Search results for: image security
2034 Development of Educational Institutions in Afghanistan and Especially in the Region of “Herat” Opportunities and Challenges
Authors: Sayed Jamal Ud Din Heravi
Abstract:
The development of educational institutions has an important role in the progress and advancement of the state, in the stability and security of the state and its exposure, in the flourishing of minds, in devoting the role of science, developing society, and meeting people’s desires and needs. Afghanistan is a Muslim country located in Central Asia on the borders of Pakistan, Iran, Tajikistan, and Uzbekistan, and it also borders China's Xing yang. Unfortunately, these oppressed people have been living in wars that have been going on for four decades, in which educational institutions, schools and institutes have not developed. Rather, the war destroyed the infrastructure of this country, and no city or village remained in it but tasted the bloody wars. Now with the new government, we see that many government educational institutions are closed in this country, even if the state promises that it will open them quickly. As for universities and private institutions, they work in Afghanistan diligently and diligently, and among them, there is sharp competition in the use of professors and taking advantage of the available means for the sake of knowledge. It laid the building blocks for a bright dawn in which it seeks to keep pace with the procession of development and prosperity in the world.Keywords: Afghanistan, higher education, Herat province, opportunities, challenges
Procedia PDF Downloads 1262033 Design and Implementation of a Hardened Cryptographic Coprocessor with 128-bit RISC-V Core
Authors: Yashas Bedre Raghavendra, Pim Vullers
Abstract:
This study presents the design and implementation of an abstract cryptographic coprocessor, leveraging AMBA(Advanced Microcontroller Bus Architecture) protocols - APB (Advanced Peripheral Bus) and AHB (Advanced High-performance Bus), to enable seamless integration with the main CPU(Central processing unit) and enhance the coprocessor’s algorithm flexibility. The primary objective is to create a versatile coprocessor that can execute various cryptographic algorithms, including ECC(Elliptic-curve cryptography), RSA(Rivest–Shamir–Adleman), and AES (Advanced Encryption Standard) while providing a robust and secure solution for modern secure embedded systems. To achieve this goal, the coprocessor is equipped with a tightly coupled memory (TCM) for rapid data access during cryptographic operations. The TCM is placed within the coprocessor, ensuring quick retrieval of critical data and optimizing overall performance. Additionally, the program memory is positioned outside the coprocessor, allowing for easy updates and reconfiguration, which enhances adaptability to future algorithm implementations. Direct links are employed instead of DMA(Direct memory access) for data transfer, ensuring faster communication and reducing complexity. The AMBA-based communication architecture facilitates seamless interaction between the coprocessor and the main CPU, streamlining data flow and ensuring efficient utilization of system resources. The abstract nature of the coprocessor allows for easy integration of new cryptographic algorithms in the future. As the security landscape continues to evolve, the coprocessor can adapt and incorporate emerging algorithms, making it a future-proof solution for cryptographic processing. Furthermore, this study explores the addition of custom instructions into RISC-V ISE (Instruction Set Extension) to enhance cryptographic operations. By incorporating custom instructions specifically tailored for cryptographic algorithms, the coprocessor achieves higher efficiency and reduced cycles per instruction (CPI) compared to traditional instruction sets. The adoption of RISC-V 128-bit architecture significantly reduces the total number of instructions required for complex cryptographic tasks, leading to faster execution times and improved overall performance. Comparisons are made with 32-bit and 64-bit architectures, highlighting the advantages of the 128-bit architecture in terms of reduced instruction count and CPI. In conclusion, the abstract cryptographic coprocessor presented in this study offers significant advantages in terms of algorithm flexibility, security, and integration with the main CPU. By leveraging AMBA protocols and employing direct links for data transfer, the coprocessor achieves high-performance cryptographic operations without compromising system efficiency. With its TCM and external program memory, the coprocessor is capable of securely executing a wide range of cryptographic algorithms. This versatility and adaptability, coupled with the benefits of custom instructions and the 128-bit architecture, make it an invaluable asset for secure embedded systems, meeting the demands of modern cryptographic applications.Keywords: abstract cryptographic coprocessor, AMBA protocols, ECC, RSA, AES, tightly coupled memory, secure embedded systems, RISC-V ISE, custom instructions, instruction count, cycles per instruction
Procedia PDF Downloads 742032 Scanning Electron Microscopy of Cement Clinkers Produced Using Alternative Fuels
Authors: Sorour Semsari Parapari, Mehmet Ali Gülgün, Melih Papila
Abstract:
Cement production is one of the most energy-intensive processes consuming a high amount of thermal energy. Nowadays, alternative fuels are being used in cement manufacturing in a large scale as a help to provide the necessary energy. The alternative fuels could consist of any disposal like waste plastics, used tires and biomass. It has been suggested that the clinker properties might be affected by using these fuels because of foreign elements incorporation to the composition. Studying the distribution of clinker phases and their chemical composition is possible with scanning electron microscopy (SEM). In this study, clinker samples were produced using different alternative fuels in cement firing kilns. The microstructural observations by back-scattered electrons (BSE) mode in SEM (JEOL JSM-6010LV) showed that the clinker phase distribution was dissimilar in samples prepared with different alternative fuels. The alite to belite (a/b) phase content of samples was quantified by image analysis. The results showed that the a/b varied between 5.2 and 1.5 among samples as the average value for six clinker nodules. The elemental analysis by energy-dispersive x-ray spectroscopy (EDS) mounted on SEM indicated the variation in chemical composition among samples. Higher amounts of sulfur and alkalis seemed to reduce the alite phase formation in clinkers.Keywords: alternative fuels, cement clinker, microstructure, SEM
Procedia PDF Downloads 3682031 Building Information Modelling: A Review to Indian Scenario
Authors: P. Agnivesh, P. V. Ponambala Moorthi
Abstract:
Evolution of information modelling leads to the visualisation of well-organized built environment. Building Information Modelling (BIM) is considered as evolution in the off-site construction which essentially enhances and controls the present scenario of on-site construction paradigms. Promptness, sustainability and security are considered as the important characteristics of the building information modelling. Projects that uses BIM are tied firmly by technology but distributed organizationally. This allows different team members in the project to associate and integrate the works and work flows. This will in turn improve the efficiency of work breakdown structure. Internationally BIM had been accepted as modern computer aided way of information sharing by construction industry for efficient way of manipulation in order to avoid the on-site misperceptions. Even though, in developing countries like India BIM is in the phase of start and requires lot of mandates and policies to be brought about by the government for its widespread implementations. This paper reviews the current scenario of BIM worldwide and in India and suggests for the improved implementation of building modelling for Indian policy condition.Keywords: building information modelling, Indian polity, information modelling, information sharing, mandates and policies, sustainability.
Procedia PDF Downloads 3792030 3D Vision Transformer for Cervical Spine Fracture Detection and Classification
Authors: Obulesh Avuku, Satwik Sunnam, Sri Charan Mohan Janthuka, Keerthi Yalamaddi
Abstract:
In the United States alone, there are over 1.5 million spine fractures per year, resulting in about 17,730 spinal cord injuries. The cervical spine is where fractures in the spine most frequently occur. The prevalence of spinal fractures in the elderly has increased, and in this population, fractures may be harder to see on imaging because of coexisting degenerative illness and osteoporosis. Nowadays, computed tomography (CT) is almost completely used instead of radiography for the imaging diagnosis of adult spine fractures (x-rays). To stop neurologic degeneration and paralysis following trauma, it is vital to trace any vertebral fractures at the earliest. Many approaches have been proposed for the classification of the cervical spine [2d models]. We are here in this paper trying to break the bounds and use the vision transformers, a State-Of-The-Art- Model in image classification, by making minimal changes possible to the architecture of ViT and making it 3D-enabled architecture and this is evaluated using a weighted multi-label logarithmic loss. We have taken this problem statement from a previously held Kaggle competition, i.e., RSNA 2022 Cervical Spine Fracture Detection.Keywords: cervical spine, spinal fractures, osteoporosis, computed tomography, 2d-models, ViT, multi-label logarithmic loss, Kaggle, public score, private score
Procedia PDF Downloads 1202029 Ag-Cu and Bi-Cd Eutectics Ribbons under Superplastic Tensile Test Regime
Authors: Edgar Ochoa, G. Torres-Villasenor
Abstract:
Superplastic deformation is shown by materials with a fine grain size, usually less than 10 μm, when they are deformed within the strain rate range 10-5 10-1 s-1 at temperatures greater than 0.5Tm, where Tm is the melting point in Kelvin. According to the constitutive equation for superplastic flow, refinement of the grain size would be expected to increase the optimum strain rate and decrease the temperature required for superplastic flow. Ribbons of eutectic Ag-Cu and Bi-Cd alloys were manufactured by using a single roller melt-spinning technique to obtain a fine grain structure for later test in superplastic regime. The eutectics ribbons were examined by scanning electron microscopy and X-Ray diffraction, and the grain size was determined using the image analysis software ImageJ. The average grain size was less than 1 μm. Tensile tests were carried out from 10-4 to 10-1 s-1, at room temperature, to evaluate the superplastic behavior. The largest deformation was shown by the Bi-Cd eutectic ribbons, Ɛ=140 %, despite that these ribbons have a hexagonal unit cell. On the other hand, Ag-Cu eutectic ribbons have a minor grain size and cube unit cell, however they showed a lower deformation in tensile test under the same conditions than Bi-Cd ribbons. This is because the Ag-Cu grew in a strong cube-cube orientation relationship.Keywords: eutectic ribbon, fine grain, superplastic deformation, cube-cube orientation
Procedia PDF Downloads 1722028 Estimating Leaf Area and Biomass of Wheat Using UAS Multispectral Remote Sensing
Authors: Jackson Parker Galvan, Wenxuan Guo
Abstract:
Unmanned aerial vehicle (UAV) technology is being increasingly adopted in high-throughput plant phenotyping for applications in plant breeding and precision agriculture. Winter wheat is an important cover crop for reducing soil erosion and protecting the environment in the Southern High Plains. Efficiently quantifying plant leaf area and biomass provides critical information for producers to practice site-specific management of crop inputs, such as water and fertilizers. The objective of this study was to estimate wheat biomass and leaf area index using UAV images. This study was conducted in an irrigated field in Garza County, Texas. High-resolution images were acquired on three dates (February 18, March 25, and May 15th ) using a multispectral sensor onboard a Matrice 600 UAV. On each data of image acquisition, 10 random plant samples were collected and measured for biomass and leaf area. Images were stitched using Pix4D, and ArcGIS was applied to overlay sampling locations and derive data for sampling locations.Keywords: precision agriculture, UAV plant phenotyping, biomass, leaf area index, winter wheat, southern high plains
Procedia PDF Downloads 972027 IoT Based Information Processing and Computing
Authors: Mannan Ahmad Rasheed, Sawera Kanwal, Mansoor Ahmad Rasheed
Abstract:
The Internet of Things (IoT) has revolutionized the way we collect and process information, making it possible to gather data from a wide range of connected devices and sensors. This has led to the development of IoT-based information processing and computing systems that are capable of handling large amounts of data in real time. This paper provides a comprehensive overview of the current state of IoT-based information processing and computing, as well as the key challenges and gaps that need to be addressed. This paper discusses the potential benefits of IoT-based information processing and computing, such as improved efficiency, enhanced decision-making, and cost savings. Despite the numerous benefits of IoT-based information processing and computing, several challenges need to be addressed to realize the full potential of these systems. These challenges include security and privacy concerns, interoperability issues, scalability and reliability of IoT devices, and the need for standardization and regulation of IoT technologies. Moreover, this paper identifies several gaps in the current research related to IoT-based information processing and computing. One major gap is the lack of a comprehensive framework for designing and implementing IoT-based information processing and computing systems.Keywords: IoT, computing, information processing, Iot computing
Procedia PDF Downloads 1922026 Visual and Chemical Servoing of a Hexapod Robot in a Confined Environment Using Jacobian Estimator
Authors: Guillaume Morin-Duponchelle, Ahmed Nait Chabane, Benoit Zerr, Pierre Schoesetters
Abstract:
Industrial inspection can be achieved through robotic systems, allowing visual and chemical servoing. A popular scheme for visual servo-controlled robotic is the image-based servoing sys-tems. In this paper, an approach of visual and chemical servoing of a hexapod robot using a visual and chemical Jacobian matrix are proposed. The basic idea behind the visual Jacobian matrix is modeling the differential relationship between the camera system and the robotic control system to detect and track accurately points of interest in confined environments. This approach allows the robot to easily detect and navigates to the QR code or seeks a gas source localization using surge cast algorithm. To track the QR code target, a visual servoing based on Jacobian matrix is used. For chemical servoing, three gas sensors are embedded on the hexapod. A Jacobian matrix applied to the gas concentration measurements allows estimating the direction of the main gas source. The effectiveness of the proposed scheme is first demonstrated on simulation. Finally, a hexapod prototype is designed and built and the experimental validation of the approach is presented and discussed.Keywords: chemical servoing, hexapod robot, Jacobian matrix, visual servoing, navigation
Procedia PDF Downloads 1312025 Can Urbanisation Be the Cause for Increasing Urban Poverty: An Exploratory Analysis for India
Authors: Sarmistha Singh
Abstract:
An analysis of trend of urbanization and urban poverty in recent decades is showing that a distinctly reducing rural poverty and increasing in urban areas. It can be argued that the higher the urbanization fuelled by the urban migration to city, which is picking up people from less skilled, education so they faced obstacle to enter into the mainstream economy of city. The share of workforce in economy is higher; in contrast it remains as negligence. At the same time, less wages, absence of social security, social dialogue make them insecure. The vulnerability in their livelihood found. So the paper explores the relation of urbanization and urban poverty in the city, in other words how the urbanization process affecting the urban space in creating the number of poor people in the city. The central focus is the mobility of people with less education and skilled with motive of job search and better livelihood. In many studies found the higher the urbanization and higher the urban poverty in city. In other words, poverty is the impact of urbanization. The strategy of urban inequality through ‘dispersal of concentration’ by the World Bank and others, need to be examined.Keywords: urbanization, mobility, urban poverty, informal settlements, informal worker
Procedia PDF Downloads 4182024 Design and Development of Data Mining Application for Medical Centers in Remote Areas
Authors: Grace Omowunmi Soyebi
Abstract:
Data Mining is the extraction of information from a large database which helps in predicting a trend or behavior, thereby helping management make knowledge-driven decisions. One principal problem of most hospitals in rural areas is making use of the file management system for keeping records. A lot of time is wasted when a patient visits the hospital, probably in an emergency, and the nurse or attendant has to search through voluminous files before the patient's file can be retrieved; this may cause an unexpected to happen to the patient. This Data Mining application is to be designed using a Structured System Analysis and design method, which will help in a well-articulated analysis of the existing file management system, feasibility study, and proper documentation of the Design and Implementation of a Computerized medical record system. This Computerized system will replace the file management system and help to easily retrieve a patient's record with increased data security, access clinical records for decision-making, and reduce the time range at which a patient gets attended to.Keywords: data mining, medical record system, systems programming, computing
Procedia PDF Downloads 2122023 Library on the Cloud: Universalizing Libraries Based on Virtual Space
Authors: S. Vanaja, P. Panneerselvam, S. Santhanakarthikeyan
Abstract:
Cloud Computing is a latest trend in Libraries. Entering in to cloud services, Librarians can suit the present information handling and they are able to satisfy needs of the knowledge society. Libraries are now in the platform of universalizing all its information to users and they focus towards clouds which gives easiest access to data and application. Cloud computing is a highly scalable platform promising quick access to hardware and software over the internet, in addition to easy management and access by non-expert users. In this paper, we discuss the cloud’s features and its potential applications in the library and information centers, how cloud computing actually works is illustrated in this communication and how it will be implemented. It discuss about what are the needs to move to cloud, process of migration to cloud. In addition to that this paper assessed the practical problems during migration in libraries, advantages of migration process and what are the measures that Libraries should follow during migration in to cloud. This paper highlights the benefits and some concerns regarding data ownership and data security on the cloud computing.Keywords: cloud computing, cloud-service, cloud based-ILS, cloud-providers, discovery service, IaaS, PaaS, SaaS, virtualization, Web scale access
Procedia PDF Downloads 6662022 Digital Platform of Crops for Smart Agriculture
Authors: Pascal François Faye, Baye Mor Sall, Bineta Dembele, Jeanne Ana Awa Faye
Abstract:
In agriculture, estimating crop yields is key to improving productivity and decision-making processes such as financial market forecasting and addressing food security issues. The main objective of this paper is to have tools to predict and improve the accuracy of crop yield forecasts using machine learning (ML) algorithms such as CART , KNN and SVM . We developed a mobile app and a web app that uses these algorithms for practical use by farmers. The tests show that our system (collection and deployment architecture, web application and mobile application) is operational and validates empirical knowledge on agro-climatic parameters in addition to proactive decision-making support. The experimental results obtained on the agricultural data, the performance of the ML algorithms are compared using cross-validation in order to identify the most effective ones following the agricultural data. The proposed applications demonstrate that the proposed approach is effective in predicting crop yields and provides timely and accurate responses to farmers for decision support.Keywords: prediction, machine learning, artificial intelligence, digital agriculture
Procedia PDF Downloads 842021 Sanction Influences and Reconstruction Strategies for Iran Oil Market in Post-Sanctions
Authors: Mehrdad HassanZadeh Dugoori, Iman Mohammadali Tajrishi
Abstract:
Since Iran's nuclear program became public in 2002, the International Atomic Energy Agency (IAEA) has been unable to confirm Tehran's assertions that its nuclear activities are exclusively for peaceful purposes and that it has not sought to develop nuclear weapons. The United Nations Security Council has adopted six resolutions since 2006 requiring Iran to stop enriching uranium - which can be used for civilian purposes, but also to build nuclear bombs, which Iran never follow this strategy- and co-operate with the IAEA. Four resolutions have included progressively expansive sanctions to persuade Tehran to comply. The US and EU have imposed additional sanctions on Iranian oil exports and banks since 2012. In this article we reassess the sanction dimensions of Iran and the influences. Then according to the last agreement between P5+1 and Iran in 15 July 2015, we mention reconstruction strategies for oil export markets of Iran and the operational program for one million barrel of crude oil sales per day. These strategies are the conclusion of focus group and brain storming with Iran's oil and gas managers during content analysis.Keywords: post-sanction, oil market, reconstruction, marketing, strategy
Procedia PDF Downloads 4582020 The Third Islamic Defend Action: The Completeness Model of Islamic Peace Movement in Indonesia
Authors: Husnul Isa Harahap
Abstract:
On December 2, 2016 occurred mass movements in Indonesia, led by the National Movement of Fatwa Guard, Indonesian Ulema Council (GNPF MUI). This movement is named 212 in accordance with the date, and also called The Third Islamic Defend Action, a continued movement of Islamic defend earlier (November 4, 2016 and October 14, 2016). All three movements have raised the issue of the demand that Basuki Tjahaja Purnama (Jakarta governor) also known as Ahok put on trial for allegedly insulting the Quran. The interesting view of this movement is that: first, the great social movement could emerge from a small but sensitive issues. Second, although this movement followed by radical Islamic groups, that movement known as the largest and most peaceful Islamic Movement in Indonesia. Third, the movement succeeded in answer the doubts of many parties that the social movements with large masses can not maintain security, order, and even the cleanliness of the site action. What causes all this happen? First, the emphasis on the use of basic religious elements that Islam is love for peace. Second, the role of leadership that is trusted and based on religious relationship. Third, this movement is well organized and trying reflect Islamic values.Keywords: Islamic values, social movement, peaceful group, sensitive issue
Procedia PDF Downloads 3372019 The Impact of Social Protection Intervention on Alleviating Social Vulnerability (Evidence from Ethiopian Rural Households)
Authors: Tewelde Gebresslase Haile, S. P. Singh
Abstract:
To bridge the existing knowledge gap on public intervention implementations, this study estimates the impact of social protection intervention (SPI) on alleviating social vulnerability. Following a multi-stage sampling, primary information was gathered through a self-administered questionnaire, FGD, and interviews from the target households located at four systematically selected districts of Tigrai, Ethiopia. Factor analysis and Propensity Score Matching are applied to construct Social Vulnerability Index (SVI) and measuring the counterfactual impact of selected intervention. As a multidimensional challenge, social vulnerability is found as an important concept used to guide policy evaluation. Accessibility of basic services of Social Affairs, Agriculture, Health and Education sectors, and Food Security Program are commonly used as SPIs. Finally, this study discovers that the households who had access to SPI have scored 9.65% lower SVI than in the absence of the intervention. Finally, this study suggests the provision of integrated, proactive, productive, and evidence-based SPIs to alleviate social vulnerability.Keywords: social protection, livelihood assets, social vulnerability, public policy SVI
Procedia PDF Downloads 932018 Man Eaters and the Eaten Men: A Study of the Portrayal of Indians in the Writings of Jim Corbett
Authors: Iti Roychowdhury
Abstract:
India to the Colonial mind was a crazy quilt of multicoloured patchwork- a land of untold wealth and bejewelled maharajas, of snake charmers and tight rope walkers. India was also the land that offered unparalled game. Indeed Shikar (hunting) was de rigueur for the Raj experience. Tales of shootings and trophies were told and retold in clubs and in company. Foremost among the writers of this genre is Jim Corbett – tracker, hunter, writer, conservationist. Corbett is best known for the killing of man eating tigers and his best known books are Man eaters of Kumaon, The Temple Tiger, Man eating Leopard of Rudraprayag etc. The stories of Jim Corbett are stories of hunting, with no palpable design, no subtext of hegemony, or white man’s burden. The protagonists are the cats. Nevertheless from his writings emerge a vibrant picture of Indian villages, of men, women and children toiling for a livelihood under the constant shadow of the man eaters. Corbett shared a symbiotic relationship with the villagers. They needed him to kill the predators while Corbett needed the support of the locals as drum beaters, coolies and runners to accomplish his tasks. The aim of the present paper is to study the image of Indians in the writings of Jim Corbett and to examine them in the light of colonial perception of Indians.Keywords: hegemony, orientalism, Shikar literature, White Man's Burden
Procedia PDF Downloads 2812017 A Lesson in the Social Welfare System in Mexico: Limited Resources for Unlimited Needs
Authors: Vanessa L. Haro
Abstract:
Beginning with a historical foundation of Mexico, this marks the start of a close examination of this major Latin American country by providing the context needed to understand the reasons for Mexico’s strengths and struggles today, specific to their response to the issue of gender violence. Responding to the challenge of combating gender violence and inequality, Mexico has created social programs and initiatives in hopes of addressing these issues and modernizing their gender norms, which currently disempower and dehumanize women, while simultaneously denying women the necessary tools needed to fight back or bring balance to the gender scales. Nevertheless, women in Mexico have made their voices heard with the most salient image of that of the mothers protesting while holding the photos of their young daughters who lost their lives. This case study on gender issues in Mexico works to acknowledge the diverse forces that contribute to the issue of gender violence, and to make a statement that this is a crisis that requires a more dynamic response within Mexico’s social welfare policies, and should not be allowed to continue to progress as a normative phenomenon. As the advocacy groups and protesters cry out, “Ni una menos! (Not one less), meaning we will not lose one more woman and making the statement that all women’s lives matter.Keywords: gender issues, Mexico, poverty, social welfare
Procedia PDF Downloads 2682016 AI-Based Autonomous Plant Health Monitoring and Control System with Visual Health-Scoring Models
Authors: Uvais Qidwai, Amor Moursi, Mohamed Tahar, Malek Hamad, Hamad Alansi
Abstract:
This paper focuses on the development and implementation of an advanced plant health monitoring system with an AI backbone and IoT sensory network. Our approach involves addressing the critical environmental factors essential for preserving a plant’s well-being, including air temperature, soil moisture, soil temperature, soil conductivity, pH, water levels, and humidity, as well as the presence of essential nutrients like nitrogen, phosphorus, and potassium. Central to our methodology is the utilization of computer vision technology, particularly a night vision camera. The captured data is then compared against a reference database containing different health statuses. This comparative analysis is implemented using an AI deep learning model, which enables us to generate accurate assessments of plant health status. By combining the AI-based decision-making approach, our system aims to provide precise and timely insights into the overall health and well-being of plants, offering a valuable tool for effective plant care and management.Keywords: deep learning image model, IoT sensing, cloud-based analysis, remote monitoring app, computer vision, fuzzy control
Procedia PDF Downloads 622015 An Accurate Brain Tumor Segmentation for High Graded Glioma Using Deep Learning
Authors: Sajeeha Ansar, Asad Ali Safi, Sheikh Ziauddin, Ahmad R. Shahid, Faraz Ahsan
Abstract:
Gliomas are most challenging and aggressive type of tumors which appear in different sizes, locations, and scattered boundaries. CNN is most efficient deep learning approach with outstanding capability of solving image analysis problems. A fully automatic deep learning based 2D-CNN model for brain tumor segmentation is presented in this paper. We used small convolution filters (3 x 3) to make architecture deeper. We increased convolutional layers for efficient learning of complex features from large dataset. We achieved better results by pushing convolutional layers up to 16 layers for HGG model. We achieved reliable and accurate results through fine-tuning among dataset and hyper-parameters. Pre-processing of this model includes generation of brain pipeline, intensity normalization, bias correction and data augmentation. We used the BRATS-2015, and Dice Similarity Coefficient (DSC) is used as performance measure for the evaluation of the proposed method. Our method achieved DSC score of 0.81 for complete, 0.79 for core, 0.80 for enhanced tumor regions. However, these results are comparable with methods already implemented 2D CNN architecture.Keywords: brain tumor segmentation, convolutional neural networks, deep learning, HGG
Procedia PDF Downloads 2582014 An Authentication Protocol for Quantum Enabled Mobile Devices
Authors: Natarajan Venkatachalam, Subrahmanya V. R. K. Rao, Vijay Karthikeyan Dhandapani, Swaminathan Saravanavel
Abstract:
The quantum communication technology is an evolving design which connects multiple quantum enabled devices to internet for secret communication or sensitive information exchange. In future, the number of these compact quantum enabled devices will increase immensely making them an integral part of present communication systems. Therefore, safety and security of such devices is also a major concern for us. To ensure the customer sensitive information will not be eavesdropped or deciphered, we need a strong authentications and encryption mechanism. In this paper, we propose a mutual authentication scheme between these smart quantum devices and server based on the secure exchange of information through quantum channel which gives better solutions for symmetric key exchange issues. An important part of this work is to propose a secure mutual authentication protocol over the quantum channel. We show that our approach offers robust authentication protocol and further our solution is lightweight, scalable, cost-effective with optimized computational processing overheads.Keywords: quantum cryptography, quantum key distribution, wireless quantum communication, authentication protocol, quantum enabled device, trusted third party
Procedia PDF Downloads 1782013 Information Technology Governance Implementation and Its Determinants in the Egyptian Market
Authors: Nariman O. Kandil, Ehab K. Abou-Elkheir, Amr M. Kotb
Abstract:
Effective IT governance guarantees the strategic alignment of IT and business goals, risk mitigation control, and better IT and business performance. This study seeks to examine empirically the extent of IT governance implementation within the firms listed on the Egyptian stock exchange (EGX30) and its determinants. Accordingly, 18 semi-structured interviews face to face, phone, and video-conferencing interviews using various tools (e.g., WebEx, Zoom, and Microsoft Teams) were undertaken at the interviewees’ offices in Egypt between the end of November 2019 and the end of August 2020. Results suggest that there are variances in the extent of IT Governance (ITG) implementation within the firms listed on the Egyptian stock exchange (EGX30), mainly caused by the industry type and internal and external triggers. The results also suggest that the organization size, the type of auditor, the criticality of the industry, the effective processes & KPIs, and the information intensity expertise of the CIO have a significant impact on IT governance implementation within the firms.Keywords: effective IT governance, Egyptian market, information security, risk controls
Procedia PDF Downloads 1722012 Infringement of Patent Rights with Doctrine of Equivalent for Turkey
Authors: Duru Helin Ozaner
Abstract:
Due to the doctrine of equivalent, the words in the claims' sentences are insufficient for the protection area provided by the patent registration. While this situation widens the boundaries of the protection area, it also obscures the boundaries of the protected area of patents. In addition, it creates distrust for third parties. Therefore, the doctrine of equivalent aims to establish a balance between the rights of patent owners and the legal security of third parties. The current legal system of Turkey has been tried to be created as a parallel judicial system to the widely applied regulations. Therefore, the regulations regarding the protection provided by patents in the current Turkish legal system are similar to many countries. However, infringement through equivalent is common by third parties. This study, it is aimed to explain that the protection provided by the patent is not only limited to the words of the claims but also the wide-ranging protection provided by the claims for the doctrine of equivalence. This study is important to determine the limits of the protection provided by the patent right holder and to indicate the importance of the equivalent elements of the protection granted to the patent right holder.Keywords: patent, infringement, intellectual property, the doctrine of equivalent
Procedia PDF Downloads 2192011 A Bayesian Network Approach to Customer Loyalty Analysis: A Case Study of Home Appliances Industry in Iran
Authors: Azam Abkhiz, Abolghasem Nasir
Abstract:
To achieve sustainable competitive advantage in the market, it is necessary to provide and improve customer satisfaction and Loyalty. To reach this objective, companies need to identify and analyze their customers. Thus, it is critical to measure the level of customer satisfaction and Loyalty very carefully. This study attempts to build a conceptual model to provide clear insights of customer loyalty. Using Bayesian networks (BNs), a model is proposed to evaluate customer loyalty and its consequences, such as repurchase and positive word-of-mouth. BN is a probabilistic approach that predicts the behavior of a system based on observed stochastic events. The most relevant determinants of customer loyalty are identified by the literature review. Perceived value, service quality, trust, corporate image, satisfaction, and switching costs are the most important variables that explain customer loyalty. The data are collected by use of a questionnaire-based survey from 1430 customers of a home appliances manufacturer in Iran. Four scenarios and sensitivity analyses are performed to run and analyze the impact of different determinants on customer loyalty. The proposed model allows businesses to not only set their targets but proactively manage their customer behaviors as well.Keywords: customer satisfaction, customer loyalty, Bayesian networks, home appliances industry
Procedia PDF Downloads 1462010 A Case Study of Deep Learning for Disease Detection in Crops
Authors: Felipe A. Guth, Shane Ward, Kevin McDonnell
Abstract:
In the precision agriculture area, one of the main tasks is the automated detection of diseases in crops. Machine Learning algorithms have been studied in recent decades for such tasks in view of their potential for improving economic outcomes that automated disease detection may attain over crop fields. The latest generation of deep learning convolution neural networks has presented significant results in the area of image classification. In this way, this work has tested the implementation of an architecture of deep learning convolution neural network for the detection of diseases in different types of crops. A data augmentation strategy was used to meet the requirements of the algorithm implemented with a deep learning framework. Two test scenarios were deployed. The first scenario implemented a neural network under images extracted from a controlled environment while the second one took images both from the field and the controlled environment. The results evaluated the generalisation capacity of the neural networks in relation to the two types of images presented. Results yielded a general classification accuracy of 59% in scenario 1 and 96% in scenario 2.Keywords: convolutional neural networks, deep learning, disease detection, precision agriculture
Procedia PDF Downloads 2622009 Appraisal of the Nutritional Potential and Safety of Wild Vegetables of South Africa
Authors: Thozama Kwinana-Mandindi
Abstract:
The contribution made by wild edible plants to the livelihoods, food baskets and diets of the indigenous people, particularly among the rural dwellers is invaluable. These wild vegetables are among the non-conventional crops which are widely distributed throughout the wild regions in South Africa, indigenous communities have always exploited for micro-nutrient supply. They also supply significant complex, recently discovered compounds, naturally occurring phytonutrients. In order to protect and promote sustainable use of these plants for household food security, there is a need to better understand them through studies and innovations. Assessment of the wild edible plants’ safety is very key to the promotion as an agricultural product which can be utilised during dry seasons and periods of food scarcity to alleviate nutrient insecurity. Through the use of Scanning Electron Microscope (SEM) and energy dispersive X-ray spectroscopy (EDXS), the study is seen as the vital step in taking a holistic view of the value of the four most consumed wild vegetables in the Eastern Cape Province of South Africa as they were analysed for safety and appraised for components that can influence utilisation. Results indicate that they can be relied upon and cultivation be promoted.Keywords: nature’s resource, wild vegetables, appraisal for safety, SEM
Procedia PDF Downloads 4432008 The Nature of Origin of New Criminal Occurrences in Gjakova Region: Cultural and Criminological “Intersection” in 1999-2009
Authors: Bekim Avdiaj
Abstract:
The transition period of Kosovo society brought fundamental changes in all the spheres of organizing life. This was the period when also in the cultural tradition the biggest movement and an emerging from ‘isolation’ or from the ‘shell’ occurred. Transformation of the traditional and embracing of the modern began here. The same was experienced and is currently being experienced also by Gjakova and its surrounding which is historically renowned for its great tradition and culture. The population of this region is actually facing a transition from the traditional system into the modern one and quite often with huge leaps. These ‘movements’ or ‘evolutions’ of the society of this region, besides the numerous positive things it ‘harvested’, also brought things that do not at all correspond with their tradition as well as new criminal occurrences which in the past were not present in this area. Furthermore, some of the ‘new’ behaviours that are embraced from other ‘cultures’ and ‘civilizations’, and which are often exceeded, are quite perturbing. The security situation is also worrying, particularly following the appearance of some new criminal occurrences. Therefore, with this research paper we will strive to analyse the new cultural “intersections” as well as the nature of the origin of some new very worrying criminal occurrences. We will present there also some factors inciting into these occurrences, which were confessed by the persons involved in these criminal occurrences and who come from this very region.Keywords: crime, occurrence, culture, Gjakova Region
Procedia PDF Downloads 3542007 A Small-Scale Flexible Test Bench for the Investigation of Fertigation Strategies in Soilless Culture
Authors: Giacomo Barbieri
Abstract:
In soilless culture, the management of the nutrient solution is the most important aspect for crop growing. Fertigation dose, frequency and nutrient concentration must be planned with the objective of reaching an optimal crop growth by limiting the utilized resources and the associated costs. The definition of efficient fertigation strategies is a complex problem since fertigation requirements vary on the basis of different factors, and crops are sensitive to small variations on fertigation parameters. To the best of author knowledge, a small-scale test bench that is flexible for both nutrient solution preparation and precise irrigation is currently missing, limiting the investigations in standard practices for soilless culture. Starting from the analysis of the state of the art, this paper proposes a small-scale system that is potentially able to concurrently test different fertigation strategies. The system will be designed and implemented throughout a three year project started on August 2018. However, due to the importance of the topic within current challenges as food security and climate change, this work is spread considering that may inspire other universities and organizations.Keywords: soilless culture, fertigation, test bench, small-scale, automation
Procedia PDF Downloads 1782006 Gendered Water Insecurity: a Structural Equation Approach for Female-Headed Households in South Africa
Authors: Saul Ngarava, Leocadia Zhou, Nomakhaya Monde
Abstract:
Water crises have the fourth most significant societal impact after weapons of mass destruction, climate change, and extreme weather conditions, ahead of natural disasters. Intricacies between women and water are central to achieving the 2030 Sustainable Development Goals (SDGs). The majority of the 1.2 billion poor people worldwide, with two-thirds being women, and mostly located in Sub Sahara Africa (SSA) and South Asia, do not have access to safe and reliable sources of water. There exist gendered differences in water security based on the division of labour associating women with water. Globally, women and girls are responsible for water collection in 80% of the households which have no water on their premises. Women spend 16 million hours a day collecting water, while men and children spend 6 million and 4 million per day, respectively, which is time foregone in the pursuit of other livelihood activities. Due to their proximity and activities concerning water, women are vulnerable to water insecurity through exposures to water-borne diseases, fatigue from physically carrying water, and exposure to sexual and physical harassment, amongst others. Proximity to treated water and their wellbeing also has an effect on their sensitivity and adaptive capacity to water insecurity. The great distances, difficult terrain and heavy lifting expose women to vulnerabilities of water insecurity. However, few studies have quantified the vulnerabilities and burdens on women, with a few taking a phenomenological qualitative approach. Vulnerability studies have also been scanty in the water security realm, with most studies taking linear forms of either quantifying exposures, sensitivities or adaptive capacities in climate change studies. The current study argues for the need for a water insecurity vulnerability assessment, especially for women into research agendas as well as policy interventions, monitoring, and evaluation. The study sought to identify and provide pathways through which female-headed households were water insecure in South Africa, the 30th driest country in the world. This was through linking the drinking water decision as well as the vulnerability frameworks. Secondary data collected during the 2016 General Household Survey (GHS) was utilised, with a sample of 5928 female-headed households. Principal Component Analysis and Structural Equation Modelling were used to analyse the data. The results show dynamic relationships between water characteristics and water treatment. There were also associations between water access and wealth status of the female-headed households. Association was also found between water access and water treatment as well as between wealth status and water treatment. The study concludes that there are dynamic relationships in water insecurity (exposure, sensitivity, and adaptive capacity) for female-headed households in South Africa. The study recommends that a multi-prong approach is required in tackling exposures, sensitivities, and adaptive capacities to water insecurity. This should include capacitating and empowering women for wealth generation, improve access to water treatment equipment as well as prioritising the improvement of infrastructure that brings piped and safe water to female-headed households.Keywords: gender, principal component analysis, structural equation modelling, vulnerability, water insecurity
Procedia PDF Downloads 1262005 Communication About Health and Fitness in Media and Its Hidden Message About Objectification
Authors: Emiko Suzuki
Abstract:
Although fitness is defined as the body’s ability to respond to the demand of physical activity without undue fatigue in health science, in media oftentimes physical activity is presented as means to an attractive body rather than a fit and healthy one. Of all types of media, Instagram is becoming an increasingly persuasive source of information and advice on health and fitness, where individuals conceptualize what health and fitness mean for them. However, this user-generated and unregulated platform can be problematic, as it can communicate misleading information about health and fitness and possibly leading individuals to psychological problems such as eating disorders. In fact, previous research has shown that some messages that were posted with a tag that related to inspire others to do fitness, in fact, encouraged distancing the self from the internal needs of the body. For this reason, this present study aims to explore how health and fitness are communicated on Instagram by analyzing images and texts. A content analysis of images that were labeled with particular hashtags was performed, followed by a thematic analysis of texts from the same set of images. The result shows an interesting insight about messages about how health and fitness are communicated from companies through media, then digested and further shared among communities on Instagram. The study explores how the use of visual focused way of communicating health and fitness can lead to the dehumanization of human bodies.Keywords: Instagram, fitness, dehumanization, body image, embodiment
Procedia PDF Downloads 143