Search results for: video encryption
773 A Comparison of Three Different Modalities in Improving Oral Hygiene in Adult Orthodontic Patients: An Open-Label Randomized Controlled Trial
Authors: Umair Shoukat Ali, Rashna Hoshang Sukhia, Mubassar Fida
Abstract:
Introduction: The objective of the study was to compare outcomes in terms of Bleeding index (BI), Gingival Index (GI), and Orthodontic Plaque Index (OPI) with video graphics and plaque disclosing tablets (PDT) versus verbal instructions in adult orthodontic patients undergoing fixed appliance treatment (FAT). Materials and Methods: Adult orthodontic patients have recruited from outpatient orthodontic clinics who fulfilled the inclusion criteria and were randomly allocated to three groups i.e., video, PDT, and verbal groups. We included patients undergoing FAT for six months of both genders with all teeth bonded mesial to first molars having no co-morbid conditions such as rheumatic fever and diabetes mellitus. Subjects who had gingivitis as assessed by Bleeding Index (BI), Gingival Index (GI), and Orthodontic Plaque Index (OPI) were recruited. We excluded subjects having > 2 mm of clinical attachment loss, pregnant and lactating females, any history of periodontal therapy within the last six months, and any consumption of antibiotics or anti-inflammatory drugs within the last one month. Pre- and post-interventional measurements were taken at two intervals only for BI, GI, and OPI. The primary outcome of this trial was to evaluate the mean change in the BI, GI, and OPI in the three study groups. A computer-generated randomization list was used to allocate subjects to one of the three study groups using a random permuted block sampling of 6 and 9 to randomize the samples. No blinding of the investigator or the participants was performed. Results: A total of 99 subjects were assessed for eligibility, out of which 96 participants were randomized as three of the participants declined to be part of this trial. This resulted in an equal number of participants (32) that were analyzed in all three groups. The mean change in the oral hygiene indices score was assessed, and we found no statistically significant difference among the three interventional groups. Pre- and post-interventional results showed statistically significant improvement in the oral hygiene indices for the video and PDT groups. No statistically significant difference for age, gender, and education level on oral hygiene indices were found. Simple linear regression showed that the video group produced significantly higher mean OPI change as compared to other groups. No harm was observed during the trial. Conclusions: Visual aids performed better as compared to the verbal group. Gender, age, and education level had no statistically significant impact on the oral hygiene indices. Longer follow-ups will be required to see the long-term effects of these interventions. Trial Registration: NCT04386421 Funding: Aga Khan University and Hospital (URC 183022)Keywords: oral hygiene, orthodontic treatment, adults, randomized clinical trial
Procedia PDF Downloads 118772 Exploring the Success of Live Streaming Commerce in China: A Literature Analysis
Authors: Ming Gao, Matthew Tingchi Liu, Hoi Ngan Loi
Abstract:
Live streaming refers to the video contents generated by broadcasters and shared with viewers in real-time by uploading them to short-video platforms. In recent years, individual KOL broadcasters have successfully made use of live streams to sell a large amount of goods to the consumers. For example, Wei Ya, the Number 1 broadcaster in Taobao Live, sold products worth RMB 2.7 billion (USD 0.38 billion) in 2018. Regarding the success of live streaming commerce (LSC) in China, this study explores the elements of the booming LSC industry and attempts to explain the reasons behind its prosperity. A systematic review of industry reports and academic papers was conducted to summarize the latest findings in this field. And the results of this investigation showed that a live streaming eco-system has been established by the LSC players, namely, the platform, the broadcaster, the product supplier, and the viewer. In this eco-system, all players have complementary advantages and needs, and their close cooperation leads to a win-win situation. For instance, platforms and broadcasters have abundant internet traffic, which needs to be monetized, while product suppliers have mature supply chains and the need of promoting the products. In addition, viewers are attached to the LSC platforms to get product information, bargains, and entertainment. This study highlights the importance of the mass-personal hybrid communication nature of live streaming because its interpersonal communication feature increases consumers’ positive experiences, while its mass media broadcasting feature facilitates product promotion. Another innovative point of this study lies in its inclusion of the special characteristic of Chinese Internet culture - entertainment. The entertaining genres of the live streams created by broadcasters serve as down-to-earth approaches to reach their audiences easily. Further, the nature of video, i.e., the dynamic and salient stimulus, is emphasized in this study. Since video is more engaging, it can attract viewers in a quick and easy way. Meanwhile, the abundant, interesting, high-quality, and free short videos have added “stickiness” to platforms by retaining users and prolonging their staying time on the platforms. In addition, broadcasters’ important characters, such as physical attractiveness, humor, sex appeal, kindness, communication skills, and interactivity, are also identified as important factors that influence consumers’ engagement and purchase intention. In conclusion, all players have their own proper places in this live streaming eco-system, in which they work seamlessly to give full play to their respective advantages, with each player taking what it needs and offering what it has. This has contributed to the success of live streaming commerce in China.Keywords: broadcasters, communication, entertainment, live streaming commerce, viewers
Procedia PDF Downloads 122771 Critical Evaluation and Analysis of Effects of Different Queuing Disciplines on Packets Delivery and Delay for Different Applications
Authors: Omojokun Gabriel Aju
Abstract:
Communication network is a process of exchanging data between two or more devices via some forms of transmission medium using communication protocols. The data could be in form of text, images, audio, video or numbers which can be grouped into FTP, Email, HTTP, VOIP or Video applications. The effectiveness of such data exchange will be proved if they are accurately delivered within specified time. While some senders will not really mind when the data is actually received by the receiving device, inasmuch as it is acknowledged to have been received by the receiver. The time a data takes to get to a receiver could be very important to another sender, as any delay could cause serious problem or even in some cases rendered the data useless. The validity or invalidity of a data after delay will therefore definitely depend on the type of data (information). It is therefore imperative for the network device (such as router) to be able to differentiate among the packets which are time sensitive and those that are not, when they are passing through the same network. So, here is where the queuing disciplines comes to play, to handle network resources when such network is designed to service widely varying types of traffics and manage the available resources according to the configured policies. Therefore, as part of the resources allocation mechanisms, a router within the network must implement some queuing discipline that governs how packets (data) are buffered while waiting to be transmitted. The implementation of the queuing discipline will regulate how the packets are buffered while waiting to be transmitted. In achieving this, various queuing disciplines are being used to control the transmission of these packets, by determining which of the packets get the highest priority, less priority and which packets are dropped. The queuing discipline will therefore control the packets latency by determining how long a packet can wait to be transmitted or dropped. The common queuing disciplines are first-in-first-out queuing, Priority queuing and Weighted-fair queuing (FIFO, PQ and WFQ). This paper critically evaluates and analyse through the use of Optimized Network Evaluation Tool (OPNET) Modeller, Version 14.5 the effects of three queuing disciplines (FIFO, PQ and WFQ) on the performance of 5 different applications (FTP, HTTP, E-Mail, Voice and Video) within specified parameters using packets sent, packets received and transmission delay as performance metrics. The paper finally suggests some ways in which networks can be designed to provide better transmission performance while using these queuing disciplines.Keywords: applications, first-in-first-out queuing (FIFO), optimised network evaluation tool (OPNET), packets, priority queuing (PQ), queuing discipline, weighted-fair queuing (WFQ)
Procedia PDF Downloads 361770 Visual Preferences of Elementary School Children with Autism Spectrum Disorder: An Experimental Study
Authors: Larissa Pliska, Isabel Neitzel, Michael Buschermöhle, Olga Kunina-Habenicht, Ute Ritterfeld
Abstract:
Visual preferences, which can be assessed using eye tracking technologies, are considered one of the defining hallmarks of Autism Spectrum Disorder (ASD). Specifically, children with ASD show a decreased preference for social images rather than geometric images compared to typically developed (TD) children. Such differences are already prevalent at a very early age and indicate the severity of the disorder: toddlers with ASD who preferred geometric images when confronted with social and geometric images showed higher ASD symptom severity than toddlers with ASD who showed higher social attention. Furthermore, the complexity of social pictures (one child playing vs. two children playing together) as well as the mode of stimulus presentation (video or image), are not decisive for the marker. The average age of diagnosis for ASD in Germany is 6.5 years, and visual preference data on this age group is missing. In the present study, we therefore investigated whether visual preferences persist into school age. We examined the visual preferences of 16 boys aged 6 to 11 with ASD and unimpaired cognition as well as TD children (1:1 matching based on children's age and the parent's level of education) within an experimental setting. Different stimulus presentation formats (images vs. videos) and different levels of stimulus complexity were included. Children with and without ASD received pairs of social and non-social images and video stimuli on a screen while eye movements (i.e., eye position and gaze direction) were recorded. For this specific use case, KIZMO GmbH developed a customized, native iOS app (KIZMO Face-Analyzer) for use on iPads. Neither the format of stimulus presentation nor the complexity of the social images had a significant effect on the visual preference of children with and without ASD in this study. Despite the tendency for a difference between the groups for the video stimuli, there were no significant differences. Overall, no statistical differences in visual preference occurred between boys with and without ASD, suggesting that gaze preference in these groups is similar at primary school age. One limitation is that the children with ASD were already receiving Autism-specific intervention. The potential of a visual preference task as an indicator of ASD can be emphasized. The article discusses the clinical relevance of this marker in elementary school children.Keywords: autism spectrum disorder, eye tracking, hallmark, visual preference
Procedia PDF Downloads 61769 Particle Filter Supported with the Neural Network for Aircraft Tracking Based on Kernel and Active Contour
Authors: Mohammad Izadkhah, Mojtaba Hoseini, Alireza Khalili Tehrani
Abstract:
In this paper we presented a new method for tracking flying targets in color video sequences based on contour and kernel. The aim of this work is to overcome the problem of losing target in changing light, large displacement, changing speed, and occlusion. The proposed method is made in three steps, estimate the target location by particle filter, segmentation target region using neural network and find the exact contours by greedy snake algorithm. In the proposed method we have used both region and contour information to create target candidate model and this model is dynamically updated during tracking. To avoid the accumulation of errors when updating, target region given to a perceptron neural network to separate the target from background. Then its output used for exact calculation of size and center of the target. Also it is used as the initial contour for the greedy snake algorithm to find the exact target's edge. The proposed algorithm has been tested on a database which contains a lot of challenges such as high speed and agility of aircrafts, background clutter, occlusions, camera movement, and so on. The experimental results show that the use of neural network increases the accuracy of tracking and segmentation.Keywords: video tracking, particle filter, greedy snake, neural network
Procedia PDF Downloads 343768 Dynamic EEG Desynchronization in Response to Vicarious Pain
Authors: Justin Durham, Chanda Rooney, Robert Mather, Mickie Vanhoy
Abstract:
The psychological construct of empathy is to understand a person’s cognitive perspective and experience the other person’s emotional state. Deciphering emotional states is conducive for interpreting vicarious pain. Observing others' physical pain activates neural networks related to the actual experience of pain itself. The study addresses empathy as a nonlinear dynamic process of simulation for individuals to understand the mental states of others and experience vicarious pain, exhibiting self-organized criticality. Such criticality follows from a combination of neural networks with an excitatory feedback loop generating bistability to resonate permutated empathy. Cortical networks exhibit diverse patterns of activity, including oscillations, synchrony and waves, however, the temporal dynamics of neurophysiological activities underlying empathic processes remain poorly understood. Mu rhythms are EEG oscillations with dominant frequencies of 8-13 Hz becoming synchronized when the body is relaxed with eyes open and when the sensorimotor system is in idle, thus, mu rhythm synchrony is expected to be highest in baseline conditions. When the sensorimotor system is activated either by performing or simulating action, mu rhythms become suppressed or desynchronize, thus, should be suppressed while observing video clips of painful injuries if previous research on mirror system activation holds. Twelve undergraduates contributed EEG data and survey responses to empathy and psychopathy scales in addition to watching consecutive video clips of sports injuries. Participants watched a blank, black image on a computer monitor before and after observing a video of consecutive sports injuries incidents. Each video condition lasted five-minutes long. A BIOPAC MP150 recorded EEG signals from sensorimotor and thalamocortical regions related to a complex neural network called the ‘pain matrix’. Physical and social pain are activated in this network to resonate vicarious pain responses to processing empathy. Five EEG single electrode locations were applied to regions measuring sensorimotor electrical activity in microvolts (μV) to monitor mu rhythms. EEG signals were sampled at a rate of 200 Hz. Mu rhythm desynchronization was measured via 8-13 Hz at electrode sites (F3 & F4). Data for each participant’s mu rhythms were analyzed via Fast Fourier Transformation (FFT) and multifractal time series analysis.Keywords: desynchronization, dynamical systems theory, electroencephalography (EEG), empathy, multifractal time series analysis, mu waveform, neurophysiology, pain simulation, social cognition
Procedia PDF Downloads 284767 Hausa Home Videos: A Template for Global Peace
Authors: Ibrahim Uba Yusuf
Abstract:
Conflict is a subject or, better put, theme that primarily dominates Hausa home videos. Conflict in Hausa home videos is one of the sources of attraction to viewers, but do such films achieve anything? The Hausa home video industry in Northern Nigeria, popularly called Kannywood has been making attempts by producing cultural products for consumption within and outside the country. The ability of the industry to connect issues of concern within the region is an effort to reckon with. This paper, therefore, examines how Hausa home videos on peacebuilding can serve as a template for peacebuilding. This is coming at a time when global attention to peacebuilding is increasing. The inclusion of peacebuilding as SDG Goal suggests the need for utilizing other approaches that can enhance peace in risk societies like Nigeria. The paper based its arguments using the key proponents of the auteur theory—the director’s bias, thoughts, and sense of reasoning shape the issues emphasized in the home videos. The paper argues that Hausa home video industry is one medium amongst the many producing discourse about peacebuilding, conflict, and justice, social cohesion, education, and understanding, as well as raising social consciousness on issues of public concern. It is the conclusion of the paper that Hausa home videos produced on sustaining peacebuilding in Northern Nigeria are cultural products that have become lenses to understanding the interplay between representations or portrayal of conflict and peaceful resolutions of the conflicting issues.Keywords: hausa home videos, peacebuilding, conflict, northern Nigeria
Procedia PDF Downloads 121766 Enhancing Security and Privacy Protocols in Telehealth: A Comprehensive Approach across IoT/Fog/Cloud Environments
Authors: Yunyong Guo, Man Wang, Bryan Guo, Nathan Guo
Abstract:
This paper introduces an advanced security and privacy model tailored for Telehealth systems, emphasizing end-to-end protection across IoT, Fog, and Cloud components. The proposed model integrates encryption, key management, intrusion detection, and privacy-preserving measures to safeguard patient data. A comprehensive simulation study evaluates the model's effectiveness in scenarios such as unauthorized access, physical breaches, and insider threats. Results indicate notable success in detecting and mitigating threats yet underscore areas for refinement. The study contributes insights into the intricate balance between security and usability in Telehealth environments, setting the stage for continued advancements.Keywords: cloud, enhancing security, fog, IoT, telehealth
Procedia PDF Downloads 79765 Measuring the Height of a Person in Closed Circuit Television Video Footage Using 3D Human Body Model
Authors: Dojoon Jung, Kiwoong Moon, Joong Lee
Abstract:
The height of criminals is one of the important clues that can determine the scope of the suspect's search or exclude the suspect from the search target. Although measuring the height of criminals by video alone is limited by various reasons, the 3D data of the scene and the Closed Circuit Television (CCTV) footage are matched, the height of the criminal can be measured. However, it is still difficult to measure the height of CCTV footage in the non-contact type measurement method because of variables such as position, posture, and head shape of criminals. In this paper, we propose a method of matching the CCTV footage with the 3D data on the crime scene and measuring the height of the person using the 3D human body model in the matched data. In the proposed method, the height is measured by using 3D human model in various scenes of the person in the CCTV footage, and the measurement value of the target person is corrected by the measurement error of the replay CCTV footage of the reference person. We tested for 20 people's walking CCTV footage captured from an indoor and an outdoor and corrected the measurement values with 5 reference persons. Experimental results show that the measurement error (true value-measured value) average is 0.45 cm, and this method is effective for the measurement of the person's height in CCTV footage.Keywords: human height, CCTV footage, 2D/3D matching, 3D human body model
Procedia PDF Downloads 248764 Analysing Responses of Intermediate and Expert Karate Athletes towards the Gyaku-Zuki Using Virtual Reality
Authors: Nicole Bandow, Peter Emmermacher, Oliver Wienert, Steffen Masik, Kerstin Witte
Abstract:
Karate-kumite is a fast sport where a good perception and anticipation of movements is needed in order to respond appropriately. Perception and anticipation are therefore essential for an efficient and precise movement control and a limiting factor in karate kumite. Previous studies only used 2D video technologies combined with the occlusion technique to study anticipation in sports. These studies showed limitations in the usage of 2D video footage in regards to realism and the presentation of depth information. To overcome these issues a virtual 3D environment was developed to create a similar to real life environment. The aim of this study was to compare the differences in responses of intermediate and expert karate athletes towards temporally and spatially occluded virtual karate attacks from two attackers. Five male expert and five intermediate karate athletes responded physically to nine (3 temporal combined with 3 spatial) occluded attacks of the Gyaku-Zuki of each attacker in the 3D virtual environment. The responses were evaluated in regards to correct point of time and appropriate response technique. Significant differences between the expertises’ responses for the attackers were found. Experts respond more often correct to early information of attacks than novices.Keywords: anticipation, karate, occlusion, virtual reality
Procedia PDF Downloads 472763 Multilevel Gray Scale Image Encryption through 2D Cellular Automata
Authors: Rupali Bhardwaj
Abstract:
Cryptography is the science of using mathematics to encrypt and decrypt data; the data are converted into some other gibberish form, and then the encrypted data are transmitted. The primary purpose of this paper is to provide two levels of security through a two-step process, rather than transmitted the message bits directly, first encrypted it using 2D cellular automata and then scrambled with Arnold Cat Map transformation; it provides an additional layer of protection and reduces the chance of the transmitted message being detected. A comparative analysis on effectiveness of scrambling technique is provided by scrambling degree measurement parameters i.e. Gray Difference Degree (GDD) and Correlation Coefficient.Keywords: scrambling, cellular automata, Arnold cat map, game of life, gray difference degree, correlation coefficient
Procedia PDF Downloads 379762 Of Digital Games and Dignity: Rationalizing E-Sports Amidst Stereotypes Associated with Gamers
Authors: Sarthak Mohapatra, Ajith Babu, Shyam Prasad Ghosh
Abstract:
The community of gamers has been at the crux of stigmatization and marginalization by the larger society, resulting in dignity erosion. India presents a unique context where e-sports have recently seen large-scale investments, a massive userbase, and appreciable demand for gaming as a career option. Yet the apprehension towards gaming is salient among parents and non-gamers who engage in the de-dignification of gamers, by advocating the discourse of violence promotion via video games. Even the government is relentless in banning games due to data privacy issues. Thus, the current study explores the experiences of gamers and how they navigate these de-dignifying circumstances. The study follows an exploratory qualitative approach where in-depth interviews are used as data collection tools guided by a semi-structured questionnaire. A total of 25 individuals were interviewed comprising casual gamers, professional gamers, and individuals who are indirectly impacted by gaming including parents, relatives, and friends of gamers. Thematic analysis via three-level coding is used to arrive at broad themes (categories) and their sub-themes. The results indicate that the de-dignification of gamers results from attaching stereotypes of introversion, aggression, low intelligence, and low aspirations to them. It is interesting to note that the intensity of de-dignification varies and is more salient in violent shooting games which are perceived to require low cognitive resources to master. The moral disengagement of gamers while playing violent video games becomes the basis for de-dignification. Findings reveal that circumventing de-dignification required gamers to engage in several tactics that included playing behind closed doors, consciously hiding the gamer identity, rationalizing behavior by idolizing professionals, bragging about achievements within the game, and so on. Theoretically, it contributes to dignity and social identity literature by focusing on stereotyping and stigmatization. From a policy perspective, improving legitimacy toward gaming is expected to improve the social standing of gamers and professionals. For practitioners, it is important that proper channels of promotion and communication are used to educate the non-gamers so that the stereotypes blur away.Keywords: dignity, social identity, stereotyping, video games
Procedia PDF Downloads 101761 The Use of Authentic Videos to Change Learners’ Negative Attitudes and Perceptions toward Grammar Learning
Authors: Khaldi Youcef
Abstract:
This investigation seeks to inquire into the effectiveness of using authentic videos for grammar teaching purposes. In this investigation, an English animated situation, Hercules, was used as a type of authentic multimedia to teach a particular grammatical structure, namely conditional sentences. This study also aims at investigating the EFL learners’ attitudes toward grammar learning after being exposed to such an authentic video. To reach that purpose, 56 EFL learners were required ultimately to respond to a questionnaire with an aim to reveal their attitudes towards grammar as a language entity and as a subject for being learned. Then, as a second stage of the investigation, the EFL learners were divided into a control group and an experimental group with 28 learners in each. The first group was taught grammar -conditional sentences- using a deductive-inductive approach, while the second group was exposed to an authentic video to learn conditional sentences. There was a post-lesson stage that included a questionnaire to be answered by learners of each group. The aim of this stage is to capture any change in learners' attitudes shown in the pre-lesson questionnaire. The findings of the first stage revealed learners' negative attitudes towards grammar learning. And the third stage results showed the effectiveness of authentic videos in entirely turning learners' attitudes toward grammar learning to be significantly positive. Also, the utility of authentic videos in highly motivating EFL learners can be deduced. The findings of this survey asserted the need for incorporation and integration of authentic videos in EFL classrooms as they resulted in rising effectively learners’ awareness of grammar and looking at it from a communicative perspective.Keywords: multimedia, authentic videos, negative attitudes, grammar learning, EFL learners
Procedia PDF Downloads 100760 Pythagorean-Platonic Lattice Method for Finding all Co-Prime Right Angle Triangles
Authors: Anthony Overmars, Sitalakshmi Venkatraman
Abstract:
This paper presents a method for determining all of the co-prime right angle triangles in the Euclidean field by looking at the intersection of the Pythagorean and Platonic right angle triangles and the corresponding lattice that this produces. The co-prime properties of each lattice point representing a unique right angle triangle are then considered. This paper proposes a conjunction between these two ancient disparaging theorists. This work has wide applications in information security where cryptography involves improved ways of finding tuples of prime numbers for secure communication systems. In particular, this paper has direct impact in enhancing the encryption and decryption algorithms in cryptography.Keywords: Pythagorean triples, platonic triples, right angle triangles, co-prime numbers, cryptography
Procedia PDF Downloads 241759 Real-Time Multi-Vehicle Tracking Application at Intersections Based on Feature Selection in Combination with Color Attribution
Authors: Qiang Zhang, Xiaojian Hu
Abstract:
In multi-vehicle tracking, based on feature selection, the tracking system efficiently tracks vehicles in a video with minimal error in combination with color attribution, which focuses on presenting a simple and fast, yet accurate and robust solution to the problem such as inaccurately and untimely responses of statistics-based adaptive traffic control system in the intersection scenario. In this study, a real-time tracking system is proposed for multi-vehicle tracking in the intersection scene. Considering the complexity and application feasibility of the algorithm, in the object detection step, the detection result provided by virtual loops were post-processed and then used as the input for the tracker. For the tracker, lightweight methods were designed to extract and select features and incorporate them into the adaptive color tracking (ACT) framework. And the approbatory online feature selection algorithms are integrated on the mature ACT system with good compatibility. The proposed feature selection methods and multi-vehicle tracking method are evaluated on KITTI datasets and show efficient vehicle tracking performance when compared to the other state-of-the-art approaches in the same category. And the system performs excellently on the video sequences recorded at the intersection. Furthermore, the presented vehicle tracking system is suitable for surveillance applications.Keywords: real-time, multi-vehicle tracking, feature selection, color attribution
Procedia PDF Downloads 163758 The Development of Encrypted Near Field Communication Data Exchange Format Transmission in an NFC Passive Tag for Checking the Genuine Product
Authors: Tanawat Hongthai, Dusit Thanapatay
Abstract:
This paper presents the development of encrypted near field communication (NFC) data exchange format transmission in an NFC passive tag for the feasibility of implementing a genuine product authentication. We propose a research encryption and checking the genuine product into four major categories; concept, infrastructure, development and applications. This result shows the passive NFC-forum Type 2 tag can be configured to be compatible with the NFC data exchange format (NDEF), which can be automatically partially data updated when there is NFC field.Keywords: near field communication, NFC data exchange format, checking the genuine product, encrypted NFC
Procedia PDF Downloads 281757 Video Object Segmentation for Automatic Image Annotation of Ethernet Connectors with Environment Mapping and 3D Projection
Authors: Marrone Silverio Melo Dantas Pedro Henrique Dreyer, Gabriel Fonseca Reis de Souza, Daniel Bezerra, Ricardo Souza, Silvia Lins, Judith Kelner, Djamel Fawzi Hadj Sadok
Abstract:
The creation of a dataset is time-consuming and often discourages researchers from pursuing their goals. To overcome this problem, we present and discuss two solutions adopted for the automation of this process. Both optimize valuable user time and resources and support video object segmentation with object tracking and 3D projection. In our scenario, we acquire images from a moving robotic arm and, for each approach, generate distinct annotated datasets. We evaluated the precision of the annotations by comparing these with a manually annotated dataset, as well as the efficiency in the context of detection and classification problems. For detection support, we used YOLO and obtained for the projection dataset an F1-Score, accuracy, and mAP values of 0.846, 0.924, and 0.875, respectively. Concerning the tracking dataset, we achieved an F1-Score of 0.861, an accuracy of 0.932, whereas mAP reached 0.894. In order to evaluate the quality of the annotated images used for classification problems, we employed deep learning architectures. We adopted metrics accuracy and F1-Score, for VGG, DenseNet, MobileNet, Inception, and ResNet. The VGG architecture outperformed the others for both projection and tracking datasets. It reached an accuracy and F1-score of 0.997 and 0.993, respectively. Similarly, for the tracking dataset, it achieved an accuracy of 0.991 and an F1-Score of 0.981.Keywords: RJ45, automatic annotation, object tracking, 3D projection
Procedia PDF Downloads 170756 A Difficult Advertising: A Preventive Intervention for Siblings of Children with down Syndrome
Authors: Valentina Manna, Oscar Pisanti
Abstract:
The term sibling has been adopted by Italian brothers and sisters of people with disabilities, to define themselves as a group with shared features. This choice is due to the importance of underlying the centrality of what being a brother/sister means to these people because of and beyond the disability. Being a sibling offers great opportunities to develop empathy and relational skills but it may also amplify the typical dynamics of fraternal relationships dealing with envy, rivalry and concern. This outlines a condition of potential developmental risk for the non-disabled sibling, being at the same time a great resource for the child with special needs, as actor of an intimate relationship usually lasting after that one with parents. However, young siblings are often unheeded in their needs for comprehension of disability and not considered as persons requiring attention themselves. Moreover, scholars have scarcely undertaken an exploration of siblings’ perspective as competent contributors for producing knowledge useful to the benefit of families with special needs children. This contribution describes a preventive intervention for young siblings (6 – 16 years) of children with Down syndrome, by means of a psychodynamic-oriented group where participants could communicate, explore and share their emotional experiences as siblings. Based on a participatory approach, the program represents an action-research project, involving siblings as key experts for our understanding of siblings’ lives. The initiative used social media and video technologies to rise children’s voice: as a final product, participants were involved in the realization of a video campaign –which they defined ‘a difficult advertising’– built on the insights generated by the program and addressed to other siblings to help them facing and recognizing resources and difficulties related to their status. The final video campaign realized by the participants summarizes the main themes emerged during the intervention; as revealed by a thematic analysis, they are related to the difficulty in feeling to have a personal identity, to face disability as a form of ‘untought known’ and to integrate ambivalent emotions. In conclusion, the group device revealed its efficacy as a preventive tool: it allowed participants to deeply reflect on their own experiences and to communicate them for the first time in a verbal and mentalized form.Keywords: down syndrome, group, siblings, prevention
Procedia PDF Downloads 246755 Protecting the Cloud Computing Data Through the Data Backups
Authors: Abdullah Alsaeed
Abstract:
Virtualized computing and cloud computing infrastructures are no longer fuzz or marketing term. They are a core reality in today’s corporate Information Technology (IT) organizations. Hence, developing an effective and efficient methodologies for data backup and data recovery is required more than any time. The purpose of data backup and recovery techniques are to assist the organizations to strategize the business continuity and disaster recovery approaches. In order to accomplish this strategic objective, a variety of mechanism were proposed in the recent years. This research paper will explore and examine the latest techniques and solutions to provide data backup and restoration for the cloud computing platforms.Keywords: data backup, data recovery, cloud computing, business continuity, disaster recovery, cost-effective, data encryption.
Procedia PDF Downloads 89754 The Use of Videos: Effects on Children's Language and Literacy Skills
Authors: Rahimah Saimin
Abstract:
Previous research has shown that young children can learn from educational television programmes, videos or other technological media. However, the blending of any of these with traditional printed-based text appears to be omitted. Repeated viewing is an important factor in children's ability to comprehend the content or plot. The present study combined videos with traditional printed-based text and required repeated viewing and is original and distinctive. The first study was a pilot study to explore whether the intervention is implementable in ordinary classrooms. The second study explored whether the curricular embedding is important or whether the video with curricular embedding is effective. The third study explored the effect of “dosage”, i.e. whether a longer/ more intense intervention has a proportionately greater effect on outcomes. Both measured outcomes (comprehension, word sounds, and early word recognition) and unmeasured outcomes (engagement to reading traditional printed-based texts or/and multimodal texts) were obtained from this study. Observation indicated degree of engagement in reading. The theoretical framework was multimodality theory combined with Piaget’s and Vygotsky’s learning theories. An experimental design was used with 4-5-year-old children in nursery schools and primary schools. Six links to video clips exploring non-fiction science content were provided to teachers. The first session is whole-class and subsequent sessions small-group. The teacher then engaged the children in dialogue using supplementary materials. About half of each class was selected randomly for pre-post assessments. Two assessments were used the British Picture Vocabulary Scale (BPVSIII) and the York Assessment of Reading for Comprehension (YARC): Early Reading. Different programme fidelity means were deployed- observations, teacher self-reports attendance logs and post-delivery interviews. Data collection is in progress and results will be available shortly. If this multiphase study show effectiveness in one or other application, then teachers will have other tools which they can use to enhance vocabulary, letter knowledge and word reading. This would be a valuable addition to their repertoire.Keywords: language skills, literacy skills, multimodality, video
Procedia PDF Downloads 339753 Temporal Characteristics of Human Perception to Significant Variation of Block Structures
Authors: Kuo-Cheng Liu
Abstract:
In the latest research efforts, the structures of the image in the spatial domain have been successfully analyzed and proved to deduce the visual masking for accurately estimating the visibility thresholds of the image. If the structural properties of the video sequence in the temporal domain are taken into account to estimate the temporal masking, the improvement and enhancement of the as-sessing spatio-temporal visibility thresholds are reasonably expected. In this paper, the temporal characteristics of human perception to the change in block structures on the time axis are analyzed. The temporal characteristics of human perception are represented in terms of the significant variation in block structures for the analysis of human visual system (HVS). Herein, the block structure in each frame is computed by combined the pattern masking and the contrast masking simultaneously. The contrast masking always overestimates the visibility thresholds of edge regions and underestimates that of texture regions, while the pattern masking is weak on a uniform background and is strong on the complex background with spatial patterns. Under considering the significant variation of block structures between successive frames, we extend the block structures of images in the spatial domain to that of video sequences in the temporal domain to analyze the relation between the inter-frame variation of structures and the temporal masking. Meanwhile, the subjective viewing test and the fair rating process are designed to evaluate the consistency of the temporal characteristics with the HVS under a specified viewing condition.Keywords: temporal characteristic, block structure, pattern masking, contrast masking
Procedia PDF Downloads 415752 Gas-Liquid Flow Regimes in Vertical Venturi Downstream of Horizontal Blind-Tee
Authors: Muhammad Alif Bin Razali, Cheng-Gang Xie, Wai Lam Loh
Abstract:
A venturi device is commonly used as an integral part of a multiphase flowmeter (MPFM) in real-time oil-gas production monitoring. For an accurate determination of individual phase fraction and flowrate, a gas-liquid flow ideally needs to be well mixed in the venturi measurement section. Partial flow mixing is achieved by installing a venturi vertically downstream of the blind-tee pipework that ‘homogenizes’ the incoming horizontal gas-liquid flow. In order to study in-depth the flow-mixing effect of the blind-tee, gas-liquid flows are captured at blind-tee and venturi sections by using a high-speed video camera and a purpose-built transparent test rig, over a wide range of superficial liquid velocities (0.3 to 2.4m/s) and gas volume fractions (10 to 95%). Electrical capacitance sensors are built to measure the instantaneous holdup (of oil-gas flows) at the venturi inlet and throat. Flow regimes and flow (a)symmetry are investigated based on analyzing the statistical features of capacitance sensors’ holdup time-series data and of the high-speed video time-stacked images. The perceived homogenization effect of the blind-tee on the incoming intermittent horizontal flow regimes is found to be relatively small across the tested flow conditions. A horizontal (blind-tee) to vertical (venturi) flow-pattern transition map is proposed based on gas and liquid mass fluxes (weighted by the Baker parameters).Keywords: blind-tee, flow visualization, gas-liquid two-phase flow, MPFM
Procedia PDF Downloads 129751 New Security Approach of Confidential Resources in Hybrid Clouds
Authors: Haythem Yahyaoui, Samir Moalla, Mounir Bouden, Skander ghorbel
Abstract:
Nowadays, Cloud environments are becoming a need for companies, this new technology gives the opportunities to access to the data anywhere and anytime, also an optimized and secured access to the resources and gives more security for the data which stored in the platform, however, some companies do not trust Cloud providers, in their point of view, providers can access and modify some confidential data such as bank accounts, many works have been done in this context, they conclude that encryption methods realized by providers ensure the confidentiality, although, they forgot that Cloud providers can decrypt the confidential resources. The best solution here is to apply some modifications on the data before sending them to the Cloud in the objective to make them unreadable. This work aims on enhancing the quality of service of providers and improving the trust of the customers.Keywords: cloud, confidentiality, cryptography, security issues, trust issues
Procedia PDF Downloads 378750 Saudi Arabia Border Security Informatics: Challenges of a Harsh Environment
Authors: Syed Ahsan, Saleh Alshomrani, Ishtiaq Rasool, Ali Hassan
Abstract:
In this oral presentation, we will provide an overview of the technical and semantic architecture of a desert border security and critical infrastructure protection security system. Modern border security systems are designed to reduce the dependability and intrusion of human operators. To achieve this, different types of sensors are use along with video surveillance technologies. Application of these technologies in a harsh desert environment of Saudi Arabia poses unique challenges. Environmental and geographical factors including high temperatures, desert storms, temperature variations and remoteness adversely affect the reliability of surveillance systems. To successfully implement a reliable, effective system in a harsh desert environment, the following must be achieved: i) Selection of technology including sensors, video cameras, and communication infrastructure that suit desert environments. ii) Reduced power consumption and efficient usage of equipment to increase the battery life of the equipment. iii) A reliable and robust communication network with efficient usage of bandwidth. Also, to reduce the expert bottleneck, an ontology-based intelligent information systems needs to be developed. Domain knowledge unique and peculiar to Saudi Arabia needs to be formalized to develop an expert system that can detect abnormal activities and any intrusion.Keywords: border security, sensors, abnormal activity detection, ontologies
Procedia PDF Downloads 481749 Implicit and Explicit Mechanisms of Emotional Contagion
Authors: Andres Pinilla Palacios, Ricardo Tamayo
Abstract:
Emotional contagion is characterized as an automatic tendency to synchronize behaviors that facilitate emotional convergence among humans. It might thus play a pivotal role to understand the dynamics of key social interactions. However, a few research has investigated its potential mechanisms. We suggest two complementary but independent processes that may underlie emotional contagion. The efficient contagion hypothesis, based on fast and implicit bottom-up processes, modulated by familiarity and spread of activation in the emotional associative networks of memory. Secondly, the emotional contrast hypothesis, based on slow and explicit top-down processes guided by deliberated appraisal and hypothesis-testing. In order to assess these two hypotheses, an experiment with 39 participants was conducted. In the first phase, participants were induced (between-groups) to an emotional state (positive, neutral or negative) using a standardized video taken from the FilmStim database. In the second phase, participants classified and rated (within-subject) the emotional state of 15 faces (5 for each emotional state) taken from the POFA database. In the third phase, all participants were returned to a baseline emotional state using the same neutral video used in the first phase. In a fourth phase, participants classified and rated a new set of 15 faces. The accuracy in the identification and rating of emotions was partially explained by the efficient contagion hypothesis, but the speed with which these judgments were made was partially explained by the emotional contrast hypothesis. However, results are ambiguous, so a follow-up experiment is proposed in which emotional expressions and activation of the sympathetic system will be measured using EMG and EDA respectively.Keywords: electromyography, emotional contagion, emotional valence, identification of emotions, imitation
Procedia PDF Downloads 317748 Raising Awareness to Health Professionals about Emotional Needs of Families Suffering Perinatal Loss through a Short Documentary
Authors: Elisenda Camprecios, Alicia Macarrila, Montse Albiol, Neus Garriga Garriga
Abstract:
The loss of a child during pregnancy, or shortly after birth, is not a common occurrence, but it is a prevalent fact in our society. When this loss happens, life and death walk together. The grief that parents experience following a perinatal loss is a devastating experience. Professionals are aware that the quality of care offered during this first period is crucial to support the families experiencing a perinatal loss and meet their needs. However, it is not always easy for the health care professionals to know what to say and what to do in these difficult circumstances. Given the complexity of the Health, painful process that a family must face when is affected by such loss, we believe that the creation of a protocol that pays special attention to the emotional needs of those couples can be a very valuable tool for the professionals. The short documentary named ‘When the illusion vanished’ was created as part of the material of this protocol, which focuses on the emotional needs of the families who have suffered a perinatal loss. This video is designed to see what impact has a perinatal death and to raise awareness among professionals working in this field. The methodology is based on interviews with couples who have experienced perinatal death and to professionals who accompany families suffering from perinatal loss. The use of sensitive and empathized words, being encouraged to express feelings, respect the time, appropriate training for the professionals are some of the issues reflected in this documentary. We believe that this video has contributed to help health care professionals to empathize and understand the need to be able to accompany these families with the appropriate care, respectful, empathetic attitude and professionalism so that they can start the path to a ‘healthy’ mourning.Keywords: neonatal loss, midwifery, perinatal bereavement, perinatal loss
Procedia PDF Downloads 150747 Evaluation of Vehicle Classification Categories: Florida Case Study
Authors: Ren Moses, Jaqueline Masaki
Abstract:
This paper addresses the need for accurate and updated vehicle classification system through a thorough evaluation of vehicle class categories to identify errors arising from the existing system and proposing modifications. The data collected from two permanent traffic monitoring sites in Florida were used to evaluate the performance of the existing vehicle classification table. The vehicle data were collected and classified by the automatic vehicle classifier (AVC), and a video camera was used to obtain ground truth data. The Federal Highway Administration (FHWA) vehicle classification definitions were used to define vehicle classes from the video and compare them to the data generated by AVC in order to identify the sources of misclassification. Six types of errors were identified. Modifications were made in the classification table to improve the classification accuracy. The results of this study include the development of updated vehicle classification table with a reduction in total error by 5.1%, a step by step procedure to use for evaluation of vehicle classification studies and recommendations to improve FHWA 13-category rule set. The recommendations for the FHWA 13-category rule set indicate the need for the vehicle classification definitions in this scheme to be updated to reflect the distribution of current traffic. The presented results will be of interest to States’ transportation departments and consultants, researchers, engineers, designers, and planners who require accurate vehicle classification information for planning, designing and maintenance of transportation infrastructures.Keywords: vehicle classification, traffic monitoring, pavement design, highway traffic
Procedia PDF Downloads 181746 Utilizing Quick Response (QR) Codes and Uniform Resource Locator (URL) links in Printed Discharge Instructions for Chronic Pain Patients
Authors: Jawad Arshad
Abstract:
Back and neck pain result in more than 3 million Emergency Department (ED) visits per year. Approximately 10-20% of patients with acute low back pain will continue to have moderate to severe pain after 3 months and 30% will develop chronic functional impairment. Strategies for analgesia for musculoskeletal pain upon ED discharge have been shown to be highly variable and provider dependent. The American College of Physicians, United Kingdom and Danish treatment guidelines all recommend exercise as the first line treatment for low back pain present >12 weeks and as an adjunctive treatment to education and encouraging continued mobility in acute low back pain. URL links and QR codes were embedded in Epic’s Electronic Medical Record (EMR) for seamless integration into discharge instructions. To our knowledge, this is the first time QR codes have been embedded and used as an adjunct to computer generated discharge instructions into an EMR nationwide. Materials and Methods: Eleven two-minute physical therapy (PT) videos treating a variety of common painful musculoskeletal conditions were prepared in collaboration between the Pain Management and Physical Therapy departments of a large academic center. The videos were hosted and made available on Vimeo for free public access. Dynamic QR codes and URL links were created for each video and integrated into the EPIC Electronic Medical Record discharge instructions. Both data from physician prescribed PT videos and results of public searches are included. As the case report is devoid of patient identifiable information, it is exempt from IRB review requirements as per IRB policy. Results/Case Report: From 2/6/2021 to 5/19/21, the videos were prescribed on Epic a total of 76 times, the dynamic QR codes were scanned a total of 84 times. Low back (n=32) followed by neck (n=8), shoulder (n=7) and radicular low back pain (n=7) were the most common painful complaints prescribed a PT video. The videos were played on Vimeo 790 times with 83% (n=656) being unique views and 17% returning users. Shoulder pain (n=489) followed by neck (n=36) and low back pain (n=37) were the most commonly played videos. Discussion: Patients are viewing their physical therapy videos via QR codes provided by their physicians. The large number of public views of the physical therapy videos are either from patients sharing the link/QR code or patients not affiliated with our institution are searching for videos to treat their painful complaints. The data suggests there is a need for reputable home PT videos to treat commonly encountered painful complaints with 17% of viewers returning for repeat view. The shoulder pain video was played significantly more than the others despite not being given to patients more frequently, which raised suspicion it may have received increased traffic via an outside affiliate, website or influencer. When eliminating shoulder pain from the data, individuals watched 67% of the entire video on average, indicating high engagement.Keywords: pain, EMR, emergency medicine, discharge
Procedia PDF Downloads 5745 Cryptographic Protocol for Secure Cloud Storage
Authors: Luvisa Kusuma, Panji Yudha Prakasa
Abstract:
Cloud storage, as a subservice of infrastructure as a service (IaaS) in Cloud Computing, is the model of nerworked storage where data can be stored in server. In this paper, we propose a secure cloud storage system consisting of two main components; client as a user who uses the cloud storage service and server who provides the cloud storage service. In this system, we propose the protocol schemes to guarantee against security attacks in the data transmission. The protocols are login protocol, upload data protocol, download protocol, and push data protocol, which implement hybrid cryptographic mechanism based on data encryption before it is sent to the cloud, so cloud storage provider does not know the user's data and cannot analysis user’s data, because there is no correspondence between data and user.Keywords: cloud storage, security, cryptographic protocol, artificial intelligence
Procedia PDF Downloads 358744 An Efficient Proxy Signature Scheme Over a Secure Communications Network
Authors: H. El-Kamchouchi, Heba Gaber, Fatma Ahmed, Dalia H. El-Kamchouchi
Abstract:
Proxy signature scheme permits an original signer to delegate his/her signing capability to a proxy signer, and then the proxy signer generates a signing message on behalf of the original signer. The two parties must be able to authenticate one another and agree on a secret encryption key, in order to communicate securely over an unreliable public network. Authenticated key agreement protocols have an important role in building secure communications network between the two parties. In this paper, we present a secure proxy signature scheme over an efficient and secure authenticated key agreement protocol based on the discrete logarithm problem.Keywords: proxy signature, warrant partial delegation, key agreement, discrete logarithm
Procedia PDF Downloads 348