Search results for: detecting unknown viruses
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1792

Search results for: detecting unknown viruses

1372 Video Based Automatic License Plate Recognition System

Authors: Ali Ganoun, Wesam Algablawi, Wasim BenAnaif

Abstract:

Video based traffic surveillance based on License Plate Recognition (LPR) system is an essential part for any intelligent traffic management system. The LPR system utilizes computer vision and pattern recognition technologies to obtain traffic and road information by detecting and recognizing vehicles based on their license plates. Generally, the video based LPR system is a challenging area of research due to the variety of environmental conditions. The LPR systems used in a wide range of commercial applications such as collision warning systems, finding stolen cars, controlling access to car parks and automatic congestion charge systems. This paper presents an automatic LPR system of Libyan license plate. The performance of the proposed system is evaluated with three video sequences.

Keywords: license plate recognition, localization, segmentation, recognition

Procedia PDF Downloads 442
1371 A Secure Survey against Black Hole Attack in MANET

Authors: G. Usha, S. Kannimuthu, K. Mahalakshmi

Abstract:

Mobile Adhoc Network (MANET) is one of the most promising technologies that have applications ranging from various portable devices to military networks. MANET has no fixed infrastructure and the security of such network is a big concern. Therefore, in order to operate MANET’s securely, the misbehavior and intrusions should be detected before the attackers affect the network communication. In this article, we make a comprehensive survey against black hole attack that is a serious threat against MANET that exploits the routing behavior of the MANET. We have given broad survey solutions that detect black hole attacks in MANET. This is achieved by analyzing the techniques involved in detecting the attacks in each scheme. Furthermore, we examine about the challenges to the researchers for constructing an in-depth solution against black hole attack.

Keywords: AODV, cross layer security, mobile Adhoc network (MANET), packet delivery ratio, single layer security

Procedia PDF Downloads 385
1370 Prototype of Low-Cost Safety-Suit for Manual Scavengers in India

Authors: Noopur Anand, Amit Gupta

Abstract:

Sewage divers are the workers involved in cleaning and maintaining of the sewerage lines by entering through manholes. The working conditions of sewage divers in India are more challenging than in other countries. Though India has legal acts framed to ensure protection of the divers called 'The Prohibition of Employment of Manual Scavengers and their Rehabilitation Act, 2013' by Ministry of Law and Justice but these are usually not implemented. Further, the divers are not even provided with safety gear like mask, eyewear, helmet, safety suit, safety belt, gloves, and shoes because of lack of initiative among the agencies/individuals employing them and low awareness of importance of the protective gear amongst workers themselves. Several reports and studies show that because of the non-availability of safety gear, many sewage workers get infected and many of them retire even before attaining superannuation and about 70% of the manual scavengers die while on job. Though there are neoprene safety suits, costing only a few thousand, available in the market which can suffice but is beyond the buying capacity of the sewage diver and agencies/individuals employing them are reluctant to procure it as they find it expensive. In absence of safety suits, the divers get exposed to the parasites, viruses, and disease-causing germs present in the sewage. The research was undertaken with the objective of developing an affordable safety-suit which would save diver from coming into direct contact with the sewage thus preventing infections and diseases. The low cost of the suit may also motivate their employers to procure them for sewage divers.

Keywords: manhole cleaner, manual scavenger, prototype, low-cost safety-suit

Procedia PDF Downloads 150
1369 Lying in a Sender-Receiver Deception Game: Effects of Gender and Motivation to Deceive

Authors: Eitan Elaad, Yeela Gal-Gonen

Abstract:

Two studies examined gender differences in lying when the truth-telling bias prevailed and when inspiring lying and distrust. The first study used 156 participants from the community (78 pairs). First, participants completed the Narcissistic Personality Inventory, the Lie- and Truth Ability Assessment Scale (LTAAS), and the Rational-Experiential Inventory. Then, they participated in a deception game where they performed as senders and receivers of true and false communications. Their goal was to retain as many points as possible according to a payoff matrix that specified the reward they would gain for any possible outcome. Results indicated that males in the sender position lied more and were more successful tellers of lies and truths than females. On the other hand, males, as receivers, trusted less than females but were not better at detecting lies and truths. We explained the results by a. Male's high perceived lie-telling ability. We observed that confidence in telling lies guided participants to increase their use of lies. Male's lie-telling confidence corresponded to earlier accounts that showed a consistent association between high self-assessed lying ability, reports of frequent lying, and predictions of actual lying in experimental settings; b. Male's narcissistic features. Earlier accounts described positive relations between narcissism and reported lying or unethical behavior in everyday life situations. Predictions about the association between narcissism and frequent lying received support in the present study. Furthermore, males scored higher than females on the narcissism scale; and c. Male's experiential thinking style. We observed that males scored higher than females on the experiential thinking style scale. We further hypothesized that the experiential thinking style predicts frequent lying in the deception game. Results confirmed the hypothesis. The second study used one hundred volunteers (40 females) who underwent the same procedure. However, the payoff matrix encouraged lying and distrust. Results showed that male participants lied more than females. We found no gender differences in trust. Males and females did not differ in their success of telling and detecting lies and truths. Participants also completed the LTAAS questionnaire. Males assessed their lie-telling ability higher than females, but the ability assessment did not predict lying frequency. A final note. The present design is limited to low stakes. Participants knew that they were participating in a game, and they would not experience any consequences from their deception in the game. Therefore, we advise caution when applying the present results to lying under high stakes.

Keywords: gender, lying, detection of deception, information processing style, self-assessed lying ability

Procedia PDF Downloads 127
1368 Effect of Hypoxia on AOX2 Expression in Chlamydomonas reinhardtii

Authors: Maria Ostroukhova, Zhanneta Zalutskaya, Elena Ermilova

Abstract:

The alternative oxidase (AOX) mediates cyanide-resistant respiration, which bypasses proton-pumping complexes III and IV of the cytochrome pathway to directly transfer electrons from reduced ubiquinone to molecular oxygen. In Chlamydomonas reinhardtii, AOX is a monomeric protein that is encoded by two genes of discrete subfamilies, AOX1 and AOX2. Although AOX has been proposed to play essential roles in stress tolerance of organisms, the role of subfamily AOX2 is largely unknown. In C. reinhardtii, AOX2 was initially identified as one of constitutively low expressed genes. Like other photosynthetic organisms C. reinhardtii cells frequently experience periods of hypoxia. To examine AOX2 transcriptional regulation and role of AOX2 in hypoxia adaptation, real-time PCR analysis and artificial microRNA method were employed. Two experimental approaches have been used to induce the anoxic conditions: dark-anaerobic and light-anaerobic conditions. C. reinhardtii cells exposed to the oxygen deprivation have shown increased AOX2 mRNA levels. By contrast, AOX1 was not an anoxia-responsive gene. In C. reinhardtii, a subset of genes is regulated by transcription factor CRR1 in anaerobic conditions. Notable, the AOX2 promoter region contains the potential motif for CRR1 binding. Therefore, the role of CRR1 in the control of AOX2 transcription was tested. The CRR1-underexpressing strains, that were generated and characterized in this work, exhibited low levels of AOX2 transcripts under anoxic conditions. However, the transformants still slightly induced AOX2 gene expression in the darkness. These confirmed our suggestions that darkness is a regulatory stimulus for AOX genes in C. reinhardtii. Thus, other factors must contribute to AOX2 promoter activity under dark-anoxic conditions. Moreover, knock-down of CRR1 caused a complete reduction of AOX2 expression under light-anoxic conditions. These results indicate that (1) CRR1 is required for AOX2 expression during hypoxia, and (2) AOX2 gene is regulated by CRR1 together with yet-unknown regulatory factor(s). In addition, the AOX2-underexpressing strains were generated. The analysis of amiRNA-AOX2 strains suggested a role of this alternative oxidase in hypoxia adaptation of the alga. In conclusion, the results reported here show that C. reinhardtii AOX2 gene is stress inducible. CRR1 transcriptional factor is involved in the regulation of the AOX2 gene expression in the absence of oxygen. Moreover, AOX2 but not AOX1 functions under oxygen deprivation. This work was supported by Russian Science Foundation (research grant № 16-14-10004).

Keywords: alternative oxidase 2, artificial microRNA approach, chlamydomonas reinhardtii, hypoxia

Procedia PDF Downloads 219
1367 A Fuzzy Nonlinear Regression Model for Interval Type-2 Fuzzy Sets

Authors: O. Poleshchuk, E. Komarov

Abstract:

This paper presents a regression model for interval type-2 fuzzy sets based on the least squares estimation technique. Unknown coefficients are assumed to be triangular fuzzy numbers. The basic idea is to determine aggregation intervals for type-1 fuzzy sets, membership functions of whose are low membership function and upper membership function of interval type-2 fuzzy set. These aggregation intervals were called weighted intervals. Low and upper membership functions of input and output interval type-2 fuzzy sets for developed regression models are considered as piecewise linear functions.

Keywords: interval type-2 fuzzy sets, fuzzy regression, weighted interval

Procedia PDF Downloads 344
1366 Monitoring of Humoral Immune Response of Monovalent and Combined PPR and FMD Serotype 'O' Virus Vaccines in Goats

Authors: Mudassar Hameed, Khushi Muhammad, Aamir Ghafoor, Masood Rabbani, Momena Habib, Jawad Nazir

Abstract:

Comparative efficacy of three formulations (non-adjuvant, gel, and oil adjuvant) of monovalent and combined PPR and FMD virus vaccines was evaluated in goats. All kinds of monovalent PPRV vaccines elicited protective antibody titers at one-month post vaccination (PV) that remained so till six months PV. Monovalent non-adjuvant (NA) FMDV vaccine provoked non-protective antibody titers that declined to undetectable levels after three months. In case of combined vaccines, all of the formulations elicited protective antibody titers against PPRV in vaccinated animals which remained above that limit for six months. However, an exceptional immune response against FMDV was observed in combined NA vaccine group where antibody titers were extremely high and remained above protective level till 4 months PV in animals who received a single vaccine shot and till six months PV in booster group. Although, adjuvant or NA combined vaccines can induce protective antibody titers against both of the viruses within one month PV, but a booster vaccine shot is needed to retain protective antibody level for 6 months duration. Immune response elicited by combined vaccines is comparable or superior to the monovalent vaccines. Hence combined vaccine can be effectively used for the control and prevention of both of the diseases.

Keywords: antibody titer, protective, combined vaccine, non adjuvant

Procedia PDF Downloads 184
1365 Is Obesity Associated with CKD-(unknown) in Sri Lanka? A Protocol for a Cross Sectional Survey

Authors: Thaminda Liyanage, Anuga Liyanage, Chamila Kurukulasuriya, Sidath Bandara

Abstract:

Background: The burden of chronic kidney disease (CKD) is growing rapidly around the world, particularly in Asia. Over the last two decades Sri Lanka has experienced an epidemic of CKD with ever growing number of patients pursuing medical care due to CKD and its complications, specially in the “Mahaweli” river basin in north central region of the island nation. This was apparently a new form of CKD which was not attributable to conventional risk factors such as diabetes mellitus, hypertension or infection and widely termed as “CKD-unknown” or “CKDu”. In the past decade a number of small scale studies were conducted to determine the aetiology, prevalence and complications of CKDu in North Central region. These hospital-based studies did not provide an accurate estimate of the problem as merely 10% or less of the people with CKD are aware of their diagnosis even in developed countries with better access to medical care. Interestingly, similar observations were made on the changing epidemiology of obesity in the region but no formal study was conducted to date to determine the magnitude of obesity burden. Moreover, if increasing obesity in the region is associated with CKD epidemic is yet to be explored. Methods: We will conduct an area wide cross sectional survey among all adult residents of the “Mahaweli” development project area 5, in the North Central Province of Sri Lanka. We will collect relevant medical history, anthropometric measurements, blood and urine for hematological and biochemical analysis. We expect a participation rate of 75%-85% of all eligible participants. Participation in the study is voluntary, there will be no incentives provided for participation. Every analysis will be conducted in a central laboratory and data will be stored securely. We will calculate the prevalence of obesity and chronic kidney disease, overall and by stage using total number of participants as the denominator and report per 1000 population. The association of obesity and CKD will be assessed with regression models and will be adjusted for potential confounding factors and stratified by potential effect modifiers where appropriate. Results: This study will provide accurate information on the prevalence of obesity and CKD in the region. Furthermore, this will explore the association between obesity and CKD, although causation may not be confirmed. Conclusion: Obesity and CKD are increasingly recognized as major public health problems in Sri Lanka. Clearly, documenting the magnitude of the problem is the essential first step. Our study will provide this vital information enabling the government to plan a coordinated response to tackle both obesity and CKD in the region.

Keywords: BMI, Chronic Kidney Disease, obesity, Sri Lanka

Procedia PDF Downloads 245
1364 Application of an Artificial Neural Network to Determine the Risk of Malignant Tumors from the Images Resulting from the Asymmetry of Internal and External Thermograms of the Mammary Glands

Authors: Amdy Moustapha Drame, Ilya V. Germashev, E. A. Markushevskaya

Abstract:

Among the main problems of medicine is breast cancer, from which a significant number of women around the world are constantly dying. Therefore, the detection of malignant breast tumors is an urgent task. For many years, various technologies for detecting these tumors have been used, in particular, in thermal imaging in order to determine different levels of breast cancer development. These periodic screening methods are a diagnostic tool for women and may have become an alternative to older methods such as mammography. This article proposes a model for the identification of malignant neoplasms of the mammary glands by the asymmetry of internal and external thermal imaging fields.

Keywords: asymmetry, breast cancer, tumors, deep learning, thermogram, convolutional transformation, classification

Procedia PDF Downloads 25
1363 An EWMA P-Chart Based on Improved Square Root Transformation

Authors: Saowanit Sukparungsee

Abstract:

Generally, the traditional Shewhart p chart has been developed by for charting the binomial data. This chart has been developed using the normal approximation with condition as low defect level and the small to moderate sample size. In real applications, however, are away from these assumptions due to skewness in the exact distribution. In this paper, a modified Exponentially Weighted Moving Average (EWMA) control chat for detecting a change in binomial data by improving square root transformations, namely ISRT p EWMA control chart. The numerical results show that ISRT p EWMA chart is superior to ISRT p chart for small to moderate shifts, otherwise, the latter is better for large shifts.

Keywords: number of defects, exponentially weighted moving average, average run length, square root transformations

Procedia PDF Downloads 416
1362 Digital Recording System Identification Based on Audio File

Authors: Michel Kulhandjian, Dimitris A. Pados

Abstract:

The objective of this work is to develop a theoretical framework for reliable digital recording system identification from digital audio files alone, for forensic purposes. A digital recording system consists of a microphone and a digital sound processing card. We view the cascade as a system of unknown transfer function. We expect same manufacturer and model microphone-sound card combinations to have very similar/near identical transfer functions, bar any unique manufacturing defect. Input voice (or other) signals are modeled as non-stationary processes. The technical problem under consideration becomes blind deconvolution with non-stationary inputs as it manifests itself in the specific application of digital audio recording equipment classification.

Keywords: blind system identification, audio fingerprinting, blind deconvolution, blind dereverberation

Procedia PDF Downloads 285
1361 Application of Remote Sensing and GIS in Assessing Land Cover Changes within Granite Quarries around Brits Area, South Africa

Authors: Refilwe Moeletsi

Abstract:

Dimension stone quarrying around Brits and Belfast areas started in the early 1930s and has been growing rapidly since then. Environmental impacts associated with these quarries have not been documented, and hence this study aims at detecting any change in the environment that might have been caused by these activities. Landsat images that were used to assess land use/land cover changes in Brits quarries from 1998 - 2015. A supervised classification using maximum likelihood classifier was applied to classify each image into different land use/land cover types. Classification accuracy was assessed using Google Earth™ as a source of reference data. Post-classification change detection method was used to determine changes. The results revealed significant increase in granite quarries and corresponding decrease in vegetation cover within the study region.

Keywords: remote sensing, GIS, change detection, granite quarries

Procedia PDF Downloads 290
1360 OFDM Radar for High Accuracy Target Tracking

Authors: Mahbube Eghtesad

Abstract:

For a number of years, the problem of simultaneous detection and tracking of a target has been one of the most relevant and challenging issues in a wide variety of military and civilian systems. We develop methods for detecting and tracking a target using an orthogonal frequency division multiplexing (OFDM) based radar. As a preliminary step we introduce the target trajectory and Gaussian noise model in discrete time form. Then resorting to match filter and Kalman filter we derive a detector and target tracker. After that we propose an OFDM radar in order to achieve further improvement in tracking performance. The motivation for employing multiple frequencies is that the different scattering centers of a target resonate differently at each frequency. Numerical examples illustrate our analytical results, demonstrating the achieved performance improvement due to the OFDM signaling method.

Keywords: matched filter, target trashing, OFDM radar, Kalman filter

Procedia PDF Downloads 375
1359 Blind Speech Separation Using SRP-PHAT Localization and Optimal Beamformer in Two-Speaker Environments

Authors: Hai Quang Hong Dam, Hai Ho, Minh Hoang Le Ngo

Abstract:

This paper investigates the problem of blind speech separation from the speech mixture of two speakers. A voice activity detector employing the Steered Response Power - Phase Transform (SRP-PHAT) is presented for detecting the activity information of speech sources and then the desired speech signals are extracted from the speech mixture by using an optimal beamformer. For evaluation, the algorithm effectiveness, a simulation using real speech recordings had been performed in a double-talk situation where two speakers are active all the time. Evaluations show that the proposed blind speech separation algorithm offers a good interference suppression level whilst maintaining a low distortion level of the desired signal.

Keywords: blind speech separation, voice activity detector, SRP-PHAT, optimal beamformer

Procedia PDF Downloads 265
1358 Machine Learning Methods for Network Intrusion Detection

Authors: Mouhammad Alkasassbeh, Mohammad Almseidin

Abstract:

Network security engineers work to keep services available all the time by handling intruder attacks. Intrusion Detection System (IDS) is one of the obtainable mechanisms that is used to sense and classify any abnormal actions. Therefore, the IDS must be always up to date with the latest intruder attacks signatures to preserve confidentiality, integrity, and availability of the services. The speed of the IDS is a very important issue as well learning the new attacks. This research work illustrates how the Knowledge Discovery and Data Mining (or Knowledge Discovery in Databases) KDD dataset is very handy for testing and evaluating different Machine Learning Techniques. It mainly focuses on the KDD preprocess part in order to prepare a decent and fair experimental data set. The J48, MLP, and Bayes Network classifiers have been chosen for this study. It has been proven that the J48 classifier has achieved the highest accuracy rate for detecting and classifying all KDD dataset attacks, which are of type DOS, R2L, U2R, and PROBE.

Keywords: IDS, DDoS, MLP, KDD

Procedia PDF Downloads 212
1357 The Impact of Diseases and Epidemics in the Field of Medicine and Health in General

Authors: Nedjar Abdelhadi

Abstract:

The pharmaceutical industry is one of the most important structures and foundations for the management and development of the modern world, especially the advanced part of it, meaning that there are some exceptions for third-world countries. The world today has witnessed radical transformations and changes, some of which made it better and some of which affected the path of its growth. At the beginning of my research, there was a detailed presentation overview of the current situation of the world in terms of growth and development, and it proceeded through that overview as the introduction to my research. The first chapter had divided into three sections; each topic was unique to one of the new methods of manufacturing, deducing and developing medicines Several examples of various recently developed medicines were used The second chapter dealt with the defects and shortcomings that pioneers and drug makers at various levels, as well as various regions and major companies, suffer from on the basis that they are international, especially those specialized in the manufacture of medicines related to viruses and chronic diseases, as well as incurable. As for the third chapter, it was devoted to marketing methods, methods of achieving sales, as well as the basics of spreading medicines and preparing the minds of consumers. Through my research, the one concluded that the current world has become completely different from the world we used to know, and it means by saying the field of manufacturing, selling and marketing medicines. It was noted that one of the biggest factors that affected the change in the field of medicine was the corona disaster. At the end of my research, I was left with nothing but to show the importance and necessity of the pharmaceutical industry and its effective role, not only in the development of mankind, but its main role is in the survival of mankind.

Keywords: health, diseases, medicine, epidemics

Procedia PDF Downloads 53
1356 Detecting Logical Errors in Haskell

Authors: Vanessa Vasconcelos, Mariza A. S. Bigonha

Abstract:

In order to facilitate both processes, this paper presents HaskellFL, a tool that uses fault localization techniques to locate a logical error in Haskell code. The Haskell subset used in this work is sufficiently expressive for those studying functional programming to get immediate help debugging their code and to answer questions about key concepts associated with the functional paradigm. HaskellFL was tested against functional programming assignments submitted by students enrolled at the functional programming class at the Federal University of Minas Gerais and against exercises from the Exercism Haskell track that are publicly available on GitHub. Furthermore, the EXAM score was chosen to evaluate the tool’s effectiveness, and results showed that HaskellFL reduced the effort needed to locate an error for all tested scenarios. Results also showed that the Ochiai method was more effective than Tarantula.

Keywords: debug, fault localization, functional programming, Haskell

Procedia PDF Downloads 279
1355 The Effect of Corporate Governance on Earnings Management: When Firms Report Increasing Earnings

Authors: Su-Ping Liu, Yue Tian, Yifan Shen

Abstract:

This study investigates the effect of corporate governance on earnings management when firms have reported a long stream of earnings increases (hereafter referred to as earnings beaters). We expect that good quality of corporate governance decreases the probability of income-increasing earnings management. We employ transparent tools to capture firms’ opportunistic management behavior, specifically, the repurchase of stock. In addition, we use corporate governance proxies to measure the degree of corporate governance, including board size, board independence, CEO duality, and the frequency of meeting. The results hold after the controlling of variables that suggested in prior literature. We expect that the simple technique, that is, firms’ degree of corporate governance, to be used as an inexpensive first step in detecting earnings management.

Keywords: corporate governance, earnings management, earnings patterns, stock repurchase

Procedia PDF Downloads 141
1354 Suggestion of Methodology to Detect Building Damage Level Collectively with Flood Depth Utilizing Geographic Information System at Flood Disaster in Japan

Authors: Munenari Inoguchi, Keiko Tamura

Abstract:

In Japan, we were suffered by earthquake, typhoon, and flood disaster in 2019. Especially, 38 of 47 prefectures were affected by typhoon #1919 occurred in October 2019. By this disaster, 99 people were dead, three people were missing, and 484 people were injured as human damage. Furthermore, 3,081 buildings were totally collapsed, 24,998 buildings were half-collapsed. Once disaster occurs, local responders have to inspect damage level of each building by themselves in order to certificate building damage for survivors for starting their life reconstruction process. At that disaster, the total number to be inspected was so high. Based on this situation, Cabinet Office of Japan approved the way to detect building damage level efficiently, that is collectively detection. However, they proposed a just guideline, and local responders had to establish the concrete and infallible method by themselves. Against this issue, we decided to establish the effective and efficient methodology to detect building damage level collectively with flood depth. Besides, we thought that the flood depth was relied on the land height, and we decided to utilize GIS (Geographic Information System) for analyzing the elevation spatially. We focused on the analyzing tool of spatial interpolation, which is utilized to survey the ground water level usually. In establishing the methodology, we considered 4 key-points: 1) how to satisfy the condition defined in the guideline approved by Cabinet Office for detecting building damage level, 2) how to satisfy survivors for the result of building damage level, 3) how to keep equitability and fairness because the detection of building damage level was executed by public institution, 4) how to reduce cost of time and human-resource because they do not have enough time and human-resource for disaster response. Then, we proposed a methodology for detecting building damage level collectively with flood depth utilizing GIS with five steps. First is to obtain the boundary of flooded area. Second is to collect the actual flood depth as sampling over flooded area. Third is to execute spatial analysis of interpolation with sampled flood depth to detect two-dimensional flood depth extent. Fourth is to divide to blocks by four categories of flood depth (non-flooded, over the floor to 100 cm, 100 cm to 180 cm and over 180 cm) following lines of roads for getting satisfaction from survivors. Fifth is to put flood depth level to each building. In Koriyama city of Fukushima prefecture, we proposed the methodology of collectively detection for building damage level as described above, and local responders decided to adopt our methodology at typhoon #1919 in 2019. Then, we and local responders detect building damage level collectively to over 1,000 buildings. We have received good feedback that the methodology was so simple, and it reduced cost of time and human-resources.

Keywords: building damage inspection, flood, geographic information system, spatial interpolation

Procedia PDF Downloads 106
1353 A Conglomerate of Multiple Optical Character Recognition Table Detection and Extraction

Authors: Smita Pallavi, Raj Ratn Pranesh, Sumit Kumar

Abstract:

Information representation as tables is compact and concise method that eases searching, indexing, and storage requirements. Extracting and cloning tables from parsable documents is easier and widely used; however, industry still faces challenges in detecting and extracting tables from OCR (Optical Character Recognition) documents or images. This paper proposes an algorithm that detects and extracts multiple tables from OCR document. The algorithm uses a combination of image processing techniques, text recognition, and procedural coding to identify distinct tables in the same image and map the text to appropriate the corresponding cell in dataframe, which can be stored as comma-separated values, database, excel, and multiple other usable formats.

Keywords: table extraction, optical character recognition, image processing, text extraction, morphological transformation

Procedia PDF Downloads 124
1352 Application of Digital Tools for Improving Learning

Authors: José L. Jiménez

Abstract:

The use of technology in the classroom is an issue that is constantly evolving. Digital age students learn differently than their teachers did, so now the teacher should be constantly evolving their methods and teaching techniques to be more in touch with the student. In this paper a case study presents how were used some of these technologies by accompanying a classroom course, this in order to provide students with a different and innovative experience as their teacher usually presented the activities to develop. As students worked in the various activities, they increased their digital skills by employing unknown tools that helped them in their professional training. The twenty-first century teacher should consider the use of Information and Communication Technologies in the classroom thinking in skills that students of the digital age should possess. It also takes a brief look at the history of distance education and it is also highlighted the importance of integrating technology as part of the student's training.

Keywords: digital tools, on-line learning, social networks, technology

Procedia PDF Downloads 376
1351 An Automated R-Peak Detection Method Using Common Vector Approach

Authors: Ali Kirkbas

Abstract:

R peaks in an electrocardiogram (ECG) are signs of cardiac activity in individuals that reveal valuable information about cardiac abnormalities, which can lead to mortalities in some cases. This paper examines the problem of detecting R-peaks in ECG signals, which is a two-class pattern classification problem in fact. To handle this problem with a reliable high accuracy, we propose to use the common vector approach which is a successful machine learning algorithm. The dataset used in the proposed method is obtained from MIT-BIH, which is publicly available. The results are compared with the other popular methods under the performance metrics. The obtained results show that the proposed method shows good performance than that of the other. methods compared in the meaning of diagnosis accuracy and simplicity which can be operated on wearable devices.

Keywords: ECG, R-peak classification, common vector approach, machine learning

Procedia PDF Downloads 37
1350 Justitium: Endangered Species and Humanitarian Interventions in the Anthropocene Era

Authors: Eleni Panagiotarakou

Abstract:

This paper argues that humans have a collective moral responsibility to help wild animals during the Anthropocene era. Seen from the perspective of deontic logic, this moral responsibility did not exist in the Holocene era (ca. 11,700 BC-1945 AD) on account of humanity’s limited impact on the natural environment. By contrast in the Anthropocene, human activities are causing significant disturbances to planetary ecosystems and by inference to wildlife communities. Under these circumstances controversial and deeply regrettable interventional methods such as Managed Relocations (MR) and synthetic biology should be expanded and become policy measures despite their known and unknown risks. The main rationale for the above stems from the fact that traditional management strategies are simply insufficient in the Anthropocene. If the same anthropogenic activities continue unabated they risk triggering a sixth mass species extinction.

Keywords: anthropocene, humanitarian interventions, managed relocations, species extinctions, synthetic biology

Procedia PDF Downloads 225
1349 To Individualisation of Subject, Donar, by Determination of Serological Markers from Obtain Biological Fluid at Crime Scene

Authors: Arun Kumar, Ravindra Pal Verma, Harsh Sharma, Shani Kumar

Abstract:

For the present study samples was collected from 20 donors with unknown blood group and secretor status had been determined from saliva by using biological fluid. ABO typing on the concentrated samples was successfully performed after 1 month of storage. Urine stained clothing samples are often submitted to forensic science laboratories for ABH blood group antigen determination. The serogenetic markers of semen stains submitted can be used to determine the origin of any of these samples. ABH blood group substances have previously been identified from urine. ABH blood group substance is low in urine in comparison with other body fluids.

Keywords: ABH blood group, crime scene, serological markers, body fluids and urine

Procedia PDF Downloads 560
1348 Application of Semantic Technologies in Rapid Reconfiguration of Factory Systems

Authors: J. Zhang, K. Agyapong-Kodua

Abstract:

Digital factory based on visual design and simulation has emerged as a mainstream to reduce digital development life cycle. Some basic industrial systems are being integrated via semantic modelling, and products (P) matching process (P)-resource (R) requirements are designed to fulfill current customer demands. Nevertheless, product design is still limited to fixed product models and known knowledge of product engineers. Therefore, this paper presents a rapid reconfiguration method based on semantic technologies with PPR ontologies to reuse known and unknown knowledge. In order to avoid the influence of big data, our system uses a cloud manufactory and distributed database to improve the efficiency of querying meeting PPR requirements.

Keywords: semantic technologies, factory system, digital factory, cloud manufactory

Procedia PDF Downloads 465
1347 Object Recognition Approach Based on Generalized Hough Transform and Color Distribution Serving in Generating Arabic Sentences

Authors: Nada Farhani, Naim Terbeh, Mounir Zrigui

Abstract:

The recognition of the objects contained in images has always presented a challenge in the field of research because of several difficulties that the researcher can envisage because of the variability of shape, position, contrast of objects, etc. In this paper, we will be interested in the recognition of objects. The classical Hough Transform (HT) presented a tool for detecting straight line segments in images. The technique of HT has been generalized (GHT) for the detection of arbitrary forms. With GHT, the forms sought are not necessarily defined analytically but rather by a particular silhouette. For more precision, we proposed to combine the results from the GHT with the results from a calculation of similarity between the histograms and the spatiograms of the images. The main purpose of our work is to use the concepts from recognition to generate sentences in Arabic that summarize the content of the image.

Keywords: recognition of shape, generalized hough transformation, histogram, spatiogram, learning

Procedia PDF Downloads 133
1346 General Principles of Accident Prevention in Built Environment Rehabilitation

Authors: Alfredo Soeiro

Abstract:

Rehabilitation in construction or built environment is a particular type of operations when concerning prevention of accidents. In fact, it is also a different type of task in construction itself. Therefore, due to the complex characteristics of construction rehabilitation tasks and due to the intrinsic difficulty of preventing accidents in construction, a major challenge faces the responsibility for implementing adequate safety levels in this type of safety management. This paper addresses a set of proposed generic measures to face the unknown characteristics of built environment in terms of stability, materials and actual performance of buildings or other constructions. It is also addressed the necessary adaptation of preventive guidelines to this type of delicate refurbishing and renovating of existing facilities. Training, observation and reflective approaches are necessary to perform this safety management in the rehabilitation of built environment.

Keywords: built environment, rehabilitation, construction safety, accident prevention, safety plan

Procedia PDF Downloads 188
1345 Ultrasensitive Hepatitis B Virus Detection in Blood Using Nano-Porous Silicon Oxide: Towards POC Diagnostics

Authors: N. Das, N. Samanta, L. Pandey, C. Roy Chaudhuri

Abstract:

Early diagnosis of infection like Hep-B virus in blood is important for low cost medical treatment. For this purpose, it is desirable to develop a point of care device which should be able to detect trace quantities of the target molecule in blood. In this paper, we report a nanoporous silicon oxide sensor which is capable of detecting down to 1fM concentration of Hep-B surface antigen in blood without the requirement of any centrifuge or pre-concentration. This has been made possible by the presence of resonant peak in the sensitivity characteristics. This peak is observed to be dependent only on the concentration of the specific antigen and not on the interfering species in blood serum. The occurrence of opposite impedance change within the pores and at the bottom of the pore is responsible for this effect. An electronic interface has also been designed to provide a display of the virus concentration.

Keywords: impedance spectroscopy, ultrasensitive detection in blood, peak frequency, electronic interface

Procedia PDF Downloads 379
1344 Robust Diagnosis Efficiency by Bond-Graph Approach

Authors: Benazzouz Djamel, Termeche Adel, Touati Youcef, Alem Said, Ouziala Mahdi

Abstract:

This paper presents an approach which detect and isolate efficiently a fault in a system. This approach avoids false alarms, non-detections and delays in detecting faults. A study case have been proposed to show the importance of taking into consideration the uncertainties in the decision-making procedure and their effect on the degradation diagnostic performance and advantage of using Bond Graph (BG) for such degradation. The use of BG in the Linear Fractional Transformation (LFT) form allows generating robust Analytical Redundancy Relations (ARR’s), where the uncertain part of ARR’s is used to generate the residuals adaptive thresholds. The study case concerns an electromechanical system composed of a motor, a reducer and an external load. The aim of this application is to show the effectiveness of the BG-LFT approach to robust fault detection.

Keywords: bond graph, LFT, uncertainties, detection and faults isolation, ARR

Procedia PDF Downloads 284
1343 Design and Manufacture of Non-Contact Moving Load for Experimental Analysis of Beams

Authors: Firooz Bakhtiari-Nejad, Hamidreza Rostami, Meysam Mirzaee, Mona Zandbaf

Abstract:

Dynamic tests are an important step of the design of engineering structures, because the accuracy of predictions of theoretical–numerical procedures can be assessed. In experimental test of moving loads that is one of the major research topics, the load is modeled as a simple moving mass or a small vehicle. This paper deals with the applicability of Non-Contact Moving Load (NML) for vibration analysis. For this purpose, an experimental set-up is designed to generate the different types of NML including constant and harmonic. The proposed method relies on pressurized air which is useful, especially when dealing with fragile or sensitive structures. To demonstrate the performance of this system, the set-up is employed for a modal analysis of a beam and detecting crack of the beam. The obtained results indicate that the experimental set-up for NML can be an attractive alternative to the moving load problems.

Keywords: experimental analysis, moving load, non-contact excitation, materials engineering

Procedia PDF Downloads 437