Search results for: violence detection
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 4090

Search results for: violence detection

3700 Intrusion Detection Based on Graph Oriented Big Data Analytics

Authors: Ahlem Abid, Farah Jemili

Abstract:

Intrusion detection has been the subject of numerous studies in industry and academia, but cyber security analysts always want greater precision and global threat analysis to secure their systems in cyberspace. To improve intrusion detection system, the visualisation of the security events in form of graphs and diagrams is important to improve the accuracy of alerts. In this paper, we propose an approach of an IDS based on cloud computing, big data technique and using a machine learning graph algorithm which can detect in real time different attacks as early as possible. We use the MAWILab intrusion detection dataset . We choose Microsoft Azure as a unified cloud environment to load our dataset on. We implement the k2 algorithm which is a graphical machine learning algorithm to classify attacks. Our system showed a good performance due to the graphical machine learning algorithm and spark structured streaming engine.

Keywords: Apache Spark Streaming, Graph, Intrusion detection, k2 algorithm, Machine Learning, MAWILab, Microsoft Azure Cloud

Procedia PDF Downloads 118
3699 Design an Intelligent Fire Detection System Based on Neural Network and Particle Swarm Optimization

Authors: Majid Arvan, Peyman Beygi, Sina Rokhsati

Abstract:

In-time detection of fire in buildings is of great importance. Employing intelligent methods in data processing in fire detection systems leads to a significant reduction of fire damage at lowest cost. In this paper, the raw data obtained from the fire detection sensor networks in buildings is processed by using intelligent methods based on neural networks and the likelihood of fire happening is predicted. In order to enhance the quality of system, the noise in the sensor data is reduced by analyzing wavelets and applying SVD technique. Meanwhile, the proposed neural network is trained using particle swarm optimization (PSO). In the simulation work, the data is collected from sensor network inside the room and applied to the proposed network. Then the outputs are compared with conventional MLP network. The simulation results represent the superiority of the proposed method over the conventional one.

Keywords: intelligent fire detection, neural network, particle swarm optimization, fire sensor network

Procedia PDF Downloads 361
3698 Embedded Electrochemistry with Miniaturized, Drone-Based, Potentiostat System for Remote Detection Chemical Warfare Agents

Authors: Amer Dawoud, Jesy Motchaalangaram, Arati Biswakarma, Wujan Mio, Karl Wallace

Abstract:

The development of an embedded miniaturized drone-based system for remote detection of Chemical Warfare Agents (CWA) is proposed. The paper focuses on the software/hardware system design of the electrochemical Cyclic Voltammetry (CV) and Differential Pulse Voltammetry (DPV) signal processing for future deployment on drones. The paper summarizes the progress made towards hardware and electrochemical signal processing for signature detection of CWA. Also, the miniature potentiostat signal is validated by comparing it with the high-end lab potentiostat signal.

Keywords: drone-based, remote detection chemical warfare agents, miniaturized, potentiostat

Procedia PDF Downloads 108
3697 Object Detection in Digital Images under Non-Standardized Conditions Using Illumination and Shadow Filtering

Authors: Waqqas-ur-Rehman Butt, Martin Servin, Marion Pause

Abstract:

In recent years, object detection has gained much attention and very encouraging research area in the field of computer vision. The robust object boundaries detection in an image is demanded in numerous applications of human computer interaction and automated surveillance systems. Many methods and approaches have been developed for automatic object detection in various fields, such as automotive, quality control management and environmental services. Inappropriately, to the best of our knowledge, object detection under illumination with shadow consideration has not been well solved yet. Furthermore, this problem is also one of the major hurdles to keeping an object detection method from the practical applications. This paper presents an approach to automatic object detection in images under non-standardized environmental conditions. A key challenge is how to detect the object, particularly under uneven illumination conditions. Image capturing conditions the algorithms need to consider a variety of possible environmental factors as the colour information, lightening and shadows varies from image to image. Existing methods mostly failed to produce the appropriate result due to variation in colour information, lightening effects, threshold specifications, histogram dependencies and colour ranges. To overcome these limitations we propose an object detection algorithm, with pre-processing methods, to reduce the interference caused by shadow and illumination effects without fixed parameters. We use the Y CrCb colour model without any specific colour ranges and predefined threshold values. The segmented object regions are further classified using morphological operations (Erosion and Dilation) and contours. Proposed approach applied on a large image data set acquired under various environmental conditions for wood stack detection. Experiments show the promising result of the proposed approach in comparison with existing methods.

Keywords: image processing, illumination equalization, shadow filtering, object detection

Procedia PDF Downloads 194
3696 Systematic Review of Sexual Assault Prevention Methods for Older Adults: Exploring the Hidden Needs of a Growing Population

Authors: Michelle Hand, Brieanne Beaujolais

Abstract:

Rape stereotypes have long involved the assault of young females by strangers desiring sex. As such, older adult women and men have largely been excluded from research, policies, and awareness raising initiatives to address sexual violence. Moreover sexual assault accounts for the most underreported type of abuse experienced by older adults, highlighting a need to expand our knowledge base in this area. Thus a systematic review of peer-reviewed scholarly articles and reports was conducted to explore the ways sexual assault has been prevented among older adults in recent years and to identify implications for researchers and practitioners as they aim to meet the needs of this population. Articles and reports published during or after 2007 were eligible if their focus included methods to address sex abuse among older adults as well as practice or research implications. Forty-four articles met this criteria and were included in this systematic review. The findings from this review will provide an in-depth understanding of the under-researched issue of sexual violence among older adult women and men as well as current prevention strategies. In addition, implications and recommendations will be provided for practitioners, educators and researchers as they aim to meet the hidden needs of this growing yet under-researched population.

Keywords: elder, rape, sexual assault, sexual violence

Procedia PDF Downloads 292
3695 Bidirectional Long Short-Term Memory-Based Signal Detection for Orthogonal Frequency Division Multiplexing With All Index Modulation

Authors: Mahmut Yildirim

Abstract:

This paper proposed the bidirectional long short-term memory (Bi-LSTM) network-aided deep learning (DL)-based signal detection for Orthogonal frequency division multiplexing with all index modulation (OFDM-AIM), namely Bi-DeepAIM. OFDM-AIM is developed to increase the spectral efficiency of OFDM with index modulation (OFDM-IM), a promising multi-carrier technique for communication systems beyond 5G. In this paper, due to its strong classification ability, Bi-LSTM is considered an alternative to the maximum likelihood (ML) algorithm, which is used for signal detection in the classical OFDM-AIM scheme. The performance of the Bi-DeepAIM is compared with LSTM network-aided DL-based OFDM-AIM (DeepAIM) and classic OFDM-AIM that uses (ML)-based signal detection via BER performance and computational time criteria. Simulation results show that Bi-DeepAIM obtains better bit error rate (BER) performance than DeepAIM and lower computation time in signal detection than ML-AIM.

Keywords: bidirectional long short-term memory, deep learning, maximum likelihood, OFDM with all index modulation, signal detection

Procedia PDF Downloads 39
3694 Tank Barrel Surface Damage Detection Algorithm

Authors: Tomáš Dyk, Stanislav Procházka, Martin Drahanský

Abstract:

The article proposes a new algorithm for detecting damaged areas of the tank barrel based on the image of the inner surface of the tank barrel. Damage position is calculated using image processing techniques such as edge detection, discrete wavelet transformation and image segmentation for accurate contour detection. The algorithm can detect surface damage in smoothbore and even in rifled tank barrels. The algorithm also calculates the volume of the detected damage from the depth map generated, for example, from the distance measurement unit. The proposed method was tested on data obtained by a tank barrel scanning device, which generates both surface image data and depth map. The article also discusses tank barrel scanning devices and how damaged surface impacts material resistance.

Keywords: barrel, barrel diagnostic, image processing, surface damage detection, tank

Procedia PDF Downloads 121
3693 State Coercion and Social Movements: Legacy of Authoritarian Regime

Authors: Hyun-Ji Choi

Abstract:

This paper aims to examine the meaning of ‘state’ as a monopoly of violence, in regard with South Korean democratic transition. Since institutional democratization in 1987, it is conventionally known that governmental authority has exercised its power through law and police force, rather than inclusive or private violence. In other words, 1987 pro-democracy movement has been a critical juncture for a step towards democratic consolidation. However, state coercion may continually be exerted despite institutional specification by law in South Korean context. Explicit case would be amendment of ‘the Law on Assembly and Demonstration’ which determines citizens’ right to take collective action mostly against government actions. This paper investigates amendment process of the law along with social reality since 1987 until 2015 to see how effectively institutionalization has progressed.

Keywords: democratic transition, historical institutionalism, state coercion, the law on Assembly and Demonstration

Procedia PDF Downloads 164
3692 Voices of Fear: A Case Study Of Tobephobia Experienced by Female Teachers

Authors: Prakash Singh

Abstract:

In this exploratory qualitative case study, the voices of female teachers are captured that describe their fear of failure in coping with their daily anxieties, stresses, and tensions in their classrooms. When teachers are usually appointed, the curriculum forms the heart of all their professional obligations. The policy of quality and equality of education for all learners is a must as part of these deliberations, otherwise it would spell the inevitable failure for teachers. Yet, how often have teachers been asked whether they are happy during their professional tenure. Research affirms that this question is not a priority, seeing that the happiness of learners and the educational administrators enjoy precedence. Teachers are often subject to undue pressures and tensions because of environmental factors that extends beyond the curriculum. School violence, bullying, drug abuse, and gangsters are not uncommon to the school milieu, no matter where such schools can be located. In this case study, the voices of female teachers find space concerning their experiences of tobephobia (TBP). The questions that inevitably arise are: Are the educational authorities aware of the effects of TBP in education? What can be done to arrest and eliminate the debilitating effects of TBP? This exploratory study contributes to the growing concerns of TBP in education. It is therefore imperative that the effects of TBP on human resources in education must be accentuated so that meaningful solutions can be found to address challenging educational issues such as school violence, bullying, and drug abuse amongst learners.

Keywords: curriculum, female teachers, school violence, tobephobia

Procedia PDF Downloads 374
3691 Flicker Detection with Motion Tolerance for Embedded Camera

Authors: Jianrong Wu, Xuan Fu, Akihiro Higashi, Zhiming Tan

Abstract:

CMOS image sensors with a rolling shutter are used broadly in the digital cameras embedded in mobile devices. The rolling shutter suffers the flicker artifacts from the fluorescent lamp, and it could be observed easily. In this paper, the characteristics of illumination flicker in motion case were analyzed, and two efficient detection methods based on matching fragment selection were proposed. According to the experimental results, our methods could achieve as high as 100% accuracy in static scene, and at least 97% in motion scene.

Keywords: illumination flicker, embedded camera, rolling shutter, detection

Procedia PDF Downloads 396
3690 Fault Location Detection in Active Distribution System

Authors: R. Rezaeipour, A. R. Mehrabi

Abstract:

Recent increase of the DGs and microgrids in distribution systems, disturbs the tradition structure of the system. Coordination between protection devices in such a system becomes the concern of the network operators. This paper presents a new method for fault location detection in the active distribution networks, independent of the fault type or its resistance. The method uses synchronized voltage and current measurements at the interconnection of DG units and is able to adapt to changes in the topology of the system. The method has been tested on a 38-bus distribution system, with very encouraging results.

Keywords: fault location detection, active distribution system, micro grids, network operators

Procedia PDF Downloads 759
3689 Research on ARQ Transmission Technique in Mars Detection Telecommunications System

Authors: Zhongfei Cai, Hui He, Changsheng Li

Abstract:

This paper studied in the automatic repeat request (ARQ) transmission technique in Mars detection telecommunications system. An ARQ method applied to proximity-1 space link protocol was proposed by this paper. In order to ensure the efficiency of data reliable transmission, this ARQ method combined these different ARQ maneuvers characteristics. Considering the Mars detection communication environments, this paper analyzed the characteristics of the saturation throughput rate, packet dropping probability, average delay and energy efficiency with different ARQ algorithms. Combined thus results with the theories of ARQ transmission technique, an ARQ transmission project in Mars detection telecommunications system was established. The simulation results showed that this algorithm had excellent saturation throughput rate and energy efficiency with low complexity.

Keywords: ARQ, mars, CCSDS, proximity-1, deepspace

Procedia PDF Downloads 315
3688 3D Object Detection for Autonomous Driving: A Comprehensive Review

Authors: Ahmed Soliman Nagiub, Mahmoud Fayez, Heba Khaled, Said Ghoniemy

Abstract:

Accurate perception is a critical component in enabling autonomous vehicles to understand their driving environment. The acquisition of 3D information about objects, including their location and pose, is essential for achieving this understanding. This survey paper presents a comprehensive review of 3D object detection techniques specifically tailored for autonomous vehicles. The survey begins with an introduction to 3D object detection, elucidating the significance of the third dimension in perceiving the driving environment. It explores the types of sensors utilized in this context and the corresponding data extracted from these sensors. Additionally, the survey investigates the different types of datasets employed, including their formats, sizes, and provides a comparative analysis. Furthermore, the paper categorizes and thoroughly examines the perception methods employed for 3D object detection based on the diverse range of sensors utilized. Each method is evaluated based on its effectiveness in accurately detecting objects in a three-dimensional space. Additionally, the evaluation metrics used to assess the performance of these methods are discussed. By offering a comprehensive overview of 3D object detection techniques for autonomous vehicles, this survey aims to advance the field of perception systems. It serves as a valuable resource for researchers and practitioners, providing insights into the techniques, sensors, and evaluation metrics employed in 3D object detection for autonomous vehicles.

Keywords: computer vision, 3D object detection, autonomous vehicles, deep learning

Procedia PDF Downloads 33
3687 Analyzing Mexican Adaptation of Shakespeare: A Study of Onstage Violence in Richard III and Its Impact on Mexican Viewers

Authors: Nelya Babynets

Abstract:

Shakespeare and Mexican theatregoers have enjoyed quite a complex relationship. Shakespearean plays have appeared on the Mexican stage with remarkable perseverance, yet with mixed success. Although Shakespeare has long been a part of the global cultural marketplace and his works are celebrated all around the world, the adaptation of his plays on the contemporary Mexican stage is always an adventure, since the works of this early modern author are frequently seen as the legacy of a ‘high’, but obsolete, culture, one that is quite distant from the present-day viewers’ daily experiences and concerns. Moreover, Mexican productions of Shakespeare are presented mostly in Peninsular Spanish, a language similar yet alien to the language spoken in Mexico, one that does not wholly fit into the viewers’ cultural praxis. This is the reason why Mexican dramatic adaptations of Shakespearean plays tend to replace the cultural references of the original piece with ones that are more significant and innate to Latin American spectators. This paper analyses the new Mexican production of Richard III adapted and directed by Mauricio Garcia Lozano, which employs onstage violence - a cultural force that is inherent to all human beings regardless of their beliefs, ethnic background or nationality - as the means to make this play more relevant to a present-day audience. Thus, this paper addresses how the bloody bombast of staged murders helps to avoid the tyranny of a rigid framework of fixed meanings that denies the possibility of an intercultural appropriation of this European play written over four hundred years ago. The impact of violence displayed in Garcia Lozano’s adaptation of Richard III on Mexican audiences will also be examined. This study is particularly relevant in Mexico where the term ‘tragedy’ has become a commonplace and where drug wars and state-sanctioned violence have already taken the lives of many people.

Keywords: audience, dramatic adaptation, Shakespeare, viewer

Procedia PDF Downloads 421
3686 Carbon-Based Electrochemical Detection of Pharmaceuticals from Water

Authors: M. Ardelean, F. Manea, A. Pop, J. Schoonman

Abstract:

The presence of pharmaceuticals in the environment and especially in water has gained increasing attention. They are included in emerging class of pollutants, and for most of them, legal limits have not been set-up due to their impact on human health and ecosystem was not determined and/or there is not the advanced analytical method for their quantification. In this context, the development of various advanced analytical methods for the quantification of pharmaceuticals in water is required. The electrochemical methods are known to exhibit the great potential for high-performance analytical methods but their performance is in direct relation to the electrode material and the operating techniques. In this study, two types of carbon-based electrodes materials, i.e., boron-doped diamond (BDD) and carbon nanofiber (CNF)-epoxy composite electrodes have been investigated through voltammetric techniques for the detection of naproxen in water. The comparative electrochemical behavior of naproxen (NPX) on both BDD and CNF electrodes was studied by cyclic voltammetry, and the well-defined peak corresponding to NPX oxidation was found for each electrode. NPX oxidation occurred on BDD electrode at the potential value of about +1.4 V/SCE (saturated calomel electrode) and at about +1.2 V/SCE for CNF electrode. The sensitivities for NPX detection were similar for both carbon-based electrode and thus, CNF electrode exhibited superiority in relation to the detection potential. Differential-pulsed voltammetry (DPV) and square-wave voltammetry (SWV) techniques were exploited to improve the electroanalytical performance for the NPX detection, and the best results related to the sensitivity of 9.959 µA·µM-1 were achieved using DPV. In addition, the simultaneous detection of NPX and fluoxetine -a very common antidepressive drug, also present in water, was studied using CNF electrode and very good results were obtained. The detection potential values that allowed a good separation of the detection signals together with the good sensitivities were appropriate for the simultaneous detection of both tested pharmaceuticals. These results reclaim CNF electrode as a valuable tool for the individual/simultaneous detection of pharmaceuticals in water.

Keywords: boron-doped diamond electrode, carbon nanofiber-epoxy composite electrode, emerging pollutans, pharmaceuticals

Procedia PDF Downloads 254
3685 Electrochemical Detection of Polycyclic Aromatic Hydrocarbons in Urban Air by Exfoliated Graphite Based Electrode

Authors: A. Sacko, H. Nyoni, T. A. M. Msagati, B. Ntsendwana

Abstract:

Carbon based materials to target environmental pollutants have become increasingly recognized in science. Electrochemical methods using carbon based materials are notable methods for high sensitive detection of organic pollutants in air. It is therefore in this light that exfoliated graphite electrode was fabricated for electrochemical analysis of PAHs in urban atmospheric air. The electrochemical properties of the graphite electrode were studied using CV and EIS in the presence of acetate buffer supporting electrolyte with 2 Mm ferricyanide as a redox probe. The graphite electrode showed enhanced current response which confirms facile kinetics and enhanced sensitivity. However, the peak to peak (DE) separation increased as a function of scan rate. The EIS showed a high charger transfer resistance. The detection phenanthrene on the exfoliated graphite was studied in the presence of acetate buffer solution at PH 3.5 using DPV. The oxidation peak of phenanthrene was observed at 0.4 V. Under optimized conditions (supporting electrolyte, pH, deposition time, etc.). The detection limit observed was at 5x 10⁻⁸ M. Thus the results demonstrate with further optimization and modification lower concentration detection can be achieved.

Keywords: electrochemical detection, exfoliated graphite, PAHs (polycyclic aromatic hydrocarbons), urban air

Procedia PDF Downloads 180
3684 Impact of Violence against Women on Small and Medium Enterprises (SMEs) in Rural Sindh: A Case Study of Kandhkot

Authors: Mohammad Shoaib Khan, Abdul Sattar Bahalkani

Abstract:

This research investigates the violence and their impact on SMEs in Sindh. The main objective of current research is to examine the women empowerment through women participation in small and medium enterprises in upper Sindh. The data were collected from 500 respondents from Kandhkot District, by using simple random technique. A structural questionnaire was designed as an instrument for measuring the impact of SMEs business in women empowerment in rural Sindh. It was revealed that the rural women is less confident and their husbands were always given them hard time once they are exposing themselves to outside the boundaries of the house. It was revealed that rural women have a major contribution in social, economic, and political development. It was further revealed that women are getting low wages and due to non-availability of market facility they are paying low wages. The negative impact of husbands’ income and having children at the age of 0-6 years old are also significant. High income of other household member raises the reservation wage of mothers, thus lowers the probability of participation when the objective of working is to help family’s financial need. The impact of childcare on mothers’ labor force participation is significant but not as the theory predicted. The probability of participation in labor force is significantly higher for women who lived in the urban areas where job opportunities are greater compared to the rural.

Keywords: empowerment, violence against women, SMEs, rural

Procedia PDF Downloads 304
3683 Barriers to the Implementation of Peace Education in Secondary Schools, South Africa

Authors: Ntokozo Dennis Ndwandwe

Abstract:

The aim of the study was to explore the barriers facing the implementation of peace education as a strategy to combat violence in selected secondary schools in the Western Cape Province of South Africa. The problem that motivated this enquiry was the absence of stable peace and the increase of incidents of violence in schools. A qualitative approach was followed when conducting the study, and small samples of three case studies of secondary schools were used. Method used in collecting data consisted of semi-structured interviews; focus group interviews and observation. The participants consisted of the program manager for Quaker for Peace Centre (QPC), three principals, nine teachers, and fifteen learners. Data were analysed by transcribing, organising, marking by hand and coding that produced labels that allowed key points to be highlighted. Findings revealed that the effective implementation of peace education was being constrained by factors such as financial constraints, inadequate time allocated, lack of parental involvement, over work-loaded teachers, negative attitude and other societal influences. It is recommended that teachers should receive an ongoing training for peace education. Therefore, the government should prioritise and provide funds for peace education. In addition, parental involvement should be improved in order to enhance the implementation of peace education in selected secondary schools.

Keywords: barriers, implementation, conflict, peace, peace education, conflict resolution, violence

Procedia PDF Downloads 173
3682 Facile Synthesis of CuO Nanosheets on Cu Foil for H2O2 Detection

Authors: Yu-Kuei Hsu, Yan-Gu Lin

Abstract:

A facile and simple fabrication of copper(II) oxide (CuO) nanosheet on copper foil as nanoelectrode for H2O2 sensing application was proposed in this study. The spontaneous formation of CuO nanosheets by immersing the copper foil into 0.1 M NaOH aqueous solution for 48 hrs was carried out at room temperature. The sheet-like morphology with several ten nanometers in thickness and ~500 nm in width was observed by SEM. Those nanosheets were confirmed the monoclinic-phase CuO by the structural analysis of XRD and Raman spectra. The directly grown CuO nanosheets film is mechanically stable and offers an excellent electrochemical sensing platform. The CuO nanosheets electrode shows excellent electrocatalytic response to H2O2 with significantly lower overpotentials for its oxidation and reduction and also exhibits a fast response and high sensitivity for the amperometric detection of H2O2. The novel spontaneously grown CuO nanosheets electrode is readily applicable to other analytes and has great potential applications in the electrochemical detection.

Keywords: CuO, nanosheets, H2O2 detection, Cu foil

Procedia PDF Downloads 270
3681 Perfect Prey: Coercive Control and Subjugation, A Foundation for Dismissing the Truth

Authors: Christine Marie Cocchiola

Abstract:

This study assesses the relationship between coercive control and subjugation. Coercive control is the foundation of most domestic violence and a serious public health problem, having significant legal and social justice ramifications. Beyond the physical, it oftentimes is preceded by or motivated by a need for control. Subjugation, as a personality trait and a maladaptive schema, leads individuals to minimize their own needs or wants and, thereby, often to a loss of autonomy, a dismissal of what one might know to be true. This includes a dismissal of the trademarks of an abusive relationship. Subjugation may contribute to a person engaging in or remaining in a coercively controlling relationship. One hundred fifty-four female survivors of domestic violence participated in this study, assessing their own level of subjugation. Participants were limited to individuals who experienced non-physical abuse in their relationships. Subjugation was attributed as a “concern” or greater in 137 of the 154 participants. 11 participants were interviewed to determine their personal experiences in this abusive relationship. Common themes emerged from interviews, including that the participants worked diligently to fix these abusive relationships by regulating their own behaviors and attempting to please the offender. The results indicate a continued need for advocacy and support of this vulnerable population. Further education is indicated for mental health professionals and for individuals in or having left an abusive relationship on how to identify signs of subjugation, thereby empowering individuals to avoid future experiences of abuse.

Keywords: coercive control, intimate partner violence, subjugation, schemas, gender oppression, autonomy, gaslighting

Procedia PDF Downloads 66
3680 High Level Synthesis of Canny Edge Detection Algorithm on Zynq Platform

Authors: Hanaa M. Abdelgawad, Mona Safar, Ayman M. Wahba

Abstract:

Real-time image and video processing is a demand in many computer vision applications, e.g. video surveillance, traffic management and medical imaging. The processing of those video applications requires high computational power. Therefore, the optimal solution is the collaboration of CPU and hardware accelerators. In this paper, a Canny edge detection hardware accelerator is proposed. Canny edge detection is one of the common blocks in the pre-processing phase of image and video processing pipeline. Our presented approach targets offloading the Canny edge detection algorithm from processing system (PS) to programmable logic (PL) taking the advantage of High Level Synthesis (HLS) tool flow to accelerate the implementation on Zynq platform. The resulting implementation enables up to a 100x performance improvement through hardware acceleration. The CPU utilization drops down and the frame rate jumps to 60 fps of 1080p full HD input video stream.

Keywords: high level synthesis, canny edge detection, hardware accelerators, computer vision

Procedia PDF Downloads 459
3679 Keypoint Detection Method Based on Multi-Scale Feature Fusion of Attention Mechanism

Authors: Xiaoxiao Li, Shuangcheng Jia, Qian Li

Abstract:

Keypoint detection has always been a challenge in the field of image recognition. This paper proposes a novelty keypoint detection method which is called Multi-Scale Feature Fusion Convolutional Network with Attention (MFFCNA). We verified that the multi-scale features with the attention mechanism module have better feature expression capability. The feature fusion between different scales makes the information that the network model can express more abundant, and the network is easier to converge. On our self-made street sign corner dataset, we validate the MFFCNA model with an accuracy of 97.8% and a recall of 81%, which are 5 and 8 percentage points higher than the HRNet network, respectively. On the COCO dataset, the AP is 71.9%, and the AR is 75.3%, which are 3 points and 2 points higher than HRNet, respectively. Extensive experiments show that our method has a remarkable improvement in the keypoint recognition tasks, and the recognition effect is better than the existing methods. Moreover, our method can be applied not only to keypoint detection but also to image classification and semantic segmentation with good generality.

Keywords: keypoint detection, feature fusion, attention, semantic segmentation

Procedia PDF Downloads 98
3678 Plagiarism Detection for Flowchart and Figures in Texts

Authors: Ahmadu Maidorawa, Idrissa Djibo, Muhammad Tella

Abstract:

This paper presents a method for detecting flow chart and figure plagiarism based on shape of image processing and multimedia retrieval. The method managed to retrieve flowcharts with ranked similarity according to different matching sets. Plagiarism detection is well known phenomenon in the academic arena. Copying other people is considered as serious offense that needs to be checked. There are many plagiarism detection systems such as turn-it-in that has been developed to provide these checks. Most, if not all, discard the figures and charts before checking for plagiarism. Discarding the figures and charts result in look holes that people can take advantage. That means people can plagiarize figures and charts easily without the current plagiarism systems detecting it. There are very few papers which talks about flowcharts plagiarism detection. Therefore, there is a need to develop a system that will detect plagiarism in figures and charts.

Keywords: flowchart, multimedia retrieval, figures similarity, image comparison, figure retrieval

Procedia PDF Downloads 439
3677 Investigation of Utilizing L-Band Horn Antenna in Landmine Detection

Authors: Ahmad H. Abdelgwad, Ahmed A. Nashat

Abstract:

Landmine detection is an important and yet challenging problem remains to be solved. Ground Penetrating Radar (GPR) is a powerful and rapidly maturing technology for subsurface threat identification. The detection methodology of GPR depends mainly on the contrast of the dielectric properties of the searched target and its surrounding soil. This contrast produces a partial reflection of the electromagnetic pulses that are being transmitted into the soil and then being collected by the GPR.  One of the most critical hardware components for the performance of GPR is the antenna system. The current paper explores the design and simulation of a pyramidal horn antenna operating at L-band frequencies (1- 2 GHz) to detect a landmine. A prototype model of the GPR system setup is developed to simulate full wave analysis of the electromagnetic fields in different soil types. The contrast in the dielectric permittivity of the landmine and the sandy soil is the most important parameter to be considered for detecting the presence of landmine. L-band horn antenna is proved to be well-versed in the investigation of landmine detection.

Keywords: full wave analysis, ground penetrating radar, horn antenna design, landmine detection

Procedia PDF Downloads 196
3676 Leveraging Community Partnerships for Social Impact

Authors: T. Moody, E. Mitchell, T. Dang, A. Barry, T. Proshan, S. Andrisse, V. Odero-Marah

Abstract:

Women’s prison and reentry programs are focused primarily on reducing recidivism but neglect how an individual’s intersecting identities influence their risk of violence and ways that histories of gender-based violence (GBV) must be addressed for these women to recover from traumas. Light To Life (LTL) and From Prison Cells to Ph.D. (P2P) Womxn’s Cohort program recognizes this need; providing national gender-responsive programming (GRP), and trauma-informed programming to justice-impacted survivors through digital resources, leadership opportunities, educational workshops, and healing justice approaches for positive health outcomes. Through the support of a community-university partnership (CUP), a comparative evaluation study is being conducted among intimate-partner violence (IPV) survivors with histories of incarceration who have or have not participated in the cohort. The objectives of the partnership are to provide mutually beneficial training and consultation for evaluating GRP through a rigorously tested research methodology. This collaborative applies a rigorous methodology of semi-structured interviews with an intervention and control group to evaluate the impact of LTL’s programming in the P2P Womxn’s Cohort. The CUP is essential to achieve the expected results of the project. It will measure primary outcomes, including participants' level of engagement and satisfaction with programming, reduction in attitudes that accept violence in relationships, and increase in interpersonal and intrapersonal skills that lead to healthy relationships. This community-based approach will provide opportunities to evaluate the effectiveness of the program. The results addressed in the hypothesis will provide learning lessons to improve this program, to scale it up, and apply it to other similarly affected populations. The partnership experience and anticipated outcomes contribute to the knowledge in women’s health and criminal justice by fostering public awareness on the importance of developing new partnerships and fostering CUP to establish a framework to the leveraging of partnerships for social impact available to academic institutions.

Keywords: Community-university partnership, gender-responsive programming, incarceration, intimate-partner violence, POC, women

Procedia PDF Downloads 42
3675 Video Text Information Detection and Localization in Lecture Videos Using Moments

Authors: Belkacem Soundes, Guezouli Larbi

Abstract:

This paper presents a robust and accurate method for text detection and localization over lecture videos. Frame regions are classified into text or background based on visual feature analysis. However, lecture video shows significant degradation mainly related to acquisition conditions, camera motion and environmental changes resulting in low quality videos. Hence, affecting feature extraction and description efficiency. Moreover, traditional text detection methods cannot be directly applied to lecture videos. Therefore, robust feature extraction methods dedicated to this specific video genre are required for robust and accurate text detection and extraction. Method consists of a three-step process: Slide region detection and segmentation; Feature extraction and non-text filtering. For robust and effective features extraction moment functions are used. Two distinct types of moments are used: orthogonal and non-orthogonal. For orthogonal Zernike Moments, both Pseudo Zernike moments are used, whereas for non-orthogonal ones Hu moments are used. Expressivity and description efficiency are given and discussed. Proposed approach shows that in general, orthogonal moments show high accuracy in comparison to the non-orthogonal one. Pseudo Zernike moments are more effective than Zernike with better computation time.

Keywords: text detection, text localization, lecture videos, pseudo zernike moments

Procedia PDF Downloads 128
3674 Gender Equality: A Constitutional Myth When Featured with Domestic Violence

Authors: Suja S. Nayar, Mayuri Pandya

Abstract:

The foundation of legal system of any nation is its constitution and the strive to achieve equality amongst different classes prevailing in the social system. The most traditional form of inequality that is prevailing in the society is the gender inequality. The existence of inequality on the basis of gender prevails since the ancient era which has with the passing time merely continued and aggravated to a great extent. The founding fathers of our constitution were well aware of the then prevailing situation and being concerned about the future if this inequality continued to prevail, and in such view, the provisions of Article 14, 15, 38 and 44 of our Constitution were enacted with specific intent for the upliftment of women. The strive for equality is the rule of law embodied with the principle of foreseeability which is necessitated in the stability of justice system of any nation, and when it comes to equality, the first form of equality we need to achieve is gender equality. Time and again various initiatives have been announced and attempted to achieve the objective of gender equality, but analysis of the ground reality always have yielded disappointing results. The research that is proposed to be undertaken intends to cover all the above issues concerning the failures ineffective implementation of the gender-specific laws especially the provisions concerning the protection provided under Domestic Violence Act. The researchers will analyze the judgment of last five years' judgments of Supreme Court of India. In Hiral P. Harsora and ors. v Kusum Narottamdas Harsora and Ors. the Hon'ble Supreme Court recently deleting the words 'adult male' from the definition of respondent disclosed it is intent and understanding that domestic violence is being caused by a female on female also and not only restricted to males on females only. The procedure as prescribed under the act for claiming reliefs though is as per the criminal mandate, but the reliefs are of civil nature and so same needs to deal emphatically which now makes it a lengthier process. The pros and cons of such pronouncements are being weighed on the balance of constitution and social equality that is strived by the entire women fraternity.

Keywords: domestic, violence, constitution, gender, equality, women

Procedia PDF Downloads 479
3673 Land Use Change Detection Using Satellite Images for Najran City, Kingdom of Saudi Arabia (KSA)

Authors: Ismail Elkhrachy

Abstract:

Determination of land use changing is an important component of regional planning for applications ranging from urban fringe change detection to monitoring change detection of land use. This data are very useful for natural resources management.On the other hand, the technologies and methods of change detection also have evolved dramatically during past 20 years. So it has been well recognized that the change detection had become the best methods for researching dynamic change of land use by multi-temporal remotely-sensed data. The objective of this paper is to assess, evaluate and monitor land use change surrounding the area of Najran city, Kingdom of Saudi Arabia (KSA) using Landsat images (June 23, 2009) and ETM+ image(June. 21, 2014). The post-classification change detection technique was applied. At last,two-time subset images of Najran city are compared on a pixel-by-pixel basis using the post-classification comparison method and the from-to change matrix is produced, the land use change information obtained.Three classes were obtained, urban, bare land and agricultural land from unsupervised classification method by using Erdas Imagine and ArcGIS software. Accuracy assessment of classification has been performed before calculating change detection for study area. The obtained accuracy is between 61% to 87% percent for all the classes. Change detection analysis shows that rapid growth in urban area has been increased by 73.2%, the agricultural area has been decreased by 10.5 % and barren area reduced by 7% between 2009 and 2014. The quantitative study indicated that the area of urban class has unchanged by 58.2 km〗^2, gained 70.3 〖km〗^2 and lost 16 〖km〗^2. For bare land class 586.4〖km〗^2 has unchanged, 53.2〖km〗^2 has gained and 101.5〖km〗^2 has lost. While agriculture area class, 20.2〖km〗^2 has unchanged, 31.2〖km〗^2 has gained and 37.2〖km〗^2 has lost.

Keywords: land use, remote sensing, change detection, satellite images, image classification

Procedia PDF Downloads 502
3672 Improving Early Detection, Diagnosis And Intervention For Children With Autism Spectrum Disorder: A Cross-sectional Survey In China

Authors: Yushen Dai, Tao Deng, Miaoying Chen, Baoqin Huang, Yan Ji, Yongshen Feng, Shaofei Liu, Dongmei Zhong, Tao Zhang, Lifeng Zhang

Abstract:

Background: Detection and diagnosis are prerequisites for early interventions in the care of children with Autism Spectrum Disorder (ASD). However, few studies have focused on this topic. Aim: This study aims to characterize the timing from symptom detection to intervention in children with ASD and to identify the potential predictors of early detection, diagnosis, and intervention. Methods and procedures: A cross-sectional survey was conducted with 314 parents of children with ASD in Guangzhou, China. Outcomes and Results: This study found that most children (76.24%) were diagnosed within one year after detection, and 25.8% of them did not receive the intervention after diagnosis. Predictors to ASD diagnosis included ASD-related symptoms identified at a younger age, more serious symptoms, and initial symptoms with abnormal development and sensory anomalies. ASD-related symptoms observed at an older age, initial symptoms with the social deficit, sensory anomalies, and without language impairment, parents as the primary caregivers, family with lower income and less social support utilization increased the odds of the time lag between detection and diagnosis. Children whose fathers had a lower level of education were less likely to receive the intervention. Conclusions and Implications: The study described the time for detection, diagnosis, and interventions of children with ASD. Findings suggest that the ASD-related symptoms, the timing at which symptoms first become a concern, primary caregivers’ roles, father’s educational level, and the family economic status should be considered when offering support to improve early detection, diagnosis, and intervention. Helping children and their families take full advantage of support is also important.

Keywords: autism spectrum disorder, child, detection, diagnosis, intervention, social support

Procedia PDF Downloads 64
3671 Fully Automated Methods for the Detection and Segmentation of Mitochondria in Microscopy Images

Authors: Blessing Ojeme, Frederick Quinn, Russell Karls, Shannon Quinn

Abstract:

The detection and segmentation of mitochondria from fluorescence microscopy are crucial for understanding the complex structure of the nervous system. However, the constant fission and fusion of mitochondria and image distortion in the background make the task of detection and segmentation challenging. In the literature, a number of open-source software tools and artificial intelligence (AI) methods have been described for analyzing mitochondrial images, achieving remarkable classification and quantitation results. However, the availability of combined expertise in the medical field and AI required to utilize these tools poses a challenge to its full adoption and use in clinical settings. Motivated by the advantages of automated methods in terms of good performance, minimum detection time, ease of implementation, and cross-platform compatibility, this study proposes a fully automated framework for the detection and segmentation of mitochondria using both image shape information and descriptive statistics. Using the low-cost, open-source python and openCV library, the algorithms are implemented in three stages: pre-processing, image binarization, and coarse-to-fine segmentation. The proposed model is validated using the mitochondrial fluorescence dataset. Ground truth labels generated using a Lab kit were also used to evaluate the performance of our detection and segmentation model. The study produces good detection and segmentation results and reports the challenges encountered during the image analysis of mitochondrial morphology from the fluorescence mitochondrial dataset. A discussion on the methods and future perspectives of fully automated frameworks conclude the paper.

Keywords: 2D, binarization, CLAHE, detection, fluorescence microscopy, mitochondria, segmentation

Procedia PDF Downloads 338