Search results for: digital image receptor
5080 An Improved C-Means Model for MRI Segmentation
Authors: Ying Shen, Weihua Zhu
Abstract:
Medical images are important to help identifying different diseases, for example, Magnetic resonance imaging (MRI) can be used to investigate the brain, spinal cord, bones, joints, breasts, blood vessels, and heart. Image segmentation, in medical image analysis, is usually the first step to find out some characteristics with similar color, intensity or texture so that the diagnosis could be further carried out based on these features. This paper introduces an improved C-means model to segment the MRI images. The model is based on information entropy to evaluate the segmentation results by achieving global optimization. Several contributions are significant. Firstly, Genetic Algorithm (GA) is used for achieving global optimization in this model where fuzzy C-means clustering algorithm (FCMA) is not capable of doing that. Secondly, the information entropy after segmentation is used for measuring the effectiveness of MRI image processing. Experimental results show the outperformance of the proposed model by comparing with traditional approaches.Keywords: magnetic resonance image (MRI), c-means model, image segmentation, information entropy
Procedia PDF Downloads 2255079 The Relationship between Exercise Attitude and Performance with Self-Image in Elderly Men in Iran
Authors: Hadis Mahmoodsalehi, Elham Shakoor, Maryam Koushkie Jahromi
Abstract:
Background and aims: Given the importance of health promotion in elderly and attention to health factors including physical activity and self-image reinforcing, this study aimed to investigate the relationship between exercise attitude and performance with self-image concept in elderly men. Methods: In this descriptive–correlational study, 50 different daily exercise activities of the elderly men living in Iran (mean age: 60.94 years) were selected through simple sampling method. Participants completed a questionnaire regarding exercise attitude and performance and Beck self-image concept. Pearson correlation test was used for analysis of the data. Results: The results showed the significant correlation between optimism and exercise performance (p = 0.012) and exercise attitude (p = 0.005). Conclusion: Findings show that exercise performance and attitude are associated positively with optimism in elderly women. So, increasing exercise or improving attitude toward exercise can lead to improving optimism.Keywords: elderly, exercise performance and attitude, self-image, descriptive–correlational study
Procedia PDF Downloads 5635078 A Palmprint Identification System Based Multi-Layer Perceptron
Authors: David P. Tantua, Abdulkader Helwan
Abstract:
Biometrics has been recently used for the human identification systems using the biological traits such as the fingerprints and iris scanning. Identification systems based biometrics show great efficiency and accuracy in such human identification applications. However, these types of systems are so far based on some image processing techniques only, which may decrease the efficiency of such applications. Thus, this paper aims to develop a human palmprint identification system using multi-layer perceptron neural network which has the capability to learn using a backpropagation learning algorithms. The developed system uses images obtained from a public database available on the internet (CASIA). The processing system is as follows: image filtering using median filter, image adjustment, image skeletonizing, edge detection using canny operator to extract features, clear unwanted components of the image. The second phase is to feed those processed images into a neural network classifier which will adaptively learn and create a class for each different image. 100 different images are used for training the system. Since this is an identification system, it should be tested with the same images. Therefore, the same 100 images are used for testing it, and any image out of the training set should be unrecognized. The experimental results shows that this developed system has a great accuracy 100% and it can be implemented in real life applications.Keywords: biometrics, biological traits, multi-layer perceptron neural network, image skeletonizing, edge detection using canny operator
Procedia PDF Downloads 3715077 On Musical Information Geometry with Applications to Sonified Image Analysis
Authors: Shannon Steinmetz, Ellen Gethner
Abstract:
In this paper, a theoretical foundation is developed for patterned segmentation of audio using the geometry of music and statistical manifold. We demonstrate image content clustering using conic space sonification. The algorithm takes a geodesic curve as a model estimator of the three-parameter Gamma distribution. The random variable is parameterized by musical centricity and centric velocity. Model parameters predict audio segmentation in the form of duration and frame count based on the likelihood of musical geometry transition. We provide an example using a database of randomly selected images, resulting in statistically significant clusters of similar image content.Keywords: sonification, musical information geometry, image, content extraction, automated quantification, audio segmentation, pattern recognition
Procedia PDF Downloads 2375076 Color Image Compression/Encryption/Contour Extraction using 3L-DWT and SSPCE Method
Authors: Ali A. Ukasha, Majdi F. Elbireki, Mohammad F. Abdullah
Abstract:
Data security needed in data transmission, storage, and communication to ensure the security. This paper is divided into two parts. This work interests with the color image which is decomposed into red, green and blue channels. The blue and green channels are compressed using 3-levels discrete wavelet transform. The Arnold transform uses to changes the locations of red image channel pixels as image scrambling process. Then all these channels are encrypted separately using the key image that has same original size and are generating using private keys and modulo operations. Performing the X-OR and modulo operations between the encrypted channels images for image pixel values change purpose. The extracted contours from color images recovery can be obtained with accepted level of distortion using single step parallel contour extraction (SSPCE) method. Experiments have demonstrated that proposed algorithm can fully encrypt 2D Color images and completely reconstructed without any distortion. Also shown that the analyzed algorithm has extremely large security against some attacks like salt and pepper and Jpeg compression. Its proof that the color images can be protected with a higher security level. The presented method has easy hardware implementation and suitable for multimedia protection in real time applications such as wireless networks and mobile phone services.Keywords: SSPCE method, image compression and salt and peppers attacks, bitplanes decomposition, Arnold transform, color image, wavelet transform, lossless image encryption
Procedia PDF Downloads 5185075 Facility Detection from Image Using Mathematical Morphology
Authors: In-Geun Lim, Sung-Woong Ra
Abstract:
As high resolution satellite images can be used, lots of studies are carried out for exploiting these images in various fields. This paper proposes the method based on mathematical morphology for extracting the ‘horse's hoof shaped object’. This proposed method can make an automatic object detection system to track the meaningful object in a large satellite image rapidly. Mathematical morphology process can apply in binary image, so this method is very simple. Therefore this method can easily extract the ‘horse's hoof shaped object’ from any images which have indistinct edges of the tracking object and have different image qualities depending on filming location, filming time, and filming environment. Using the proposed method by which ‘horse's hoof shaped object’ can be rapidly extracted, the performance of the automatic object detection system can be improved dramatically.Keywords: facility detection, satellite image, object, mathematical morphology
Procedia PDF Downloads 3815074 Improved Performance in Content-Based Image Retrieval Using Machine Learning Approach
Authors: B. Ramesh Naik, T. Venugopal
Abstract:
This paper presents a novel approach which improves the high-level semantics of images based on machine learning approach. The contemporary approaches for image retrieval and object recognition includes Fourier transforms, Wavelets, SIFT and HoG. Though these descriptors helpful in a wide range of applications, they exploit zero order statistics, and this lacks high descriptiveness of image features. These descriptors usually take benefit of primitive visual features such as shape, color, texture and spatial locations to describe images. These features do not adequate to describe high-level semantics of the images. This leads to a gap in semantic content caused to unacceptable performance in image retrieval system. A novel method has been proposed referred as discriminative learning which is derived from machine learning approach that efficiently discriminates image features. The analysis and results of proposed approach were validated thoroughly on WANG and Caltech-101 Databases. The results proved that this approach is very competitive in content-based image retrieval.Keywords: CBIR, discriminative learning, region weight learning, scale invariant feature transforms
Procedia PDF Downloads 1815073 Remote Video Supervision via DVB-H Channels
Authors: Hanen Ghabi, Youssef Oudhini, Hassen Mnif
Abstract:
By reference to recent publications dealing with the same problem, and as a follow-up to this research work already published, we propose in this article a new original idea of tele supervision exploiting the opportunities offered by the DVB-H system. The objective is to exploit the RF channels of the DVB-H network in order to insert digital remote monitoring images dedicated to a remote solar power plant. Indeed, the DVB-H (Digital Video Broadcast-Handheld) broadcasting system was designed and deployed for digital broadcasting on the same platform as the parent system, DVB-T. We claim to be able to exploit this approach in order to satisfy the operator of remote photovoltaic sites (and others) in order to remotely control the components of isolated installations by means of video surveillance.Keywords: video surveillance, digital video broadcast-handheld, photovoltaic sites, AVC
Procedia PDF Downloads 1845072 Architectural Framework to Preserve Information of Cardiac Valve Control
Authors: Lucia Carrion Gordon, Jaime Santiago Sanchez Reinoso
Abstract:
According to the relation of Digital Preservation and the Health field as a case of study, the architectural model help us to explain that definitions. .The principal goal of Data Preservation is to keep information for a long term. Regarding of Mediacal information, in order to perform a heart transplant, physicians need to preserve this organ in an adequate way. This approach between the two perspectives, the medical and the technological allow checking the similarities about the concepts of preservation. Digital preservation and medical advances are related in the same level as knowledge improvement.Keywords: medical management, digital, data, heritage, preservation
Procedia PDF Downloads 4205071 Application of Digital Technologies as Tools for Transformative Agricultural Science Instructional Delivery in Secondary Schools
Authors: Cajethan U. Ugwuoke
Abstract:
Agriculture is taught in secondary schools to develop skills in students which will empower them to contribute to national economic development. Unfortunately, our educational system emphasizes the application of conventional teaching methods in delivering instructions, which fails to produce students competent enough to carry out agricultural production. This study was therefore aimed at examining the application of digital technologies as tools for transformative instructional delivery. Four specific purposes, research questions and hypotheses guided the study. The study adopted a descriptive survey research design where 80 subjects representing 64 teachers of agriculture and 16 principals in the Udenu local government area of Enugu State, Nigeria, participated in the study. A structured questionnaire was used to collect data. The assumption of normality was ascertained by subjecting the data collected to a normality test. Data collected were later subjected to mean, Pearson product-moment correlation, ANOVA and t-test to answer the research questions and test the hypotheses at a 5% significant level. The result shows that the application of digital technologies helps to reduce learners’ boredom (3.52.75), improves learners’ performance (3.63.51), and is used as a visual aid for learners (3.56.61), among others. There was a positive, strong and significant relationship between the application of digital technologies and effective instructional delivery (+.895, p=.001<.05, F=17.73), competency of teachers to the application of digital technologies and effective instructional delivery (+998, p=.001<0.5, F=16263.45), and frequency of the application of digital technologies and effective instructional delivery (+.999, p=.001<.05, F=31436.14). There was no evidence of autocorrelation and multicollinearity in the regression models between the application of digital technologies and effective instructional delivery (2.03, Tolerance=1.00, VIF=1.00), competency of teachers in the application of digital technologies and effective instructional delivery (2.38, Tolerance=1.00, VIF=1.00) and frequency of the application of digital technologies and effective instructional delivery (2.00, Tolerance=1.00, VIF=1.00). Digital technologies should be therefore applied in teaching to facilitate effective instructional delivery in agriculture.Keywords: agricultural science, digital technologies, instructional delivery, learning
Procedia PDF Downloads 725070 Genetic Polymorphism in the Vitamin D Receptor Gene and 25-Hydroxyvitamin D Serum Levels in East Indian Women with Polycystic Ovary Syndrome
Authors: Dipanshu Sur, Ratnabali Chakravorty
Abstract:
Background: Polycystic ovary syndrome (PCOS) is the most common metabolic abnormality such as changes in lipid profile, diabetes, hypertension and metabolic syndrome occurring in young women of reproductive age. Low vitamin D levels were found to be associated with the development of obesity and insulin resistance in women with PCOS. Variants on vitamin D receptor (VDR) gene have also been related to metabolic comorbidities in general population. Aim: The aim of this case-control study was to investigate whether the VDR gene polymorphisms are associated with susceptibility to PCOS. Methods: Women with PCOS and a control group, all aged 16-40 years, were enrolled. Genotyping of VDR Fok-I (rs2228570), VDR Apa-I (rs7975232) as well as GC (rs2282679), DHCR7 (rs12785878) SNPs between groups were determined by using direct sequencing. Serum 25-hydroxyvitamin D [25(OH)] levels were measured by ELISA. Results: Mean serum 25(OH)D in the PCOS and control samples were 19.08±7 and 23.27±6.03 (p=0.048) which were significantly lower in PCOS patients compared with controls. CC genotype of the VDR Apa-I SNP was same frequent in PCOS (25.6%) and controls (25.6%) (OR: 0.9995; 95%CI: 0.528 to 1.8921; p= 0.9987). The CC genotype was also significantly associated with both lower E2 (p=0.031) and Androstenedione levels (p=0.062). We observed a significant association of GC polymorphism with 25(OH)D levels. PCOS women carrying the GG genotype (in GC genes) had significantly higher risk for vitamin D deficiency than women carrying the TT genotype. Conclusions: In conclusion, data from this study indicate that vitamin D levels are lower, and vitamin D deficiency more frequent, in PCOS than in controls. The present findings suggest that the Apa-I, Fok-I polymorphism of the VDR gene is associated with PCOS and seems to modulate ovarian steroid secretion. Further studies are needed to better clarify the biological mechanisms by which the polymorphism influences PCOS risk.Keywords: vitamin D receptor, polymorphism, vitamin D, polycystic ovary syndrome
Procedia PDF Downloads 3055069 Secured Transmission and Reserving Space in Images Before Encryption to Embed Data
Authors: G. R. Navaneesh, E. Nagarajan, C. H. Rajam Raju
Abstract:
Nowadays the multimedia data are used to store some secure information. All previous methods allocate a space in image for data embedding purpose after encryption. In this paper, we propose a novel method by reserving space in image with a boundary surrounded before encryption with a traditional RDH algorithm, which makes it easy for the data hider to reversibly embed data in the encrypted images. The proposed method can achieve real time performance, that is, data extraction and image recovery are free of any error. A secure transmission process is also discussed in this paper, which improves the efficiency by ten times compared to other processes as discussed.Keywords: secure communication, reserving room before encryption, least significant bits, image encryption, reversible data hiding
Procedia PDF Downloads 4125068 Automatic Identification of Pectoral Muscle
Authors: Ana L. M. Pavan, Guilherme Giacomini, Allan F. F. Alves, Marcela De Oliveira, Fernando A. B. Neto, Maria E. D. Rosa, Andre P. Trindade, Diana R. De Pina
Abstract:
Mammography is a worldwide image modality used to diagnose breast cancer, even in asymptomatic women. Due to its large availability, mammograms can be used to measure breast density and to predict cancer development. Women with increased mammographic density have a four- to sixfold increase in their risk of developing breast cancer. Therefore, studies have been made to accurately quantify mammographic breast density. In clinical routine, radiologists perform image evaluations through BIRADS (Breast Imaging Reporting and Data System) assessment. However, this method has inter and intraindividual variability. An automatic objective method to measure breast density could relieve radiologist’s workload by providing a first aid opinion. However, pectoral muscle is a high density tissue, with similar characteristics of fibroglandular tissues. It is consequently hard to automatically quantify mammographic breast density. Therefore, a pre-processing is needed to segment the pectoral muscle which may erroneously be quantified as fibroglandular tissue. The aim of this work was to develop an automatic algorithm to segment and extract pectoral muscle in digital mammograms. The database consisted of thirty medio-lateral oblique incidence digital mammography from São Paulo Medical School. This study was developed with ethical approval from the authors’ institutions and national review panels under protocol number 3720-2010. An algorithm was developed, in Matlab® platform, for the pre-processing of images. The algorithm uses image processing tools to automatically segment and extract the pectoral muscle of mammograms. Firstly, it was applied thresholding technique to remove non-biological information from image. Then, the Hough transform is applied, to find the limit of the pectoral muscle, followed by active contour method. Seed of active contour is applied in the limit of pectoral muscle found by Hough transform. An experienced radiologist also manually performed the pectoral muscle segmentation. Both methods, manual and automatic, were compared using the Jaccard index and Bland-Altman statistics. The comparison between manual and the developed automatic method presented a Jaccard similarity coefficient greater than 90% for all analyzed images, showing the efficiency and accuracy of segmentation of the proposed method. The Bland-Altman statistics compared both methods in relation to area (mm²) of segmented pectoral muscle. The statistic showed data within the 95% confidence interval, enhancing the accuracy of segmentation compared to the manual method. Thus, the method proved to be accurate and robust, segmenting rapidly and freely from intra and inter-observer variability. It is concluded that the proposed method may be used reliably to segment pectoral muscle in digital mammography in clinical routine. The segmentation of the pectoral muscle is very important for further quantifications of fibroglandular tissue volume present in the breast.Keywords: active contour, fibroglandular tissue, hough transform, pectoral muscle
Procedia PDF Downloads 3505067 Encryption Image via Mutual Singular Value Decomposition
Authors: Adil Al-Rammahi
Abstract:
Image or document encryption is needed through e- government data base. Really in this paper we introduce two matrices images, one is the public, and the second is the secret (original). The analyses of each matrix is achieved using the transformation of singular values decomposition. So each matrix is transformed or analyzed to three matrices say row orthogonal basis, column orthogonal basis, and spectral diagonal basis. Product of the two row basis is calculated. Similarly the product of the two column basis is achieved. Finally we transform or save the files of public, row product and column product. In decryption stage, the original image is deduced by mutual method of the three public files.Keywords: image cryptography, singular values decomposition
Procedia PDF Downloads 4365066 Extraction of Urban Land Features from TM Landsat Image Using the Land Features Index and Tasseled Cap Transformation
Authors: R. Bouhennache, T. Bouden, A. A. Taleb, A. Chaddad
Abstract:
In this paper we propose a method to map the urban areas. The method uses an arithmetic calculation processed from the land features indexes and Tasseled cap transformation TC of multi spectral Thematic Mapper Landsat TM image. For this purpose the derived indexes image from the original image such SAVI the soil adjusted vegetation index, UI the urban Index, and EBBI the enhanced built up and bareness index were staked to form a new image and the bands were uncorrelated, also the Spectral Angle Mapper (SAM) and Spectral Information Divergence (SID) supervised classification approaches were first applied on the new image TM data using the reference spectra of the spectral library and subsequently the four urban, vegetation, water and soil land cover categories were extracted with their accuracy assessment.The urban features were represented using a logic calculation applied to the brightness, UI-SAVI, NDBI-greenness and EBBI- brightness data sets. The study applied to Blida and mentioned that the urban features can be mapped with an accuracy ranging from 92 % to 95%.Keywords: EBBI, SAVI, Tasseled Cap Transformation, UI
Procedia PDF Downloads 4825065 Anomaly Detection of Log Analysis using Data Visualization Techniques for Digital Forensics Audit and Investigation
Authors: Mohamed Fadzlee Sulaiman, Zainurrasyid Abdullah, Mohd Zabri Adil Talib, Aswami Fadillah Mohd Ariffin
Abstract:
In common digital forensics cases, investigation may rely on the analysis conducted on specific and relevant exhibits involved. Usually the investigation officer may define and advise digital forensic analyst about the goals and objectives to be achieved in reconstructing the trail of evidence while maintaining the specific scope of investigation. With the technology growth, people are starting to realize the importance of cyber security to their organization and this new perspective creates awareness that digital forensics auditing must come in place in order to measure possible threat or attack to their cyber-infrastructure. Instead of performing investigation on incident basis, auditing may broaden the scope of investigation to the level of anomaly detection in daily operation of organization’s cyber space. While handling a huge amount of data such as log files, performing digital forensics audit for large organization proven to be onerous task for the analyst either to analyze the huge files or to translate the findings in a way where the stakeholder can clearly understand. Data visualization can be emphasized in conducting digital forensic audit and investigation to resolve both needs. This study will identify the important factors that should be considered to perform data visualization techniques in order to detect anomaly that meet the digital forensic audit and investigation objectives.Keywords: digital forensic, data visualization, anomaly detection , log analysis, forensic audit, visualization techniques
Procedia PDF Downloads 2875064 Detection of Intentional Attacks in Images Based on Watermarking
Authors: Hazem Munawer Al-Otum
Abstract:
In this work, an efficient watermarking technique is proposed and can be used for detecting intentional attacks in RGB color images. The proposed technique can be implemented for image authentication and exhibits high robustness against unintentional common image processing attacks. It deploys two measures to discern between intentional and unintentional attacks based on using a quantization-based technique in a modified 2D multi-pyramidal DWT transform. Simulations have shown high accuracy in detecting intentionally attacked regions while exhibiting high robustness under moderate to severe common image processing attacks.Keywords: image authentication, copyright protection, semi-fragile watermarking, tamper detection
Procedia PDF Downloads 2555063 Kinoform Optimisation Using Gerchberg- Saxton Iterative Algorithm
Authors: M. Al-Shamery, R. Young, P. Birch, C. Chatwin
Abstract:
Computer Generated Holography (CGH) is employed to create digitally defined coherent wavefronts. A CGH can be created by using different techniques such as by using a detour-phase technique or by direct phase modulation to create a kinoform. The detour-phase technique was one of the first techniques that was used to generate holograms digitally. The disadvantage of this technique is that the reconstructed image often has poor quality due to the limited dynamic range it is possible to record using a medium with reasonable spatial resolution.. The kinoform (phase-only hologram) is an alternative technique. In this method, the phase of the original wavefront is recorded but the amplitude is constrained to be constant. The original object does not need to exist physically and so the kinoform can be used to reconstruct an almost arbitrary wavefront. However, the image reconstructed by this technique contains high levels of noise and is not identical to the reference image. To improve the reconstruction quality of the kinoform, iterative techniques such as the Gerchberg-Saxton algorithm (GS) are employed. In this paper the GS algorithm is described for the optimisation of a kinoform used for the reconstruction of a complex wavefront. Iterations of the GS algorithm are applied to determine the phase at a plane (with known amplitude distribution which is often taken as uniform), that satisfies given phase and amplitude constraints in a corresponding Fourier plane. The GS algorithm can be used in this way to enhance the reconstruction quality of the kinoform. Different images are employed as the reference object and their kinoform is synthesised using the GS algorithm. The quality of the reconstructed images is quantified to demonstrate the enhanced reconstruction quality achieved by using this method.Keywords: computer generated holography, digital holography, Gerchberg-Saxton algorithm, kinoform
Procedia PDF Downloads 5335062 Effects of Intracerebroventricular Injection of Spexin and Its Interaction with Nitric Oxide, Serotonin, and Corticotropin Receptors on Central Food Intake Regulation in Chicken
Authors: Mohaya Farzin, Shahin Hassanpour, Morteza Zendehdel, Bita Vazir, Ahmad Asghari
Abstract:
Aim: There are several differences between birds and mammals in terms of food intake regulation. Therefore, this study aimed to investigate the effects of the intracerebroventricular (ICV) injection of spexin and its interaction with nitric oxide, serotonin, and corticotropin receptors on central food intake regulation in broiler chickens. Materials and Methods: In experiment 1, chickens received ICV injection of saline, PCPA (p-chlorophenyl alanine,1.25 µg), spexin, and PCPA+spexin. In experiments 2-7, 8-OH-DPAT (5-HT1A agonist, 15.25 nmol), SB-242084 (5-HT2C receptor antagonist, 1.5µg), L-arginine (Precursor of nitric oxide, 200 nmol), L-NAME (nitric oxide synthetase inhibitor, 100 nmol), Astressin-B (CRF1/CRF2 receptor antagonist, 30 µg) and Astressin2-B (CRF2 receptor antagonist, 30 µg) were injected to chickens instead of the PCPA. Then, food intake was measured until 120 minutes after the injection. Results: Spexin significantly decreased food consumption (P<0.05). Concomitant injection of SB-242084+spexin attenuated spexin-induced hypophagia (P<0.05). Co-injection of L-arginine+spexin enhanced spexin-induced hypophagia, and this effect was reversed by L-NAME (P<0.05). Also, concomitant injection of Astressin-B + spexin or Astressin2-B + spexin enhanced spexin-induced hypophagia (P<0.05). Conclusions: Based on these observations, spexin-induced hypophagia may be mediated by nitric oxide and 5-HT2C, CRF1, and CRF2 receptors in neonatal broiler chickens.Keywords: spexin, serotonin, corticotropin, nitric oxide, food intake, chicken
Procedia PDF Downloads 745061 Role of Transient Receptor Potential Vanilloid 1 in Electroacupuncture Analgesia on Chronic Inflammatory Pain in Mice
Authors: Jun Yang, Ching-Liang Hsieh, Yi-Wen Lin
Abstract:
Chronic inflammatory pain results from peripheral tissue injury or local inflammation to increase the release of protons, histamines, adenosine triphosphate, and several proinflammatory cytokines. Transient receptor potential vanilloid 1 (TRPV1) is involved in fibromyalgia, neuropathic, and inflammatory pain; however, its exact mechanisms in chronic inflammatory pain are still unclear. We investigate the analgesic effect of EA by injecting complete Freund’s adjuvant (CFA) in the hind paw of mice to induce chronic inflammatory pain ( > 14 d). Our results showed that EA significantly reduced chronic mechanical and thermal hyperalgesia in the chronic inflammatory pain model. Chronic mechanical and thermal hyperalgesia was also abolished in TRPV1−/− mice. TRPV1 increased in the dorsal root ganglion (DRG) and spinal cord (SC) at 2 weeks after CFA injection. The expression levels of downstream molecules such as pPKA, pPI3K, and pPKC increased, as did those of pERK, pp38, and pJNK. Transcription factors (pCREB and pNFκB) and nociceptive ion channels (Nav1.7 and Nav1.8) were involved in this process. Inflammatory mediators such as GFAP (Glial fibrillary acidic protein), S100B, and RAGE (Receptor for advanced glycation endproducts) were also involved. The expression levels of these molecules were reduced in EA (electroacupuncture) and TRPV1−/−mice but not in the sham EA group. The present study demonstrated that EA or TRPV1 gene deletion reduced chronic inflammatory pain through TRPV1 and related molecules. In addition, our data provided evidence to support the clinical use of EA for treating chronic inflammatory pain.Keywords: auricular electric-stimulation, epileptic seizures, anti-inflammation, electroacupuncture
Procedia PDF Downloads 1765060 Pilot-free Image Transmission System of Joint Source Channel Based on Multi-Level Semantic Information
Authors: Linyu Wang, Liguo Qiao, Jianhong Xiang, Hao Xu
Abstract:
In semantic communication, the existing joint Source Channel coding (JSCC) wireless communication system without pilot has unstable transmission performance and can not effectively capture the global information and location information of images. In this paper, a pilot-free image transmission system of joint source channel based on multi-level semantic information (Multi-level JSCC) is proposed. The transmitter of the system is composed of two networks. The feature extraction network is used to extract the high-level semantic features of the image, compress the information transmitted by the image, and improve the bandwidth utilization. Feature retention network is used to preserve low-level semantic features and image details to improve communication quality. The receiver also is composed of two networks. The received high-level semantic features are fused with the low-level semantic features after feature enhancement network in the same dimension, and then the image dimension is restored through feature recovery network, and the image location information is effectively used for image reconstruction. This paper verifies that the proposed multi-level JSCC algorithm can effectively transmit and recover image information in both AWGN channel and Rayleigh fading channel, and the peak signal-to-noise ratio (PSNR) is improved by 1~2dB compared with other algorithms under the same simulation conditions.Keywords: deep learning, JSCC, pilot-free picture transmission, multilevel semantic information, robustness
Procedia PDF Downloads 1205059 Robust and Real-Time Traffic Counting System
Authors: Hossam M. Moftah, Aboul Ella Hassanien
Abstract:
In the recent years the importance of automatic traffic control has increased due to the traffic jams problem especially in big cities for signal control and efficient traffic management. Traffic counting as a kind of traffic control is important to know the road traffic density in real time. This paper presents a fast and robust traffic counting system using different image processing techniques. The proposed system is composed of the following four fundamental building phases: image acquisition, pre-processing, object detection, and finally counting the connected objects. The object detection phase is comprised of the following five steps: subtracting the background, converting the image to binary, closing gaps and connecting nearby blobs, image smoothing to remove noises and very small objects, and detecting the connected objects. Experimental results show the great success of the proposed approach.Keywords: traffic counting, traffic management, image processing, object detection, computer vision
Procedia PDF Downloads 2945058 Role of Estrogen Receptor-alpha in Mammary Carcinoma by Single Nucleotide Polymorphisms and Molecular Docking: An In-silico Analysis
Authors: Asif Bilal, Fouzia Tanvir, Sibtain Ahmad
Abstract:
Estrogen receptor alpha, also known as estrogen receptor-1, is highly involved in risk of mammary carcinoma. The objectives of this study were to identify non-synonymous SNPs of estrogen receptor and their association with breast cancer and to identify the chemotherapeutic responses of phytochemicals against it via in-silico study design. For this purpose, different online tools. to identify pathogenic SNPs the tools were SIFT, Polyphen, Polyphen-2, fuNTRp, SNAP2, for finding disease associated SNPs the tools SNP&GO, PhD-SNP, PredictSNP, MAPP, SNAP, MetaSNP, PANTHER, and to check protein stability Mu-Pro, I-Mutant, and CONSURF were used. Post-translational modifications (PTMs) were detected by Musitedeep, Protein secondary structure by SOPMA, protein to protein interaction by STRING, molecular docking by PyRx. Seven SNPs having rsIDs (rs760766066, rs779180038, rs956399300, rs773683317, rs397509428, rs755020320, and rs1131692059) showing mutations on I229T, R243C, Y246H, P336R, Q375H, R394S, and R394H, respectively found to be completely deleterious. The PTMs found were 96 times Glycosylation; 30 times Ubiquitination, a single time Acetylation; and no Hydroxylation and Phosphorylation were found. The protein secondary structure consisted of Alpha helix (Hh) is (28%), Extended strand (Ee) is (21%), Beta turn (Tt) is 7.89% and Random coil (Cc) is (44.11%). Protein-protein interaction analysis revealed that it has strong interaction with Myeloperoxidase, Xanthine dehydrogenase, carboxylesterase 1, Glutathione S-transferase Mu 1, and with estrogen receptors. For molecular docking we used Asiaticoside, Ilekudinuside, Robustoflavone, Irinoticane, Withanolides, and 9-amin0-5 as ligands that extract from phytochemicals and docked with this protein. We found that there was great interaction (from -8.6 to -9.7) of these ligands of phytochemicals at ESR1 wild and two mutants (I229T and R394S). It is concluded that these SNPs found in ESR1 are involved in breast cancer and given phytochemicals are highly helpful against breast cancer as chemotherapeutic agents. Further in vitro and in vivo analysis should be performed to conduct these interactions.Keywords: breast cancer, ESR1, phytochemicals, molecular docking
Procedia PDF Downloads 695057 Empowering Girls and Youth in Bangladesh: Importance of Creating Safe Digital Space for Online Learning and Education
Authors: Md. Rasel Mia, Ashik Billah
Abstract:
The empowerment of girls and youth in Bangladesh is a demanding issue in today's digital age, where online learning and education have become integral to personal and societal development. This abstract explores the critical importance of creating a secure online environment for girls and youth in Bangladesh, emphasizing the transformative impact it can have on their access to education and knowledge. Bangladesh, like many developing nations, faces gender inequalities in education and access to digital resources. The creation of a safe digital space not only mitigates the gender digital divide but also fosters an environment where girls and youth can thrive academically and professionally. This manuscript draws attention to the efforts through a mixed-method study to assess the current digital landscape in Bangladesh, revealing disparities in phone and internet access, online practices, and awareness of cyber security among diverse demographic groups. Moreover, the study unveils the varying levels of familial support and barriers encountered by girls and youth in their quest for digital literacy. It emphasizes the need for tailored training programs that address specific learning needs while also advocating for enhanced internet accessibility, safe online practices, and inclusive online platforms. The manuscript culminates in a call for collaborative efforts among stakeholders, including NGOs, government agencies, and telecommunications companies, to implement targeted interventions that bridge the gender digital divide and pave the way for a brighter, more equitable future for girls and youth in Bangladesh. In conclusion, this research highlights the undeniable significance of creating a safe digital space as a catalyst for the empowerment of girls and youth in Bangladesh, ensuring that they not only access but excel in the online space, thereby contributing to their personal growth and the advancement of society as a whole.Keywords: collaboration, cyber security, digital literacy, digital resources, inclusiveness
Procedia PDF Downloads 615056 HR MRI CS Based Image Reconstruction
Authors: Krzysztof Malczewski
Abstract:
Magnetic Resonance Imaging (MRI) reconstruction algorithm using compressed sensing is presented in this paper. It is exhibited that the offered approach improves MR images spatial resolution in circumstances when highly undersampled k-space trajectories are applied. Compressed Sensing (CS) aims at signal and images reconstructing from significantly fewer measurements than were conventionally assumed necessary. Magnetic Resonance Imaging (MRI) is a fundamental medical imaging method struggles with an inherently slow data acquisition process. The use of CS to MRI has the potential for significant scan time reductions, with visible benefits for patients and health care economics. In this study the objective is to combine super-resolution image enhancement algorithm with CS framework benefits to achieve high resolution MR output image. Both methods emphasize on maximizing image sparsity on known sparse transform domain and minimizing fidelity. The presented algorithm considers the cardiac and respiratory movements.Keywords: super-resolution, MRI, compressed sensing, sparse-sense, image enhancement
Procedia PDF Downloads 4305055 Effects of Cellular Insulin Receptor Stimulators with Alkaline Water on Performance, Plasma Cholesterol, Glucose, Triglyceride Levels and Hatchability in Breeding Japanese Quail
Authors: Rabia Göçmen, Gülşah Kanbur, Sinan Sefa Parlat
Abstract:
Aim of this study is to determine the effects of cellular insulin receptor stimulators on performance, plasma glucose, high density lipoprotein (HDL), low density lipoprotein (LDL), total cholesterol, triglyceride, triiodothyronine (T3) and thyroxine (T4) hormone levels, and incubation features in the breeding Japanese quails (Coturnix japonica). In the study, a total of 84 breeding quails was used, 6 weeks’ age, 24 are male and 60, female. Rations used in experiment are 2900 kcal/kg metabolic energy and 20% crude protein. Water pH is calibrated to 7.45. Ration and water were administered ad-libitum to the animals. As metformin source, metformin-HCl was used and as chrome resource, chromium picolinate was used. Trial groups were formed as control group (basal ration), metformin group (basal ration, added metformin at the level of feed of 20 mg/kg), and chromium picolinate (basal ration, added feed of 1500 ppb Cr) group. When regarded to the results of performance at the end of experiment, it is seen that live weight gain, feed consumption, egg weight, feed conversion ratio (Feed consumption/ egg weight), and egg production were affected at the significant level (p < 0.05). When the results are evaluated in terms of incubation features, hatchability and hatchability of fertile egg ratio were not affected from the treatments. Fertility ratio was significantly affected by metformin and chromium picolinate treatments and fertility rose at the significant level compared to control group (p < 0.05). According to results of experiment, plasma glucose level was not affected by metformin and chromium picolinate treatments. Plasma, total cholesterol, HDL, LDL, and triglyceride levels were significantly affected from insulin receptor stimulators added to ration (p < 0.05). Hormone level of Plasma T3 and T4 were also affected at the significant level from insulin receptor stimulators added to ration (p < 0.05).Keywords: chromium picolinate, cholesterol, hormone, metformin, quail
Procedia PDF Downloads 2205054 A Novel Approach of Secret Communication Using Douglas-Peucker Algorithm
Authors: R. Kiruthika, A. Kannan
Abstract:
Steganography is the problem of hiding secret messages in 'innocent – looking' public communication so that the presence of the secret message cannot be detected. This paper introduces a steganographic security in terms of computational in-distinguishability from a channel of probability distributions on cover messages. This method first splits the cover image into two separate blocks using Douglas – Peucker algorithm. The text message and the image will be hided in the Least Significant Bit (LSB) of the cover image.Keywords: steganography, lsb, embedding, Douglas-Peucker algorithm
Procedia PDF Downloads 3635053 Digital Control Techniques for Power Electronic Devices
Authors: Rakesh Krishna, Abhishek Poddar
Abstract:
The paper discusses the work carried out on the implementation of control techniques like Digital Pulse Width Modulation (PWM) and Digital Pulse Fired control(PFC). These techniques are often used in devices like inverters, battery chargers, DC-to-DC converters can also be implemented on household devices like heaters. The advantage being the control and improved life span of device. In case of batteries using these techniques are known to increase the life span of battery in mobiles and other hand-held devices. 8051 microcontroller is used to implement these methods.Thyristors are used for switching operations.Keywords: PWM, SVM, PFC, bidirectional inverters, snubber
Procedia PDF Downloads 5725052 Sampling Two-Channel Nonseparable Wavelets and Its Applications in Multispectral Image Fusion
Authors: Bin Liu, Weijie Liu, Bin Sun, Yihui Luo
Abstract:
In order to solve the problem of lower spatial resolution and block effect in the fusion method based on separable wavelet transform in the resulting fusion image, a new sampling mode based on multi-resolution analysis of two-channel non separable wavelet transform, whose dilation matrix is [1,1;1,-1], is presented and a multispectral image fusion method based on this kind of sampling mode is proposed. Filter banks related to this kind of wavelet are constructed, and multiresolution decomposition of the intensity of the MS and panchromatic image are performed in the sampled mode using the constructed filter bank. The low- and high-frequency coefficients are fused by different fusion rules. The experiment results show that this method has good visual effect. The fusion performance has been noted to outperform the IHS fusion method, as well as, the fusion methods based on DWT, IHS-DWT, IHS-Contourlet transform, and IHS-Curvelet transform in preserving both spectral quality and high spatial resolution information. Furthermore, when compared with the fusion method based on nonsubsampled two-channel non separable wavelet, the proposed method has been observed to have higher spatial resolution and good global spectral information.Keywords: image fusion, two-channel sampled nonseparable wavelets, multispectral image, panchromatic image
Procedia PDF Downloads 4405051 Developing and Managing an Institutional Repository in a Nigerian University Library: The Futa Experience
Authors: Belau Olatunde Gbadamosi, Oluchi Okere
Abstract:
Spurred by the ease of access to and the cost-effectiveness of open-source software such as DSpace, EPrints, and Greenstone Digital Libraries for hosting digital content, many libraries have added institutional repositories (IRs) to their repertoire of digital assets. This paper adopts a qualitative approach based on focus group discussions and the system development life cycle model (SDLC) to describe the experience of Albert Ilemobade Library (the Federal University of Technology Akure, Nigeria (FUTA) in the development of their IR - FUTASpace. Peculiar challenges experienced in the course of the development and solutions adopted are also reported. This study will serve as a reference point to other institutions, particularly those operating in developing countries, which may be poorly funded.Keywords: institutional repository, digital libraries, university libraries, DSpace
Procedia PDF Downloads 174