Search results for: wireless body area network
16101 Design of Local Interconnect Network Controller for Automotive Applications
Authors: Jong-Bae Lee, Seongsoo Lee
Abstract:
Local interconnect network (LIN) is a communication protocol that combines sensors, actuators, and processors to a functional module in automotive applications. In this paper, a LIN ver. 2.2A controller was designed in Verilog hardware description language (Verilog HDL) and implemented in field-programmable gate array (FPGA). Its operation was verified by making full-scale LIN network with the presented FPGA-implemented LIN controller, commercial LIN transceivers, and commercial processors. When described in Verilog HDL and synthesized in 0.18 μm technology, its gate size was about 2,300 gates.Keywords: local interconnect network, controller, transceiver, processor
Procedia PDF Downloads 28816100 Review of Full Body Imaging and High-Resolution Automatic 3D Mapping Systems for Medical Application
Authors: Jurijs Salijevs, Katrina Bolocko
Abstract:
The integration of artificial intelligence and neural networks has significantly changed full-body imaging and high-resolution 3D mapping systems, and this paper reviews research in these areas. With an emphasis on their use in the early identification of melanoma and other disorders, the goal is to give a wide perspective on the current status and potential future of these medical imaging technologies. Authors also examine methodologies such as machine learning and deep learning, seeking to identify efficient procedures that enhance diagnostic capabilities through the analysis of 3D body scans. This work aims to encourage further research and technological development to harness the full potential of AI in disease diagnosis.Keywords: artificial intelligence, neural networks, 3D scan, body scan, 3D mapping system, healthcare
Procedia PDF Downloads 10316099 Domain-Specific Deep Neural Network Model for Classification of Abnormalities on Chest Radiographs
Authors: Nkechinyere Joy Olawuyi, Babajide Samuel Afolabi, Bola Ibitoye
Abstract:
This study collected a preprocessed dataset of chest radiographs and formulated a deep neural network model for detecting abnormalities. It also evaluated the performance of the formulated model and implemented a prototype of the formulated model. This was with the view to developing a deep neural network model to automatically classify abnormalities in chest radiographs. In order to achieve the overall purpose of this research, a large set of chest x-ray images were sourced for and collected from the CheXpert dataset, which is an online repository of annotated chest radiographs compiled by the Machine Learning Research Group, Stanford University. The chest radiographs were preprocessed into a format that can be fed into a deep neural network. The preprocessing techniques used were standardization and normalization. The classification problem was formulated as a multi-label binary classification model, which used convolutional neural network architecture to make a decision on whether an abnormality was present or not in the chest radiographs. The classification model was evaluated using specificity, sensitivity, and Area Under Curve (AUC) score as the parameter. A prototype of the classification model was implemented using Keras Open source deep learning framework in Python Programming Language. The AUC ROC curve of the model was able to classify Atelestasis, Support devices, Pleural effusion, Pneumonia, A normal CXR (no finding), Pneumothorax, and Consolidation. However, Lung opacity and Cardiomegaly had a probability of less than 0.5 and thus were classified as absent. Precision, recall, and F1 score values were 0.78; this implies that the number of False Positive and False Negative is the same, revealing some measure of label imbalance in the dataset. The study concluded that the developed model is sufficient to classify abnormalities present in chest radiographs into present or absent.Keywords: transfer learning, convolutional neural network, radiograph, classification, multi-label
Procedia PDF Downloads 12916098 Mechanism for Network Security via Routing Protocols Estimated with Network Simulator 2 (NS-2)
Authors: Rashid Mahmood, Muhammad Sufyan, Nasir Ahmed
Abstract:
The MANETs have lessened transportation and decentralized network. There are numerous basis of routing protocols. We derived the MANETs protocol into three major categories like Reactive, Proactive and hybrid. In these protocols, we discussed only some protocols like Distance Sequenced Distance Vector (DSDV), Ad hoc on Demand Distance Vector (AODV) and Dynamic Source Routing (DSR). The AODV and DSR are both reactive type of protocols. On the other hand, DSDV is proactive type protocol here. We compare these routing protocols for network security estimated by network simulator (NS-2). In this dissertation some parameters discussed such as simulation time, packet size, number of node, packet delivery fraction, push time and speed etc. We will construct all these parameters on routing protocols under suitable conditions for network security measures.Keywords: DSDV, AODV, DSR NS-2, PDF, push time
Procedia PDF Downloads 43316097 Information Theoretic Approach for Beamforming in Wireless Communications
Authors: Syed Khurram Mahmud, Athar Naveed, Shoaib Arif
Abstract:
Beamforming is a signal processing technique extensively utilized in wireless communications and radars for desired signal intensification and interference signal minimization through spatial selectivity. In this paper, we present a method for calculation of optimal weight vectors for smart antenna array, to achieve a directive pattern during transmission and selective reception in interference prone environment. In proposed scheme, Mutual Information (MI) extrema are evaluated through an energy constrained objective function, which is based on a-priori information of interference source and desired array factor. Signal to Interference plus Noise Ratio (SINR) performance is evaluated for both transmission and reception. In our scheme, MI is presented as an index to identify trade-off between information gain, SINR, illumination time and spatial selectivity in an energy constrained optimization problem. The employed method yields lesser computational complexity, which is presented through comparative analysis with conventional methods in vogue. MI based beamforming offers enhancement of signal integrity in degraded environment while reducing computational intricacy and correlating key performance indicators.Keywords: beamforming, interference, mutual information, wireless communications
Procedia PDF Downloads 28016096 Constructing Masculinity through Images: Content Analysis of Lifestyle Magazines in Croatia
Authors: Marija Lončar, Zorana Šuljug Vučica, Magdalena Nigoević
Abstract:
Diverse social, cultural and economic trends and changes in contemporary societies influence the ways masculinity is represented in a variety of media. Masculinity is constructed within media images as a dynamic process that changes slowly over time and is shaped by various social factors. In many societies, dominant masculinity is still associated with authority, heterosexuality, marriage, professional and financial success, ethnic dominance and physical strength. But contemporary media depict men in ways that suggest a change in the approach to media images. The number of media images of men, which promote men’s identity through their body, have increased. With the male body more scrutinized and commodified, it is necessary to highlight how the body is represented and which visual elements are crucial since the body has an important role in the construction of masculinities. The study includes content analysis of male body images in the advertisements of different men’s and women’s lifestyle magazines available in Croatia. The main aim was to explore how masculinities are currently being portrayed through body regarding age, physical appearance, fashion, touch and gaze. The findings are also discussed in relation to female images since women are central in many of the processes constructing masculinities and according to the recent conceptualization of masculinity. Although the construction of male images varies through body features, almost all of them convey the message that men’s identity could be managed through manipulation and by enhancing the appearance. Furthermore, they suggest that men should engage in “bodywork” through advertised products, activities and/or practices, in order to achieve their preferred social image.Keywords: body images, content analysis, lifestyle magazines, masculinity
Procedia PDF Downloads 24516095 Changes in Pain Intensity of Musculoskeletal Disorders in Flight Attendants after Stretching Exercise Program
Authors: Maria Melania Muda, Retno Wibawanti, Retno Asti Werdhani
Abstract:
Background: Flight attendant (FA) is a job that is often exposed to ergonomic stressors; thus, they are very susceptible to symptoms of musculoskeletal disorders (MSDs). One of the ways to overcome musculoskeletal complaints is by stretching. This study aimed to examine the prevalence of MSDs and the effect of a 2-week stretching exercise program using the Indonesian Ministry of Health's stretching video on changes in musculoskeletal pain intensity in FA on commercial aircraft in Indonesia. Methods: A pre-post study was conducted using Nordic Musculoskeletal Questionnaire (NMQ) for MSDs’ identification and Visual Analog Scale (VAS) as pain intensity measurement. Data was collected and then analyzed using SPSS with Wilcoxon test. The change in pain intensity was considered significant if the p value was less than 0.05. Results: The results showed that 92% of the FA (n=75) had MSDs in at least 1 area of the body in the last 12 months. Thirty-four respondents participated as subjects. The complaint level score in 28 body areas before intervention was a median of 34 (29-84), with pain intensity of a median of 6 (2-9) became a median of 32 (28-67) and a median of 3 (0-9) after the intervention, respectively, with p-value <0.001. Conclusion: The stretching exercise program showed significant changes in the complaint level scores in 28 body areas (p < 0.001) and pain intensity before and after the stretching exercise intervention (p < 0.001).Keywords: flight attendant, MSDs, Nordic Musculoskeletal Questionnaire, stretching exercise program, visual analog scale
Procedia PDF Downloads 8316094 Poly(propylene fumarate) Copolymers with Phosphonic Acid-based Monomers Designed as Bone Tissue Engineering Scaffolds
Authors: Görkem Cemali̇, Avram Aruh, Gamze Torun Köse, Erde Can ŞAfak
Abstract:
In order to heal bone disorders, the conventional methods which involve the use of autologous and allogenous bone grafts or permanent implants have certain disadvantages such as limited supply, disease transmission, or adverse immune response. A biodegradable material that acts as structural support to the damaged bone area and serves as a scaffold that enhances bone regeneration and guides bone formation is one desirable solution. Poly(propylene fumarate) (PPF) which is an unsaturated polyester that can be copolymerized with appropriate vinyl monomers to give biodegradable network structures, is a promising candidate polymer to prepare bone tissue engineering scaffolds. In this study, hydroxyl-terminated PPF was synthesized and thermally cured with vinyl phosphonic acid (VPA) and diethyl vinyl phosphonate (VPES) in the presence of radical initiator benzoyl peroxide (BP), with changing co-monomer weight ratios (10-40wt%). In addition, the synthesized PPF was cured with VPES comonomer at body temperature (37oC) in the presence of BP initiator, N, N-Dimethyl para-toluidine catalyst and varying amounts of Beta-tricalcium phosphate (0-20 wt% ß-TCP) as filler via radical polymerization to prepare composite materials that can be used in injectable forms. Thermomechanical properties, compressive properties, hydrophilicity and biodegradability of the PPF/VPA and PPF/VPES copolymers were determined and analyzed with respect to the copolymer composition. Biocompatibility of the resulting polymers and their composites was determined by the MTS assay and osteoblast activity was explored with von kossa, alkaline phosphatase and osteocalcin activity analysis and the effects of VPA and VPES comonomer composition on these properties were investigated. Thermally cured PPF/VPA and PPF/VPES copolymers with different compositions exhibited compressive modulus and strength values in the wide range of 10–836 MPa and 14–119 MPa, respectively. MTS assay studies showed that the majority of the tested compositions were biocompatible and the overall results indicated that PPF/VPA and PPF/VPES network polymers show significant potential for applications as bone tissue engineering scaffolds where varying PPF and co-monomer ratio provides adjustable and controllable properties of the end product. The body temperature cured PPF/VPES/ß-TCP composites exhibited significantly lower compressive modulus and strength values than the thermal cured PPF/VPES copolymers and were therefore found to be useful as scaffolds for cartilage tissue engineering applications.Keywords: biodegradable, bone tissue, copolymer, poly(propylene fumarate), scaffold
Procedia PDF Downloads 16616093 Internet-Based Architecture for Machine-to-Machine Communication of a Public Security Network
Authors: Ogwueleka Francisca Nonyelum, Jiya Muhammad
Abstract:
Poor communication between the victims of the burglaries, road and fire accidents and the agencies, and lack of quick emergency response by the agencies is solved through Machine-to-Machine (M2M) communication. A distress caller is expected to make a call through a network to the respective agency for emergency response but due to some challenges, this often becomes arduous and futile. This research puts forth an Internet-based architecture for Machine-to-Machine (M2M) communication to enhance information dissemination in National Public Security Communication System (NPSCS) network. M2M enables the flow of data between machines and machines and ultimately machines and people with information flowing from a machine over a network, and then through a gateway to a system where it is reviewed and acted on. The research findings showed that Internet-based architecture for M2M communication is most suitable for deployment of a public security network which will allow machines to use Internet to talk to each other.Keywords: machine-to-machine (M2M), internet-based architecture, network, gateway
Procedia PDF Downloads 48216092 The Influence of Cage versus Floor Pen Management of Broilers
Authors: Hanan Al-Khalifa
Abstract:
There has been an interest in raising poultry in environmentally controlled cages rather than on floor, because poultry raised on floor are more susceptible to environmental stress including pathogens and heat stress. A study was conducted to investigate the effect of managerial environmental conditions on body weight gain of Cobb 500 broiler breed. Broilers were raised in cages and on floor in two separate rooms. Body weight at different ages of the broilers was monitored. It was found that body weight at slaughter age (5weeks) for boilers raised in batteries were significantly higher than those raised on the floor.Keywords: broilers, cages, floor, poultry
Procedia PDF Downloads 41616091 Multi-Dimension Threat Situation Assessment Based on Network Security Attributes
Authors: Yang Yu, Jian Wang, Jiqiang Liu, Lei Han, Xudong He, Shaohua Lv
Abstract:
As the increasing network attacks become more and more complex, network situation assessment based on log analysis cannot meet the requirements to ensure network security because of the low quality of logs and alerts. This paper addresses the lack of consideration of security attributes of hosts and attacks in the network. Identity and effectiveness of Distributed Denial of Service (DDoS) are hard to be proved in risk assessment based on alerts and flow matching. This paper proposes a multi-dimension threat situation assessment method based on network security attributes. First, the paper offers an improved Common Vulnerability Scoring System (CVSS) calculation, which includes confident risk, integrity risk, availability risk and a weighted risk. Second, the paper introduces deterioration rate of properties collected by sensors in hosts and network, which aimed at assessing the time and level of DDoS attacks. Third, the paper introduces distribution of asset value in security attributes considering features of attacks and network, which aimed at assessing and show the whole situation. Experiments demonstrate that the approach reflects effectiveness and level of DDoS attacks, and the result can show the primary threat in network and security requirement of network. Through comparison and analysis, the method reflects more in security requirement and security risk situation than traditional methods based on alert and flow analyzing.Keywords: DDoS evaluation, improved CVSS, network security attribute, threat situation assessment
Procedia PDF Downloads 20916090 The Influence of Self-Concept on the Tendency of Body Dysmorphic Disorder of Beauty Salon and Fitness Centre Customers in Malang
Authors: Yunita Kurniawati
Abstract:
The aim of the research is to understand the influence of self concept on the tendency for body dysmorphic disorder among beauty salon and fitness centre customers in Malang. Subjects in this study amounted to 200 of beauty salon and fitness centre customers in Malang. Subjects completed a self-concept scale and the tendency of body dysmorphic scale. This study was analyzed using simple linear regression. The result shows that there are 14% influence of self concept on the tendency of body dysmorphic disorder among customers of beauty salon and fitness centre in Malang.Keywords: self concept, tendency of body dysmorphic disorder, beauty salon and fitness centre customers, Malang
Procedia PDF Downloads 42116089 Social Network Analysis in Water Governance
Authors: Faribaebrahimi, Mehdi Ghorbani, Mohsen Mohsenisaravi
Abstract:
Ecosystem management is complex because of natural and human issues. To cope with this complexity water governance is recommended since it involves all stakeholders including people, governmental and non-governmental organization who related to environmental systems. Water governance emphasizes on water co-management through consideration of all the stakeholders in the form of social and organizational network. In this research, to illustrate indicators of water governance in Dorood watershed, in Shemiranat region of Iran, social network analysis had been applied. The results revealed that social cohesion among pastoralists in Dorood is medium because of trust links, while link sustainability is weak to medium. According to the results, some pastoralists have high social power and therefore are key actors in the utilization network, regarding to centrality index and trust links. The results also demonstrated that Agricultural Development Office and (Shemshak-Darbandsar Islamic) Council are key actors in rangeland co-management, based on centrality index in rangeland institutional network at regional scale in Shemiranat district.Keywords: social network analysis, water governance, organizational network, water co-management
Procedia PDF Downloads 35116088 Analysis of the Omnichannel Delivery Network with Application to Last Mile Delivery
Authors: Colette Malyack, Pius Egbelu
Abstract:
Business-to-Customer (B2C) delivery options have improved to meet increased demand in recent years. The change in end users has forced logistics networks to focus on customer service and sentiment that would have previously been the priority of the company or organization of origin. This has led to increased pressure on logistics companies to extend traditional B2B networks into a B2C solution while accommodating additional costs, roadblocks, and customer sentiment; the result has been the creation of the omnichannel delivery network encompassing a number of traditional and modern methods of package delivery. In this paper the many solutions within the omnichannel delivery network are defined and discussed. It can be seen through this analysis that the omnichannel delivery network can be applied to reduce the complexity of package delivery and provide customers with more options. Applied correctly the result is a reduction in cost to the logistics company over time, even with an initial increase in cost to obtain the technology.Keywords: network planning, last mile delivery, omnichannel delivery network, omnichannel logistics
Procedia PDF Downloads 15016087 A Dynamic Neural Network Model for Accurate Detection of Masked Faces
Authors: Oladapo Tolulope Ibitoye
Abstract:
Neural networks have become prominent and widely engaged in algorithmic-based machine learning networks. They are perfect in solving day-to-day issues to a certain extent. Neural networks are computing systems with several interconnected nodes. One of the numerous areas of application of neural networks is object detection. This is a prominent area due to the coronavirus disease pandemic and the post-pandemic phases. Wearing a face mask in public slows the spread of the virus, according to experts’ submission. This calls for the development of a reliable and effective model for detecting face masks on people's faces during compliance checks. The existing neural network models for facemask detection are characterized by their black-box nature and large dataset requirement. The highlighted challenges have compromised the performance of the existing models. The proposed model utilized Faster R-CNN Model on Inception V3 backbone to reduce system complexity and dataset requirement. The model was trained and validated with very few datasets and evaluation results shows an overall accuracy of 96% regardless of skin tone.Keywords: convolutional neural network, face detection, face mask, masked faces
Procedia PDF Downloads 6816086 Impact of Capture Effect on Receiver Initiated Collision Detection with Sequential Resolution in WLAN
Authors: Sethu Lekshmi, Shahanas, Prettha P.
Abstract:
All existing protocols in wireless networks are mainly based on Carrier Sense Multiple Access with Collision avoidance. By applying collision detection in wireless networks, the time spent on collision can be reduced and thus improves system throughput. However in a real WLAN scenario due to the use of nonlinear modulation techniques only receiver can decided whether a packet loss take place, even there are multiple transmissions. In this proposed method, the receiver or Access Point detects the collision when multiple data packets are transmitted from different wireless stations. Whenever the receiver detects a collision, it transmits a jamming signal to all the transmitting stations so that they can immediately stop their on-going transmissions. We also provide preferential access to all collided packet to reduce unfairness and to increase system throughput by reducing contention. However, this preferential access will not block the channel for the long time. Here, an in-band transmission is considered in which both the data frames and control frames are transmitted in the same channel. We also provide a simple mathematical model for the proposed protocol and give the simulation result of WLAN scenario under various capture thresholds.Keywords: 802.11, WLAN, capture effect, collision detection, collision resolution, receiver initiated
Procedia PDF Downloads 35916085 Blue Whale Body Condition from Photographs Taken over a 14-Year Period in the North East Pacific: Annual Variations and Connection to Measures of Ocean Productivity
Authors: Rachel Wachtendonk, John Calambokidis, Kiirsten Flynn
Abstract:
Large marine mammals can serve as an indicator of the overall state of the environment due to their long lifespan and apex position in marine food webs. Reductions in prey, driven by changes in environmental conditions can have resounding impacts on the trophic system as a whole; this can manifest in reduced fat stores that are visible on large whales. Poor health can lead to reduced survivorship and fitness, both of which can be detrimental to a recovering population. A non-invasive technique was used for monitoring blue whale health and for seeing if it changes with ocean conditions. Digital photographs of blue whales taken in the NE Pacific by Cascadia Research and collaborators from 2005-2018 (n=3,545) were scored for overall body condition based on visible vertebrae and body shape on a scale of 0-3 where a score of 0 indicated best body condition and a score of 3 indicated poorest. The data was analyzed to determine if there were patterns in the health of whales across years and whether overall poor health was related to oceanographic conditions and predictors of prey abundance on the California coast. The year was a highly significant factor in body condition (Chi-Square, p<0.001). The proportion of whales showing poor body condition (scores 2 & 3) overall was 33% but by year varied widely from a low of 18% (2008) to a high of 55% (2015). The only two years where >50% of animals had poor body condition were 2015 and 2017 (no other year was above 45%). The 2015 maximum proportion of whales in poor body condition coincide with the marine heat wave that affected the NE Pacific 2014-16 and impacted other whale populations. This indicates that the scoring method was an effective way to evaluate blue whale health and how they respond to a changing ocean.Keywords: blue whale, body condition, environmental variability, photo-identification
Procedia PDF Downloads 20416084 Rejuvenate: Face and Body Retouching Using Image Inpainting
Authors: Hossam Abdelrahman, Sama Rostom, Reem Yassein, Yara Mohamed, Salma Salah, Nour Awny
Abstract:
In today’s environment, people are becoming increasingly interested in their appearance. However, they are afraid of their unknown appearance after a plastic surgery or treatment. Accidents, burns and genetic problems such as bowing of body parts of people have a negative impact on their mental health with their appearance and this makes them feel uncomfortable and underestimated. The approach presents a revolutionary deep learning-based image inpainting method that analyses the various picture structures and corrects damaged images. In this study, A model is proposed based on the in-painting of medical images with Stable Diffusion Inpainting method. Reconstructing missing and damaged sections of an image is known as image inpainting is a key progress facilitated by deep neural networks. The system uses the input of the user of an image to indicate a problem, the system will then modify the image and output the fixed image, facilitating for the patient to see the final result.Keywords: generative adversarial network, large mask inpainting, stable diffusion inpainting, plastic surgery
Procedia PDF Downloads 7416083 Enabling UDP Multicast in Cloud IaaS: An Enterprise Use Case
Authors: Patrick J. Kerpan, Ryan C. Koop, Margaret M. Walker, Chris P. Swan
Abstract:
The User Datagram Protocol (UDP) multicast is a vital part of data center networking that is being left out of major cloud computing providers' network infrastructure. Enterprise users rely on multicast, and particularly UDP multicast to create and connect vital business operations. For example, UPD makes a variety of business functions possible from simultaneous content media updates, High-Performance Computing (HPC) grids, and video call routing for massive open online courses (MOOCs). Essentially, UDP multicast's technological slight is causing a huge effect on whether companies choose to use (or not to use) public cloud infrastructure as a service (IaaS). Allowing the ‘chatty’ UDP multicast protocol inside a cloud network could have a serious impact on the performance of the cloud as a whole. Cloud IaaS providers solve the issue by disallowing all UDP multicast. But what about enterprise use cases for multicast applications in organizations that want to move to the cloud? To re-allow multicast traffic, enterprises can build a layer 3 - 7 network over the top of a data center, private cloud, or public cloud. An overlay network simply creates a private, sealed network on top of the existing network. Overlays give complete control of the network back to enterprise cloud users the freedom to manage their network beyond the control of the cloud provider’s firewall conditions. The same logic applies if for users who wish to use IPsec or BGP network protocols inside or connected into an overlay network in cloud IaaS.Keywords: cloud computing, protocols, UDP multicast, virtualization
Procedia PDF Downloads 59016082 Finding Viable Pollution Routes in an Urban Network under a Predefined Cost
Authors: Dimitra Alexiou, Stefanos Katsavounis, Ria Kalfakakou
Abstract:
In an urban area the determination of transportation routes should be planned so as to minimize the provoked pollution taking into account the cost of such routes. In the sequel these routes are cited as pollution routes. The transportation network is expressed by a weighted graph G= (V, E, D, P) where every vertex represents a location to be served and E contains unordered pairs (edges) of elements in V that indicate a simple road. The distances/cost and a weight that depict the provoked air pollution by a vehicle transition at every road are assigned to each road as well. These are the items of set D and P respectively. Furthermore the investigated pollution routes must not exceed predefined corresponding values concerning the route cost and the route pollution level during the vehicle transition. In this paper we present an algorithm that generates such routes in order that the decision maker selects the most appropriate one.Keywords: bi-criteria, pollution, shortest paths, computation
Procedia PDF Downloads 37416081 Smart Structures for Cost Effective Cultural Heritage Preservation
Authors: Tamara Trček Pečak, Andrej Mohar, Denis Trček
Abstract:
This article investigates the latest technological means, which deploy smart structures that are based on (advanced) wireless sensors technologies and ubiquitous computing in general in order to support the above mentioned decision making. Based on two years of in-field research experiences it gives their analysis for these kinds of purposes and provides appropriate architectures and architectural solutions. Moreover, the directions for future research are stated, because these technologies are currently the most promising ones to enable cost-effective preservation of cultural heritage not only in uncontrolled places, but also in general.Keywords: smart structures, wireless sensors, sensors networks, green computing, cultural heritage preservation, monitoring, cost effectiveness
Procedia PDF Downloads 44616080 Narratives of the Body: Significance and Meanings of Tattoos of Selected Filipino LGBTs
Authors: Generoso Pamittan Jr., Freddielyn Pontemayor
Abstract:
Through the years, the purpose of tattoos in the Philippines, has changed from being tribal and traditional-ritualistic to personal and individualistic. Hence it is interesting to know the stories and meanings behind tattoos of particular individuals. Using the frames of Anabela Pereira’s concept of ‘body art’ as ‘visual language’, this paper scrutinizes the tattoos of selected Filipino LGBTs to (1) unfold the stories behind their body symbols, (2) describe the meanings and significance of their tattoos, and (3) determine the dominant themes that are common among the tattoos of the selected LGBTs. Semi-structured interviews were conducted with selected respondents to obtain in-depth information about the tattoos. Photos of tattoos were also taken, with respondents’ consent, to describe and analyze the details of tattoos’ patterns/ designs. Based on the interviews and analysis, most of the immediate relatives of the selected LGBTs were initially against the idea of having tattoos because of social stigma. However, the LGBT respondents considered their tattoos as symbols of their penchant for something (arts, cooking, etc.), expression of their personality and life’s aspirations, assertion of their identity amidst heteronormative tendencies and symbols that constantly remind them of the significant people and milestones in their lives.Keywords: body art, body tattoo, gender, identity, LGBT, tattoo
Procedia PDF Downloads 18916079 A Comparison Study: Infant and Children’s Clothing Size Charts in South Korea and UK
Authors: Hye-Won Lim, Tom Cassidy, Tracy Cassidy
Abstract:
Infant and children’s body shapes are changing constantly while they are growing up into adults and are also distinctive physically between countries. For this reason, optimum size charts which can represent body sizes and shapes of infants and children are required. In this study, investigations of current size charts in South Korea and UK (n=50 each) were conducted for understanding and figuring out the sizing perspectives of the clothing manufacturers. The size charts of the two countries were collected randomly from online shopping websites and those size charts’ average measurements were compared with both national sizing surveys (SizeKorea and Shape GB). The size charts were also classified by age, gender, clothing type, fitting, and other factors. In addition, the key measurement body parts of size charts of each country were determined and those will be suggested for new size charts and sizing system development.Keywords: infant clothing, children’s clothing, body shapes, size charts
Procedia PDF Downloads 31716078 Modelling Urban Rigidity and Elasticity Growth Boundaries: A Spatial Constraints-Suitability Based Perspective
Authors: Pengcheng Xiang Jr., Xueqing Sun, Dong Ngoduy
Abstract:
In the context of rapid urbanization, urban sprawl has brought about extensive negative impacts on ecosystems and the environment, resulting in a gradual shift from "incremental growth" to ‘stock growth’ in cities. A detailed urban growth boundary is a prerequisite for urban renewal and management. This study takes Shenyang City, China, as the study area and evaluates the spatial distribution of urban spatial suitability in the study area from the perspective of spatial constraints-suitability using multi-source data and simulates the future rigid and elastic growth boundaries of the city in the study area using the CA-Markov model. The results show that (1) the suitable construction area and moderate construction area in the study area account for 8.76% and 19.01% of the total area, respectively, and the suitable construction area and moderate construction area show a trend of distribution from the urban centre to the periphery, mainly in Shenhe District, the southern part of Heping District, the western part of Dongling District, and the central part of Dadong District; (2) the area of expansion of construction land in the study area in the period of 2023-2030 is 153274.6977hm2, accounting for 44.39% of the total area of the study area; (3) the rigid boundary of the study area occupies an area of 153274.6977 hm2, accounting for 44.39% of the total area of the study area, and the elastic boundary of the study area contains an area of 75362.61 hm2, accounting for 21.69% of the total area of the study area. The study constructed a method for urban growth boundary delineation, which helps to apply remote sensing to guide future urban spatial growth management and urban renewal.Keywords: urban growth boundary, spatial constraints, spatial suitability, urban sprawl
Procedia PDF Downloads 3216077 Urban Land Cover from GF-2 Satellite Images Using Object Based and Neural Network Classifications
Authors: Lamyaa Gamal El-Deen Taha, Ashraf Sharawi
Abstract:
China launched satellite GF-2 in 2014. This study deals with comparing nearest neighbor object-based classification and neural network classification methods for classification of the fused GF-2 image. Firstly, rectification of GF-2 image was performed. Secondly, a comparison between nearest neighbor object-based classification and neural network classification for classification of fused GF-2 was performed. Thirdly, the overall accuracy of classification and kappa index were calculated. Results indicate that nearest neighbor object-based classification is better than neural network classification for urban mapping.Keywords: GF-2 images, feature extraction-rectification, nearest neighbour object based classification, segmentation algorithms, neural network classification, multilayer perceptron
Procedia PDF Downloads 38916076 Data Augmentation for Automatic Graphical User Interface Generation Based on Generative Adversarial Network
Authors: Xulu Yao, Moi Hoon Yap, Yanlong Zhang
Abstract:
As a branch of artificial neural network, deep learning is widely used in the field of image recognition, but the lack of its dataset leads to imperfect model learning. By analysing the data scale requirements of deep learning and aiming at the application in GUI generation, it is found that the collection of GUI dataset is a time-consuming and labor-consuming project, which is difficult to meet the needs of current deep learning network. To solve this problem, this paper proposes a semi-supervised deep learning model that relies on the original small-scale datasets to produce a large number of reliable data sets. By combining the cyclic neural network with the generated countermeasure network, the cyclic neural network can learn the sequence relationship and characteristics of data, make the generated countermeasure network generate reasonable data, and then expand the Rico dataset. Relying on the network structure, the characteristics of collected data can be well analysed, and a large number of reasonable data can be generated according to these characteristics. After data processing, a reliable dataset for model training can be formed, which alleviates the problem of dataset shortage in deep learning.Keywords: GUI, deep learning, GAN, data augmentation
Procedia PDF Downloads 18416075 Estimation of Reservoirs Fracture Network Properties Using an Artificial Intelligence Technique
Authors: Reda Abdel Azim, Tariq Shehab
Abstract:
The main objective of this study is to develop a subsurface fracture map of naturally fractured reservoirs by overcoming the limitations associated with different data sources in characterising fracture properties. Some of these limitations are overcome by employing a nested neuro-stochastic technique to establish inter-relationship between different data, as conventional well logs, borehole images (FMI), core description, seismic attributes, and etc. and then characterise fracture properties in terms of fracture density and fractal dimension for each data source. Fracture density is an important property of a system of fracture network as it is a measure of the cumulative area of all the fractures in a unit volume of a fracture network system and Fractal dimension is also used to characterize self-similar objects such as fractures. At the wellbore locations, fracture density and fractal dimension can only be estimated for limited sections where FMI data are available. Therefore, artificial intelligence technique is applied to approximate the quantities at locations along the wellbore, where the hard data is not available. It should be noted that Artificial intelligence techniques have proven their effectiveness in this domain of applications.Keywords: naturally fractured reservoirs, artificial intelligence, fracture intensity, fractal dimension
Procedia PDF Downloads 25416074 Channel Sounding and PAPR Reduction in OFDM for WiMAX Using Software Defined Radio
Authors: B. Siva Kumar Reddy, B. Lakshmi
Abstract:
WiMAX is a high speed broadband wireless access technology that adopted OFDM/OFDMA techniques to supply higher data rates with high spectral efficiency. However, OFDM suffers in view of high Peak to Average Power Ratio (PAPR) and high affect to synchronization errors. In this paper, the high PAPR problem is solved by using phase modulation to get Constant Envelop Orthogonal Frequency Division Multiplexing (CE-OFDM). The synchronization failures are brought down by employing a frequency lock loop, Poly phase clock synchronizer, Costas loop and blind equalizers such as Constant Modulus Algorithm (CMA) equalizer and Sign Kurtosis Maximization Adaptive Algorithm (SKMAA) equalizers. The WiMAX physical layer is executed on Software Defined Radio (SDR) prototype by utilizing USRP N210 as hardware and GNU Radio as software plat-forms. A SNR estimation is performed on the signal received through USRP N210. To empathize wireless propagation in specific environments, a sliding correlator wireless channel sounding system is designed by using SDR testbed.Keywords: BER, CMA equalizer, Kurtosis equalizer, GNU Radio, OFDM/OFDMA, USRP N210
Procedia PDF Downloads 34916073 Land Suitability Approach as an Effort to Design a Sustainable Tourism Area in Pacet Mojokerto
Authors: Erina Wulansari, Bambang Soemardiono, Ispurwono Soemarno
Abstract:
Designing sustainable tourism area is defined as an attempt to design an area, that brings the natural environmental conditions as components are available with a wealth of social conditions and the conservation of natural and cultural heritage. To understanding tourism area in this study is not only focus on the location of the tourist object, but rather to a tourist attraction around the area, tourism objects such as the existence of residential area (settlement), a commercial area, public service area, and the natural environmental area. The principle of success in designing a sustainable tourism area is able to integrate and balance between the limited space and the variety of activities that’s always continuously to growth up. The limited space in this area of tourism needs to be managed properly to minimize the damage of environmental as a result of tourism activities hue. This research aims to identify space in this area of tourism through land suitability approach as an effort to create a sustainable design, especially in terms of ecological. This study will be used several analytical techniques to achieve the research objectives as superimposing analysis with GIS 9.3 software and Analysis Hierarchy Process. Expected outcomes are in the form of classification and criteria of usable space in designing embodiment tourism area. In addition, this study can provide input to the order of settlement patterns as part of the environment in the area of sustainable tourism.Keywords: sustainable tourism area, land suitability, limited space, environment, criteria
Procedia PDF Downloads 50316072 Using Fuzzy Logic Decision Support System to Predict the Lifted Weight for Students at Weightlifting Class
Authors: Ahmed Abdulghani Taha, Mohammad Abdulghani Taha
Abstract:
This study aims at being acquainted with the using the body fat percentage (%BF) with body Mass Index (BMI) as input parameters in fuzzy logic decision support system to predict properly the lifted weight for students at weightlifting class lift according to his abilities instead of traditional manner. The sample included 53 male students (age = 21.38 ± 0.71 yrs, height (Hgt) = 173.17 ± 5.28 cm, body weight (BW) = 70.34 ± 7.87.6 kg, Body mass index (BMI) 23.42 ± 2.06 kg.m-2, fat mass (FM) = 9.96 ± 3.15 kg and fat percentage (% BF) = 13.98 ± 3.51 %.) experienced the weightlifting class as a credit and has variance at BW, Hgt and BMI and FM. BMI and % BF were taken as input parameters in FUZZY logic whereas the output parameter was the lifted weight (LW). There were statistical differences between LW values before and after using fuzzy logic (Diff 3.55± 2.21, P > 0.001). The percentages of the LW categories proposed by fuzzy logic were 3.77% of students to lift 1.0 fold of their bodies; 50.94% of students to lift 0.95 fold of their bodies; 33.96% of students to lift 0.9 fold of their bodies; 3.77% of students to lift 0.85 fold of their bodies and 7.55% of students to lift 0.8 fold of their bodies. The study concluded that the characteristic changes in body composition experienced by students when undergoing weightlifting could be utilized side by side with the Fuzzy logic decision support system to determine the proper workloads consistent with the abilities of students.Keywords: fuzzy logic, body mass index, body fat percentage, weightlifting
Procedia PDF Downloads 429