Search results for: video surveillance camera
749 Football Smart Coach: Analyzing Corner Kicks Using Computer Vision
Authors: Arth Bohra, Marwa Mahmoud
Abstract:
In this paper, we utilize computer vision to develop a tool for youth coaches to formulate set-piece tactics for their players. We used the Soccernet database to extract the ResNet features and camera calibration data for over 3000 corner kick across 500 professional matches in the top 6 European leagues (English Premier League, UEFA Champions League, Ligue 1, La Liga, Serie A, Bundesliga). Leveraging the provided homography matrix, we construct a feature vector representing the formation of players on these corner kicks. Additionally, labeling the videos manually, we obtained the pass-trajectory of each of the 3000+ corner kicks by segmenting the field into four zones. Next, after determining the localization of the players and ball, we used event data to give the corner kicks a rating on a 1-4 scale. By employing a Convolutional Neural Network, our model managed to predict the success of a corner kick given the formations of players. This suggests that with the right formations, teams can optimize the way they approach corner kicks. By understanding this, we can help coaches formulate set-piece tactics for their own teams in order to maximize the success of their play. The proposed model can be easily extended; our method could be applied to even more game situations, from free kicks to counterattacks. This research project also gives insight into the myriad of possibilities that artificial intelligence possesses in transforming the domain of sports.Keywords: soccer, corner kicks, AI, computer vision
Procedia PDF Downloads 174748 Deep Learning Application for Object Image Recognition and Robot Automatic Grasping
Authors: Shiuh-Jer Huang, Chen-Zon Yan, C. K. Huang, Chun-Chien Ting
Abstract:
Since the vision system application in industrial environment for autonomous purposes is required intensely, the image recognition technique becomes an important research topic. Here, deep learning algorithm is employed in image system to recognize the industrial object and integrate with a 7A6 Series Manipulator for object automatic gripping task. PC and Graphic Processing Unit (GPU) are chosen to construct the 3D Vision Recognition System. Depth Camera (Intel RealSense SR300) is employed to extract the image for object recognition and coordinate derivation. The YOLOv2 scheme is adopted in Convolution neural network (CNN) structure for object classification and center point prediction. Additionally, image processing strategy is used to find the object contour for calculating the object orientation angle. Then, the specified object location and orientation information are sent to robotic controller. Finally, a six-axis manipulator can grasp the specific object in a random environment based on the user command and the extracted image information. The experimental results show that YOLOv2 has been successfully employed to detect the object location and category with confidence near 0.9 and 3D position error less than 0.4 mm. It is useful for future intelligent robotic application in industrial 4.0 environment.Keywords: deep learning, image processing, convolution neural network, YOLOv2, 7A6 series manipulator
Procedia PDF Downloads 250747 Proposal of Non-Destructive Inspection Function Based on Internet of Things Technology Using Drone
Authors: Byoungjoon Yu, Jihwan Park, Sujung Sin, Junghyun Im, Minsoo Park, Sehwan Park, Seunghee Park
Abstract:
In this paper, we propose a technology to monitor the soundness of an Internet-based bridge using a non-conductive inspection function. There has been a collapse accident due to the aging of the bridge structure, and it is necessary to prepare for the deterioration of the bridge. The NDT/SHM system for maintenance of existing bridge structures requires a large number of inspection personnel and expensive inspection costs, and access of expensive and large equipment to measurement points is required. Because current drone inspection equipment can only be inspected through camera, it is difficult to inspect inside damage accurately, and the results of an internal damage evaluation are subjective, and it is difficult for non-specialists to recognize the evaluation results. Therefore, it is necessary to develop NDT/SHM techniques for maintenance of new-concept bridge structures that allow for free movement and real-time evaluation of measurement results. This work is financially supported by Korea Ministry of Land, Infrastructure, and Transport (MOLIT) as 'Smart City Master and Doctor Course Grant Program' and a grant (14SCIP-B088624-01) from Construction Technology Research Program funded by Ministry of Land, Infrastructure and Transport of Korean government.Keywords: Structural Health Monitoring, SHM, non-contact sensing, nondestructive testing, NDT, Internet of Things, autonomous self-driving drone
Procedia PDF Downloads 268746 TeleMe Speech Booster: Web-Based Speech Therapy and Training Program for Children with Articulation Disorders
Authors: C. Treerattanaphan, P. Boonpramuk, P. Singla
Abstract:
Frequent, continuous speech training has proven to be a necessary part of a successful speech therapy process, but constraints of traveling time and employment dispensation become key obstacles especially for individuals living in remote areas or for dependent children who have working parents. In order to ameliorate speech difficulties with ample guidance from speech therapists, a website has been developed that supports speech therapy and training for people with articulation disorders in the standard Thai language. This web-based program has the ability to record speech training exercises for each speech trainee. The records will be stored in a database for the speech therapist to investigate, evaluate, compare and keep track of all trainees’ progress in detail. Speech trainees can request live discussions via video conference call when needed. Communication through this web-based program facilitates and reduces training time in comparison to walk-in training or appointments. This type of training also allows people with articulation disorders to practice speech lessons whenever or wherever is convenient for them, which can lead to a more regular training processes.Keywords: web-based remote training program, Thai speech therapy, articulation disorders, speech booster
Procedia PDF Downloads 375745 Use of Galileo Advanced Features in Maritime Domain
Authors: Olivier Chaigneau, Damianos Oikonomidis, Marie-Cecile Delmas
Abstract:
GAMBAS (Galileo Advanced features for the Maritime domain: Breakthrough Applications for Safety and security) is a project funded by the European Space Program Agency (EUSPA) aiming at identifying the search-and-rescue and ship security alert system needs for maritime users (including operators and fishing stakeholders) and developing operational concepts to answer these needs. The general objective of the GAMBAS project is to support the deployment of Galileo exclusive features in the maritime domain in order to improve safety and security at sea, detection of illegal activities and associated surveillance means, resilience to natural and human-induced emergency situations, and develop, integrate, demonstrate, standardize and disseminate these new associated capabilities. The project aims to demonstrate: improvement of the SAR (Search And Rescue) and SSAS (Ship Security Alert System) detection and response to maritime distress through the integration of new features into the beacon for SSAS in terms of cost optimization, user-friendly aspects, integration of Galileo and OS NMA (Open Service Navigation Message Authentication) reception for improved authenticated localization performance and reliability, and at sea triggering capabilities, optimization of the responsiveness of RCCs (Rescue Co-ordination Centre) towards the distress situations affecting vessels, the adaptation of the MCCs (Mission Control Center) and MEOLUT (Medium Earth Orbit Local User Terminal) to the data distribution of SSAS alerts.Keywords: Galileo new advanced features, maritime, safety, security
Procedia PDF Downloads 93744 Border Control and Human Rights Violations: Lessons Learned from the United States and Potential Solutions for the European Union
Authors: María Elena Menéndez Ibáñez
Abstract:
After the terrorist attacks of 9/11, new measures were adopted by powerful countries and regions like the United States and the European Union in order to safeguard their security. In 2002, the US created the Department of Homeland Security with one sole objective; to protect American soil and people. The US adopted new policies that made every immigrant a potential terrorist and a threat to their national security. Stronger border control became one of the key elements of the fight against organized crime and terrorism. The main objective of this paper is to compare some of the most important and radical measures adopted by the US, even those that resulted in systematic violations of human rights, with some of the European measures adopted after the 2015 Paris attacks of 2015, such as unlawful detainment of prisoners and other measures against foreigners. Through the Schengen agreement, the European Union has tried to eliminate tariffs and border controls, in order to guarantee successful economic growth. Terrorists have taken advantage of this and have made the region vulnerable to attacks. Authorities need to strengthen their surveillance methods in order to safeguard the region and its stability. Through qualitative methods applied to social sciences, this research will also try to explain why some of the mechanisms proven to be useful in the US would not be so in Europe, especially because they would result in human rights violations. Finally, solutions will be offered that would not put the whole Schengen Agreement at risk. Europe cannot reinstate border control, without making individuals vulnerable to human rights violations.Keywords: border control, immigration, international cooperation, national security
Procedia PDF Downloads 138743 Semi-Automated Tracking of Vibrissal Movements in Free-Moving Rodents Captured by High-Speed Videos
Authors: Hyun June Kim, Tailong Shi, Seden Akdagli, Sam Most, Yuling Yan
Abstract:
Quantitative analysis of mouse whisker movement can be used to study functional recovery and regeneration of facial nerve after an injury. However, it is challenging to accurately track mouse whisker movements, and most whisker tracking methods require manual intervention, e.g. fixing the head of the mouse during a study. Here we describe a semi-automated image processing method that is applied to high-speed video recordings of free-moving mice to track whisker movements. We first track the head movement of a mouse by delineating the lower head contour frame-by-frame to locate and determine the orientation of its head. Then, a region of interest is identified for each frame, with subsequent application of the Hough transform to track individual whisker movements on each side of the head. Our approach is used to examine the functional recovery of damaged facial nerves in mice over a course of 21 days.Keywords: mystacial macrovibrissae, whisker tracking, head tracking, facial nerve recovery
Procedia PDF Downloads 590742 The Experiences of Claiming Welfare Benefits for People with Disabilities in the UK
Authors: Jennifer McNeill
Abstract:
Over the years UK Governments have extended the use of welfare conditionality to more marginalised groups. Whereas in the past, disabled people’s rights to unconditional welfare were defended, significant numbers of disabled people have in recent years been re-classified as ‘fit for work’ as a result of this policy shift towards increased conditionality targeting more welfare service user groups. This paper discusses findings from a five-year project exploring the ethics and efficacy of welfare conditionality. Drawing on repeat interviews over three years with 58 disabled welfare service users across England and Scotland, the paper explores the experience of, and impact of conditionality upon, disabled participants. In particular, participants described the process of claiming disability-related benefits as stigmatising, with some describing the medical assessments as demeaning, traumatic and even painful. The medical assessments are conducted by private contractors and participants felt they were treated unfairly, under suspicion and under surveillance. This finding is important in line with a recent UN report concerned with the practice of such assessments. The findings reveal that notions of ‘deservedness’ are embedded in this system as disabled recipients argue for their entitlement to welfare claims relative to what are deemed to be less deserving groups of benefit claimants. This indicates an increasing competition ethic within different sections of the most marginalised social groups that facilitate further forms of social fragmentation, particularly in relation to opposition to benefit cuts and other changes requiring concerted and organised forms of resistance. The impact of media and political scapegoating of the most marginal has generated divisions within even those who position themselves as legitimate recipients.Keywords: disability, medical assessments, stigma, welfare conditionality
Procedia PDF Downloads 202741 Surveillance of Hepatitis C Virus Genotype Circulating in North India
Authors: Shantanu Prakash, Suruchi Shukla, Amita Jain
Abstract:
Introduction: The hepatitis C virus (HCV) is a major public health problem and a leading cause of chronic liver disease. Injection drug use and individuals receiving blood and blood products are the primary modes of HCV transmission. Our study aims to establish the prevalent genotypes/ subtypes of HCV circulating in Uttar Pradesh, North India, as reported from a tertiary care hospital. Methods: It is a retrospective observational analysis of consecutive 404 HCV RNA positive cases referred to our hospital during September 2014 to April 2017. The study was approved by an institutional ethics committee. Written informed consent was taken from each participant. Clinical and demographic details of these patients were recorded using predesigned questionnaires. All the laboratory testing was carried on stored serum sample of enrolled cases. Genotyping of all 404 strains was done by Sanger’s sequencing of the core region. The phylogenetic analysis of 179 HCV strains with high -quality sequencing data was performed. Results: The distribution of prevalent genotypes/ subtypes as noted in the present study was; Genotype (GT)1a [n-101(25%)], GT1b [n-12(2.9%)], GT1c [1(0.25%)], GT3a [275(68.07%)], GT3b [9(2.2%)], GT3g [2(0.49%)], GT3i [3(0.74%)], and GT4a [1(0.24%)]. HCV genotypes GT2, GT5 and GT6 were not detected from our region. Sequence analysis showed high genotypic variability in HCV GT3. Phylogenetic analysis showed that HCV GT3 and GT1 circulating in our region were related to Indian strains reported earlier. Conclusions: HCV genotypes 3a and 1a are commonest circulating genotypes in Uttar Pradesh (UP), India.Keywords: Hepatitis C virus, genetic variation, bioinformatics, genotype, HCV
Procedia PDF Downloads 159740 Urban Design as a Tool to Address Safety in a Crime Ridden Area: A Case Study of Malviya Nagar, New Delhi
Authors: Shramana Mondal
Abstract:
As a city is growing in population, sprawl, and complexity, use of public spaces increases variably and thus ensuring safety for the people becomes an utmost priority. While active monitoring measures may be necessary in some places, urban design can play a major role in devising self-policing and encourage active public life. This paper aims to explore the various spatial and psychological reasons for the occurrence of crime and the role of ‘urban design’ to address this issue. In this research, the principles of urban design are examined, as well as projected on actual site by addressing the issue with urban design principles. In this review the sociological, psychological, typological and morphological factors are addressed which affect the safety of a space and the possible framing guidelines, controls and urban design strategies are explored to address a safe neighborhood. On the basis of statistical survey, the residential and street network of Malviya Nagar in Delhi is chosen as the area of demonstration. The programs inhibit a safe neighborhood and a movement network that are addressed based on the four principles of natural surveillance, territoriality, community building, and connectivity. The paper concludes with a discussion of the urban design as an effective tool by creating an intense active zone with mixed use feature to ensure throughout activity and also ensuring safe pedestrian zone by introducing sense of community feeling and territoriality thus achieving active, useful and public friendly space.Keywords: crime, public life, safety, urban design
Procedia PDF Downloads 399739 Deep Learning-Based Automated Structure Deterioration Detection for Building Structures: A Technological Advancement for Ensuring Structural Integrity
Authors: Kavita Bodke
Abstract:
Structural health monitoring (SHM) is experiencing growth, necessitating the development of distinct methodologies to address its expanding scope effectively. In this study, we developed automatic structure damage identification, which incorporates three unique types of a building’s structural integrity. The first pertains to the presence of fractures within the structure, the second relates to the issue of dampness within the structure, and the third involves corrosion inside the structure. This study employs image classification techniques to discern between intact and impaired structures within structural data. The aim of this research is to find automatic damage detection with the probability of each damage class being present in one image. Based on this probability, we know which class has a higher probability or is more affected than the other classes. Utilizing photographs captured by a mobile camera serves as the input for an image classification system. Image classification was employed in our study to perform multi-class and multi-label classification. The objective was to categorize structural data based on the presence of cracks, moisture, and corrosion. In the context of multi-class image classification, our study employed three distinct methodologies: Random Forest, Multilayer Perceptron, and CNN. For the task of multi-label image classification, the models employed were Rasnet, Xceptionet, and Inception.Keywords: SHM, CNN, deep learning, multi-class classification, multi-label classification
Procedia PDF Downloads 36738 A Hybrid Digital Watermarking Scheme
Authors: Nazish Saleem Abbas, Muhammad Haris Jamil, Hamid Sharif
Abstract:
Digital watermarking is a technique that allows an individual to add and hide secret information, copyright notice, or other verification message inside a digital audio, video, or image. Today, with the advancement of technology, modern healthcare systems manage patients’ diagnostic information in a digital way in many countries. When transmitted between hospitals through the internet, the medical data becomes vulnerable to attacks and requires security and confidentiality. Digital watermarking techniques are used in order to ensure the authenticity, security and management of medical images and related information. This paper proposes a watermarking technique that embeds a watermark in medical images imperceptibly and securely. In this work, digital watermarking on medical images is carried out using the Least Significant Bit (LSB) with the Discrete Cosine Transform (DCT). The proposed methods of embedding and extraction of a watermark in a watermarked image are performed in the frequency domain using LSB by XOR operation. The quality of the watermarked medical image is measured by the Peak signal-to-noise ratio (PSNR). It was observed that the watermarked medical image obtained performing XOR operation between DCT and LSB survived compression attack having a PSNR up to 38.98.Keywords: watermarking, image processing, DCT, LSB, PSNR
Procedia PDF Downloads 47737 Enhanced Boiling Heat Transfer Using Wettability Patterned Surfaces
Authors: Dong Il Shim, Geehong Choi, Donghwi Lee, Namkyu Lee, Hyung Hee Cho
Abstract:
Effective cooling technology is required to secure thermal stability in extreme heat generated systems such as integrated electronic devices and power generated systems. Pool boiling heat transfer is one of the powerful cooling mechanisms using phase change phenomena. Critical heat flux (CHF) and heat transfer coefficient (HTC) are main factors to evaluate the performance of boiling heat transfer. CHF is the limitation of boiling heat transfer before film boiling which occurs thermal failure. Surface wettability is an important surface characteristic of boiling heat transfer. A hydrophilic surface has higher CHF through effective working fluid supply to local hot spots. A hydrophobic surface promotes the onset of nucleate boiling (ONB) to enhance HTC. In this study, superbiphilic surfaces, which is combined with superhydrophillic and superhydrophobic, are applied on boiling experiments to maximize boiling performance. We conducted pool boiling heat transfer using DI water at a saturated temperature and recorded bubble dynamics using a high-speed camera with 2000 fps. As a result, superbiphilic patterned surfaces promote ONB and enhance both CHF and HTC. This study demonstrates the enhanced boiling performance using superbiphilic surfaces by effective nucleation and separation of liquid/vapor pathway. We expect that further enhancement of heat transfer could be achieved in future work using optimized patterned surfaces.Keywords: boiling heat transfer, wettability, critical heat flux, heat transfer coefficient
Procedia PDF Downloads 335736 Kinematic Analysis of Heel Height Effect on Knee Direction Correction in a Patient with Genu Recurvatum: A Case Study
Authors: Parya Salimitari, Farhad Tabatabai Ghomsheh, Siyamak Khorramymehr, Hossein Taghadosi, Mohammad Hossein Dashti
Abstract:
The aim of this study was to evaluate the effect of heel height on the knee joint direction in Genu recurvatum patients compared to normal state. The test was performed on a patient with Genu recurvatum and a healthy person with similar and match biomechanical conditions. Subjects were tested under six different positions of shoes with heels 0, 1, 2, 3, 4 and 5 cm after marking during the gate. The results of the spatial temporal geometry obtained from Vicon Motion System (six-camera T10 model, Oxford Metrics Ltd., Oxford, UK), and were used to compute and analyze the kinematic results. In this study, we tried to determine the effect of shoe heel intervention on knee joint direction correction. The results indicate that the 1 cm heel has been optimized and significantly improved in knee joint flexion and flexion-extension angle so that the difference in knee flexion-extension angle between the patient and the healthy person at some stages of walking has reached zero (good posture). The 3 cm heel compared with the 0 cm heel has reduced the knee recurvatum index (KRI) by up to 21.74% in the patient (from 219.233 mm to 47.6714 mm). According to the findings of this study, it can be concluded that heel increase is effective in correcting knee joints in Genu recurvatum and the optimum heel height is 1 cm.Keywords: joint alignment of knee, gait analysis, genu recurvatum, heel lift, kinematics, motion-analysis
Procedia PDF Downloads 204735 Character and Evolution of Electronic Waste: A Technologically Developing Country's Experience
Authors: Karen C. Olufokunbi, Odetunji A. Odejobi
Abstract:
The discourse of this paper is the examination of the generation, accumulation and growth of e-waste in a developing country. Images and other data about computer e-waste were collected using a digital camera, 290 copies of questionnaire and three structured interviews using Obafemi Awolowo University (OAU), Ile-Ife, Nigeria environment as a case study. The numerical data were analysed using R data analysis and process tool. Automata-based techniques and Petri net modeling tool were used to design and simulate a computational model for the recovery of saleable materials from e-waste. The R analysis showed that at a 95 percent confidence level, the computer equipment that will be disposed by 2020 will be 417 units. Compared to the 800 units in circulation in 2014, 50 percent of personal computer components will become e-waste. This indicates that personal computer components were in high demand due to their low costs and will be disposed more rapidly when replaced by new computer equipment Also, 57 percent of the respondents discarded their computer e-waste by throwing it into the garbage bin or by dumping it. The simulated model using Coloured Petri net modelling tool for the process showed that the e-waste dynamics is a forward sequential process in the form of a pipeline meaning that an e-waste recovery of saleable materials process occurs in identifiable discrete stages indicating that e-waste will continue to accumulate and grow in volume with time.Keywords: Coloured Petri net, computational modelling, electronic waste, electronic waste process dynamics
Procedia PDF Downloads 166734 Rising STI Prevalence among MSM Clients in Calabar, Nigeria: A Call to Action
Authors: Ugoh Kelechi Melford, Anene O.
Abstract:
Introduction: Evidence has shown that there are increasing rates of new HIV and other STI infections occurring among Men who have Sex with Men (MSM) in Nigeria, with the prevalence 3 times higher than the general population as reported by the 2011 National Integrated Bio Behavioral Surveillance Survey. The poor state of health care and support services hinders our effort to control the high rates of these new infections among MSM. Methods: The Initiative for Improved Male Health (IMH-Initiative) works to provide a safe space for young MSM living with HIV to access comprehensive palliative care and support, as well as referrals for other services through drama and dance competitions. An STI assessment was conducted in IMH-Initiative’s Community Center in Calabar, for gay men and other MSM. An STI history was conducted for all clients who visited the community clinic specifically for HCT and STI counseling and referrals within a 5 month period, and their data were collated. Results: 61 MSM were diagnosed, and reported the following in the last 6 months. 49 where living with HIV. 46 had previous histories of untreated anal warts. 20 had previous histories of treated Gonorrhea by self-medication and herbs. 21 had untreated boils and rashes around the genitals. 10 clients where living with HIV, and reported untreated penile and rectal gonorrhea. All clients indicated that there were not comfortable discussing STI infections with staff of public hospitals. Conclusion: It is evident that a reasonable number of STI infections among MSM are not completely treated or ignored. This thereby increases the individual’s risk of HIV infection, and cripples HIV prevention programming in Nigeria. HIV programs targeting MSM must incorporate STI syndromic management, so as to increase access to non-stigmatized diagnosis and treatment of STIs. Also, access to STI drugs for clients cannot be overemphasized.Keywords: MSM, IBBSS, STI, IMH
Procedia PDF Downloads 333733 Screening Deformed Red Blood Cells Irradiated by Ionizing Radiations Using Windowed Fourier Transform
Authors: Dahi Ghareab Abdelsalam Ibrahim, R. H. Bakr
Abstract:
Ionizing radiation, such as gamma radiation and X-rays, has many applications in medical diagnoses and cancer treatment. In this paper, we used the windowed Fourier transform to extract the complex image of the deformed red blood cells. The real values of the complex image are used to extract the best fitting of the deformed cell boundary. Male albino rats are irradiated by γ-rays from ⁶⁰Co. The male albino rats are anesthetized with ether, and then blood samples are collected from the eye vein by heparinized capillary tubes for studying the radiation-damaging effect in-vivo by the proposed windowed Fourier transform. The peripheral blood films are prepared according to the Brown method. The peripheral blood film is photographed by using an Automatic Image Contour Analysis system (SAMICA) from ELBEK-Bildanalyse GmbH, Siegen, Germany. The SAMICA system is provided with an electronic camera connected to a computer through a built-in interface card, and the image can be magnified up to 1200 times and displayed by the computer. The images of the peripheral blood films are then analyzed by the windowed Fourier transform method to extract the precise deformation from the best fitting. Based on accurate deformation evaluation of the red blood cells, diseases can be diagnosed in their primary stages.Keywords: windowed Fourier transform, red blood cells, phase wrapping, Image processing
Procedia PDF Downloads 85732 Madness in Susanna Kaysen’s Girl, Interrupted: A Focouldian Reading
Authors: Somaye Sabetnia
Abstract:
This paper is accomplished to probe Susanna Kaysen’s memoir Girl, Interrupted in the light of Michel Foucault’s theory of madness comprehensively set forth in his History of Madness (1961). It is an endeavor to analysis this novel based on Foucault’s idea of madness. In his archeological study of madness, Foucault introduces a way to perceive madness and its association with dominant discourses. He argues that the concept of madness is constructed within the social context, and different institutions affect its definition. Furthermore, he takes into consideration how each era treats madness, and affirms that in modern times, people considered mad are exiled out of cities, confined in madhouses, and later in clinics where they are treated with drugs. Set after World War II, the novel under observation highlights women’s conditions in which they were becoming a housewife or following their own desires; in fact, choosing the second one results in labeling mad. The protagonist of novel is labeled 'mad,' and is hence impelled to go to asylums where so-called patients are under the vigilant surveillance of the authorities to go through the process of 'normalization.' To discern how she is considered 'mad,' this article probes the dominant discourse of the time when the stories take place to provide a better understanding of madness under the impact of social, cultural, and political conditions. It examines how a so-called mad considered 'Other' and treated after being confined by the disciplinary system of the asylum in a panoptic world. In addition to, it describes the aim of treatment is to punish and control a patient not to cure. This article aims to indicate that Susanna Kaysen tries to picture what is defined as women’s madness is the result of the patriarchal society of the post-war America as well as the mental illness has nothing to do with blood; it is rather the result of the social inequality of the age.Keywords: clinical treatment, disciplining and punishment, dominant discourse, normalization, other, panoptic world, reason vs. unreason
Procedia PDF Downloads 321731 An Improved Tracking Approach Using Particle Filter and Background Subtraction
Authors: Amir Mukhtar, Dr. Likun Xia
Abstract:
An improved, robust and efficient visual target tracking algorithm using particle filtering is proposed. Particle filtering has been proven very successful in estimating non-Gaussian and non-linear problems. In this paper, the particle filter is used with color feature to estimate the target state with time. Color distributions are applied as this feature is scale and rotational invariant, shows robustness to partial occlusion and computationally efficient. The performance is made more robust by choosing the different (YIQ) color scheme. Tracking is performed by comparison of chrominance histograms of target and candidate positions (particles). Color based particle filter tracking often leads to inaccurate results when light intensity changes during a video stream. Furthermore, background subtraction technique is used for size estimation of the target. The qualitative evaluation of proposed algorithm is performed on several real-world videos. The experimental results demonstrate that the improved algorithm can track the moving objects very well under illumination changes, occlusion and moving background.Keywords: tracking, particle filter, histogram, corner points, occlusion, illumination
Procedia PDF Downloads 381730 Dynamic Process of Single Water Droplet Impacting on a Hot Heptane Surface
Authors: Mingjun Xu, Shouxiang Lu
Abstract:
Understanding the interaction mechanism between the water droplet and pool fire has an important significance in engineering application of water sprinkle/spray/mist fire suppression. The micro impact process is unclear when the droplet impacts on the burning liquid surface at present. To deepen the understanding of the mechanisms of pool fire suppression with water spray/mist, dynamic processes of single water droplet impinging onto a hot heptane surface are visualized with the aid of a high-speed digital camera at 2000 fps. Each test is repeated 20 times. The water droplet diameter is around 1.98 mm, and the impact Weber number ranges from 30 to 695. The heptane is heated by a hot plate to mimic the burning condition, and the temperature varies from 30 to 90°C. The results show that three typical phenomena, including penetration, crater-jet and surface bubble, are observed, and the pool temperature has a significant influence on the critical condition for the appearance of each phenomenon. A global picture of different phenomena is built according to impact Weber number and pool temperature. In addition, the pool temperature and Weber number have important influences on the characteristic parameters including maximum crater depth, crown height and liquid column height. For a fixed Weber number, the liquid column height increases with pool temperature.Keywords: droplet impact, fire suppression, hot surface, water spray
Procedia PDF Downloads 243729 Endeavor to Develop Immunological and Hematological Early Diagnostic Marker to Check the Conversion of Asymptomatic to Symptomatic Visceral Leishmaniasis
Authors: Roshan Kamal Topno, Maneesh Kumar, Manas Ranjan Dikhit, Krishna Pandey, Major Madhukar, Vidhya Nand Rabidas, Vahab Ali, Ganesh Chandra Sahoo, Bhawana, Devendra Prasad Yadav, Rishikesh Kumar, Pradeep Das
Abstract:
A diagnostic marker for asymptomatic subject becomes a crucial need for advocating early prophylactic majors to control protozoal infection. The main issue in epidemiological affected regions is the presence of an asymptomatic individual that might potentially convert to a symptomatic visceral leishmaniasis (VL). The epidemiological study has been conducted at highly VL endemic Moriyama village in Patna district, Bihar, India that covers total population of 1540 individuals. Here, 1104(74.02%) people had been randomly screened and only 46 (4.17%) asymptomatic individuals were found sero-positive by the rK39 test. After taking signed informed consent form, blood samples were collected from 46 asymptomatic subjects for further hematological and immunological tests. Total leukocyte count, hemoglobin (gm%), neutrophil, lymphocyte, platelet count and interleukin-10 (IL-10) had been included as diagnostic markers. Interestingly only 5 (10.86%) individuals showed their asymptomatic conversion into symptomatic VL patients during quarterly surveillance. In overall analysis only two markers are suggestive for disease conversion that is hemoglobin (gm%) and IL-10. In all the infected patients, both the mean decrease in hemoglobin and mean increase of IL-10 was 19.23% from its normal value. The results might suggest that hematological and immunological changes would become helpful for early diagnosis of asymptomatic to symptomatic VL conversion.Keywords: asymptomatic, epidemiological, symptomatic visceral leishmaniasis, hemoglobin (gm%), interleukin-10, diagnosis
Procedia PDF Downloads 209728 Burnout Recognition for Call Center Agents by Using Skin Color Detection with Hand Poses
Authors: El Sayed A. Sharara, A. Tsuji, K. Terada
Abstract:
Call centers have been expanding and they have influence on activation in various markets increasingly. A call center’s work is known as one of the most demanding and stressful jobs. In this paper, we propose the fatigue detection system in order to detect burnout of call center agents in the case of a neck pain and upper back pain. Our proposed system is based on the computer vision technique combined skin color detection with the Viola-Jones object detector. To recognize the gesture of hand poses caused by stress sign, the YCbCr color space is used to detect the skin color region including face and hand poses around the area related to neck ache and upper back pain. A cascade of clarifiers by Viola-Jones is used for face recognition to extract from the skin color region. The detection of hand poses is given by the evaluation of neck pain and upper back pain by using skin color detection and face recognition method. The system performance is evaluated using two groups of dataset created in the laboratory to simulate call center environment. Our call center agent burnout detection system has been implemented by using a web camera and has been processed by MATLAB. From the experimental results, our system achieved 96.3% for upper back pain detection and 94.2% for neck pain detection.Keywords: call center agents, fatigue, skin color detection, face recognition
Procedia PDF Downloads 294727 Hybrid Approach for Face Recognition Combining Gabor Wavelet and Linear Discriminant Analysis
Authors: A: Annis Fathima, V. Vaidehi, S. Ajitha
Abstract:
Face recognition system finds many applications in surveillance and human computer interaction systems. As the applications using face recognition systems are of much importance and demand more accuracy, more robustness in the face recognition system is expected with less computation time. In this paper, a hybrid approach for face recognition combining Gabor Wavelet and Linear Discriminant Analysis (HGWLDA) is proposed. The normalized input grayscale image is approximated and reduced in dimension to lower the processing overhead for Gabor filters. This image is convolved with bank of Gabor filters with varying scales and orientations. LDA, a subspace analysis techniques are used to reduce the intra-class space and maximize the inter-class space. The techniques used are 2-dimensional Linear Discriminant Analysis (2D-LDA), 2-dimensional bidirectional LDA ((2D)2LDA), Weighted 2-dimensional bidirectional Linear Discriminant Analysis (Wt (2D)2 LDA). LDA reduces the feature dimension by extracting the features with greater variance. k-Nearest Neighbour (k-NN) classifier is used to classify and recognize the test image by comparing its feature with each of the training set features. The HGWLDA approach is robust against illumination conditions as the Gabor features are illumination invariant. This approach also aims at a better recognition rate using less number of features for varying expressions. The performance of the proposed HGWLDA approaches is evaluated using AT&T database, MIT-India face database and faces94 database. It is found that the proposed HGWLDA approach provides better results than the existing Gabor approach.Keywords: face recognition, Gabor wavelet, LDA, k-NN classifier
Procedia PDF Downloads 467726 On Dynamic Chaotic S-BOX Based Advanced Encryption Standard Algorithm for Image Encryption
Authors: Ajish Sreedharan
Abstract:
Security in transmission and storage of digital images has its importance in today’s image communications and confidential video conferencing. Due to the increasing use of images in industrial process, it is essential to protect the confidential image data from unauthorized access. Advanced Encryption Standard (AES) is a well known block cipher that has several advantages in data encryption. However, it is not suitable for real-time applications. This paper presents modifications to the Advanced Encryption Standard to reflect a high level security and better image encryption. The modifications are done by adjusting the ShiftRow Transformation and using On Dynamic chaotic S-BOX. In AES the Substitute bytes, Shift row and Mix columns by themselves would provide no security because they do not use the key. In Dynamic chaotic S-BOX Based AES the Substitute bytes provide security because the S-Box is constructed from the key. Experimental results verify and prove that the proposed modification to image cryptosystem is highly secure from the cryptographic viewpoint. The results also prove that with a comparison to original AES encryption algorithm the modified algorithm gives better encryption results in terms of security against statistical attacks.Keywords: advanced encryption standard (AES), on dynamic chaotic S-BOX, image encryption, security analysis, ShiftRow transformation
Procedia PDF Downloads 437725 Explication of the Relationship between Historical Trauma, Culture Loss, and Native American Youth Suicide: A Review of Related Literature
Authors: Julie A. LaRose
Abstract:
Native American youth, ages 10-24, have the highest rate of suicide in the United States. The hopelessness experienced by the native American youth is linked to psychosocial reasons more than biological or intrapsychic reasons. Two significant social determinants of health that diminish their hope include historical trauma and cultural loss. Intergenerational grief is caused by historical trauma from hundreds of years of colonization, broken treaties, and forced migration, leading to land, resources, and sovereignty loss. Forced acculturation through boarding schools that native children were required to attend led to the loss of traditions and culture. The result is hopelessness. This paper reviewed peer-reviewed research literature, government reports, non-government organizations reports, and video and written publications by Native Americans. Building hope through healing historical trauma and embracing cultural traditions may reduce suicide rates among Native American youth.Keywords: culture loss, historical trauma, Native American, suicide, suicide rates
Procedia PDF Downloads 121724 A Semiotic Approach to the Construction of Classical Identity in Indian Classical Music Videos
Authors: Jayakrishnan Narayanan, Sengamalam Periyasamy Dhanavel
Abstract:
Indian classical (Karnatik) music videos across various media platforms have followed an audio-visual pattern that conforms to its socio-cultural and quasi-religious identity. The present paper analyzes the semiotic variations between ‘pure Karnatik music videos’ and ‘independent/contemporary-collaborative music videos’ posted on social media by young professional Karnatik musicians. The paper analyzes these media texts by comparing their various structural sememes namely, the title, artists, music, narrative schemata, visuals, lighting, sound, and costumes. The paper argues that the pure Karnatik music videos are marked by the presence of certain recurring mythological or third level signifiers and that these signifiers and codes are marked by their conspicuous absence in the independent music videos produced by the same musicians. While the music and the musical instruments used in both these sets of music videos remain similar, the meaning that is abducted by the beholder in each case is entirely different. The paper also attempts to study the identity conflicts that are projected through these music videos and the extent to which the cultural connotations of Karnatik music govern the production of its music videos.Keywords: abduction, identity, media semiotics, music video
Procedia PDF Downloads 222723 Oral Sex Practice among Men Who Have Sex with Men: A Cross-Sectional Study in Indonesian Urban Settings
Authors: I Putu Yuda Hananta, Inke Kusumastuti
Abstract:
The latest Indonesian Biology and Behavior Surveillance (IBBS) conducted by Indonesian Ministry of Health reported a large proportion of men who have sex with men (MSM) engaging in oral sex in their recent sexual history. While it is considered as a pleasuring and safe, oral sex might facilitate the transmission of various sexually transmitted infection (STI) pathogens. This study was aimed to investigate the oral sex practice among MSM in Indonesian urban settings to help delineate demographic and behavior determinants of such practice. In 2014, 501 MSM in 8 clinic-based and outreach STI services were recruited in Jakarta, Yogyakarta and Denpasar, Indonesia. Respondents completed a self-administered questionnaire inquiring about their demographics and sexual history. Median age (interquartile range) of the respondents was 27 (24-30) years; most completed senior high school (54.3%), worked in informal jobs (57.9%), and single (60.9%); and 32.3% reported receiving money in exchange for sex. Oral sex was practiced by most respondents: insertive only (10.0%), receptive only (6.0%), and both (82.4%). A separate multivariable analysis was performed using logistic regression to identify the determinants for receptive and insertive oral sex. Factors associated with receptive oral sex were having more than 10 sex partner(s) in the preceding 6 months vs 1 partner, adjusted odds ratio (aOR) [95% CI]=3.40 [1.22-9.42], p=0.03; and history of receptive-insertive anal sex vs no history, aOR=4.37 [1.76-10.82], p=0.01. Factors associated with insertive oral sex were receiving money for sex vs. not receiving, aOR=2.98 [1.10-8.04], p=0.02; and history of receptive-insertive anal sex vs. no history, aOR=2.10 [0.51-8.74], p<0.001. Only a few respondents reported consistent condom use (11.6% and 12.0% for receptive and insertive oral sex, respectively). Our findings demonstrated that while oral sex is a common practice among MSM, the consistency of condom use in oral sex is very low. In addition, certain sex behavior (number of sex partners, sex work and history of anal sex) were associated with oral sex, and this might need to be addressed during health promotion efforts on STI prevention through oral-genital contact.Keywords: behavior, Indonesia, men who have sex with men, oral sex
Procedia PDF Downloads 241722 Cybersecurity Assessment of Decentralized Autonomous Organizations in Smart Cities
Authors: Claire Biasco, Thaier Hayajneh
Abstract:
A smart city is the integration of digital technologies in urban environments to enhance the quality of life. Smart cities capture real-time information from devices, sensors, and network data to analyze and improve city functions such as traffic analysis, public safety, and environmental impacts. Current smart cities face controversy due to their reliance on real-time data tracking and surveillance. Internet of Things (IoT) devices and blockchain technology are converging to reshape smart city infrastructure away from its centralized model. Connecting IoT data to blockchain applications would create a peer-to-peer, decentralized model. Furthermore, blockchain technology powers the ability for IoT device data to shift from the ownership and control of centralized entities to individuals or communities with Decentralized Autonomous Organizations (DAOs). In the context of smart cities, DAOs can govern cyber-physical systems to have a greater influence over how urban services are being provided. This paper will explore how the core components of a smart city now apply to DAOs. We will also analyze different definitions of DAOs to determine their most important aspects in relation to smart cities. Both categorizations will provide a solid foundation to conduct a cybersecurity assessment of DAOs in smart cities. It will identify the benefits and risks of adopting DAOs as they currently operate. The paper will then provide several mitigation methods to combat cybersecurity risks of DAO integrations. Finally, we will give several insights into what challenges will be faced by DAO and blockchain spaces in the coming years before achieving a higher level of maturity.Keywords: blockchain, IoT, smart city, DAO
Procedia PDF Downloads 121721 Clinical, Demographic and Molecular Characterization of Dengue, Chikungunya and Zika Viruses Causing Hemorrhagic Fever in North India
Authors: Suruchi Shukla, Shantanu Prakash, Amita Jain
Abstract:
Introduction: Arboviral diseases are one of the most common causes of viral hemorrhagic fever (VHF). Of which, Dengue and Chikungunya pose a significant health problem in India. Arbovirus has a tendency to cross the territories and emerge in the new region. Considering the above issues, in the current study active surveillance was conducted among viral hemorrhagic fever (VHF) cases reported from Uttar Pradesh (UP), India. We studied the arboviral etiology of VHF; mainly Dengue, Chikungunya, and ZIKA. Methods: Clinical samples of 465 suspected VHF cases referred to tertiary care referral center of UP, India were enrolled in the study during a period from 15th May 2016 to 9th March 2018. Serum specimens were collected and analyzed for the presence of Dengue, Chikungunya, and ZIKA either by serology and/or by molecular assays. Results: Of all tested, 165 (35.4%) cases were positive for either Dengue or Chikungunya. Dengue (21.2%) was found to be the most prevalent, followed by Chikungunya, (6.6%). None of the cases tested positive for ZIKA virus. Serum samples of 35 (7.5%) cases were positive for both Dengue and Chikungunya. DEN-2 serotype was the most predominant serotype. Phylogenetic and sequence analysis of DEN-2 strains showed 100% clustering with the Cosmopolitan genotype strain. Bleeding from several sites, jaundice, abdominal pain, arthralgia, haemoconcentration, and thrombocytopenia were significantly higher in dengue hemorrhagic cases. However, the rash was significantly more common in Chikungunya patients. Most of the Dengue and Chikungunya positive cases (Age group 6-40 years) were seen in post monsoon season (September to November). Conclusion: Only one-third of total VHF cases are positive for either Dengue/Chikungunya or both. This necessitates the screening of other etiologies capable of causing hemorrhagic manifestations.Keywords: viral hemorrhagic fever, dengue, chikungunya, zika, India
Procedia PDF Downloads 155720 Evaluating the Use of Manned and Unmanned Aerial Vehicles in Strategic Offensive Tasks
Authors: Yildiray Korkmaz, Mehmet Aksoy
Abstract:
In today's operations, countries want to reach their aims in the shortest way due to economical, political and humanitarian aspects. The most effective way of achieving this goal is to be able to penetrate strategic targets. Strategic targets are generally located deep inside of the countries and are defended by modern and efficient surface to air missiles (SAM) platforms which are operated as integrated with Intelligence, Surveillance and Reconnaissance (ISR) systems. On the other hand, these high valued targets are buried deep underground and hardened with strong materials against attacks. Therefore, to penetrate these targets requires very detailed intelligence. This intelligence process should include a wide range that is from weaponry to threat assessment. Accordingly, the framework of the attack package will be determined. This mission package has to execute missions in a high threat environment. The way to minimize the risk which depends on loss of life is to use packages which are formed by UAVs. However, some limitations arising from the characteristics of UAVs restricts the performance of the mission package consisted of UAVs. So, the mission package should be formed with UAVs under the leadership of a fifth generation manned aircraft. Thus, we can minimize the limitations, easily penetrate in the deep inside of the enemy territory with minimum risk, make a decision according to ever-changing conditions and finally destroy the strategic targets. In this article, the strengthens and weakness aspects of UAVs are examined by SWOT analysis. And also, it revealed features of a mission package and presented as an example what kind of a mission package we should form in order to get marginal benefit and penetrate into strategic targets with the development of autonomous mission execution capability in the near future.Keywords: UAV, autonomy, mission package, strategic attack, mission planning
Procedia PDF Downloads 550