Search results for: image detection
2165 Deep Learning for SAR Images Restoration
Authors: Hossein Aghababaei, Sergio Vitale, Giampaolo Ferraioli
Abstract:
In the context of Synthetic Aperture Radar (SAR) data, polarization is an important source of information for Earth's surface monitoring. SAR Systems are often considered to transmit only one polarization. This constraint leads to either single or dual polarimetric SAR imaging modalities. Single polarimetric systems operate with a fixed single polarization of both transmitted and received electromagnetic (EM) waves, resulting in a single acquisition channel. Dual polarimetric systems, on the other hand, transmit in one fixed polarization and receive in two orthogonal polarizations, resulting in two acquisition channels. Dual polarimetric systems are obviously more informative than single polarimetric systems and are increasingly being used for a variety of remote sensing applications. In dual polarimetric systems, the choice of polarizations for the transmitter and the receiver is open. The choice of circular transmit polarization and coherent dual linear receive polarizations forms a special dual polarimetric system called hybrid polarimetry, which brings the properties of rotational invariance to geometrical orientations of features in the scene and optimizes the design of the radar in terms of reliability, mass, and power constraints. The complete characterization of target scattering, however, requires fully polarimetric data, which can be acquired with systems that transmit two orthogonal polarizations. This adds further complexity to data acquisition and shortens the coverage area or swath of fully polarimetric images compared to the swath of dual or hybrid polarimetric images. The search for solutions to augment dual polarimetric data to full polarimetric data will therefore take advantage of full characterization and exploitation of the backscattered field over a wider coverage with less system complexity. Several methods for reconstructing fully polarimetric images using hybrid polarimetric data can be found in the literature. Although the improvements achieved by the newly investigated and experimented reconstruction techniques are undeniable, the existing methods are, however, mostly based upon model assumptions (especially the assumption of reflectance symmetry), which may limit their reliability and applicability to vegetation and forest scenarios. To overcome the problems of these techniques, this paper proposes a new framework for reconstructing fully polarimetric information from hybrid polarimetric data. The framework uses Deep Learning solutions to augment hybrid polarimetric data without relying on model assumptions. A convolutional neural network (CNN) with a specific architecture and loss function is defined for this augmentation problem by focusing on different scattering properties of the polarimetric data. In particular, the method controls the CNN training process with respect to several characteristic features of polarimetric images defined by the combination of different terms in the cost or loss function. The proposed method is experimentally validated with real data sets and compared with a well-known and standard approach from the literature. From the experiments, the reconstruction performance of the proposed framework is superior to conventional reconstruction methods. The pseudo fully polarimetric data reconstructed by the proposed method also agree well with the actual fully polarimetric images acquired by radar systems, confirming the reliability and efficiency of the proposed method.Keywords: SAR image, polarimetric SAR image, convolutional neural network, deep learnig, deep neural network
Procedia PDF Downloads 662164 Unauthorized License Verifier and Secure Access to Vehicle
Authors: G. Prakash, L. Mohamed Aasiq, N. Dhivya, M. Jothi Mani, R. Mounika, B. Gomathi
Abstract:
In our day to day life, many people met with an accident due to various reasons like over speed, overload in the vehicle, violation of the traffic rules, etc. Driving license system is difficult task for the government to monitor. To prevent non-licensees from driving who are causing most of the accidents, a new system is proposed. The proposed system consists of a smart card capable of storing the license details of a particular person. Vehicles such as cars, bikes etc., should have a card reader capable of reading the particular license. A person, who wishes to drive the vehicle, should insert the card (license) in the vehicle and then enter the password in the keypad. If the license data stored in the card and database about the entire license holders in the microcontroller matches, he/she can proceed for ignition after the automated opening of the fuel tank valve, otherwise the user is restricted to use the vehicle. Moreover, overload detector in our proposed system verifies and then prompts the user to avoid overload before driving. This increases the security of vehicles and also ensures safe driving by preventing accidents.Keywords: license, verifier, EEPROM, secure, overload detection
Procedia PDF Downloads 2402163 The Proactive Approach of Digital Forensics Methodology against Targeted Attack Malware
Authors: Mohamed Fadzlee Sulaiman, Mohd Zabri Adil Talib, Aswami Fadillah Mohd Ariffin
Abstract:
Each individual organization has their own mechanism to build up cyber defense capability in protecting their information infrastructures from data breaches and cyber espionage. But, we can not deny the possibility of failing to detect and stop cyber attacks especially for those targeting credential information and intellectual property (IP). In this paper, we would like to share the modern approach of effective digital forensic methodology in order to identify the artifacts in tracing the trails of evidence while mitigating the infection from the target machine/s. This proposed approach will suit the digital forensic investigation to be conducted while resuming the business critical operation after mitigating the infection and minimizing the risk from the identified attack to transpire. Therefore, traditional digital forensics methodology has to be improvised to be proactive which not only focusing to discover the root caused and the threat actor but to develop the relevant mitigation plan in order to prevent from the same attack.Keywords: digital forensic, detection, eradication, targeted attack, malware
Procedia PDF Downloads 2732162 The Search of New Laws for a Gluten Kingdom
Authors: Mohammed Saleem Tariq
Abstract:
The enthusiasm for gluten avoidance in a growing market is met by improvements in sensitive detection methods for analysing gluten content. Paradoxically, manufacturers employ no such systems in the production process but continue to market their product as gluten free, a significant risk posed to an undetermined coeliac population. The paper resonates with an immunological response that causes gastrointestinal scarring and villous atrophy with the conventional description of personal injury. The current developing regime in the UK however, it is discussed, has avoided creating specific rules to provide an adequate level of protection for this type of vulnerable ‘characteristic’. Due to the struggle involved with identifying an appropriate cause of action, this paper analyses whether a claim brought in misrepresentation, negligence and/or under the Consumer Protect Act 1987 could be sustained. A necessary comparison is then made with the approach adopted by the Americans with Disability Act 1990 which recognises this chronic disease as a disability. The ongoing failure to introduce a level of protection which matches that afforded to those who fall into any one of the ‘protected characteristics’ under the Equality Act 2010, is inconceivable given the outstanding level of legal vulnerability.Keywords: coeliac, litigation, misrepresentation, negligence
Procedia PDF Downloads 3642161 Phase Detection Using Infrared Spectroscopy: A Build up to Inline Gas–Liquid Flow Characterization
Authors: Kwame Sarkodie, William Cheung, Andrew R. Fergursson
Abstract:
The characterization of multiphase flow has gained enormous attention for most petroleum and chemical industrial processes. In order to fully characterize fluid phases in a stream or containment, there needs to be a profound knowledge of the existing composition of fluids present. This introduces a problem for real-time monitoring of fluid dynamics such as fluid distributions, and phase fractions. This work presents a simple technique of correlating absorbance spectrums of water, oil and air bubble present in containment. These spectra absorption outputs are derived by using an Fourier Infrared spectrometer. During the testing, air bubbles were introduced into static water column and oil containment and with light absorbed in the infrared regions of specific wavelength ranges. Attenuation coefficients are derived for various combinations of water, gas and oil which reveal the presence of each phase in the samples. The results from this work are preliminary and viewed as a build up to the design of a multiphase flow rig which has an infrared sensor pair to be used for multiphase flow characterization.Keywords: attenuation, infrared, multiphase, spectroscopy
Procedia PDF Downloads 3662160 The Wear Recognition on Guide Surface Based on the Feature of Radar Graph
Authors: Youhang Zhou, Weimin Zeng, Qi Xie
Abstract:
Abstract: In order to solve the wear recognition problem of the machine tool guide surface, a new machine tool guide surface recognition method based on the radar-graph barycentre feature is presented in this paper. Firstly, the gray mean value, skewness, projection variance, flat degrees and kurtosis features of the guide surface image data are defined as primary characteristics. Secondly, data Visualization technology based on radar graph is used. The visual barycentre graphical feature is demonstrated based on the radar plot of multi-dimensional data. Thirdly, a classifier based on the support vector machine technology is used, the radar-graph barycentre feature and wear original feature are put into the classifier separately for classification and comparative analysis of classification and experiment results. The calculation and experimental results show that the method based on the radar-graph barycentre feature can detect the guide surface effectively.Keywords: guide surface, wear defects, feature extraction, data visualization
Procedia PDF Downloads 5182159 Instant Fire Risk Assessment Using Artifical Neural Networks
Authors: Tolga Barisik, Ali Fuat Guneri, K. Dastan
Abstract:
Major industrial facilities have a high potential for fire risk. In particular, the indices used for the detection of hidden fire are used very effectively in order to prevent the fire from becoming dangerous in the initial stage. These indices provide the opportunity to prevent or intervene early by determining the stage of the fire, the potential for hazard, and the type of the combustion agent with the percentage values of the ambient air components. In this system, artificial neural network will be modeled with the input data determined using the Levenberg-Marquardt algorithm, which is a multi-layer sensor (CAA) (teacher-learning) type, before modeling the modeling methods in the literature. The actual values produced by the indices will be compared with the outputs produced by the network. Using the neural network and the curves to be created from the resulting values, the feasibility of performance determination will be investigated.Keywords: artifical neural networks, fire, Graham Index, levenberg-marquardt algoritm, oxygen decrease percentage index, risk assessment, Trickett Index
Procedia PDF Downloads 1352158 Email Phishing Detection Using Natural Language Processing and Convolutional Neural Network
Abstract:
Phishing is one of the oldest and best known scams on the Internet. It can be defined as any type of telecommunications fraud that uses social engineering tricks to obtain confidential data from its victims. It’s a cybercrime aimed at stealing your sensitive information. Phishing is generally done via private email, so scammers impersonate large companies or other trusted entities to encourage victims to voluntarily provide information such as login credentials or, worse yet, credit card numbers. The COVID-19 theme is used by cybercriminals in multiple malicious campaigns like phishing. In this environment, messaging filtering solutions have become essential to protect devices that will now be used outside of the secure perimeter. Despite constantly updating methods to avoid these cyberattacks, the end result is currently insufficient. Many researchers are looking for optimal solutions to filter phishing emails, but we still need good results. In this work, we concentrated on solving the problem of detecting phishing emails using the different steps of NLP preprocessing, and we proposed and trained a model using one-dimensional CNN. Our study results show that our model obtained an accuracy of 99.99%, which demonstrates how well our model is working.Keywords: phishing, e-mail, NLP preprocessing, CNN, e-mail filtering
Procedia PDF Downloads 1242157 Durability and Early-Age Behavior of Sprayed Concrete with an Expansion Admixture
Authors: Kyong-Ku Yun, Kyeo-Re Lee, Kyong Namkung, Seung-Yeon Han, Pan-Gil Choi
Abstract:
Sprayed concrete is a way to spray a concrete using a machinery with high air pressure. There are insufficient studies on the durability and early-age behavior of sprayed concrete using high quality expansion agent. A series of an experiment were executed with 5 varying expansion agent replacement rates, while all the other conditions were kept constant, including cement binder content and water-cement ratio. The tests includes early-age shrinkage test, rapid chloride permeability test, and image analysis of air void structure. The early-age expansion test with the variation of expansion agent show that the expansion strain increases as the ratio of expansion agent increases. The rapid chloride permeability test shows that it decrease as the expansion agent increase. Therefore, expansion agent affects into the rapid chloride permeability in a better way. As expansion agent content increased, spacing factor slightly decreased while specific surface kept relatively stable. As a results, the optimum ratio of expansion agent would be selected between 7 % and 11%.Keywords: sprayed concrete, durability, early-age behavior, expansion admixture
Procedia PDF Downloads 5062156 Finite Element Simulation of Embankment Bumps at Bridge Approaches, Comparison Study
Authors: F. A. Hassona, M. D. Hashem, R. I. Melek, B. M. Hakeem
Abstract:
A differential settlement at the end of a bridge near the interface between the abutment and the embankment is a persistent problem for highway agencies. The differential settlement produces the common ‘bump at the end of the bridge’. Reduction in steering response, distraction to the driver, added risk and expense to maintenance operation, and reduction in a transportation agency’s public image are all undesirable effects of these uneven and irregular transitions. This paper attempts to simulate the bump at the end of the bridge using PLAXIS finite element 2D program. PLAXIS was used to simulate a laboratory model called Bridge to Embankment Simulator of Transition (B.E.S.T.) device which was built by others to investigate this problem. A total of six numerical simulations were conducted using hardening- soil model with rational assumptions of missing soil parameters to estimate the bump at the end of the bridge. The results show good agreements between the numerical and the laboratory models. Important factors influencing bumps at bridge ends were also addressed in light of the model results.Keywords: bridge approach slabs, bridge bump, hardening-soil, PLAXIS 2D, settlement
Procedia PDF Downloads 3472155 Design and Manufacture Detection System for Patient's Unwanted Movements during Radiology and CT Scan
Authors: Anita Yaghobi, Homayoun Ebrahimian
Abstract:
One of the important tools that can help orthopedic doctors for diagnose diseases is imaging scan. Imaging techniques can help physicians in see different parts of the body, including the bones, muscles, tendons, nerves, and cartilage. During CT scan, a patient must be in the same position from the start to the end of radiation treatment. Patient movements are usually monitored by the technologists through the closed circuit television (CCTV) during scan. If the patient makes a small movement, it is difficult to be noticed by them. In the present work, a simple patient movement monitoring device is fabricated to monitor the patient movement. It uses an electronic sensing device. It continuously monitors the patient’s position while the CT scan is in process. The device has been retrospectively tested on 51 patients whose movement and distance were measured. The results show that 25 patients moved 1 cm to 2.5 cm from their initial position during the CT scan. Hence, the device can potentially be used to control and monitor patient movement during CT scan and Radiography. In addition, an audible alarm situated at the control panel of the control room is provided with this device to alert the technologists. It is an inexpensive, compact device which can be used in any CT scan machine.Keywords: CT scan, radiology, X Ray, unwanted movement
Procedia PDF Downloads 4582154 The Flow Separation Delay on the Aircraft Wing
Authors: Ishtiaq A. Chaudhry, Z. R. Tahir, F. A. Siddiqui, Z. Anwar, F. Valenzuelacalva
Abstract:
A series of experiments involving the particle image velocimetry technique are carried out to analyse the quantitative effectiveness of the synthesized vortical structures towards actual flow separation control. The streamwise vortices are synthesized from the synthetic jet actuator and introduced into the attached and separating boundary layer developed on the flat plate surface. Two types of actuators with different geometrical set up are used to analyse the evolution of vortical structures in the near wall region and their impact towards achieving separation delay on the actual aircraft wing. Firstly a single circular jet is synthesized at varying actuator operating parameters and issued into the boundary layer to evaluate the dynamics of the interaction between the vortical structures and the near wall low momentum fluid in the separated region. Secondly, an array of jets has been issued into the artificially separated region to assess the effectiveness of various vortical structures towards achieving the reattachment of the separated flow in the streamwise direction.Keywords: boundary layer, flow separation, streamwise vortices, synthetic jet actuator
Procedia PDF Downloads 4622153 Semi-Automated Tracking of Vibrissal Movements in Free-Moving Rodents Captured by High-Speed Videos
Authors: Hyun June Kim, Tailong Shi, Seden Akdagli, Sam Most, Yuling Yan
Abstract:
Quantitative analysis of mouse whisker movement can be used to study functional recovery and regeneration of facial nerve after an injury. However, it is challenging to accurately track mouse whisker movements, and most whisker tracking methods require manual intervention, e.g. fixing the head of the mouse during a study. Here we describe a semi-automated image processing method that is applied to high-speed video recordings of free-moving mice to track whisker movements. We first track the head movement of a mouse by delineating the lower head contour frame-by-frame to locate and determine the orientation of its head. Then, a region of interest is identified for each frame, with subsequent application of the Hough transform to track individual whisker movements on each side of the head. Our approach is used to examine the functional recovery of damaged facial nerves in mice over a course of 21 days.Keywords: mystacial macrovibrissae, whisker tracking, head tracking, facial nerve recovery
Procedia PDF Downloads 5892152 Clinical Presentation and Immune Response to Intramammary Infection of Holstein-Friesian Heifers with Isolates from Two Staphylococcus aureus Lineages
Authors: Dagmara A. Niedziela, Mark P. Murphy, Orla M. Keane, Finola C. Leonard
Abstract:
Staphylococcus aureus is the most frequent cause of clinical and subclinical bovine mastitis in Ireland. Mastitis caused by S. aureus is often chronic and tends to recur after antibiotic treatment. This may be due to several virulence factors, including attributes that enable the bacterium to internalize into bovine mammary epithelial cells, where it may evade antibiotic treatment, or evade the host immune response. Four bovine-adapted lineages (CC71, CC97, CC151 and ST136) were identified among a collection of Irish S. aureus mastitis isolates. Genotypic variation of mastitis-causing strains may contribute to different presentations of the disease, including differences in milk somatic cell count (SCC), the main method of mastitis detection. The objective of this study was to investigate the influence of bacterial strain and lineage on host immune response, by employing cell culture methods in vitro as well as an in vivo infection model. Twelve bovine adapted S. aureus strains were examined for internalization into bovine mammary epithelial cells (bMEC) and their ability to induce an immune response from bMEC (using qPCR and ELISA). In vitro studies found differences in a variety of virulence traits between the lineages. Strains from lineages CC97 and CC71 internalized more efficiently into bovine mammary epithelial cells (bMEC) than CC151 and ST136. CC97 strains also induced immune genes in bMEC more strongly than strains from the other 3 lineages. One strain each of CC151 and CC97 that differed in their ability to cause an immune response in bMEC were selected on the basis of the above in vitro experiments. Fourteen first-lactation Holstein-Friesian cows were purchased from 2 farms on the basis of low SCC (less than 50 000 cells/ml) and infection free status. Seven cows were infected with 1.73 x 102 c.f.u. of the CC97 strain (Group 1) and another seven with 5.83 x 102 c.f.u. of the CC151 strain (Group 2). The contralateral quarter of each cow was inoculated with PBS (vehicle). Clinical signs of infection (temperature, milk and udder appearance, milk yield) were monitored for 30 days. Blood and milk samples were taken to determine bacterial counts in milk, SCC, white blood cell populations and cytokines. Differences in disease presentation in vivo between groups were observed, with two animals from Group 2 developing clinical mastitis and requiring antibiotic treatment, while one animal from Group 1 did not develop an infection for the duration of the study. Fever (temperature > 39.5⁰C) was observed in 3 animals from Group 2 and in none from Group 1. Significant differences in SCC and bacterial load between groups were observed in the initial stages of infection (week 1). Data is also being collected on cytokines and chemokines secreted during the course of infection. The results of this study suggest that a strain from lineage CC151 may cause more severe clinical mastitis, while a strain from lineage CC97 may cause mild, subclinical mastitis. Diversity between strains of S. aureus may therefore influence the clinical presentation of mastitis, which in turn may influence disease detection and treatment needs.Keywords: Bovine mastitis, host immune response, host-pathogen interactions, Staphylococcus aureus
Procedia PDF Downloads 1562151 Distribution-Free Exponentially Weighted Moving Average Control Charts for Monitoring Process Variability
Authors: Chen-Fang Tsai, Shin-Li Lu
Abstract:
Distribution-free control chart is an oncoming area from the statistical process control charts in recent years. Some researchers have developed various nonparametric control charts and investigated the detection capability of these charts. The major advantage of nonparametric control charts is that the underlying process is not specifically considered the assumption of normality or any parametric distribution. In this paper, two nonparametric exponentially weighted moving average (EWMA) control charts based on nonparametric tests, namely NE-S and NE-M control charts, are proposed for monitoring process variability. Generally, weighted moving average (GWMA) control charts are extended by utilizing design and adjustment parameters for monitoring the changes in the process variability, namely NG-S and NG-M control charts. Statistical performance is also investigated on NG-S and NG-M control charts with run rules. Moreover, sensitivity analysis is performed to show the effects of design parameters under the nonparametric NG-S and NG-M control charts.Keywords: Distribution-free control chart, EWMA control charts, GWMA control charts
Procedia PDF Downloads 2702150 Determination of Some Etiologic Agents in Calves with Diarrhea
Authors: Nermin Isik, Ozlem Derinbay Ekici, Oguzhan Avci
Abstract:
The aim of this study was to determination of role infection in neonatal calves in Central Anatolian, Turkey. A total 300 fecal samples were collected from diarrheic neonatal calves, aged between 0–90 days from Konya, Karaman, and Aksaray from January to April 2014. Fecal specimens from calves with clinically diarrheic symptoms were examined for the presence of Bovine Coronavirus, Bovine Rotavirus, Cryptosporidium sp., and E. coli by commercially available capture direct enzyme linked immunosorbent assay (ELISA) kit and Modified Ziehl Neelsen method (MZN). Calves were grouped according to their age as follows: 1-14, 15-29, and 30-90 days. Cryptosporidium sp. infection was detected in 52.8%, 58.8%, and 39.2% by ELISA and 33.9%, 47%, 26.7% by MZN in the respective age groups. The seroprevalance of Rotavirus (12.5 %, 40 %, 12.5 %), Coronavirus (2.5%, 0%, 3.5%) and E. coli (5%, 4.7%, 8.9%) infections were determined according to the age groups respectively. Cryptosporidium sp. was the most detected enteropathogen (52 %) of calves and coronavirus was the least detected (2 %). The detection rate of the mixed enfection was 12.3%. In conclusion, it must be evaluated by mix infections in calves with diarrhea. These results will provide an important contribution against the factors that cause diarrheaKeywords: cryptosporidium sp., bovine coronavirus, bovine rotavirus, E.coli, calve, ELISA
Procedia PDF Downloads 5512149 Determination of Full Energy Peak Efficiency and Resolution of Nai (Tl) Detector Using Gamma-ray Spectroscopy
Authors: Jibon Sharma, Alakjyoti Patowary, Moirangthem Nara Singh
Abstract:
In experimental research it is very much essential to obtain the quality control of the system used for the experiment. NaI (Tl) scintillation detector is the most commonly used in radiation and medical physics for measurement of the gamma ray activity of various samples. In addition, the scintillation detector has a lot of applications in the elemental analysis of various compounds, alloys using activation analysis. In each application for quantitative analysis, it is very much essential to know the detection efficiency and resolution for different gamma energies. In this work, the energy dependence of efficiency and resolution of NaI (Tl) detector using gamma-ray spectroscopy are investigated. Different photon energies of 356.01 keV,511keV,661.60keV,1170 keV,1274.53 keV and 1330 keV are obtained from four radioactive sources (133Ba,22Na,137Cs and 60 Co) used in these studies. Values of full energy peak efficiencies of these gamma energies are found to be respectively 58.46%,10.15%,14.39%,1.4%,3.27% and 1.31%. The values of percent resolution for above different gamma ray energies are found to be 11.27%,7.27%,6.38%,5.17%,4.86% and 4.74% respectively. It was found that the efficiency of the detector exponentially decreases with energy and the resolution of the detector is directly proportional to the energy of gamma-ray.Keywords: naI (Tl) gamma-ray spectrometer, resolution, full energy peak efficiency, radioactive sources
Procedia PDF Downloads 1022148 V0 Physics at LHCb. RIVET Analysis Module for Z Boson Decay to Di-Electron
Authors: A. E. Dumitriu
Abstract:
The LHCb experiment is situated at one of the four points around CERN’s Large Hadron Collider, being a single-arm forward spectrometer covering 10 mrad to 300 (250) mrad in the bending (non-bending) plane, designed primarily to study particles containing b and c quarks. Each one of LHCb’s sub-detectors specializes in measuring a different characteristic of the particles produced by colliding protons, its significant detection characteristics including a high precision tracking system and 2 ring-imaging Cherenkov detectors for particle identification. The major two topics that I am currently concerned in are: the RIVET project (Robust Independent Validation of Experiment and Theory) which is an efficient and portable tool kit of C++ class library useful for validation and tuning of Monte Carlo (MC) event generator models by providing a large collection of standard experimental analyses useful for High Energy Physics MC generator development, validation, tuning and regression testing and V0 analysis for 2013 LHCb NoBias type data (trigger on bunch + bunch crossing) at √s=2.76 TeV.Keywords: LHCb physics, RIVET plug-in, RIVET, CERN
Procedia PDF Downloads 4282147 Critical Analysis of Ideology of Non-Religious Spirituality (SBNR) Case Study of Sam Harris’ Theory
Authors: Muhammad Samiullah
Abstract:
Religion and spirit always goes side by side. In this era spirit and religion are studied separately with thought of an anti-religious phenomenon is there with its vast impacts. Non-religious mind and religious one have a lot of things that differs, they have spiritual struggles.so there is theme arises that is in the name of non-religious spirituality(SBNR). The thinking prevailing in west and now in east in reverse of the religious institutional thought and spirituality. Religious disputes created an image to the world that is nontolerant and companionate, rising a question of god existence and self-existence. Thus giving rise in Atheism, nihilism, free thinking. The thinking of spirituality also gone in another side with superstitions and spiritual meditation. Christian religious bodies and scholar criticized the stance with their religious aspect but there should be an Islamic counter narrative should be there. Here in this dissertation the phenomenon is addressed and analyzed in respect with some of the literature presented from 2014 till present year. The phenomenon was not analyzed before in broader sense. There are some introductory and static views presented in this regard. So there is a literature gap to be filled by this effort, the Muslim counter narrative is still not there though Christians do their part.Keywords: SBNR, non-spirituality, superstitions, Sam Harris
Procedia PDF Downloads 882146 A New Distributed Computing Environment Based On Mobile Agents for Massively Parallel Applications
Authors: Fatéma Zahra Benchara, Mohamed Youssfi, Omar Bouattane, Hassan Ouajji, Mohamed Ouadi Bensalah
Abstract:
In this paper, we propose a new distributed environment for High Performance Computing (HPC) based on mobile agents. It allows us to perform parallel programs execution as distributed one over a flexible grid constituted by a cooperative mobile agent team works. The distributed program to be performed is encapsulated on team leader agent which deploys its team workers as Agent Virtual Processing Unit (AVPU). Each AVPU is asked to perform its assigned tasks and provides the computational results which make the data and team works tasks management difficult for the team leader agent and that influence the performance computing. In this work we focused on the implementation of the Mobile Provider Agent (MPA) in order to manage the distribution of data and instructions and to ensure a load balancing model. It grants also some interesting mechanisms to manage the others computing challenges thanks to the mobile agents several skills.Keywords: image processing, distributed environment, mobile agents, parallel and distributed computing
Procedia PDF Downloads 4072145 Structural Performance of a Bridge Pier on Dubious Deep Foundation
Authors: Víctor Cecilio, Roberto Gómez, J. Alberto Escobar, Héctor Guerrero
Abstract:
The study of the structural behavior of a support/pier of an elevated viaduct in Mexico City is presented. Detection of foundation piles with uncertain integrity prompted the review of possible situations that could jeopardy the structural safety of the pier. The objective of this paper is to evaluate the structural conditions of the support, taking into account the type of anomaly reported and the depth at which it is located, the position of the pile with uncertain integrity in the foundation system, the stratigraphy of the surrounding soil and the geometry and structural characteristics of the pier. To carry out the above, dynamic analysis, spectral modal, and step-by-step, with elastic and inelastic material models, were performed. Results were evaluated in accordance with the standards used for the design of the original structural project and with the Construction Regulations for Mexico’s Federal District (RCDF-2017, 2017). Comments on the response of the analyzed models are issued, and the conclusions are presented from a structural point of view.Keywords: dynamic analysis, inelastic models, dubious foundation, bridge pier
Procedia PDF Downloads 1342144 Development of Zinc Oxide Coated Carbon Nanoparticles from Pineapples Leaves Using SOL Gel Method for Optimal Adsorption of Copper ion and Reuse in Latent Fingerprint
Authors: Bienvenu Gael Fouda Mbanga, Zikhona Tywabi-Ngeva, Kriveshini Pillay
Abstract:
This work highlighted a new method for preparing Nitrogen carbon nanoparticles fused on zinc oxide nanoparticle nanocomposite (N-CNPs/ZnONPsNC) to remove copper ions (Cu²+) from wastewater by sol-gel method and applying the metal-loaded adsorbent in latent fingerprint application. The N-CNPs/ZnONPsNC showed to be an effective sorbent for optimum Cu²+ sorption at pH 8 and 0.05 g dose. The Langmuir isotherm was found to best fit the process, with a maximum adsorption capacity of 285.71 mg/g, which was higher than most values found in other research for Cu²+ removal. Adsorption was spontaneous and endothermic at 25oC. In addition, the Cu²+-N-CNPs/ZnONPsNC was found to be sensitive and selective for latent fingerprint (LFP) recognition on a range of porous surfaces. As a result, in forensic research, it is an effective distinguishing chemical for latent fingerprint detection.Keywords: latent fingerprint, nanocomposite, adsorption, copper ions, metal loaded adsorption, adsorbent
Procedia PDF Downloads 832143 Flow Control around Bluff Bodies by Attached Permeable Plates
Authors: Gokturk Memduh Ozkan, Huseyin Akilli
Abstract:
The aim of present study is to control the unsteady flow structure downstream of a circular cylinder by use of attached permeable plates. Particle image velocimetry (PIV) technique and dye visualization experiments were performed in deep water and the flow characteristics were evaluated by means of time-averaged streamlines, Reynolds Shear Stress and Turbulent Kinetic Energy concentrations. The permeable plate was made of a chrome-nickel screen having a porosity value of β=0.6 and it was attached on the cylinder surface along its midspan. Five different angles were given to the plate (θ=0°, 15°, 30°, 45°, 60°) with respect to the centerline of the cylinder in order to examine its effect on the flow control. It was shown that the permeable plate is effective on elongating the vortex formation length and reducing the fluctuations in the wake region. Compared to the plain cylinder, the reductions in the values of maximum Reynolds shear stress and Turbulent Kinetic Energy were evaluated as 72.5% and 66%, respectively for the plate angles of θ=45° and 60° which were also found to be suggested for applications concerning the vortex shedding and consequent Vortex-Induced Vibrations.Keywords: bluff body, flow control, permeable plate, PIV, VIV, vortex shedding
Procedia PDF Downloads 3592142 FlexPoints: Efficient Algorithm for Detection of Electrocardiogram Characteristic Points
Authors: Daniel Bulanda, Janusz A. Starzyk, Adrian Horzyk
Abstract:
The electrocardiogram (ECG) is one of the most commonly used medical tests, essential for correct diagnosis and treatment of the patient. While ECG devices generate a huge amount of data, only a small part of them carries valuable medical information. To deal with this problem, many compression algorithms and filters have been developed over the past years. However, the rapid development of new machine learning techniques poses new challenges. To address this class of problems, we created the FlexPoints algorithm that searches for characteristic points on the ECG signal and ignores all other points that do not carry relevant medical information. The conducted experiments proved that the presented algorithm can significantly reduce the number of data points which represents ECG signal without losing valuable medical information. These sparse but essential characteristic points (flex points) can be a perfect input for some modern machine learning models, which works much better using flex points as an input instead of raw data or data compressed by many popular algorithms.Keywords: characteristic points, electrocardiogram, ECG, machine learning, signal compression
Procedia PDF Downloads 1602141 Specified Human Motion Recognition and Unknown Hand-Held Object Tracking
Authors: Jinsiang Shaw, Pik-Hoe Chen
Abstract:
This paper aims to integrate human recognition, motion recognition, and object tracking technologies without requiring a pre-training database model for motion recognition or the unknown object itself. Furthermore, it can simultaneously track multiple users and multiple objects. Unlike other existing human motion recognition methods, our approach employs a rule-based condition method to determine if a user hand is approaching or departing an object. It uses a background subtraction method to separate the human and object from the background, and employs behavior features to effectively interpret human object-grabbing actions. With an object’s histogram characteristics, we are able to isolate and track it using back projection. Hence, a moving object trajectory can be recorded and the object itself can be located. This particular technique can be used in a camera surveillance system in a shopping area to perform real-time intelligent surveillance, thus preventing theft. Experimental results verify the validity of the developed surveillance algorithm with an accuracy of 83% for shoplifting detection.Keywords: Automatic Tracking, Back Projection, Motion Recognition, Shoplifting
Procedia PDF Downloads 3312140 Walkability and Urban Social Identity
Authors: Reihaneh Rafiemanzelat
Abstract:
One of the most recent fields of investigation in urban issues focuses on the walkability in urban spaces. The paper aims to establish the theoretical relationship between the people's link with definite urban public spaces and the social identity processes derived from the relation with these places. The theoretical aspects which are examined for this purpose are: the concept of walkability and its developments and the social identity theories derived from walkable spaces. In fact, the paper presents the main results obtained from an empirical investigation which concern to the genesis of urban social identity in particular street as one of the main elements of public spaces in cities. İsmet İnönü Blvd which known as Salamis Street in Famagusta, North Cyprus is one of the main street in city whit high level of physical and social activities all the time. The urban social identity of users was analyzed, focusing on three main factors: walkability of space, social identification, and image of the space. These three factors were analyzed in relation to a series of items in the initial questionnaire, evaluation of existing natural resources, and environmental attitudes.Keywords: walkability, urban public space, pedestrian, social activity, social identity
Procedia PDF Downloads 4332139 The Role of Coaching in Fostering Entrepreneurial Intention among Graduate Students in Tunisia
Authors: Abdellatif Amouri, Sami Boudabbous
Abstract:
The current study provides insights on the importance of entrepreneurial coaching as a source of developing entrepreneurial intentions among entrepreneurs and a determinant factor of business creation process and growth. Coaching, which implies exchange of adequate information and a mutual understanding between entrepreneurs and their partners, requires a better mutual knowledge of the representations and the perceptions of ideas which are widely present in their dealings and transactions. Therefore, to analyze entrepreneurs’ perceptions of business creation, we addressed a survey questionnaire to a group of Tunisian entrepreneurs and experts in business creation to indicate their level of approval concerning the prominence of coaching. The factor analysis indicates that more than 60% of the respondents believe that each statement reflects an aspect of coaching, with no bias to its position in the entrepreneurial process. Therefore, the image drawn from our respondents’ perceptions is that an entrepreneur is rather "constructed" and "shaped" by multiple apprenticeships both before and during the entrepreneurial act, through an accompaniment process and within interactions with trainers, consultants or professionals in starting a business. Similarly, the results indicate that the poor support structures and lack of accompaniment procedures stand as an obstacle impeding the development of entrepreneurial intention among business creators.Keywords: Entrepreneurial Behavior, Entrepreneurial Coaching, Entrepreneurial Intention, Perceptions, Venture Creation
Procedia PDF Downloads 4362138 High Frequency Nanomechanical Oscillators Based on Synthetic Nanowires
Authors: Minjin Kim, Jihwan Kim, Bongsoo Kim, Junho Suh
Abstract:
We demonstrate nanomechanical resonators constructed with synthetic nanowires (NWs) and study their electro-mechanical properties at millikelvin temperatures. Nanomechanical resonators are fabricated using single-crystalline Au NWs and InAs NWs. The mechanical resonance signals are acquired by either magnetomotive or capacitive detection methods. The Au NWs are synthesized by chemical vapor transport method at 1100 °C, and they exhibit clean surface and single-crystallinity with little defects. Due to pristine surface quality, these Au NW mechanical resonators could provide an ideal model system for studying surface-related effects on the mechanical systems. The InAs NWs are synthesized by molecular beam epitaxy or metal organic chemical vapor deposition method. The InAs NWs show electronic conductance modulation resembling Coulomb blockade, which also manifests in the mechanical resonance signals in the form of damping and resonance frequency shift. Our result provides an evidence of strong electro-mechanical coupling in synthetic NW nanomechanical resonators.Keywords: Au nanowire, InAs nanowire, nanomechanical resonator, synthetic nanowires
Procedia PDF Downloads 2082137 Robust Heart Sounds Segmentation Based on the Variation of the Phonocardiogram Curve Length
Authors: Mecheri Zeid Belmecheri, Maamar Ahfir, Izzet Kale
Abstract:
Automatic cardiac auscultation is still a subject of research in order to establish an objective diagnosis. Recorded heart sounds as Phonocardiogram signals (PCG) can be used for automatic segmentation into components that have clinical meanings. These are the first sound, S1, the second sound, S2, and the systolic and diastolic components, respectively. In this paper, an automatic method is proposed for the robust segmentation of heart sounds. This method is based on calculating an intermediate sawtooth-shaped signal from the length variation of the recorded Phonocardiogram (PCG) signal in the time domain and, using its positive derivative function that is a binary signal in training a Recurrent Neural Network (RNN). Results obtained in the context of a large database of recorded PCGs with their simultaneously recorded ElectroCardioGrams (ECGs) from different patients in clinical settings, including normal and abnormal subjects, show a segmentation testing performance average of 76 % sensitivity and 94 % specificity.Keywords: heart sounds, PCG segmentation, event detection, recurrent neural networks, PCG curve length
Procedia PDF Downloads 1772136 A Scoping Review of Technology-Facilitated Gender-Based Violence: Findings from Asia
Authors: Vaiddehi Bansal, Laura Hinson, Mayumi Rezwan, Erin Leasure, Mithila Iyer, Connor Roth, Poulomi Pal, Kareem Kysia
Abstract:
As digital usage becomes increasingly ubiquitous worldwide, technology-facilitated gender-based violence (GBV) has garnered increasing attention in the recent years, especially during the COVID-19 pandemic. This form of violence is defined as “action by one or more people that harms others based on their sexual or gender identity or by enforcing harmful gender norms. This action is carried out using the internet and/or mobile technology that harms others based on their sexual or gender identity or by enforcing harmful gender norms”.Common forms of technology-facilitated GBV include cyberstalking, cyberbullying, sexual harassment, image-based abuse, doxing, hacking, gendertrolling, hate speech, and impersonation. Most literature on this pervasive yet complex issue has emerged from high-income countries, and few studies comprehensively summarize its prevalence, manifestations, and implications. This rigorous scoping review examines the evidence base of this phenomenon in low and middle-income countries across Asia, summarizing trends and gaps to inform actionable recommendations. The research team developed search terms to conduct a comprehensive search of peer-reviewed and grey literature. Query results were eligible for inclusion if they were published in English between 2006-2021 and with an explicit emphasis on technology-facilitated violence, gender, and the countries of interest in the Asia region. Title, abstracts, and full-texts were independently screened by two reviewers based on inclusion criteria, and data was extracted through deductive coding. Of 2,042 articles screened, 97 met inclusion criteria. The review revealed a gap in the evidence-base in Central Asia and the Pacific Islands. Findings across South and Southeast Asia indicate that technology-facilitated GBV comprises various forms of abuse, violence, and harassment that are largely shaped by country-specific societal norms and technological landscapes. The literature confirms that women, girls, and sexual minorities, especially those with intersecting marginalized identities, are often more vulnerable to experiencing online violence. Cultural norms and patriarchal structures tend to stigmatize survivors, limiting their ability to seek social and legal support. Survivors are also less likely to report their experience due to barriers such as lack of awareness of reporting mechanisms, the perception that digital platforms will not address their complaints, and cumbersome reporting systems. The COVID-19 pandemic has further exacerbated perpetration and strained support mechanisms. Prevalence varies by the form of violence but is difficult to estimate accurately due to underreporting and disjointed, outdated, or non-existent legal definitions. Addressing technology-facilitated GBV in Asia requires collective action from multiple actors, including government authorities, technology companies, digital and feminist movements, NGOs, and researchers.Keywords: gender-based violence, technology, online sexual harassment, image-based abuse
Procedia PDF Downloads 130