Search results for: motivation techniques
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 7695

Search results for: motivation techniques

3795 The Women's Orchestra and Music in Auschwitz-Birkenau: A Qualitative Study on Nazi Manipulation

Authors: K. T. Kohler

Abstract:

Typically in war, force involves physical violence, though those who perpetrated the Holocaust expanded manipulation techniques to include mental violence. This qualitative research study was conducted to understand the effects that the music of the Women’s Orchestra of Auschwitz-Birkenau had on women prisoners during World War II. Over 100 testimonies from the USC Shoah Foundation’s Visual History Archive reveal that the orchestra’s music had a profoundly distressing effect on many of the women in the camp. Led by Gustav Mahler’s granddaughter, Alma Rosé, the orchestra rhythmed the life cycle of the camp, from marching to and from work, Sunday concerts, welcoming transports, to the prisoners’ walk to gas chambers. What surfaced from these testimonies was that the more technical the exposure a woman had to music before camp, the more disturbing its effect. The juxtaposition of beauty with the visible horror of the camp thrust them into an impossible state where suicide became a plausible alternative. By exploiting the Women’s Orchestra, the Nazis made music a critical component of manipulation within Auschwitz-Birkenau.

Keywords: Alma Rosé, Auschwitz-Birkenau, camp life, concert, Holocaust, music, Oświęcim, Poland, women’s orchestra

Procedia PDF Downloads 164
3794 Seismic Microzonation of El-Fayoum New City, Egypt

Authors: Suzan Salem, Heba Moustafa, Abd El-Aziz Abd El-Aal

Abstract:

Seismic micro hazard zonation for urban areas is the first step towards a seismic risk analysis and mitigation strategy. Essential here is to obtain a proper understanding of the local subsurface conditions and to evaluate ground-shaking effects. In the present study, an attempt has been made to evaluate the seismic hazard considering local site effects by carrying out detailed geotechnical and geophysical site characterization in El-Fayoum New City. Seismic hazard analysis and microzonation of El-Fayoum New City are addressed in three parts: in the first part, estimation of seismic hazard is done using seismotectonic and geological information. The second part deals with site characterization using geotechnical and shallow geophysical techniques. In the last part, local site effects are assessed by carrying out one-dimensional (1-D) ground response analysis using the equivalent linear method by program SHAKE 2000. Finally, microzonation maps have been prepared. The detailed methodology, along with experimental details, collected data, results and maps are presented in this paper.

Keywords: El-Fayoum, microzonation, seismotectonic, Egypt

Procedia PDF Downloads 367
3793 Numerical Study of Base Drag Reduction Using Locked Vortex Flow Management Technique for Lower Subsonic Regime

Authors: Kailas S. Jagtap, Karthik Sundarraj, Nirmal Kumar, S. Rajnarasimha, Prakash S. Kulkarni

Abstract:

The issue of turbulence base streams and the drag related to it have been of important attention for rockets, missiles, and aircraft. Different techniques are used for base drag reduction. This paper presents the numerical study of numerous drag reduction technique. The base drag or afterbody drag of bluff bodies can be reduced easily using locked vortex drag reduction technique. For bluff bodies having a cylindrical shape, the base drag is much larger compared to streamlined bodies. For such bodies using splitter plates, the vortex can be trapped between the base and the plate, which results in smooth flow. Splitter plate with round and curved corner shapes has influence in drag reduction. In this paper, the comparison is done between single splitter plate as different positions and with the bluff body. Base drag for the speed of 30m/s can be reduced about 20% to 30% by using single splitter plate as compared to the bluff body.

Keywords: base drag, bluff body, splitter plate, vortex flow, ANSYS, fluent

Procedia PDF Downloads 164
3792 Inactivation of Listeria innocua ATCC 33092 by Gas-Phase Plasma Treatment

Authors: Z. Herceg, V. Stulic, T. Vukusic, A. Rezek Jambrak

Abstract:

High voltage electrical discharge plasmas are new nonthermal developing techniques used for water decontamination. To the full understanding of cell inactivation mechanisms, this study brings inactivation, recovery and cellular leakage of L. innocua cells before and after the treatment. Bacterial solution (200 mL) of L. innocua was treated in a glass reactor with a point-to-plate electrode configuration (high voltage electrode-titanium wire, was in the gas phase and grounded electrode was in the liquid phase). Argon was injected into the headspace of the reactor at the gas flow of 5 L/min. Frequency of 60, 90 and 120 Hz, time of 5 and 10 min, positive polarity and conductivity of media of 100 µS/cm were chosen to define listed parameters. With a longer treatment time inactivation was higher as well as the increase in cellular leakage. Despite total inactivation recovery of cells occurred probably because of a high leakage of proteins, compared to lower leakage of nucleic acids (DNA and RNA). In order to define mechanisms of inactivation further research is needed.

Keywords: Listeria innocua ATCC 33092, inactivation, gas phase plasma, cellular leakage, recovery of cells

Procedia PDF Downloads 163
3791 Electromagnetic Wave Propagation Equations in 2D by Finite Difference Method

Authors: N. Fusun Oyman Serteller

Abstract:

In this paper, the techniques to solve time dependent electromagnetic wave propagation equations based on the Finite Difference Method (FDM) are proposed by comparing the results with Finite Element Method (FEM) in 2D while discussing some special simulation examples.  Here, 2D dynamical wave equations for lossy media, even with a constant source, are discussed for establishing symbolic manipulation of wave propagation problems. The main objective of this contribution is to introduce a comparative study of two suitable numerical methods and to show that both methods can be applied effectively and efficiently to all types of wave propagation problems, both linear and nonlinear cases, by using symbolic computation. However, the results show that the FDM is more appropriate for solving the nonlinear cases in the symbolic solution. Furthermore, some specific complex domain examples of the comparison of electromagnetic waves equations are considered. Calculations are performed through Mathematica software by making some useful contribution to the programme and leveraging symbolic evaluations of FEM and FDM.

Keywords: finite difference method, finite element method, linear-nonlinear PDEs, symbolic computation, wave propagation equations

Procedia PDF Downloads 128
3790 A Proposal on the Educational Transactional Analysis as a Dialogical Vision of Culture: Conceptual Signposts and Practical Tools for Educators

Authors: Marina Sartor Hoffer

Abstract:

The multicultural composition of today's societies poses new challenges to educational contexts. Schools are therefore called first to develop dialogic aptitudes and communicative skills adapted to the complex reality of post-modern societies. It is indispensable for educators and for young people to learn theoretical and practical tools during their scholastic path, in order to allow the knowledge of themselves and of the others with the aim of recognizing the value of the others regardless of their culture. Dialogic Skills help to understand and manage individual differences by allowing the solution of problems and preventing conflicts. The Educational Sector of Eric Berne’s Transactional Analysis offers a range of methods and techniques for this purpose. Educational Transactional Analysis is firmly anchored in the Personalist Philosophy and deserves to be promoted as a theoretical frame suitable to face the challenges of contemporary education. The goal of this paper is therefore to outline some conceptual and methodological signposts for the education to dialogue by drawing concepts and methodologies from educational transactional analysis.

Keywords: dialogic process, education to dialogue, educational transactional analysis, personalism, the good of the relationship

Procedia PDF Downloads 251
3789 Anomaly Detection with ANN and SVM for Telemedicine Networks

Authors: Edward Guillén, Jeisson Sánchez, Carlos Omar Ramos

Abstract:

In recent years, a wide variety of applications are developed with Support Vector Machines -SVM- methods and Artificial Neural Networks -ANN-. In general, these methods depend on intrusion knowledge databases such as KDD99, ISCX, and CAIDA among others. New classes of detectors are generated by machine learning techniques, trained and tested over network databases. Thereafter, detectors are employed to detect anomalies in network communication scenarios according to user’s connections behavior. The first detector based on training dataset is deployed in different real-world networks with mobile and non-mobile devices to analyze the performance and accuracy over static detection. The vulnerabilities are based on previous work in telemedicine apps that were developed on the research group. This paper presents the differences on detections results between some network scenarios by applying traditional detectors deployed with artificial neural networks and support vector machines.

Keywords: anomaly detection, back-propagation neural networks, network intrusion detection systems, support vector machines

Procedia PDF Downloads 342
3788 Proposing an Index for Determining Key Knowledge Management Processes in Decision Making Units Using Fuzzy Quality Function Deployment (QFD), Data Envelopment Analysis (DEA) Method

Authors: Sadegh Abedi, Ali Yaghoubi, Hamidreza Mashatzadegan

Abstract:

This paper proposes an approach to identify key processes required by an organization in the field of knowledge management and aligning them with organizational objectives. For this purpose, first, organization’s most important non-financial objectives which are impacted by knowledge management processes are identified and then, using a quality house, are linked with knowledge management processes which are regarded as technical elements. Using this method, processes that are in need of improvement and more attention are prioritized based on their significance. This means that if a process has more influence on organization’s objectives and is in a dire situation comparing to others, is prioritized for choice and improvement. In this research process dominance is considered to be an influential element in process ranking (in addition to communication matrix). This is the reason for utilizing DEA techniques for prioritizing processes in quality house. Results of implementing the method in Khuzestan steel company represents this method’s capability of identifying key processes that require improvements in organization’s knowledge management system.

Keywords: knowledge management, organizational performance, fuzzy data, envelopment analysis

Procedia PDF Downloads 405
3787 An Efficient and Provably Secure Three-Factor Authentication Scheme with Key Agreement

Authors: Mohan Ramasundaram, Amutha Prabakar Muniyandi

Abstract:

Remote user authentication is one of the important tasks for any kind of remote server applications. Several remote authentication schemes are proposed by the researcher for Telecare Medicine Information System (TMIS). Most of the existing techniques have limitations, vulnerable to various kind attacks, lack of functionalities, information leakage, no perfect forward security and ineffectiveness. Authentication is a process of user verification mechanism for allows him to access the resources of a server. Nowadays, most of the remote authentication protocols are using two-factor authentications. We have made a survey of several remote authentication schemes using three factors and this survey shows that the most of the schemes are inefficient and subject to several attacks. We observed from the experimental evaluation; the proposed scheme is very secure against various known attacks that include replay attack, man-in-the-middle attack. Furthermore, the analysis based on the communication cost and computational cost estimation of the proposed scheme with related schemes shows that our proposed scheme is efficient.

Keywords: Telecare Medicine Information System, elliptic curve cryptography, three-factor, biometric, random oracle

Procedia PDF Downloads 205
3786 Modification Effect of CeO2 on Pt-Pd Nano Sized Catalysts for Formic Acid Oxidation

Authors: Ateeq Ur Rehman

Abstract:

This article deals with the promotional effects of CeO2 on PtPd/CeO2-OMC electrocatalysts. The synthesized catalysts are characterized using different physicochemical techniques and evaluated in a formic acid oxidation fuel cell. N2 adsorption/desorption analysis shows that CeO2 modification increases the surface area of OMC from 1005 m2/g to 1119 m2/g. SEM, XRD and TEM analysis reveal that the presence of CeO2 enhances the active metal(s) dispersion on the CeO2-OMC surface. The average particle size of the dispersed metal decreases with the increase of Pt/Pd ratio on CeO2-OMC support. Cyclic voltametry measurement of Pd/CeO2-OMC gives 12 % higher anodic current activity with 83 mV negative shift of the peak potential as compared to unmodified Pd/OMC. In bimetallic catalysts, the addition of Pt improves the activity and stability of the catalysts significantly. Among the bimetallic samples, Pd3Pt1/CeO2-OMC displays superior current density (74.6 mA/cm2), which is 28.3 times higher than that of Pt/CeO2-OMC. It also shows higher stability in extended period of runs with least indication of CO poisoning effects.

Keywords: CeO2, ordered mesoporous carbon (OMC), nano particles, formic acid fuel cell

Procedia PDF Downloads 299
3785 Development and In vitro Characterization of Diclofenac-Loaded Microparticles

Authors: Prakriti Diwan, S. Saraf

Abstract:

The present study involves preparation and evaluation of microparticles of diclofenac sodium. The microparticles were prepared by the emulsion solvent evaporation techniques using ethylcellulose polymer. Four different batches of microspheres were prepared by varying the concentration of polymer from 50% to 80% w/w. The microspheres were characterized for drug content, percentage yield and encapsulation efficiency, particle size analysis and surface morphology. Microsphere prepared with high drug content produces higher percentage yield and encapsulation efficiency values. It was observed the increase in concentration of the polymer, increases the mean particle size of the microspheres. The effect of polymer concentration on the in vitro release of diclofenac from the microspheres was also studied. The production microparticles yield showed 98.74%, mean particle size 956.32µm and loading efficiency 97.15%. The results were found that microparticles prepared had slower release than microparticles (p>0.05). Therefore, it may be concluded that drug loaded microparticles are suitable delivery systems for diclofenac sodium.

Keywords: diclofenac sodium, emulsion solvent evaporation, ethylcellulose, microparticles

Procedia PDF Downloads 280
3784 Exploring the Physical Activity Behavior and Needs of Adolescent Girls: A Mixed-Methods Study

Authors: Vicki R. Voskuil, Jorgie M. Watson

Abstract:

Despite the well-established health benefits of physical activity (PA), most adolescents do not meet guidelines recommending 60 minutes of moderate to vigorous physical activity (MVPA) each day. Adolescent girls engage in less PA than boys, a difference that increases with age. By the 9th grade, only 20% of girls report meeting recommendations for PA with lower percentages for black and Hispanic girls compared to white girls. The purpose of the study was to explore the physical activity (PA) behavior and needs of adolescent girls. Study aims included assessment of adolescent girls’ PA behavior; facilitators of and barriers to PA, PA needs, and acceptability of the Fitbit-Flex 2 activity tracker. This exploratory study used a qualitative and quantitative approach. The qualitative approach involved a focus group using a semi-structured interview technique. PA was measured using the Fitbit-Flex 2 activity tracker. Steps, distance, and active minutes were recorded for one week. A Fitbit survey was also administered to assess acceptability. SPSS Version 22.0 and ATLAS.ti Version 8 were used to analyze data. Girls in the ninth grade were recruited from a high school in the Midwest (n=11). Girls were excluded if they were involved in sports or other organized PA ≥ 3 days per week, had a health condition that prevented or limited PA, or could not read and write English. Participants received a Fitbit-Flex 2 activity tracker to wear for one week. At the end of the week, girls returned the Fitbit and participated in a focus group. Girls responded to open-ended questions regarding their PA behavior and shared their ideas for future intervention efforts aimed at increasing PA among adolescents. Girls completed a survey assessing their perceptions of the Fitbit. Mean age of the girls was 15.3 years (SD=0.44). On average girls took 6,520 steps and walked 2.73 miles each day. Girls stated their favorite types of PA were walking, riding bike, and running. Most girls stated they did PA for 30 minutes or more at a time once a day or every other day. The top 3 facilitators of PA reported by girls were friends, family, and transportation. The top 3 barriers included health issues, lack of motivation, and weather. Top intervention ideas were community service projects, camps, and using a Fitbit activity tracker. Girls felt the best timing of a PA program would be in the summer. Fitbit survey results showed 100% of girls would use a Fitbit on most days if they had one. Ten (91%) girls wore the Fitbit on all days. Seven (64%) girls used the Fitbit app and all reported they liked it. Findings indicate that PA participation for this sample is consistent with previous studies. Adolescent girls are not meeting recommended daily guidelines for PA. Fitbit activity trackers were positively received by all participants and could be used in future interventions aimed at increasing PA for adolescent girls. PA interventions that take place in the summer with friends and include community service projects may increase PA and be well received by this population.

Keywords: adolescents, girls, interventions, physical activity

Procedia PDF Downloads 217
3783 Neurological Correlates of Spiritual Experiences Across Different Faith Traditions

Authors: Khader I. Alkhouri

Abstract:

This study investigates the neurological correlates of spiritual experiences across Buddhist, Christian, Hindu, Islamic, and Jewish traditions using advanced neuroimaging techniques. Our findings reveal both common neural substrates and unique signatures associated with various spiritual practices and experiences. Consistent activation patterns were observed in the prefrontal cortex, anterior cingulate cortex, and limbic system across traditions, while the default mode network emerged as a key player in spiritual states. Distinct neural correlates were identified for specific practices like meditation and prayer, and for mystical experiences. Long-term spiritual engagement was found to induce neuroplastic changes. The research highlights the complex interplay between brain function and spiritual phenomena, suggesting that while spiritual experiences have measurable neurobiological correlates, they are also shaped by specific practices and cultural contexts. These findings contribute to our understanding of the neural basis of spirituality and have implications for cognitive neuroscience, consciousness studies, and mental health while also bridging scientific and spiritual perspectives.

Keywords: neuroscience of religion, spiritual experiences, faith traditions, neuroimaging, meditation, prayer, mystical experiences

Procedia PDF Downloads 20
3782 Variation of Lexical Choice and Changing Need of Identity Expression

Authors: Thapasya J., Rajesh Kumar

Abstract:

Language plays complex roles in society. The previous studies on language and society explain their interconnected, complementary and complex interactions and, those studies were primarily focused on the variations in the language. Variation being the fundamental nature of languages, the question of personal and social identity navigated through language variation and established that there is an interconnection between language variation and identity. This paper analyses the sociolinguistic variation in language at the lexical level and how the lexical choice of the speaker(s) affects in shaping their identity. It obtains primary data from the lexicon of the Mappila dialect of Malayalam spoken by the members of Mappila (Muslim) community of Kerala. The variation in the lexical choice is analysed by collecting data from the speech samples of 15 minutes from four different age groups of Mappila dialect speakers. Various contexts were analysed and the frequency of borrowed words in each instance is calculated to reach a conclusion on how the variation is happening in the speech community. The paper shows how the lexical choice of the speakers could be socially motivated and involve in shaping and changing identities. Lexical items or vocabulary clearly signal the group identity and personal identity. Mappila dialect of Malayalam was rich in frequent use of borrowed words from Arabic, Persian and Urdu. There was a deliberate attempt to show their identity as a Mappila community member, which was derived from the socio-political situation during those days. This made a clear variation between the Mappila dialect and other dialects of Malayalam at the surface level, which was motivated to create and establish the identity of a person as the member of Mappila community. Historically, these kinds of linguistic variation were highly motivated because of the socio-political factors and, intertwined with the historical facts about the origin and spread of Islamism in the region; people from the Mappila community highly motivated to project their identity as a Mappila because of the social insecurities they had to face before accepting that religion. Thus the deliberate inclusion of Arabic, Persian and Urdu words in their speech helped in showing their identity. However, the socio-political situations and factors at the origin of Mappila community have been changed over a period of time. The social motivation for indicating their identity as a Mappila no longer exist and thus the frequency of borrowed words from Arabic, Persian and Urdu have been reduced from their speech. Apart from the religious terms, the borrowed words from these languages are very few at present. The analysis is carried out by the changes in the language of the people according to their age and found to have significant variations between generations and literacy plays a major role in this variation process. The need of projecting a specific identity of an individual would vary according to the change in the socio-political scenario and a variation in language can shape the identity in order to go with the varying socio-political situation in any language.

Keywords: borrowings, dialect, identity, lexical choice, literacy, variation

Procedia PDF Downloads 224
3781 Deep Learning Based Polarimetric SAR Images Restoration

Authors: Hossein Aghababaei, Sergio Vitale, Giampaolo ferraioli

Abstract:

In the context of Synthetic Aperture Radar (SAR) data, polarization is an important source of information for Earth's surface monitoring . SAR Systems are often considered to transmit only one polarization. This constraint leads to either single or dual polarimetric SAR imaging modalities. Single polarimetric systems operate with a fixed single polarization of both transmitted and received electromagnetic (EM) waves, resulting in a single acquisition channel. Dual polarimetric systems, on the other hand, transmit in one fixed polarization and receive in two orthogonal polarizations, resulting in two acquisition channels. Dual polarimetric systems are obviously more informative than single polarimetric systems and are increasingly being used for a variety of remote sensing applications. In dual polarimetric systems, the choice of polarizations for the transmitter and the receiver is open. The choice of circular transmit polarization and coherent dual linear receive polarizations forms a special dual polarimetric system called hybrid polarimetry, which brings the properties of rotational invariance to geometrical orientations of features in the scene and optimizes the design of the radar in terms of reliability, mass, and power constraints. The complete characterization of target scattering, however, requires fully polarimetric data, which can be acquired with systems that transmit two orthogonal polarizations. This adds further complexity to data acquisition and shortens the coverage area or swath of fully polarimetric images compared to the swath of dual or hybrid polarimetric images. The search for solutions to augment dual polarimetric data to full polarimetric data will therefore take advantage of full characterization and exploitation of the backscattered field over a wider coverage with less system complexity. Several methods for reconstructing fully polarimetric images using hybrid polarimetric data can be found in the literature. Although the improvements achieved by the newly investigated and experimented reconstruction techniques are undeniable, the existing methods are, however, mostly based upon model assumptions (especially the assumption of reflectance symmetry), which may limit their reliability and applicability to vegetation and forest scenarios. To overcome the problems of these techniques, this paper proposes a new framework for reconstructing fully polarimetric information from hybrid polarimetric data. The framework uses Deep Learning solutions to augment hybrid polarimetric data without relying on model assumptions. A convolutional neural network (CNN) with a specific architecture and loss function is defined for this augmentation problem by focusing on different scattering properties of the polarimetric data. In particular, the method controls the CNN training process with respect to several characteristic features of polarimetric images defined by the combination of different terms in the cost or loss function. The proposed method is experimentally validated with real data sets and compared with a well-known and standard approach from the literature. From the experiments, the reconstruction performance of the proposed framework is superior to conventional reconstruction methods. The pseudo fully polarimetric data reconstructed by the proposed method also agree well with the actual fully polarimetric images acquired by radar systems, confirming the reliability and efficiency of the proposed method.

Keywords: SAR image, deep learning, convolutional neural network, deep neural network, SAR polarimetry

Procedia PDF Downloads 73
3780 Control of Microbial Pollution Using Biodegradable Polymer

Authors: Mahmoud H. Abu Elella, Riham R. Mohamed, Magdy W. Sabaa

Abstract:

Introduction: Microbial pollution is global problem threatening the human health. It is resulted by pathogenic microorganisms such as Escherichia coli (E. coli), Staphylococcus aureus (S. aureus) and other pathogenic strains. They cause a dangerous effect on human health, so great efforts have been exerted to produce new and effective antimicrobial agents. Nowadays, natural polysaccharides, such as chitosan and its derivatives are used as antimicrobial agents. The aim of our work is to synthesize of a biodegradable polymer such as N-quaternized chitosan (NQC) then Characterization of NQC by using different analysis techniques such as Fourier transform infrared (FTIR) and Scanning electron microscopy (SEM) and using it as an antibacterial agent against different pathogenic bacteria. Methods: Synthesis of NQC using dimethylsulphate. Results: FTIR technique exhibited absorption peaks of NQC, SEM images illustrated that surface of NQC was smooth and antibacterial results showed that NQC had a high antibacterial effect. Discussion: NQC was prepared and it was proved by FTIR technique and SEM images antibacterial results exhibited that NQC was an antibacterial agent.

Keywords: antimicrobial agent, N-quaternized chitosan chloride, silver nanocomposites, sodium polyacrylate

Procedia PDF Downloads 275
3779 Comparative Study of Propensity for Amyloidogenesis in Male and Female Mice

Authors: Keivan Jamshidi, Afshin Zahedi

Abstract:

Reactive amyloidosis is a condition that complicates a long list of chronic inflammation, chronic infectious, malignant, and hereditary disorders. In the present study the propensity for amyloidogenesis in male and female rats on spatio-temporal pattern was evaluated. For this purpose a total of 40 male and female Swiss mice, obtained from Pasteur Institute Tehran, after being weighted were randomly divided into 4 groups including 2 treatment groups [ 10 male (Group A1) and 10 female (Group B1) each], and 2 control groups [10 male (Group A2) and 10 female (Group B2) each]. At the end of 3rd, 5th and 7th weeks of experiment 3 mice were randomly selected and euthnised. Spleen samples of each animal were obtained and preserved in 10% neutral buffer formalin. Sample were then processed through different stages of dehydration, clearing and impregnation and finally embedded in paraffin blocks. Sections of 5µm thickness then cut and stained by alkaline Congo red techniques. The data obtained from polarized microscopic quantitative analysis did show significant differences between groups A1 and B1. A preferential expression of reactive amyloidosis is concluded in male, indicating sex differences in amyloidosis.

Keywords: amyloidosis, amyloidogenesis, mice, gender

Procedia PDF Downloads 582
3778 Human Identification and Detection of Suspicious Incidents Based on Outfit Colors: Image Processing Approach in CCTV Videos

Authors: Thilini M. Yatanwala

Abstract:

CCTV (Closed-Circuit-Television) Surveillance System is being used in public places over decades and a large variety of data is being produced every moment. However, most of the CCTV data is stored in isolation without having integrity. As a result, identification of the behavior of suspicious people along with their location has become strenuous. This research was conducted to acquire more accurate and reliable timely information from the CCTV video records. The implemented system can identify human objects in public places based on outfit colors. Inter-process communication technologies were used to implement the CCTV camera network to track people in the premises. The research was conducted in three stages and in the first stage human objects were filtered from other movable objects available in public places. In the second stage people were uniquely identified based on their outfit colors and in the third stage an individual was continuously tracked in the CCTV network. A face detection algorithm was implemented using cascade classifier based on the training model to detect human objects. HAAR feature based two-dimensional convolution operator was introduced to identify features of the human face such as region of eyes, region of nose and bridge of the nose based on darkness and lightness of facial area. In the second stage outfit colors of human objects were analyzed by dividing the area into upper left, upper right, lower left, lower right of the body. Mean color, mod color and standard deviation of each area were extracted as crucial factors to uniquely identify human object using histogram based approach. Color based measurements were written in to XML files and separate directories were maintained to store XML files related to each camera according to time stamp. As the third stage of the approach, inter-process communication techniques were used to implement an acknowledgement based CCTV camera network to continuously track individuals in a network of cameras. Real time analysis of XML files generated in each camera can determine the path of individual to monitor full activity sequence. Higher efficiency was achieved by sending and receiving acknowledgments only among adjacent cameras. Suspicious incidents such as a person staying in a sensitive area for a longer period or a person disappeared from the camera coverage can be detected in this approach. The system was tested for 150 people with the accuracy level of 82%. However, this approach was unable to produce expected results in the presence of group of people wearing similar type of outfits. This approach can be applied to any existing camera network without changing the physical arrangement of CCTV cameras. The study of human identification and suspicious incident detection using outfit color analysis can achieve higher level of accuracy and the project will be continued by integrating motion and gait feature analysis techniques to derive more information from CCTV videos.

Keywords: CCTV surveillance, human detection and identification, image processing, inter-process communication, security, suspicious detection

Procedia PDF Downloads 168
3777 An Equivalence between a Harmonic Form and a Closed Co-Closed Differential Form in L^Q and Non-L^Q Spaces

Authors: Lina Wu, Ye Li

Abstract:

An equivalent relation between a harmonic form and a closed co-closed form is established on a complete non-compact manifold. This equivalence has been generalized for a differential k-form ω from Lq spaces to non-Lq spaces when q=2 in the context of p-balanced growth where p=2. Especially for a simple differential k-form on a complete non-compact manifold, the equivalent relation has been verified with the extended scope of q for from finite q-energy in Lq spaces to infinite q-energy in non-Lq spaces when with 2-balanced growth. Generalized Hadamard Theorem, Cauchy-Schwarz Inequality, and Calculus skills including Integration by Parts as well as Convergent Series have been applied as estimation techniques to evaluate growth rates for a differential form. In particular, energy growth rates as indicated by an appropriate power range in a selected test function lead to a balance between a harmonic differential form and a closed co-closed differential form. Research ideas and computational methods in this paper could provide an innovative way in the study of broadening Lq spaces to non-Lq spaces with a wide variety of infinite energy growth for a differential form.

Keywords: closed forms, co-closed forms, harmonic forms, L^q spaces, p-balanced growth, simple differential k-forms

Procedia PDF Downloads 436
3776 Self –Engineering Strategy of Six Dimensional Inter-Subcultural Mental Images

Authors: Mostafa Jafari

Abstract:

How the people continually create and recreate the six dimensional inter- sub-cultural relationships from the strategic point of view? Can they engineer and direct it toward creating a set of peaceful subcultures? This paper answers to these questions. Our mental images shape the quantity and quality of our relationships. The six dimensions of mental images are: my mental image about myself, your mental image about yourself, my mental image about you, your mental image about me, my imagination about your image about me and your imagination about my mental image about you. Strategic engineering is dynamically shaping these images and imaginations.Methodology: This survey, which is based on object and the relation between the variables, is explanatory, correlative and quantitative. The target community members are 90 educated people from universities. The data has been collected through questionnaire and interview and has been analyzed by descriptive statistical techniques and qualitative method. Results: Our findings show that engineering and deliberatly managing the process of inter- sub-cultural transactions in the national and global level can enable us to continually reform a peaceful set of learner sub-culturals toward recreate a peaceful unit global Home.

Keywords: strategic engineering, mental image, six dimensional mental images strategy , cultural literacy, radar technique

Procedia PDF Downloads 387
3775 Role of Authorized Agencies to Combat Financial Crime in Bangladesh

Authors: Khan Sarfaraz, Mohammad Ali Mia

Abstract:

Money laundering and other financial crime have become a global threat in recent years, impacting both developed and poor countries. In developing countries like Bangladesh, it is more difficult to combat financial crime than in developing countries because of the inadequate regulatory environment and vulnerable financial system. Bangladesh's central bank issues guidelines to facilitate the implementation of the prevention of the money laundering act. According to the guideline of Bangladesh Bank, all financial institution has to develop anti-money laundering policy to ensure the safety and soundness of their institutions. The paper aims to focus on the role of authorized agencies in combating financial crime. In this paper, the latest trends in financial crimes have been discussed from global and Asian perspectives. The preventive measures for money laundering and other financial crimes have been discussed elaborately. So far, financial crime is a sophisticated and dynamic crime, and criminals continuously took innovative processes to use the financial system to launder money. The study will take a step in pointing out new techniques, effects and challenges of financial crime in Bangladesh.

Keywords: financial crime, illegal money transfer, online gambling, money laundering, authorized agencies

Procedia PDF Downloads 65
3774 Plasma Gasification as a Sustainable Way for Energy Recovery from Scrap Tyre

Authors: Gloria James, S. K. Nema, T. S. Anantha Singh, P. Vadivel Murugan

Abstract:

The usage of tyre has increased enormously in day to day life. The used tyre and rubber products pose major threat to the environment. Conventional thermal techniques such as low temperature pyrolysis and incineration produce high molecular organic compounds (condensed and collected as aromatic oil) and carbon soot particles. Plasma gasification technique can dispose tyre waste and generate combustible gases and avoid the formation of high molecular aromatic compounds. These gases generated in plasma gasification process can be used to generate electricity or as fuel wherever required. Although many experiments have been done on plasma pyrolysis of tyres, very little work has been done on plasma gasification of tyres. In this work plasma gasification of waste tyres have been conducted in a fixed bed reactor having graphite electrodes and direct current (DC) arc plasma system. The output of this work has been compared with the previous work done on plasma pyrolysis of tyres by different authors. The aim of this work is to compare different process based on gas generation, efficiency of the process and explore the most effective option for energy recovery from waste tyres.

Keywords: plasma, gasification, syngas, tyre waste

Procedia PDF Downloads 167
3773 Malaria Parasite Detection Using Deep Learning Methods

Authors: Kaustubh Chakradeo, Michael Delves, Sofya Titarenko

Abstract:

Malaria is a serious disease which affects hundreds of millions of people around the world, each year. If not treated in time, it can be fatal. Despite recent developments in malaria diagnostics, the microscopy method to detect malaria remains the most common. Unfortunately, the accuracy of microscopic diagnostics is dependent on the skill of the microscopist and limits the throughput of malaria diagnosis. With the development of Artificial Intelligence tools and Deep Learning techniques in particular, it is possible to lower the cost, while achieving an overall higher accuracy. In this paper, we present a VGG-based model and compare it with previously developed models for identifying infected cells. Our model surpasses most previously developed models in a range of the accuracy metrics. The model has an advantage of being constructed from a relatively small number of layers. This reduces the computer resources and computational time. Moreover, we test our model on two types of datasets and argue that the currently developed deep-learning-based methods cannot efficiently distinguish between infected and contaminated cells. A more precise study of suspicious regions is required.

Keywords: convolution neural network, deep learning, malaria, thin blood smears

Procedia PDF Downloads 116
3772 The Application of FSI Techniques in Modeling of Realist Pulmonary Systems

Authors: Abdurrahim Bolukbasi, Hassan Athari, Dogan Ciloglu

Abstract:

The modeling lung respiratory system which has complex anatomy and biophysics presents several challenges including tissue-driven flow patterns and wall motion. Also, the lung pulmonary system because of that they stretch and recoil with each breath, has not static walls and structures. The direct relationship between air flow and tissue motion in the lung structures naturally prefers an FSI simulation technique. Therefore, in order to toward the realistic simulation of pulmonary breathing mechanics the development of a coupled FSI computational model is an important step. A simple but physiologically-relevant three dimensional deep long geometry is designed and fluid-structure interaction (FSI) coupling technique is utilized for simulating the deformation of the lung parenchyma tissue which produces airflow fields. The real understanding of respiratory tissue system as a complex phenomenon have been investigated with respect to respiratory patterns, fluid dynamics and tissue visco-elasticity and tidal breathing period.

Keywords: lung deformation and mechanics; Tissue mechanics; Viscoelasticity; Fluid-structure interactions; ANSYS

Procedia PDF Downloads 303
3771 A Hybrid Digital Watermarking Scheme

Authors: Nazish Saleem Abbas, Muhammad Haris Jamil, Hamid Sharif

Abstract:

Digital watermarking is a technique that allows an individual to add and hide secret information, copyright notice, or other verification message inside a digital audio, video, or image. Today, with the advancement of technology, modern healthcare systems manage patients’ diagnostic information in a digital way in many countries. When transmitted between hospitals through the internet, the medical data becomes vulnerable to attacks and requires security and confidentiality. Digital watermarking techniques are used in order to ensure the authenticity, security and management of medical images and related information. This paper proposes a watermarking technique that embeds a watermark in medical images imperceptibly and securely. In this work, digital watermarking on medical images is carried out using the Least Significant Bit (LSB) with the Discrete Cosine Transform (DCT). The proposed methods of embedding and extraction of a watermark in a watermarked image are performed in the frequency domain using LSB by XOR operation. The quality of the watermarked medical image is measured by the Peak signal-to-noise ratio (PSNR). It was observed that the watermarked medical image obtained performing XOR operation between DCT and LSB survived compression attack having a PSNR up to 38.98.

Keywords: watermarking, image processing, DCT, LSB, PSNR

Procedia PDF Downloads 26
3770 Genistein Treatment Confers Protection Against Gliopathy & Vasculopathy of the Diabetic Retina in Rats

Authors: Sanaa AM Elgayar, Sohair A Eltony, Maha Mahmoud Abd El Rouf

Abstract:

Background: Retinopathy remains an important complication of diabetes. Aim of work: This work was carried out to evaluate the protective effects of genistein from diabetic retinopathy in rat. Material and Methods: Fifteen adult male albino rats were divided into two groups; Group I: control (n=5) and Group II: streptozotocin induced diabetic group (n=10), which is equally divided into two subgroups; IIa (diabetic vehicle control) and IIb (diabetic genistein-treated). Specimens were taken from the retina 12 weeks post induction, processed and examined using light, immunohistochemical, ultrastructural techniques. Blood samples were assayed for the levels of glucose. Results: In comparison with the diabetic non-treated group, the histological changes in macro and microglial glial cells reactivity and retinal blood capillaries were improved in genistein-treated groups. In addition, GFAP and iNOS expressions in the retina and the blood glucose level were reduced. Conclusion: Genistein ameliorates the histological changes of diabetic retinopathy reaching healing features, which resemble that of a normal retina.

Keywords: diabetic retinopathy, genistein, glia, capillaries.

Procedia PDF Downloads 294
3769 Experimental and Numerical Investigation of “Machining Induced Residual Stresses” during Orthogonal Machining of Alloy Steel AISI 4340

Authors: Theena Thayalan, K. N. Ramesh Babu

Abstract:

Machining induced residual stress (RS) is one of the most important surface integrity parameters that characterize the near surface layer of a mechanical component, which plays a crucial role in controlling the performance, especially its fatigue life. Since experimental determination of RS is expensive and time consuming, it would be of great benefit if they could be predicted. In such case, it would be possible to select the cutting parameters required to produce a favorable RS profile. In the present study, an effort has been made to develop a 'two dimensional finite element model (FEM)' to simulate orthogonal cutting process and to predict surface and sub-surface RS using the commercial FEA software DEFORM-2D. The developed finite element model has been validated through experimental investigation of RS. In the experimentation, the orthogonal cutting tests were carried out on AISI 4340 by varying the cutting speed (VC) and uncut chip thickness (f) at three levels and the surface & sub-surface RS has been measured using XRD and Electro polishing techniques. The comparison showed that the RS obtained using developed numerical model is in reasonable agreement with that of experimental data.

Keywords: FEM, machining, residual stress, XRF

Procedia PDF Downloads 335
3768 A New Approach towards the Development of Next Generation CNC

Authors: Yusri Yusof, Kamran Latif

Abstract:

Computer Numeric Control (CNC) machine has been widely used in the industries since its inception. Currently, in CNC technology has been used for various operations like milling, drilling, packing and welding etc. with the rapid growth in the manufacturing world the demand of flexibility in the CNC machines has rapidly increased. Previously, the commercial CNC failed to provide flexibility because its structure was of closed nature that does not provide access to the inner features of CNC. Also CNC’s operating ISO data interface model was found to be limited. Therefore, to overcome that problem, Open Architecture Control (OAC) technology and STEP-NC data interface model are introduced. At present the Personal Computer (PC) has been the best platform for the development of open-CNC systems. In this paper, both ISO data interface model interpretation, its verification and execution has been highlighted with the introduction of the new techniques. The proposed is composed of ISO data interpretation, 3D simulation and machine motion control modules. The system is tested on an old 3 axis CNC milling machine. The results are found to be satisfactory in performance. This implementation has successfully enabled sustainable manufacturing environment.

Keywords: CNC, ISO 6983, ISO 14649, LabVIEW, open architecture control, reconfigurable manufacturing systems, sustainable manufacturing, Soft-CNC

Procedia PDF Downloads 499
3767 DGA Data Interpretation Using Extension Theory for Power Transformer Diagnostics

Authors: O. P. Rahi, Manoj Kumar

Abstract:

Power transformers are essential and expensive equipments in electrical power system. Dissolved gas analysis (DGA) is one of the most useful techniques to detect incipient faults in power transformers. However, the identification of the faulted location by conventional method is not always an easy task due to variability of gas data and operational variables. In this paper, an extension theory based power transformer fault diagnosis method is presented. Extension theory tries to solve contradictions and incompatibility problems. This paper first briefly introduces the basic concept of matter element theory, establishes the matter element models for three-ratio method, and then briefly discusses extension set theory. Detailed analysis is carried out on the extended relation function (ERF) adopted in this paper for transformer fault diagnosis. The detailed diagnosing steps are offered. Simulation proves that the proposed method can overcome the drawbacks of the conventional three-ratio method, such as no matching and failure to diagnose multi-fault. It enhances diagnosing accuracy.

Keywords: DGA, extension theory, ERF, fault diagnosis power transformers, fault diagnosis, fuzzy logic

Procedia PDF Downloads 395
3766 Social Movements of Yogyakarta South Coastal Area Community against the Ferruginous Sand Quarry Construction

Authors: Muhammad Alhada Fuadilah Habib, Ayla Karina Budita, Cut Rizka Al Usrah, Mukhammad Fatkhullah, Kanita Khoirun Nisa, Siti Muslihatul Mukaromah

Abstract:

In this contemporary era, the term of development often emphasised merely on the economic growth aspect. Development of a program often considered as superior by the government, in fact, it often raises various problems. The problems occur because the development policies determined by the government tend to favor private entrepreneurs and impose on the oppression toward the community. The development promised to prosper the community's life, turn out in fact of harming the community, threatening the survival of the community and damaging the ecosystem of nature where the community hangs their life to it. Nowadays many natural resources should be used for the community’s life prosperity. However, the prosperity is conquered by the private entrepreneurs that are regulated through the free market mechanism and wrapped in democratization. This condition actually is a form of neoliberalism that builds new administration order system which is far from the meaning of the word democracy. The government should play more role in protecting community's life and prosperity, but in fact, the government sides with the private entrepreneurs for the sake of the economic benefits regardless of other aspects of the community’s life. This unjustified condition presents a wide range of social movements from the community in response to the neoliberalis policy that actually eliminates the doctrine of community sovereignty. Social movements performed by Yogyakarta south coastal area community, as the focus of the discussion in this paper, is one of the community’s response toward the government policies related to the construction of the ferruginous sand quarry which is tend to favor on private entrepreneurs and highly prejudicing or even threatening the survival of Yogyakarta south coastal area community. The data collection in this study uses qualitative research methods with in-depth interview data collection techniques and purposive informant determination techniques. This method was chosen in order to obtain the insightful data and detailed information to uncover the injustice policies committed by the government-private entrepreneurs toward Yogyakarta south coastal area community. The brief results of this study show that the conflicts between the community and government-private entrepreneurs occurred because of the differences of interests and paradigm of natural resource management. The resistance movements done by the community to fight back the government-private entrepreneurs was conducted by forming an organization called Paguyupan Petani Lahan Pantai Kulon Progo (PPLP-KP). This organization do the resistances through two ways; firstly, quiet action done through various actions such as; refusing against the socialization, performing discussion to deliberate their argument with the government-private entrepreneurs, complaining the problems to the central government, creating banners or billboards which contain the writing of rejection, performing pray rituals to invoke the justice from the God, as well as instill the resistance ideology to their young generation. Secondly, the rough action also is done through various actions such as; doing roadblocks, conducting rallies, as well as doing clash with the government apparatus. In case the resistances done by the community are seen from the pattern. Actually, the resistances are reaction toward the aggression carried out by the government-private entrepreneurs.

Keywords: community resistance, conflict, ferruginous sand quarry construction, social movement

Procedia PDF Downloads 271