Search results for: image guided therapy
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 5170

Search results for: image guided therapy

4840 Security System for Safe Transmission of Medical Image

Authors: Mohammed Jamal Al-Mansor, Kok Beng Gan

Abstract:

This paper develops an optimized embedding of payload in medical image by using genetic optimization. The goal is to preserve region of interest from being distorted because of the watermark. By using this developed system there is no need of manual defining of region of interest through experts as the system will apply the genetic optimization to select the parts of image that can carry the watermark with guaranteeing less distortion. The experimental results assure that genetic based optimization is useful for performing steganography with less mean square error percentage.

Keywords: AES, DWT, genetic algorithm, watermarking

Procedia PDF Downloads 388
4839 The Effect of Environmental CSR on Corporate Social Performance: The Mediating Role of Green Innovation and Corporate Image

Authors: Edward Fosu

Abstract:

Green innovation has emerged as a significant environmental concern across the world. Green innovation refers to the utilization of technological developments that facilitate energy savings and waste material recycling. The stakeholder theory and resourced-based theory were used to examine how stakeholders' expectations affect corporate green innovation activities and how corporate innovation initiatives affect the corporate image and social performance. This study used structural equation modelling (SEM) and hierarchical regression to test the effects of environmental corporate social responsibility on social performance through mediators: green innovation and corporate image. A quantitative design was employed using data from Chinese companies in Ghana for this study. The study assessed. The results revealed that environmental practices promote corporate social performance (β = 0.070, t = 1.974, p = 0.049), positively affect green product innovation (β = 0.251, t = 7.478, p < 0.001), and has direct effect on green process innovation (β = 0.174, t = 6.192, p < 0.001). Green product innovation and green process innovation significantly promote corporate image respectively (β = 0.089, t = 2.581, p = 0.010), (β = 0.089, t = 2.367, p = 0.018). Corporate image has significant direct effects on corporate social performance (β = 0.146, t = 4.256, p < 0.001). Corporate environmental practices have an impact on the development of green products and processes which promote companies’ social performance. Additionally, evidence supports that corporate image influences companies’ social performance.

Keywords: environmental CSR, corporate image, green innovation, coprorate social performance

Procedia PDF Downloads 87
4838 The Mediation Effect of Customer Satisfaction in the Relationship between Service Quality, Corporate Image to Customer Loyalty

Authors: Rizwan Ali, Hammad Zafar

Abstract:

The purpose of this research is to investigate the mediation effect of customer satisfaction in the relationship between service quality, corporate image to customer loyalty, in Pakistan banking sector. The population of this research is banking customers and sample size of 210 respondents. This research uses the SPSS, Correlation, ANOVA and regression analysis techniques along with AMOS methods. The service quality and corporate image applied by the banks are not all variables can directly affect customer loyalty, but must first going through satisfaction. Which means that banks must first need to understand what the customer basic needs through variable service quality and corporate image so that the customers feel loyal when the level of satisfaction is resolved. The service quality provided by the banking industry needs to be improved in order to improve customer satisfaction and loyalty of banking services, especially for banks in Pakistan.

Keywords: customer loyalty, service quality, corporate image, customer satisfaction

Procedia PDF Downloads 77
4837 Rehabilitation of the Blind Using Sono-Visualization Tool

Authors: Ashwani Kumar

Abstract:

In human beings, eyes play a vital role. A very less research has been done for rehabilitation of blindness for the blind people. This paper discusses the work that helps blind people for recognizing the basic shapes of the objects like circle, square, triangle, horizontal lines, vertical lines, diagonal lines and the wave forms like sinusoidal, square, triangular etc. This is largely achieved by using a digital camera, which is used to capture the visual information present in front of the blind person and a software program, which achieves the image processing operations, and finally the processed image is converted into sound. After the sound generation process, the generated sound is fed to the blind person through headphones for visualizing the imaginary image of the object. For visualizing the imaginary image of the object, it needs to train the blind person. Various training process methods had been applied for recognizing the object.

Keywords: image processing, pixel, pitch, loudness, sound generation, edge detection, brightness

Procedia PDF Downloads 360
4836 On Dynamic Chaotic S-BOX Based Advanced Encryption Standard Algorithm for Image Encryption

Authors: Ajish Sreedharan

Abstract:

Security in transmission and storage of digital images has its importance in today’s image communications and confidential video conferencing. Due to the increasing use of images in industrial process, it is essential to protect the confidential image data from unauthorized access. Advanced Encryption Standard (AES) is a well known block cipher that has several advantages in data encryption. However, it is not suitable for real-time applications. This paper presents modifications to the Advanced Encryption Standard to reflect a high level security and better image encryption. The modifications are done by adjusting the ShiftRow Transformation and using On Dynamic chaotic S-BOX. In AES the Substitute bytes, Shift row and Mix columns by themselves would provide no security because they do not use the key. In Dynamic chaotic S-BOX Based AES the Substitute bytes provide security because the S-Box is constructed from the key. Experimental results verify and prove that the proposed modification to image cryptosystem is highly secure from the cryptographic viewpoint. The results also prove that with a comparison to original AES encryption algorithm the modified algorithm gives better encryption results in terms of security against statistical attacks.

Keywords: advanced encryption standard (AES), on dynamic chaotic S-BOX, image encryption, security analysis, ShiftRow transformation

Procedia PDF Downloads 411
4835 Image Enhancement Algorithm of Photoacoustic Tomography Using Active Contour Filtering

Authors: Prasannakumar Palaniappan, Dong Ho Shin, Chul Gyu Song

Abstract:

The photoacoustic images are obtained from a custom developed linear array photoacoustic tomography system. The biological specimens are imitated by conducting phantom tests in order to retrieve a fully functional photoacoustic image. The acquired image undergoes the active region based contour filtering to remove the noise and accurately segment the object area for further processing. The universal back projection method is used as the image reconstruction algorithm. The active contour filtering is analyzed by evaluating the signal to noise ratio and comparing it with the other filtering methods.

Keywords: contour filtering, linear array, photoacoustic tomography, universal back projection

Procedia PDF Downloads 380
4834 Efficacy of Cognitive Rehabilitation Therapy on Poststroke Depression among Survivors of Stroke; A Systematic Review

Authors: Zahra Hassani

Abstract:

Background and Purpose: Poststroke depression (PSD) is one of the complications of a stroke that reduces the patient's chance of recovery, becomes irritable, and changes personality. Cognitive rehabilitation is one of the non-pharmacological methods that improve deficits such as attention, memory, and symptoms of depression. Therefore, the purpose of the present study is to evaluate the Efficacy of Cognitive Rehabilitation Therapy on Poststroke Depression among Survivors of stroke. Method: In this study, a systematic review of the databases Google Scholar, PubMed, Science Direct, Elsevier between the years 2015 and 2019 with the keywords cognitive rehabilitation therapy, post-stroke, depression Search is done. In this process, studies that examined the Efficacy of Cognitive Rehabilitation Therapy on Poststroke Depression among Survivors of stroke were included in the study. Results: Inclusion criteria were full-text availability, interventional study, and non-review articles. There was a significant difference between the articles in terms of the indices studied, sample number, method of implementation, and so on. A review of studies have shown that cognitive rehabilitation therapy has a significant role in reducing the symptoms of post-stroke depression. The use of these interventions is also effective in improving problem-solving skills, improving memory, and improving attention and concentration. Conclusion: This study emphasizes on the development of efficient and flexible adaptive skills through cognitive processes and its effect on reducing depression in patients after stroke.

Keywords: cognitive therapy, depression, stroke, rehabilitation

Procedia PDF Downloads 101
4833 3D Images Representation to Provide Information on the Type of Castella Beams Hole

Authors: Cut Maisyarah Karyati, Aries Muslim, Sulardi

Abstract:

Digital image processing techniques to obtain detailed information from an image have been used in various fields, including in civil engineering, where the use of solid beam profiles in buildings and bridges has often been encountered since the early development of beams. Along with this development, the founded castellated beam profiles began to be more diverse in shape, such as the shape of a hexagon, triangle, pentagon, circle, ellipse and oval that could be a practical solution in optimizing a construction because of its characteristics. The purpose of this research is to create a computer application to edge detect the profile of various shapes of the castella beams hole. The digital image segmentation method has been used to obtain the grayscale images and represented in 2D and 3D formats. This application has been successfully made according to the desired function, which is to provide information on the type of castella beam hole.

Keywords: digital image, image processing, edge detection, grayscale, castella beams

Procedia PDF Downloads 115
4832 Medical Image Classification Using Legendre Multifractal Spectrum Features

Authors: R. Korchiyne, A. Sbihi, S. M. Farssi, R. Touahni, M. Tahiri Alaoui

Abstract:

Trabecular bone structure is important texture in the study of osteoporosis. Legendre multifractal spectrum can reflect the complex and self-similarity characteristic of structures. The main objective of this paper is to develop a new technique of medical image classification based on Legendre multifractal spectrum. Novel features have been developed from basic geometrical properties of this spectrum in a supervised image classification. The proposed method has been successfully used to classify medical images of bone trabeculations, and could be a useful supplement to the clinical observations for osteoporosis diagnosis. A comparative study with existing data reveals that the results of this approach are concordant.

Keywords: multifractal analysis, medical image, osteoporosis, fractal dimension, Legendre spectrum, supervised classification

Procedia PDF Downloads 491
4831 Initial Periodontal Therapy and Follow-up in a Periodontitis Patient: A Case Report

Authors: Yasir Karabacak

Abstract:

Objective: The aim of periodontal therapy is to control and eliminate inflammation in order halt disease progression. The initial periodontal therapy (IPT) including scaling and root planing (SRP) can control periodontal disease in most cases of periodontitis; also maintaining good oral hygiene by the patient is fundamental. The aim of this case report is to present IPT and to present 3-month follow-up results in a patient with periodontitis. Materials and Methods IPT of a 63-year-old non-smoker male with generalized periodontitis is presented. The patient had no history of systemic disease. The intraoral examination reveals marked gingival inflammation as well as plaque accumulation and significant calculus deposits. On radiographic examination, severe bone loss was evident. The patient was diagnosed with generalized advanced periodontitis. Initial periodontal therapy including oral hygiene instructions and quadrant-based SRP under local anesthesia was performed using hand and ultrasonic instruments. No antibiotics were prescribed. The patient was recalled 4 weeks after IPT. Results Favorable clinical improvement was obtained. Gingival inflammation was resolved significantly. A reduction of the mean probing depth from 2.4 mm at baseline to 1.9 mm was observed. The patient presented with a good standard of oral hygiene. The plaque scores decreased from 54.0% at baseline to 17.0%. In addition, the percentage of sites with bleeding on probing decreased from 80.0% at baseline to 44.0%. The patient was scheduled for maintenance therapy every three months. Conclusion: The level of oral hygiene has a great impact on periodontal treatment outcome and supports periodontal therapy properly.

Keywords: initial periodontal, therapy and follow-up in a periodontitis, patient, a case report

Procedia PDF Downloads 54
4830 An Improved C-Means Model for MRI Segmentation

Authors: Ying Shen, Weihua Zhu

Abstract:

Medical images are important to help identifying different diseases, for example, Magnetic resonance imaging (MRI) can be used to investigate the brain, spinal cord, bones, joints, breasts, blood vessels, and heart. Image segmentation, in medical image analysis, is usually the first step to find out some characteristics with similar color, intensity or texture so that the diagnosis could be further carried out based on these features. This paper introduces an improved C-means model to segment the MRI images. The model is based on information entropy to evaluate the segmentation results by achieving global optimization. Several contributions are significant. Firstly, Genetic Algorithm (GA) is used for achieving global optimization in this model where fuzzy C-means clustering algorithm (FCMA) is not capable of doing that. Secondly, the information entropy after segmentation is used for measuring the effectiveness of MRI image processing. Experimental results show the outperformance of the proposed model by comparing with traditional approaches.

Keywords: magnetic resonance image (MRI), c-means model, image segmentation, information entropy

Procedia PDF Downloads 206
4829 The Relationship between Exercise Attitude and Performance with Self-Image in Elderly Men in Iran

Authors: Hadis Mahmoodsalehi, Elham Shakoor, Maryam Koushkie Jahromi

Abstract:

Background and aims: Given the importance of health promotion in elderly and attention to health factors including physical activity and self-image reinforcing, this study aimed to investigate the relationship between exercise attitude and performance with self-image concept in elderly men. Methods: In this descriptive–correlational study, 50 different daily exercise activities of the elderly men living in Iran (mean age: 60.94 years) were selected through simple sampling method. Participants completed a questionnaire regarding exercise attitude and performance and Beck self-image concept. Pearson correlation test was used for analysis of the data. Results: The results showed the significant correlation between optimism and exercise performance (p = 0.012) and exercise attitude (p = 0.005). Conclusion: Findings show that exercise performance and attitude are associated positively with optimism in elderly women. So, increasing exercise or improving attitude toward exercise can lead to improving optimism.

Keywords: elderly, exercise performance and attitude, self-image, descriptive–correlational study

Procedia PDF Downloads 532
4828 A Palmprint Identification System Based Multi-Layer Perceptron

Authors: David P. Tantua, Abdulkader Helwan

Abstract:

Biometrics has been recently used for the human identification systems using the biological traits such as the fingerprints and iris scanning. Identification systems based biometrics show great efficiency and accuracy in such human identification applications. However, these types of systems are so far based on some image processing techniques only, which may decrease the efficiency of such applications. Thus, this paper aims to develop a human palmprint identification system using multi-layer perceptron neural network which has the capability to learn using a backpropagation learning algorithms. The developed system uses images obtained from a public database available on the internet (CASIA). The processing system is as follows: image filtering using median filter, image adjustment, image skeletonizing, edge detection using canny operator to extract features, clear unwanted components of the image. The second phase is to feed those processed images into a neural network classifier which will adaptively learn and create a class for each different image. 100 different images are used for training the system. Since this is an identification system, it should be tested with the same images. Therefore, the same 100 images are used for testing it, and any image out of the training set should be unrecognized. The experimental results shows that this developed system has a great accuracy 100% and it can be implemented in real life applications.

Keywords: biometrics, biological traits, multi-layer perceptron neural network, image skeletonizing, edge detection using canny operator

Procedia PDF Downloads 342
4827 On Musical Information Geometry with Applications to Sonified Image Analysis

Authors: Shannon Steinmetz, Ellen Gethner

Abstract:

In this paper, a theoretical foundation is developed for patterned segmentation of audio using the geometry of music and statistical manifold. We demonstrate image content clustering using conic space sonification. The algorithm takes a geodesic curve as a model estimator of the three-parameter Gamma distribution. The random variable is parameterized by musical centricity and centric velocity. Model parameters predict audio segmentation in the form of duration and frame count based on the likelihood of musical geometry transition. We provide an example using a database of randomly selected images, resulting in statistically significant clusters of similar image content.

Keywords: sonification, musical information geometry, image, content extraction, automated quantification, audio segmentation, pattern recognition

Procedia PDF Downloads 191
4826 The Effect of Coconut Oil on Anthropometric Measurements and Irisin Levels in Overweight Individuals

Authors: Bilge Meral Koc, Elvan Yilmaz Akyuz, Tugce Ozlu

Abstract:

This study aimed to discover the effects of coconut oil intake and diet therapy on anthropometric measurements, biochemical findings and irisin levels in overweight individuals. Materials and Methods: Overweight individuals (n=44, 19-30 years) without any chronic disease were included. In this randomized controlled crossover study, the participants were divided into two groups (Group 1: 23 people, Group 2: 21 people). In the first phase, Group 1 received diet therapy to lose 0.5-1 kg of weight per week and 20 mL of coconut oil/day, while Group 2 only received diet therapy. In the second phase, Group 1 received diet therapy while Group 2 received diet therapy and 20 mL of coconut oil/day. Anthropometric measurements were taken four times. Irisin was measured four times by enzyme-linked immunosorbent (ELISA) method and other biochemical findings were measured twice. Statistical analysis was made on SPSS 20. Results: The irisin level decreased significantly when the participants only took coconut oil (p≤0.05). There was a significant decrease in the participants' body weight, body mass index (BMI) level and body fat percentage (p≤0.01). Insulin, total cholesterol, low density lipoproteins (LDL) cholesterol, and triglyceride (TG) levels of all participants decreased significantly (p≤0.05). There was no significant difference in irisin level due to body weight loss (p≤0.05); coconut oil provided a significant decrease in irisin level (p≤0.05). Conclusion: Diet therapy and weight loss did not have an effect on irisin level, but coconut oil alone was found to reduce irisin level. Coconut oil had no impact on anthropometric and biochemical findings.

Keywords: coconut oil, diet therapy, irisin, overweight

Procedia PDF Downloads 77
4825 Color Image Compression/Encryption/Contour Extraction using 3L-DWT and SSPCE Method

Authors: Ali A. Ukasha, Majdi F. Elbireki, Mohammad F. Abdullah

Abstract:

Data security needed in data transmission, storage, and communication to ensure the security. This paper is divided into two parts. This work interests with the color image which is decomposed into red, green and blue channels. The blue and green channels are compressed using 3-levels discrete wavelet transform. The Arnold transform uses to changes the locations of red image channel pixels as image scrambling process. Then all these channels are encrypted separately using the key image that has same original size and are generating using private keys and modulo operations. Performing the X-OR and modulo operations between the encrypted channels images for image pixel values change purpose. The extracted contours from color images recovery can be obtained with accepted level of distortion using single step parallel contour extraction (SSPCE) method. Experiments have demonstrated that proposed algorithm can fully encrypt 2D Color images and completely reconstructed without any distortion. Also shown that the analyzed algorithm has extremely large security against some attacks like salt and pepper and Jpeg compression. Its proof that the color images can be protected with a higher security level. The presented method has easy hardware implementation and suitable for multimedia protection in real time applications such as wireless networks and mobile phone services.

Keywords: SSPCE method, image compression and salt and peppers attacks, bitplanes decomposition, Arnold transform, color image, wavelet transform, lossless image encryption

Procedia PDF Downloads 494
4824 A Survey on Lossless Compression of Bayer Color Filter Array Images

Authors: Alina Trifan, António J. R. Neves

Abstract:

Although most digital cameras acquire images in a raw format, based on a Color Filter Array that arranges RGB color filters on a square grid of photosensors, most image compression techniques do not use the raw data; instead, they use the rgb result of an interpolation algorithm of the raw data. This approach is inefficient and by performing a lossless compression of the raw data, followed by pixel interpolation, digital cameras could be more power efficient and provide images with increased resolution given that the interpolation step could be shifted to an external processing unit. In this paper, we conduct a survey on the use of lossless compression algorithms with raw Bayer images. Moreover, in order to reduce the effect of the transition between colors that increase the entropy of the raw Bayer image, we split the image into three new images corresponding to each channel (red, green and blue) and we study the same compression algorithms applied to each one individually. This simple pre-processing stage allows an improvement of more than 15% in predictive based methods.

Keywords: bayer image, CFA, lossless compression, image coding standards

Procedia PDF Downloads 298
4823 Data Hiding by Vector Quantization in Color Image

Authors: Yung Gi Wu

Abstract:

With the growing of computer and network, digital data can be spread to anywhere in the world quickly. In addition, digital data can also be copied or tampered easily so that the security issue becomes an important topic in the protection of digital data. Digital watermark is a method to protect the ownership of digital data. Embedding the watermark will influence the quality certainly. In this paper, Vector Quantization (VQ) is used to embed the watermark into the image to fulfill the goal of data hiding. This kind of watermarking is invisible which means that the users will not conscious the existing of embedded watermark even though the embedded image has tiny difference compared to the original image. Meanwhile, VQ needs a lot of computation burden so that we adopt a fast VQ encoding scheme by partial distortion searching (PDS) and mean approximation scheme to speed up the data hiding process. The watermarks we hide to the image could be gray, bi-level and color images. Texts are also can be regarded as watermark to embed. In order to test the robustness of the system, we adopt Photoshop to fulfill sharpen, cropping and altering to check if the extracted watermark is still recognizable. Experimental results demonstrate that the proposed system can resist the above three kinds of tampering in general cases.

Keywords: data hiding, vector quantization, watermark, color image

Procedia PDF Downloads 338
4822 Facility Detection from Image Using Mathematical Morphology

Authors: In-Geun Lim, Sung-Woong Ra

Abstract:

As high resolution satellite images can be used, lots of studies are carried out for exploiting these images in various fields. This paper proposes the method based on mathematical morphology for extracting the ‘horse's hoof shaped object’. This proposed method can make an automatic object detection system to track the meaningful object in a large satellite image rapidly. Mathematical morphology process can apply in binary image, so this method is very simple. Therefore this method can easily extract the ‘horse's hoof shaped object’ from any images which have indistinct edges of the tracking object and have different image qualities depending on filming location, filming time, and filming environment. Using the proposed method by which ‘horse's hoof shaped object’ can be rapidly extracted, the performance of the automatic object detection system can be improved dramatically.

Keywords: facility detection, satellite image, object, mathematical morphology

Procedia PDF Downloads 355
4821 CCR5 as an Ideal Candidate for Immune Gene Therapy and Modification for the Induced Resistance to HIV-1 Infection

Authors: Alieh Farshbaf, Tayyeb Bahrami

Abstract:

Introduction: Cc-chemokine receptor-5 (CCR5) is known as a main co-receptor in human immunodeficiency virus type-1 (HIV-1) infection. Many studies showed 32bp deletion (Δ32) in CCR5 gene, provide natural resistance to HIV-1 infection in homozygous individuals. Inducing the resistance mechanism by CCR5 in HIV-1 infected patients eliminated many problems of highly-active-anti retroviral therapy (HAART) drugs like as low safety, side-effects and virus rebounding from latent reservoirs. New treatments solved some restrictions that are based on gene modification and cell therapy. Literature review: The stories of the “Berlin and Boston patients” showed autologous hematopoietic stem cells transplantation (HSCT) could provide effective cure of HIV-1 infected patients. Furthermore, gene modification by zinc finger nuclease (ZFN) demonstrated another successful result again. Despite the other studies for gene therapy by ∆32 genotype, there is another mutation -CCR5 ∆32/m303- that provides HIV-1 resistant. It is a heterozygote genotype for ∆32 and T→A point mutation at nucleotide 303. These results approved the key role of CCR5 gene. Conclusion: Recent studies showed immune gene therapy and cell therapy could provide effective cure for refractory disease like as HIV. Eradication of HIV-1 from immune system was not observed by HAART, because of reloading virus genome from latent reservoirs after stopping them. It is showed that CCR5 could induce natural resistant to HIV-1 infection by the new approaches based on stem cell transplantation and gene modifying.

Keywords: CCR5, HIV-1, stem cell, immune gene therapy, gene modification

Procedia PDF Downloads 257
4820 Improved Performance in Content-Based Image Retrieval Using Machine Learning Approach

Authors: B. Ramesh Naik, T. Venugopal

Abstract:

This paper presents a novel approach which improves the high-level semantics of images based on machine learning approach. The contemporary approaches for image retrieval and object recognition includes Fourier transforms, Wavelets, SIFT and HoG. Though these descriptors helpful in a wide range of applications, they exploit zero order statistics, and this lacks high descriptiveness of image features. These descriptors usually take benefit of primitive visual features such as shape, color, texture and spatial locations to describe images. These features do not adequate to describe high-level semantics of the images. This leads to a gap in semantic content caused to unacceptable performance in image retrieval system. A novel method has been proposed referred as discriminative learning which is derived from machine learning approach that efficiently discriminates image features. The analysis and results of proposed approach were validated thoroughly on WANG and Caltech-101 Databases. The results proved that this approach is very competitive in content-based image retrieval.

Keywords: CBIR, discriminative learning, region weight learning, scale invariant feature transforms

Procedia PDF Downloads 152
4819 Characteristics of Autism Spectrum Disorder Patient and Perception of Caregiver Regarding Speech and Language Therapy in Bangladesh

Authors: K. M. Saif Ur Rahman, Razib Mamun, Himica Arjuman, Fida Al Shams

Abstract:

Introduction: Autism spectrum disorder (ASD) has become an emerging neurodevelopmental disorder with increasing prevalence. It has become an important public health issue globally. Many approaches including speech and language therapy (SLT), occupational therapy, behavioral therapy etc. are being applied for the betterment of the ASD patients. This study aims to describe the characteristics of ASD patients and perception of caregiver regarding SLT in Bangladesh. Methods: This cross-sectional study was conducted in a therapy and rehabilitation center at Dhaka city. Caregivers of 48 ASD patients responded regarding their perception of SLT and characteristics of patients. Results: Among 48 ASD patients, 56.3% were between 3 to 5 years age group with a male predominance (87.5%). More than half of the participants (56.3%) initiated SLT at the age of 1-3 years and the majority (43.8%) were taking SLT for less than 1 year. Majority of the patients (64.6%) were taken to a physician for healthcare as a first contact of which 29.2% were referred to SLT by physicians. More than half (56.3%) of the caregivers were moderately satisfied with SLT and most of them (62.5%) mentioned moderate improvement through SLT. Improvement rate was 10-15% in specific symptoms such as eye contact, complex mannerism, pointing, imitation etc. Conclusion: This study reveals the self-reported perception of caregivers on SLT. Despite reported improvements, more exploration of different approaches and intervention for management of ASD is recommended.

Keywords: ASD, characteristics, SLT, Bangladesh

Procedia PDF Downloads 152
4818 The Language of Art: Examining Emotional Expression in Drawings of Internally Displaced Persons and Town Students Amid Conflict

Authors: Lugyi No

Abstract:

This research delves into how students from two different backgrounds in a conflict-affected area, one group being internally displaced (IDP) and the other residing in permanent homes, express their emotions through art. Two experiments were conducted involving guided drawing to understand their emotional experiences. In the first experiment, where no specific instructions were given, both groups mostly used dark and dull colors, which suggests feelings of sadness and anxiety. Positive emotions were rarely depicted. In the second experiment, students were asked to express their emotions and provide reasons for their drawings. Here, we observed distinct variations: IDP students leaned towards vibrant colors, reflecting resilience, while town students tended to use monochromatic shades, likely due to their experiences with conflict. This abstract highlights the differing emotional expressions of these groups and the influence of instructions on their artwork.

Keywords: art therapy, conflict-affected areas, education in conflict zones, children's drawings

Procedia PDF Downloads 36
4817 Impact of Lobular Carcinoma in situ on Local Recurrence in Breast Cancer Treated with Breast Conservation Therapy: A Systematic Review and Meta-Analysis

Authors: Christopher G. Harris, Guy D. Eslick

Abstract:

Purpose: Lobular carcinoma in situ (LCIS) is a known risk factor for breast cancer of unclear significance when detected in association with invasive carcinoma. This meta-analysis aims to determine the impact of LCIS on local recurrence risk for individuals with breast cancer treated with breast conservation therapy to help guide appropriate treatment strategies. Methods: We identified relevant studies from five electronic databases. Studies were deemed suitable for inclusion where they compared patients with invasive breast cancer and concurrent LCIS to those with breast cancer alone, all patients underwent breast conservation therapy (lumpectomy with adjuvant radiation therapy), and local recurrence was evaluated. Recurrence data were pooled by use of a random effects model. Results: From 1488 citations screened by our search, 8 studies were deemed suitable for inclusion. These studies comprised of 908 cases and 10638 controls. Median follow-up time was 90 months. There was a significantly increased overall risk of local breast cancer recurrence for individuals with LCIS in association with breast cancer following breast conservation therapy [pOR 1.87; 95% CI 1.14-3.04; p = 0.012]. The risk of local recurrence was non-significantly increased at 5 [pOR 1.09; 95% CI 0.48-2.48; p = 0.828] and 10 years [pOR 1.90; 95% CI 0.89-4.06; p = 0.096]. Conclusions: Individuals with LCIS in association with invasive breast cancer have an increased risk of local recurrence following breast conservation therapy. This supports consideration of aggressive local control of LCIS by way of completion mastectomy or re-excision for certain high-risk patients.

Keywords: breast cancer, breast conservation therapy, lobular carcinoma in situ, lobular neoplasia, local recurrence, meta-analysis

Procedia PDF Downloads 135
4816 Secured Transmission and Reserving Space in Images Before Encryption to Embed Data

Authors: G. R. Navaneesh, E. Nagarajan, C. H. Rajam Raju

Abstract:

Nowadays the multimedia data are used to store some secure information. All previous methods allocate a space in image for data embedding purpose after encryption. In this paper, we propose a novel method by reserving space in image with a boundary surrounded before encryption with a traditional RDH algorithm, which makes it easy for the data hider to reversibly embed data in the encrypted images. The proposed method can achieve real time performance, that is, data extraction and image recovery are free of any error. A secure transmission process is also discussed in this paper, which improves the efficiency by ten times compared to other processes as discussed.

Keywords: secure communication, reserving room before encryption, least significant bits, image encryption, reversible data hiding

Procedia PDF Downloads 380
4815 Encryption Image via Mutual Singular Value Decomposition

Authors: Adil Al-Rammahi

Abstract:

Image or document encryption is needed through e- government data base. Really in this paper we introduce two matrices images, one is the public, and the second is the secret (original). The analyses of each matrix is achieved using the transformation of singular values decomposition. So each matrix is transformed or analyzed to three matrices say row orthogonal basis, column orthogonal basis, and spectral diagonal basis. Product of the two row basis is calculated. Similarly the product of the two column basis is achieved. Finally we transform or save the files of public, row product and column product. In decryption stage, the original image is deduced by mutual method of the three public files.

Keywords: image cryptography, singular values decomposition

Procedia PDF Downloads 403
4814 Extraction of Urban Land Features from TM Landsat Image Using the Land Features Index and Tasseled Cap Transformation

Authors: R. Bouhennache, T. Bouden, A. A. Taleb, A. Chaddad

Abstract:

In this paper we propose a method to map the urban areas. The method uses an arithmetic calculation processed from the land features indexes and Tasseled cap transformation TC of multi spectral Thematic Mapper Landsat TM image. For this purpose the derived indexes image from the original image such SAVI the soil adjusted vegetation index, UI the urban Index, and EBBI the enhanced built up and bareness index were staked to form a new image and the bands were uncorrelated, also the Spectral Angle Mapper (SAM) and Spectral Information Divergence (SID) supervised classification approaches were first applied on the new image TM data using the reference spectra of the spectral library and subsequently the four urban, vegetation, water and soil land cover categories were extracted with their accuracy assessment.The urban features were represented using a logic calculation applied to the brightness, UI-SAVI, NDBI-greenness and EBBI- brightness data sets. The study applied to Blida and mentioned that the urban features can be mapped with an accuracy ranging from 92 % to 95%.

Keywords: EBBI, SAVI, Tasseled Cap Transformation, UI

Procedia PDF Downloads 457
4813 Detection of Intentional Attacks in Images Based on Watermarking

Authors: Hazem Munawer Al-Otum

Abstract:

In this work, an efficient watermarking technique is proposed and can be used for detecting intentional attacks in RGB color images. The proposed technique can be implemented for image authentication and exhibits high robustness against unintentional common image processing attacks. It deploys two measures to discern between intentional and unintentional attacks based on using a quantization-based technique in a modified 2D multi-pyramidal DWT transform. Simulations have shown high accuracy in detecting intentionally attacked regions while exhibiting high robustness under moderate to severe common image processing attacks.

Keywords: image authentication, copyright protection, semi-fragile watermarking, tamper detection

Procedia PDF Downloads 230
4812 Childhood Trauma and Borderline Personality: An Analysis of the Root Causes and Treatment Plans

Authors: Sidika McNeil

Abstract:

Borderline personality disorder (BPD) is a personality disorder that has been found to have strong origins in childhood trauma. One of the key symptoms of BPD is an association with irregular moods swings, as well as suicidal ideation (SI). Owing to the typically severe trauma patients experience during childhood, it is hard for them to control their emotions and thus makes it hard to emotionally regulate. It is then very common for those suffering from BPD to turn to unhealthy coping mechanisms, such as substance use, unhealthy relationships, and more, often unsuccessfully creating experiences that facilitate safety which leads to further negative experiences. With the high suicide rating among children, adolescents, and teens, and an ever-increasing number of children being diagnosed with BPD, it is very important that more research is done to find further treatments for patients who are currently suffering. Methods: Utilizing data found in prior studies, this paper will analyze the literature to focus on a comprehensive treatment plan for those with DBT. It is currently suggested that with the use of dialectical behavioral therapy (DBT), a therapy that focuses on changing negative thinking patterns and pushes for more positive ones is helpful for treatment for those with BPD. Though this therapy is not a cure to BPD, it does help mitigate the risk; this essay will explore other options that can further the treatment process, such as cognitive analytical therapy (CAT), which focuses on delving into the past to find the root causes of an issue to create coping strategies and harm reduction, a type of therapy used to aid patients in lowering the use of substances without complete cessation. Results: The research provides enough evidence to link between the treatment of BPD with the utilization of CAT.

Keywords: borderline personality disorder, cognitive analytical therapy, dialectical behavioral therapy, harm reduction, suicidal ideation

Procedia PDF Downloads 152
4811 The Effects of Mirror Therapy on Clinical Improvement in Hemiplegic Lower Extremity Rehabilitation in Subjects with Chronic Stroke

Authors: Hassan Abo-Salem, Huang Xiaolin

Abstract:

Background and Purpose: The effectiveness of mirror therapy (MT) has been investigated in acute hemiplegia. The present study examines whether MT, given during chronic stroke, was more effective in promoting motor recovery of the lower extremity and walking speed than standard rehabilitation alone. Methods: The study enrolled 30 patients with chronic stroke. Fifteen patients each were assigned to the treatment group and the control group. All patients received a conventional rehabilitation program for a 4-week period. In addition to this rehabilitation program, patients in the treatment group received mirror therapy for 4 weeks, 5 days a week. Main measures: Passive ankle joint dorsiflexion range of motion, gait speed, Brunnstrom stages of motor recovery, plantarflexor muscle tone by Modified Ashworth Scale. Results: Results: No significant difference was found in the outcome measures among groups before treatment. When compared with standard rehabilitation, mirror therapy improved Ankle ROM, Brunnstrom stages and waking speed (p < 0.05). However, there were no significant differences between two groups on MAS (P > 0.05). Conclusions: Mirror therapy combined with a conventional stroke rehabilitation program enhances lower-extremity motor recovery and walking speed in chronic stroke patients.

Keywords: mirror therapy, stroke, MAS, walking speed

Procedia PDF Downloads 477