Search results for: event region detection
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 8877

Search results for: event region detection

8427 Using Deep Learning for the Detection of Faulty RJ45 Connectors on a Radio Base Station

Authors: Djamel Fawzi Hadj Sadok, Marrone Silvério Melo Dantas Pedro Henrique Dreyer, Gabriel Fonseca Reis de Souza, Daniel Bezerra, Ricardo Souza, Silvia Lins, Judith Kelner

Abstract:

A radio base station (RBS), part of the radio access network, is a particular type of equipment that supports the connection between a wide range of cellular user devices and an operator network access infrastructure. Nowadays, most of the RBS maintenance is carried out manually, resulting in a time consuming and costly task. A suitable candidate for RBS maintenance automation is repairing faulty links between devices caused by missing or unplugged connectors. A suitable candidate for RBS maintenance automation is repairing faulty links between devices caused by missing or unplugged connectors. This paper proposes and compares two deep learning solutions to identify attached RJ45 connectors on network ports. We named connector detection, the solution based on object detection, and connector classification, the one based on object classification. With the connector detection, we get an accuracy of 0:934, mean average precision 0:903. Connector classification, get a maximum accuracy of 0:981 and an AUC of 0:989. Although connector detection was outperformed in this study, this should not be viewed as an overall result as connector detection is more flexible for scenarios where there is no precise information about the environment and the possible devices. At the same time, the connector classification requires that information to be well-defined.

Keywords: radio base station, maintenance, classification, detection, deep learning, automation

Procedia PDF Downloads 175
8426 Traffic Sign Recognition System Using Convolutional Neural NetworkDevineni

Authors: Devineni Vijay Bhaskar, Yendluri Raja

Abstract:

We recommend a model for traffic sign detection stranded on Convolutional Neural Networks (CNN). We first renovate the unique image into the gray scale image through with support vector machines, then use convolutional neural networks with fixed and learnable layers for revealing and understanding. The permanent layer can reduction the amount of attention areas to notice and crop the limits very close to the boundaries of traffic signs. The learnable coverings can rise the accuracy of detection significantly. Besides, we use bootstrap procedures to progress the accuracy and avoid overfitting problem. In the German Traffic Sign Detection Benchmark, we obtained modest results, with an area under the precision-recall curve (AUC) of 99.49% in the group “Risk”, and an AUC of 96.62% in the group “Obligatory”.

Keywords: convolutional neural network, support vector machine, detection, traffic signs, bootstrap procedures, precision-recall curve

Procedia PDF Downloads 95
8425 Investigating Role of Novel Molecular Players in Forebrain Roof-Plate Midline Invagination

Authors: Mohd Ali Abbas Zaidi, Meenu Sachdeva, Jonaki Sen

Abstract:

In the vertebrate embryo, the forebrain anlagen develops from the anterior-most region of the neural tube which is the precursor of the central nervous system (CNS). The roof plate located at the dorsal midline region of the forebrain anlagen, acts as a source of several secreted molecules involved in patterning and morphogenesis of the forebrain. One such key morphogenetic event is the invagination of the forebrain roof plate which results in separation of the single forebrain vesicle into two cerebral hemispheres. Retinoic acid (RA) signaling plays a key role in this process. Blocking RA signaling at the dorsal forebrain midline inhibits dorsal invagination and results in the absence of certain key features of this region, such as thinning of the neuroepithelium and a lowering of cell proliferation. At present we are investigating the possibility of other signaling pathways acting in concert with RA signaling to regulate this process. We have focused on BMP signaling, which we found to be active in a mutually exclusive domain to that of RA signaling within the roof plate. We have also observed that there is a change in BMP signaling activity on modulation of RA signaling indicating an antagonistic relationship between the two. Moreover, constitutive activation of BMP signaling seems to completely inhibit thinning and partially affect invagination, leaving the lowering of cell proliferation in the midline unaffected. We are employing in-silico modeling as well as molecular manipulations to investigate the relative contribution if any, of regional differences in rates of cell proliferation and thinning of the neuroepithelium towards the process of invagination. We have found expression of certain cell adhesion molecules in forebrain roof-plate whose mRNA localization across the thickness of neuroepithelium is influenced by Bmp and RA signaling, giving regional rigidity to roof plate and assisting invagination. We also found expression of certain cytoskeleton modifiers in a localized small domains in invaginating forebrain roof plate suggesting that midline invagination is under control of many factors.

Keywords: bone morphogenetic signaling, cytoskeleton, cell adhesion molecules, forebrain roof plate, retinoic acid signaling

Procedia PDF Downloads 136
8424 Automatic Post Stroke Detection from Computed Tomography Images

Authors: C. Gopi Jinimole, A. Harsha

Abstract:

For detecting strokes, Computed Tomography (CT) scan is preferred for imaging the abnormalities or infarction in the brain. Because of the problems in the window settings used to evaluate brain CT images, they are very poor in the early stage infarction detection. This paper presents an automatic estimation method for the window settings of the CT images for proper contrast of the hyper infarction present in the brain. In the proposed work the window width is estimated automatically for each slice and the window centre is changed to a new value of 31HU, which is the average of the HU values of the grey matter and white matter in the brain. The automatic window width estimation is based on the average of median of statistical central moments. Thus with the new suggested window centre and estimated window width, the hyper infarction or post-stroke regions in CT brain images are properly detected. The proposed approach assists the radiologists in CT evaluation for early quantitative signs of delayed stroke, which leads to severe hemorrhage in the future can be prevented by providing timely medication to the patients.

Keywords: computed tomography (CT), hyper infarction or post stroke region, Hounsefield Unit (HU), window centre (WC), window width (WW)

Procedia PDF Downloads 185
8423 Neural Correlates of Arabic Digits Naming

Authors: Fernando Ojedo, Alejandro Alvarez, Pedro Macizo

Abstract:

In the present study, we explored electrophysiological correlates of Arabic digits naming to determine semantic processing of numbers. Participants named Arabic digits grouped by category or intermixed with exemplars of other semantic categories while the N400 event-related potential was examined. Around 350-450 ms after the presentation of Arabic digits, brain waves were more positive in anterior regions and more negative in posterior regions when stimuli were grouped by category relative to the mixed condition. Contrary to what was found in other studies, electrophysiological results suggested that the production of numerals involved semantic mediation.

Keywords: Arabic digit naming, event-related potentials, semantic processing, number production

Procedia PDF Downloads 561
8422 Medical Advances in Diagnosing Neurological and Genetic Disorders

Authors: Simon B. N. Thompson

Abstract:

Retinoblastoma is a rare type of childhood genetic cancer that affects children worldwide. The diagnosis is often missed due to lack of education and difficulty in presentation of the tumor. Frequently, the tumor on the retina is noticed by photography when the red-eye flash, commonly seen in normal eyes, is not produced. Instead, a yellow or white colored patch is seen or the child has a noticeable strabismus. Early detection can be life-saving though often results in removal of the affected eye. Remaining functioning in the healthy eye when the child is young has resulted in super-vision and high or above-average intelligence. Technological advancement of cameras has helped in early detection. Brain imaging has also made possible early detection of neurological diseases and, together with the monitoring of cortisol levels and yawning frequency, promises to be the next new early diagnostic tool for the detection of neurological diseases where cortisol insufficiency is particularly salient, such as multiple sclerosis and Cushing’s disease.

Keywords: cortisol, neurological disease, retinoblastoma, Thompson cortisol hypothesis, yawning

Procedia PDF Downloads 372
8421 A Microcosm Study on the Response of Phytoplankton and Bacterial Community of the Subarctic Northeast Atlantic Ocean to Oil Pollution under Projected Atmospheric CO₂ Conditions

Authors: Afiq Mohd Fahmi, Tony Gutierrez, Sebastian Hennige

Abstract:

Increasing amounts of CO₂ entering the marine environment, also known as ocean acidification, is documented as having harmful impacts on a variety of marine organisms. When considering the future risk of hydrocarbon pollution, which is generally detrimental to marine life as well, this needs to consider how OA-induced changes to microbial communities will compound this since hydrocarbon degradation is influenced by the community-level microbial response. This study aims to evaluate the effects of increased atmospheric CO₂ conditions and oil enrichment on the phytoplankton-associated bacterial communities. Faroe Shetland Channel (FSC) is a subarctic region in the northeast Atlantic where crude oil extraction has recently been expanded. In the event of a major oil spill in this region, it is vital that we understand the response of the bacterial community and its consequence on primary production within this region—some phytoplankton communities found in the ocean harbor hydrocarbon-degrading bacteria that are associated with its psychosphere. Surface water containing phytoplankton and bacteria from FSC were cultured in ambient and elevated atmospheric CO₂ conditions for 4 days of acclimation in microcosms before introducing 1% (v/v) of crude oil into the microcosms to simulate oil spill conditions at sea. It was found that elevated CO₂ conditions do not significantly affect the chl a concentration, and exposure to crude oil detrimentally affected chl a concentration up to 10 days after exposure to crude oil. The diversity and richness of the bacterial community were not significantly affected by both CO₂ treatment and oil enrichment. The increase in the relative abundance of known hydrocarbon degraders such as Oleispira, Marinobacter and Halomonas indicates potential for biodegradation of crude oil, while the resilience of dominant taxa Colwellia, unclassified Gammaproteobacteria, unclassified Rnodobacteria and unclassified Halomonadaceae could be associated with the recovery of microalgal community 13 days after oil exposure. Therefore, the microbial community from the subsurface of FSC has the potential to recover from crude oil pollution even under elevated CO₂ (750 ppm) conditions.

Keywords: phytoplankton, bacteria, crude oil, ocean acidification

Procedia PDF Downloads 215
8420 Entrepreneurial Venture Creation through Anchor Event Activities: Pop-Up Stores as On-Site Arenas

Authors: Birgit A. A. Solem, Kristin Bentsen

Abstract:

Scholarly attention in entrepreneurship is currently directed towards understanding entrepreneurial venture creation as a process -the journey of new economic activities from nonexistence to existence often studied through flow- or network models. To complement existing research on entrepreneurial venture creation with more interactivity-based research of organized activities, this study examines two pop-up stores as anchor events involving on-site activities of fifteen participating entrepreneurs launching their new ventures. The pop-up stores were arranged in two middle-sized Norwegian cities and contained different brand stores that brought together actors of sub-networks and communities executing venture creation activities. The pop-up stores became on-site arenas for the entrepreneurs to create, maintain, and rejuvenate their networks, at the same time as becoming venues for temporal coordination of activities involving existing and potential customers in their venture creation. In this work, we apply a conceptual framework based on frequently addressed dilemmas within entrepreneurship theory (discovery/creation, causation/effectuation) to further shed light on the broad aspect of on-site anchor event activities and their venture creation outcomes. The dilemma-based concepts are applied as an analytic toolkit to pursue answers regarding the nature of anchor event activities typically found within entrepreneurial venture creation and how these anchor event activities affect entrepreneurial venture creation outcomes. Our study combines researcher participation with 200 hours of observation and twenty in-depth interviews. Data analysis followed established guidelines for hermeneutic analysis and was intimately intertwined with ongoing data collection. Data was coded and categorized in NVivo 12 software, and iterated several times as patterns were steadily developing. Our findings suggest that core anchor event activities typically found within entrepreneurial venture creation are; a concept- and product experimentation with visitors, arrangements to socialize (evening specials, auctions, and exhibitions), store-in-store concepts, arranged meeting places for peers and close connection with municipality and property owners. Further, this work points to four main entrepreneurial venture creation outcomes derived from the core anchor event activities; (1) venture attention, (2) venture idea-realization, (3) venture collaboration, and (4) venture extension. Our findings show that, depending on which anchor event activities are applied, the outcomes vary. Theoretically, this study offers two main implications. First, anchor event activities are both discovered and created, following the logic of causation, at the same time as being experimental, based on “learning by doing” principles of effectuation during the execution. Second, our research enriches prior studies on venture creation as a process. In this work, entrepreneurial venture creation activities and outcomes are understood through pop-up stores as on-site anchor event arenas, particularly suitable for interactivity-based research requested by the entrepreneurship field. This study also reveals important managerial implications, such as that entrepreneurs should allow themselves to find creative physical venture creation arenas (e.g., pop-up stores, showrooms), as well as collaborate with partners when discovering and creating concepts and activities based on new ideas. In this way, they allow themselves to both strategically plan for- and continually experiment with their venture.

Keywords: anchor event, interactivity-based research, pop-up store, entrepreneurial venture creation

Procedia PDF Downloads 69
8419 Semi-Supervised Outlier Detection Using a Generative and Adversary Framework

Authors: Jindong Gu, Matthias Schubert, Volker Tresp

Abstract:

In many outlier detection tasks, only training data belonging to one class, i.e., the positive class, is available. The task is then to predict a new data point as belonging either to the positive class or to the negative class, in which case the data point is considered an outlier. For this task, we propose a novel corrupted Generative Adversarial Network (CorGAN). In the adversarial process of training CorGAN, the Generator generates outlier samples for the negative class, and the Discriminator is trained to distinguish the positive training data from the generated negative data. The proposed framework is evaluated using an image dataset and a real-world network intrusion dataset. Our outlier-detection method achieves state-of-the-art performance on both tasks.

Keywords: one-class classification, outlier detection, generative adversary networks, semi-supervised learning

Procedia PDF Downloads 130
8418 Case Study of the Impact of Sport Tourism Event on Local Residents in Cameroon: The African Cup of Nations

Authors: Zita Fomukong Andam

Abstract:

The decision on where to host sport events does not depend on the national politicians or specific international sport event bodies but also involves the residents of the hosting country. Sport tourism is one of the fast growing industries in the world. Cameroonians consider sport as a point of unity and growth within the country. It has a huge variety of sporting activities like swimming, canoe racing, tug of war and most especially soccer well known as football. The football national team made an impact in 1990 at the FIFA world cup. They also won the African Nations Cup five times. Being the winner of the 2017 African Cup of Nations, they are to host the 2019 African cup of Nations. The purpose of this research is to analyse the impacts of sport tourism event in Cameroon and specifically examine how this event influences the residents. A deep research discourse conducted with randomly selected 300 inbound residents and 200 Cameroonian residents living abroad. Survey questionnaires, interviews and direct observations were carried out as a method of collecting data. The results showed that sport events brings a lot of prestige and honor to the country; generate revenues to the country’s economy and particularly to the local businesses. On the other hand, the results showed that the local residents lose their intimacy, privacy, and their daily life routine is affected. In addition to this, they face negative social inequalities and environmental impacts. Understanding these results the national government and international bodies might be able to contribute to future studies and propose efficient measures to maximize the positive benefits and minimize the negative benefits.

Keywords: sport Tourism, economic impact, resident altitude, african Cup of nations

Procedia PDF Downloads 149
8417 Electrochemical Anodic Oxidation Synthesis of TiO2 nanotube as Perspective Electrode for the Detection of Phenyl Hydrazine

Authors: Sadia Ameen, M. Nazim, Hyumg-Kee Seo, Hyung-Shik Shin

Abstract:

TiO2 nanotube (NT) arrays were grown on titanium (Ti) foil substrate by electrochemical anodic oxidation and utilized as working electrode to fabricate a highly sensitive and reproducible chemical sensor for the detection of harmful phenyl hydrazine chemical. The fabricated chemical sensor based on TiO2 NT arrays electrode exhibited high sensitivity of ~40.9 µA.mM-1.cm-2 and detection limit of ~0.22 µM with short response time (10s).

Keywords: TiO2 NT, phenyl hydrazine, chemical sensor, sensitivity, electrocatalytic properties

Procedia PDF Downloads 478
8416 Sensing Mechanism of Nano-Toxic Ions Using Quartz Crystal Microbalance

Authors: Chanho Park, Juneseok You, Kuewhan Jang, Sungsoo Na

Abstract:

Detection technique of nanotoxic materials is strongly imperative, because nano-toxic materials can harmfully influence human health and environment as their engineering applications are growing rapidly in recent years. In present work, we report the DNA immobilized quartz crystal microbalance (QCM) based sensor for detection of nano-toxic materials such as silver ions, Hg2+ etc. by using functionalization of quartz crystal with a target-specific DNA. Since the mass of a target material is comparable to that of an atom, the mass change caused by target binding to DNA on the quartz crystal is so small that it is practically difficult to detect the ions at low concentrations. In our study, we have demonstrated fast and in situ detection of nanotoxic materials using quartz crystal microbalance. We report the label-free and highly sensitive detection of silver ion for present case, which is a typical nano-toxic material by using QCM and silver-specific DNA. The detection is based on the measurement of frequency shift of Quartz crystal from constitution of the cytosine-Ag+-cytosine binding. It is shown that the silver-specific DNA measured frequency shift by QCM enables the capturing of silver ions below 100pM. The results suggest that DNA-based detection opens a new avenue for the development of a practical water-testing sensor.

Keywords: nano-toxic ions, quartz crystal microbalance, frequency shift, target-specific DNA

Procedia PDF Downloads 302
8415 A Proposed Optimized and Efficient Intrusion Detection System for Wireless Sensor Network

Authors: Abdulaziz Alsadhan, Naveed Khan

Abstract:

In recent years intrusions on computer network are the major security threat. Hence, it is important to impede such intrusions. The hindrance of such intrusions entirely relies on its detection, which is primary concern of any security tool like Intrusion Detection System (IDS). Therefore, it is imperative to accurately detect network attack. Numerous intrusion detection techniques are available but the main issue is their performance. The performance of IDS can be improved by increasing the accurate detection rate and reducing false positive. The existing intrusion detection techniques have the limitation of usage of raw data set for classification. The classifier may get jumble due to redundancy, which results incorrect classification. To minimize this problem, Principle Component Analysis (PCA), Linear Discriminant Analysis (LDA), and Local Binary Pattern (LBP) can be applied to transform raw features into principle features space and select the features based on their sensitivity. Eigen values can be used to determine the sensitivity. To further classify, the selected features greedy search, back elimination, and Particle Swarm Optimization (PSO) can be used to obtain a subset of features with optimal sensitivity and highest discriminatory power. These optimal feature subset used to perform classification. For classification purpose, Support Vector Machine (SVM) and Multilayer Perceptron (MLP) used due to its proven ability in classification. The Knowledge Discovery and Data mining (KDD’99) cup dataset was considered as a benchmark for evaluating security detection mechanisms. The proposed approach can provide an optimal intrusion detection mechanism that outperforms the existing approaches and has the capability to minimize the number of features and maximize the detection rates.

Keywords: Particle Swarm Optimization (PSO), Principle Component Analysis (PCA), Linear Discriminant Analysis (LDA), Local Binary Pattern (LBP), Support Vector Machine (SVM), Multilayer Perceptron (MLP)

Procedia PDF Downloads 345
8414 The Morocco's Return to the African Union: A New Era in the Kingdom's Foreign Policy

Authors: L. Ponomarenko, Rachid Kaouar

Abstract:

Morocco has rejoined the African Union and more than 30 years after it left the continental body due to the recognition of the Arabic Republic of Western Sahara. Morocco was readmitted after a one year campaign led by the King himself, who was visiting the Eastern African country with the aim to expend the kingdom presence in new region in Africa after that it managed to build a large influence net in the West Africa region. The return of Morocco can be a beginning of a new era in the foreign policy of Morocco, specially, in the policy towards the state-quo of the Western Sahara conflict, which is considerate as one the biggest obstacle for the cooperation and integration process in the region of North Africa. As a member-state of the African Union Morocco has lot more to lose, according to that the Moroccan position must be more flexible.

Keywords: African Union, Algeria, Morocco, North African Region, Western Sahara

Procedia PDF Downloads 205
8413 An Efficient Clustering Technique for Copy-Paste Attack Detection

Authors: N. Chaitawittanun, M. Munlin

Abstract:

Due to rapid advancement of powerful image processing software, digital images are easy to manipulate and modify by ordinary people. Lots of digital images are edited for a specific purpose and more difficult to distinguish form their original ones. We propose a clustering method to detect a copy-move image forgery of JPEG, BMP, TIFF, and PNG. The process starts with reducing the color of the photos. Then, we use the clustering technique to divide information of measuring data by Hausdorff Distance. The result shows that the purposed methods is capable of inspecting the image file and correctly identify the forgery.

Keywords: image detection, forgery image, copy-paste, attack detection

Procedia PDF Downloads 320
8412 Green Synthesis of Silver Nanoparticles by Olive Leaf Extract: Application in the Colorimetric Detection of Fe+3 Ions

Authors: Nasibeh Azizi Khereshki

Abstract:

Olive leaf (OL) extract as a green reductant agent was utilized for the biogenic synthesis of silver nanoparticles (Ag NPs) for the first time in this study, and then its performance was evaluated for colorimetric detection of Fe3+ in different media. Some analytical methods were used to characterize the nanosensor. The effective sensing parameters were optimized by central composite design (CCD) combined with response surface methodology (RSM) application. Then, the prepared material's applicability in antibacterial and optical chemical sensing for naked-eye detection of Fe3+ ions in aqueous solutions were evaluated. Furthermore, OL-Ag NPs-loaded paper strips were successfully applied to the colorimetric visualization of Fe3+. The colorimetric probe based on OL-AgNPs illustrated excellent selectivity and sensitivity towards Fe3+ ions, with LOD and LOQ of 0.81 μM and 2.7 μM, respectively. In addition, the developed method was applied to detect Fe3+ ions in real water samples and validated with a 95% confidence level against a reference spectroscopic method.

Keywords: Ag NPs, colorimetric detection, Fe(III) ions, green synthesis, olive leaves

Procedia PDF Downloads 50
8411 Hospital Evacuation: Best Practice Recommendations

Authors: Ronald Blough

Abstract:

Hospitals, clinics, and medical facilities are the core of the Health Services sector providing 24/7 medical care to those in need. Any disruption of these important medical services highlights the vulnerabilities in the medical system. An internal or external event can create a catastrophic incident paralyzing the medical services causing the facility to shift into emergency operations with the possibility of evacuation. The hospital administrator and government officials must decide in a very short amount of time whether to shelter in place or evacuate. This presentation will identify best practice recommendations regarding the hospital evacuation decision and response analyzing previous hospital evacuations to encourage hospitals in the region to review or develop their own emergency evacuation plans.

Keywords: disaster preparedness, hospital evacuation, shelter-in-place, incident containment, health services vulnerability, hospital resources

Procedia PDF Downloads 348
8410 Inelastic and Elastic Taping in Plantar Pressure of Runners Pronators: Clinical Trial

Authors: Liana Gomide, Juliana Rodrigues

Abstract:

The morphology of the foot defines its mode of operation and a biomechanical reform indispensable for a symmetrical distribution of plantar pressures in order not to overload some of its components in isolation. High plantar pressures at specific points in the foot may be a causal factor in several orthopedic disorders that affect the feet such as pain and stress fracture. With digital baro-podometry equipment one can observe an intensity of pressures along the entire foot and quantify some of the movements, such as a subtalar pronation present in the midfoot region. Although, they are involved in microtraumas. In clinical practice, excessive movement has been limited with the use of different taping techniques applied on the plantar arch. Thus, the objective of the present study was to analyze and compare the influence of the inelastic and elastic taping on the distribution of plantar pressure of runners pronators. This is a randomized clinical trial and blind-crossover. Twenty (20) male subjects, mean age 33 ± 7 years old, mean body mass of 71 ± 7 kg, mean height of 174 ± 6 cm, were included in the study. A data collection was carried out by a single research through barop-odometry equipment - Tekscan, model F-scan mobile. The tests were performed at three different times. In the first, an initial barop-odometric evaluation was performed, without a bandage application, with edges at a speed of 9.0 km/h. In the second and third moments, the inelastic or elastic taping was applied consecutively, according to the definition defined in the randomization. As results, it was observed that both as inelastic and elastic taping, provided significant reductions in contact pressure and peak pressure values when compared to the moment without a taping. However, an elastic taping was more effective in decreasing contact pressure (no bandage = 714 ± 201, elastic taping = 690 ± 210 and inelastic taping = 716 ± 180) and no peak pressure in the midfoot region (no bandage = 1490 ± 42, elastic taping = 1273 ± 323 and inelastic taping = 1487 ± 437). It is possible to conclude that it is an elastic taping provided by pressure in the middle region, thereby reducing the subtalar pronunciation event during the run.

Keywords: elastic taping, inelastic taping, running, subtalar pronation

Procedia PDF Downloads 129
8409 Deep Learning and Accurate Performance Measure Processes for Cyber Attack Detection among Web Logs

Authors: Noureddine Mohtaram, Jeremy Patrix, Jerome Verny

Abstract:

As an enormous number of online services have been developed into web applications, security problems based on web applications are becoming more serious now. Most intrusion detection systems rely on each request to find the cyber-attack rather than on user behavior, and these systems can only protect web applications against known vulnerabilities rather than certain zero-day attacks. In order to detect new attacks, we analyze the HTTP protocols of web servers to divide them into two categories: normal attacks and malicious attacks. On the other hand, the quality of the results obtained by deep learning (DL) in various areas of big data has given an important motivation to apply it to cybersecurity. Deep learning for attack detection in cybersecurity has the potential to be a robust tool from small transformations to new attacks due to its capability to extract more high-level features. This research aims to take a new approach, deep learning to cybersecurity, to classify these two categories to eliminate attacks and protect web servers of the defense sector which encounters different web traffic compared to other sectors (such as e-commerce, web app, etc.). The result shows that by using a machine learning method, a higher accuracy rate, and a lower false alarm detection rate can be achieved.

Keywords: anomaly detection, HTTP protocol, logs, cyber attack, deep learning

Procedia PDF Downloads 188
8408 A High Performance Piano Note Recognition Scheme via Precise Onset Detection and Segmented Short-Time Fourier Transform

Authors: Sonali Banrjee, Swarup Kumar Mitra, Aritra Acharyya

Abstract:

A piano note recognition method has been proposed by the authors in this paper. The authors have used a comprehensive method for onset detection of each note present in a piano piece followed by segmented short-time Fourier transform (STFT) for the identification of piano notes. The performance evaluation of the proposed method has been carried out in different harsh noisy environments by adding different levels of additive white Gaussian noise (AWGN) having different signal-to-noise ratio (SNR) in the original signal and evaluating the note detection error rate (NDER) of different piano pieces consisting of different number of notes at different SNR levels. The NDER is found to be remained within 15% for all piano pieces under consideration when the SNR is kept above 8 dB.

Keywords: AWGN, onset detection, piano note, STFT

Procedia PDF Downloads 145
8407 An Erudite Technique for Face Detection and Recognition Using Curvature Analysis

Authors: S. Jagadeesh Kumar

Abstract:

Face detection and recognition is an authoritative technology for image database management, video surveillance, and human computer interface (HCI). Face recognition is a rapidly nascent method, which has been extensively discarded in forensics such as felonious identification, tenable entree, and custodial security. This paper recommends an erudite technique using curvature analysis (CA) that has less false positives incidence, operative in different light environments and confiscates the artifacts that are introduced during image acquisition by ring correction in polar coordinate (RCP) method. This technique affronts mean and median filtering technique to remove the artifacts but it works in polar coordinate during image acquisition. Investigational fallouts for face detection and recognition confirms decent recitation even in diagonal orientation and stance variation.

Keywords: curvature analysis, ring correction in polar coordinate method, face detection, face recognition, human computer interaction

Procedia PDF Downloads 263
8406 Environmental Refugees in Africa: A Case Study of Sahel Region

Authors: Ahlem Setrallah

Abstract:

Environment has become a phenomenon directly linked to security in recent decades. This security aspect of environment is justified by the challenges that environment problems can have on human life and thus security especially within the scope of human security that is based mainly on the individual rather than on the state. Because Africa is not safe from the global warming and all its consequences on environment, this continent has witnessed many crises related to environment and that have had direct impact on security in Africa. One of those crises is environmental displacement or immigration which was caused by natural disasters like draught, desertification and food shortage to name but a few. This paper aims at shedding light at some important cases in the Africa focusing mainly on the Sahel region. The main research questions that we are trying to answer are the following: 1-What is the relationship between environment and forced immigration in the Sahel region? 2-What is the impact of environmental immigration on Security in the region? 3-How have the states in this region reacted to this crisis? 4-Is the measures taken by those states adequate or not? 5- How to remedy for the limitations of those measures? The paper is based on case study methodology as a way to better understand the relationship between security and environment using library research for data collection and analysis. This paper aims also at presenting some suggesting regarding possible ways of reducing the negative impact of environmental immigration.

Keywords: environment, refugees, Sahel region, security

Procedia PDF Downloads 441
8405 Building Resilience to El Nino Related Flood Events in Northern Peru Using a Structured Facilitation Approach to Interdisciplinary Problem Solving

Authors: Roger M. Wall, David G. Proverbs, Yamina Silva, Danny Scipion

Abstract:

This paper critically reviews the outcomes of a 4 day workshop focused on building resilience to El Niño related Flood Events in northern Perú. The workshop was run jointly by Birmingham City University (BCU) in partnership with Instituto Geofísico del Perú (IGP) and was hosted by the Universidad de Piura (UDEP). The event took place in August 2018 and was funded by the Newton-Paulet fund administered by the British Council. The workshop was a response to the severe flooding experienced in Piura during the El Niño event of March 2017 which damaged over 100,000 homes and destroyed much local infrastructure including around 100 bridges. El Niño is a recurrent event and there is concern that its frequency and intensity may change in the future as a consequence of climate change. A group of 40 early career researchers and practitioners from the UK and Perú were challenged with working together across disciplines to identify key cross-cutting themes and make recommendations for building resilience to similar future events. Key themes identified on day 1 of the workshop were governance; communities; risk information; river management; urban planning; health; and infrastructure. A field study visit took place on day 2 so that attendees could gain first-hand experience of affected and displaced communities. Each of the themes was then investigated in depth on day 3 by small interdisciplinary teams drawing on their own expertise, local knowledge and the experiences of the previous day’s field trip. Teams were responsible for developing frameworks for analysis of their chosen theme and presenting their findings to the whole group. At this point, teams worked together to develop links between the different themes so that an integrated approach could be developed and presented on day 4. This paper describes the approaches taken by each team and the way in which these were integrated to form an holistic picture of the whole system. The findings highlighted the importance of risk-related information and the need for strong governance structures to enforce planning regulations and development. The structured facilitation approach proved to be very effective and it is recommended that the process be repeated with a broader group of stakeholders from across the region.

Keywords: El Niño, integrated flood risk management, Perú, structured facilitation, systems approach, resilience

Procedia PDF Downloads 127
8404 A Review of Intelligent Fire Management Systems to Reduce Wildfires

Authors: Nomfundo Ngombane, Topside E. Mathonsi

Abstract:

Remote sensing and satellite imaging have been widely used to detect wildfires; nevertheless, the technologies present some limitations in terms of early wildfire detection as the technologies are greatly influenced by weather conditions and can miss small fires. The fires need to have spread a few kilometers for the technologies to provide accurate detection. The South African Advanced Fire Information System uses MODIS (Moderate Resolution Imaging Spectroradiometer) as satellite imaging. MODIS has limitations as it can exclude small fires and can fall short in validating fire vulnerability. Thus in the future, a Machine Learning algorithm will be designed and implemented for the early detection of wildfires. A simulator will be used to evaluate the effectiveness of the proposed solution, and the results of the simulation will be presented.

Keywords: moderate resolution imaging spectroradiometer, advanced fire information system, machine learning algorithm, detection of wildfires

Procedia PDF Downloads 65
8403 Facility Detection from Image Using Mathematical Morphology

Authors: In-Geun Lim, Sung-Woong Ra

Abstract:

As high resolution satellite images can be used, lots of studies are carried out for exploiting these images in various fields. This paper proposes the method based on mathematical morphology for extracting the ‘horse's hoof shaped object’. This proposed method can make an automatic object detection system to track the meaningful object in a large satellite image rapidly. Mathematical morphology process can apply in binary image, so this method is very simple. Therefore this method can easily extract the ‘horse's hoof shaped object’ from any images which have indistinct edges of the tracking object and have different image qualities depending on filming location, filming time, and filming environment. Using the proposed method by which ‘horse's hoof shaped object’ can be rapidly extracted, the performance of the automatic object detection system can be improved dramatically.

Keywords: facility detection, satellite image, object, mathematical morphology

Procedia PDF Downloads 361
8402 X-Corner Detection for Camera Calibration Using Saddle Points

Authors: Abdulrahman S. Alturki, John S. Loomis

Abstract:

This paper discusses a corner detection algorithm for camera calibration. Calibration is a necessary step in many computer vision and image processing applications. Robust corner detection for an image of a checkerboard is required to determine intrinsic and extrinsic parameters. In this paper, an algorithm for fully automatic and robust X-corner detection is presented. Checkerboard corner points are automatically found in each image without user interaction or any prior information regarding the number of rows or columns. The approach represents each X-corner with a quadratic fitting function. Using the fact that the X-corners are saddle points, the coefficients in the fitting function are used to identify each corner location. The automation of this process greatly simplifies calibration. Our method is robust against noise and different camera orientations. Experimental analysis shows the accuracy of our method using actual images acquired at different camera locations and orientations.

Keywords: camera calibration, corner detector, edge detector, saddle points

Procedia PDF Downloads 387
8401 Analysis of Facial Expressions with Amazon Rekognition

Authors: Kashika P. H.

Abstract:

The development of computer vision systems has been greatly aided by the efficient and precise detection of images and videos. Although the ability to recognize and comprehend images is a strength of the human brain, employing technology to tackle this issue is exceedingly challenging. In the past few years, the use of Deep Learning algorithms to treat object detection has dramatically expanded. One of the key issues in the realm of image recognition is the recognition and detection of certain notable people from randomly acquired photographs. Face recognition uses a way to identify, assess, and compare faces for a variety of purposes, including user identification, user counting, and classification. With the aid of an accessible deep learning-based API, this article intends to recognize various faces of people and their facial descriptors more accurately. The purpose of this study is to locate suitable individuals and deliver accurate information about them by using the Amazon Rekognition system to identify a specific human from a vast image dataset. We have chosen the Amazon Rekognition system, which allows for more accurate face analysis, face comparison, and face search, to tackle this difficulty.

Keywords: Amazon rekognition, API, deep learning, computer vision, face detection, text detection

Procedia PDF Downloads 87
8400 Improving Lane Detection for Autonomous Vehicles Using Deep Transfer Learning

Authors: Richard O’Riordan, Saritha Unnikrishnan

Abstract:

Autonomous Vehicles (AVs) are incorporating an increasing number of ADAS features, including automated lane-keeping systems. In recent years, many research papers into lane detection algorithms have been published, varying from computer vision techniques to deep learning methods. The transition from lower levels of autonomy defined in the SAE framework and the progression to higher autonomy levels requires increasingly complex models and algorithms that must be highly reliable in their operation and functionality capacities. Furthermore, these algorithms have no room for error when operating at high levels of autonomy. Although the current research details existing computer vision and deep learning algorithms and their methodologies and individual results, the research also details challenges faced by the algorithms and the resources needed to operate, along with shortcomings experienced during their detection of lanes in certain weather and lighting conditions. This paper will explore these shortcomings and attempt to implement a lane detection algorithm that could be used to achieve improvements in AV lane detection systems. This paper uses a pre-trained LaneNet model to detect lane or non-lane pixels using binary segmentation as the base detection method using an existing dataset BDD100k followed by a custom dataset generated locally. The selected roads will be modern well-laid roads with up-to-date infrastructure and lane markings, while the second road network will be an older road with infrastructure and lane markings reflecting the road network's age. The performance of the proposed method will be evaluated on the custom dataset to compare its performance to the BDD100k dataset. In summary, this paper will use Transfer Learning to provide a fast and robust lane detection algorithm that can handle various road conditions and provide accurate lane detection.

Keywords: ADAS, autonomous vehicles, deep learning, LaneNet, lane detection

Procedia PDF Downloads 79
8399 BodeACD: Buffer Overflow Vulnerabilities Detecting Based on Abstract Syntax Tree, Control Flow Graph, and Data Dependency Graph

Authors: Xinghang Lv, Tao Peng, Jia Chen, Junping Liu, Xinrong Hu, Ruhan He, Minghua Jiang, Wenli Cao

Abstract:

As one of the most dangerous vulnerabilities, effective detection of buffer overflow vulnerabilities is extremely necessary. Traditional detection methods are not accurate enough and consume more resources to meet complex and enormous code environment at present. In order to resolve the above problems, we propose the method for Buffer overflow detection based on Abstract syntax tree, Control flow graph, and Data dependency graph (BodeACD) in C/C++ programs with source code. Firstly, BodeACD constructs the function samples of buffer overflow that are available on Github, then represents them as code representation sequences, which fuse control flow, data dependency, and syntax structure of source code to reduce information loss during code representation. Finally, BodeACD learns vulnerability patterns for vulnerability detection through deep learning. The results of the experiments show that BodeACD has increased the precision and recall by 6.3% and 8.5% respectively compared with the latest methods, which can effectively improve vulnerability detection and reduce False-positive rate and False-negative rate.

Keywords: vulnerability detection, abstract syntax tree, control flow graph, data dependency graph, code representation, deep learning

Procedia PDF Downloads 150
8398 Manufacturing Anomaly Detection Using a Combination of Gated Recurrent Unit Network and Random Forest Algorithm

Authors: Atinkut Atinafu Yilma, Eyob Messele Sefene

Abstract:

Anomaly detection is one of the essential mechanisms to control and reduce production loss, especially in today's smart manufacturing. Quick anomaly detection aids in reducing the cost of production by minimizing the possibility of producing defective products. However, developing an anomaly detection model that can rapidly detect a production change is challenging. This paper proposes Gated Recurrent Unit (GRU) combined with Random Forest (RF) to detect anomalies in the production process in real-time quickly. The GRU is used as a feature detector, and RF as a classifier using the input features from GRU. The model was tested using various synthesis and real-world datasets against benchmark methods. The results show that the proposed GRU-RF outperforms the benchmark methods with the shortest time taken to detect anomalies in the production process. Based on the investigation from the study, this proposed model can eliminate or reduce unnecessary production costs and bring a competitive advantage to manufacturing industries.

Keywords: anomaly detection, multivariate time series data, smart manufacturing, gated recurrent unit network, random forest

Procedia PDF Downloads 87