’s assassination wounded Turkey’s image as a democratic country. It has also been found that the Turkish media focused on security forces and their responsibility in Dink’s assassination, whereas international media focused more on the Article 301 of the Turkish penal code, freedom of expression, and atrocities against the Armenians during the Ottoman rule.Keywords: Hrant Dink, Armenian, journalist, assassination
Procedia PDF Downloads 1521354 Comparative Study on the Effect of Compaction Energy and Moisture Content on the Strength Properties of Lateritic Soil
Authors: Ahmad Idris, O.A. Uche, Ado Y Abdulfatah
Abstract:
Lateritic soils are found in abundance and are the most common types of soils used in construction of roads and embankments in Nigeria. Strength properties of the soils depend on the amount of compaction applied and the amount of water available in the soil at the time of compaction. In this study, the influence of the compactive effort and that of the amount of water in the soil in the determination of the shear strength properties of lateritic soil was investigated. Lateritic soil sample was collected from an existing borrow pit in Kano, Nigeria and its basic characteristics were determined and the soil was classified according to AASHTO classification method. The soil was then compacted under various compactive efforts and at wide range of moisture contents. The maximum dry density (MDD) and optimum moisture content (OMC) at each compactive effort was determined. Unconfined undrained triaxial test was carried out to determine the shear strength properties of the soil under various conditions of moisture and energy. Preliminary results obtained indicated that the soil is an A-7-5 soil. The final results obtained shows that as the compaction energy is increased, both the cohesion and friction angle increased irrespective of the moisture content used in the compaction. However, when the amount of water in the soil was increased and compaction effort kept constant, only the cohesion of the soil increases while the friction angle shows no any pattern of variation. It was also found that the highest values for cohesion and friction angle were obtained when the soil was compacted at the highest energy and at OMC.Keywords: laterite, OMC, compaction energy, moisture content
Procedia PDF Downloads 4071353 Communication About Health and Fitness in Media and Its Hidden Message About Objectification
Authors: Emiko Suzuki
Abstract:
Although fitness is defined as the body’s ability to respond to the demand of physical activity without undue fatigue in health science, in media oftentimes physical activity is presented as means to an attractive body rather than a fit and healthy one. Of all types of media, Instagram is becoming an increasingly persuasive source of information and advice on health and fitness, where individuals conceptualize what health and fitness mean for them. However, this user-generated and unregulated platform can be problematic, as it can communicate misleading information about health and fitness and possibly leading individuals to psychological problems such as eating disorders. In fact, previous research has shown that some messages that were posted with a tag that related to inspire others to do fitness, in fact, encouraged distancing the self from the internal needs of the body. For this reason, this present study aims to explore how health and fitness are communicated on Instagram by analyzing images and texts. A content analysis of images that were labeled with particular hashtags was performed, followed by a thematic analysis of texts from the same set of images. The result shows an interesting insight about messages about how health and fitness are communicated from companies through media, then digested and further shared among communities on Instagram. The study explores how the use of visual focused way of communicating health and fitness can lead to the dehumanization of human bodies.Keywords: Instagram, fitness, dehumanization, body image, embodiment
Procedia PDF Downloads 1381352 Development of K-Factor for Road Geometric Design: A Case Study of North Coast Road in Java
Authors: Edwin Hidayat, Redi Yulianto, Disi Hanafiah
Abstract:
On the one hand, parameters which are used for determining the number of lane on the new road construction are average annual average daily traffic (AADT) and peak hour factor (K-factor). On the other hand, the value of K-factor listed in the guidelines and manual for road planning in Indonesia is a value of adoption or adaptation from foreign guidelines or manuals. Thus, the value is less suitable for Indonesian condition due to differences in road conditions, vehicle type, and driving behavior. The purpose of this study is to provide an example on how to determine k-factor values at a road segment with particular conditions in north coast road, West Java. The methodology is started with collecting traffic volume data for 24 hours over 365 days using PLATO (Automated Traffic Counter) with the approach of video image processing. Then, the traffic volume data is divided into per hour and analyzed by comparing the peak traffic volume in the 30th hour (or other) with the AADT in the same year. The analysis has resulted that for the 30th peak hour the K-factor is 0.97. This value can be used for planning road geometry or evaluating the road capacity performance for the 4/2D interurban road.Keywords: road geometry, K-factor, annual average daily traffic, north coast road
Procedia PDF Downloads 1611351 Analysis of Public Space Usage Characteristics Based on Computer Vision Technology - Taking Shaping Park as an Example
Authors: Guantao Bai
Abstract:
Public space is an indispensable and important component of the urban built environment. How to more accurately evaluate the usage characteristics of public space can help improve its spatial quality. Compared to traditional survey methods, computer vision technology based on deep learning has advantages such as dynamic observation and low cost. This study takes the public space of Shaping Park as an example and, based on deep learning computer vision technology, processes and analyzes the image data of the public space to obtain the spatial usage characteristics and spatiotemporal characteristics of the public space. Research has found that the spontaneous activity time in public spaces is relatively random with a relatively short average activity time, while social activities have a relatively stable activity time with a longer average activity time. Computer vision technology based on deep learning can effectively describe the spatial usage characteristics of the research area, making up for the shortcomings of traditional research methods and providing relevant support for creating a good public space.Keywords: computer vision, deep learning, public spaces, using features
Procedia PDF Downloads 70