Search results for: voting techniques
6801 Triangular Geometric Feature for Offline Signature Verification
Authors: Zuraidasahana Zulkarnain, Mohd Shafry Mohd Rahim, Nor Anita Fairos Ismail, Mohd Azhar M. Arsad
Abstract:
Handwritten signature is accepted widely as a biometric characteristic for personal authentication. The use of appropriate features plays an important role in determining accuracy of signature verification; therefore, this paper presents a feature based on the geometrical concept. To achieve the aim, triangle attributes are exploited to design a new feature since the triangle possesses orientation, angle and transformation that would improve accuracy. The proposed feature uses triangulation geometric set comprising of sides, angles and perimeter of a triangle which is derived from the center of gravity of a signature image. For classification purpose, Euclidean classifier along with Voting-based classifier is used to verify the tendency of forgery signature. This classification process is experimented using triangular geometric feature and selected global features. Based on an experiment that was validated using Grupo de Senales 960 (GPDS-960) signature database, the proposed triangular geometric feature achieves a lower Average Error Rates (AER) value with a percentage of 34% as compared to 43% of the selected global feature. As a conclusion, the proposed triangular geometric feature proves to be a more reliable feature for accurate signature verification.Keywords: biometrics, euclidean classifier, features extraction, offline signature verification, voting-based classifier
Procedia PDF Downloads 3776800 The Role of Social Media on Political Behaviour in Malaysia
Authors: Ismail Sualman, Mohd Khairuddin Othman
Abstract:
General Election has been the backbone of democracy that permits people to choose their representatives as they deem fit. The support preferences of the voter differ from one to another, particularly in a plural society like Malaysia. The turning up of high numbers of young voters during the Malaysia 14th General Election has been said to have been caused by social media including Facebook, Twitter, WhatsApp, Instagram, YouTube and Telegram, WeChat and SMS/MMs. It has been observed that, besides using social media as an interaction tool among social friends, it is also an important source of information to know about issues, politics and politicians. This paper exhibits the role of social media in providing political information to young voters, before an election and during the election campaign. This study examines how this information is being translated into election support. A total of 799 Malay young respondents in Selangor have been surveyed and interviewed. This study revealed that social media has become the source of political information among Malay young voters. This research suggested that social media had a significant effect on the support during the election. Social media plays an important role in carrying information such as current issues, voting trends, candidate imagery and matters that may influence the view of young voters. The information obtained from social media has been translated into a voting decision.Keywords: social media, political behaviour, voters’ choice, election.
Procedia PDF Downloads 1456799 Legal Feminism, Modernity and Their Impact on Some African Countries
Authors: Umulisa Linda, Andy Cons Matata
Abstract:
The origin of legal feminism can be attributed to an attempt to provide a safe space for women such as voting, parental, and inheritance rights, among others. It was also a rebellion against male supremacy. However, with the development of technology and especially in the era of the internet, it appears that both legal feminism and the modernism are losing their luster. While these movements had their origin either in the United States of America or western Europe, their impacts have been felt as far as Africa, Asia, and Latin America. In Africa, different countries have different levels of penetration of these movements. This study, therefore, had its focus on how legal feminism and modernism have influenced legal developments in Kenya and Rwanda. The study adopted a qualitative approach with the respondents being asked about their feelings and perceptions on how the two movements had affected legal developments in their countries. In order to gauge the opinion of different categories of people such as the youth, middle-aged and the elderly people as well as being gender-sensitive, the study adopted a purpose method of sampling. The questionnaires and the focus group discussions were employed as the main tools for data gathering. From the questionnaires, the focus group discussions, and the data analysis that followed, the study concluded that both legal feminism and modernity had penetrated the legal systems of both Kenya and Rwanda so deeply. The study further found that the proponents of the two movements were mostly urban based and educated women. The men were generally opposed to the movements.Keywords: legal development, legal feminsim, modernism, voting, parental and inheritance rights
Procedia PDF Downloads 1436798 Seismic Perimeter Surveillance System (Virtual Fence) for Threat Detection and Characterization Using Multiple ML Based Trained Models in Weighted Ensemble Voting
Authors: Vivek Mahadev, Manoj Kumar, Neelu Mathur, Brahm Dutt Pandey
Abstract:
Perimeter guarding and protection of critical installations require prompt intrusion detection and assessment to take effective countermeasures. Currently, visual and electronic surveillance are the primary methods used for perimeter guarding. These methods can be costly and complicated, requiring careful planning according to the location and terrain. Moreover, these methods often struggle to detect stealthy and camouflaged insurgents. The object of the present work is to devise a surveillance technique using seismic sensors that overcomes the limitations of existing systems. The aim is to improve intrusion detection, assessment, and characterization by utilizing seismic sensors. Most of the similar systems have only two types of intrusion detection capability viz., human or vehicle. In our work we could even categorize further to identify types of intrusion activity such as walking, running, group walking, fence jumping, tunnel digging and vehicular movements. A virtual fence of 60 meters at GCNEP, Bahadurgarh, Haryana, India, was created by installing four underground geophones at a distance of 15 meters each. The signals received from these geophones are then processed to find unique seismic signatures called features. Various feature optimization and selection methodologies, such as LightGBM, Boruta, Random Forest, Logistics, Recursive Feature Elimination, Chi-2 and Pearson Ratio were used to identify the best features for training the machine learning models. The trained models were developed using algorithms such as supervised support vector machine (SVM) classifier, kNN, Decision Tree, Logistic Regression, Naïve Bayes, and Artificial Neural Networks. These models were then used to predict the category of events, employing weighted ensemble voting to analyze and combine their results. The models were trained with 1940 training events and results were evaluated with 831 test events. It was observed that using the weighted ensemble voting increased the efficiency of predictions. In this study we successfully developed and deployed the virtual fence using geophones. Since these sensors are passive, do not radiate any energy and are installed underground, it is impossible for intruders to locate and nullify them. Their flexibility, quick and easy installation, low costs, hidden deployment and unattended surveillance make such systems especially suitable for critical installations and remote facilities with difficult terrain. This work demonstrates the potential of utilizing seismic sensors for creating better perimeter guarding and protection systems using multiple machine learning models in weighted ensemble voting. In this study the virtual fence achieved an intruder detection efficiency of over 97%.Keywords: geophone, seismic perimeter surveillance, machine learning, weighted ensemble method
Procedia PDF Downloads 786797 Analyzing Microblogs: Exploring the Psychology of Political Leanings
Authors: Meaghan Bowman
Abstract:
Microblogging has become increasingly popular for commenting on current events, spreading gossip, and encouraging individualism--which favors its low-context communication channel. These social media (SM) platforms allow users to express opinions while interacting with a wide range of populations. Hashtags allow immediate identification of like-minded individuals worldwide on a vast array of topics. The output of the analytic tool, Linguistic Inquiry and Word Count (LIWC)--a program that associates psychological meaning with the frequency of use of specific words--may suggest the nature of individuals’ internal states and general sentiments. When applied to groupings of SM posts unified by a hashtag, such information can be helpful to community leaders during periods in which the forming of public opinion happens in parallel with the unfolding of political, economic, or social events. This is especially true when outcomes stand to impact the well-being of the group. Here, we applied the online tools, Google Translate and the University of Texas’s LIWC, to a 90-posting sample from a corpus of Colombian Spanish microblogs. On translated disjoint sets, identified by hashtag as being authored by advocates of voting “No,” advocates voting “Yes,” and entities refraining from hashtag use, we observed the value of LIWC’s Tone feature as distinguishing among the categories and the word “peace,” as carrying particular significance, due to its frequency of use in the data.Keywords: Colombia peace referendum, FARC, hashtags, linguistics, microblogging, social media
Procedia PDF Downloads 1066796 Voting Behavior in an Era of Turbulent Race Relations: Revisiting Church Attendance and Turnout
Authors: JoVontae Butts
Abstract:
A central and enduring theme in the study of American politics is political participation, which indicates the health of a democracy, citizen buy-in, and fair political representation. Though voting push factors have been thoroughly researched and are becoming better understood, the effect of those same push factors often varies for marginalized people. Black voters begun to cast votes at a steadily increasing rate following the 1996 election, gradually growing to its highest level in the 2012 presidential election, even surpassing white voter participation rates. The thirty-year growth period of Black voter engagement concluded in the 2016 election, with the number of participating Black voters stumbling by approximately 7% while other demographics remained roughly the same. Theories for the shift in Black voter behavior range from vote suppression to discouragement due to Barack Obama’s concluding tenure in office. Furthermore, Black voter engagement rebounded in the 2020 election, leaving turnout and race scholars to speculate even further, predicting that disapproval of Trump energized the Black voter bloc. Though there is much conjecture regarding the changes in Black voter behavior, there is truly little empirical evidence to vet those suppositions. This study engages and quantifies speculations for the changes in Black voter engagement in recent elections using 2016 and 2020 American National Election Studies Pilot Study data. Additionally, this study expands upon McGregor’s theory of political hypervigilance by exploring differences in political engagement for church-attending Black voters and those that do not.Keywords: race, religion, evangelicalism, political engagement
Procedia PDF Downloads 816795 Application of Optimization Techniques in Overcurrent Relay Coordination: A Review
Authors: Syed Auon Raza, Tahir Mahmood, Syed Basit Ali Bukhari
Abstract:
In power system properly coordinated protection scheme is designed to make sure that only the faulty part of the system will be isolated when abnormal operating condition of the system will reach. The complexity of the system as well as the increased user demand and the deregulated environment enforce the utilities to improve system reliability by using a properly coordinated protection scheme. This paper presents overview of over current relay coordination techniques. Different techniques such as Deterministic Techniques, Meta Heuristic Optimization techniques, Hybrid Optimization Techniques, and Trial and Error Optimization Techniques have been reviewed in terms of method of their implementation, operation modes, nature of distribution system, and finally their advantages as well as the disadvantages.Keywords: distribution system, relay coordination, optimization, Plug Setting Multiplier (PSM)
Procedia PDF Downloads 3976794 Evaluation of Ensemble Classifiers for Intrusion Detection
Authors: M. Govindarajan
Abstract:
One of the major developments in machine learning in the past decade is the ensemble method, which finds highly accurate classifier by combining many moderately accurate component classifiers. In this research work, new ensemble classification methods are proposed with homogeneous ensemble classifier using bagging and heterogeneous ensemble classifier using arcing and their performances are analyzed in terms of accuracy. A Classifier ensemble is designed using Radial Basis Function (RBF) and Support Vector Machine (SVM) as base classifiers. The feasibility and the benefits of the proposed approaches are demonstrated by the means of standard datasets of intrusion detection. The main originality of the proposed approach is based on three main parts: preprocessing phase, classification phase, and combining phase. A wide range of comparative experiments is conducted for standard datasets of intrusion detection. The performance of the proposed homogeneous and heterogeneous ensemble classifiers are compared to the performance of other standard homogeneous and heterogeneous ensemble methods. The standard homogeneous ensemble methods include Error correcting output codes, Dagging and heterogeneous ensemble methods include majority voting, stacking. The proposed ensemble methods provide significant improvement of accuracy compared to individual classifiers and the proposed bagged RBF and SVM performs significantly better than ECOC and Dagging and the proposed hybrid RBF-SVM performs significantly better than voting and stacking. Also heterogeneous models exhibit better results than homogeneous models for standard datasets of intrusion detection.Keywords: data mining, ensemble, radial basis function, support vector machine, accuracy
Procedia PDF Downloads 2466793 Analyzing the Effectiveness of Different Testing Techniques in Ensuring Software Quality
Authors: R. M. P. C. Bandara, M. L. L. Weerasinghe, K. T. C. R. Kumari, A. G. D. R. Hansika, D. I. De Silva, D. M. T. H. Dias
Abstract:
Software testing is an essential process in software development that aims to identify defects and ensure that software is functioning as intended. Various testing techniques are employed to achieve this goal, but the effectiveness of these techniques varies. This research paper analyzes the effectiveness of different testing techniques in ensuring software quality. The paper explores different testing techniques, including manual and automated testing, and evaluates their effectiveness in terms of identifying defects, reducing the number of defects in software, and ensuring that software meets its functional and non-functional requirements. Moreover, the paper will also investigate the impact of factors such as testing time, test coverage, and testing environment on the effectiveness of these techniques. This research aims to provide valuable insights into the effectiveness of different testing techniques, enabling software development teams to make informed decisions about the testing approach that is best suited to their needs. By improving testing techniques, the number of defects in software can be reduced, enhancing the quality of software and ultimately providing better software for users.Keywords: software testing life cycle, software testing techniques, software testing strategies, effectiveness, software quality
Procedia PDF Downloads 836792 A Review of Soil Stabilization Techniques
Authors: Amin Chegenizadeh, Mahdi Keramatikerman
Abstract:
Soil stabilization is a crucial issue that helps to remove of risks associated with the soil failure. As soil has applications in different industries such as construction, pavement and railways, the means of stabilizing soil are varied. This paper will focus on the techniques of stabilizing soils. It will do so by gathering useful information on the state of the art in the field of soil stabilization, investigating both traditional and advanced methods. To inquire into the current knowledge, the existing literature will be divided into categories addressing the different techniques.Keywords: review, soil, stabilization, techniques
Procedia PDF Downloads 5446791 Misleading Node Detection and Response Mechanism in Mobile Ad-Hoc Network
Authors: Earleen Jane Fuentes, Regeene Melarese Lim, Franklin Benjamin Tapia, Alexis Pantola
Abstract:
Mobile Ad-hoc Network (MANET) is an infrastructure-less network of mobile devices, also known as nodes. These nodes heavily rely on each other’s resources such as memory, computing power, and energy. Thus, some nodes may become selective in forwarding packets so as to conserve their resources. These nodes are called misleading nodes. Several reputation-based techniques (e.g. CORE, CONFIDANT, LARS, SORI, OCEAN) and acknowledgment-based techniques (e.g. TWOACK, S-TWOACK, EAACK) have been proposed to detect such nodes. These techniques do not appropriately punish misleading nodes. Hence, this paper addresses the limitations of these techniques using a system called MINDRA.Keywords: acknowledgment-based techniques, mobile ad-hoc network, selfish nodes, reputation-based techniques
Procedia PDF Downloads 3846790 Alternate Methods to Visualize 2016 U.S. Presidential Election Result
Authors: Hong Beom Hur
Abstract:
Politics in America is polarized. The best illustration of this is the 2016 presidential election result map. States with megacities like California, New York, Illinois, Virginia, and others are marked blue to signify the color of the Democratic party. States located in inland and south like Texas, Florida, Tennesse, Kansas and others are marked red to signify the color of the Republican party. Such a stark difference between two colors, red and blue, combined with geolocations of each state with their borderline remarks one central message; America is divided into two colors between urban Democrats and rural Republicans. This paper seeks to defy the visualization by pointing out its limitations and search for alternative ways to visualize the 2016 election result. One such limitation is that geolocations of each state and state borderlines limit the visualization of population density. As a result, the election result map does not convey the fact that Clinton won the popular vote and only accentuates the voting patterns of urban and rural states. The paper seeks whether an alternative narrative can be observed by factoring in the population number into the size of each state and manipulating the state borderline according to the normalization. Yet another alternative narrative may be reached by factoring the size of each state by the number of the electoral college of each state by voting and visualize the number. Other alternatives will be discussed but are not implemented in visualization. Such methods include dividing the land of America into about 120 million cubes each representing a voter or by the number of whole population 300 million cubes. By exploring these alternative methods to visualize the politics of the 2016 election map, the public may be able to question whether it is possible to be free from the narrative of the divide-conquer when interpreting the election map and to look at both parties as a story of the United States of America.Keywords: 2016 U.S. presidential election, data visualization, population scale, geo-political
Procedia PDF Downloads 1216789 Management Accounting Techniques of Companies Listed on the Stock Exchange in Thailand
Authors: Prateep Wajeetongratana
Abstract:
The objectives of the research were to examine that how management accounting techniques were perceived and used by companies listed on the stock exchange and to investigate similarities or differences of management accounting practices between companies listed on the stock exchange and Thai SMEs. Descriptive and inferential statistics were employed. The finding found that almost all of the companies used traditional management accounting techniques more than advanced management accounting techniques. Four management accounting techniques having no significant association with business characteristic were standard costing, job order costing, process costing. The barriers that Thai SMEs encountered were a lack of proper accounting system and the insufficient knowledge in management accounting of the accountants. The comparison results revealed that both companies listed on the stock exchange and Thai SMEs used traditional management accounting techniques more than advanced techniques.Keywords: companies listed on the stock exchange, financial budget, management accounting, operating budget
Procedia PDF Downloads 3826788 Condition Based Assessment of Power Transformer with Modern Techniques
Authors: Piush Verma, Y. R. Sood
Abstract:
This paper provides the information on the diagnostics techniques for condition monitoring of power transformer (PT). This paper deals with the practical importance of the transformer diagnostic in the Electrical Engineering field. The life of the transformer depends upon its insulation i.e paper and oil. The major testing techniques applies on transformer oil and paper i.e dissolved gas analysis, furfural analysis, radio interface, acoustic emission, infra-red emission, frequency response analysis, power factor, polarization spectrum, magnetizing currents, turn and winding ratio. A review has been made on the modern development of this practical technology.Keywords: temperature, condition monitoring, diagnostics methods, paper analysis techniques, oil analysis techniques
Procedia PDF Downloads 4326787 Innovative Techniques of Teaching Henrik Ibsen’s a Doll’s House
Authors: Shilpagauri Prasad Ganpule
Abstract:
The teaching of drama is considered as the most significant and noteworthy area in an ESL classroom. Diverse innovative techniques can be used to make the teaching of drama worthwhile and interesting. The paper presents the different innovative techniques that can be used while teaching Henrik Ibsen’s A Doll’s House [2007]. The innovative techniques facilitate students’ understanding and comprehension of the text. The use of the innovative techniques makes them explore the dramatic text and uncover a multihued arena of meanings hidden in it. They arouse the students’ interest and assist them overcome the difficulties created by the second language. The diverse innovative techniques appeal to the imagination of the students and increase their participation in the classroom. They help the students in the appreciation of the dramatic text and make the teaching learning situation a fruitful experience for both the teacher and students. The students successfully overcome the problem of L2 comprehension and grasp the theme, story line and plot-structure of the play effectively. The innovative techniques encourage a strong sense of participation on the part of the students and persuade them to learn through active participation. In brief, the innovative techniques promote the students to perform various tasks and expedite their learning process. Thus the present paper makes an attempt to present varied innovative techniques that can be used while teaching drama. It strives to demonstrate how the use of innovative techniques improve and enhance the students’ understanding and appreciation of Ibsen’s A Doll’s House [2007].Keywords: ESL classroom, innovative techniques, students’ participation, teaching of drama
Procedia PDF Downloads 6246786 Micro-CT Imaging Of Hard Tissues
Authors: Amir Davood Elmi
Abstract:
From the earliest light microscope to the most innovative X-ray imaging techniques, all of them have refined and improved our knowledge about the organization and composition of living tissues. The old techniques are time consuming and ultimately destructive to the tissues under the examination. In recent few decades, thanks to the boost of technology, non-destructive visualization techniques, such as X-ray computed tomography (CT), magnetic resonance imaging (MRI), selective plane illumination microscopy (SPIM), and optical projection tomography (OPT), have come to the forefront. Among these techniques, CT is excellent for mineralized tissues such as bone or dentine. In addition, CT it is faster than other aforementioned techniques and the sample remains intact. In this article, applications, advantages, and limitations of micro-CT is discussed, in addition to some information about micro-CT of soft tissue.Keywords: Micro-CT, hard tissue, bone, attenuation coefficient, rapid prototyping
Procedia PDF Downloads 1416785 Digital Control Techniques for Power Electronic Devices
Authors: Rakesh Krishna, Abhishek Poddar
Abstract:
The paper discusses the work carried out on the implementation of control techniques like Digital Pulse Width Modulation (PWM) and Digital Pulse Fired control(PFC). These techniques are often used in devices like inverters, battery chargers, DC-to-DC converters can also be implemented on household devices like heaters. The advantage being the control and improved life span of device. In case of batteries using these techniques are known to increase the life span of battery in mobiles and other hand-held devices. 8051 microcontroller is used to implement these methods.Thyristors are used for switching operations.Keywords: PWM, SVM, PFC, bidirectional inverters, snubber
Procedia PDF Downloads 5706784 A Theoretical Approach on Electoral Competition, Lobby Formation and Equilibrium Policy Platforms
Authors: Deepti Kohli, Meeta Keswani Mehra
Abstract:
The paper develops a theoretical model of electoral competition with purely opportunistic candidates and a uni-dimensional policy using the probability voting approach while focusing on the aspect of lobby formation to analyze the inherent complex interactions between centripetal and centrifugal forces and their effects on equilibrium policy platforms. There exist three types of agents, namely, Left-wing, Moderate and Right-wing who comprise of the total voting population. Also, it is assumed that the Left and Right agents are free to initiate a lobby of their choice. If initiated, these lobbies generate donations which in turn can be contributed to one (or both) electoral candidates in order to influence them to implement the lobby’s preferred policy. Four different lobby formation scenarios have been considered: no lobby formation, only Left, only Right and both Left and Right. The equilibrium policy platforms, amount of individual donations by agents to their respective lobbies and the contributions offered to the electoral candidates have been solved for under each of the above four cases. Since it is assumed that the agents cannot coordinate each other’s actions during the lobby formation stage, there exists a probability with which a lobby would be formed, which is also solved for in the model. The results indicate that the policy platforms of the two electoral candidates converge completely under the cases of no lobby and both (extreme) formations but diverge under the cases of only one (Left or Right) lobby formation. This is because in the case of no lobby being formed, only the centripetal forces (emerging from the election-winning aspect) are present while in the case of both extreme (Left-wing and Right-wing) lobbies being formed, centrifugal forces (emerging from the lobby formation aspect) also arise but cancel each other out, again resulting in a pure policy convergence phenomenon. In contrast, in case of only one lobby being formed, both centripetal and centrifugal forces interact strategically, leading the two electoral candidates to choose completely different policy platforms in equilibrium. Additionally, it is found that in equilibrium, while the donation by a specific agent type increases with the formation of both lobbies in comparison to when only one lobby is formed, the probability of implementation of the policy being advocated by that lobby group falls.Keywords: electoral competition, equilibrium policy platforms, lobby formation, opportunistic candidates
Procedia PDF Downloads 3296783 An Empirical Analysis of the Perception of First Time Voters in Pakistan on the Upcoming General Election 2018, Relationships between Voters and Factors That Affect Voter Priorities
Authors: Syed Muhammad Wajih ul Hassan
Abstract:
This research looks at the perception of first-time voters in Pakistan on the political dynamics of the country. This paper shall review the researches that were conducted by Gallup Pakistan and compare it with our findings regarding the voter behavior and factors that affect the priorities of the voters. A country where democracy has just completed its 2 consecutive tenures for the first time, one would always want to know about the voting trends among youth where young population makes 60% of the population in the country. In that case, it is not only a big task to find out voter patterns and trends voters might adhere to while a general election is approaching. Also, the paper discovers the psychology of young Pakistani voters on the upcoming election of 2018 but also the factors that influence the voting decisions of a voter. This research tries to study the relations among voters and how they view each other in general. The paper also explores the views of voters on the factors that impact decision making of a voter while casting his/her vote in Pakistan. The paper thoroughly studies the expectations of the voters from the current system that prevails in the country. The reason this research was conducted is that this kind of positive approach towards finding out the voter perception is heavily untouched in Pakistani academia. This study can benefit a lot of institutions and professions in the future too. The constraints and obstacles that came while this research was being conducted are also identified in the paper. The mode of research is primary research as it was impossible to find out the perceptions of first-time voters without going on the field and carrying out the research. The research was conducted in one of the most reputable and liberal educational institutions of Pakistan. This research is based on a survey that was conducted through questionnaires where responses were collected through a mix process of random and convenient sampling. The major findings of the study show that young voters have a realistic perspective about the electoral process in the country. The research also articulates the factors that affect the priorities of young voters, and also how young voters view other voters that belong from other sections of the society. To conclude, we can say that this research will give us a perspective that can define and identify the voter priorities of the future in Pakistan.Keywords: first time voters, general election 2018, Pakistan, young
Procedia PDF Downloads 2226782 The Use of Relaxation Training in Special Schools for Children With Learning Disabilities
Authors: Birgit Heike Spohn
Abstract:
Several authors (e.g., Krowatschek & Reid, 2011; Winkler, 1998) pronounce themselves in favor of the use of relaxation techniques in school because those techniques could help children to cope with stress, improve power of concentration, learning, and social behavior as well as class climate. Children with learning disabilities might profit from those techniques in a special way because they contribute to improved learning behavior. There is no study addressing the frequency of the use of relaxation techniques in special schools for children with learning disabilities in German speaking countries. The paper presents a study in which all teachers of special schools for children with learning disabilities in a district of South Germany (n = 625) were questioned about the use of relaxation techniques in school using a standardized questionnaire. Variables addressed were the use of these techniques in the classroom, aspects of their use (kind of relaxation technique, frequency, and regularity of their use), and potential influencing factors. The results are discussed, and implications for further research are drawn.Keywords: special education, learning disabilities, relaxation training, concentration
Procedia PDF Downloads 1076781 Analytical Study of Data Mining Techniques for Software Quality Assurance
Authors: Mariam Bibi, Rubab Mehboob, Mehreen Sirshar
Abstract:
Satisfying the customer requirements is the ultimate goal of producing or developing any product. The quality of the product is decided on the bases of the level of customer satisfaction. There are different techniques which have been reported during the survey which enhance the quality of the product through software defect prediction and by locating the missing software requirements. Some mining techniques were proposed to assess the individual performance indicators in collaborative environment to reduce errors at individual level. The basic intention is to produce a product with zero or few defects thereby producing a best product quality wise. In the analysis of survey the techniques like Genetic algorithm, artificial neural network, classification and clustering techniques and decision tree are studied. After analysis it has been discovered that these techniques contributed much to the improvement and enhancement of the quality of the product.Keywords: data mining, defect prediction, missing requirements, software quality
Procedia PDF Downloads 4656780 Quality Assurance in Cardiac Disorder Detection Images
Authors: Anam Naveed, Asma Andleeb, Mehreen Sirshar
Abstract:
In the article, Image processing techniques have been applied on cardiac images for enhancing the image quality. Two types of methodologies considers for survey, invasive techniques and non-invasive techniques. Different image processes for improvement of cardiac image quality and reduce the amount of radiation exposure for invasive techniques are explored. Different image processing algorithms for enhancing the noninvasive cardiac image qualities are described. Beside these two methodologies, third methodology has applied on live streaming of heart rate on ECG window for extracting necessary information, removing noise and enhancing quality. Sensitivity analyses have been carried out to investigate the impacts of cardiac images for diagnosis of cardiac arteries disease and how the enhancement on images will help the cardiologist to diagnoses disease. The paper evaluates strengths and weaknesses of different techniques applied for improved the image quality and draw a conclusion. Some specific limitations must be considered for whole survey, like the patient heart beat must be 70-75 beats/minute while doing the angiography, similarly patient weight and exposure radiation amount has some limitation.Keywords: cardiac images, CT angiography, critical analysis, exposure radiation, invasive techniques, invasive techniques, non-invasive techniques
Procedia PDF Downloads 3516779 Implementation and Performance Analysis of Data Encryption Standard and RSA Algorithm with Image Steganography and Audio Steganography
Authors: S. C. Sharma, Ankit Gambhir, Rajeev Arya
Abstract:
In today’s era data security is an important concern and most demanding issues because it is essential for people using online banking, e-shopping, reservations etc. The two major techniques that are used for secure communication are Cryptography and Steganography. Cryptographic algorithms scramble the data so that intruder will not able to retrieve it; however steganography covers that data in some cover file so that presence of communication is hidden. This paper presents the implementation of Ron Rivest, Adi Shamir, and Leonard Adleman (RSA) Algorithm with Image and Audio Steganography and Data Encryption Standard (DES) Algorithm with Image and Audio Steganography. The coding for both the algorithms have been done using MATLAB and its observed that these techniques performed better than individual techniques. The risk of unauthorized access is alleviated up to a certain extent by using these techniques. These techniques could be used in Banks, RAW agencies etc, where highly confidential data is transferred. Finally, the comparisons of such two techniques are also given in tabular forms.Keywords: audio steganography, data security, DES, image steganography, intruder, RSA, steganography
Procedia PDF Downloads 2886778 Image Segmentation Techniques: Review
Authors: Lindani Mbatha, Suvendi Rimer, Mpho Gololo
Abstract:
Image segmentation is the process of dividing an image into several sections, such as the object's background and the foreground. It is a critical technique in both image-processing tasks and computer vision. Most of the image segmentation algorithms have been developed for gray-scale images and little research and algorithms have been developed for the color images. Most image segmentation algorithms or techniques vary based on the input data and the application. Nearly all of the techniques are not suitable for noisy environments. Most of the work that has been done uses the Markov Random Field (MRF), which involves the computations and is said to be robust to noise. In the past recent years' image segmentation has been brought to tackle problems such as easy processing of an image, interpretation of the contents of an image, and easy analysing of an image. This article reviews and summarizes some of the image segmentation techniques and algorithms that have been developed in the past years. The techniques include neural networks (CNN), edge-based techniques, region growing, clustering, and thresholding techniques and so on. The advantages and disadvantages of medical ultrasound image segmentation techniques are also discussed. The article also addresses the applications and potential future developments that can be done around image segmentation. This review article concludes with the fact that no technique is perfectly suitable for the segmentation of all different types of images, but the use of hybrid techniques yields more accurate and efficient results.Keywords: clustering-based, convolution-network, edge-based, region-growing
Procedia PDF Downloads 946777 Comparative Study of Different Enhancement Techniques for Computed Tomography Images
Authors: C. G. Jinimole, A. Harsha
Abstract:
One of the key problems facing in the analysis of Computed Tomography (CT) images is the poor contrast of the images. Image enhancement can be used to improve the visual clarity and quality of the images or to provide a better transformation representation for further processing. Contrast enhancement of images is one of the acceptable methods used for image enhancement in various applications in the medical field. This will be helpful to visualize and extract details of brain infarctions, tumors, and cancers from the CT image. This paper presents a comparison study of five contrast enhancement techniques suitable for the contrast enhancement of CT images. The types of techniques include Power Law Transformation, Logarithmic Transformation, Histogram Equalization, Contrast Stretching, and Laplacian Transformation. All these techniques are compared with each other to find out which enhancement provides better contrast of CT image. For the comparison of the techniques, the parameters Peak Signal to Noise Ratio (PSNR) and Mean Square Error (MSE) are used. Logarithmic Transformation provided the clearer and best quality image compared to all other techniques studied and has got the highest value of PSNR. Comparison concludes with better approach for its future research especially for mapping abnormalities from CT images resulting from Brain Injuries.Keywords: computed tomography, enhancement techniques, increasing contrast, PSNR and MSE
Procedia PDF Downloads 3126776 An Approach to Physical Performance Analysis for Judo
Authors: Stefano Frassinelli, Alessandro Niccolai, Riccardo E. Zich
Abstract:
Sport performance analysis is a technique that is becoming every year more important for athletes of every level. Many techniques have been developed to measure and analyse efficiently the performance of athletes in some sports, but in combat sports these techniques found in many times their limits, due to the high interaction between the two opponents during the competition. In this paper the problem will be framed. Moreover the physical performance measurement problem will be analysed and three different techniques to manage it will be presented. All the techniques have been used to analyse the performance of 22 high level Judo athletes.Keywords: sport performance, physical performance, judo, performance coefficients
Procedia PDF Downloads 4116775 Applying Personel Resilence and Emotional Agitation in Occupational, Health and Safety Education and Training
Authors: M. Jayandran
Abstract:
Continual professional development is an important concept for safety professionals to strengthen the knowledge base and to achieve the required qualifications or international memberships in a given time. But the main problems which have observed among most of the safety aspirants are as follows: lack of focus, inferiority complex, superiority complex, lack of interest and lethargy, family and off job stress, health issues, usage of drugs and alcohol, and absenteeism. A HSE trainer should be an expert in soft skills and other stress, emotional handling techniques, so as to manage the above aspirants during training. To do this practice, a trainer has to brainstorm himself of few of the soft skills like personnel resilience, mnemonic techniques, mind healing, and subconscious suggestion techniques by integrating with an emotional intelligence quotient of the aspirants. By adopting these techniques, a trainer can successfully deliver the course and influence the different types of audience to achieve success in training.Keywords: personnel resilience, mnemonic techniques, mind healing, sub conscious suggestion techniques
Procedia PDF Downloads 3056774 An Overview of Heating and Cooling Techniques Used in Green Buildings
Authors: Umesh Kumar Soni, Suresh Kumar Soni, S. R. Awasthi
Abstract:
Worldwide biggest difficulties are climate change, future availability of fossil fuels, and economical feasibility of renewable energy. They force us to use to a greater extent renewable energy and develop suitable hybrid renewable systems. Building heating/cooling consumes significant amount of energy. It can be conserved by use of proper heating/cooling techniques. This paper reviews and critically analyzes various active, passive and hybrid heating/cooling techniques used in green buildings.Keywords: natural ventilation, energy conservation, hybrid ventilation techniques, climate change
Procedia PDF Downloads 6036773 Prediction of Compressive Strength Using Artificial Neural Network
Authors: Vijay Pal Singh, Yogesh Chandra Kotiyal
Abstract:
Structures are a combination of various load carrying members which transfer the loads to the foundation from the superstructure safely. At the design stage, the loading of the structure is defined and appropriate material choices are made based upon their properties, mainly related to strength. The strength of materials kept on reducing with time because of many factors like environmental exposure and deformation caused by unpredictable external loads. Hence, to predict the strength of materials used in structures, various techniques are used. Among these techniques, Non-Destructive Techniques (NDT) are the one that can be used to predict the strength without damaging the structure. In the present study, the compressive strength of concrete has been predicted using Artificial Neural Network (ANN). The predicted strength was compared with the experimentally obtained actual compressive strength of concrete and equations were developed for different models. A good co-relation has been obtained between the predicted strength by these models and experimental values. Further, the co-relation has been developed using two NDT techniques for prediction of strength by regression analysis. It was found that the percentage error has been reduced between the predicted strength by using combined techniques in place of single techniques.Keywords: rebound, ultra-sonic pulse, penetration, ANN, NDT, regression
Procedia PDF Downloads 4266772 Evaluating Machine Learning Techniques for Activity Classification in Smart Home Environments
Authors: Talal Alshammari, Nasser Alshammari, Mohamed Sedky, Chris Howard
Abstract:
With the widespread adoption of the Internet-connected devices, and with the prevalence of the Internet of Things (IoT) applications, there is an increased interest in machine learning techniques that can provide useful and interesting services in the smart home domain. The areas that machine learning techniques can help advance are varied and ever-evolving. Classifying smart home inhabitants’ Activities of Daily Living (ADLs), is one prominent example. The ability of machine learning technique to find meaningful spatio-temporal relations of high-dimensional data is an important requirement as well. This paper presents a comparative evaluation of state-of-the-art machine learning techniques to classify ADLs in the smart home domain. Forty-two synthetic datasets and two real-world datasets with multiple inhabitants are used to evaluate and compare the performance of the identified machine learning techniques. Our results show significant performance differences between the evaluated techniques. Such as AdaBoost, Cortical Learning Algorithm (CLA), Decision Trees, Hidden Markov Model (HMM), Multi-layer Perceptron (MLP), Structured Perceptron and Support Vector Machines (SVM). Overall, neural network based techniques have shown superiority over the other tested techniques.Keywords: activities of daily living, classification, internet of things, machine learning, prediction, smart home
Procedia PDF Downloads 356