Search results for: early detection of violence
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 7111

Search results for: early detection of violence

6541 Adolescents' Perspectives on Parental Responses to Teen Dating Violence

Authors: Beverly Black

Abstract:

Teen dating violence (TDV) is a significant public health problem with severe negative impact on youths’ mental and physical health and well-being. Exacerbating the negative impact of TDV victimization is the fact that teens rarely report the violence. They are fearful to tell friends or family, especially parents. The family context is the first place where children learn about interpersonal relationships, and therefore, parental response of teens’ life experiences influences teens’ actions and development. This study examined youths’ perspectives on parental responses to TDV. Effective parental responses to TDV may increase the likelihood that youth will leave abusive relationships. Method. Eleven gender-separate focus groups were conducted with 27 females and 28 males, ages 12 to 17, to discuss parental responses to teen dating violence. Youth were recruited from a metropolitan community in the southwestern part of the United States. Focus groups questions asked the middle and high school youth how they would want their parents to respond to them if they approached them about various incidents of dating violence. All focus groups were transcribed. Using QSR-N10, two researchers’ analyzed data first using open and axial coding techniques to find overarching themes. Researchers triangulated the coded data to ensure accurate interpretations of the participants’ messages and used the scenario questions to structure the coded results. Results. Most youths suggested that parents should simply talk with them; they recognized the importance of communication. Teens wanted parents to ask questions, educate them about healthy relationships, share their personal experiences, and give teens advice (tell them to break up, limit contact with perpetrator, go to police). Younger youth expressed more willingness to listen to parental advice. Older youth wanted their parents to give them the opportunity to make their decisions. Many of the teens’ comments focused on the importance of parents protecting the teen, providing support and empathy for the teen, and especially refraining from overreacting (not yelling, not getting angry and staying calm). Implications. Parents need to know how to effectively respond to youth needing to leave unhealthy relationships. Demanding that their children end a relationship may not be a realistic approach to TDV. A parent’s ineffective response, when approached by an adolescent for assistance in TDV, may influence a youth to dismiss parents and other adults as viable options for seeking assistance. Parents and prevention educators can learn from hearing youths’ voices about effective responses to TDV.

Keywords: adolescents dating abuse, adolescent and parent communication, parental responses to teen dating violence, teen dating violence

Procedia PDF Downloads 258
6540 Fabrication of Immune-Affinity Monolithic Array for Detection of α-Fetoprotein and Carcinoembryonic Antigen

Authors: Li Li, Li-Ru Xia, He-Ye Wang, Xiao-Dong Bi

Abstract:

In this paper, we presented a highly sensitive immune-affinity monolithic array for detection of α-fetoprotein (AFP) and carcinoembryonic antigen (CEA). Firstly, the epoxy functionalized monolith arrays were fabricated using UV initiated copolymerization method. Scanning electron microscopy (SEM) image showed that the poly(BABEA-co-GMA) monolith exhibited a well-controlled skeletal and well-distributed porous structure. Then, AFP and CEA immune-affinity monolithic arrays were prepared by immobilization of AFP and CEA antibodies on epoxy functionalized monolith arrays. With a non-competitive immune response format, the presented AFP and CEA immune-affinity arrays were demonstrated as an inexpensive, flexible, homogeneous and stable array for detection of AFP and CEA.

Keywords: chemiluminescent detection, immune-affinity, monolithic copolymer array, UV-initiated copolymerization

Procedia PDF Downloads 317
6539 An Optimal Matching Design Method of Space-Based Optical Payload for Typical Aerial Target Detection

Authors: Yin Zhang, Kai Qiao, Xiyang Zhi, Jinnan Gong, Jianming Hu

Abstract:

In order to effectively detect aerial targets over long distances, an optimal matching design method of space-based optical payload is proposed. Firstly, main factors affecting optical detectability of small targets under complex environment are analyzed based on the full link of a detection system, including band center, band width and spatial resolution. Then a performance characterization model representing the relationship between image signal-to-noise ratio (SCR) and the above influencing factors is established to describe a detection system. Finally, an optimal matching design example is demonstrated for a typical aerial target by simulating and analyzing its SCR under different scene clutter coupling with multi-scale characteristics, and the optimized detection band and spatial resolution are presented. The method can provide theoretical basis and scientific guidance for space-based detection system design, payload specification demonstration and information processing algorithm optimization.

Keywords: space-based detection, aerial targets, optical system design, detectability characterization

Procedia PDF Downloads 154
6538 Hand Gesture Detection via EmguCV Canny Pruning

Authors: N. N. Mosola, S. J. Molete, L. S. Masoebe, M. Letsae

Abstract:

Hand gesture recognition is a technique used to locate, detect, and recognize a hand gesture. Detection and recognition are concepts of Artificial Intelligence (AI). AI concepts are applicable in Human Computer Interaction (HCI), Expert systems (ES), etc. Hand gesture recognition can be used in sign language interpretation. Sign language is a visual communication tool. This tool is used mostly by deaf societies and those with speech disorder. Communication barriers exist when societies with speech disorder interact with others. This research aims to build a hand recognition system for Lesotho’s Sesotho and English language interpretation. The system will help to bridge the communication problems encountered by the mentioned societies. The system has various processing modules. The modules consist of a hand detection engine, image processing engine, feature extraction, and sign recognition. Detection is a process of identifying an object. The proposed system uses Canny pruning Haar and Haarcascade detection algorithms. Canny pruning implements the Canny edge detection. This is an optimal image processing algorithm. It is used to detect edges of an object. The system employs a skin detection algorithm. The skin detection performs background subtraction, computes the convex hull, and the centroid to assist in the detection process. Recognition is a process of gesture classification. Template matching classifies each hand gesture in real-time. The system was tested using various experiments. The results obtained show that time, distance, and light are factors that affect the rate of detection and ultimately recognition. Detection rate is directly proportional to the distance of the hand from the camera. Different lighting conditions were considered. The more the light intensity, the faster the detection rate. Based on the results obtained from this research, the applied methodologies are efficient and provide a plausible solution towards a light-weight, inexpensive system which can be used for sign language interpretation.

Keywords: canny pruning, hand recognition, machine learning, skin tracking

Procedia PDF Downloads 161
6537 The Impact of COVID-19 on Women’s Health in Bangladesh

Authors: Dil Ware Alam, Faiza Zebeen, Sumaya Binte Masud

Abstract:

COVID-19) has impacted the whole world, including Bangladesh. The epidemic has reduced access to health care, particularly for women, creating challenges for an increasingly disadvantaged population. Women's health and well-being in Bangladesh are susceptible to a rise in domestic violence and need to be addressed quickly. The planet has been greatly influenced by Coronavirus disease 2019 (COVID-19), and Bangladesh is no difference. The pandemic has resulted in a decline in the availability of health care, notably for women's health problems, leading to an increase in difficulties for an increasingly marginalized group. Maternity care, maternal health programs, medical interventions, nutritional counseling and mental health care, are not discussed, and women's health and well-being in Bangladesh is vulnerable with a spike in domestic violence and needs to be resolved urgently.

Keywords: Covid-19, mental health, reproductive health, Bangladesh

Procedia PDF Downloads 145
6536 An Improved Two-dimensional Ordered Statistical Constant False Alarm Detection

Authors: Weihao Wang, Zhulin Zong

Abstract:

Two-dimensional ordered statistical constant false alarm detection is a widely used method for detecting weak target signals in radar signal processing applications. The method is based on analyzing the statistical characteristics of the noise and clutter present in the radar signal and then using this information to set an appropriate detection threshold. In this approach, the reference cell of the unit to be detected is divided into several reference subunits. These subunits are used to estimate the noise level and adjust the detection threshold, with the aim of minimizing the false alarm rate. By using an ordered statistical approach, the method is able to effectively suppress the influence of clutter and noise, resulting in a low false alarm rate. The detection process involves a number of steps, including filtering the input radar signal to remove any noise or clutter, estimating the noise level based on the statistical characteristics of the reference subunits, and finally, setting the detection threshold based on the estimated noise level. One of the main advantages of two-dimensional ordered statistical constant false alarm detection is its ability to detect weak target signals in the presence of strong clutter and noise. This is achieved by carefully analyzing the statistical properties of the signal and using an ordered statistical approach to estimate the noise level and adjust the detection threshold. In conclusion, two-dimensional ordered statistical constant false alarm detection is a powerful technique for detecting weak target signals in radar signal processing applications. By dividing the reference cell into several subunits and using an ordered statistical approach to estimate the noise level and adjust the detection threshold, this method is able to effectively suppress the influence of clutter and noise and maintain a low false alarm rate.

Keywords: two-dimensional, ordered statistical, constant false alarm, detection, weak target signals

Procedia PDF Downloads 59
6535 Tool for Fast Detection of Java Code Snippets

Authors: Tomáš Bublík, Miroslav Virius

Abstract:

This paper presents general results on the Java source code snippet detection problem. We propose the tool which uses graph and sub graph isomorphism detection. A number of solutions for all of these tasks have been proposed in the literature. However, although that all these solutions are really fast, they compare just the constant static trees. Our solution offers to enter an input sample dynamically with the Scripthon language while preserving an acceptable speed. We used several optimizations to achieve very low number of comparisons during the matching algorithm.

Keywords: AST, Java, tree matching, scripthon source code recognition

Procedia PDF Downloads 412
6534 The Necessity and Methods of Abolishing Discrimination and Religious Violence

Authors: Hossein Boroujerdi, Mohammad R. Sadeghi, Maryam Moazen Zadeh

Abstract:

During the recent decades, the result of religious prophets has lost its attraction, and theology has become disfigured, so it has been made ugly. Undoubtedly, some of existing non-peaceful and harsh rules and measures within the religious books and contexts have been considered as the reasons and excuses for defamation of religions. Based on library sources and also extensive research in Quran and Islamic narratives, this study has aimed to find some alternative solutions and options to abolish and disregard those religious rules which are in contrary of human right charters and standards. The results have demonstrated that some of inhuman religious punishments such as execution, stoning, whipping as well as religious discriminations and warlike behaviors are in contrary of some other religious contexts and concepts. This finding have proved inadaptability between some religious contexts and religious records.

Keywords: adjustment and abolishment, discrimination, religious commands and laws, tolerance, violence

Procedia PDF Downloads 193
6533 Adopting Flocks of Birds Approach to Predator for Anomalies Detection on Industrial Control Systems

Authors: M. Okeke, A. Blyth

Abstract:

Industrial Control Systems (ICS) such as Supervisory Control And Data Acquisition (SCADA) can be seen in many different critical infrastructures, from nuclear management to utility, medical equipment, power, waste and engine management on ships and planes. The role SCADA plays in critical infrastructure has resulted in a call to secure them. Many lives depend on it for daily activities and the attack vectors are becoming more sophisticated. Hence, the security of ICS is vital as malfunction of it might result in huge risk. This paper describes how the application of Prey Predator (PP) approach in flocks of birds could enhance the detection of malicious activities on ICS. The PP approach explains how these animals in groups or flocks detect predators by following some simple rules. They are not necessarily very intelligent animals but their approach in solving complex issues such as detection through corporation, coordination and communication worth emulating. This paper will emulate flocking behavior seen in birds in detecting predators. The PP approach will adopt six nearest bird approach in detecting any predator. Their local and global bests are based on the individual detection as well as group detection. The PP algorithm was designed following MapReduce methodology that follows a Split Detection Convergence (SDC) approach.

Keywords: artificial life, industrial control system (ICS), IDS, prey predator (PP), SCADA, SDC

Procedia PDF Downloads 284
6532 Optimization of Polymerase Chain Reaction Condition to Amplify Exon 9 of PIK3CA Gene in Preventing False Positive Detection Caused by Pseudogene Existence in Breast Cancer

Authors: Dina Athariah, Desriani Desriani, Bugi Ratno Budiarto, Abinawanto Abinawanto, Dwi Wulandari

Abstract:

Breast cancer is a regulated by many genes. Defect in PIK3CA gene especially at position of exon 9 (E542K and E545K), called hot spot mutation induce early transformation of breast cells. The early detection of breast cancer based on mutation profile of this hot spot region would be hampered by the existence of pseudogene, marked by its substitution mutation at base 1658 (E545A) and deletion at 1659 that have been previously proven in several cancers. To the best of the authors’ knowledge, until recently no studies have been reported about pseudogene phenomenon in breast cancer. Here, we reported PCR optimization to to obtain true exon 9 of PIK3CA gene from its pseudogene hence increasing the validity of data. Material and methods: two genomic DNA with Dev and En code were used in this experiment. Two pairs of primer were design for Standard PCR method. The size of PCR products for each primer is 200bp and 400bp. While other primer was designed for Nested-PCR followed with DNA sequencing method. For Nested-PCR, we optimized the annealing temperature in first and second run of PCR, and the PCR cycle for first run PCR (15x versus 25x). Result: standard PCR using both primer pairs designed is failed to detect the true PIK3CA gene, appearing a substitution mutation at 1658 and deletion at 1659 of PCR product in sequence chromatogram indicated pseudogene. Meanwhile, Nested-PCR with optimum condition (annealing temperature for the first round at 55oC, annealing temperatung for the second round at 60,7oC with 15x PCR cycles) and could detect the true PIK3CA gene. Dev sample were identified as WT while En sample contain one substitution mutation at position 545 of exon 9, indicating amino acid changing from E to K. For the conclusion, pseudogene also exists in breast cancer and the apllication of optimazed Nested-PCR in this study could detect the true exon 9 of PIK3CA gene.

Keywords: breast cancer, exon 9, hotspot mutation, PIK3CA, pseudogene

Procedia PDF Downloads 227
6531 Performance Evaluation of Contemporary Classifiers for Automatic Detection of Epileptic EEG

Authors: K. E. Ch. Vidyasagar, M. Moghavvemi, T. S. S. T. Prabhat

Abstract:

Epilepsy is a global problem, and with seizures eluding even the smartest of diagnoses a requirement for automatic detection of the same using electroencephalogram (EEG) would have a huge impact in diagnosis of the disorder. Among a multitude of methods for automatic epilepsy detection, one should find the best method out, based on accuracy, for classification. This paper reasons out, and rationalizes, the best methods for classification. Accuracy is based on the classifier, and thus this paper discusses classifiers like quadratic discriminant analysis (QDA), classification and regression tree (CART), support vector machine (SVM), naive Bayes classifier (NBC), linear discriminant analysis (LDA), K-nearest neighbor (KNN) and artificial neural networks (ANN). Results show that ANN is the most accurate of all the above stated classifiers with 97.7% accuracy, 97.25% specificity and 98.28% sensitivity in its merit. This is followed closely by SVM with 1% variation in result. These results would certainly help researchers choose the best classifier for detection of epilepsy.

Keywords: classification, seizure, KNN, SVM, LDA, ANN, epilepsy

Procedia PDF Downloads 498
6530 Toward Subtle Change Detection and Quantification in Magnetic Resonance Neuroimaging

Authors: Mohammad Esmaeilpour

Abstract:

One of the important open problems in the field of medical image processing is detection and quantification of small changes. In this poster, we try to investigate that, how the algebraic decomposition techniques can be used for semiautomatically detecting and quantifying subtle changes in Magnetic Resonance (MR) neuroimaging volumes. We mostly focus on the low-rank values of the matrices achieved from decomposing MR image pairs during a period of time. Besides, a skillful neuroradiologist will help the algorithm to distinguish between noises and small changes.

Keywords: magnetic resonance neuroimaging, subtle change detection and quantification, algebraic decomposition, basis functions

Procedia PDF Downloads 453
6529 Detection of Biomechanical Stress for the Prevention of Disability Derived from Musculoskeletal Disorders

Authors: Leydi Noemi Peraza Gómez, Jose Álvarez Nemegyei, Damaris Francis Estrella Castillo

Abstract:

In order to have an epidemiological tool to detect biomechanical stress (ERGO-Mex), which impose physical labor or recreational activities, a questionnaire is constructed in Spanish, validated and culturally adapted to the Mayan indigenous population of Yucatan. Through the seven steps proposed by Guillemin and Beaton the procedure was: initial translation, synthesis of the translations, feed back of the translation. After that review by a committee of experts, pre-test of the preliminary version, and presentation of the results to the committee of experts and members of the community. Finally the evaluation of its internal validity (Cronbach's α coefficient) and external (intraclass correlation coefficient). The results for the validation in Spanish indicated that 45% of the participants have biomechanical stress. The ERGO-Mex correlation was 0.69 (p <0.0001). Subjects with high biomechanical stress had a higher score than subjects with low biomechanical stress (17.4 ± 8.9 vs.9.8 ± 2.8, p = 0.003). The Cronbach's α coefficient was 0.92; and for validation in Cronbach's α maya it was 0.82 and CCI = 0.70 (95% CI: 0.58-0.79; p˂0.0001); ERGO-Mex is suitable for performing early detection of musculoskeletal diseases and helping to prevent disability.

Keywords: biomechanical stress, disability, musculoskeletal disorders, prevention

Procedia PDF Downloads 163
6528 Cultural Resources Management of the Early Hospitals in Jordan between: 1890-1950

Authors: Jawdat Goussous, Samer Abu Ghazaleh

Abstract:

Heritage is closely linked with the national identity and because Jordan is a rich country of heritage where many civilizations had lived from early beginning of history ,therefore the conservation of this heritage is national task that gives many benefits as correlation between local inhabitance and enhance the linked with spirit of place . This study takes into account the most important concentration on some of old hospitals in Jordan ,which were constructed between 1890-1950 ,looking in their historical and architectural heritage values gained by their architectural distinguished ,longevity and their linked with events that happened in the region. then Focus on the study and analysis of some of them in terms of conservation methodology that have been followed to conserve the early hospitals such as preservation ,maintenance ,adaptive reuse , And their positive effects on these buildings, emphasize the importance of these buildings because of their historical and architectural values.

Keywords: evangelical missionary, early hospitals, medical services, renovation

Procedia PDF Downloads 443
6527 A Survey on Genetic Algorithm for Intrusion Detection System

Authors: Prikhil Agrawal, N. Priyanka

Abstract:

With the increase of millions of users on Internet day by day, it is very essential to maintain highly reliable and secured data communication between various corporations. Although there are various traditional security imparting techniques such as antivirus software, password protection, data encryption, biometrics and firewall etc. But still network security has become the main issue in various leading companies. So IDSs have become an essential component in terms of security, as it can detect various network attacks and respond quickly to such occurrences. IDSs are used to detect unauthorized access to a computer system. This paper describes various intrusion detection techniques using GA approach. The intrusion detection problem has become a challenging task due to the conception of miscellaneous computer networks under various vulnerabilities. Thus the damage caused to various organizations by malicious intrusions can be mitigated and even be deterred by using this powerful tool.

Keywords: genetic algorithm (GA), intrusion detection system (IDS), dataset, network security

Procedia PDF Downloads 277
6526 Design an Intelligent Fire Detection System Based on Neural Network and Particle Swarm Optimization

Authors: Majid Arvan, Peyman Beygi, Sina Rokhsati

Abstract:

In-time detection of fire in buildings is of great importance. Employing intelligent methods in data processing in fire detection systems leads to a significant reduction of fire damage at lowest cost. In this paper, the raw data obtained from the fire detection sensor networks in buildings is processed by using intelligent methods based on neural networks and the likelihood of fire happening is predicted. In order to enhance the quality of system, the noise in the sensor data is reduced by analyzing wavelets and applying SVD technique. Meanwhile, the proposed neural network is trained using particle swarm optimization (PSO). In the simulation work, the data is collected from sensor network inside the room and applied to the proposed network. Then the outputs are compared with conventional MLP network. The simulation results represent the superiority of the proposed method over the conventional one.

Keywords: intelligent fire detection, neural network, particle swarm optimization, fire sensor network

Procedia PDF Downloads 366
6525 The Accuracy of Parkinson's Disease Diagnosis Using [123I]-FP-CIT Brain SPECT Data with Machine Learning Techniques: A Survey

Authors: Lavanya Madhuri Bollipo, K. V. Kadambari

Abstract:

Objective: To discuss key issues in the diagnosis of Parkinson disease (PD), To discuss features influencing PD progression, To discuss importance of brain SPECT data in PD diagnosis, and To discuss the essentiality of machine learning techniques in early diagnosis of PD. An accurate and early diagnosis of PD is nowadays a challenge as clinical symptoms in PD arise only when there is more than 60% loss of dopaminergic neurons. So far there are no laboratory tests for the diagnosis of PD, causing a high rate of misdiagnosis especially when the disease is in the early stages. Recent neuroimaging studies with brain SPECT using 123I-Ioflupane (DaTSCAN) as radiotracer shown to be widely used to assist the diagnosis of PD even in its early stages. Machine learning techniques can be used in combination with image analysis procedures to develop computer-aided diagnosis (CAD) systems for PD. This paper addressed recent studies involving diagnosis of PD in its early stages using brain SPECT data with Machine Learning Techniques.

Keywords: Parkinson disease (PD), dopamine transporter, single-photon emission computed tomography (SPECT), support vector machine (SVM)

Procedia PDF Downloads 376
6524 Comparison of Early Silicon Oil Removal and Late Silicon Oil Removal in Patients With Rhegmatogenous Retinal Detachment

Authors: Hamidreza Torabi, Mohsen Moghtaderi

Abstract:

Introduction: Currently, deep vitrectomy with silicone oil tamponade is the standard treatment method for patients with Rhegmatogenous Retinal Detachment (RRD). After retinal repair, it is necessary to remove silicone oil from the eye, but the appropriate time to remove the oil and complications related to that time has been less studied. The aim of this study was to compare the results of the early removal of silicone oil with the delayed removal of silicone oil in patients with RRD. Method & material: Patients who were referred to the Ophthalmology Clinic of Baqiyatallah Hospital, Tehran, Iran, due to RRD with detached macula in 2021 & 2022 were evaluated. These patients were treated with deep vitrectomy and silicone oil tamponade. Patients whose retinas were attached after the passage of time were candidates for silicone oil removal (SOR) surgery. For patients in the early SOR group, SOR surgery was performed 3-6 months after the initial vitrectomy surgery, and for the late SOR group, SOR was performed after 6 months after the initial vitrectomy surgery. Results: In this study, 60 patients with RRD were evaluated. 23 (38.3%) patients were in the early group, and 37 (61.7%) patients were in the late group. Based on our findings, it was seen that the mean visual acuity of patients based on the Snellen chart in the early group (0.48 ± 0.23 Decimal) was better than the late group (0.33 ± 0.18 Decimal) (P-value=0.009). Retinal re-detachment has happened only in one patient with early SOR. Conclusion: Early removal of silicone oil (less than 6 months) from the eyes of patients undergoing RRD surgery has been associated with better vision results compared to late removal.

Keywords: retinal detachment, vitrectomy, silicone oil, silicone oil removal, visual acuity

Procedia PDF Downloads 65
6523 Systematic Review of Sexual Assault Prevention Methods for Older Adults: Exploring the Hidden Needs of a Growing Population

Authors: Michelle Hand, Brieanne Beaujolais

Abstract:

Rape stereotypes have long involved the assault of young females by strangers desiring sex. As such, older adult women and men have largely been excluded from research, policies, and awareness raising initiatives to address sexual violence. Moreover sexual assault accounts for the most underreported type of abuse experienced by older adults, highlighting a need to expand our knowledge base in this area. Thus a systematic review of peer-reviewed scholarly articles and reports was conducted to explore the ways sexual assault has been prevented among older adults in recent years and to identify implications for researchers and practitioners as they aim to meet the needs of this population. Articles and reports published during or after 2007 were eligible if their focus included methods to address sex abuse among older adults as well as practice or research implications. Forty-four articles met this criteria and were included in this systematic review. The findings from this review will provide an in-depth understanding of the under-researched issue of sexual violence among older adult women and men as well as current prevention strategies. In addition, implications and recommendations will be provided for practitioners, educators and researchers as they aim to meet the hidden needs of this growing yet under-researched population.

Keywords: elder, rape, sexual assault, sexual violence

Procedia PDF Downloads 299
6522 A Phenomenological Exploration of Alcohol Consumption Patterns and Problems Among Male Students at the University of Kwazulu-Natal

Authors: Isaiah Phillip Smith

Abstract:

It is reported that alcohol consumption accounts for 3 million annual deaths globally, thus, it is a significant public health challenge internationally. The excessive consumption of alcohol is argued in literature to be related to problematic behaviors like crime, accident, fighting, violence, and unprotected sex, among others. Alcohol consumption among university students in South Africa particularly is considered endemic – with a prevalence rate of 25.27%, 32.34%, and 23.34% across universities, colleges, and high schools. Adopting the tenets of social learning and ecological theories, the culture of drinking amongst male university students is critically explored. This study found that age, gender, early exposure to alcohol, and peer pressure are significant factors contributing to alcohol consumption amongst university students. While participants acknowledged that moderate and responsible consumption of alcohol is necessary, they agree that it does not translate to responsible drinking behaviours.

Keywords: alcohol, drinking, university, students

Procedia PDF Downloads 109
6521 Embedded Electrochemistry with Miniaturized, Drone-Based, Potentiostat System for Remote Detection Chemical Warfare Agents

Authors: Amer Dawoud, Jesy Motchaalangaram, Arati Biswakarma, Wujan Mio, Karl Wallace

Abstract:

The development of an embedded miniaturized drone-based system for remote detection of Chemical Warfare Agents (CWA) is proposed. The paper focuses on the software/hardware system design of the electrochemical Cyclic Voltammetry (CV) and Differential Pulse Voltammetry (DPV) signal processing for future deployment on drones. The paper summarizes the progress made towards hardware and electrochemical signal processing for signature detection of CWA. Also, the miniature potentiostat signal is validated by comparing it with the high-end lab potentiostat signal.

Keywords: drone-based, remote detection chemical warfare agents, miniaturized, potentiostat

Procedia PDF Downloads 116
6520 Reliability and Construct Validity of the Early Dementia Questionnaire (EDQ)

Authors: A. Zurraini, Syed Alwi Sar, H. Helmy, H. Nazeefah

Abstract:

Early Dementia Questionnaire (EDQ) was developed as a screening tool to detect patients with early dementia in primary care. It was developed based on 20 symptoms of dementia. From a preliminary study, EDQ had been shown to be a promising alternative for screening of early dementia. This study was done to further test on EDQ’s reliability and validity. Using a systematic random sampling, 200 elderly patients attending primary health care centers in Kuching, Sarawak had consented to participate in the study and were administered the EDQ. Geriatric Depression Scale (GDS) was used to exclude patients with depression. Those who scored >21 MMSE, were retested using the EDQ. Reliability was determined by Cronbach’s alpha for internal consistency and construct validity was assessed using confirmatory factor analysis (principle component with varimax rotation). The result showed that the overall Cronbach’s alpha coefficient was good which was 0.874. Confirmatory factor analysis on 4 factors indicated that the Cronbach’s alpha for each domain were acceptable with memory (0.741), concentration (0.764), emotional and physical symptoms (0.754) and lastly sleep and environment (0.720). Pearson correlation coefficient between the first EDQ score and the retest EDQ score among those with MMSE of >21 showed a very strong, positive correlation between the two variables, r = 0.992, N=160, P <0.001. The results of the validation study showed that Early Dementia Questionnaire (EDQ) is a valid and reliable tool to be used as a screening tool to detect early dementia in primary care.

Keywords: Early Dementia Questionnaire (EDQ), screening, primary care, construct validity

Procedia PDF Downloads 416
6519 Object Detection in Digital Images under Non-Standardized Conditions Using Illumination and Shadow Filtering

Authors: Waqqas-ur-Rehman Butt, Martin Servin, Marion Pause

Abstract:

In recent years, object detection has gained much attention and very encouraging research area in the field of computer vision. The robust object boundaries detection in an image is demanded in numerous applications of human computer interaction and automated surveillance systems. Many methods and approaches have been developed for automatic object detection in various fields, such as automotive, quality control management and environmental services. Inappropriately, to the best of our knowledge, object detection under illumination with shadow consideration has not been well solved yet. Furthermore, this problem is also one of the major hurdles to keeping an object detection method from the practical applications. This paper presents an approach to automatic object detection in images under non-standardized environmental conditions. A key challenge is how to detect the object, particularly under uneven illumination conditions. Image capturing conditions the algorithms need to consider a variety of possible environmental factors as the colour information, lightening and shadows varies from image to image. Existing methods mostly failed to produce the appropriate result due to variation in colour information, lightening effects, threshold specifications, histogram dependencies and colour ranges. To overcome these limitations we propose an object detection algorithm, with pre-processing methods, to reduce the interference caused by shadow and illumination effects without fixed parameters. We use the Y CrCb colour model without any specific colour ranges and predefined threshold values. The segmented object regions are further classified using morphological operations (Erosion and Dilation) and contours. Proposed approach applied on a large image data set acquired under various environmental conditions for wood stack detection. Experiments show the promising result of the proposed approach in comparison with existing methods.

Keywords: image processing, illumination equalization, shadow filtering, object detection

Procedia PDF Downloads 201
6518 State Coercion and Social Movements: Legacy of Authoritarian Regime

Authors: Hyun-Ji Choi

Abstract:

This paper aims to examine the meaning of ‘state’ as a monopoly of violence, in regard with South Korean democratic transition. Since institutional democratization in 1987, it is conventionally known that governmental authority has exercised its power through law and police force, rather than inclusive or private violence. In other words, 1987 pro-democracy movement has been a critical juncture for a step towards democratic consolidation. However, state coercion may continually be exerted despite institutional specification by law in South Korean context. Explicit case would be amendment of ‘the Law on Assembly and Demonstration’ which determines citizens’ right to take collective action mostly against government actions. This paper investigates amendment process of the law along with social reality since 1987 until 2015 to see how effectively institutionalization has progressed.

Keywords: democratic transition, historical institutionalism, state coercion, the law on Assembly and Demonstration

Procedia PDF Downloads 176
6517 Voices of Fear: A Case Study Of Tobephobia Experienced by Female Teachers

Authors: Prakash Singh

Abstract:

In this exploratory qualitative case study, the voices of female teachers are captured that describe their fear of failure in coping with their daily anxieties, stresses, and tensions in their classrooms. When teachers are usually appointed, the curriculum forms the heart of all their professional obligations. The policy of quality and equality of education for all learners is a must as part of these deliberations, otherwise it would spell the inevitable failure for teachers. Yet, how often have teachers been asked whether they are happy during their professional tenure. Research affirms that this question is not a priority, seeing that the happiness of learners and the educational administrators enjoy precedence. Teachers are often subject to undue pressures and tensions because of environmental factors that extends beyond the curriculum. School violence, bullying, drug abuse, and gangsters are not uncommon to the school milieu, no matter where such schools can be located. In this case study, the voices of female teachers find space concerning their experiences of tobephobia (TBP). The questions that inevitably arise are: Are the educational authorities aware of the effects of TBP in education? What can be done to arrest and eliminate the debilitating effects of TBP? This exploratory study contributes to the growing concerns of TBP in education. It is therefore imperative that the effects of TBP on human resources in education must be accentuated so that meaningful solutions can be found to address challenging educational issues such as school violence, bullying, and drug abuse amongst learners.

Keywords: curriculum, female teachers, school violence, tobephobia

Procedia PDF Downloads 382
6516 Nursing System Development in Patients Undergoing Operation in 3C Ward: Early Ambulation in Patients with Head and Neck Cancer

Authors: Artitaya Sabangbal, Darawan Augsornwan, Palakorn Surakunprapha, Lalida Petphai

Abstract:

Background: Srinagarind Hospital Ward 3C has about 180 cases of patients with head and neck cancer per year. Almost all of these patients suffer with pain, fatigue, low self image, swallowing problem and when the tumor is larger they will have breathing problem. Many of them have complication after operation such as pressure sore, pneumonia, deep vein thrombosis. Nursing activity is very important to prevent the complication especially promoting patients early ambulation. The objective of this study was to develop early ambulation protocol for patients with head and neck cancer undergoing operation. Method: this study is one part of nursing system development in patients undergoing operation in Ward 3C. It is a participation action research divided into 3 phases Phase 1 Situation review: In this phase we review the clinical outcomes, process of care, from document such as nurses note and interview nurses, patients and family about early ambulation. Phase 2 Searching nursing intervention about early ambulation from previous study then establish protocol . This phase we have picture package of early ambulation. Phase 3 implementation and evaluation. Result: Patients with head and neck cancer after operation can follow early ambulation protocol 100%, 85 % of patients can follow protocol within 2 days after operation and 100% can follow protocol within 3 days. No complications occur. Patients satisfaction in very good level is 58% and in good level is 42% Length of hospital stay is 6 days in patients with wide excision and 16 day in patients with flap coverage. Conclusion: The early ambulation protocol is appropriate for patients with head and neck cancer who undergo operation. This can restore physical health, reduce complication and increase patients satisfaction.

Keywords: nursing system, early ambulation, head and neck cancer, operation

Procedia PDF Downloads 210
6515 The Results of the Research and Documentation of Early Middle Ages Sites in the North-West Poland

Authors: Wojciech Kulesza

Abstract:

The north-western part of the Poland, specifically West Pomerania and Lubuskie provinces, from several years are the subject of research of the Department of Archaeology of Early Middle Ages of Institute of Archaeology of Nicolaus Copernicus University in Toruń. This area has a dense network of rivers and numerous lakes, where many of them are connected to the southern part of the Baltic Sea. During the many years of research in this area, archaeologists discovered the remains of the early Middle Ages settlement located on several islands and in most cases were encountered relics of early Middle Ages bridges linking those islands with the mainland. During the excavation, work was carried out both under water and on land for the accurate identification of islands and adjacent to them underwater areas. The result of this work is a graphic documentation, made in a three-dimensional technique, not only for the underwater trenches but also relics of bridges and objects discovered during exploration, which as the main theme will be presented in the full presentation.

Keywords: Poland, underwater archaeology, Nicolaus Copernicus University, early middle ages

Procedia PDF Downloads 232
6514 Bidirectional Long Short-Term Memory-Based Signal Detection for Orthogonal Frequency Division Multiplexing With All Index Modulation

Authors: Mahmut Yildirim

Abstract:

This paper proposed the bidirectional long short-term memory (Bi-LSTM) network-aided deep learning (DL)-based signal detection for Orthogonal frequency division multiplexing with all index modulation (OFDM-AIM), namely Bi-DeepAIM. OFDM-AIM is developed to increase the spectral efficiency of OFDM with index modulation (OFDM-IM), a promising multi-carrier technique for communication systems beyond 5G. In this paper, due to its strong classification ability, Bi-LSTM is considered an alternative to the maximum likelihood (ML) algorithm, which is used for signal detection in the classical OFDM-AIM scheme. The performance of the Bi-DeepAIM is compared with LSTM network-aided DL-based OFDM-AIM (DeepAIM) and classic OFDM-AIM that uses (ML)-based signal detection via BER performance and computational time criteria. Simulation results show that Bi-DeepAIM obtains better bit error rate (BER) performance than DeepAIM and lower computation time in signal detection than ML-AIM.

Keywords: bidirectional long short-term memory, deep learning, maximum likelihood, OFDM with all index modulation, signal detection

Procedia PDF Downloads 44
6513 Tank Barrel Surface Damage Detection Algorithm

Authors: Tomáš Dyk, Stanislav Procházka, Martin Drahanský

Abstract:

The article proposes a new algorithm for detecting damaged areas of the tank barrel based on the image of the inner surface of the tank barrel. Damage position is calculated using image processing techniques such as edge detection, discrete wavelet transformation and image segmentation for accurate contour detection. The algorithm can detect surface damage in smoothbore and even in rifled tank barrels. The algorithm also calculates the volume of the detected damage from the depth map generated, for example, from the distance measurement unit. The proposed method was tested on data obtained by a tank barrel scanning device, which generates both surface image data and depth map. The article also discusses tank barrel scanning devices and how damaged surface impacts material resistance.

Keywords: barrel, barrel diagnostic, image processing, surface damage detection, tank

Procedia PDF Downloads 127
6512 Role of Molecular Changes and Immunohistochamical in Early Detection of Colon Cancer

Authors: Fatimah Alhomaid

Abstract:

The present study was planned to investigate the role of molecular changes and immunohistochemical in early detection of colon cancer in Saudi patients. Our results were carried out on 48 patients colon cancer. We obtained our data from laboratory in King Khalid university hospital. The specimens were taken (48) patients with colon cancer 34 male and 14 female and 2 control. The average age of varied from 37-85 years. The tumor was diagnosed as I in tow patients (male and female) and grade 2 in 42 patients (29 male and 13 female) while the grade 3 in 4 patients (all males). The specimens were processed for haematoxylin and eosin staining , immunohistochemical technique and flow cytometry analysis. Our study noted that most patients had adenocarcinoma which characterized by presence of signet-ring cells were very clear in advanced patients of adenocarcinoma. Our sections in adenocarcinoma in grade 2 and stage 3 had an increase in signet ring cells,an increase in the acini of glands and an increase in number of lymphocytes which spread to the muscularis layer. With advancing the disease, there were haemorge in blood and increase in lymphocytes and increase number of nuclei in the tubular glands. Our study was carried on 48 patients, immunohistochemical diagnosis (CK20,PCNA,P53) and the analysis of DNA content by flow cytometry technique. Our study indicated that the presence of correlation between the immunohistochemical analysis for P53 and the grades. The reaction of P53 appeared as strong in nucleus in grades &stage 3 and appeared in other sections as dark brown pigment. Our study indicated that the absence of correlation between the immunohistochemical analysis for pcan and the grades. In our sections, there were strong reactions in the more 80% of nuclei in grade 1& stage 2. Our study indicated that the presence of correlation between the immunohistochemical analysis for CK20 and the grades. Our results indicated the presence of positive reaction in cytoplasm varied from weak to moderate in grade 3 & stage 4. Concerning the Flow cytometry technique our results indicated that the presence of correlation between the DNA and different stages of colon cancer.

Keywords: DNA-CK20, PCNA, P53, colon cancer

Procedia PDF Downloads 344