Search results for: voice activity detection
9876 Voice and Head Controlled Intelligent Wheelchair
Authors: Dechrit Maneetham
Abstract:
The aim of this paper was to design a void and head controlled electric power wheelchair (EPW). A novel activate the control system for quadriplegics with voice, head and neck mobility. Head movement has been used as a control interface for people with motor impairments in a range of applications. Acquiring measurements from the module is simplified through a synchronous a motor. Axis measures the two directions namely x and y. At the same time, patients can control the motorized wheelchair using voice signals (forward, backward, turn left, turn right, and stop) given by it self. The model of a dc motor is considered as a speed control by selection of a PID parameters using genetic algorithm. An experimental set-up constructed, which consists of micro controller as controller, a DC motor driven EPW and feedback elements. This paper is tuning methods of parameter for a pulse width modulation (PWM) control system. A speed controller has been designed successfully for closed loop of the dc motor so that the motor runs very closed to the reference speed and angle. Intelligent wheelchair can be used to ensure the person’s voice and head are attending the direction of travel asserted by a conventional, direction and speed control.Keywords: wheelchair, quadriplegia, rehabilitation , medical devices, speed control
Procedia PDF Downloads 5409875 An Approach to Autonomous Drones Using Deep Reinforcement Learning and Object Detection
Authors: K. R. Roopesh Bharatwaj, Avinash Maharana, Favour Tobi Aborisade, Roger Young
Abstract:
Presently, there are few cases of complete automation of drones and its allied intelligence capabilities. In essence, the potential of the drone has not yet been fully utilized. This paper presents feasible methods to build an intelligent drone with smart capabilities such as self-driving, and obstacle avoidance. It does this through advanced Reinforcement Learning Techniques and performs object detection using latest advanced algorithms, which are capable of processing light weight models with fast training in real time instances. For the scope of this paper, after researching on the various algorithms and comparing them, we finally implemented the Deep-Q-Networks (DQN) algorithm in the AirSim Simulator. In future works, we plan to implement further advanced self-driving and object detection algorithms, we also plan to implement voice-based speech recognition for the entire drone operation which would provide an option of speech communication between users (People) and the drone in the time of unavoidable circumstances. Thus, making drones an interactive intelligent Robotic Voice Enabled Service Assistant. This proposed drone has a wide scope of usability and is applicable in scenarios such as Disaster management, Air Transport of essentials, Agriculture, Manufacturing, Monitoring people movements in public area, and Defense. Also discussed, is the entire drone communication based on the satellite broadband Internet technology for faster computation and seamless communication service for uninterrupted network during disasters and remote location operations. This paper will explain the feasible algorithms required to go about achieving this goal and is more of a reference paper for future researchers going down this path.Keywords: convolution neural network, natural language processing, obstacle avoidance, satellite broadband technology, self-driving
Procedia PDF Downloads 2519874 On the Network Packet Loss Tolerance of SVM Based Activity Recognition
Authors: Gamze Uslu, Sebnem Baydere, Alper K. Demir
Abstract:
In this study, data loss tolerance of Support Vector Machines (SVM) based activity recognition model and multi activity classification performance when data are received over a lossy wireless sensor network is examined. Initially, the classification algorithm we use is evaluated in terms of resilience to random data loss with 3D acceleration sensor data for sitting, lying, walking and standing actions. The results show that the proposed classification method can recognize these activities successfully despite high data loss. Secondly, the effect of differentiated quality of service performance on activity recognition success is measured with activity data acquired from a multi hop wireless sensor network, which introduces high data loss. The effect of number of nodes on the reliability and multi activity classification success is demonstrated in simulation environment. To the best of our knowledge, the effect of data loss in a wireless sensor network on activity detection success rate of an SVM based classification algorithm has not been studied before.Keywords: activity recognition, support vector machines, acceleration sensor, wireless sensor networks, packet loss
Procedia PDF Downloads 4759873 Non-Contact Human Movement Monitoring Technique for Security Control System Based 2n Electrostatic Induction
Authors: Koichi Kurita
Abstract:
In this study, an effective non-contact technique for the detection of human physical activity is proposed. The technique is based on detecting the electrostatic induction current generated by the walking motion under non-contact and non-attached conditions. A theoretical model for the electrostatic induction current generated because of a change in the electric potential of the human body is proposed. By comparing the obtained electrostatic induction current with the theoretical model, it becomes obvious that this model effectively explains the behavior of the waveform of the electrostatic induction current. The normal walking motions are recorded using a portable sensor measurement located in a passageway of office building. The obtained results show that detailed information regarding physical activity such as a walking cycle can be estimated using our proposed technique. This suggests that the proposed technique which is based on the detection of the walking signal, can be successfully applied to the detection of human walking motion in a secured building.Keywords: human walking motion, access control, electrostatic induction, alarm monitoring
Procedia PDF Downloads 3579872 Cigarette Smoke Detection Based on YOLOV3
Abstract:
In order to satisfy the real-time and accurate requirements of cigarette smoke detection in complex scenes, a cigarette smoke detection technology based on the combination of deep learning and color features was proposed. Firstly, based on the color features of cigarette smoke, the suspicious cigarette smoke area in the image is extracted. Secondly, combined with the efficiency of cigarette smoke detection and the problem of network overfitting, a network model for cigarette smoke detection was designed according to YOLOV3 algorithm to reduce the false detection rate. The experimental results show that the method is feasible and effective, and the accuracy of cigarette smoke detection is up to 99.13%, which satisfies the requirements of real-time cigarette smoke detection in complex scenes.Keywords: deep learning, computer vision, cigarette smoke detection, YOLOV3, color feature extraction
Procedia PDF Downloads 879871 A Smartphone-Based Real-Time Activity Recognition and Fall Detection System
Authors: Manutchanok Jongprasithporn, Rawiphorn Srivilai, Paweena Pongsopha
Abstract:
Fall is the most serious accident leading to increased unintentional injuries and mortality. Falls are not only the cause of suffering and functional impairments to the individuals, but also the cause of increasing medical cost and days away from work. The early detection of falls could be an advantage to reduce fall-related injuries and consequences of falls. Smartphones, embedded accelerometer, have become a common device in everyday life due to decreasing technology cost. This paper explores a physical activity monitoring and fall detection application in smartphones which is a non-invasive biomedical device to determine physical activities and fall event. The combination of application and sensors could perform as a biomedical sensor to monitor physical activities and recognize a fall. We have chosen Android-based smartphone in this study since android operating system is an open-source and no cost. Moreover, android phone users become a majority of Thai’s smartphone users. We developed Thai 3 Axis (TH3AX) as a physical activities and fall detection application which included command, manual, results in Thai language. The smartphone was attached to right hip of 10 young, healthy adult subjects (5 males, 5 females; aged< 35y) to collect accelerometer and gyroscope data during performing physical activities (e.g., walking, running, sitting, and lying down) and falling to determine threshold for each activity. Dependent variables are including accelerometer data (acceleration, peak acceleration, average resultant acceleration, and time between peak acceleration). A repeated measures ANOVA was performed to test whether there are any differences between DVs’ means. Statistical analyses were considered significant at p<0.05. After finding threshold, the results were used as training data for a predictive model of activity recognition. In the future, accuracies of activity recognition will be performed to assess the overall performance of the classifier. Moreover, to help improve the quality of life, our system will be implemented with patients and elderly people who need intensive care in hospitals and nursing homes in Thailand.Keywords: activity recognition, accelerometer, fall, gyroscope, smartphone
Procedia PDF Downloads 6929870 SIP Flooding Attacks Detection and Prevention Using Shannon, Renyi and Tsallis Entropy
Authors: Neda Seyyedi, Reza Berangi
Abstract:
Voice over IP (VOIP) network, also known as Internet telephony, is growing increasingly having occupied a large part of the communications market. With the growth of each technology, the related security issues become of particular importance. Taking advantage of this technology in different environments with numerous features put at our disposal, there arises an increasing need to address the security threats. Being IP-based and playing a signaling role in VOIP networks, Session Initiation Protocol (SIP) lets the invaders use weaknesses of the protocol to disable VOIP service. One of the most important threats is denial of service attack, a branch of which in this article we have discussed as flooding attacks. These attacks make server resources wasted and deprive it from delivering service to authorized users. Distributed denial of service attacks and attacks with a low rate can mislead many attack detection mechanisms. In this paper, we introduce a mechanism which not only detects distributed denial of service attacks and low rate attacks, but can also identify the attackers accurately. We detect and prevent flooding attacks in SIP protocol using Shannon (FDP-S), Renyi (FDP-R) and Tsallis (FDP-T) entropy. We conducted an experiment to compare the percentage of detection and rate of false alarm messages using any of the Shannon, Renyi and Tsallis entropy as a measure of disorder. Implementation results show that, according to the parametric nature of the Renyi and Tsallis entropy, by changing the parameters, different detection percentages and false alarm rates will be gained with the possibility to adjust the sensitivity of the detection mechanism.Keywords: VOIP networks, flooding attacks, entropy, computer networks
Procedia PDF Downloads 4059869 Redesigning Malaysia Batik Sarong by Applying Quality Function Deployment
Authors: M. Kamal, Y. Wang, R. Kennon
Abstract:
Quality Function Deployment is a useful tool in product development with the application of voice of customer. In this paper, it aims to be applied as a product development tool in redesigning fashion and textile product. The purpose of these studies is to apply the effective use of Voice of Customer in redesigning cultural fashion product. The data collection from Voice of Customer or consumers’ feedback might help the producer to improve the quality of merchandise ahead. Voice of Customer could give a specific detailing for quality which needs to be redesigned according to customers’ requirements. Meanwhile, the next objective is to differentiate design specifications and characteristics using House of Quality. In product designing phase, it is very important to distinguish each specification and characteristic which translated from Voice of Customer to House of Quality matrix. This matrix would help designers to development according to qualities that customer wants for the better and successful product in the market. It is hope this research would indicate the customers’ requirements and production team idea might be measured and translated to a systematic data. The specific technical data could be planned ahead with specific design details as well. This could be a sustainable approach for a traditional product which could control the material that they use and sustain the quality as the past production. As a conclusion, this study would benefit the Small Medium Enterprises design team or the designers to style an item from customers view with organised projection of the product. The finding also could assist designers or batik producers’ to recognise specific details Batik sarong from consumers as well as in in advertising and marketing strategy plan.Keywords: house of quality, Malaysia batik sarong, quality function deployment, voice of customer
Procedia PDF Downloads 5929868 Correlation Matrix for Automatic Identification of Meal-Taking Activity
Authors: Ghazi Bouaziz, Abderrahim Derouiche, Damien Brulin, Hélène Pigot, Eric Campo
Abstract:
Automatic ADL classification is a crucial part of ambient assisted living technologies. It allows to monitor the daily life of the elderly and to detect any changes in their behavior that could be related to health problem. But detection of ADLs is a challenge, especially because each person has his/her own rhythm for performing them. Therefore, we used a correlation matrix to extract custom rules that enable to detect ADLs, including eating activity. Data collected from 3 different individuals between 35 and 105 days allows the extraction of personalized eating patterns. The comparison of the results of the process of eating activity extracted from the correlation matrices with the declarative data collected during the survey shows an accuracy of 90%.Keywords: elderly monitoring, ADL identification, matrix correlation, meal-taking activity
Procedia PDF Downloads 939867 An Architecture for New Generation of Distributed Intrusion Detection System Based on Preventive Detection
Authors: H. Benmoussa, A. A. El Kalam, A. Ait Ouahman
Abstract:
The design and implementation of intrusion detection systems (IDS) remain an important area of research in the security of information systems. Despite the importance and reputation of the current intrusion detection systems, their efficiency and effectiveness remain limited as they should include active defense approach to allow anticipating and predicting intrusions before their occurrence. Consequently, they must be readapted. For this purpose we suggest a new generation of distributed intrusion detection system based on preventive detection approach and using intelligent and mobile agents. Our architecture benefits from mobile agent features and addresses some of the issues with centralized and hierarchical models. Also, it presents advantages in terms of increasing scalability and flexibility.Keywords: Intrusion Detection System (IDS), preventive detection, mobile agents, distributed architecture
Procedia PDF Downloads 5839866 Video Based Ambient Smoke Detection By Detecting Directional Contrast Decrease
Authors: Omair Ghori, Anton Stadler, Stefan Wilk, Wolfgang Effelsberg
Abstract:
Fire-related incidents account for extensive loss of life and material damage. Quick and reliable detection of occurring fires has high real world implications. Whereas a major research focus lies on the detection of outdoor fires, indoor camera-based fire detection is still an open issue. Cameras in combination with computer vision helps to detect flames and smoke more quickly than conventional fire detectors. In this work, we present a computer vision-based smoke detection algorithm based on contrast changes and a multi-step classification. This work accelerates computer vision-based fire detection considerably in comparison with classical indoor-fire detection.Keywords: contrast analysis, early fire detection, video smoke detection, video surveillance
Procedia PDF Downloads 4479865 Performance Assessment in a Voice Coil Motor for Maximizing the Energy Harvesting with Gait Motions
Authors: Hector A. Tinoco, Cesar Garcia-Diaz, Olga L. Ocampo-Lopez
Abstract:
In this study, an experimental approach is established to assess the performance of different beams coupled to a Voice Coil Motor (VCM) with the aim to maximize mechanically the energy harvesting in the inductive transducer that is included on it. The VCM is extracted from a recycled hard disk drive (HDD) and it is adapted for carrying out experimental tests of energy harvesting. Two individuals were selected for walking with the VCM-beam device as well as to evaluate the performance varying two parameters in the beam; length of the beams and a mass addition. Results show that the energy harvesting is maximized with specific beams; however, the harvesting efficiency is improved when a mass is added to the end of the beams.Keywords: hard disk drive, energy harvesting, voice coil motor, energy harvester, gait motions
Procedia PDF Downloads 3519864 Leader Personality Traits and Constructive Voice Behavior: Mediating Roles of Empowering Leadership and Leader-Member Exchange
Authors: Umamaheswara Rao Jada, Susmita Mukhopadhyay
Abstract:
Employee voice behavior has emerged as an important topic in relation to understanding the paybacks within the organizations. Organizations are expecting employees to contribute in the form of suggestions and ideas that not only help an organization to grow but also survive the turbulent times. Leadership in the organization enables and arouses an individual to offer constructive ideas. The significant impact of leadership is undeniable in a context of creating an environment that promotes a free flow of thoughts and ideas in the organization which in turn is significantly influenced by the personality of the leader. Therefore our study aims at examining the underlying factors which influence employee constructive voice behavior in connection with leader’s personality, empowering form of leadership and leader-member exchange in the organization sequentially. A standardized survey questionnaire was used to collect sample of 272 service executives in India. Smart PLS 2.0 was used to test hypothesis and explore the mediation effect. The result shows that the leader personality traits of agreeableness and conscientiousness were positively related to empowering leadership, whereas neuroticism was unrelated to empowering leadership. Empowering leadership influenced followers’ constructive voice behavior significantly. Furthermore, the relationship was partially mediated by leader member exchange relationship. Theoretical and practical implications of the findings, as well as directions for the future line of research, have been presented in the study.Keywords: constructive voice, empowering leadership, leader member exchange (LMX), leader personality traits
Procedia PDF Downloads 3009863 Effect of Lullabies on Babies Growth and Development, Vital Signs and Hospitalization Times in the Neonatal Intensive Care Units
Authors: Işın Alkan, Meltem Kürtüncü
Abstract:
Objective: This study was carried out with an experimental design in order to determine whether the lullaby, which was listened from mother’s voice and a stranger’s voice to the babies born at term and hospitalized in neonatal intensive care unit, had an effect on saturation values (SpO2), peak heart rate (PHR), respiration, fever, growth and development and hospitalization times of the infants. Method: Data from the study were obtained from 90 newborn babies who were hospitalized in Neonatal Intensive Care Unit of Zonguldak Maternity And Children Hospital between September 2015-January 2016 and who met the eligibility criteria. Lullaby concert was performed by choosing one of the suitable care hours. SpO2, PHR, respiration, fever, growth and development and hospitalization times of the infants were recorded by the researcher on “Newborn response follow-up form” at pre-care and post-care. Vital signs of babies every day, weight, height and head circumference measurements at admission, weakly rated at an output. Results: In the experimental and control groups, like weight, height and head circumference anthropometric measurements were not found statistically significant difference intensive care units admission and output times. Hospitalization times on babies who listen to lullaby mother’s voice revealed statistically significant difference according to babies who listen to lullaby stranger’s voice. Before care and after care were examined, SpO2 rates of babies who listen to lullaby mother’s voice revealed statistically significant higher difference according to babies who listen to lullaby stranger’s voice and control group babies. Before care on PHR of babies in three groups were not found the statistical difference, but aftercare, it was found that statistically lower (normal range) on babies who listen to lullaby mother’s voice according to babies who listen to lullaby stranger’s voice. Before care in three groups were not found the statistical difference on respiration values of babies, but aftercare, it was found that statistically lower (normal range) on babies who listen to lullaby stranger’s voice according to babies who listen to mother’s voice and control groups. Before care and after care were examined, fever signs did not reveal statistically significant difference in three groups. Conclusion: Lullaby concerts as being normal ranges of vital signs of infants and also helping to shorten hospitalization times should be preferred in the neonatal intensive care units.Keywords: growth and development, lullaby, mother voice, vital signs
Procedia PDF Downloads 2149862 Intrusion Detection Techniques in NaaS in the Cloud: A Review
Authors: Rashid Mahmood
Abstract:
The network as a service (NaaS) usage has been well-known from the last few years in the many applications, like mission critical applications. In the NaaS, prevention method is not adequate as the security concerned, so the detection method should be added to the security issues in NaaS. The authentication and encryption are considered the first solution of the NaaS problem whereas now these are not sufficient as NaaS use is increasing. In this paper, we are going to present the concept of intrusion detection and then survey some of major intrusion detection techniques in NaaS and aim to compare in some important fields.Keywords: IDS, cloud, naas, detection
Procedia PDF Downloads 3209861 Multichannel Object Detection with Event Camera
Authors: Rafael Iliasov, Alessandro Golkar
Abstract:
Object detection based on event vision has been a dynamically growing field in computer vision for the last 16 years. In this work, we create multiple channels from a single event camera and propose an event fusion method (EFM) to enhance object detection in event-based vision systems. Each channel uses a different accumulation buffer to collect events from the event camera. We implement YOLOv7 for object detection, followed by a fusion algorithm. Our multichannel approach outperforms single-channel-based object detection by 0.7% in mean Average Precision (mAP) for detection overlapping ground truth with IOU = 0.5.Keywords: event camera, object detection with multimodal inputs, multichannel fusion, computer vision
Procedia PDF Downloads 279860 Securing Web Servers by the Intrusion Detection System (IDS)
Authors: Yousef Farhaoui
Abstract:
An IDS is a tool which is used to improve the level of security. We present in this paper different architectures of IDS. We will also discuss measures that define the effectiveness of IDS and the very recent works of standardization and homogenization of IDS. At the end, we propose a new model of IDS called BiIDS (IDS Based on the two principles of detection) for securing web servers and applications by the Intrusion Detection System (IDS).Keywords: intrusion detection, architectures, characteristic, tools, security, web server
Procedia PDF Downloads 4189859 Modified Poly (Pyrrole) Film-Based Biosensors for Phenol Detection
Authors: S. Korkut, M. S. Kilic, E. Erhan
Abstract:
In order to detect and quantify the phenolic contents of a wastewater with biosensors, two working electrodes based on modified Poly (Pyrrole) films were fabricated. Enzyme horseradish peroxidase was used as biomolecule of the prepared electrodes. Various phenolics were tested at the biosensor. Phenol detection was realized by electrochemical reduction of quinones produced by enzymatic activity. Analytical parameters were calculated and the results were compared with each other.Keywords: carbon nanotube, phenol biosensor, polypyrrole, poly (glutaraldehyde)
Procedia PDF Downloads 4199858 Suggestion for Malware Detection Agent Considering Network Environment
Authors: Ji-Hoon Hong, Dong-Hee Kim, Nam-Uk Kim, Tai-Myoung Chung
Abstract:
Smartphone users are increasing rapidly. Accordingly, many companies are running BYOD (Bring Your Own Device: Policies to bring private-smartphones to the company) policy to increase work efficiency. However, smartphones are always under the threat of malware, thus the company network that is connected smartphone is exposed to serious risks. Most smartphone malware detection techniques are to perform an independent detection (perform the detection of a single target application). In this paper, we analyzed a variety of intrusion detection techniques. Based on the results of analysis propose an agent using the network IDS.Keywords: android malware detection, software-defined network, interaction environment, android malware detection, software-defined network, interaction environment
Procedia PDF Downloads 4339857 Improved Skin Detection Using Colour Space and Texture
Authors: Medjram Sofiane, Babahenini Mohamed Chaouki, Mohamed Benali Yamina
Abstract:
Skin detection is an important task for computer vision systems. A good method for skin detection means a good and successful result of the system. The colour is a good descriptor that allows us to detect skin colour in the images, but because of lightings effects and objects that have a similar colour skin, skin detection becomes difficult. In this paper, we proposed a method using the YCbCr colour space for skin detection and lighting effects elimination, then we use the information of texture to eliminate the false regions detected by the YCbCr colour skin model.Keywords: skin detection, YCbCr, GLCM, texture, human skin
Procedia PDF Downloads 4599856 The Effect of Voice Recognition Dictation Software on Writing Quality in Third Grade Students: An Action Research Study
Authors: Timothy J. Grebec
Abstract:
This study investigated whether using a voice dictation software program (i.e., Google Voice Typing) has an impact on student writing quality. The research took place in a third-grade general education classroom in a suburban school setting. Because the study involved minors, all data was encrypted and deidentified before analysis. The students completed a series of writings prior to the beginning of the intervention to determine their thoughts and skill level with writing. During the intervention phase, the students were introduced to the voice dictation software, given an opportunity to practice using it, and then assigned writing prompts to be completed using the software. The prompts written by nineteen student participants and surveys of student opinions on writing established a baseline for the study. The data showed that using the dictation software resulted in a 34% increase in the response quality (compared to the Pennsylvania State Standardized Assessment [PSSA] writing guidelines). Of particular interest was the increase in students' proficiency in demonstrating mastery of the English language and conventions and elaborating on the content. Although this type of research is relatively no, it has the potential to reshape the strategies educators have at their disposal when instructing students on written language.Keywords: educational technology, accommodations, students with disabilities, writing instruction, 21st century education
Procedia PDF Downloads 759855 Deep Learning Approaches for Accurate Detection of Epileptic Seizures from Electroencephalogram Data
Authors: Ramzi Rihane, Yassine Benayed
Abstract:
Epilepsy is a chronic neurological disorder characterized by recurrent, unprovoked seizures resulting from abnormal electrical activity in the brain. Timely and accurate detection of these seizures is essential for improving patient care. In this study, we leverage the UK Bonn University open-source EEG dataset and employ advanced deep-learning techniques to automate the detection of epileptic seizures. By extracting key features from both time and frequency domains, as well as Spectrogram features, we enhance the performance of various deep learning models. Our investigation includes architectures such as Long Short-Term Memory (LSTM), Bidirectional LSTM (Bi-LSTM), 1D Convolutional Neural Networks (1D-CNN), and hybrid CNN-LSTM and CNN-BiLSTM models. The models achieved impressive accuracies: LSTM (98.52%), Bi-LSTM (98.61%), CNN-LSTM (98.91%), CNN-BiLSTM (98.83%), and CNN (98.73%). Additionally, we utilized a data augmentation technique called SMOTE, which yielded the following results: CNN (97.36%), LSTM (97.01%), Bi-LSTM (97.23%), CNN-LSTM (97.45%), and CNN-BiLSTM (97.34%). These findings demonstrate the effectiveness of deep learning in capturing complex patterns in EEG signals, providing a reliable and scalable solution for real-time seizure detection in clinical environments.Keywords: electroencephalogram, epileptic seizure, deep learning, LSTM, CNN, BI-LSTM, seizure detection
Procedia PDF Downloads 129854 Visualizing Matrix Metalloproteinase-2 Activity Using Extracellular Matrix-Immobilized Fluorescence Resonance Energy Transfer Bioprobe in Cancer Cells
Authors: Hawon Lee, Young-Pil Kim
Abstract:
Visualizing matrix metalloproteinases (MMPs) activity is necessary for understanding cancer metastasis because they are implicated in cell migration and invasion by degrading the extracellular matrix (ECM). While much effort has been made to sense the MMP activity, but extracellularly long-term monitoring of MMP activity still remains challenging. Here, we report a collagen-bound fluorescent bioprobe for the detection of MMP-2 activity in the extracellular environment. This bioprobe consists of ECM-immobilized part (including collagen-bound protein) and MMP-sensing part (including peptide substrate linked with fluorescence resonance energy transfer (FRET) coupler between donor green fluorescent protein (GFP) and acceptor TAMRA dye), which was constructed through intein-mediated self-splicing conjugation. Upon being immobilized on the collagen-coated surface, this bioprobe enabled efficient long-lasting observation of MMP-2 activity in the cultured cells without affecting cell growth and viability. As a result, the FRET ratio (acceptor/donor) decreased as the MMP2 activity increased in cultured cancer cells. Furthermore, unlike wild-type MMP-2, mutated MMP-2 expression (Y580A in the hemopexin region) gave rise to lowering the secretion of MMP-2 in HeLa. Conclusively, our method is anticipated to find applications for tracing and visualizing enzyme activity.Keywords: collagen, ECM, FRET, MMP
Procedia PDF Downloads 2029853 Real-Time Detection of Space Manipulator Self-Collision
Authors: Zhang Xiaodong, Tang Zixin, Liu Xin
Abstract:
In order to avoid self-collision of space manipulators during operation process, a real-time detection method is proposed in this paper. The manipulator is fitted into a cylinder enveloping surface, and then the detection algorithm of collision between cylinders is analyzed. The collision model of space manipulator self-links can be detected by using this algorithm in real-time detection during the operation process. To ensure security of the operation, a safety threshold is designed. The simulation and experiment results verify the effectiveness of the proposed algorithm for a 7-DOF space manipulator.Keywords: space manipulator, collision detection, self-collision, the real-time collision detection
Procedia PDF Downloads 4699852 Bit Error Rate (BER) Performance of Coherent Homodyne BPSK-OCDMA Network for Multimedia Applications
Authors: Morsy Ahmed Morsy Ismail
Abstract:
In this paper, the structure of a coherent homodyne receiver for the Binary Phase Shift Keying (BPSK) Optical Code Division Multiple Access (OCDMA) network is introduced based on the Multi-Length Weighted Modified Prime Code (ML-WMPC) for multimedia applications. The Bit Error Rate (BER) of this homodyne detection is evaluated as a function of the number of active users and the signal to noise ratio for different code lengths according to the multimedia application such as audio, voice, and video. Besides, the Mach-Zehnder interferometer is used as an external phase modulator in homodyne detection. Furthermore, the Multiple Access Interference (MAI) and the receiver noise in a shot-noise limited regime are taken into consideration in the BER calculations.Keywords: OCDMA networks, bit error rate, multiple access interference, binary phase-shift keying, multimedia
Procedia PDF Downloads 1759851 Antioxidant Activity of the Algerian Traditional Kefir Supernatant
Authors: H. Amellal-Chibane, N. Dehdouh, S. Ait-Kaki, F. Halladj
Abstract:
Kefir is fermented milk that is produced by adding Kefir grains, consisting of bacteria and yeasts, to milk. The aim of this study was to investigate the antioxidant activity of the kefir supernatant and the raw milk. The Antioxidant activity assays of kefir supernatant and raw milk were evaluated by assessing the DPPH radical-scavenging activity. Kefir supernatant demonstrated high antioxidant activity (87.75%) compared to the raw milk (70.59 %). These results suggest that the Algerian kefir has interesting antioxidant activity.Keywords: antioxidant activity, kefir, kefir supernatant, raw milk
Procedia PDF Downloads 5069850 Iris Detection on RGB Image for Controlling Side Mirror
Authors: Norzalina Othman, Nurul Na’imy Wan, Azliza Mohd Rusli, Wan Noor Syahirah Meor Idris
Abstract:
Iris detection is a process where the position of the eyes is extracted from the face images. It is a current method used for many applications such as for security purpose and drowsiness detection. This paper proposes the use of eyes detection in controlling side mirror of motor vehicles. The eyes detection method aims to make driver easy to adjust the side mirrors automatically. The system will determine the midpoint coordinate of eyes detection on RGB (color) image and the input signal from y-coordinate will send it to controller in order to rotate the angle of side mirror on vehicle. The eye position was cropped and the coordinate of midpoint was successfully detected from the circle of iris detection using Viola Jones detection and circular Hough transform methods on RGB image. The coordinate of midpoint from the experiment are tested using controller to determine the angle of rotation on the side mirrors.Keywords: iris detection, midpoint coordinates, RGB images, side mirror
Procedia PDF Downloads 4239849 Automatic Vehicle Detection Using Circular Synthetic Aperture Radar Image
Authors: Leping Chen, Daoxiang An, Xiaotao Huang
Abstract:
Automatic vehicle detection using synthetic aperture radar (SAR) image has been widely researched, as well as using optical remote sensing images. However, most researches treat the detection as an independent problem, failing to make full use of SAR data information. In circular SAR (CSAR), the two long borders of vehicle will shrink if the imaging surface is set higher than the reference one. Based on above variance, an automatic vehicle detection using CSAR image is proposed to enhance detection ability under complex environment, such as vehicles’ closely packing, which confuses the detector. The detection method uses the multiple images generated by different height plane to obtain an energy-concentrated image for detecting and then uses the maximally stable extremal regions method (MSER) to detect vehicles. A result of vehicles’ detection is given to verify the effectiveness and correctness of proposed method.Keywords: circular SAR, vehicle detection, automatic, imaging
Procedia PDF Downloads 3679848 Adaptive CFAR Analysis for Non-Gaussian Distribution
Authors: Bouchemha Amel, Chachoui Takieddine, H. Maalem
Abstract:
Automatic detection of targets in a modern communication system RADAR is based primarily on the concept of adaptive CFAR detector. To have an effective detection, we must minimize the influence of disturbances due to the clutter. The detection algorithm adapts the CFAR detection threshold which is proportional to the average power of the clutter, maintaining a constant probability of false alarm. In this article, we analyze the performance of two variants of adaptive algorithms CA-CFAR and OS-CFAR and we compare the thresholds of these detectors in the marine environment (no-Gaussian) with a Weibull distribution.Keywords: CFAR, threshold, clutter, distribution, Weibull, detection
Procedia PDF Downloads 5889847 Intrusion Detection Techniques in Mobile Adhoc Networks: A Review
Authors: Rashid Mahmood, Muhammad Junaid Sarwar
Abstract:
Mobile ad hoc networks (MANETs) use has been well-known from the last few years in the many applications, like mission critical applications. In the (MANETS) prevention method is not adequate as the security concerned, so the detection method should be added to the security issues in (MANETs). The authentication and encryption is considered the first solution of the MANETs problem where as now these are not sufficient as MANET use is increasing. In this paper we are going to present the concept of intrusion detection and then survey some of major intrusion detection techniques in MANET and aim to comparing in some important fields.Keywords: MANET, IDS, intrusions, signature, detection, prevention
Procedia PDF Downloads 379