Search results for: violence detection
3866 Self Determination Theory and Trauma Informed Approach in Women's Shelters: A Common Ground
Authors: Gamze Dogan Birer
Abstract:
Women’s shelters provide service to women who had been subjected to physical, psychological, economical, and sexual violence. It is proposed that adopting a trauma-informed approach in these shelters would contribute to the ‘woman-defined’ success of the service. This includes reshaping the physical qualities of the shelter, contacts, and interventions that women face during their stay in a way that accepts and addresses their traumatic experiences. It is stated in this paper that the trauma-informed approach has commonalities with the basic psychological needs that are proposed by self-determination theory. Therefore, it is proposed that self-determination theory can be used as a theoretical background for trauma-informed approachKeywords: self determination theory, trauma informed approach, violence against women, women's shelters
Procedia PDF Downloads 1613865 A Dynamic Ensemble Learning Approach for Online Anomaly Detection in Alibaba Datacenters
Authors: Wanyi Zhu, Xia Ming, Huafeng Wang, Junda Chen, Lu Liu, Jiangwei Jiang, Guohua Liu
Abstract:
Anomaly detection is a first and imperative step needed to respond to unexpected problems and to assure high performance and security in large data center management. This paper presents an online anomaly detection system through an innovative approach of ensemble machine learning and adaptive differentiation algorithms, and applies them to performance data collected from a continuous monitoring system for multi-tier web applications running in Alibaba data centers. We evaluate the effectiveness and efficiency of this algorithm with production traffic data and compare with the traditional anomaly detection approaches such as a static threshold and other deviation-based detection techniques. The experiment results show that our algorithm correctly identifies the unexpected performance variances of any running application, with an acceptable false positive rate. This proposed approach has already been deployed in real-time production environments to enhance the efficiency and stability in daily data center operations.Keywords: Alibaba data centers, anomaly detection, big data computation, dynamic ensemble learning
Procedia PDF Downloads 2033864 Jordanian Men’s and Women’s Attitudes toward Intimate Partner Violence and Its Correlates with Family Functioning and Demographics
Authors: Fatmeh Alzoubi, Reem Ali
Abstract:
Jordan is a developing country in the Middle East and, much like other countries in the world, has high rates of intimate partner violence (IPV). Little information is available on Jordanian men’s and women’s attitudes toward IPV. The purpose of this study is to examine men’s and women’s attitudes toward IPV in Jordan and its relationship with some demographics and family functioning. A descriptive cross-sectional correlational design with a sample of 401 men and women was used. Descriptive statistics (M, SD), Pearson r, t test, and ANOVA were used. The results indicated that Jordanian men and women have a lower score of IPVAS, 40.06 (SD = 8.20), indicating lower acceptance of IPV compared with the literature. Family functioning was 3.12 (SD = 0.46), indicating more healthy families. Family functioning was negatively correlated with IPVAS scores (r = –.22, p = .00). All demographic variables showed small to moderate correlations with IPVAS. Education for both study participants and their spouses had a negative correlation with IPVAS (r = –.27, p = .00) and (r = –.20, p = .00), respectively. Male participants, individuals who were living with extended family, and those living in rural areas had significantly high IPVAS scores, indicating more accepting attitudes toward IPV. Practitioners should provide families with education on the methods of conflict resolution, effective communication within the family, problem-solving approaches, equal role distribution, and appropriate styles of establishing a family.Keywords: intimate partner violence, Jordanian men and women’s health, attitudes, family functioning
Procedia PDF Downloads 1213863 Medical Image Watermark and Tamper Detection Using Constant Correlation Spread Spectrum Watermarking
Authors: Peter U. Eze, P. Udaya, Robin J. Evans
Abstract:
Data hiding can be achieved by Steganography or invisible digital watermarking. For digital watermarking, both accurate retrieval of the embedded watermark and the integrity of the cover image are important. Medical image security in Teleradiology is one of the applications where the embedded patient record needs to be extracted with accuracy as well as the medical image integrity verified. In this research paper, the Constant Correlation Spread Spectrum digital watermarking for medical image tamper detection and accurate embedded watermark retrieval is introduced. In the proposed method, a watermark bit from a patient record is spread in a medical image sub-block such that the correlation of all watermarked sub-blocks with a spreading code, W, would have a constant value, p. The constant correlation p, spreading code, W and the size of the sub-blocks constitute the secret key. Tamper detection is achieved by flagging any sub-block whose correlation value deviates by more than a small value, ℇ, from p. The major features of our new scheme include: (1) Improving watermark detection accuracy for high-pixel depth medical images by reducing the Bit Error Rate (BER) to Zero and (2) block-level tamper detection in a single computational process with simultaneous watermark detection, thereby increasing utility with the same computational cost.Keywords: Constant Correlation, Medical Image, Spread Spectrum, Tamper Detection, Watermarking
Procedia PDF Downloads 1973862 Applications of Forensics/DNA Tools in Combating Gender-Based Violence: A Case Study in Nigeria
Authors: Edeaghe Ehikhamenor, Jennifer Nnamdi
Abstract:
Introduction: Gender-based violence (GBV) was a well-known global crisis before the COVID-19 pandemic. The pandemic burden only intensified the crisis. With prevailing lockdowns, increased poverty due to high unemployment, especially affecting females, and other mobility restrictions that have left many women trapped with their abusers, plus isolation from social contact and support networks, GBV cases spiraled out of control. Prevalence of economic with cultural disparity, which is greatly manifested in Nigeria, is a major contributory factor to GBV. This is made worst by religious adherents where the females are virtually relegated to the background. Our societal approaches to investigations and sanctions to culprits have not sufficiently applied forensic/DNA tools in combating these major vices. Violence against women or some rare cases against men can prevent them from carrying out their duties regardless of the position they hold. Objective: The main objective of this research is to highlight the origin of GBV, the victims, types, contributing factors, and the applications of forensics/DNA tools and remedies so as to minimize GBV in our society. Methods: Descriptive information was obtained through the search on our daily newspapers, electronic media, google scholar websites, other authors' observations and personal experiences, plus anecdotal reports. Results: Findings from our exploratory searches revealed a high incidence of GBV with very limited or no applications of Forensics/DNA tools as an intervening mechanism to reduce GBV in Nigeria. Conclusion: Nigeria needs to develop clear-cut policies on forensics/DNA tools in terms of institutional framework to develop a curriculum for the training of all stakeholders to fast-track justice for victims of GBV so as to serve as a deterrent to other culprits.Keywords: gender-based violence, forensics, DNA, justice
Procedia PDF Downloads 853861 Cyberstalking as an Online Sexual Harassment: Evidence from Experience from Female University Students in Tanzanian Institutions of Higher Learning
Authors: Angela Mathias Kavishe
Abstract:
Sexual harassment directed at women is reported in many societies, including in Tanzania. The advent of ICT technology, especially in universities, seems to aggravate the situation by extending harassment to cyberspace in various forms, including cyberstalking. Evidence shows that online violence is more dangerous than physical one due to the ability to access multiple private information, attack many victims, mask the perpetrator's identity, suspend the threat for a long time and spread over time and space. The study aimed to measure the magnitude of cyber harassment in Tanzanian higher learning institutions and to assess institutional sensitivity to ICT-mediated gender-based violence. It was carried out in 4 higher learning institutions in Tanzania: Mwalimu Nyerere Memorial Academy and Institute of Finance Management in Dar es Salaam and SAUT, and the University of Dodoma, where a survey questionnaire was distributed to 400 students and 40 key informants were interviewed. It was found that in each institution, the majority of female students experienced online harassment on social media perpetrated by ex-partners, male students, and university male teaching staff. The perpetrators compelled the female students to post nude pictures, have sexual relations with them, or utilize the posted private photographs to force female students to practice online or offline sexual relations. These threats seem to emanate from social-cultural beliefs about the subordinate position of women in society and that women's bodies are perceived as sex objects. It is therefore concluded that cyberspace provides an alternative space for perpetrators to exercise violence towards women.Keywords: cyberstalking, embodiment, gender-based violence, internet
Procedia PDF Downloads 523860 A Microfluidic Biosensor for Detection of EGFR 19 Deletion Mutation Targeting Non-Small Cell Lung Cancer on Rolling Circle Amplification
Authors: Ji Su Kim, Bo Ram Choi, Ju Yeon Cho, Hyukjin Lee
Abstract:
Epidermal growth factor receptor (EGFR) 19 deletion mutation gene is over-expressed in carcinoma patient. EGFR 19 deletion mutation is known as typical biomarker of non-small cell lung cancer (NSCLC), which one section in the coding exon 19 of EGFR is deleted. Therefore, there have been many attempts over the years to detect EGFR 19 deletion mutation for replacing conventional diagnostic method such as PCR and tissue biopsy. We developed a simple and facile detection platform based on Rolling Circle Amplification (RCA), which provides highly amplified products in isothermal amplification of the ligated DNA template. Limit of detection (~50 nM) and a faster detection time (~30 min) could be achieved by introducing RCA.Keywords: EGFR19, cancer, diagnosis, rolling circle amplification (RCA), hydrogel
Procedia PDF Downloads 2553859 Feedforward Neural Network with Backpropagation for Epilepsy Seizure Detection
Authors: Natalia Espinosa, Arthur Amorim, Rudolf Huebner
Abstract:
Epilepsy is a chronic neural disease and around 50 million people in the world suffer from this disease, however, in many cases, the individual acquires resistance to the medication, which is known as drug-resistant epilepsy, where a detection system is necessary. This paper showed the development of an automatic system for seizure detection based on artificial neural networks (ANN), which are common techniques of machine learning. Discrete Wavelet Transform (DWT) is used for decomposing electroencephalogram (EEG) signal into main brain waves, with these frequency bands is extracted features for training a feedforward neural network with backpropagation, finally made a pattern classification, seizure or non-seizure. Obtaining 95% accuracy in epileptic EEG and 100% in normal EEG.Keywords: Artificial Neural Network (ANN), Discrete Wavelet Transform (DWT), Epilepsy Detection , Seizure.
Procedia PDF Downloads 2263858 Adolescents' Perspectives on Parental Responses to Teen Dating Violence
Authors: Beverly Black
Abstract:
Teen dating violence (TDV) is a significant public health problem with severe negative impact on youths’ mental and physical health and well-being. Exacerbating the negative impact of TDV victimization is the fact that teens rarely report the violence. They are fearful to tell friends or family, especially parents. The family context is the first place where children learn about interpersonal relationships, and therefore, parental response of teens’ life experiences influences teens’ actions and development. This study examined youths’ perspectives on parental responses to TDV. Effective parental responses to TDV may increase the likelihood that youth will leave abusive relationships. Method. Eleven gender-separate focus groups were conducted with 27 females and 28 males, ages 12 to 17, to discuss parental responses to teen dating violence. Youth were recruited from a metropolitan community in the southwestern part of the United States. Focus groups questions asked the middle and high school youth how they would want their parents to respond to them if they approached them about various incidents of dating violence. All focus groups were transcribed. Using QSR-N10, two researchers’ analyzed data first using open and axial coding techniques to find overarching themes. Researchers triangulated the coded data to ensure accurate interpretations of the participants’ messages and used the scenario questions to structure the coded results. Results. Most youths suggested that parents should simply talk with them; they recognized the importance of communication. Teens wanted parents to ask questions, educate them about healthy relationships, share their personal experiences, and give teens advice (tell them to break up, limit contact with perpetrator, go to police). Younger youth expressed more willingness to listen to parental advice. Older youth wanted their parents to give them the opportunity to make their decisions. Many of the teens’ comments focused on the importance of parents protecting the teen, providing support and empathy for the teen, and especially refraining from overreacting (not yelling, not getting angry and staying calm). Implications. Parents need to know how to effectively respond to youth needing to leave unhealthy relationships. Demanding that their children end a relationship may not be a realistic approach to TDV. A parent’s ineffective response, when approached by an adolescent for assistance in TDV, may influence a youth to dismiss parents and other adults as viable options for seeking assistance. Parents and prevention educators can learn from hearing youths’ voices about effective responses to TDV.Keywords: adolescents dating abuse, adolescent and parent communication, parental responses to teen dating violence, teen dating violence
Procedia PDF Downloads 2733857 Biologically Inspired Small Infrared Target Detection Using Local Contrast Mechanisms
Authors: Tian Xia, Yuan Yan Tang
Abstract:
In order to obtain higher small target detection accuracy, this paper presents an effective algorithm inspired by the local contrast mechanism. The proposed method can enhance target signal and suppress background clutter simultaneously. In the first stage, a enhanced image is obtained using the proposed Weighted Laplacian of Gaussian. In the second stage, an adaptive threshold is adopted to segment the target. Experimental results on two changeling image sequences show that the proposed method can detect the bright and dark targets simultaneously, and is not sensitive to sea-sky line of the infrared image. So it is fit for IR small infrared target detection.Keywords: small target detection, local contrast, human vision system, Laplacian of Gaussian
Procedia PDF Downloads 4693856 Cognitive Methods for Detecting Deception During the Criminal Investigation Process
Authors: Laid Fekih
Abstract:
Background: It is difficult to detect lying, deception, and misrepresentation just by looking at verbal or non-verbal expression during the criminal investigation process, as there is a common belief that it is possible to tell whether a person is lying or telling the truth just by looking at the way they act or behave. The process of detecting lies and deception during the criminal investigation process needs more studies and research to overcome the difficulties facing the investigators. Method: The present study aimed to identify the effectiveness of cognitive methods and techniques in detecting deception during the criminal investigation. It adopted the quasi-experimental method and covered a sample of (20) defendants distributed randomly into two homogeneous groups, an experimental group of (10) defendants be subject to criminal investigation by applying cognitive techniques to detect deception and a second experimental group of (10) defendants be subject to the direct investigation method. The tool that used is a guided interview based on models of investigative questions according to the cognitive deception detection approach, which consists of three techniques of Vrij: imposing the cognitive burden, encouragement to provide more information, and ask unexpected questions, and the Direct Investigation Method. Results: Results revealed a significant difference between the two groups in term of lie detection accuracy in favour of defendants be subject to criminal investigation by applying cognitive techniques, the cognitive deception detection approach produced superior total accuracy rates both with human observers and through an analysis of objective criteria. The cognitive deception detection approach produced superior accuracy results in truth detection: 71%, deception detection: 70% compared to a direct investigation method truth detection: 52%; deception detection: 49%. Conclusion: The study recommended if practitioners use a cognitive deception detection technique, they will correctly classify more individuals than when they use a direct investigation method.Keywords: the cognitive lie detection approach, deception, criminal investigation, mental health
Procedia PDF Downloads 673855 Advancing in Cricket Analytics: Novel Approaches for Pitch and Ball Detection Employing OpenCV and YOLOV8
Authors: Pratham Madnur, Prathamkumar Shetty, Sneha Varur, Gouri Parashetti
Abstract:
In order to overcome conventional obstacles, this research paper investigates novel approaches for cricket pitch and ball detection that make use of cutting-edge technologies. The research integrates OpenCV for pitch inspection and modifies the YOLOv8 model for cricket ball detection in order to overcome the shortcomings of manual pitch assessment and traditional ball detection techniques. To ensure flexibility in a range of pitch environments, the pitch detection method leverages OpenCV’s color space transformation, contour extraction, and accurate color range defining features. Regarding ball detection, the YOLOv8 model emphasizes the preservation of minor object details to improve accuracy and is specifically trained to the unique properties of cricket balls. The methods are more reliable because of the careful preparation of the datasets, which include novel ball and pitch information. These cutting-edge methods not only improve cricket analytics but also set the stage for flexible methods in more general sports technology applications.Keywords: OpenCV, YOLOv8, cricket, custom dataset, computer vision, sports
Procedia PDF Downloads 843854 The Impact of COVID-19 on Women’s Health in Bangladesh
Authors: Dil Ware Alam, Faiza Zebeen, Sumaya Binte Masud
Abstract:
COVID-19) has impacted the whole world, including Bangladesh. The epidemic has reduced access to health care, particularly for women, creating challenges for an increasingly disadvantaged population. Women's health and well-being in Bangladesh are susceptible to a rise in domestic violence and need to be addressed quickly. The planet has been greatly influenced by Coronavirus disease 2019 (COVID-19), and Bangladesh is no difference. The pandemic has resulted in a decline in the availability of health care, notably for women's health problems, leading to an increase in difficulties for an increasingly marginalized group. Maternity care, maternal health programs, medical interventions, nutritional counseling and mental health care, are not discussed, and women's health and well-being in Bangladesh is vulnerable with a spike in domestic violence and needs to be resolved urgently.Keywords: Covid-19, mental health, reproductive health, Bangladesh
Procedia PDF Downloads 1703853 Development of Cost-effective Sensitive Methods for Pathogen Detection in Community Wastewater for Disease Surveillance
Authors: Jesmin Akter, Chang Hyuk Ahn, Ilho Kim, Jaiyeop Lee
Abstract:
Global pandemic coronavirus disease (COVID-19) caused by Severe acute respiratory syndrome SARS-CoV-2, to control the spread of the COVID-19 pandemic, wastewater surveillance has been used to monitor SARS-CoV2 prevalence in the community. The challenging part is establishing wastewater surveillance; there is a need for a well-equipped laboratory for wastewater sample analysis. According to many previous studies, reverse transcription-polymerase chain reaction (RT-PCR) based molecular tests are the most widely used and popular detection method worldwide. However, the RT-qPCR based approaches for the detection or quantification of SARS-CoV-2 genetic fragments ribonucleic acid (RNA) from wastewater require a specialized laboratory, skilled personnel, expensive instruments, and a workflow that typically requires 6 to 8 hours to provide results for just minimum samples. Rapid and reliable alternative detection methods are needed to enable less-well-qualified practitioners to set up and provide sensitive detection of SARS-CoV-2 within wastewater at less-specialized regional laboratories. Therefore, scientists and researchers are conducting experiments for rapid detection methods of COVID-19; in some cases, the structural and molecular characteristics of SARS-CoV-2 are unknown, and various strategies for the correct diagnosis of COVID-19 have been proposed by research laboratories, which are presented in the present study. The ongoing research and development of these highly sensitive and rapid technologies, namely RT-LAMP, ELISA, Biosensors, GeneXpert, allows a wide range of potential options not only for SARS-CoV-2 detection but also for other viruses as well. The effort of this study is to discuss the above effective and regional rapid detection and quantification methods in community wastewater as an essential step in advancing scientific goals.Keywords: rapid detection, SARS-CoV-2, sensitive detection, wastewater surveillance
Procedia PDF Downloads 863852 Design and Fabrication of Optical Nanobiosensors for Detection of MicroRNAs Involved in Neurodegenerative Diseases
Authors: Mahdi Rahaie
Abstract:
MicroRNAs are a novel class of small RNAs which regulate gene expression by translational repression or degradation of messenger RNAs. To produce sensitive, simple and cost-effective assays for microRNAs, detection is in urgent demand due to important role of these biomolecules in progression of human disease such as Alzheimer’s, Multiple sclerosis, and some other neurodegenerative diseases. Herein, we report several novel, sensitive and specific microRNA nanobiosensors which were designed based on colorimetric and fluorescence detection of nanoparticles and hybridization chain reaction amplification as an enzyme-free amplification. These new strategies eliminate the need for enzymatic reactions, chemical changes, separation processes and sophisticated equipment whereas less limit of detection with most specify are acceptable. The important features of these methods are high sensitivity and specificity to differentiate between perfectly matched, mismatched and non-complementary target microRNAs and also decent response in the real sample analysis with blood plasma. These nanobiosensors can clinically be used not only for the early detection of neuro diseases but also for every sickness related to miRNAs by direct detection of the plasma microRNAs in real clinical samples, without a need for sample preparation, RNA extraction and/or amplification.Keywords: hybridization chain reaction, microRNA, nanobiosensor, neurodegenerative diseases
Procedia PDF Downloads 1533851 The Necessity and Methods of Abolishing Discrimination and Religious Violence
Authors: Hossein Boroujerdi, Mohammad R. Sadeghi, Maryam Moazen Zadeh
Abstract:
During the recent decades, the result of religious prophets has lost its attraction, and theology has become disfigured, so it has been made ugly. Undoubtedly, some of existing non-peaceful and harsh rules and measures within the religious books and contexts have been considered as the reasons and excuses for defamation of religions. Based on library sources and also extensive research in Quran and Islamic narratives, this study has aimed to find some alternative solutions and options to abolish and disregard those religious rules which are in contrary of human right charters and standards. The results have demonstrated that some of inhuman religious punishments such as execution, stoning, whipping as well as religious discriminations and warlike behaviors are in contrary of some other religious contexts and concepts. This finding have proved inadaptability between some religious contexts and religious records.Keywords: adjustment and abolishment, discrimination, religious commands and laws, tolerance, violence
Procedia PDF Downloads 2153850 Detection of Keypoint in Press-Fit Curve Based on Convolutional Neural Network
Authors: Shoujia Fang, Guoqing Ding, Xin Chen
Abstract:
The quality of press-fit assembly is closely related to reliability and safety of product. The paper proposed a keypoint detection method based on convolutional neural network to improve the accuracy of keypoint detection in press-fit curve. It would provide an auxiliary basis for judging quality of press-fit assembly. The press-fit curve is a curve of press-fit force and displacement. Both force data and distance data are time-series data. Therefore, one-dimensional convolutional neural network is used to process the press-fit curve. After the obtained press-fit data is filtered, the multi-layer one-dimensional convolutional neural network is used to perform the automatic learning of press-fit curve features, and then sent to the multi-layer perceptron to finally output keypoint of the curve. We used the data of press-fit assembly equipment in the actual production process to train CNN model, and we used different data from the same equipment to evaluate the performance of detection. Compared with the existing research result, the performance of detection was significantly improved. This method can provide a reliable basis for the judgment of press-fit quality.Keywords: keypoint detection, curve feature, convolutional neural network, press-fit assembly
Procedia PDF Downloads 2313849 A Character Detection Method for Ancient Yi Books Based on Connected Components and Regressive Character Segmentation
Authors: Xu Han, Shanxiong Chen, Shiyu Zhu, Xiaoyu Lin, Fujia Zhao, Dingwang Wang
Abstract:
Character detection is an important issue for character recognition of ancient Yi books. The accuracy of detection directly affects the recognition effect of ancient Yi books. Considering the complex layout, the lack of standard typesetting and the mixed arrangement between images and texts, we propose a character detection method for ancient Yi books based on connected components and regressive character segmentation. First, the scanned images of ancient Yi books are preprocessed with nonlocal mean filtering, and then a modified local adaptive threshold binarization algorithm is used to obtain the binary images to segment the foreground and background for the images. Second, the non-text areas are removed by the method based on connected components. Finally, the single character in the ancient Yi books is segmented by our method. The experimental results show that the method can effectively separate the text areas and non-text areas for ancient Yi books and achieve higher accuracy and recall rate in the experiment of character detection, and effectively solve the problem of character detection and segmentation in character recognition of ancient books.Keywords: CCS concepts, computing methodologies, interest point, salient region detections, image segmentation
Procedia PDF Downloads 1323848 Motion-Based Detection and Tracking of Multiple Pedestrians
Authors: A. Harras, A. Tsuji, K. Terada
Abstract:
Tracking of moving people has gained a matter of great importance due to rapid technological advancements in the field of computer vision. The objective of this study is to design a motion based detection and tracking multiple walking pedestrians randomly in different directions. In our proposed method, Gaussian mixture model (GMM) is used to determine moving persons in image sequences. It reacts to changes that take place in the scene like different illumination; moving objects start and stop often, etc. Background noise in the scene is eliminated through applying morphological operations and the motions of tracked people which is determined by using the Kalman filter. The Kalman filter is applied to predict the tracked location in each frame and to determine the likelihood of each detection. We used a benchmark data set for the evaluation based on a side wall stationary camera. The actual scenes from the data set are taken on a street including up to eight people in front of the camera in different two scenes, the duration is 53 and 35 seconds, respectively. In the case of walking pedestrians in close proximity, the proposed method has achieved the detection ratio of 87%, and the tracking ratio is 77 % successfully. When they are deferred from each other, the detection ratio is increased to 90% and the tracking ratio is also increased to 79%.Keywords: automatic detection, tracking, pedestrians, counting
Procedia PDF Downloads 2583847 Plastic Pipe Defect Detection Using Nonlinear Acoustic Modulation
Authors: Gigih Priyandoko, Mohd Fairusham Ghazali, Tan Siew Fun
Abstract:
This paper discusses about the defect detection of plastic pipe by using nonlinear acoustic wave modulation method. It is a sensitive method for damage detection and it is based on the propagation of high frequency acoustic waves in plastic pipe with low frequency excitation. The plastic pipe is excited simultaneously with a slow amplitude modulated vibration pumping wave and a constant amplitude probing wave. The frequency of both the excitation signals coincides with the resonances of the plastic pipe. A PVP pipe is used as the specimen as it is commonly used for the conveyance of liquid in many fields. The results obtained are being observed and the difference between uncracked specimen and cracked specimen can be distinguished clearly.Keywords: plastic pipe, defect detection, nonlinear acoustic modulation, excitation
Procedia PDF Downloads 4513846 Aspects and Studies of Fractal Geometry in Automatic Breast Cancer Detection
Authors: Mrinal Kanti Bhowmik, Kakali Das Jr., Barin Kumar De, Debotosh Bhattacharjee
Abstract:
Breast cancer is the most common cancer and a leading cause of death for women in the 35 to 55 age group. Early detection of breast cancer can decrease the mortality rate of breast cancer. Mammography is considered as a ‘Gold Standard’ for breast cancer detection and a very popular modality, presently used for breast cancer screening and detection. The screening of digital mammograms often leads to over diagnosis and a consequence to unnecessary traumatic & painful biopsies. For that reason recent studies involving the use of thermal imaging as a screening technique have generated a growing interest especially in cases where the mammography is limited, as in young patients who have dense breast tissue. Tumor is a significant sign of breast cancer in both mammography and thermography. The tumors are complex in structure and they also exhibit a different statistical and textural features compared to the breast background tissue. Fractal geometry is a geometry which is used to describe this type of complex structure as per their main characteristic, where traditional Euclidean geometry fails. Over the last few years, fractal geometrics have been applied mostly in many medical image (1D, 2D, or 3D) analysis applications. In breast cancer detection using digital mammogram images, also it plays a significant role. Fractal is also used in thermography for early detection of the masses using the thermal texture. This paper presents an overview of the recent aspects and initiatives of fractals in breast cancer detection in both mammography and thermography. The scope of fractal geometry in automatic breast cancer detection using digital mammogram and thermogram images are analysed, which forms a foundation for further study on application of fractal geometry in medical imaging for improving the efficiency of automatic detection.Keywords: fractal, tumor, thermography, mammography
Procedia PDF Downloads 3893845 The Discoursive Construction of Jews and Christians in the Qur’ān: A Case Study on Al-Baqara
Authors: Maryam Ayad
Abstract:
The Qur’ān, the main source of Muslims’ religious beliefs, shows a complex view mixed with mercy and violence towards Jews and Christians. The aim of this paper is to investigate the dominant cognitive infrastructure behind the Quranic discourses of violence and mercy towards Jews and Christians. The paper focuses on 54 verses with definite references to Jews and/or Christians in Surat al-Baqara. Adopting Teon Van Dijk’s method of critical discourse analysis (CDA), these verses are examined based on 13 linguistic microstructures. The preliminary results show that there are diverse discourses on Jews and Christians competing to gain the dominant power in the Surah. Furthermore, the violent discourse becomes more dominant and prominent as we move from the realm of explicit meanings of the text to that of figurative, implicit, and metaphorical meanings.Keywords: The Qur’ān, Jews and Christians, CDA, the others, inter-religious relations, Al-Baqara
Procedia PDF Downloads 293844 Systematic Review of Sexual Assault Prevention Methods for Older Adults: Exploring the Hidden Needs of a Growing Population
Authors: Michelle Hand, Brieanne Beaujolais
Abstract:
Rape stereotypes have long involved the assault of young females by strangers desiring sex. As such, older adult women and men have largely been excluded from research, policies, and awareness raising initiatives to address sexual violence. Moreover sexual assault accounts for the most underreported type of abuse experienced by older adults, highlighting a need to expand our knowledge base in this area. Thus a systematic review of peer-reviewed scholarly articles and reports was conducted to explore the ways sexual assault has been prevented among older adults in recent years and to identify implications for researchers and practitioners as they aim to meet the needs of this population. Articles and reports published during or after 2007 were eligible if their focus included methods to address sex abuse among older adults as well as practice or research implications. Forty-four articles met this criteria and were included in this systematic review. The findings from this review will provide an in-depth understanding of the under-researched issue of sexual violence among older adult women and men as well as current prevention strategies. In addition, implications and recommendations will be provided for practitioners, educators and researchers as they aim to meet the hidden needs of this growing yet under-researched population.Keywords: elder, rape, sexual assault, sexual violence
Procedia PDF Downloads 3223843 Short-Path Near-Infrared Laser Detection of Environmental Gases by Wavelength-Modulation Spectroscopy
Authors: Isao Tomita
Abstract:
The detection of environmental gases, 12CO_2, 13CO_2, and CH_4, using near-infrared semiconductor lasers with a short laser path length is studied by means of wavelength-modulation spectroscopy. The developed system is compact and has high sensitivity enough to detect the absorption peaks of isotopic 13CO_2 of a 3-% CO_2 gas at 2 um with a path length of 2.4 m, where its peak size is two orders of magnitude smaller than that of the ordinary 12CO_2 peaks. In addition, the detection of 12CO_2 peaks of a 385-ppm (0.0385-%) CO_2 gas in the air is made at 2 um with a path length of 1.4 m. Furthermore, in pursuing the detection of an ancient environmental CH_4 gas confined to a bubble in ice at the polar regions, measurements of the absorption spectrum for a trace gas of CH_4 in a small area are attempted. For a 100-% CH_4 gas trapped in a 1 mm^3 glass container, the absorption peaks of CH_4 are obtained at 1.65 um with a path length of 3 mm, and also the gas pressure is extrapolated from the measured data.Keywords: environmental gases, Near-Infrared Laser Detection, Wavelength-Modulation Spectroscopy, gas pressure
Procedia PDF Downloads 4233842 Investigating the Viability of Ultra-Low Parameter Count Networks for Real-Time Football Detection
Authors: Tim Farrelly
Abstract:
In recent years, AI-powered object detection systems have opened the doors for innovative new applications and products, especially those operating in the real world or ‘on edge’ – namely, in sport. This paper investigates the viability of an ultra-low parameter convolutional neural network specially designed for the detection of footballs on ‘on the edge’ devices. The main contribution of this paper is the exploration of integrating new design features (depth-wise separable convolutional blocks and squeezed and excitation modules) into an ultra-low parameter network and demonstrating subsequent improvements in performance. The results show that tracking the ball from Full HD images with negligibly high accu-racy is possible in real-time.Keywords: deep learning, object detection, machine vision applications, sport, network design
Procedia PDF Downloads 1493841 State Coercion and Social Movements: Legacy of Authoritarian Regime
Authors: Hyun-Ji Choi
Abstract:
This paper aims to examine the meaning of ‘state’ as a monopoly of violence, in regard with South Korean democratic transition. Since institutional democratization in 1987, it is conventionally known that governmental authority has exercised its power through law and police force, rather than inclusive or private violence. In other words, 1987 pro-democracy movement has been a critical juncture for a step towards democratic consolidation. However, state coercion may continually be exerted despite institutional specification by law in South Korean context. Explicit case would be amendment of ‘the Law on Assembly and Demonstration’ which determines citizens’ right to take collective action mostly against government actions. This paper investigates amendment process of the law along with social reality since 1987 until 2015 to see how effectively institutionalization has progressed.Keywords: democratic transition, historical institutionalism, state coercion, the law on Assembly and Demonstration
Procedia PDF Downloads 1913840 Voices of Fear: A Case Study Of Tobephobia Experienced by Female Teachers
Authors: Prakash Singh
Abstract:
In this exploratory qualitative case study, the voices of female teachers are captured that describe their fear of failure in coping with their daily anxieties, stresses, and tensions in their classrooms. When teachers are usually appointed, the curriculum forms the heart of all their professional obligations. The policy of quality and equality of education for all learners is a must as part of these deliberations, otherwise it would spell the inevitable failure for teachers. Yet, how often have teachers been asked whether they are happy during their professional tenure. Research affirms that this question is not a priority, seeing that the happiness of learners and the educational administrators enjoy precedence. Teachers are often subject to undue pressures and tensions because of environmental factors that extends beyond the curriculum. School violence, bullying, drug abuse, and gangsters are not uncommon to the school milieu, no matter where such schools can be located. In this case study, the voices of female teachers find space concerning their experiences of tobephobia (TBP). The questions that inevitably arise are: Are the educational authorities aware of the effects of TBP in education? What can be done to arrest and eliminate the debilitating effects of TBP? This exploratory study contributes to the growing concerns of TBP in education. It is therefore imperative that the effects of TBP on human resources in education must be accentuated so that meaningful solutions can be found to address challenging educational issues such as school violence, bullying, and drug abuse amongst learners.Keywords: curriculum, female teachers, school violence, tobephobia
Procedia PDF Downloads 4053839 HRV Analysis Based Arrhythmic Beat Detection Using kNN Classifier
Authors: Onder Yakut, Oguzhan Timus, Emine Dogru Bolat
Abstract:
Health diseases have a vital significance affecting human being's life and life quality. Sudden death events can be prevented owing to early diagnosis and treatment methods. Electrical signals, taken from the human being's body using non-invasive methods and showing the heart activity is called Electrocardiogram (ECG). The ECG signal is used for following daily activity of the heart by clinicians. Heart Rate Variability (HRV) is a physiological parameter giving the variation between the heart beats. ECG data taken from MITBIH Arrhythmia Database is used in the model employed in this study. The detection of arrhythmic heart beats is aimed utilizing the features extracted from the HRV time domain parameters. The developed model provides a satisfactory performance with ~89% accuracy, 91.7 % sensitivity and 85% specificity rates for the detection of arrhythmic beats.Keywords: arrhythmic beat detection, ECG, HRV, kNN classifier
Procedia PDF Downloads 3523838 Design of an Improved Distributed Framework for Intrusion Detection System Based on Artificial Immune System and Neural Network
Authors: Yulin Rao, Zhixuan Li, Burra Venkata Durga Kumar
Abstract:
Intrusion detection refers to monitoring the actions of internal and external intruders on the system and detecting the behaviours that violate security policies in real-time. In intrusion detection, there has been much discussion about the application of neural network technology and artificial immune system (AIS). However, many solutions use static methods (signature-based and stateful protocol analysis) or centralized intrusion detection systems (CIDS), which are unsuitable for real-time intrusion detection systems that need to process large amounts of data and detect unknown intrusions. This article proposes a framework for a distributed intrusion detection system (DIDS) with multi-agents based on the concept of AIS and neural network technology to detect anomalies and intrusions. In this framework, multiple agents are assigned to each host and work together, improving the system's detection efficiency and robustness. The trainer agent in the central server of the framework uses the artificial neural network (ANN) rather than the negative selection algorithm of AIS to generate mature detectors. Mature detectors can distinguish between self-files and non-self-files after learning. Our analyzer agents use genetic algorithms to generate memory cell detectors. This kind of detector will effectively reduce false positive and false negative errors and act quickly on known intrusions.Keywords: artificial immune system, distributed artificial intelligence, multi-agent, intrusion detection system, neural network
Procedia PDF Downloads 1093837 Intrusion Detection System Based on Peer to Peer
Authors: Alireza Pour Ebrahimi, Vahid Abasi
Abstract:
Recently by the extension of internet usage, Research on the intrusion detection system takes a significant importance. Many of improvement systems prevent internal and external network attacks by providing security through firewalls and antivirus. In recently years, intrusion detection systems gradually turn from host-based systems and depend on O.S to the distributed systems which are running on multiple O.S. In this work, by considering the diversity of computer networks whit respect to structure, architecture, resource, services, users and also security goals requirement a fully distributed collaborative intrusion detection system based on peer to peer architecture is suggested. in this platform each partner device (matched device) considered as a peer-to-peer network. All transmitted information to network are visible only for device that use security scanning of a source. Experimental results show that the distributed architecture is significantly upgradeable in respect to centralized approach.Keywords: network, intrusion detection system, peer to peer, internal and external network
Procedia PDF Downloads 551