Search results for: automated facial recognition
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 2674

Search results for: automated facial recognition

1684 Audio-Visual Co-Data Processing Pipeline

Authors: Rita Chattopadhyay, Vivek Anand Thoutam

Abstract:

Speech is the most acceptable means of communication where we can quickly exchange our feelings and thoughts. Quite often, people can communicate orally but cannot interact or work with computers or devices. It’s easy and quick to give speech commands than typing commands to computers. In the same way, it’s easy listening to audio played from a device than extract output from computers or devices. Especially with Robotics being an emerging market with applications in warehouses, the hospitality industry, consumer electronics, assistive technology, etc., speech-based human-machine interaction is emerging as a lucrative feature for robot manufacturers. Considering this factor, the objective of this paper is to design the “Audio-Visual Co-Data Processing Pipeline.” This pipeline is an integrated version of Automatic speech recognition, a Natural language model for text understanding, object detection, and text-to-speech modules. There are many Deep Learning models for each type of the modules mentioned above, but OpenVINO Model Zoo models are used because the OpenVINO toolkit covers both computer vision and non-computer vision workloads across Intel hardware and maximizes performance, and accelerates application development. A speech command is given as input that has information about target objects to be detected and start and end times to extract the required interval from the video. Speech is converted to text using the Automatic speech recognition QuartzNet model. The summary is extracted from text using a natural language model Generative Pre-Trained Transformer-3 (GPT-3). Based on the summary, essential frames from the video are extracted, and the You Only Look Once (YOLO) object detection model detects You Only Look Once (YOLO) objects on these extracted frames. Frame numbers that have target objects (specified objects in the speech command) are saved as text. Finally, this text (frame numbers) is converted to speech using text to speech model and will be played from the device. This project is developed for 80 You Only Look Once (YOLO) labels, and the user can extract frames based on only one or two target labels. This pipeline can be extended for more than two target labels easily by making appropriate changes in the object detection module. This project is developed for four different speech command formats by including sample examples in the prompt used by Generative Pre-Trained Transformer-3 (GPT-3) model. Based on user preference, one can come up with a new speech command format by including some examples of the respective format in the prompt used by the Generative Pre-Trained Transformer-3 (GPT-3) model. This pipeline can be used in many projects like human-machine interface, human-robot interaction, and surveillance through speech commands. All object detection projects can be upgraded using this pipeline so that one can give speech commands and output is played from the device.

Keywords: OpenVINO, automatic speech recognition, natural language processing, object detection, text to speech

Procedia PDF Downloads 80
1683 Automated Detection of Related Software Changes by Probabilistic Neural Networks Model

Authors: Yuan Huang, Xiangping Chen, Xiaonan Luo

Abstract:

Current software are continuously updating. The change between two versions usually involves multiple program entities (e.g., packages, classes, methods, attributes) with multiple purposes (e.g., changed requirements, bug fixing). It is hard for developers to understand which changes are made for the same purpose. Whether two changes are related is not decided by the relationship between this two entities in the program. In this paper, we summarized 4 coupling rules(16 instances) and 4 state-combination types at the class, method and attribute levels for software change. Related Change Vector (RCV) are defined based on coupling rules and state-combination types, and applied to classify related software changes by using Probabilistic Neural Network during a software updating.

Keywords: PNN, related change, state-combination, logical coupling, software entity

Procedia PDF Downloads 436
1682 EhfadHaya (SaveLife) / AateHayah (GiveLife) Blood Donor Website

Authors: Sameer Muhammad Aslam, Nura Said Mohsin Al-Saifi

Abstract:

This research shows the process of creating a blood donation website for Oman. Blood donation is a widespread, crucial, ongoing process, so it is important that this website is easy to use. Several automated blood management systems are available, but none provides an effective algorithm that takes into account variables such as frequency of donation, donation date, and gender. In Oman, the Ministry of Health maintains a blood bank and keeps donors informed about the need for blood through a website. They also inform donors and the wider public where and when is their next blood donation event. The website's main goals are to educate the community about the benefits of blood donation. It also manages donor and receiver documentation and encourages voluntary blood donation by providing easy access to information about blood types and blood distribution in various hospitals in Oman, based on hospital needs.

Keywords: Oman, blood bank, blood donors, donor website

Procedia PDF Downloads 217
1681 The Operating Behaviour of Unbalanced Unpaced Merging Assembly Lines

Authors: S. Shaaban, T. McNamara, S. Hudson

Abstract:

This paper reports on the performance of deliberately unbalanced, reliable, non-automated and assembly lines that merge, whose workstations differ in terms of their mean operation times. Simulations are carried out on 5- and 8-station lines with 1, 2 and 4 buffer capacity units, % degrees of line imbalance of 2, 5 and 12, and 24 different patterns of means imbalance. Data on two performance measures, namely throughput and average buffer level were gathered, statistically analysed and compared to a merging balanced line counterpart. It was found that the best configurations are a balanced line arrangement and a monotone decreasing order for each of the parallel merging lines, with the first generally resulting in a lower throughput and the second leading to a lower average buffer level than those of a balanced line.

Keywords: average buffer level, merging lines, simulation, throughput, unbalanced

Procedia PDF Downloads 321
1680 Computer Aided Assembly Attributes Retrieval Methods for Automated Assembly Sequence Generation

Authors: M. V. A. Raju Bahubalendruni, Bibhuti Bhusan Biswal, B. B. V. L. Deepak

Abstract:

Achieving an appropriate assembly sequence needs deep verification for its physical feasibility. For this purpose, industrial engineers use several assembly predicates; namely, liaison, geometric feasibility, stability and mechanical feasibility. However, testing an assembly sequence for these predicates requires huge assembly information. Extracting such assembly information from an assembled product is a time consuming and highly skillful task with complex reasoning methods. In this paper, computer aided methods are proposed to extract all the necessary assembly information from computer aided design (CAD) environment in order to perform the assembly sequence planning efficiently. These methods use preliminary capabilities of three-dimensional solid modelling and assembly modelling methods used in CAD software considering equilibrium laws of physical bodies.

Keywords: assembly automation, assembly attributes, assembly, CAD

Procedia PDF Downloads 305
1679 From User's Requirements to UML Class Diagram

Authors: Zeineb Ben Azzouz, Wahiba Ben Abdessalem Karaa

Abstract:

The automated extraction of UML class diagram from natural language requirements is a highly challenging task. Many approaches, frameworks and tools have been presented in this field. Nonetheless, the experiments of these tools have shown that there is no approach that can work best all the time. In this context, we propose a new accurate approach to facilitate the automatic mapping from textual requirements to UML class diagram. Our new approach integrates the best properties of statistical Natural Language Processing (NLP) techniques to reduce ambiguity when analysing natural language requirements text. In addition, our approach follows the best practices defined by conceptual modelling experts to determine some patterns indispensable for the extraction of basic elements and concepts of the class diagram. Once the relevant information of class diagram is captured, a XMI document is generated and imported with a CASE tool to build the corresponding UML class diagram.

Keywords: class diagram, user’s requirements, XMI, software engineering

Procedia PDF Downloads 471
1678 Evotrader: Bitcoin Trading Using Evolutionary Algorithms on Technical Analysis and Social Sentiment Data

Authors: Martin Pellon Consunji

Abstract:

Due to the rise in popularity of Bitcoin and other crypto assets as a store of wealth and speculative investment, there is an ever-growing demand for automated trading tools, such as bots, in order to gain an advantage over the market. Traditionally, trading in the stock market was done by professionals with years of training who understood patterns and exploited market opportunities in order to gain a profit. However, nowadays a larger portion of market participants are at minimum aided by market-data processing bots, which can generally generate more stable signals than the average human trader. The rise in trading bot usage can be accredited to the inherent advantages that bots have over humans in terms of processing large amounts of data, lack of emotions of fear or greed, and predicting market prices using past data and artificial intelligence, hence a growing number of approaches have been brought forward to tackle this task. However, the general limitation of these approaches can still be broken down to the fact that limited historical data doesn’t always determine the future, and that a lot of market participants are still human emotion-driven traders. Moreover, developing markets such as those of the cryptocurrency space have even less historical data to interpret than most other well-established markets. Due to this, some human traders have gone back to the tried-and-tested traditional technical analysis tools for exploiting market patterns and simplifying the broader spectrum of data that is involved in making market predictions. This paper proposes a method which uses neuro evolution techniques on both sentimental data and, the more traditionally human-consumed, technical analysis data in order to gain a more accurate forecast of future market behavior and account for the way both automated bots and human traders affect the market prices of Bitcoin and other cryptocurrencies. This study’s approach uses evolutionary algorithms to automatically develop increasingly improved populations of bots which, by using the latest inflows of market analysis and sentimental data, evolve to efficiently predict future market price movements. The effectiveness of the approach is validated by testing the system in a simulated historical trading scenario, a real Bitcoin market live trading scenario, and testing its robustness in other cryptocurrency and stock market scenarios. Experimental results during a 30-day period show that this method outperformed the buy and hold strategy by over 260% in terms of net profits, even when taking into consideration standard trading fees.

Keywords: neuro-evolution, Bitcoin, trading bots, artificial neural networks, technical analysis, evolutionary algorithms

Procedia PDF Downloads 123
1677 Analysis of the Best Interest of the Child Principle within a Marriage Law Framework: A Study of South Africa

Authors: Lizelle Ramaccio Calvino

Abstract:

Article 3 of the United Nations Convention on the Rights of Child states that 'The best interests of the child must be a top priority in all decisions and actions that affect children.' This stance is also echoed in terms of article 20 of the African Charter on the Rights and Welfare of the Child. South Africa, as a signatory of the aforesaid international and national conventions, constitutionalised the best interest of the child in terms of section 28(2) of the Republic of South Africa, 1996. Section 28(2) provides that '[A] child’s best interests are of paramount importance in every matter concerning the child.' The application of 'the best interests of the child' principle is consequently applicable in all fields of South African law, including matrimonial law. Two separate but equal Acts regulate civil marriages in South Africa, namely the Marriage Act 25 of 1961 and the Civil Union Act 17 of 2006. Customary marriages are regulated by the Recognition of Customary Marriages Act 120 of 1998. In terms of the Marriage Act and the Recognition of Customary Marriages Act, a minor may (provided he/she obtains the required consent) enter into a marriage. Despite the aforesaid, section 1 of the Civil Union Act categorically prohibits a minor from entering into a civil union. The article will first determine whether the ban of minors from entering into a civil union undermines the 'the best interests of the child' principle, and if so, whether it is in violation of the Constitution as well as international and national conventions. In addition, the article will critically analyse whether the application of the Marriage Act and the Civil Union Act (dual Acts) result in disparity within the South African marriage law framework, and if so, whether such discrepancy violates same-sex couples’ right (in particular a same-sex minor) to equality before the law and to have their dignity protected. The article intends, through the application of a qualitative research methodology and by way of a comparative analyses of international and domestic laws, consider whether a single well-defined structure such as the Dutch marriage law system would not be an improved alternative to address the existing paradox resulting from the application of an Act that undermines 'the best interest of the child' principle. Ultimately the article proposes recommendations for matrimonial law reform.

Keywords: best interests of the child, civil marriage, civil union, minor

Procedia PDF Downloads 174
1676 Identification of Active Phytocomponents in the Ethyl Acetate Extract of Glycosmis pentaphylla Retz. DC by Using GC-MS

Authors: M. Sivakumar, D. Chamundeeswari

Abstract:

Glycosmis pentaphylla is one of the medicinally important plants belonging to the family Rutaceae, commonly known as “Anam or Panal” in Tamil. Traditionally, leaves are useful in fever, hepatopathy, eczema, skin disease, helminthiasis, wounds, and erysipelas. The fruits are sweet and are useful in vitiated conditions of vata, kapha, cough, and bronchitis. The roots are good for facial inflammations, rheumatism, jaundice, and anemia. The preliminary phytochemical investigations indicated the presence of alkaloids, terpenoids, flavonoids, tannins, sugar, glycoside, and phenolic compounds. In the present study, the root part of Glycosmis pentaphylla was used, and the root was collected from Western Ghats of South India. The root was sun/shade dried and pulverized to powder in a mechanical grinder. The powder was successively extracted with various solvents, and the ethyl acetate extract of Glycosmis pentaphylla has been subjected to the GC-MS analysis. Amongst the 46 chemical constituents identified from this plant, three major phytoconstituents were reported for the first time. Marmesin, a furanocumarin compound with the chemical structure 7H-Furo (3,2-G) (1)Benzopyran-7-one,2,3–dihydro–2 - (1-Hydroxy-1methylethyl)-(s) is one of the three compounds identified for the first time at the concentration of 11-60% in ethyl acetate extract of Glycosmis pentaphylla. Others include, Beta.-Fagarine (4.71%) and Paverine (13.08%).

Keywords: ethyl acetate extract, Glycosmis pentaphylla, GC-MS analysis, Phytochemicals

Procedia PDF Downloads 300
1675 Assessment of Image Databases Used for Human Skin Detection Methods

Authors: Saleh Alshehri

Abstract:

Human skin detection is a vital step in many applications. Some of the applications are critical especially those related to security. This leverages the importance of a high-performance detection algorithm. To validate the accuracy of the algorithm, image databases are usually used. However, the suitability of these image databases is still questionable. It is suggested that the suitability can be measured mainly by the span the database covers of the color space. This research investigates the validity of three famous image databases.

Keywords: image databases, image processing, pattern recognition, neural networks

Procedia PDF Downloads 271
1674 Updating Stochastic Hosting Capacity Algorithm for Voltage Optimization Programs and Interconnect Standards

Authors: Nicholas Burica, Nina Selak

Abstract:

The ADHCAT (Automated Distribution Hosting Capacity Assessment Tool) was designed to run Hosting Capacity Analysis on the ComEd system via a stochastic DER (Distributed Energy Resource) placement on multiple power flow simulations against a set of violation criteria. The violation criteria in the initial version of the tool captured a limited amount of issues that individual departments design against for DER interconnections. Enhancements were made to the tool to further align with individual department violation and operation criteria, as well as the addition of new modules for use for future load profile analysis. A reporting engine was created for future analytical use based on the simulations and observations in the tool.

Keywords: distributed energy resources, hosting capacity, interconnect, voltage optimization

Procedia PDF Downloads 190
1673 The Implementation of Human Resource Information System in the Public Sector: An Exploratory Study of Perceived Benefits and Challenges

Authors: Aneeqa Suhail, Shabana Naveed

Abstract:

The public sector (in both developed and developing countries) has gone through various waves of radical reforms in recent decades. In Pakistan, under the influence of New Public Management(NPM) Reforms; best practices of private sector are introduced in the public sector to modernize public organizations. Human Resource Information System (HRIS) has been popular in the private sector and proven to be a successful system, therefore it is being adopted in the public sector too. However, implementation of private business practices in public organizations us very challenging due to differences in context. This implementation gets further critical in Pakistan due to a centralizing tendency and lack of autonomy in public organizations. Adoption of HRIS by public organizations in Pakistan raises several questions: What challenges are faced by public organizations in implementation of HRIS? Are benefits of HRIS such as efficiency, process integration and cost reduction achieved? How is the previous system improved with this change and what are the impacts? Yet, it is an under-researched topic, especially in public enterprises. This study contributes to the existing body of knowledge by empirically exploring benefits and challenges of implementation of HRIS in public organizations. The research adopts a case study approach and uses qualitative data based on in-depth interviews conducted at various levels in the hierarchy including top management, departmental heads and employees. The unit of analysis is LESCO, the Lahore Electric Supply Company, a state-owned entity that generates, transmits and distributes electricity to 4 big cities in Punjab, Pakistan. The findings of the study show that LESCO has not achieved the benefits of HRIS as established in literature. The implementation process remained quite slow and costly. Various functions of HR are still in isolation and integration is a big challenge for the organization. Although the data is automated, the previous system of manually record maintenance and paperwork is still in work, resulting in the presence of parallel practices. The findings also identified resistance to change from top management and labor workforce, lack of commitment and technical knowledge, and costly vendors as major barriers that affect the effective implementation of HRIS. The paper suggests some potential actions to overcome these barriers and to enhance effective implementation of HR-technology. The findings are explained in light of an institutional logics perspective. HRIS’ new logic of automated and integrated HR system is in sharp contrast with the prevailing logic of process-oriented manual data maintenance, leading to resistance to change and deadlock.

Keywords: human resource information system, technological changes, state-owned enterprise, implementation challenges

Procedia PDF Downloads 144
1672 Trajectory Planning Algorithms for Autonomous Agricultural Vehicles

Authors: Caner Koc, Dilara Gerdan Koc, Mustafa Vatandas

Abstract:

The fundamental components of autonomous agricultural robot design, such as having a working understanding of coordinates, correctly constructing the desired route, and sensing environmental elements, are the most important. A variety of sensors, hardware, and software are employed by agricultural robots to find these systems.These enable the fully automated driving system of an autonomous vehicle to simulate how a human-driven vehicle would respond to changing environmental conditions. To calculate the vehicle's motion trajectory using data from the sensors, this automation system typically consists of a sophisticated software architecture based on object detection and driving decisions. In this study, the software architecture of an autonomous agricultural vehicle is compared to the trajectory planning techniques.

Keywords: agriculture 5.0, computational intelligence, motion planning, trajectory planning

Procedia PDF Downloads 77
1671 A Study on Reliability of Gender and Stature Determination by Odontometric and Craniofacial Anthropometric Parameters

Authors: Churamani Pokhrel, C. B. Jha, S. R. Niraula, P. R. Pokharel

Abstract:

Human identification is one of the most challenging subjects that man has confronted. The determination of adult sex and stature are two of the four key factors (sex, stature, age, and race) in identification of an individual. Craniofacial and odontometric parameters are important tools for forensic anthropologists when it is not possible to apply advanced techniques for identification purposes. The present study provides anthropometric correlation of the parameters with stature and gender and also devises regression formulae for reconstruction of stature. A total of 312 Nepalese students with equal distribution of sex i.e., 156 male and 156 female students of age 18-35 years were taken for the study. Total of 10 parameters were measured (age, sex, stature, head circumference, head length, head breadth, facial height, bi-zygomatic width, mesio-distal canine width and inter-canine distance of both maxilla and mandible). Co-relation and regression analysis was done to find the association between the parameters. All parameters were found to be greater in males than females and each was found to be statistically significant. Out of total 312 samples, the best regressor for the determination of stature was head circumference and mandibular inter-canine width and that for gender was head circumference and right mandibular teeth. The accuracy of prediction was 83%. Regression equations and analysis generated from craniofacial and odontometric parameters can be a supplementary approach for the estimation of stature and gender when extremities are not available.

Keywords: craniofacial, gender, odontometric, stature

Procedia PDF Downloads 191
1670 Meeting the Challanges of Regulating Artificial Intelligence

Authors: Abdulrahman S. Shryan Aldossary

Abstract:

Globally, artificial intelligence (AI) is already performing legitimate tasks on behalf of humans. In Saudi Arabia, large-scale national projects, primarily based on AI technologies and receiving billions of dollars of funding, are projected for completion by 2030. However, the legal aspect of these projects is seriously vulnerable, given AI’s unprecedented ability to self-learn and act independently. This paper, therefore, identifies the critical legal aspects of AI that authorities and policymakers should be aware of, specifically whether AI can possess identity and be liable for the risk of public harm. The article begins by identifying the problematic characteristics of AI and what should be considered by legal experts when dealing with it. Also discussed are the possible competent institutions that could regulate AI in Saudi Arabia. Finally, a procedural proposal is presented for controlling AI, focused on Saudi Arabia but potentially of interest to other jurisdictions facing similar concerns about AI safety.

Keywords: regulation, artificial intelligence, tech law, automated systems

Procedia PDF Downloads 175
1669 Strap Tension Adjusting Device for Non-Invasive Positive Pressure Ventilation Mask Fitting

Authors: Yoshie Asahara, Hidekuni Takao

Abstract:

Non-invasive positive pressure ventilation (NPPV), a type of ventilation therapy, is a treatment in which a mask is attached to the patient's face and delivers gas into the mask to support breathing. The NPPV mask uses a strap, which is necessary to attach and secure the mask in the appropriate facial position, but the tensile strength of the strap is adjusted by the sensation of the hands. The strap uniformity and fine-tuning strap tension are judged by the skill of the operator and the amount felt by the finger. In the future, additional strap operation and adjustment methods will be required to meet the needs for reducing the burden on the patient’s face. In this study, we fabricated a mechanism that can measure, adjust and fix the tension of the straps. A small amount of strap tension can be adjusted by rotating the shaft. This makes it possible to control the slight strap tension that is difficult to grasp with the sense of the operator's hand. In addition, this mechanism allows the operator to control the strap while controlling the movement of the mask body. This leads to the establishment of a suitable mask fitting method for each patient. The developed mechanism enables the operation and fine reproducible adjustment of the strap tension and the mask balance, reducing the burden on the face.

Keywords: balance of the mask strap, fine adjustment, film sensor, mask fitting technique, mask strap tension

Procedia PDF Downloads 238
1668 An Automated Sensor System for Cochlear Implants Electrode Array Insertion

Authors: Lei Hou, Xinli Du, Nikolaos Boulgouris

Abstract:

A cochlear implant, referred to as a CI, is a small electronic device that can provide direct electrical stimulation to the auditory nerve. During cochlear implant surgery, atraumatic electrode array insertion is considered to be a crucial step. However, during implantation, the mechanical behaviour of an electrode array inside the cochlea is not known. The behaviour of an electrode array inside of the cochlea is hardly identified by regular methods. In this study, a CI electrode array capacitive sensor system is proposed. It is able to automatically determine the array state as a result of the capacitance variations. Instead of applying sensors to the electrode array, the capacitance information from the electrodes will be gathered and analysed. Results reveal that this sensing method is capable of recognising different states when fed into a pre-shaped model.

Keywords: cochlear implant, electrode, hearing preservation, insertion force, capacitive sensing

Procedia PDF Downloads 238
1667 Performing Marginality and Contestation of Ethnic Identity: Dynamics of Identity Politics in Assam, India

Authors: Hare Krishna Doley

Abstract:

Drawing upon empirical data, this paper tries to examine how ethnic groups like Ahom, Moran, Motok, and Chutia creates and recreates ethnic boundaries while making claims for recognition as Scheduled Tribes (STs) under the Sixth Schedule of the Constitution of India, in the state of Assam. Underlying such claim is the distinct identity consciousness amongst these groups as they assert themselves originally as tribe drawing upon primordial elements. For them, tribal identity promises social justice and give credence to their claims of indigeneity while preserving their exclusivity within the multifarious society of Assam. Having complex inter-group relationships, these groups under study displays distinct as well as overlapping identities, which demonstrate fluidity of identities across groups while making claims for recognition. In this process, the binary of ‘us’ and ‘them’ are often constructed amongst these groups, which are in turn difficult to grasp as they share common historical linkages. This paper attempts to grapple with such complex relationships the studied groups and their assertion as distinct cultural entities while making ethnic boundaries on the basis of socio-cultural identities. Such claims also involve frequent negotiation with the Sate as well as with other ethnic groups, which further creates strife among indigenous groups for tribal identity. The paper argues that identity consciousnesses amongst groups have persisted since the introduction of resource distribution on ethnic lines; therefore, issues of exclusive ethnic identity in the state of Assam can be contextualised within the colonial and post-colonial politics of redrawing ethnic and spatial boundaries. Narrative of the ethnic leaders who are in the forefront of struggle for ST status revealed that it is not merely to secure preferential treatment, but it also encompasses entitlement to land and their socio-cultural identity as aboriginal. While noting the genesis of struggle by the ethnic associations for ST status, this paper will also delineate the interactions among ethnic groups and how the identity of tribe is being performed by them to be included in the official categories of ST.

Keywords: ethnic, identity, sixth schedule, tribe

Procedia PDF Downloads 202
1666 Rapid and Culture-Independent Detection of Staphylococcus Aureus by PCR Based Protocols

Authors: V. Verma, Syed Riyaz-ul-Hassan

Abstract:

Staphylococcus aureus is one of the most commonly found pathogenic bacteria and is hard to eliminate from the human environment. It is responsible for many nosocomial infections, besides being the main causative agent of food intoxication by virtue of its variety of enterotoxins. Routine detection of S. aureus in food is usually carried out by traditional methods based on morphological and biochemical characterization. These methods are time-consuming and tedious. In addition, misclassifications with automated susceptibility testing systems or commercially available latex agglutination kits have been reported by several workers. Consequently, there is a need for methods to specifically discriminate S. aureus from other staphylococci as quickly as possible. Data on protocols developed using molecular means like PCR technology will be presented for rapid and specific detection of this pathogen in food, clinical and environmental samples, especially milk.

Keywords: food Pathogens, PCR technology, rapid and specific detection, staphylococcus aureus

Procedia PDF Downloads 513
1665 The Impact of Information and Communication Technology on the Performance of Office Technology Managers

Authors: Sunusi Tijjani

Abstract:

Information and communication technology is an indispensable tool in the performance of office technology managers. Today's offices are automated and equipped with modern office machines that enhances and improve the work of office managers. However, today's office technology managers can process, evaluate, manage and communicate all forms of information using technological devices. Information and Communication Technology is viewed as the process of processing, storing ad dissemination information while office technology managers are trained professional who can effectively operate modern office machines, perform administrative duties and attend meetings to take dawn minute of meetings. This paper examines the importance of information and communication technology toward enhancing the work of office managers. It also stresses the importance of information and communication technology toward proper and accurate record management.

Keywords: communication, information, technology, managers

Procedia PDF Downloads 485
1664 Automatic Method for Classification of Informative and Noninformative Images in Colonoscopy Video

Authors: Nidhal K. Azawi, John M. Gauch

Abstract:

Colorectal cancer is one of the leading causes of cancer death in the US and the world, which is why millions of colonoscopy examinations are performed annually. Unfortunately, noise, specular highlights, and motion artifacts corrupt many images in a typical colonoscopy exam. The goal of our research is to produce automated techniques to detect and correct or remove these noninformative images from colonoscopy videos, so physicians can focus their attention on informative images. In this research, we first automatically extract features from images. Then we use machine learning and deep neural network to classify colonoscopy images as either informative or noninformative. Our results show that we achieve image classification accuracy between 92-98%. We also show how the removal of noninformative images together with image alignment can aid in the creation of image panoramas and other visualizations of colonoscopy images.

Keywords: colonoscopy classification, feature extraction, image alignment, machine learning

Procedia PDF Downloads 253
1663 Dual Biometrics Fusion Based Recognition System

Authors: Prakash, Vikash Kumar, Vinay Bansal, L. N. Das

Abstract:

Dual biometrics is a subpart of multimodal biometrics, which refers to the use of a variety of modalities to identify and authenticate persons rather than just one. We limit the risks of mistakes by mixing several modals, and hackers have a tiny possibility of collecting information. Our goal is to collect the precise characteristics of iris and palmprint, produce a fusion of both methodologies, and ensure that authentication is only successful when the biometrics match a particular user. After combining different modalities, we created an effective strategy with a mean DI and EER of 2.41 and 5.21, respectively. A biometric system has been proposed.

Keywords: multimodal, fusion, palmprint, Iris, EER, DI

Procedia PDF Downloads 147
1662 An Automated R-Peak Detection Method Using Common Vector Approach

Authors: Ali Kirkbas

Abstract:

R peaks in an electrocardiogram (ECG) are signs of cardiac activity in individuals that reveal valuable information about cardiac abnormalities, which can lead to mortalities in some cases. This paper examines the problem of detecting R-peaks in ECG signals, which is a two-class pattern classification problem in fact. To handle this problem with a reliable high accuracy, we propose to use the common vector approach which is a successful machine learning algorithm. The dataset used in the proposed method is obtained from MIT-BIH, which is publicly available. The results are compared with the other popular methods under the performance metrics. The obtained results show that the proposed method shows good performance than that of the other. methods compared in the meaning of diagnosis accuracy and simplicity which can be operated on wearable devices.

Keywords: ECG, R-peak classification, common vector approach, machine learning

Procedia PDF Downloads 64
1661 Seamless MATLAB® to Register-Transfer Level Design Methodology Using High-Level Synthesis

Authors: Petri Solanti, Russell Klein

Abstract:

Many designers are asking for an automated path from an abstract mathematical MATLAB model to a high-quality Register-Transfer Level (RTL) hardware description. Manual transformations of MATLAB or intermediate code are needed, when the design abstraction is changed. Design conversion is problematic as it is multidimensional and it requires many different design steps to translate the mathematical representation of the desired functionality to an efficient hardware description with the same behavior and configurability. Yet, a manual model conversion is not an insurmountable task. Using currently available design tools and an appropriate design methodology, converting a MATLAB model to efficient hardware is a reasonable effort. This paper describes a simple and flexible design methodology that was developed together with several design teams.

Keywords: design methodology, high-level synthesis, MATLAB, verification

Procedia PDF Downloads 139
1660 Current Issues of Cross-Border Enforcement

Authors: Gábor Kocsmárik

Abstract:

The topic of this is coercive measures against assets in which the factor of the procedure contains a foreign element. We speak of cross-border enforcement if the debtor or the property requesting enforcement or subject to enforcement is not located in the bordering country. Given that the jurisdiction of a country cannot extend beyond its borders, the cooperation of nations and the mutual recognition of their decisions are necessary to eliminate this. In addition, it is essential to create framework rules that are binding and enforceable for each country participating in the convention. During the study, some conventions between countries that are still in force will be presented, which can serve as a starting point for dealing with existing problems.

Keywords: law, execution, civil procedure law, international

Procedia PDF Downloads 34
1659 Analysis on Cyber Threat Actors Targeting Automated Border Security Systems

Authors: Mirko Sailio

Abstract:

Border crossing automatization reduces required human resources in handling people crossing borders. As technology replaces and augments the work done by border officers, new cyber threats arise to threaten border security. This research analyses the current cyber threat actors and their capabilities. The analysis is conducted by gathering the threat actor data from a wide range of public sources. A model for a general border automatization system is presented, and its most significant cyber-security attributes are then compared to threat actor activity and capabilities in order to predict priorities in securing such systems. Organized crime and nation-state actors present the clearest threat to border cyber-security, and additional focus is given to their motivations and activities.

Keywords: border automation, cyber-security, threat actors, border cyber-security

Procedia PDF Downloads 203
1658 Pupil Size: A Measure of Identification Memory in Target Present Lineups

Authors: Camilla Elphick, Graham Hole, Samuel Hutton, Graham Pike

Abstract:

Pupil size has been found to change irrespective of luminosity, suggesting that it can be used to make inferences about cognitive processes, such as cognitive load. To see whether identifying a target requires a different cognitive load to rejecting distractors, the effect of viewing a target (compared with viewing distractors) on pupil size was investigated using a sequential video lineup procedure with two lineup sessions. Forty one participants were chosen randomly via the university. Pupil sizes were recorded when viewing pre target distractors and post target distractors and compared to pupil size when viewing the target. Overall, pupil size was significantly larger when viewing the target compared with viewing distractors. In the first session, pupil size changes were significantly different between participants who identified the target (Hits) and those who did not. Specifically, the pupil size of Hits reduced significantly after viewing the target (by 26%), suggesting that cognitive load reduced following identification. The pupil sizes of Misses (who made no identification) and False Alarms (who misidentified a distractor) did not reduce, suggesting that the cognitive load remained high in participants who failed to make the correct identification. In the second session, pupil sizes were smaller overall, suggesting that cognitive load was smaller in this session, and there was no significant difference between Hits, Misses and False Alarms. Furthermore, while the frequency of Hits increased, so did False Alarms. These two findings suggest that the benefits of including a second session remain uncertain, as the second session neither provided greater accuracy nor a reliable way to measure it. It is concluded that pupil size is a measure of face recognition strength in the first session of a target present lineup procedure. However, it is still not known whether cognitive load is an adequate explanation for this, or whether cognitive engagement might describe the effect more appropriately. If cognitive load and cognitive engagement can be teased apart with further investigation, this would have positive implications for understanding eyewitness identification. Nevertheless, this research has the potential to provide a tool for improving the reliability of lineup procedures.

Keywords: cognitive load, eyewitness identification, face recognition, pupillometry

Procedia PDF Downloads 404
1657 A CORDIC Based Design Technique for Efficient Computation of DCT

Authors: Deboraj Muchahary, Amlan Deep Borah Abir J. Mondal, Alak Majumder

Abstract:

A discrete cosine transform (DCT) is described and a technique to compute it using fast Fourier transform (FFT) is developed. In this work, DCT of a finite length sequence is obtained by incorporating CORDIC methodology in radix-2 FFT algorithm. The proposed methodology is simple to comprehend and maintains a regular structure, thereby reducing computational complexity. DCTs are used extensively in the area of digital processing for the purpose of pattern recognition. So the efficient computation of DCT maintaining a transparent design flow is highly solicited.

Keywords: DCT, DFT, CORDIC, FFT

Procedia PDF Downloads 478
1656 Mesalazine-Induced Myopericarditis in a Professional Athlete

Authors: Tristan R. Fraser, Christopher D. Steadman, Christopher J. Boos

Abstract:

Myopericarditis is an inflammation syndrome characterised by clinical diagnostic criteria for pericarditis, such as chest pain, combined with evidence of myocardial involvement, such as elevation of biomarkers of myocardial damage, e.g., troponins. It can rarely be a complication of therapeutics used for dysregulated immune-mediated diseases such as inflammatory bowel disease (IBD), for example, mesalazine. The infrequency of mesalazine-induced myopericarditis adds to the challenge in its recognition. Rapid diagnosis and the early introduction of treatment are crucial. This case report follows a 24-year-old professional footballer with a past medical history of ulcerative colitis, recently started on mesalazine for disease control. Three weeks after mesalazine was initiated, he was admitted with fever, shortness of breath, and chest pain worse whilst supine and on deep inspiration, as well as elevated venous blood cardiac troponin T level (cTnT, 288ng/L; normal: <13ng/L). Myocarditis was confirmed on initial inpatient cardiac MRI, revealing the presence of florid myocarditis with preserved left ventricular systolic function and an ejection fraction of 67%. This was a longitudinal case study following the progress of a single individual with myopericarditis over four acute hospital admissions over nine weeks, with admissions ranging from two to five days. Parameters examined included clinical signs and symptoms, serum troponin, transthoracic echocardiogram, and cardiac MRI. Serial measurements of cardiac function, including cardiac MRI and transthoracic echocardiogram, showed progressive deterioration of cardiac function whilst mesalazine was continued. Prior to cessation of mesalazine, transthoracic echocardiography revealed a small global pericardial effusion of < 1cm and worsening left ventricular systolic function with an ejection fraction of 45%. After recognition of mesalazine as a potential cause and consequent cessation of the drug, symptoms resolved, with cardiac MRI performed as an outpatient showing resolution of myocardial oedema. The patient plans to make a return to competitive sport. Patients suffering from myopericarditis are advised to refrain from competitive sport for at least six months in order to reduce the risk of cardiac remodelling and sudden cardiac death. Additional considerations must be taken in individuals for whom competitive sport is an essential component of their livelihood, such as professional athletes. Myopericarditis is an uncommon, however potentially serious medical condition with a wide variety of aetiologies, including viral, autoimmune, and drug-related causes. Management is mainly supportive and relies on prompt recognition and removal of the aetiological process. Mesalazine-induced myopericarditis is a rare condition; as such increasing awareness of mesalazine as a precipitant of myopericarditis is vital for optimising the management of these patients.

Keywords: myopericarditis, mesalazine, inflammatory bowel disease, professional athlete

Procedia PDF Downloads 135
1655 Sorting Fish by Hu Moments

Authors: J. M. Hernández-Ontiveros, E. E. García-Guerrero, E. Inzunza-González, O. R. López-Bonilla

Abstract:

This paper presents the implementation of an algorithm that identifies and accounts different fish species: Catfish, Sea bream, Sawfish, Tilapia, and Totoaba. The main contribution of the method is the fusion of the characteristics of invariance to the position, rotation and scale of the Hu moments, with the proper counting of fish. The identification and counting is performed, from an image under different noise conditions. From the experimental results obtained, it is inferred the potentiality of the proposed algorithm to be applied in different scenarios of aquaculture production.

Keywords: counting fish, digital image processing, invariant moments, pattern recognition

Procedia PDF Downloads 408