Search results for: face recognition system
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 20857

Search results for: face recognition system

19657 Practical Strategies: Challenges in Transforming Theoretical Know-How into Practice for Offering Value-Added Amenities and Services

Authors: Mohammad Ayub Khan

Abstract:

With increased market segmentation and competition in the hotel industry, a hotel’s ability to constantly renovate its services and amenities is a business practice that can be termed as an attitude that is not only flexible but also malleable as a result of which a hotel/property is continually poised to face the ever-changing nature of the hospitality industry and upgrades that keep the hotel or brand in competition with current competitors. One such challenge is to competitively and creatively market value-added amenities, upgraded technology, and marketing all of these as a package to not only stay relevant in the market but also to retain and enhance revenues to ensure the future financial health of a hotel. This delicate balance between staying relevant and financially viable is a crucial challenge that this poster will explore, analyze, and present by specifically looking at the ability of a hotel/brand to effectively translate its theoretical need and practice of constantly staying updated, including strategically renovating, upgrading, modifying its services, into a tangible business practice. In what ways do hotels face this challenge? In what areas of the hotel is this business concept/action most effective and profitable are just some questions that this paper will attempt to answer.

Keywords: hospitality theory, renovations, value-added amenities, strategic planning

Procedia PDF Downloads 366
19656 Insider Fraud and its Risks to FinTechs

Authors: Claire Maillet

Abstract:

Insider fraud, including its various forms such as employee fraud or internal fraud, is a major financial crime threat whereby an employee defrauds (or attempts to defraud) their current, prospective or past employer. ‘Employee’ covers anyone employed by the company, including contractors, agency workers, directors and part time staff. Insider fraud is even more of a concern given the impacts of the Coronavirus pandemic and the cost-of-living crisis, which have generated multiple opportunities to commit insider fraud. Insider fraud is something that is not necessarily thought of as a significant financial crime; Without the face-to-face, ‘over the shoulder’ capabilities of staff being able to keep an eye on their employees, there is a heightened reliance on trust and transparency. With this, naturally, comes an increased risk of insider fraud. Given that the number of FinTechs is on the rise and there is a significant lack of empirically based solutions for reducing insider fraud, these are gaps in the research space that this thesis aims to fill. Finally, Kassem (2022) notes that “academic research plays a crucial role in raising awareness about fraud and researching effective methods for countering it”. Thus, this thesis may be used as an opportune tool to provide an extensive list of controls spanning detection, deterrence and prevention, that are recommended to be implemented to help combat the insider threat.

Keywords: insider fraud, internal fraud, pandemic, Covid-19

Procedia PDF Downloads 20
19655 Highly Accurate Target Motion Compensation Using Entropy Function Minimization

Authors: Amin Aghatabar Roodbary, Mohammad Hassan Bastani

Abstract:

One of the defects of stepped frequency radar systems is their sensitivity to target motion. In such systems, target motion causes range cell shift, false peaks, Signal to Noise Ratio (SNR) reduction and range profile spreading because of power spectrum interference of each range cell in adjacent range cells which induces distortion in High Resolution Range Profile (HRRP) and disrupt target recognition process. Thus Target Motion Parameters (TMPs) effects compensation should be employed. In this paper, such a method for estimating TMPs (velocity and acceleration) and consequently eliminating or suppressing the unwanted effects on HRRP based on entropy minimization has been proposed. This method is carried out in two major steps: in the first step, a discrete search method has been utilized over the whole acceleration-velocity lattice network, in a specific interval seeking to find a less-accurate minimum point of the entropy function. Then in the second step, a 1-D search over velocity is done in locus of the minimum for several constant acceleration lines, in order to enhance the accuracy of the minimum point found in the first step. The provided simulation results demonstrate the effectiveness of the proposed method.

Keywords: automatic target recognition (ATR), high resolution range profile (HRRP), motion compensation, stepped frequency waveform technique (SFW), target motion parameters (TMPs)

Procedia PDF Downloads 151
19654 Peptide-Based Platform for Differentiation of Antigenic Variations within Influenza Virus Subtypes (Flutype)

Authors: Henry Memczak, Marc Hovestaedt, Bernhard Ay, Sandra Saenger, Thorsten Wolff, Frank F. Bier

Abstract:

The influenza viruses cause flu epidemics every year and serious pandemics in larger time intervals. The only cost-effective protection against influenza is vaccination. Due to rapid mutation continuously new subtypes appear, what requires annual reimmunization. For a correct vaccination recommendation, the circulating influenza strains had to be detected promptly and exactly and characterized due to their antigenic properties. During the flu season 2016/17, a wrong vaccination recommendation has been given because of the great time interval between identification of the relevant influenza vaccine strains and outbreak of the flu epidemic during the following winter. Due to such recurring incidents of vaccine mismatches, there is a great need to speed up the process chain from identifying the right vaccine strains to their administration. The monitoring of subtypes as part of this process chain is carried out by national reference laboratories within the WHO Global Influenza Surveillance and Response System (GISRS). To this end, thousands of viruses from patient samples (e.g., throat smears) are isolated and analyzed each year. Currently, this analysis involves complex and time-intensive (several weeks) animal experiments to produce specific hyperimmune sera in ferrets, which are necessary for the determination of the antigen profiles of circulating virus strains. These tests also bear difficulties in standardization and reproducibility, which restricts the significance of the results. To replace this test a peptide-based assay for influenza virus subtyping from corresponding virus samples was developed. The differentiation of the viruses takes place by a set of specifically designed peptidic recognition molecules which interact differently with the different influenza virus subtypes. The differentiation of influenza subtypes is performed by pattern recognition guided by machine learning algorithms, without any animal experiments. Synthetic peptides are immobilized in multiplex format on various platforms (e.g., 96-well microtiter plate, microarray). Afterwards, the viruses are incubated and analyzed comparing different signaling mechanisms and a variety of assay conditions. Differentiation of a range of influenza subtypes, including H1N1, H3N2, H5N1, as well as fine differentiation of single strains within these subtypes is possible using the peptide-based subtyping platform. Thereby, the platform could be capable of replacing the current antigenic characterization of influenza strains using ferret hyperimmune sera.

Keywords: antigenic characterization, influenza-binding peptides, influenza subtyping, influenza surveillance

Procedia PDF Downloads 156
19653 System Identification and Quantitative Feedback Theory Design of a Lathe Spindle

Authors: M. Khairudin

Abstract:

This paper investigates the system identification and design quantitative feedback theory (QFT) for the robust control of a lathe spindle. The dynamic of the lathe spindle is uncertain and time variation due to the deepness variation on cutting process. System identification was used to obtain the dynamics model of the lathe spindle. In this work, real time system identification is used to construct a linear model of the system from the nonlinear system. These linear models and its uncertainty bound can then be used for controller synthesis. The real time nonlinear system identification process to obtain a set of linear models of the lathe spindle that represents the operating ranges of the dynamic system. With a selected input signal, the data of output and response is acquired and nonlinear system identification is performed using Matlab to obtain a linear model of the system. Practical design steps are presented in which the QFT-based conditions are formulated to obtain a compensator and pre-filter to control the lathe spindle. The performances of the proposed controller are evaluated in terms of velocity responses of the the lathe machine spindle in corporating deepness on cutting process.

Keywords: lathe spindle, QFT, robust control, system identification

Procedia PDF Downloads 542
19652 Understanding Children’s Visual Attention to Personal Protective Equipment Using Eye-Tracking

Authors: Vanessa Cho, Janet Hsiao, Nigel King, Robert Anthonappa

Abstract:

Background: The personal protective equipment (PPE) requirements for health care workers (HCWs) have changed significantly during the COVID-19 pandemic. Aim: To ascertain, using eye-tracking technology, what children notice the most when seeing HCWs in various PPE. Design: A Tobii nano pro-eye-tracking camera tracked 156 children's visual attention while they viewed photographs of HCWs in various PPEs. Eye Movement analysis with Hidden Markov Models (EMHMM) was employed to analyse 624 recordings using two approaches, namely (i) data-driven where children's fixation determined the regions of interest (ROIs), and (ii) fixed ROIs where the investigators predefined the ROIs. Results: Two significant eye movement patterns, namely distributed(85.2%) and selective(14.7%), were identified(P<0.05). Most children fixated primarily on the face regardless of the different PPEs. Children fixated equally on all PPE images in the distributed pattern, while a strong preference for unmasked faces was evident in the selective pattern (P<0.01). Conclusion: Children as young as 2.5 years used a top-down visual search behaviour and demonstrated their face processing ability. Most children did not show a strong visual preference for a specific PPE, while a minority preferred PPE with distinct facial features, namely without masks and loupes.

Keywords: COVID-19, PPE, dentistry, pediatric

Procedia PDF Downloads 89
19651 The Noun-Phrase Elements on the Usage of the Zero Article

Authors: Wen Zhen

Abstract:

Compared to content words, function words have been relatively overlooked by English learners especially articles. The article system, to a certain extent, becomes a resistance to know English better, driven by different elements. Three principal factors can be summarized in term of the nature of the articles when referring to the difficulty of the English article system. However, making the article system more complex are difficulties in the second acquisition process, for [-ART] learners have to create another category, causing even most non-native speakers at proficiency level to make errors. According to the sequences of acquisition of the English article, it is showed that the zero article is first acquired and in high inaccuracy. The zero article is often overused in the early stages of L2 acquisition. Although learners at the intermediate level move to underuse the zero article for they realize that the zero article does not cover any case, overproduction of the zero article even occurs among advanced L2 learners. The aim of the study is to investigate noun-phrase factors which give rise to incorrect usage or overuse of the zero article, thus providing suggestions for L2 English acquisition. Moreover, it enables teachers to carry out effective instruction that activate conscious learning of students. The research question will be answered through a corpus-based, data- driven approach to analyze the noun-phrase elements from the semantic context and countability of noun-phrases. Based on the analysis of the International Thurber Thesis corpus, the results show that: (1) Although context of [-definite,-specific] favored the zero article, both[-definite,+specific] and [+definite,-specific] showed less influence. When we reflect on the frequency order of the zero article , prototypicality plays a vital role in it .(2)EFL learners in this study have trouble classifying abstract nouns as countable. We can find that it will bring about overuse of the zero article when learners can not make clear judgements on countability altered from (+definite ) to (-definite).Once a noun is perceived as uncountable by learners, the choice would fall back on the zero article. These findings suggest that learners should be engaged in recognition of the countability of new vocabulary by explaining nouns in lexical phrases and explore more complex aspects such as analysis dependent on discourse.

Keywords: noun phrase, zero article, corpus, second language acquisition

Procedia PDF Downloads 251
19650 Preprocessing and Fusion of Multiple Representation of Finger Vein patterns using Conventional and Machine Learning techniques

Authors: Tomas Trainys, Algimantas Venckauskas

Abstract:

Application of biometric features to the cryptography for human identification and authentication is widely studied and promising area of the development of high-reliability cryptosystems. Biometric cryptosystems typically are designed for patterns recognition, which allows biometric data acquisition from an individual, extracts feature sets, compares the feature set against the set stored in the vault and gives a result of the comparison. Preprocessing and fusion of biometric data are the most important phases in generating a feature vector for key generation or authentication. Fusion of biometric features is critical for achieving a higher level of security and prevents from possible spoofing attacks. The paper focuses on the tasks of initial processing and fusion of multiple representations of finger vein modality patterns. These tasks are solved by applying conventional image preprocessing methods and machine learning techniques, Convolutional Neural Network (SVM) method for image segmentation and feature extraction. An article presents a method for generating sets of biometric features from a finger vein network using several instances of the same modality. Extracted features sets were fused at the feature level. The proposed method was tested and compared with the performance and accuracy results of other authors.

Keywords: bio-cryptography, biometrics, cryptographic key generation, data fusion, information security, SVM, pattern recognition, finger vein method.

Procedia PDF Downloads 150
19649 Tea Club (Singapore)-Learning to Navigate the Social World without Fear: Adapted from PEERS® for Young Adults

Authors: Janice Cheong, Tan Seying

Abstract:

The growing years in adolescence are often a tumultuous time for both the individual and family; this is especially so for individuals with Autism Spectrum Disorder (ASD) and Social Communication Disorder (SCD). Tea Club, which is adapted from the PEERS® for Young Adults, seeks to address some of the social challenges faced by Singaporean adolescents with ASD/SCD while navigating social situations. Tea club (hybrid) consists of face-to-face sessions and virtual sessions. These sessions work with both the adolescent and their parents to tackle the individual's difficulties with social skills, empathy, and loneliness. Prior to the group intervention, both participants and their parents scored on the Test of Adolescent Social Skills Knowledge (TASSK) and Autism Spectrum Quotient (AQ), respectively. The session was spread across four months. At the end of the group based intervention, participants’ and parents’ scores were collected again and compared. Inputs on the programme and participant’s confidence in socialization were also gathered from both participants and their parents and looked at thematically. The findings highlight some of the challenges faced by teens with ASD in Singapore and the benefits of the intervention. Parental sentiments are also examined and discussed.

Keywords: adolescence autism, group intervention, social communication disorder, social skills

Procedia PDF Downloads 142
19648 Usability and Biometric Authentication of Electronic Voting System

Authors: Nighat Ayub, Masood Ahmad

Abstract:

In this paper, a new voting system is developed and its usability is evaluated. The main feature of this system is the biometric verification of the voter and then a few easy steps to cast a vote. As compared to existing systems available, e.g dual vote, the new system requires no training in advance. The security is achieved via multiple key concept (another part of this project). More than 100 student voters were participated in the election from University of Malakanad, Chakdara, PK. To achieve the reliability, the voters cast their votes in two ways, i.e. paper based and electronic based voting using our new system. The results of paper based and electronic voting system are compared and it is concluded that the voters cast their votes for the intended candidates on the electronic voting system. The voters were requested to fill a questionnaire and the results of the questionnaire are carefully analyzed. The results show that the new system proposed in this paper is more secure and usable than other systems.

Keywords: e-voting, security, usability, authentication

Procedia PDF Downloads 390
19647 Study of Structural Health Monitoring System for Vam Cong Cable-Stayed Bridge

Authors: L. M. Chinh

Abstract:

Vam Cong Bridge beside Can Tho Bridge is the next cable-stayed bridge spanning the Hau River, connecting Lap Vo district with Thot Not district. After construction by the end of 2018, the Vam Cong Bridge with Cao Lanh Bridge will help to improve the road network in this region of Mekong Delta. For this bridge, the SHM system also had designed for two stages – construction stage and exploitation stage. At the moment over 65% of the bridge construction had completed, and the bridge will be completed at the end of 2018. During the construction stage, the SHM system had been install to monitor behaviors of the bridge. Based on the study of the design documentation of the SHM system of the Vam Cong Bridge and site visit during construction work, many designs and installation errors have been detected. In this paper author thoroughly analyzed the pros and cons of this SHM system, simultaneously make conclusions and recommendations for this system. Specially concentrated on the possibility of implementing the acoustic emission method (AE) into this SHM system, which is an alternative to the further development of the system, enabling a full and cost-effective solution for the bridge management, which is of utmost importance for the service life and safe operation of the bridge.

Keywords: SHM system, design and installation, Vam Cong bridge, construction stage, acoustic emission method (AE)

Procedia PDF Downloads 234
19646 Challenges to Effective Public Sector Management in Developing Countries: The Networking and Communication Functions of Public Sector Managers in Nigeria and Ghana

Authors: Ethelbert Chinedu Nwokorie

Abstract:

This empirical study analyzes the impact of communication and networking functions of Nigerian and Ghanaian public sector managers’ on public sector effectiveness. The focus is on which of these management functions public sector managers’ in these countries perform most, why, how and how does it affect effectiveness of public sector organizations in the two countries. This qualitative analysis was done by interviewing middle and top level managers in some selected public sector organizations in the two countries on their practical experiences. Findings reveal that ineffectiveness of public sector organizations in Ghana persists because public sector managers perform more of networking functions to promote their individual carrier success and progression in their various organizations, rather than achieving the organizations goals and objectives. In Nigeria, though majority of the interviewed public sector managers perform more communication functions than networking, they do this mostly by treating files and correspondences, instead of face-to-face communication and interaction with employees’. Hence, they hardly relate directly with their employees’ to find out how they are performing their jobs, their challenges, where they are having problems and why. The findings and recommendations of this study will help in improving effectiveness, quality and service delivery in Nigerian and Ghanaian public sector organizations and beyond.

Keywords: effectiveness, communication, employees, management, networking, organization, public sector

Procedia PDF Downloads 452
19645 Monitoring System for Electronic Procurement Systems

Authors: Abdulah Fajar

Abstract:

Electronic Procurement System has been implemented at government institution in Indonesia. This system has been developed centrally at Institution of National Procurement Policy (LKPP) and implemented autonomously at either local or national government institution. The lack of competency at many institution on Information Technology Management arise several major problems. The main concern of LKPP to local administrator is assured that the system is running normally and always be able to serve the needs of its users. Monitoring system has been identified as the one of solution to prevent the problems appeared. Monitoring system is developed using Simple Network Management Protocol (SNMP) and implemented at LKPP. There are two modules; Main Dashboard and Local Agent. Main Dashboard is intended for LKPP and Local Agent is intended to implement at local autonomous e-procurement system (LPSE). There are several resources that must be monitored such as computation, memory and network traffic. Agile paradigm is applied to this project to assure user and system requirement is met. The length of project is the one of reason why agile paradigm has been chosen. The system has been successfully delivered to LKPP.

Keywords: procurement system, SNMP, LKPP, LPSE

Procedia PDF Downloads 425
19644 Evaluating the Total Costs of a Ransomware-Resilient Architecture for Healthcare Systems

Authors: Sreejith Gopinath, Aspen Olmsted

Abstract:

This paper is based on our previous work that proposed a risk-transference-based architecture for healthcare systems to store sensitive data outside the system boundary, rendering the system unattractive to would-be bad actors. This architecture also allows a compromised system to be abandoned and a new system instance spun up in place to ensure business continuity without paying a ransom or engaging with a bad actor. This paper delves into the details of various attacks we simulated against the prototype system. In the paper, we discuss at length the time and computational costs associated with storing and retrieving data in the prototype system, abandoning a compromised system, and setting up a new instance with existing data. Lastly, we simulate some analytical workloads over the data stored in our specialized data storage system and discuss the time and computational costs associated with running analytics over data in a specialized storage system outside the system boundary. In summary, this paper discusses the total costs of data storage, access, and analytics incurred with the proposed architecture.

Keywords: cybersecurity, healthcare, ransomware, resilience, risk transference

Procedia PDF Downloads 130
19643 Polite Request Strategies in Commuter Discourse in Xhosa

Authors: Mawande Dlali

Abstract:

This paper examines the request strategies in commuter discourse involving taxi drivers and passengers in Khayelitsha as well as the responses to these requests. The present study considers requests in commuter transport as face threatening acts (FTAs), hence the need for the commuter crew to strategically shape their communicative actions to achieve their overall discourse goal of getting passengers to perform actions that are in their own interest with minimum resistance or confrontation. The crew presents itself by using communicative devices that prompt the passengers to evaluate it positively as warm, friendly, and respectful. However, the passengers' responses to requests range from compliance to resistance depending on their interpretation of the speaker’s motive and the probable social consequences. Participant observation by the researcher was the main method of collecting examples of requests and responses to the requests. Unstructured interviews and informal discussions were made with randomly selected taxi drivers and commuters. The findings and explanations presented in this article revealed the predominance of polite requests as speech acts in taxi discourse in Khayelitsha. This research makes a contribution to the contemporary pragmatics study of African languages in urban context.

Keywords: face threatening acts, speech acts, request strategies, discourse

Procedia PDF Downloads 163
19642 Design and Development of a Computerized Medical Record System for Hospitals in Remote Areas

Authors: Grace Omowunmi Soyebi

Abstract:

A computerized medical record system is a collection of medical information about a person that is stored on a computer. One principal problem of most hospitals in rural areas is using the file management system for keeping records. A lot of time is wasted when a patient visits the hospital, probably in an emergency, and the nurse or attendant has to search through voluminous files before the patient's file can be retrieved, this may cause an unexpected to happen to the patient. This Data Mining application is to be designed using a Structured System Analysis and design method which will help in a well-articulated analysis of the existing file management system, feasibility study, and proper documentation of the Design and Implementation of a Computerized medical record system. This Computerized system will replace the file management system and help to quickly retrieve a patient's record with increased data security, access clinical records for decision-making, and reduce the time range at which a patient gets attended to.

Keywords: programming, computing, data, innovation

Procedia PDF Downloads 117
19641 An Exploration of the Technical and Economic Feasibility of a Stand Alone Solar PV Generated DC Distribution System over AC Distribution System for Use in the Modern as Well as Future Houses of Isolated Areas

Authors: Alpesh Desai, Indrajit Mukhopadhyay

Abstract:

Standalone Photovoltaic (PV) systems are designed and sized to supply certain AC and/or DC electrical loads. In computers, consumer electronics and many small appliances as well as LED lighting the actual power consumed is DC. The DC system, which requires only voltage control, has many advantages such as feasible connection of the distributed energy sources and reduction of the conversion losses for DC-based loads. Also by using the DC power directly the cost of the size of the Inverter and Solar panel reduced hence the overall cost of the system reduced. This paper explores the technical and economic feasibility of supplying electrical power to homes/houses using DC voltage mains within the house. Theoretical calculated results are presented to demonstrate the advantage of DC system over AC system with PV on sustainable rural/isolated development.

Keywords: distribution system, energy efficiency, off-grid, stand-alone PV system, sustainability, techno-socio-economic

Procedia PDF Downloads 261
19640 Adaptive E-Learning System Using Fuzzy Logic and Concept Map

Authors: Mesfer Al Duhayyim, Paul Newbury

Abstract:

This paper proposes an effective adaptive e-learning system that uses a coloured concept map to show the learner's knowledge level for each concept in the chosen subject area. A Fuzzy logic system is used to evaluate the learner's knowledge level for each concept in the domain, and produce a ranked concept list of learning materials to address weaknesses in the learner’s understanding. This system obtains information on the learner's understanding of concepts by an initial pre-test before the system is used for learning and a post-test after using the learning system. A Fuzzy logic system is used to produce a weighted concept map during the learning process. The aim of this research is to prove that such a proposed novel adapted e-learning system will enhance learner's performance and understanding. In addition, this research aims to increase participants' overall understanding of their learning level by providing a coloured concept map of understanding followed by a ranked concepts list of learning materials.

Keywords: adaptive e-learning system, coloured concept map, fuzzy logic, ranked concept list

Procedia PDF Downloads 292
19639 Human Resource Management Practices and Employee Retention in Public Higher Learning Institutions in the Maldives

Authors: Shaheeb Abdul Azeez, Siong-Choy Chong

Abstract:

Background: Talent retention is increasingly becoming a major challenge for many industries due to the high turnover rate. Public higher learning institutions in the Maldives have a similar situation with the turnover of their employees'. This paper is to identify whether Human Resource Management (HRM) practices have any impact on employee retention in public higher learning institutions in the Maldives. Purpose: This paper aims to identify the influence of HRM practices on employee retention in public higher learning institutions in the Maldives. A total of 15 variables used in this study; 11 HRM practices as independent variables (leadership, rewards, salary, employee participation, compensation, training and development, career development, recognition, appraisal system and supervisor support); job satisfaction and motivation as mediating variables; demographic profile as moderating variable and employee retention as dependent variable. Design/Methodology/Approach: A structured self-administered questionnaire was used for data collection. A total of 300 respondents were selected as the study sample, representing the academic and administrative from public higher learning institutions using a stratified random sampling method. AMOS was used to test the hypotheses constructed. Findings: The results suggest that there is no direct effect between the independent variable and dependent variable. Also, the study concludes that no moderate effects of demographic profile between independent and dependent variables. However, the mediating effects of job satisfaction and motivation in the relationship between HRM practices and employee retention were significant. Salary had a significant influence on job satisfaction, whilst both compensation and recognition have significant influence on motivation. Job satisfaction and motivation were also found to significantly influence employee retention. Research Limitations: The study consists of many variables more time consuming for the respondents to answer the questionnaire. The study is focussed only on public higher learning institutions in the Maldives due to no participation from the private sector higher learning institutions. Therefore, the researcher is unable to identify the actual situation of the higher learning industry in the Maldives. Originality/Value: To our best knowledge, no study has been conducted using the same framework throughout the world. This study is the initial study conducted in the Maldives in this study area and can be used as a baseline for future researches. But there are few types of research conducted on the same subject throughout the world. Some of them concluded with positive findings while others with negative findings. Also, they have used 4 to 7 HRM practices as their study framework.

Keywords: human resource management practices, employee retention, motivation, job satisfaction

Procedia PDF Downloads 156
19638 Child-Friendly Cities: A Child's Participation in the Local Government to Improve the Status of Rights of the Child

Authors: Asma Khalid

Abstract:

Children’s drawings are unique as children are. Children manifest their happiness, sadness, future dreams, likes, dislikes through drawings. Research with children aged 8-12 was conducted in 2017 in which it was asked to them ‘what they think about child-friendly cities?’ The focus was to get ideas from children about the cities in which they live and what they want in their cities. The research was conducted in different private schools. Children were accessed through teachers and principals of the schools (the gatekeepers). Consent forms were developed for children which contained information about the research project and their consent was taken on paper. It was ensured that children are not forced to take part in the research and they can leave the research whenever they want, without informing anyone. The qualitative participatory approach was taken where children were given papers and colors to draw their ideas. During the research, it was found that children are interested in showing their emotions and liking through drawing as this medium seems easy and comfortable to them as compared to have the individual face to face interviews or participate in surveys. However, the clarity of the ideas presented in the drawings was discussed at length with children in their school’s premises. Results of the research show that children like to live in clean, green places which are also safe for them. Furthermore, they want to live with their families and want to have recreational activities including parks in their nearby vicinity.

Keywords: qualitative participative research clean, children, drawing, clean, green and protected place, family

Procedia PDF Downloads 194
19637 Human Identification and Detection of Suspicious Incidents Based on Outfit Colors: Image Processing Approach in CCTV Videos

Authors: Thilini M. Yatanwala

Abstract:

CCTV (Closed-Circuit-Television) Surveillance System is being used in public places over decades and a large variety of data is being produced every moment. However, most of the CCTV data is stored in isolation without having integrity. As a result, identification of the behavior of suspicious people along with their location has become strenuous. This research was conducted to acquire more accurate and reliable timely information from the CCTV video records. The implemented system can identify human objects in public places based on outfit colors. Inter-process communication technologies were used to implement the CCTV camera network to track people in the premises. The research was conducted in three stages and in the first stage human objects were filtered from other movable objects available in public places. In the second stage people were uniquely identified based on their outfit colors and in the third stage an individual was continuously tracked in the CCTV network. A face detection algorithm was implemented using cascade classifier based on the training model to detect human objects. HAAR feature based two-dimensional convolution operator was introduced to identify features of the human face such as region of eyes, region of nose and bridge of the nose based on darkness and lightness of facial area. In the second stage outfit colors of human objects were analyzed by dividing the area into upper left, upper right, lower left, lower right of the body. Mean color, mod color and standard deviation of each area were extracted as crucial factors to uniquely identify human object using histogram based approach. Color based measurements were written in to XML files and separate directories were maintained to store XML files related to each camera according to time stamp. As the third stage of the approach, inter-process communication techniques were used to implement an acknowledgement based CCTV camera network to continuously track individuals in a network of cameras. Real time analysis of XML files generated in each camera can determine the path of individual to monitor full activity sequence. Higher efficiency was achieved by sending and receiving acknowledgments only among adjacent cameras. Suspicious incidents such as a person staying in a sensitive area for a longer period or a person disappeared from the camera coverage can be detected in this approach. The system was tested for 150 people with the accuracy level of 82%. However, this approach was unable to produce expected results in the presence of group of people wearing similar type of outfits. This approach can be applied to any existing camera network without changing the physical arrangement of CCTV cameras. The study of human identification and suspicious incident detection using outfit color analysis can achieve higher level of accuracy and the project will be continued by integrating motion and gait feature analysis techniques to derive more information from CCTV videos.

Keywords: CCTV surveillance, human detection and identification, image processing, inter-process communication, security, suspicious detection

Procedia PDF Downloads 181
19636 Exercise Behavior of Infertile Women at Risk of Osteoporosis: Application of The Health Belief Model

Authors: Arezoo Fallahi

Abstract:

We aimed at investigating the association between health beliefs and exercise behavior in infertile women who were at risk of developing osteoporosis. This cross-sectional study was conducted in Sanandaj city, west of Iran in 2018. From 35 comprehensive healthcare centers, 483 infertile women were included in the study through convenience sampling. Standardized face-to-face interviews were conducted using established, reliable instruments for the assessment of exercise behavior behavior and health beliefs. Logistic regression models were applied to assess the association between exercise behavior and health beliefs. Estimates were adjusted for age, job status, income, literacy, and duration and type of infertility. We reported estimated logits and Odds Ratios (OR) with corresponding 95% confidence intervals (95% CI). Employed women compared to housewives had substantially higher odds of adopting exercise behavior behaviors (OR=3.19, 95% CI=1.53-6.66, p<0.01). Moreover, the odds of exercise behavior adoption increased with self-efficacy (OR=1.35, 95% CI=1.20-1.52, p<0.01), and decreased with perceived barriers (OR=0.90, 95% CI=0.84-0.97, p<0.01). It is essential to increase perceived self-efficacy and reduce perceived barriers to promote EB in infertile women. Consequently, health professionals should develop or adopt appropriate strategies to decrease barriers and increase self-efficacy to enhance exercise behavior in this group of women.

Keywords: infertility, women, exercise, osteoporosis

Procedia PDF Downloads 70
19635 An Advanced Automated Brain Tumor Diagnostics Approach

Authors: Berkan Ural, Arif Eser, Sinan Apaydin

Abstract:

Medical image processing is generally become a challenging task nowadays. Indeed, processing of brain MRI images is one of the difficult parts of this area. This study proposes a hybrid well-defined approach which is consisted from tumor detection, extraction and analyzing steps. This approach is mainly consisted from a computer aided diagnostics system for identifying and detecting the tumor formation in any region of the brain and this system is commonly used for early prediction of brain tumor using advanced image processing and probabilistic neural network methods, respectively. For this approach, generally, some advanced noise removal functions, image processing methods such as automatic segmentation and morphological operations are used to detect the brain tumor boundaries and to obtain the important feature parameters of the tumor region. All stages of the approach are done specifically with using MATLAB software. Generally, for this approach, firstly tumor is successfully detected and the tumor area is contoured with a specific colored circle by the computer aided diagnostics program. Then, the tumor is segmented and some morphological processes are achieved to increase the visibility of the tumor area. Moreover, while this process continues, the tumor area and important shape based features are also calculated. Finally, with using the probabilistic neural network method and with using some advanced classification steps, tumor area and the type of the tumor are clearly obtained. Also, the future aim of this study is to detect the severity of lesions through classes of brain tumor which is achieved through advanced multi classification and neural network stages and creating a user friendly environment using GUI in MATLAB. In the experimental part of the study, generally, 100 images are used to train the diagnostics system and 100 out of sample images are also used to test and to check the whole results. The preliminary results demonstrate the high classification accuracy for the neural network structure. Finally, according to the results, this situation also motivates us to extend this framework to detect and localize the tumors in the other organs.

Keywords: image processing algorithms, magnetic resonance imaging, neural network, pattern recognition

Procedia PDF Downloads 416
19634 Set-point Performance Evaluation of Robust ‎Back-Stepping Control Design for a Nonlinear ‎Electro-‎Hydraulic Servo System

Authors: Maria Ahmadnezhad, Seyedgharani Ghoreishi ‎

Abstract:

Electrohydraulic servo system have been used in industry in a wide ‎number of applications. Its ‎dynamics are highly nonlinear and also ‎have large extent of model uncertainties and external ‎disturbances. ‎In this thesis, a robust back-stepping control (RBSC) scheme is ‎proposed to overcome ‎the problem of disturbances and system ‎uncertainties effectively and to improve the set-point ‎performance ‎of EHS systems. In order to implement the proposed control ‎scheme, the system ‎uncertainties in EHS systems are considered as ‎total leakage coefficient and effective oil volume. In ‎addition, in ‎order to obtain the virtual controls for stabilizing system, the ‎update rule for the ‎system uncertainty term is induced by the ‎Lyapunov control function (LCF). To verify the ‎performance and ‎robustness of the proposed control system, computer simulation of ‎the ‎proposed control system using Matlab/Simulink Software is ‎executed. From the computer ‎simulation, it was found that the ‎RBSC system produces the desired set-point performance and ‎has ‎robustness to the disturbances and system uncertainties of ‎EHS systems.‎

Keywords: electro hydraulic servo system, back-stepping control, robust back-‎stepping control, Lyapunov redesign‎

Procedia PDF Downloads 1002
19633 The Methodology of System Modeling of Mechatronic Systems

Authors: Lakhoua Najeh

Abstract:

Aims of the work: After a presentation of the functionality of an example of a mechatronic system which is a paint mixer system, we present the concepts of modeling and safe operation. This paper briefly discusses how to model and protect the functioning of a mechatronic system relying mainly on functional analysis and safe operation techniques. Methods: For the study of an example of a mechatronic system, we use methods for external functional analysis that illustrate the relationships between a mechatronic system and its external environment. Thus, we present the Safe-Structured Analysis Design Technique method (Safe-SADT) which allows the representation of a mechatronic system. A model of operating safety and automation is proposed. This model enables us to use a functional analysis technique of the mechatronic system based on the GRAFCET (Graphe Fonctionnel de Commande des Etapes et Transitions: Step Transition Function Chart) method; study of the safe operation of the mechatronic system based on the Safe-SADT method; automation of the mechatronic system based on a software tool. Results: The expected results are to propose a model and safe operation of a mechatronic system. This methodology enables us to analyze the relevance of the different models based on Safe-SADT and GRAFCET in relation to the control and monitoring functions and to study the means allowing exploiting their synergy. Conclusion: In order to propose a general model of a mechatronic system, a model of analysis, safety operation and automation of a mechatronic system has been developed. This is how we propose to validate this methodology through a case study of a paint mixer system.

Keywords: mechatronic systems, system modeling, safe operation, Safe-SADT

Procedia PDF Downloads 243
19632 Numerical Solution of Space Fractional Order Solute Transport System

Authors: Shubham Jaiswal

Abstract:

In the present article, a drive is taken to compute the solution of spatial fractional order advection-dispersion equation having source/sink term with given initial and boundary conditions. The equation is converted to a system of ordinary differential equations using second-kind shifted Chebyshev polynomials, which have finally been solved using finite difference method. The striking feature of the article is the fast transportation of solute concentration as and when the system approaches fractional order from standard order for specified values of the parameters of the system.

Keywords: spatial fractional order advection-dispersion equation, second-kind shifted Chebyshev polynomial, collocation method, conservative system, non-conservative system

Procedia PDF Downloads 260
19631 Spatial Object-Oriented Template Matching Algorithm Using Normalized Cross-Correlation Criterion for Tracking Aerial Image Scene

Authors: Jigg Pelayo, Ricardo Villar

Abstract:

Leaning on the development of aerial laser scanning in the Philippine geospatial industry, researches about remote sensing and machine vision technology became a trend. Object detection via template matching is one of its application which characterized to be fast and in real time. The paper purposely attempts to provide application for robust pattern matching algorithm based on the normalized cross correlation (NCC) criterion function subjected in Object-based image analysis (OBIA) utilizing high-resolution aerial imagery and low density LiDAR data. The height information from laser scanning provides effective partitioning order, thus improving the hierarchal class feature pattern which allows to skip unnecessary calculation. Since detection is executed in the object-oriented platform, mathematical morphology and multi-level filter algorithms were established to effectively avoid the influence of noise, small distortion and fluctuating image saturation that affect the rate of recognition of features. Furthermore, the scheme is evaluated to recognized the performance in different situations and inspect the computational complexities of the algorithms. Its effectiveness is demonstrated in areas of Misamis Oriental province, achieving an overall accuracy of 91% above. Also, the garnered results portray the potential and efficiency of the implemented algorithm under different lighting conditions.

Keywords: algorithm, LiDAR, object recognition, OBIA

Procedia PDF Downloads 242
19630 Machine Learning Strategies for Data Extraction from Unstructured Documents in Financial Services

Authors: Delphine Vendryes, Dushyanth Sekhar, Baojia Tong, Matthew Theisen, Chester Curme

Abstract:

Much of the data that inform the decisions of governments, corporations and individuals are harvested from unstructured documents. Data extraction is defined here as a process that turns non-machine-readable information into a machine-readable format that can be stored, for instance, in a database. In financial services, introducing more automation in data extraction pipelines is a major challenge. Information sought by financial data consumers is often buried within vast bodies of unstructured documents, which have historically required thorough manual extraction. Automated solutions provide faster access to non-machine-readable datasets, in a context where untimely information quickly becomes irrelevant. Data quality standards cannot be compromised, so automation requires high data integrity. This multifaceted task is broken down into smaller steps: ingestion, table parsing (detection and structure recognition), text analysis (entity detection and disambiguation), schema-based record extraction, user feedback incorporation. Selected intermediary steps are phrased as machine learning problems. Solutions leveraging cutting-edge approaches from the fields of computer vision (e.g. table detection) and natural language processing (e.g. entity detection and disambiguation) are proposed.

Keywords: computer vision, entity recognition, finance, information retrieval, machine learning, natural language processing

Procedia PDF Downloads 109
19629 Development of Intelligent Smart Multi Tracking Agent System to Support of Logistics Safety

Authors: Umarov Jamshid, Ju-Su Kim, Hak-Jun Lee, Man-Kyo Han, Ryum-Duck Oh

Abstract:

Recently, it becomes convenient to identify the location information of cargos by using GPS and wireless communication technologies. The development of IoT technologies and tracking system allows us to confirm site situation on an ad hoc basis in all the industries and social environments. Moreover, it allows us to apply IT technologies to a manageable extent. However, there have been many limitations for using the system due to the difficulty of identifying location information in real time and also due to the simple features. To globalize the logistics related tracking system, it is required to conduct a study to resolve the aforementioned problem. On that account, this paper designed and developed the IoT and RTLS based intelligent multi tracking agent system for more secure, accurate and reliable transportation in relation to logistics.

Keywords: GPS, tracking agent system, IoT, RTLS, Logistics

Procedia PDF Downloads 644
19628 The Enlightenment of the Ventilation System in Chinese Traditional Residence to Architecture Design

Authors: Wu Xingchun, Chen Xi

Abstract:

Nowadays, China's building energy consumption constitutes 25% of the total energy consumption, half of which was caused by air conditioning in both summer and winter. The ventilation system in Chinese traditional residence, which is totally passive and environmentally friendly, works effectively to create comfortable indoor environment. The research on the ventilation system in Chinese traditional residence can provide advancements to architecture design and energy savings to the society. Through field investigation, case analysis, strategy proposing and other methods, it comes out that the location and layout, the structure system and the design of atrium are the most important elements for a good ventilation system. Taking every factor into consideration, techniques are deployed extensively such as the organization of draught, the design of the thermal pressure ventilation system and the application of modern materials. With the enlightenment of the ventilation system in Chinese traditional residence, we can take effective measures to achieve low energy consumption and sustainable architecture.

Keywords: ventilation system, chinese traditional residence, energy consumption, sustainable architecture

Procedia PDF Downloads 705