Search results for: early detection of violence
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 7350

Search results for: early detection of violence

7020 A Convolutional Deep Neural Network Approach for Skin Cancer Detection Using Skin Lesion Images

Authors: Firas Gerges, Frank Y. Shih

Abstract:

Malignant melanoma, known simply as melanoma, is a type of skin cancer that appears as a mole on the skin. It is critical to detect this cancer at an early stage because it can spread across the body and may lead to the patient's death. When detected early, melanoma is curable. In this paper, we propose a deep learning model (convolutional neural networks) in order to automatically classify skin lesion images as malignant or benign. Images underwent certain pre-processing steps to diminish the effect of the normal skin region on the model. The result of the proposed model showed a significant improvement over previous work, achieving an accuracy of 97%.

Keywords: deep learning, skin cancer, image processing, melanoma

Procedia PDF Downloads 153
7019 Neural Networks with Different Initialization Methods for Depression Detection

Authors: Tianle Yang

Abstract:

As a common mental disorder, depression is a leading cause of various diseases worldwide. Early detection and treatment of depression can dramatically promote remission and prevent relapse. However, conventional ways of depression diagnosis require considerable human effort and cause economic burden, while still being prone to misdiagnosis. On the other hand, recent studies report that physical characteristics are major contributors to the diagnosis of depression, which inspires us to mine the internal relationship by neural networks instead of relying on clinical experiences. In this paper, neural networks are constructed to predict depression from physical characteristics. Two initialization methods are examined - Xaiver and Kaiming initialization. Experimental results show that a 3-layers neural network with Kaiming initialization achieves 83% accuracy.

Keywords: depression, neural network, Xavier initialization, Kaiming initialization

Procedia PDF Downloads 132
7018 Crater Detection Using PCA from Captured CMOS Camera Data

Authors: Tatsuya Takino, Izuru Nomura, Yuji Kageyama, Shin Nagata, Hiroyuki Kamata

Abstract:

We propose a method of detecting the craters from the image of the lunar surface. This proposal assumes that it is applied to SLIM (Smart Lander for Investigating Moon) working group aiming at the pinpoint landing on the lunar surface and investigating scientific research. It is difficult to equip and use high-performance computers for the small space probe. So, it is necessary to use a small computer with an exclusive hardware such as FPGA. We have studied the crater detection using principal component analysis (PCA), In this paper, We implement detection algorithm into the FPGA, and the detection is performed on the data that was captured from the CMOS camera.

Keywords: crater detection, PCA, FPGA, image processing

Procedia PDF Downloads 555
7017 Early Marriage and Women's Empowerment: The Case of Chil-bride in East Hararghe Zone of Oromia National Regional State, Ethiopia

Authors: Emad Mohammed Sani

Abstract:

Women encounter exclusion and discrimination in varying degrees, particularly those who marry as minors. The detrimental custom of getting married young is still prevalent worldwide and affects millions of people. It has been less common over time, although it is still widespread in underdeveloped nations. Oromia Regional State is the region in Ethiopia with the highest proportion of child brides. This study aimed at evaluating the effects of early marriage on its survivors’ life conditions – specifically, empowerment and household decision-making – in Eastern Hararghe Zone of Oromia Region. This study employed community-based cross-sectional study design. It adopted mixed method approach – survey, in-depth interview and focus group discussion (FGD) – to collect, analyses and interpret data on early marriage and its effects on household decision-making processes. Narratives and analytical descriptions were integrated to substantiate and/or explain observed quantitative results, or generate contextual themes. According to this study, married women who were married at or after the age of eighteen participated more in household decision-making than child brides. Child brides were more likely to be victims of violence and other types of spousal abuse in their marriages. These changes are mostly caused by an individual's age at first marriage. Delaying marriage had a large positive impact on women's empowerment at the household level, and age at first marriage had a considerable negative impact. In order to advance women's welfare and emancipation, we advise more research to concentrate on the relationship between the home and the social-structural forms that appear at the individual and communal levels.

Keywords: child-bride, early marriage, women, ethiopia

Procedia PDF Downloads 68
7016 On-Road Text Detection Platform for Driver Assistance Systems

Authors: Guezouli Larbi, Belkacem Soundes

Abstract:

The automation of the text detection process can help the human in his driving task. Its application can be very useful to help drivers to have more information about their environment by facilitating the reading of road signs such as directional signs, events, stores, etc. In this paper, a system consisting of two stages has been proposed. In the first one, we used pseudo-Zernike moments to pinpoint areas of the image that may contain text. The architecture of this part is based on three main steps, region of interest (ROI) detection, text localization, and non-text region filtering. Then, in the second step, we present a convolutional neural network architecture (On-Road Text Detection Network - ORTDN) which is considered a classification phase. The results show that the proposed framework achieved ≈ 35 fps and an mAP of ≈ 90%, thus a low computational time with competitive accuracy.

Keywords: text detection, CNN, PZM, deep learning

Procedia PDF Downloads 86
7015 Molecularly Imprinted Nanoparticles (MIP NPs) as Non-Animal Antibodies Substitutes for Detection of Viruses

Authors: Alessandro Poma, Kal Karim, Sergey Piletsky, Giuseppe Battaglia

Abstract:

The recent increasing emergency threat to public health of infectious influenza diseases has prompted interest in the detection of avian influenza virus (AIV) H5N1 in humans as well as animals. A variety of technologies for diagnosing AIV infection have been developed. However, various disadvantages (costs, lengthy analyses, and need for high-containment facilities) make these methods less than ideal in their practical application. Molecularly Imprinted Polymeric Nanoparticles (MIP NPs) are suitable to overcome these limitations by having high affinity, selectivity, versatility, scalability and cost-effectiveness with the versatility of post-modification (labeling – fluorescent, magnetic, optical) opening the way to the potential introduction of improved diagnostic tests capable of providing rapid differential diagnosis. Here we present our first results in the production and testing of MIP NPs for the detection of AIV H5N1. Recent developments in the solid-phase synthesis of MIP NPs mean that for the first time a reliable supply of ‘soluble’ synthetic antibodies can be made available for testing as potential biological or diagnostic active molecules. The MIP NPs have the potential to detect viruses that are widely circulating in farm animals and indeed humans. Early and accurate identification of the infectious agent will expedite appropriate control measures. Thus, diagnosis at an early stage of infection of a herd or flock or individual maximizes the efficiency with which containment, prevention and possibly treatment strategies can be implemented. More importantly, substantiating the practicability’s of these novel reagents should lead to an initial reduction and eventually to a potential total replacement of animals, both large and small, to raise such specific serological materials.

Keywords: influenza virus, molecular imprinting, nanoparticles, polymers

Procedia PDF Downloads 365
7014 Development of Fake News Model Using Machine Learning through Natural Language Processing

Authors: Sajjad Ahmed, Knut Hinkelmann, Flavio Corradini

Abstract:

Fake news detection research is still in the early stage as this is a relatively new phenomenon in the interest raised by society. Machine learning helps to solve complex problems and to build AI systems nowadays and especially in those cases where we have tacit knowledge or the knowledge that is not known. We used machine learning algorithms and for identification of fake news; we applied three classifiers; Passive Aggressive, Naïve Bayes, and Support Vector Machine. Simple classification is not completely correct in fake news detection because classification methods are not specialized for fake news. With the integration of machine learning and text-based processing, we can detect fake news and build classifiers that can classify the news data. Text classification mainly focuses on extracting various features of text and after that incorporating those features into classification. The big challenge in this area is the lack of an efficient way to differentiate between fake and non-fake due to the unavailability of corpora. We applied three different machine learning classifiers on two publicly available datasets. Experimental analysis based on the existing dataset indicates a very encouraging and improved performance.

Keywords: fake news detection, natural language processing, machine learning, classification techniques.

Procedia PDF Downloads 170
7013 A Paper Based Sensor for Mercury Ion Detection

Authors: Emine G. Cansu Ergun

Abstract:

Conjugated system based sensors for selective detection of metal ions have been taking attention during last two decades. Fluorescent sensors are the promising candidates for ion detection due to their high selectivity towards metal ions, and rapid response times. Detection of mercury in an environmenet is important since mercury is a toxic element for human. Beyond the maximum allowable limit, mercury may cause serious problems in human health by spreading into the atmosphere, water and the food chain. In this study, a quinoxaline and 3,4-ethylenedioxy thiophene based donor-acceptor-donor type conjugated molecule used as a fluorescent sensor for detecting the mercury ion in aqueous medium. Among other various cations, existence of mercury resulted in a full quenching of the fluorescence signal. Then, a paper based sensor is constructed and used for mercury detection. As a result it is concluded that the offering sensor is a good candidate for selective mercury detection in aqueous media both in solution and paper based forms.

Keywords: Conjugated molecules , fluorescence quenching, metal ion detection , sensors

Procedia PDF Downloads 164
7012 Automated Pothole Detection Using Convolution Neural Networks and 3D Reconstruction Using Stereovision

Authors: Eshta Ranyal, Kamal Jain, Vikrant Ranyal

Abstract:

Potholes are a severe threat to road safety and a major contributing factor towards road distress. In the Indian context, they are a major road hazard. Timely detection of potholes and subsequent repair can prevent the roads from deteriorating. To facilitate the roadway authorities in the timely detection and repair of potholes, we propose a pothole detection methodology using convolutional neural networks. The YOLOv3 model is used as it is fast and accurate in comparison to other state-of-the-art models. You only look once v3 (YOLOv3) is a state-of-the-art, real-time object detection system that features multi-scale detection. A mean average precision(mAP) of 73% was obtained on a training dataset of 200 images. The dataset was then increased to 500 images, resulting in an increase in mAP. We further calculated the depth of the potholes using stereoscopic vision by reconstruction of 3D potholes. This enables calculating pothole volume, its extent, which can then be used to evaluate the pothole severity as low, moderate, high.

Keywords: CNN, pothole detection, pothole severity, YOLO, stereovision

Procedia PDF Downloads 141
7011 Cross Site Scripting (XSS) Attack and Automatic Detection Technology Research

Authors: Tao Feng, Wei-Wei Zhang, Chang-Ming Ding

Abstract:

Cross-site scripting (XSS) is one of the most popular WEB Attacking methods at present, and also one of the most risky web attacks. Because of the population of JavaScript, the scene of the cross site scripting attack is also gradually expanded. However, since the web application developers tend to only focus on functional testing and lack the awareness of the XSS, which has made the on-line web projects exist many XSS vulnerabilities. In this paper, different various techniques of XSS attack are analyzed, and a method automatically to detect it is proposed. It is easy to check the results of vulnerability detection when running it as a plug-in.

Keywords: XSS, no target attack platform, automatic detection,XSS detection

Procedia PDF Downloads 408
7010 Gaussian Probability Density for Forest Fire Detection Using Satellite Imagery

Authors: S. Benkraouda, Z. Djelloul-Khedda, B. Yagoubi

Abstract:

we present a method for early detection of forest fires from a thermal infrared satellite image, using the image matrix of the probability of belonging. The principle of the method is to compare a theoretical mathematical model to an experimental model. We considered that each line of the image matrix, as an embodiment of a non-stationary random process. Since the distribution of pixels in the satellite image is statistically dependent, we divided these lines into small stationary and ergodic intervals to characterize the image by an adequate mathematical model. A standard deviation was chosen to generate random variables, so each interval behaves naturally like white Gaussian noise. The latter has been selected as the mathematical model that represents a set of very majority pixels, which we can be considered as the image background. Before modeling the image, we made a few pretreatments, then the parameters of the theoretical Gaussian model were extracted from the modeled image, these settings will be used to calculate the probability of each interval of the modeled image to belong to the theoretical Gaussian model. The high intensities pixels are regarded as foreign elements to it, so they will have a low probability, and the pixels that belong to the background image will have a high probability. Finally, we did present the reverse of the matrix of probabilities of these intervals for a better fire detection.

Keywords: forest fire, forest fire detection, satellite image, normal distribution, theoretical gaussian model, thermal infrared matrix image

Procedia PDF Downloads 148
7009 Music Note Detection and Dictionary Generation from Music Sheet Using Image Processing Techniques

Authors: Muhammad Ammar, Talha Ali, Abdul Basit, Bakhtawar Rajput, Zobia Sohail

Abstract:

Music note detection is an area of study for the past few years and has its own influence in music file generation from sheet music. We proposed a method to detect music notes on sheet music using basic thresholding and blob detection. Subsequently, we created a notes dictionary using a semi-supervised learning approach. After notes detection, for each test image, the new symbols are added to the dictionary. This makes the notes detection semi-automatic. The experiments are done on images from a dataset and also on the captured images. The developed approach showed almost 100% accuracy on the dataset images, whereas varying results have been seen on captured images.

Keywords: music note, sheet music, optical music recognition, blob detection, thresholding, dictionary generation

Procedia PDF Downloads 186
7008 The Effects of Early Maternal Separation on Risky Choice in Rats

Authors: Osvaldo Collazo, Cristiano Valerio Dos Santos

Abstract:

Early maternal separation has been shown to bring about many negative effects on behavior in rats. In the present study, we evaluated the effects of early maternal separation on risky choice in rats. One group of male and female Wistar rats was exposed to an early maternal separation protocol while a control group was left undisturbed. Then both groups were exposed to a series of behavioral tests, including a test of risky choice, where one alternative offered a constant reward while the other offered a variable reward. There was a difference between groups when they chose between a variable and a constant reward delay, but no other difference was significant. These results suggest that early maternal separation may be related to a greater preference for shorter delays, which is characteristic of more impulsive choices.

Keywords: early maternal separation, impulsivity, risky choice, variability

Procedia PDF Downloads 261
7007 Efficient Iterative V-BLAST Detection Technique in Wireless Communication System

Authors: Hwan-Jun Choi, Sung-Bok Choi, Hyoung-Kyu Song

Abstract:

Recently, among the MIMO-OFDM detection techniques, a lot of papers suggested V-BLAST scheme which can achieve high data rate. Therefore, the signal detection of MIMOOFDM system is important issue. In this paper, efficient iterative VBLAST detection technique is proposed in wireless communication system. The proposed scheme adjusts the number of candidate symbol and iterative scheme based on channel state. According to the simulation result, the proposed scheme has better BER performance than conventional schemes and similar BER performance of the QRD-M with iterative scheme. Moreover complexity of proposed scheme has 50.6 % less than complexity of QRD-M detection with iterative scheme. Therefore the proposed detection scheme can be efficiently used in wireless communication.

Keywords: MIMO-OFDM, V-BLAST, QR-decomposition, QRDM, DFE, iterative scheme, channel condition

Procedia PDF Downloads 532
7006 A Framework for Blockchain Vulnerability Detection and Cybersecurity Education

Authors: Hongmei Chi

Abstract:

The Blockchain has become a necessity for many different societal industries and ordinary lives including cryptocurrency technology, supply chain, health care, public safety, education, etc. Therefore, training our future blockchain developers to know blockchain programming vulnerability and I.T. students' cyber security is in high demand. In this work, we propose a framework including learning modules and hands-on labs to guide future I.T. professionals towards developing secure blockchain programming habits and mitigating source code vulnerabilities at the early stages of the software development lifecycle following the concept of Secure Software Development Life Cycle (SSDLC). In this research, our goal is to make blockchain programmers and I.T. students aware of the vulnerabilities of blockchains. In summary, we develop a framework that will (1) improve students' skills and awareness of blockchain source code vulnerabilities, detection tools, and mitigation techniques (2) integrate concepts of blockchain vulnerabilities for IT students, (3) improve future IT workers’ ability to master the concepts of blockchain attacks.

Keywords: software vulnerability detection, hands-on lab, static analysis tools, vulnerabilities, blockchain, active learning

Procedia PDF Downloads 103
7005 Combination between Intrusion Systems and Honeypots

Authors: Majed Sanan, Mohammad Rammal, Wassim Rammal

Abstract:

Today, security is a major concern. Intrusion Detection, Prevention Systems and Honeypot can be used to moderate attacks. Many researchers have proposed to use many IDSs ((Intrusion Detection System) time to time. Some of these IDS’s combine their features of two or more IDSs which are called Hybrid Intrusion Detection Systems. Most of the researchers combine the features of Signature based detection methodology and Anomaly based detection methodology. For a signature based IDS, if an attacker attacks slowly and in organized way, the attack may go undetected through the IDS, as signatures include factors based on duration of the events but the actions of attacker do not match. Sometimes, for an unknown attack there is no signature updated or an attacker attack in the mean time when the database is updating. Thus, signature-based IDS fail to detect unknown attacks. Anomaly based IDS suffer from many false-positive readings. So there is a need to hybridize those IDS which can overcome the shortcomings of each other. In this paper we propose a new approach to IDS (Intrusion Detection System) which is more efficient than the traditional IDS (Intrusion Detection System). The IDS is based on Honeypot Technology and Anomaly based Detection Methodology. We have designed Architecture for the IDS in a packet tracer and then implemented it in real time. We have discussed experimental results performed: both the Honeypot and Anomaly based IDS have some shortcomings but if we hybridized these two technologies, the newly proposed Hybrid Intrusion Detection System (HIDS) is capable enough to overcome these shortcomings with much enhanced performance. In this paper, we present a modified Hybrid Intrusion Detection System (HIDS) that combines the positive features of two different detection methodologies - Honeypot methodology and anomaly based intrusion detection methodology. In the experiment, we ran both the Intrusion Detection System individually first and then together and recorded the data from time to time. From the data we can conclude that the resulting IDS are much better in detecting intrusions from the existing IDSs.

Keywords: security, intrusion detection, intrusion prevention, honeypot, anomaly-based detection, signature-based detection, cloud computing, kfsensor

Procedia PDF Downloads 388
7004 Dermoscopy Compliance: Improving Melanoma Detection Pathways Through Quality Improvement

Authors: Max Butler

Abstract:

Melanoma accounts for 80% of skin cancer-related deaths globally. The poor prognosis and increasing incidence of melanoma impose a significant burden on global healthcare systems. Early detection, precise diagnosis, and preventative strategies are critical to improving patient outcomes. Dermoscopy is the gold standard for specialist assessments of pigmented skin lesions, as it can differentiate between benign and malignant growths with greater accuracy than visual inspection. In the United Kingdom, guidelines from the National Institute of Clinical Excellence (NICE) state dermoscopy should be used in all specialist assessments of pigmented skin lesions. Compliance with this guideline is low, resulting in missed and delayed melanoma diagnoses. To address this problem, a quality improvement project was initiated at Buckinghamshire Healthcare Trust (BHT) within the plastic surgery department. The target group was a trainee and consultant plastic surgeons conducting outpatient skin cancer clinics. Analysis of clinic documentation over a one-month period found that only 62% (38/61) of patients referred with pigmented skin lesions were examined using dermoscopy. To increase dermoscopy rates, teaching was delivered to the department highlighting national guidelines and the evidence base for dermoscopic examination. In addition, clinic paperwork was redesigned to include a text box for dermoscopic examination. Reauditing after the intervention found a significant increase in dermoscopy rates (52/61, p = 0.014). In conclusion, implementing a quality improvement project with targeted teaching and documentation template templates successfully increased dermoscopy rates. This is a promising step toward improving early melanoma detection and patient outcomes.

Keywords: melanoma, dermoscopy, plastic surgery, quality improvement

Procedia PDF Downloads 74
7003 Unveiling the Truth of Female Reproductive Health: The Tied Shackles of Authoritative Knowledge and Domestic Violence: An Ethnographic Study on an Urban Slum of Dhaka City

Authors: Saba Nuzhat

Abstract:

The present ethnographic study examines how domestic violence and authoritative knowledge affect the reproductive health of females; in terms of contraceptive behavior and induced abortion. This qualitative study has been conducted by collecting in depth informal interviews and case studies of 12 female respondents living in an urban slum of Keraniganj, located Dhaka city. The study depicts how multivariable factors are linked to a woman’s ability to contracept and make abortion decisions in a cultural context where being a wife infers to submission, limited mobility, sexual availability, and restricted autonomy on her own reproduction health. This study shows how violence is being normalized and socially acceptable, every time women do not adhere to go through expected gender roles. The study primarily explores the subjective experiences and perceptions of the females about contraceptive behavior as well as abortions from a medical anthropological perspective. A number of salient examples are highlighted into this paper where women who go through abortion or adopt various measures of contraceptives get highly influenced by authoritative knowledge or under the pressure of male dominance. The lack of female autonomy or prevalence of domestic violence challenges the gender equality of Bangladeshi society and female sovereignty in accessing sexual or reproductive rights. This paper remarks the significance of medical anthropological research that helps to understand the intricate interrelationship between authoritative knowledge and male dominance with female reproductive health in order to reduce women’s risk of experiencing domestic violence and to promote reproductive health autonomy for themselves for espousing contraceptive behaviors and abortion decisions.

Keywords: abortion, authoritative knowledge, contraception, domestic violence, reproductive health

Procedia PDF Downloads 143
7002 Mosaic Augmentation: Insights and Limitations

Authors: Olivia A. Kjorlien, Maryam Asghari, Farshid Alizadeh-Shabdiz

Abstract:

The goal of this paper is to investigate the impact of mosaic augmentation on the performance of object detection solutions. To carry out the study, YOLOv4 and YOLOv4-Tiny models have been selected, which are popular, advanced object detection models. These models are also representatives of two classes of complex and simple models. The study also has been carried out on two categories of objects, simple and complex. For this study, YOLOv4 and YOLOv4 Tiny are trained with and without mosaic augmentation for two sets of objects. While mosaic augmentation improves the performance of simple object detection, it deteriorates the performance of complex object detection, specifically having the largest negative impact on the false positive rate in a complex object detection case.

Keywords: accuracy, false positives, mosaic augmentation, object detection, YOLOV4, YOLOV4-Tiny

Procedia PDF Downloads 131
7001 “Uninformed” Religious Orientation Can Lead to Violence in Any Given Community: The Case of African Independence Churches in South Africa

Authors: Ngwako Daniel Sebola

Abstract:

Introductory Statement: Religions are necessary as they offer and teach something to their adherence. People in one religion may not have a complete understanding of the Supreme Being (Deity) in a certain religion other than their own. South Africa, like other countries in the world, consists of various religions, including Christianity. Almost 80% of South African population adheres to the Christian faith, though in different denominations and sects. Each church fulfils spiritual needs that perhaps others cannot fill. African Independent Churches is one of the denominations in the country. These churches arose as a protest to the Western forms and expressions of Christianity. Their major concern was to develop an indigenous expression of Christianity. The relevance of African Independent Churches includes addressing the needs of the people holistically. Controlling diseases was an important aspect of change in different historical periods. Through healing services, leaders of African churches are able to attract many followers. The healing power associated with the founders of many African Initiated Churches leads to people following and respecting them as true leaders within many African communities. Despite its strong points, African Independent Churches, like many others, face a variety of challenges, especially conflicts. Ironically, destructive conflicts resulted in violence.. Such violence demonstrates a lack of informed religious orientation among those concerned. This paper investigates and analyses the causes of conflict and violence in the African Independent Church. The researcher used the Shembe and International Pentecostal Holiness Churches, in South Africa, as a point of departure. As a solution to curb violence, the researcher suggests useful strategies in handling conflicts. Methodology: Comparative and qualitative approaches have been used as methods of collecting data in this research. The intention is to analyse the similarities and differences of violence among members of the Shembe and International Pentecostal Holiness Churches. Equally important, the researcher aims to obtain data through interviews, questionnaires, focus groups, among others. The researcher aims to interview fifteen individuals from both churches. Finding: Leadership squabbles and power struggle appear to be the main contributing factors of violence in many Independent Churches. Ironically, violence resulted in the loss of life and destruction of properties, like in the case of the Shembe and International Pentecostal Holiness Churches. Violence is an indication that congregations and some leaders have not been properly equipped to deal with conflict. Concluding Statement: Conflict is a common part of every human existence in any given community. The concern is when such conflict becomes contagious; it leads to violence. There is a need to understand consciously and objectively towards devising the appropriate measures to handle the conflict. Conflict management calls for emotional maturity, self-control, empathy, patience, tolerance and informed religious orientation.

Keywords: African, church, religion, violence

Procedia PDF Downloads 118
7000 Intimate Partner Violence Concerns during COVID-19 Pandemic

Authors: Fatemeh Abdollahi, Munn-Sann Lye, Jamshid Yazdani Charati, Mehran Zarghami

Abstract:

Background: In March 2020, the World Health Organization (WHO) declared the outbreak of a new coronavirus disease, COVID-19, as a public health concern and pandemic. This situation is generating psychological consequences such as stress, anxiety, depression, and intimate partner violence (IPV) throughout the population. This is a brief note on the magnitude of this threat and different ways for abused women to minimize the effects of it in their daily life. Methods: A literature review was conducted using the MEDLINE, PSYCHINFO, and SCIENCE DIRECT databases. The keywords used included intimate partner violence, abuse, victims, pandemic, quarantine, coronavirus, and COVID-19. A Google search was also conducted using these words to identify reports published in non-indexed health care and social science journals. The literature search was restricted to English language studies. Results: The prevalence of IPV and its consequences are rising during such a pandemic. Having sufficient support from healthcare workers and acquaintances is critical for women in such circumstances. Conclusion: Community members, healthcare providers, governments, and policymakers should be informed of the increased risk of IPV during such a pandemic. They should provide a supporting structure for abused women. Social networking is also a good approach that could help abusive women during this situation.

Keywords: covid-19, intimate partner violence, pandemic, women

Procedia PDF Downloads 69
6999 The Journalistic Representation of Femicide in Italy

Authors: Saveria Capecchi

Abstract:

In recent decades, the issue of gender-based violence, particularly femicide, has been increasingly presented to the public by Italian media. However, it is often treated in a trivialized and sensationalistic manner, focusing on cases that exhibit the most "attractive" elements (brutality, sex, drugs, the young age and/or good looks of the victims, stories with "mystery," "horror," etc.). Furthermore, this phenomenon is most often represented by referring to the psycho-individualistic paradigm, focusing on the psychological and individual characteristics of the perpetrator rather than referring to the feminist and/or constructivist paradigms. According to the latter, the causes of male violence against women do not lie in the individual problems of the perpetrator but in the social and cultural construction of the power hierarchy between men and women. The following study presents the results of qualitative research on the journalistic approach to male violence against women in Italy, aimed at examining the limitations of the narrative strategies used by the media. The research focuses on the case of Giulia Cecchettin (killed by her ex-boyfriend Filippo Turetta on November 11, 2023), which has fueled the debate on the narrative surrounding male violence against women. This case was chosen based on its significant media coverage and the victim's family's commitment to combating gender-based violence. The research involves a content analysis of 150 articles from four different national newspapers («Corriere della Sera», «La Stampa», «Il Giornale», «la Repubblica»). Additionally, the study analyzed the social media use of two Italian newspapers («Corriere della Sera» and «la Repubblica»), examining 20 posts and their 600 related comments, highlighting the various types of public responses, including criticisms of how femicide is represented by the media. Furthermore, the paper will reflect on the role that the Italian women's movement and certain journalist communities have played in promoting a narrative of femicide that is more attentive to power dynamics and free from gender stereotypes.

Keywords: gender-based violence, femicide, gender stereotypes, Italian newspapers

Procedia PDF Downloads 29
6998 Real Time Video Based Smoke Detection Using Double Optical Flow Estimation

Authors: Anton Stadler, Thorsten Ike

Abstract:

In this paper, we present a video based smoke detection algorithm based on TVL1 optical flow estimation. The main part of the algorithm is an accumulating system for motion angles and upward motion speed of the flow field. We optimized the usage of TVL1 flow estimation for the detection of smoke with very low smoke density. Therefore, we use adapted flow parameters and estimate the flow field on difference images. We show in theory and in evaluation that this improves the performance of smoke detection significantly. We evaluate the smoke algorithm using videos with different smoke densities and different backgrounds. We show that smoke detection is very reliable in varying scenarios. Further we verify that our algorithm is very robust towards crowded scenes disturbance videos.

Keywords: low density, optical flow, upward smoke motion, video based smoke detection

Procedia PDF Downloads 358
6997 KAP Study on Breast Cancer Among Women in Nirmala Educational Institutions-A Prospective Observational Study

Authors: Shaik Asha Begum, S. Joshna Rani, Shaik Abdul Rahaman

Abstract:

INTRODUCTION: Breast cancer is a disease that creates in breast cells. "KAP" study estimates the Knowledge, Attitude, and Practices of a local area. More than 1.5 million ladies (25% of all ladies with malignancy) are determined to have bosom disease consistently all through the world. Understanding the degrees of Knowledge, Attitude and Practice will empower a more effective cycle of mindfulness creation as it will permit the program to be custom-made all the more properly to the necessities of the local area. OBJECTIVES: The objective of this study is to assess the knowledge on signs and symptoms, risk factors, provide awareness on the practicing of the early detection techniques of breast cancer and provide knowledge on the overall breast cancer including preventive techniques. METHODOLOGY: This is an expressive cross-sectional investigation. This investigation of KAP was done in the Nirmala Educational Institutions from January to April 2021. A total of 300 participants are included from women students in pharmacy graduates & lecturers, and also from graduates other than the pharmacy. The examiners are taken from the BCAM (Breast Cancer Awareness Measure), tool compartment (Version 2). RESULT: According to the findings of the study, the majority of the participants were not well informed about breast cancer. A lump in the breast was the most commonly mentioned sign of breast cancer, followed by pain in the breast or nipple. The percentage of knowledge related to the breast cancer risk factors was also very less. The correct answers for breast cancer risk factors were radiation exposure (58.20 percent), a positive family history (47.6 percent), obesity (46.9 percent), a lack of physical activity (43.6 percent), and smoking (43.2 percent). Breast cancer screening, on the other hand, was uncommon (only 30 and 11.3 percent practiced clinical breast examination and mammography respectively). CONCLUSION: In this study, the knowledge on the signs and symptoms, risk factors of breast cancer - pharmacy graduates have more knowledge than the non-pharmacy graduates but in the preventive techniques and early detective tools of breast cancer -had poor knowledge in the pharmacy and non-pharmacy graduate. After the awareness program, pharmacy and non-pharmacy graduates got supportive knowledge on the preventive techniques and also practiced the early detective techniques of breast cancer.

Keywords: breast cancer, mammography, KAP study, early detection

Procedia PDF Downloads 140
6996 Character Education Model for Early Childhood Based Javanese Culture

Authors: Rafika Bayu Kusumandari, Istyarini, Ispen Safrel

Abstract:

Character education will be more meaningful if carried out since early childhood. This is because early childhood education is the foundation of the formation of character. This study intends to find a model of character education in early childhood based on Javanese culture. In keeping with the focus of the study, long-term goals to be achieved through this research is to find once described the development of a model of character education in early childhood Javanese culture based in Semarang are then applied across early childhood education institutions in Semarang City. The specific objective of the study is: Describe the character models and management education in early childhood Java-based culture in Semarang City. The benefits of this research are; Provide an overview of the model and describe the management of character education in early childhood Java-based culture in Semarang City. Referring to the objectives of the research program was designed with a "Research and Development", meaning that a program of research followed by development programs for improvement or refinement. To produce a prototype model of character education in early childhood Java-based culture in the city, taken systematic measures in the form of the action, reflection, evaluation and innovation by applying qualitative research methods, descriptive, development, experimentation, and evaluation. This study aims to gain in-depth description of the model of character education in early childhood Java-based culture in the city of Semarang. The reason for the use of the use of qualitative methods researcher's knowledge, no study results and empirical research specifically about the model of character education in early childhood Java-based culture in the city of Semarang. On the implementation of character education early childhood adapted to the characteristics of each school and the emphasis of each agency arrangements for early childhood education, culture-based Java. Javanese culture should be introduced early in order not to erode the cultural lost outside the entrance as the era of globalization. In addition, Java is promoting a culture of courtesy and manners are very appropriate for the character formation of children of early age.

Keywords: education character, Javanese culture, childhood, character

Procedia PDF Downloads 395
6995 Early Requirement Engineering for Design of Learner Centric Dynamic LMS

Authors: Kausik Halder, Nabendu Chaki, Ranjan Dasgupta

Abstract:

We present a modelling framework that supports the engineering of early requirements specifications for design of learner centric dynamic Learning Management System. The framework is based on i* modelling tool and Means End Analysis, that adopts primitive concepts for modelling early requirements (such as actor, goal, and strategic dependency). We show how pedagogical and computational requirements for designing a learner centric Learning Management system can be adapted for the automatic early requirement engineering specifications. Finally, we presented a model on a Learner Quanta based adaptive Courseware. Our early requirement analysis shows that how means end analysis reveals gaps and inconsistencies in early requirements specifications that are by no means trivial to discover without the help of formal analysis tool.

Keywords: adaptive courseware, early requirement engineering, means end analysis, organizational modelling, requirement modelling

Procedia PDF Downloads 504
6994 Features Reduction Using Bat Algorithm for Identification and Recognition of Parkinson Disease

Authors: P. Shrivastava, A. Shukla, K. Verma, S. Rungta

Abstract:

Parkinson's disease is a chronic neurological disorder that directly affects human gait. It leads to slowness of movement, causes muscle rigidity and tremors. Gait serve as a primary outcome measure for studies aiming at early recognition of disease. Using gait techniques, this paper implements efficient binary bat algorithm for an early detection of Parkinson's disease by selecting optimal features required for classification of affected patients from others. The data of 166 people, both fit and affected is collected and optimal feature selection is done using PSO and Bat algorithm. The reduced dataset is then classified using neural network. The experiments indicate that binary bat algorithm outperforms traditional PSO and genetic algorithm and gives a fairly good recognition rate even with the reduced dataset.

Keywords: parkinson, gait, feature selection, bat algorithm

Procedia PDF Downloads 551
6993 Active Islanding Detection Method Using Intelligent Controller

Authors: Kuang-Hsiung Tan, Chih-Chan Hu, Chien-Wu Lan, Shih-Sung Lin, Te-Jen Chang

Abstract:

An active islanding detection method using disturbance signal injection with intelligent controller is proposed in this study. First, a DC\AC power inverter is emulated in the distributed generator (DG) system to implement the tracking control of active power, reactive power outputs and the islanding detection. The proposed active islanding detection method is based on injecting a disturbance signal into the power inverter system through the d-axis current which leads to a frequency deviation at the terminal of the RLC load when the utility power is disconnected. Moreover, in order to improve the transient and steady-state responses of the active power and reactive power outputs of the power inverter, and to further improve the performance of the islanding detection method, two probabilistic fuzzy neural networks (PFNN) are adopted to replace the traditional proportional-integral (PI) controllers for the tracking control and the islanding detection. Furthermore, the network structure and the online learning algorithm of the PFNN are introduced in detail. Finally, the feasibility and effectiveness of the tracking control and the proposed active islanding detection method are verified with experimental results.

Keywords: distributed generators, probabilistic fuzzy neural network, islanding detection, non-detection zone

Procedia PDF Downloads 391
6992 Structural Damage Detection Using Sensors Optimally Located

Authors: Carlos Alberto Riveros, Edwin Fabián García, Javier Enrique Rivero

Abstract:

The measured data obtained from sensors in continuous monitoring of civil structures are mainly used for modal identification and damage detection. Therefore when modal identification analysis is carried out the quality in the identification of the modes will highly influence the damage detection results. It is also widely recognized that the usefulness of the measured data used for modal identification and damage detection is significantly influenced by the number and locations of sensors. The objective of this study is the numerical implementation of two widely known optimum sensor placement methods in beam-like structures

Keywords: optimum sensor placement, structural damage detection, modal identification, beam-like structures.

Procedia PDF Downloads 436
6991 The Family Sense of Coherence of Early Childhood Education Students

Authors: M. Demir, A. Demir

Abstract:

The aim of this study is to examine the family sense of coherence of early childhood education students. The Family Sense of Coherence Inventory has applied to 233 (108 girls and 125 boys) early childhood education students in Turkey. At the stage of data collection, with the aim of determining the family sense of coherence of early childhood education students, Family Sense of Coherence Inventory which was developed by Çeçen (2007) was used. In the process of the analysis of data, independent samples t-test, and one-way ANOVA were used. According to the results of the study, there were significant differences between some demographic variables in terms of the family sense of coherence.

Keywords: family sense of coherence, early childhood education students

Procedia PDF Downloads 169