Search results for: face presentation attack detection
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 7599

Search results for: face presentation attack detection

2589 Tape-Shaped Multiscale Fiducial Marker: A Design Prototype for Indoor Localization

Authors: Marcell Serra de Almeida Martins, Benedito de Souza Ribeiro Neto, Gerson Lima Serejo, Carlos Gustavo Resque Dos Santos

Abstract:

Indoor positioning systems use sensors such as Bluetooth, ZigBee, and Wi-Fi, as well as cameras for image capture, which can be fixed or mobile. These computer vision-based positioning approaches are low-cost to implement, mainly when it uses a mobile camera. The present study aims to create a design of a fiducial marker for a low-cost indoor localization system. The marker is tape-shaped to perform a continuous reading employing two detection algorithms, one for greater distances and another for smaller distances. Therefore, the location service is always operational, even with variations in capture distance. A minimal localization and reading algorithm were implemented for the proposed marker design, aiming to validate it. The accuracy tests consider readings varying the capture distance between [0.5, 10] meters, comparing the proposed marker with others. The tests showed that the proposed marker has a broader capture range than the ArUco and QRCode, maintaining the same size. Therefore, reducing the visual pollution and maximizing the tracking since the ambient can be covered entirely.

Keywords: multiscale recognition, indoor localization, tape-shaped marker, fiducial marker

Procedia PDF Downloads 118
2588 The Great Mimicker: A Case of Disseminated Tuberculosis

Authors: W. Ling, Mohamed Saufi Bin Awang

Abstract:

Introduction: Mycobacterium tuberculosis post a major health problem worldwide. Central nervous system (CNS) infection by mycobacterium tuberculosis is one of the most devastating complications of tuberculosis. Although with advancement in medical fields, we are yet to understand the pathophysiology of how mycobacterium tuberculosis was able to cross the blood-brain barrier (BBB) and infect the CNS. CNS TB may present with nonspecific clinical symptoms which can mimic other diseases/conditions; this is what makes the diagnosis relatively difficult and challenging. Public health has to be informed and educated about the spread of TB, and early identification of TB is important as it is a curable disease. Case Report: A young 21-year-old Malay gentleman was initially presented to us with symptoms of ear discharge, tinnitus, and right-sided headache for the past one year. Further history reveals that the symptoms have been mismanaged and neglected over the period of 1 year. Initial investigation reveals features of inflammation of the ear. Further imaging showed the feature of chronic inflammation of the otitis media and atypical right cerebral abscess, which has the same characteristic features and consistency. He further underwent a biopsy, and results reveal positive Mycobacterium tuberculosis of the otitis media. With the results and the available imaging, we were certain that this is likely a case of disseminated tuberculosis causing CNS TB. Conclusion: We aim to highlight the challenge and difficult face in our health care system and public health in early identification and treatment.

Keywords: central nervous system tuberculosis, intracranial tuberculosis, tuberculous encephalopathy, tuberculous meningitis

Procedia PDF Downloads 171
2587 The U.S.-Taliban Peace Deal: Two-level Game Logic and Actors’ Payoffs

Authors: Zafar Iqbal

Abstract:

This article aims at analyzing the U.S.-Taliban peace deal considering the cross- pressures that both parties (U.S. and Taliban) faced and eventually paved the way for a negotiated settlement to the two-decade-long war. The paper first discusses the peace process initiated by President Obama in 2009 and then explores the factors that compelled both the parties to sign this deal. The study is based on secondary data and interviews done with the leading experts on Afghanistan along with the Taliban Qatar office spokesperson’s interview. The theoretical framework is based on the interplay of diplomacy and domestic politics: two-level games logic proposed by Robert D. Putnam. The two-level games suggest that actors involved in negotiations face cross-pressures and are constrained both by the expectations of the domestic audience and their counterpart’s zone of possible agreement. This paper will take the cross pressures for both sides as the permissive factors for the entire process of negotiations. However, there will be a slight aberration in the application of Putnam’s two-level games. In this case, it is not inter-state negotiations but between an all-powerful state and the unyielding non-state actors. The study concludes that both the parties faced domestic as well as international pressure which compelled them to sign a deal that could lead to an end of the two-decade-long war. Furthermore, it looks at the potential prospects and challenges of the deal following the U.S. withdrawal.

Keywords: neo-Taliban insurgency, negotiations, two-level game, U.S.-Taliban peace deal, U.S. withdrawal

Procedia PDF Downloads 195
2586 Balancing Resources and Demands in Activation Work with Young Adults: Exploring Potentials of the Job Demands-Resources Theory

Authors: Gurli Olsen, Ida Bruheim Jensen

Abstract:

Internationally, many young adults not in education, employment, or training (NEET) remain in temporary solutions such as labour market measures or other forms of welfare arrangements. These trends have been associated with ineffective labour market measures, an underfunded theoretical foundation for activation work, limited competence among social workers and labour market employees in using ordinary workplaces as job inclusion measures, and an overemphasis on young adults’ personal limitations such as health challenges and lack of motivation. Two competing models have been prominent in activation work: Place‐Then‐Train and Train‐Then‐Place. A traditional strategy for labour market measures has been to first motivate NEETs to sheltered work and training and then to the regular labour market (train then place). Measures such as Supported Employment (SE) and Individual Placement and Support (IPS) advocate for rapid entry into paid work at the regular labour market with close supervision and training from social workers, employees, and others (place then train). None of these models demonstrate unquestionable results. In this web of working life measures, young adults (NEETs) experience a lack of confidence in their own capabilities and coping strategies vis-á-vis labour market- and educational demands. Drawing on young adults’ own experiences, we argue that the Job Demands-Resources (JD-R) Theory can contribute to the theoretical and practical dimensions of activation work. This presentation will focus on what the JD-R theory entails and how it can be fruitful in activation work with NEETs (what and how). The overarching rationale of the JD-R theory is that an enduring balance between demands (e.g., deadlines, working hours) and resources (e.g., social support, enjoyable work tasks) is important for job performance for people in any job and potentially in other meaningful activities. Extensive research has demonstrated that a balance between demands and resources increases motivation and decreases stress. Nevertheless, we have not identified literature on the JD-R theory in activation work with young adults.

Keywords: activation work, job demands-resources theory, social work, theory development

Procedia PDF Downloads 66
2585 Long-Term Modal Changes in International Traffic - Modelling Exercise

Authors: Tomasz Komornicki

Abstract:

The primary aim of the presentation is to try to model border traffic and, at the same time to explain on which economic variables the intensity of border traffic depended in the long term. For this purpose, long series of traffic data on the Polish borders were used. Models were estimated for three variants of explanatory variables: a) for total arrivals and departures (total movement of Poles and foreigners), b) for arrivals and departures of Poles, and c) for arrivals and departures of foreigners. Each of the defined explanatory variables in the models appeared as the logarithm of the natural number of persons. Data from 1994-2017 were used for modeling (for internal Schengen borders for the years 1994-2007). Information on the number of people arriving in and leaving Poland was collected for a total of 303 border crossings. On the basis of the analyses carried out, it was found that one of the main factors determining border traffic is generally differences in the level of economic development (GDP) and the condition of the economy (level of unemployment) and the degree of border permeability. Also statistically significant for border traffic are differences in the prices of goods (fuels, tobacco, and alcohol products) and services (mainly basic ones, e.g., hairdressing services). Such a relationship exists mainly on the eastern border (border traffic determined largely by differences in the prices of goods) and on the border with Germany (in the first analysed period, border traffic was determined mainly by the prices of goods, later - after Poland's accession to the EU and the Schengen area - also by the prices of services). The models also confirmed differences in the set of factors shaping the volume and structure of border traffic on the Polish borders resulting from general geopolitical conditions, with the year 2007 being an important caesura, after which the classical population mobility factors became visible. The results obtained were additionally related to changes in traffic that occurred as a result of the CPOVID-19 pandemic and as a result of the Russian aggression against Ukraine.

Keywords: border, modal structure, transport, Ukraine

Procedia PDF Downloads 101
2584 talk2all: A Revolutionary Tool for International Medical Tourism

Authors: Madhukar Kasarla, Sumit Fogla, Kiran Panuganti, Gaurav Jain, Abhijit Ramanujam, Astha Jain, Shashank Kraleti, Sharat Musham, Arun Chaudhury

Abstract:

Patients have often chosen to travel for care — making pilgrimages to academic meccas and state-of-the-art hospitals for sophisticated surgery. This culture is still persistent in the landscape of US healthcare, with hundred thousand of visitors coming to the shores of United States to seek the high quality of medical care. One of the major challenges in this form of medical tourism has been the language barrier. Thus, an Iraqi patient, with immediate needs of communicating the healthcare needs to the treating team in the hospital, may face huge barrier in effective patient-doctor communication, delaying care and even at times reducing the quality. To circumvent these challenges, we are proposing the use of a state-of-the-art tool, Talk2All, which can translate nearly one hundred international languages (and even sign language) in real time. The tool is an easy to download app and highly user friendly. It builds on machine learning principles to decode different languages in real time. We suggest that the use of Talk2All will tremendously enhance communication in the hospital setting, effectively breaking the language barrier. We propose that vigorous incorporation of Talk2All shall overcome practical challenges in international medical and surgical tourism.

Keywords: language translation, communication, machine learning, medical tourism

Procedia PDF Downloads 199
2583 A Brain Controlled Robotic Gait Trainer for Neurorehabilitation

Authors: Qazi Umer Jamil, Abubakr Siddique, Mubeen Ur Rehman, Nida Aziz, Mohsin I. Tiwana

Abstract:

This paper discusses a brain controlled robotic gait trainer for neurorehabilitation of Spinal Cord Injury (SCI) patients. Patients suffering from Spinal Cord Injuries (SCI) become unable to execute motion control of their lower proximities due to degeneration of spinal cord neurons. The presented approach can help SCI patients in neuro-rehabilitation training by directly translating patient motor imagery into walkers motion commands and thus bypassing spinal cord neurons completely. A non-invasive EEG based brain-computer interface is used for capturing patient neural activity. For signal processing and classification, an open source software (OpenVibe) is used. Classifiers categorize the patient motor imagery (MI) into a specific set of commands that are further translated into walker motion commands. The robotic walker also employs fall detection for ensuring safety of patient during gait training and can act as a support for SCI patients. The gait trainer is tested with subjects, and satisfactory results were achieved.

Keywords: brain computer interface (BCI), gait trainer, spinal cord injury (SCI), neurorehabilitation

Procedia PDF Downloads 145
2582 Application of Liquid Chromatographic Method for the in vitro Determination of Gastric and Intestinal Stability of Pure Andrographolide in the Extract of Andrographis paniculata

Authors: Vijay R. Patil, Sathiyanarayanan Lohidasan, K. R. Mahadik

Abstract:

Gastrointestinal stability of andrographolide was evaluated in vitro in simulated gastric (SGF) and intestinal (SIF) fluids using a validated HPLC-PDA method. The method was validated using a 5μm ThermoHypersil GOLD C18column (250 mm × 4.0 mm) and mobile phase consisting of water: acetonitrile; 70: 30 (v/v) delivered isocratically at a flow rate of 1 mL/min with UV detection at 228 nm. Andrographolide in pure form and extract Andrographis paniculata was incubated at 37°C in an incubator shaker in USP simulated gastric and intestinal fluids with and without enzymes. Systematic protocol as per FDA Guidance System was followed for stability study and samples were assayed at 0, 15, 30 and 60 min intervals for gastric and at 0, 15, 30, 60 min, 1, 2 and 3 h for intestinal stability study. Also, the stability study was performed up to 24 h to see the degradation pattern in SGF and SIF (with enzyme and without enzyme). The developed method was found to be accurate, precise and robust. Andrographolide was found to be stable in SGF (pH ∼ 1.2) for 1h and SIF (pH 6.8) up to 3 h. The relative difference (RD) of amount of drug added and found at all time points was found to be < 3%. The present study suggests that drug loss in the gastrointestinal tract takes place may be by membrane permeation rather than a degradation process.

Keywords: andrographolide, Andrographis paniculata, in vitro, stability, gastric, Intestinal HPLC-PDA

Procedia PDF Downloads 235
2581 Ambidentate Ligands as Platforms for Efficient Synthesis of Pd-based Metallosupramolecular Cages

Authors: Wojcieh Drożdż, Artur R. Stefankiewicz

Abstract:

Ambidentate ligands can be described as organic structures possessing two different types of coordination units within a single molecule. These features enable the coordination of two different metal ions, which can directly affect the properties of obtained complexes as well as further application. In the current research, we focused on a β-diketone ligand containing terminally located pyridine units in order to assemble cage-like architectures. This will be possible due to the peculiar geometry of the proposed ligands, called "banana-shape", widely used in the synthesis of sophisticated metallosupramolecular architectures. Each of the coordination units plays an important role in cage assembly. Pyridine units enable the coordination of square-planar metal ions (Pd²⁺, Pt²⁺), forming a positively charged cage. On the other hand, the β-diketone group provides the possibility of post-modification, including the introduction of additional functional groups with specific properties (sensing, catalytic, etc.). Such obtained cages are of great interest due to their application potential, including storage or transport of guest molecules, selective detection/separation of analytes as well as efficient catalytic processes.

Keywords: metalloligands, coordination cages, nanoreactors, β-diketonate complexes

Procedia PDF Downloads 60
2580 Exploring Labor Market Participation of Highly Skilled Immigrant Women in the United States: Barriers and Strategies

Authors: Yurdum Cokadar

Abstract:

The United States is the country where the majority of highly skilled immigrants are hosted. Two-thirds of foreign-born migrants from Turkey - an underrepresented and understudied immigrant group in the United States - are highly skilled. Generated by the aim of filling this gap in the literature, the motivation of this research is to understand highly skilled Turkish immigrant women’s integration into the U.S. labor market, including barriers that they face and strategies they develop to rebuild their career after relocation. The in-depth interviews of 20 highly skilled Turkish women residing in the U.S. revealed that the majority of women participants are either not integrated into the labor market, occupy positions below their skill, or cannot reach the same upper segments of the labor market in the host country, arising from a range of structural and personal barriers interplaying in their career trajectories. Furthermore, many of them cannot transfer their social and cultural capital gained in their home country into the United States. The labor market participation process of these women is analyzed in the light of Bourdieu’s theory of capital and the intersectional approach of gender, class and ethnicity in order to understand the positions of highly skilled immigrant women in the host country labor market.

Keywords: deskilling, gender, class and ethnicity, highly skilled women immigrants, integration into the U.S. the labor market, labor market participation, skilled migration, theory of capital

Procedia PDF Downloads 174
2579 Assessing the Risk of Condensation and Moisture Accumulation in Solid Walls: Comparing Different Internal Wall Insulation Options

Authors: David Glew, Felix Thomas, Matthew Brooke-Peat

Abstract:

Improving the thermal performance of homes is seen as an essential step in achieving climate change, fuel security, fuel poverty targets. One of the most effective thermal retrofits is to insulate solid walls. However, it has been observed that applying insulation to the internal face of solid walls reduces the surface temperature of the inner wall leaf, which may introduce condensation risk and may interrupt seasonal moisture accumulation and dissipation. This research quantifies the extent to which the risk of condensation and moisture accumulation in the wall increases (which can increase the risk of timber rot) following the installation of six different types of internal wall insulation. In so doing, it compares how risk is affected by both the thermal resistance, thickness, and breathability of the insulation. Thermal bridging, surface temperatures, condensation risk, and moisture accumulation are evaluated using hygrothermal simulation software before and after the thermal upgrades. The research finds that installing internal wall insulation will always introduce some risk of condensation and moisture. However, it identifies that risks were present prior to insulation and that breathable materials and insulation with lower resistance have lower risks than alternative insulation options. The implications of this may be that building standards that encourage the enhanced thermal performance of solid walls may be introducing moisture risks into homes.

Keywords: condensation risk, hygrothermal simulation, internal wall insulation, thermal bridging

Procedia PDF Downloads 148
2578 The Role of Individual Educational Plans in Helping Cycle One Attention Deficit Hyperactivity Students on the Behavioral Level

Authors: Lama Bendak

Abstract:

Parents and teachers face major problems dealing with attention deficit hyperactivity students. One solution is by changing the school to a less restrictive one or leaving school for good. The purpose of this study is to highlight the importance and role of individual educational plans (IEP) in helping cycle one ages six to nine attention deficit hyperactivity disorder (ADHD) students on the behavioral level. We have adopted the qualitative approach experimental where the total number of the students in our field of study was 66 from four schools. We have limited our study to cycle one students; that is grades 1, 2 and 3, whose ages range from 5.5 to 8.5. We divided the students into two groups where the controlled group was 36 students, and the experimental group was 30 students. The measuring instrument or tool that we used in our study is The SNAP-IV Teacher and Parents Rating Scale and was filled by class teachers. We did the pretest during the first trimester of the school year. Then we applied the Individual Educational Plans IEP's for two trimesters. Then we did the posttest and submitted the results for analysis, where we used the ANCOVA. The results of this study showed that the IEP's efficacy in helping ADHD students on the behavioral aspect showed statistical differences and varied depending on the initial level of difficulty of the student.

Keywords: attention deficit hyperactivity disorder, individual educational plans, behavioral charts, SNAP-IV teacher and parents rating scale

Procedia PDF Downloads 275
2577 Consortium Blockchain-based Model for Data Management Applications in the Healthcare Sector

Authors: Teo Hao Jing, Shane Ho Ken Wae, Lee Jin Yu, Burra Venkata Durga Kumar

Abstract:

Current distributed healthcare systems face the challenge of interoperability of health data. Storing electronic health records (EHR) in local databases causes them to be fragmented. This problem is aggravated as patients visit multiple healthcare providers in their lifetime. Existing solutions are unable to solve this issue and have caused burdens to healthcare specialists and patients alike. Blockchain technology was found to be able to increase the interoperability of health data by implementing digital access rules, enabling uniformed patient identity, and providing data aggregation. Consortium blockchain was found to have high read throughputs, is more trustworthy, more secure against external disruptions and accommodates transactions without fees. Therefore, this paper proposes a blockchain-based model for data management applications. In this model, a consortium blockchain is implemented by using a delegated proof of stake (DPoS) as its consensus mechanism. This blockchain allows collaboration between users from different organizations such as hospitals and medical bureaus. Patients serve as the owner of their information, where users from other parties require authorization from the patient to view their information. Hospitals upload the hash value of patients’ generated data to the blockchain, whereas the encrypted information is stored in a distributed cloud storage.

Keywords: blockchain technology, data management applications, healthcare, interoperability, delegated proof of stake

Procedia PDF Downloads 124
2576 Clinical Profile, Evaluation, Management and Visual Outcome of Idiopathic Intracranial Hypertension in a Neuro-Ophthalmology Clinic in Jeddah, Saudi Arabia

Authors: Rahaf Mandura

Abstract:

Background: Idiopathic intracranial hypertension (IIH) is a disorder with elevated intracranial pressure (ICP) more than 250 mm H₂O, without evidence of meningeal inflammation, space-occupying lesion, or venous thrombosis. The aim of this research is to study the clinical profile, evaluation, management, and visual outcome in a hospital-based population of IIH cases in Jeddah. Methodology: This is a retrospective observational study that included the medical records of all patients referred to neuro-ophthalmology service for evaluation of papilledema. The medical records have been reviewed from October 2018 to February 2020 at Jeddah Eye Hospital (JEH), Saudi Arabia. A total of fifty-one patients presented with papilledema in the studied period. Forty-seven patients met our inclusion criteria and were included in the study. Results: Most of the patients were females (43, 91.5%) with a mean age of presentation of 30.83±11.40 years. The most common presenting symptom was headache (40 patients, 85.1%), followed by transient visual obscuration (20 patients, 42.6%), and reduced visual acuity (15 patients, 31.9%). All 47 patients were started on medical treatment with oral acetazolamide with four patients (8.5%) shifted to topiramate because of the lack of response or intolerance to acetazolamide while four patients (8.5%) underwent lumbar-peritoneal shunt because of inadequate control of the disease despite the treatment with medical therapy. For both eyes, the change in visual acuity across all assessment points was statistically significant. Nevertheless, there were no significant changes in the visual field findings among all of the compared assessment points. Conclusion: The present study has shown that IIH-related papilledema is common in young female patients with headaches, transient visual obscurations and reduced visual acuity. Those are the commonest symptoms in our IIH population. Medical treatment of IIH is significantly efficacious and should be considered in order to enhance the prognosis of IIH-related complications. Therefore, the visual status should be frequently monitored for these patients.

Keywords: idiopathic intracranial hypertension, intracranial hypertension, papilledema, headache

Procedia PDF Downloads 180
2575 3D Reconstruction of Human Body Based on Gender Classification

Authors: Jiahe Liu, Hongyang Yu, Feng Qian, Miao Luo

Abstract:

SMPL-X was a powerful parametric human body model that included male, neutral, and female models, with significant gender differences between these three models. During the process of 3D human body reconstruction, the correct selection of standard templates was crucial for obtaining accurate results. To address this issue, we developed an efficient gender classification algorithm to automatically select the appropriate template for 3D human body reconstruction. The key to this gender classification algorithm was the precise analysis of human body features. By using the SMPL-X model, the algorithm could detect and identify gender features of the human body, thereby determining which standard template should be used. The accuracy of this algorithm made the 3D reconstruction process more accurate and reliable, as it could adjust model parameters based on individual gender differences. SMPL-X and the related gender classification algorithm have brought important advancements to the field of 3D human body reconstruction. By accurately selecting standard templates, they have improved the accuracy of reconstruction and have broad potential in various application fields. These technologies continue to drive the development of the 3D reconstruction field, providing us with more realistic and accurate human body models.

Keywords: gender classification, joint detection, SMPL-X, 3D reconstruction

Procedia PDF Downloads 57
2574 Chip Morphology and Cutting Forces Investigation in Dry High Speed Orthogonal Turning of Titanium Alloy

Authors: M. Benghersallah, L. Boulanouar, G. List, G. Sutter

Abstract:

The present work is an experimental study on the dry high speed turning of Ti-6Al-4V titanium alloy. The objective of this study is to see for high cutting speeds, how wear occurs on the face of insert and how to evolve cutting forces and chip formation. Cutting speeds tested is 600, 800, 1000 and 1200 m / min in orthogonal turning with a carbide insert tool H13A uncoated on a cylindrical titanium alloy part. Investigation on the wear inserts with 3D scanning microscope revered the crater formation is instantaneous and a chip adhesion (welded chip) causes detachment of carbide particles. In these experiments, the chip shape was systematically investigated at each cutting conditions using optical microscopy. The chips produced were collected and polished to measure the thicknesses t2max and t2min, dch the distance between each segments and ɸseg the inclination angle As described in the introduction part, the shear angle f and the inclination angle of a segment ɸseg are differentiated. The angle ɸseg is actually measured on the collected chips while the shear angle f cannot be. The angle ɸ represents the initial shear similar to the one that describes the formation of a continuous chip in the primary shear zone. Cutting forces increase and stabilize before removing the tool. The chip reaches a very high temperature.

Keywords: dry high speed, orthogonal turning, chip formation, cutting speed, cutting forces

Procedia PDF Downloads 270
2573 Experimental Assessment of the Effectiveness of Judicial Instructions and of Expert Testimony in Improving Jurors’ Evaluation of Eyewitness Evidence

Authors: Alena Skalon, Jennifer L. Beaudry

Abstract:

Eyewitness misidentifications can sometimes lead to wrongful convictions of innocent people. This occurs in part because jurors tend to believe confident eyewitnesses even when the identification took place under suggestive conditions. Empirical research demonstrated that jurors are often unaware of the factors that can influence the reliability of eyewitness identification. Most common legal safeguards that are designed to educate jurors about eyewitness evidence are judicial instructions and expert testimony. To date, very few studies assessed the effectiveness of judicial instructions and most of them found that judicial instructions make jurors more skeptical of eyewitness evidence or do not have any effect on jurors’ judgments. Similar results were obtained for expert testimony. However, none of the previous studies focused on the ability of legal safeguards to improve jurors’ assessment of evidence obtained from suggestive identification procedures—this is one of the gaps addressed by this paper. Furthermore, only three studies investigated whether legal safeguards improve the ultimate accuracy of jurors’ judgments—that is, whether after listening to judicial instructions or expert testimony jurors can differentiate between accurate and inaccurate eyewitnesses. This presentation includes two studies. Both studies used genuine eyewitnesses (i.e., eyewitnesses who watched the crime) and manipulated the suggestiveness of identification procedures. The first study manipulated the presence of judicial instructions; the second study manipulated the presence of one of two types of expert testimony: a traditional, verbal expert testimony or expert testimony accompanied by visual aids. All participant watched a video-recording of an identification procedure and of an eyewitness testimony. The results indicated that neither judicial instructions nor expert testimony affected jurors’ judgments. However, consistent with the previous findings, when the identification procedure was non-suggestive, jurors believed accurate eyewitnesses more often than inaccurate eyewitnesses. When the procedure was suggestive, jurors believed accurate and inaccurate eyewitnesses at the same rate. The paper will discuss the implications of these studies and directions for future research.

Keywords: expert testimony, eyewitness evidence, judicial instructions, jurors’ decision making, legal safeguards

Procedia PDF Downloads 167
2572 Security Issues in Long Term Evolution-Based Vehicle-To-Everything Communication Networks

Authors: Mujahid Muhammad, Paul Kearney, Adel Aneiba

Abstract:

The ability for vehicles to communicate with other vehicles (V2V), the physical (V2I) and network (V2N) infrastructures, pedestrians (V2P), etc. – collectively known as V2X (Vehicle to Everything) – will enable a broad and growing set of applications and services within the intelligent transport domain for improving road safety, alleviate traffic congestion and support autonomous driving. The telecommunication research and industry communities and standardization bodies (notably 3GPP) has finally approved in Release 14, cellular communications connectivity to support V2X communication (known as LTE – V2X). LTE – V2X system will combine simultaneous connectivity across existing LTE network infrastructures via LTE-Uu interface and direct device-to-device (D2D) communications. In order for V2X services to function effectively, a robust security mechanism is needed to ensure legal and safe interaction among authenticated V2X entities in the LTE-based V2X architecture. The characteristics of vehicular networks, and the nature of most V2X applications, which involve human safety makes it significant to protect V2X messages from attacks that can result in catastrophically wrong decisions/actions include ones affecting road safety. Attack vectors include impersonation attacks, modification, masquerading, replay, MiM attacks, and Sybil attacks. In this paper, we focus our attention on LTE-based V2X security and access control mechanisms. The current LTE-A security framework provides its own access authentication scheme, the AKA protocol for mutual authentication and other essential cryptographic operations between UEs and the network. V2N systems can leverage this protocol to achieve mutual authentication between vehicles and the mobile core network. However, this protocol experiences technical challenges, such as high signaling overhead, lack of synchronization, handover delay and potential control plane signaling overloads, as well as privacy preservation issues, which cannot satisfy the adequate security requirements for majority of LTE-based V2X services. This paper examines these challenges and points to possible ways by which they can be addressed. One possible solution, is the implementation of the distributed peer-to-peer LTE security mechanism based on the Bitcoin/Namecoin framework, to allow for security operations with minimal overhead cost, which is desirable for V2X services. The proposed architecture can ensure fast, secure and robust V2X services under LTE network while meeting V2X security requirements.

Keywords: authentication, long term evolution, security, vehicle-to-everything

Procedia PDF Downloads 155
2571 Breast Cancer in Very Young (Less Than 25 Yeras) Women: An Institutional Analysis from Developing Country

Authors: Ajay Gogia, Svs Deo, Dn Sharma, Atul Batra, Ashutash Mishra

Abstract:

Background and Aims: Breast cancer in women aged less than 25 years (defined as very young breast cancer, VYBC) is rare and accounts for 0.25% of all breast cancer in the West. There is no data available on VYBC from developing countries. The aim of this study was to analyze the clinical, pathological, and prognostic factors and outcomes in VYBC. Methods: This retrospective analysis was performed on 80 patients aged 25 years or less (screened 8000 files of female BC) who were registered at All India Institute of Medical Sciences (AIIMS), New Delhi, India, over a 15-year period between 2011 and 2023. Results: The median age was 21.5 years (range 16-25). A positive family history (siblings and parents) was elicited in 30% of cases, and breast cancer gene (BRCA1/2) mutation was found in 33% of cases patients. Ten patients (12.5%) patients have pregnancy-associated breast cancer (BC detected during pregnancy or 1 year after postpartum period). The TNM stage distribution was Stage I was 0, stage II -30%, stage III –60% and Stage IV -10 %patients. Seventy percent of tumors were high grade, and 90% had pathological node-positive disease. Estrogen, Progesterone, and human epidermal growth factor receptor 2 (HER2)/neu positivity were 25%,25% and 35%, respectively. Triple-negative breast cancer constituted 40% of patients. With a median follow-up of 42 months, 3 years, relapse-free survival (nonmetastatic disease), progression-free survival (metastatic disease) and overall survival were 30%, 15% and 50%, respectively. Conclusions: Very young women constituted 1% of all breast cancer cases. Advanced disease at presentation and high-risk pathological features result in poor outcomes. One-third of VYBCs are associated with BRCA mutation, which requires genetic counseling and risk reduction surgery if required. Due to the aggressive behavior of BC in this age group, need early diagnosis and prompt treatment

Keywords: very young, breast cancer, outcome, developing country, India

Procedia PDF Downloads 6
2570 Intelligent Rheumatoid Arthritis Identification System Based Image Processing and Neural Classifier

Authors: Abdulkader Helwan

Abstract:

Rheumatoid joint inflammation is characterized as a perpetual incendiary issue which influences the joints by hurting body tissues Therefore, there is an urgent need for an effective intelligent identification system of knee Rheumatoid arthritis especially in its early stages. This paper is to develop a new intelligent system for the identification of Rheumatoid arthritis of the knee utilizing image processing techniques and neural classifier. The system involves two principle stages. The first one is the image processing stage in which the images are processed using some techniques such as RGB to gryascale conversion, rescaling, median filtering, background extracting, images subtracting, segmentation using canny edge detection, and features extraction using pattern averaging. The extracted features are used then as inputs for the neural network which classifies the X-ray knee images as normal or abnormal (arthritic) based on a backpropagation learning algorithm which involves training of the network on 400 X-ray normal and abnormal knee images. The system was tested on 400 x-ray images and the network shows good performance during that phase, resulting in a good identification rate 97%.

Keywords: rheumatoid arthritis, intelligent identification, neural classifier, segmentation, backpropoagation

Procedia PDF Downloads 517
2569 Study of the Benefit Analysis Using Vertical Farming Method in Urban Renewal within the Older City of Taichung

Authors: Hsu Kuo-Wei, Tan Roon Fang, Chao Jen-chih

Abstract:

Cities face environmental challenges, including over-urbanization issues, air and water quality issues, lack of green space, excess heat capture, polluted storm water runoff and lack of ecological biodiversity. The vertical farming holds the condition of technology addressing these issues by enabling more food to be produced with finite less resources use and space. Most of the existing research regarding to technology Industry of agriculture between plant factory and vertical greening, which with high costs and high-technology. Relative research developed a sustainable model for construction and operation of the vertical farm in urban housing which aims to revolutionize our daily life of food production and urban development. However, those researches focused on quantitative analysis. This study utilized relative research for key variables of benefits of vertical farming. In the second stage, utilizes Fuzzy Delphi Method to obtain the critical factors of benefits of vertical farming using in Urban Renewal by interviewing the foregoing experts. Then, Analytic Hierarchy Process is applied to find the importance degree of each criterion as the measurable indices of the vertical farming method in urban renewal within the older city of Taichung.

Keywords: urban renewal, vertical farming, urban agriculture, benefit analysis, the older city of Taichung

Procedia PDF Downloads 448
2568 Accurate Calculation of the Penetration Depth of a Bullet Using ANSYS

Authors: Eunsu Jang, Kang Park

Abstract:

In developing an armored ground combat vehicle (AGCV), it is a very important step to analyze the vulnerability (or the survivability) of the AGCV against enemy’s attack. In the vulnerability analysis, the penetration equations are usually used to get the penetration depth and check whether a bullet can penetrate the armor of the AGCV, which causes the damage of internal components or crews. The penetration equations are derived from penetration experiments which require long time and great efforts. However, they usually hold only for the specific material of the target and the specific type of the bullet used in experiments. Thus, penetration simulation using ANSYS can be another option to calculate penetration depth. However, it is very important to model the targets and select the input parameters in order to get an accurate penetration depth. This paper performed a sensitivity analysis of input parameters of ANSYS on the accuracy of the calculated penetration depth. Two conflicting objectives need to be achieved in adopting ANSYS in penetration analysis: maximizing the accuracy of calculation and minimizing the calculation time. To maximize the calculation accuracy, the sensitivity analysis of the input parameters for ANSYS was performed and calculated the RMS error with the experimental data. The input parameters include mesh size, boundary condition, material properties, target diameter are tested and selected to minimize the error between the calculated result from simulation and the experiment data from the papers on the penetration equation. To minimize the calculation time, the parameter values obtained from accuracy analysis are adjusted to get optimized overall performance. As result of analysis, the followings were found: 1) As the mesh size gradually decreases from 0.9 mm to 0.5 mm, both the penetration depth and calculation time increase. 2) As diameters of the target decrease from 250mm to 60 mm, both the penetration depth and calculation time decrease. 3) As the yield stress which is one of the material property of the target decreases, the penetration depth increases. 4) The boundary condition with the fixed side surface of the target gives more penetration depth than that with the fixed side and rear surfaces. By using above finding, the input parameters can be tuned to minimize the error between simulation and experiments. By using simulation tool, ANSYS, with delicately tuned input parameters, penetration analysis can be done on computer without actual experiments. The data of penetration experiments are usually hard to get because of security reasons and only published papers provide them in the limited target material. The next step of this research is to generalize this approach to anticipate the penetration depth by interpolating the known penetration experiments. This result may not be accurate enough to be used to replace the penetration experiments, but those simulations can be used in the early stage of the design process of AGCV in modelling and simulation stage.

Keywords: ANSYS, input parameters, penetration depth, sensitivity analysis

Procedia PDF Downloads 380
2567 Viability of Rice Husk Ash Concrete Brick/Block from Green Electricity in Bangladesh

Authors: Mohammad A. N. M. Shafiqul Karim

Abstract:

As a developing country, Bangladesh has to face numerous challenges. Self Independence in electricity, contributing to climate change by reducing carbon emission and bringing the backward population of society to the mainstream is more challenging for them. Therefore, it is essential to ensure recycled use of local products to the maximum level in every sector. Some private organizations have already worked alongside government to bring the backward population to the mainstream by developing their financial capacities. As rice husk is the largest single category of the total energy supply in Bangladesh. As part of this strategy, rice husk can play a great as a promising renewable energy source, which is readily available, has considerable environmental benefits and can produce electricity and ensure multiple uses of byproducts in construction technology. For the first time in Bangladesh, an experimental multidimensional project depending on Rice Husk Electricity and Rice Husk Ash (RHA) concrete brick/block under Green Eco-Tech Limited has already been started. Project analysis, opportunity, sustainability, the high monitoring component, limitations and finally evaluated data reflecting the viability of establishing more projects using rice husk are discussed in this paper. The by-product of rice husk from the production of green electricity, RHA, can be used for making, in particular, RHA concrete brick/block in Bangladeshi aspects is also discussed here.

Keywords: project analysis, rice husk, rice husk ash concrete brick/block, compressive strength of rice husk ash concrete brick/block

Procedia PDF Downloads 285
2566 Determination of Nanomolar Mercury (II) by Using Multi-Walled Carbon Nanotubes Modified Carbon Zinc/Aluminum Layered Double Hydroxide – 3 (4-Methoxyphenyl) Propionate Nanocomposite Paste Electrode

Authors: Illyas Md Isa, Sharifah Norain Mohd Sharif, Norhayati Hashima

Abstract:

A mercury(II) sensor was developed by using multi-walled carbon nanotubes (MWCNTs) paste electrode modified with Zn/Al layered double hydroxide-3(4-methoxyphenyl)propionate nanocomposite (Zn/Al-HMPP). The optimum conditions by cyclic voltammetry were observed at electrode composition 2.5% (w/w) of Zn/Al-HMPP/MWCNTs, 0.4 M potassium chloride, pH 4.0, and scan rate of 100 mVs-1. The sensor exhibited wide linear range from 1x10-3 M to 1x10-7 M Hg2+ and 1x10-7 M to 1x10-9 M Hg2+, with a detection limit of 1x10-10 M Hg2+. The high sensitivity of the proposed electrode towards Hg(II) was confirmed by double potential-step chronocoulometry which indicated these values; diffusion coefficient 1.5445 x 10-9 cm2 s-1, surface charge 524.5 µC s-½ and surface coverage 4.41 x 10-2 mol cm-2. The presence of 25-fold concentration of most metal ions had no influence on the anodic peak current. With characteristics such as high sensitivity, selectivity and repeatability the electrode was then proposed as the appropriate alternative for the determination of mercury(II).

Keywords: cyclic voltammetry, mercury(II), modified carbon paste electrode, nanocomposite

Procedia PDF Downloads 297
2565 Absorbed Dose Estimation of 68Ga-EDTMP in Human Organs

Authors: S. Zolghadri, H. Yousefnia, A. R. Jalilian

Abstract:

Bone metastases are observed in a wide range of cancers leading to intolerable pain. While early detection can help the physicians in the decision of the type of treatment, various radiopharmaceuticals using phosphonates like 68Ga-EDTMP have been developed. In this work, due to the importance of absorbed dose, human absorbed dose of this new agent was calculated for the first time based on biodistribution data in Wild-type rats. 68Ga was obtained from 68Ge/68Ga generator with radionuclidic purity and radiochemical purity of higher than 99%. The radiolabeled complex was prepared in the optimized conditions. Radiochemical purity of the radiolabeled complex was checked by instant thin layer chromatography (ITLC) method using Whatman No. 2 paper and saline. The results indicated the radiochemical purity of higher than 99%. The radiolabelled complex was injected into the Wild-type rats and its biodistribution was studied up to 120 min. As expected, major accumulation was observed in the bone. Absorbed dose of each human organ was calculated based on biodistribution in the rats using RADAR method. Bone surface and bone marrow with 0.112 and 0.053 mSv/MBq, respectively, received the highest absorbed dose. According to these results, the radiolabeled complex is a suitable and safe option for PET bone imaging.

Keywords: absorbed dose, EDTMP, ⁶⁸Ga, rats

Procedia PDF Downloads 189
2564 WSN System Warns Atta Cephalotes Climbing in Mango Fruit Trees

Authors: Federico Hahn Schlam, Fermín Martínez Solís

Abstract:

Leaf-cutting ants (Atta cephalotes) forage from mango tree leaves and flowers to feed their colony. Farmers find it difficult to control ants due to the great quantity of trees grown in commercial orchards. In this article, IoT can support farmers for ant detection in real time, as production losses can be considered of 324 US per tree.A wireless sensor network, WSN, was developed to warn the farmer from ant presence in trees during a night. Mango trees were gathered into groups of 9 trees, where the central tree holds the master microcontroller, and the other eight trees presented slave microcontrollers (nodes). At each node, anemitter diode-photodiode unitdetects ants climbing up. A capacitor is chargedand discharged after being sampled every ten minutes. The system usesBLE (Bluetooth Low Energy) to communicate between the master microcontroller by BLE.When ants were detected the number of the tree was transmitted via LoRa from the masterto the producer smartphone to warn him. In this paper, BLE, LoRa, and energy consumption were studied under variable vegetation in the orchard. During 2018, 19 trees were attacked by ants, and ants fed 26.3% of flowers and 73.7% of leaves.

Keywords: BLE, atta cephalotes, LoRa, WSN-smartphone, energy consumption

Procedia PDF Downloads 144
2563 Regulatory and Economic Challenges of AI Integration in Cyber Insurance

Authors: Shreyas Kumar, Mili Shangari

Abstract:

Integrating artificial intelligence (AI) in the cyber insurance sector represents a significant advancement, offering the potential to revolutionize risk assessment, fraud detection, and claims processing. However, this integration introduces a range of regulatory and economic challenges that must be addressed to ensure responsible and effective deployment of AI technologies. This paper examines the multifaceted regulatory landscape governing AI in cyber insurance and explores the economic implications of compliance, innovation, and market dynamics. AI's capabilities in processing vast amounts of data and identifying patterns make it an invaluable tool for insurers in managing cyber risks. Yet, the application of AI in this domain is subject to stringent regulatory scrutiny aimed at safeguarding data privacy, ensuring algorithmic transparency, and preventing biases. Regulatory bodies, such as the European Union with its General Data Protection Regulation (GDPR), mandate strict compliance requirements that can significantly impact the deployment of AI systems. These regulations necessitate robust data protection measures, ethical AI practices, and clear accountability frameworks, all of which entail substantial compliance costs for insurers. The economic implications of these regulatory requirements are profound. Insurers must invest heavily in upgrading their IT infrastructure, implementing robust data governance frameworks, and training personnel to handle AI systems ethically and effectively. These investments, while essential for regulatory compliance, can strain financial resources, particularly for smaller insurers, potentially leading to market consolidation. Furthermore, the cost of regulatory compliance can translate into higher premiums for policyholders, affecting the overall affordability and accessibility of cyber insurance. Despite these challenges, the potential economic benefits of AI integration in cyber insurance are significant. AI-enhanced risk assessment models can provide more accurate pricing, reduce the incidence of fraudulent claims, and expedite claims processing, leading to overall cost savings and increased efficiency. These efficiencies can improve the competitiveness of insurers and drive innovation in product offerings. However, balancing these benefits with regulatory compliance is crucial to avoid legal penalties and reputational damage. The paper also explores the potential risks associated with AI integration, such as algorithmic biases that could lead to unfair discrimination in policy underwriting and claims adjudication. Regulatory frameworks need to evolve to address these issues, promoting fairness and transparency in AI applications. Policymakers play a critical role in creating a balanced regulatory environment that fosters innovation while protecting consumer rights and ensuring market stability. In conclusion, the integration of AI in cyber insurance presents both regulatory and economic challenges that require a coordinated approach involving regulators, insurers, and other stakeholders. By navigating these challenges effectively, the industry can harness the transformative potential of AI, driving advancements in risk management and enhancing the resilience of the cyber insurance market. This paper provides insights and recommendations for policymakers and industry leaders to achieve a balanced and sustainable integration of AI technologies in cyber insurance.

Keywords: artificial intelligence (AI), cyber insurance, regulatory compliance, economic impact, risk assessment, fraud detection, cyber liability insurance, risk management, ransomware

Procedia PDF Downloads 15
2562 Empowering Through Photovoice and Entrepreneurship: A Lived Experience of Alcohol-Induced Disorder and Recovery in Zambia

Authors: Rabson Banda

Abstract:

This abstract delves into the transformative journey of Rabson Banda, a visionary leader in Zambia who has harnessed the power of photovoice, mental fitness, and entrepreneurship to combat substance use disorders in the face of limited job opportunities in Africa. Rabson's personal battle with alcohol-induced disorder serves as the foundation for his pioneering work in establishing Elevated Initiatives, a grassroots organization dedicated to empowering individuals struggling with addiction through innovative approaches. Through the lens of photovoice, Rabson Banda amplifies the voices of those affected by substance abuse, providing a platform for self-expression and healing. By intertwining mental fitness techniques and entrepreneurial skills, he equips individuals with the tools needed to break free from the cycle of addiction and chart a new path toward holistic wellness and economic independence. Rabson Banda's story embodies resilience, hope, and the unwavering belief in the transformative power of community-driven initiatives. His work not only addresses the immediate challenges of substance use disorders but also addresses the root causes of addiction by advocating for increased job opportunities and economic empowerment in Zambia and across Africa for decent job creation and Entrepreneurship: A Lived Experience of Alcohol-Induced Disorder and Recovery in Zambia.

Keywords: mental fitness, entrepreneurship, photovoice, descent jobs

Procedia PDF Downloads 25
2561 Turmeric Mediated Synthesis and Characterization of Cerium Oxide Nanoparticles

Authors: Nithin Krisshna Gunasekaran, Prathima Prabhu Tumkur, Nicole Nazario Bayon, Krishnan Prabhakaran, Joseph C. Hall, Govindarajan T. Ramesh

Abstract:

Cerium oxide and turmeric have antioxidant properties, which have gained interest among researchers to study their applications in the field of biomedicine, such asanti-inflammatory, anticancer, and antimicrobial applications. In this study, the turmeric extract was prepared and mixed with cerium nitrate hexahydrate, stirred continuously to obtain a homogeneous solution and then heated on a hot plate to get the supernatant evaporated, then calcinated at 600°C to obtain the cerium oxide nanoparticles. Characterization of synthesized cerium oxide nanoparticles through Scanning Electron Microscopy determined the particle size to be in the range of 70 nm to 250 nm. Energy Dispersive X-Ray Spectroscopy determined the elemental composition of cerium and oxygen. Individual particles were identified through the characterization of cerium oxide nanoparticles using Field Emission Scanning Electron Microscopy, in which the particles were determined to be spherical and in the size of around 70 nm. The presence of cerium oxide was assured by analyzing the spectrum obtained through the characterization of cerium oxide nanoparticles by Fourier Transform Infrared Spectroscopy. The crystal structure of cerium oxide nanoparticles was determined to be face-centered cubic by analyzing the peaks obtained through theX-Ray Diffraction method. The crystal size of cerium oxide nanoparticles was determined to be around 13 nm by using the Debye Scherer equation. This study confirmed the synthesis of cerium oxide nanoparticles using turmeric extract.

Keywords: antioxidant, characterization, cerium oxide, synthesis, turmeric

Procedia PDF Downloads 146
2560 Audio-Lingual Method and the English-Speaking Proficiency of Grade 11 Students

Authors: Marthadale Acibo Semacio

Abstract:

Speaking skill is a crucial part of English language teaching and learning. This actually shows the great importance of this skill in English language classes. Through speaking, ideas and thoughts are shared with other people, and a smooth interaction between people takes place. The study examined the levels of speaking proficiency of the control and experimental groups on pronunciation, grammatical accuracy, and fluency. As a quasi-experimental study, it also determined the presence or absence of significant changes in their speaking proficiency levels in terms of pronouncing the words correctly, the accuracy of grammar and fluency of a language given the two methods to the groups of students in the English language, using the traditional and audio-lingual methods. Descriptive and inferential statistics were employed according to the stated specific problems. The study employed a video presentation with prior information about it. In the video, the teacher acts as model one, giving instructions on what is going to be done, and then the students will perform the activity. The students were paired purposively based on their learning capabilities. Observing proper ethics, their performance was audio recorded to help the researcher assess the learner using the modified speaking rubric. The study revealed that those under the traditional method were more fluent than those in the audio-lingual method. With respect to the way in which each method deals with the feelings of the student, the audio-lingual one fails to provide a principle that would relate to this area and follows the assumption that the intrinsic motivation of the students to learn the target language will spring from their interest in the structure of the language. However, the speaking proficiency levels of the students were remarkably reinforced in reading different words through the aid of aural media with their teachers. The study concluded that using an audio-lingual method of teaching is not a stand-alone method but only an aid of the teacher in helping the students improve their speaking proficiency in the English Language. Hence, audio-lingual approach is encouraged to be used in teaching English language, on top of the chalk-talk or traditional method, to improve the speaking proficiency of students.

Keywords: audio-lingual, speaking, grammar, pronunciation, accuracy, fluency, proficiency

Procedia PDF Downloads 54