Search results for: computer/notebook
1112 Deep-Learning to Generation of Weights for Image Captioning Using Part-of-Speech Approach
Authors: Tiago do Carmo Nogueira, Cássio Dener Noronha Vinhal, Gélson da Cruz Júnior, Matheus Rudolfo Diedrich Ullmann
Abstract:
Generating automatic image descriptions through natural language is a challenging task. Image captioning is a task that consistently describes an image by combining computer vision and natural language processing techniques. To accomplish this task, cutting-edge models use encoder-decoder structures. Thus, Convolutional Neural Networks (CNN) are used to extract the characteristics of the images, and Recurrent Neural Networks (RNN) generate the descriptive sentences of the images. However, cutting-edge approaches still suffer from problems of generating incorrect captions and accumulating errors in the decoders. To solve this problem, we propose a model based on the encoder-decoder structure, introducing a module that generates the weights according to the importance of the word to form the sentence, using the part-of-speech (PoS). Thus, the results demonstrate that our model surpasses state-of-the-art models.Keywords: gated recurrent units, caption generation, convolutional neural network, part-of-speech
Procedia PDF Downloads 1021111 Developing Cucurbitacin a Minimum Inhibition Concentration of Meloidogyne Incognita Using a Computer-Based Model
Authors: Zakheleni P. Dube, Phatu W. Mashela
Abstract:
Minimum inhibition concentration (MIC) is the lowest concentration of a chemical that brings about significant inhibition of target organism. The conventional method for establishing the MIC for phytonematicides is tedious. The objective of this study was to use the Curve-fitting Allelochemical Response Data (CARD) to determine the MIC for pure cucurbitacin A on Meloidogyne incognita second-stage juveniles (J2) hatch, immobility and mortality. Meloidogyne incognita eggs and freshly hatched J2 were separately exposed to a series of pure cucurbitacin A concentrations of 0.00, 0.25, 0.50, 0.75, 1.00, 1.25, 1.50, 1.75, 2.00, 2.25 and 2.50 μg.mL⁻¹for 12, 24, 48 and 72 h in an incubator set at 25 ± 2°C. Meloidogyne incognita J2 hatch, immobility and mortality counts were determined using a stereomicroscope and the significant means were subjected to the CARD model. The model exhibited density-dependent growth (DDG) patterns of J2 hatch, immobility and mortality to increasing concentrations of cucurbitacin A. The average MIC for cucurbitacin A on M. incognita J2 hatch, immobility and mortality were 2.2, 0.58 and 0.63 µg.mL⁻¹, respectively. Meloidogyne incognita J2 hatch had the highest average MIC value followed by mortality and immobility had the least. In conclusion, the CARD model was able to generate MIC for cucurbitacin A, hence it could serve as a valuable tool in the chemical-nematode bioassay studies.Keywords: inhibition concentration, phytonematicide, sensitivity index, threshold stimulation, triterpenoids.
Procedia PDF Downloads 1901110 An Analysis of Packaging Materials for an Energy-Efficient Wrapping System
Authors: John Sweeney, Martin Leeming, Raj Thaker, Cristina L. Tuinea-Bobe
Abstract:
Shrink wrapping is widely used as a method for secondary packaging to assemble individual items, such as cans or other consumer products, into single packages. This method involves conveying the packages into heated tunnels and so has the disadvantages that it is energy-intensive, and, in the case of aerosol products, potentially hazardous. We are developing an automated packaging system that uses stretch wrapping to address both these problems, by using a mechanical rather than a thermal process. In this study, we present a comparative study of shrink wrapping and stretch wrapping materials to assess the relative capability of candidate stretch wrap polymer film in terms of mechanical response. The stretch wrap materials are of oriented polymer and therefore elastically anisotropic. We are developing material constitutive models that include both anisotropy and nonlinearity. These material models are to be incorporated into computer simulations of the automated stretch wrapping system. We present results showing the validity of these models and the feasibility of applying them in the simulations.Keywords: constitutive model, polymer, mechanical testing, wrapping system
Procedia PDF Downloads 2931109 The OLOS® Way to Cultural Heritage: User Interface with Anthropomorphic Characteristics
Authors: Daniele Baldacci, Remo Pareschi
Abstract:
Augmented Reality and Augmented Intelligence are radically changing information technology. The path that starts from the keyboard and then, passing through milestones such as Siri, Alexa and other vocal avatars, reaches a more fluid and natural communication with computers, thus converting the dichotomy between man and machine into a harmonious interaction, now heads unequivocally towards a new IT paradigm, where holographic computing will play a key role. The OLOS® platform contributes substantially to this trend in that it infuses computers with human features, by transferring the gestures and expressions of persons of flesh and bones to anthropomorphic holographic interfaces which in turn will use them to interact with real-life humans. In fact, we could say, boldly but with a solid technological background to back the statement, that OLOS® gives reality to an altogether new entity, placed at the exact boundary between nature and technology, namely the holographic human being. Holographic humans qualify as the perfect carriers for the virtual reincarnation of characters handed down from history and tradition. Thus, they provide for an innovative and highly immersive way of experiencing our cultural heritage as something alive and pulsating in the present.Keywords: digital cinematography, human-computer interfaces, holographic simulation, interactive museum exhibits
Procedia PDF Downloads 1151108 Data Hiding by Vector Quantization in Color Image
Authors: Yung Gi Wu
Abstract:
With the growing of computer and network, digital data can be spread to anywhere in the world quickly. In addition, digital data can also be copied or tampered easily so that the security issue becomes an important topic in the protection of digital data. Digital watermark is a method to protect the ownership of digital data. Embedding the watermark will influence the quality certainly. In this paper, Vector Quantization (VQ) is used to embed the watermark into the image to fulfill the goal of data hiding. This kind of watermarking is invisible which means that the users will not conscious the existing of embedded watermark even though the embedded image has tiny difference compared to the original image. Meanwhile, VQ needs a lot of computation burden so that we adopt a fast VQ encoding scheme by partial distortion searching (PDS) and mean approximation scheme to speed up the data hiding process. The watermarks we hide to the image could be gray, bi-level and color images. Texts are also can be regarded as watermark to embed. In order to test the robustness of the system, we adopt Photoshop to fulfill sharpen, cropping and altering to check if the extracted watermark is still recognizable. Experimental results demonstrate that the proposed system can resist the above three kinds of tampering in general cases.Keywords: data hiding, vector quantization, watermark, color image
Procedia PDF Downloads 3641107 Necessary Steps for Optimizing Electricity Generation Programs from Ahvaz Electricity Plants, Iran
Authors: Sara Zadehomidi
Abstract:
Iran, a geographically arid and semi-arid country, experiences varying levels of rainfall across its territory. Five major and important rivers, namely Karun, Dez, Karkheh, Jarrahi, and Hendijan, are valuable assets of the Khuzestan province. To address various needs, including those of farmers (especially during hot seasons with no rainfall), drinking water requirements, industrial and environmental, and most importantly, electricity production, dams have been constructed on several of these rivers, with some dams still under construction. The outflow of water from dam reservoirs must be managed in a way that not only preserves the reservoir's potential effectively but also ensures the maximum revenue from electricity generation. Furthermore, it should meet the other mentioned requirements. In this study, scientific methods such as optimization using Lingo software were employed to achieve these objectives. The results, when executed and adhering to the proposed electricity production program with Lingo software, indicate a 35.7% increase in electricity sales revenue over a one-year examination period. Considering that several electricity plants are currently under construction, the importance and necessity of utilizing computer systems for expediting and optimizing the electricity generation program planning from electricity plants will become evident in the future.Keywords: Ahvaz, electricity generation programs, Iran, optimizing
Procedia PDF Downloads 641106 Magnet Position Variation of the Electromagnetic Actuation System in a Torsional Scanner
Authors: Loke Kean Koay, Mani Maran Ratnam
Abstract:
A mechanically-resonant torsional spring scanner was developed in a recent study. Various methods were developed to improve the angular displacement of the scanner while maintaining the scanner frequency. However, the effects of rotor magnet radial position on scanner characteristics were not well investigated. In this study, the relationships between the magnet position and the scanner characteristics such as natural frequency, angular displacement and stress level were studied. A finite element model was created and an average deviation of 3.18% was found between the simulation and experimental results, qualifying the simulation results as a guide for further investigations. Three magnet positions on the transverse oscillating suspended plate were investigated by finite element analysis (FEA) and one of the positions were selected as the design position. The magnet position with the longest distance from the twist axis of the mirror was selected since it attains minimum stress level while exceeding the minimum critical flicker frequency and delivering the targeted angular displacement to the scanner.Keywords: torsional scanner, design optimization, computer-aided design, magnet position variation
Procedia PDF Downloads 3661105 Deep Learning Based Unsupervised Sport Scene Recognition and Highlights Generation
Authors: Ksenia Meshkova
Abstract:
With increasing amount of multimedia data, it is very important to automate and speed up the process of obtaining meta. This process means not just recognition of some object or its movement, but recognition of the entire scene versus separate frames and having timeline segmentation as a final result. Labeling datasets is time consuming, besides, attributing characteristics to particular scenes is clearly difficult due to their nature. In this article, we will consider autoencoders application to unsupervised scene recognition and clusterization based on interpretable features. Further, we will focus on particular types of auto encoders that relevant to our study. We will take a look at the specificity of deep learning related to information theory and rate-distortion theory and describe the solutions empowering poor interpretability of deep learning in media content processing. As a conclusion, we will present the results of the work of custom framework, based on autoencoders, capable of scene recognition as was deeply studied above, with highlights generation resulted out of this recognition. We will not describe in detail the mathematical description of neural networks work but will clarify the necessary concepts and pay attention to important nuances.Keywords: neural networks, computer vision, representation learning, autoencoders
Procedia PDF Downloads 1271104 Minimization of Seepage in Sandy Soil Using Different Grouting Types
Authors: Eng. M. Ahmed, A. Ibrahim, M. Ashour
Abstract:
One of the major concerns facing dam is the repair of their structures to prevent the seepage under them. In previous years, many existing dams have been treated by grouting, but with varying degrees of success. One of the major reasons for this erratic performance is the unsuitable selection of the grouting materials to reduce the seepage. Grouting is an effective way to improve the engineering properties of the soil and strengthen of the permeability of the soil to reduce the seepage. The purpose of this paper is to focus on the efficiency of current available grouting materials and techniques from construction, environmental and economical point of view. The seepage reduction usually accomplished by either chemical grouting or cementious grouting using ultrafine cement. In addition, the study shows a comparison between grouting materials according to their degree of permeability reduction and cost. The application of seepage reduction is based on the permeation grouting using grout curtain installation. The computer program (SEEP/W) is employed to model a dam rested on sandy soil, using grout curtain to reduce seepage quantity and hydraulic gradient by different grouting materials. This study presents a relationship that takes into account the permeability of the soil, grout curtain spacing and a new performance parameter that can be used to predict the best selection of grouting materials for seepage reduction.Keywords: seepage, sandy soil, grouting, permeability
Procedia PDF Downloads 3671103 Iraqi Short Term Electrical Load Forecasting Based on Interval Type-2 Fuzzy Logic
Authors: Firas M. Tuaimah, Huda M. Abdul Abbas
Abstract:
Accurate Short Term Load Forecasting (STLF) is essential for a variety of decision making processes. However, forecasting accuracy can drop due to the presence of uncertainty in the operation of energy systems or unexpected behavior of exogenous variables. Interval Type 2 Fuzzy Logic System (IT2 FLS), with additional degrees of freedom, gives an excellent tool for handling uncertainties and it improved the prediction accuracy. The training data used in this study covers the period from January 1, 2012 to February 1, 2012 for winter season and the period from July 1, 2012 to August 1, 2012 for summer season. The actual load forecasting period starts from January 22, till 28, 2012 for winter model and from July 22 till 28, 2012 for summer model. The real data for Iraqi power system which belongs to the Ministry of Electricity.Keywords: short term load forecasting, prediction interval, type 2 fuzzy logic systems, electric, computer systems engineering
Procedia PDF Downloads 3971102 Open Source, Open Hardware Ground Truth for Visual Odometry and Simultaneous Localization and Mapping Applications
Authors: Janusz Bedkowski, Grzegorz Kisala, Michal Wlasiuk, Piotr Pokorski
Abstract:
Ground-truth data is essential for VO (Visual Odometry) and SLAM (Simultaneous Localization and Mapping) quantitative evaluation using e.g. ATE (Absolute Trajectory Error) and RPE (Relative Pose Error). Many open-access data sets provide raw and ground-truth data for benchmark purposes. The issue appears when one would like to validate Visual Odometry and/or SLAM approaches on data captured using the device for which the algorithm is targeted for example mobile phone and disseminate data for other researchers. For this reason, we propose an open source, open hardware groundtruth system that provides an accurate and precise trajectory with a 3D point cloud. It is based on LiDAR Livox Mid-360 with a non-repetitive scanning pattern, on-board Raspberry Pi 4B computer, battery and software for off-line calculations (camera to LiDAR calibration, LiDAR odometry, SLAM, georeferencing). We show how this system can be used for the evaluation of various the state of the art algorithms (Stella SLAM, ORB SLAM3, DSO) in typical indoor monocular VO/SLAM.Keywords: SLAM, ground truth, navigation, LiDAR, visual odometry, mapping
Procedia PDF Downloads 691101 Learning from Small Amount of Medical Data with Noisy Labels: A Meta-Learning Approach
Authors: Gorkem Algan, Ilkay Ulusoy, Saban Gonul, Banu Turgut, Berker Bakbak
Abstract:
Computer vision systems recently made a big leap thanks to deep neural networks. However, these systems require correctly labeled large datasets in order to be trained properly, which is very difficult to obtain for medical applications. Two main reasons for label noise in medical applications are the high complexity of the data and conflicting opinions of experts. Moreover, medical imaging datasets are commonly tiny, which makes each data very important in learning. As a result, if not handled properly, label noise significantly degrades the performance. Therefore, a label-noise-robust learning algorithm that makes use of the meta-learning paradigm is proposed in this article. The proposed solution is tested on retinopathy of prematurity (ROP) dataset with a very high label noise of 68%. Results show that the proposed algorithm significantly improves the classification algorithm's performance in the presence of noisy labels.Keywords: deep learning, label noise, robust learning, meta-learning, retinopathy of prematurity
Procedia PDF Downloads 1611100 A Simple Algorithm for Real-Time 3D Capturing of an Interior Scene Using a Linear Voxel Octree and a Floating Origin Camera
Authors: Vangelis Drosos, Dimitrios Tsoukalos, Dimitrios Tsolis
Abstract:
We present a simple algorithm for capturing a 3D scene (focused on the usage of mobile device cameras in the context of augmented/mixed reality) by using a floating origin camera solution and storing the resulting information in a linear voxel octree. Data is derived from cloud points captured by a mobile device camera. For the purposes of this paper, we assume a scene of fixed size (known to us or determined beforehand) and a fixed voxel resolution. The resulting data is stored in a linear voxel octree using a hashtable. We commence by briefly discussing the logic behind floating origin approaches and the usage of linear voxel octrees for efficient storage. Following that, we present the algorithm for translating captured feature points into voxel data in the context of a fixed origin world and storing them. Finally, we discuss potential applications and areas of future development and improvement to the efficiency of our solution.Keywords: voxel, octree, computer vision, XR, floating origin
Procedia PDF Downloads 1331099 Object Trajectory Extraction by Using Mean of Motion Vectors Form Compressed Video Bitstream
Authors: Ching-Ting Hsu, Wei-Hua Ho, Yi-Chun Chang
Abstract:
Video object tracking is one of the popular research topics in computer graphics area. The trajectory can be applied in security, traffic control, even the sports training. The trajectory for sports training can be utilized to analyze the athlete’s performance without traditional sensors. There are many relevant works which utilize mean shift algorithm with background subtraction. This kind of the schemes should select a kernel function which may affect the accuracy and performance. In this paper, we consider the motion information in the pre-coded bitstream. The proposed algorithm extracts the trajectory by composing the motion vectors from the pre-coded bitstream. We gather the motion vectors from the overlap area of the object and calculate mean of the overlapped motion vectors. We implement and simulate our proposed algorithm in H.264 video codec. The performance is better than relevant works and keeps the accuracy of the object trajectory. The experimental results show that the proposed trajectory extraction can extract trajectory form the pre-coded bitstream in high accuracy and achieve higher performance other relevant works.Keywords: H.264, video bitstream, video object tracking, sports training
Procedia PDF Downloads 4281098 Deep Learning based Image Classifiers for Detection of CSSVD in Cacao Plants
Authors: Atuhurra Jesse, N'guessan Yves-Roland Douha, Pabitra Lenka
Abstract:
The detection of diseases within plants has attracted a lot of attention from computer vision enthusiasts. Despite the progress made to detect diseases in many plants, there remains a research gap to train image classifiers to detect the cacao swollen shoot virus disease or CSSVD for short, pertinent to cacao plants. This gap has mainly been due to the unavailability of high quality labeled training data. Moreover, institutions have been hesitant to share their data related to CSSVD. To fill these gaps, image classifiers to detect CSSVD-infected cacao plants are presented in this study. The classifiers are based on VGG16, ResNet50 and Vision Transformer (ViT). The image classifiers are evaluated on a recently released and publicly accessible KaraAgroAI Cocoa dataset. The best performing image classifier, based on ResNet50, achieves 95.39\% precision, 93.75\% recall, 94.34\% F1-score and 94\% accuracy on only 20 epochs. There is a +9.75\% improvement in recall when compared to previous works. These results indicate that the image classifiers learn to identify cacao plants infected with CSSVD.Keywords: CSSVD, image classification, ResNet50, vision transformer, KaraAgroAI cocoa dataset
Procedia PDF Downloads 1031097 'Violence Is Bad, but It's Just a Game': The Glorification of Violence from Roman Antiquity to Popular Culture
Authors: M. C. Steyn
Abstract:
Violence and entertainment are not mutually exclusive subjects in the Ancient Roman world, in reality they are closely knit together. Their world is permeated by repeated and continuous episodes of violence in its many manifestations, both sanctioned and spontaneous, most of which is considered as some form of entertainment, from plays and writings through the spectrum to the gladiatorial arena. In the 21st century this socio-psychological dynamic is manifested through the stage provided by the screen and what we watch in terms of TV, movies and games. This glorification of violence in a modern world is not out of place as seen in contemporary post apocalyptical/ dystopian literature, film and computer games where the act of violence, frowned upon by social norms and values, becomes sanctioned by the (un)real nature of the game: ‘I am not a violent person, violence is bad, this is just a game’. This paper will examine how violence is framed in the Ancient World and subsequently how it is received by popular culture to represent a world in which the maintenance of stability can only be achieved through officially sanctioned violence, whether sanctioned by the State or the gaming community. This argument will examine both ancient and modern critics of violence such as Senecca, Coleman and Foucault and framed by Baudrillard’s commentary on the post-modern conceptualization of reality.Keywords: entertainment, violence, gladiatorial games, gaming
Procedia PDF Downloads 4901096 Students’ Motivation, Self-Determination, Test Anxiety and Academic Engagement
Authors: Shakirat Abimbola Adesola, Shuaib Akintunde Asifat, Jelili Olalekan Amoo
Abstract:
This paper presented the impact of students’ emotions on learning when receiving lectures and when taking tests. It was observed that students experience different types of emotions during the study, and this was found to have a significant effect on their academic performance. A total of one thousand six hundred and seventy-five (1675) students from the department of Computer Science in two Colleges of Education in South-West Nigeria took part in this study. The students were randomly selected for the research. Sample comprises of 968 males representing 58%, and 707 females representing 42%. A structured questionnaire, of Motivated Strategies for Learning Questionnaire (MSLQ) was distributed to the participants to obtain their opinions. Data gathered were analyzed using the IBM SPSS 20 to obtain ANOVA, descriptive analysis, stepwise regression, and reliability tests. The results revealed that emotion moderately shape students’ motivation and engagement in learning; and that self-regulation and self-determination do have significant impact on academic performance. It was further revealed that test anxiety has a significant correlation with academic performance.Keywords: motivation, self-determination, test anxiety, academic performance, and academic engagement
Procedia PDF Downloads 811095 A New Computational Tool for Noise Prediction of Rotating Surfaces (FACT)
Authors: Ana Vieira, Fernando Lau, João Pedro Mortágua, Luís Cruz, Rui Santos
Abstract:
The air transport impact on environment is more than ever a limitative obstacle to the aeronautical industry continuous growth. Over the last decades, considerable effort has been carried out in order to obtain quieter aircraft solutions, whether by changing the original design or investigating more silent maneuvers. The noise propagated by rotating surfaces is one of the most important sources of annoyance, being present in most aerial vehicles. Bearing this is mind, CEIIA developed a new computational chain for noise prediction with in-house software tools to obtain solutions in relatively short time without using excessive computer resources. This work is based on the new acoustic tool, which aims to predict the rotor noise generated during steady and maneuvering flight, making use of the flexibility of the C language and the advantages of GPU programming in terms of velocity. The acoustic tool is based in the Formulation 1A of Farassat, capable of predicting two important types of noise: the loading and thickness noise. The present work describes the most important features of the acoustic tool, presenting its most relevant results and framework analyses for helicopters and UAV quadrotors.Keywords: rotor noise, acoustic tool, GPU Programming, UAV noise
Procedia PDF Downloads 4011094 Classifications of Images for the Recognition of People’s Behaviors by SIFT and SVM
Authors: Henni Sid Ahmed, Belbachir Mohamed Faouzi, Jean Caelen
Abstract:
Behavior recognition has been studied for realizing drivers assisting system and automated navigation and is an important studied field in the intelligent Building. In this paper, a recognition method of behavior recognition separated from a real image was studied. Images were divided into several categories according to the actual weather, distance and angle of view etc. SIFT was firstly used to detect key points and describe them because the SIFT (Scale Invariant Feature Transform) features were invariant to image scale and rotation and were robust to changes in the viewpoint and illumination. My goal is to develop a robust and reliable system which is composed of two fixed cameras in every room of intelligent building which are connected to a computer for acquisition of video sequences, with a program using these video sequences as inputs, we use SIFT represented different images of video sequences, and SVM (support vector machine) Lights as a programming tool for classification of images in order to classify people’s behaviors in the intelligent building in order to give maximum comfort with optimized energy consumption.Keywords: video analysis, people behavior, intelligent building, classification
Procedia PDF Downloads 3781093 A Construction Scheduling Model by Applying Pedestrian and Vehicle Simulation
Authors: Akhmad F. K. Khitam, Yi Tai, Hsin-Yun Lee
Abstract:
In the modern research of construction management, the goals of scheduling are not only to finish the project within the limited duration, but also to improve the impact of people and environment. Especially for the impact to the pedestrian and vehicles, the considerable social cost should be estimated in the total performance of a construction project. However, the site environment has many differences between projects. These interactions affect the requirement and goal of scheduling. It is difficult for schedule planners to quantify these interactions. Therefore, this study use 3D dynamic simulation technology to plan the schedule of the construction engineering projects that affect the current space users (i.e., the pedestrians and vehicles). The proposed model can help the project manager find out the optimal schedule to minimize the inconvenience brought to the space users. Besides, a roadwork project and a building renovation project were analyzed for the practical situation of engineering and operations. Then this study integrates the proper optimization algorithms and computer technology to establish a decision support model. The proposed model can generate a near-optimal schedule solution for project planners.Keywords: scheduling, simulation, optimization, pedestrian and vehicle behavior
Procedia PDF Downloads 1411092 An Accurate Computation of 2D Zernike Moments via Fast Fourier Transform
Authors: Mohammed S. Al-Rawi, J. Bastos, J. Rodriguez
Abstract:
Object detection and object recognition are essential components of every computer vision system. Despite the high computational complexity and other problems related to numerical stability and accuracy, Zernike moments of 2D images (ZMs) have shown resilience when used in object recognition and have been used in various image analysis applications. In this work, we propose a novel method for computing ZMs via Fast Fourier Transform (FFT). Notably, this is the first algorithm that can generate ZMs up to extremely high orders accurately, e.g., it can be used to generate ZMs for orders up to 1000 or even higher. Furthermore, the proposed method is also simpler and faster than the other methods due to the availability of FFT software and/or hardware. The accuracies and numerical stability of ZMs computed via FFT have been confirmed using the orthogonality property. We also introduce normalizing ZMs with Neumann factor when the image is embedded in a larger grid, and color image reconstruction based on RGB normalization of the reconstructed images. Astonishingly, higher-order image reconstruction experiments show that the proposed methods are superior, both quantitatively and subjectively, compared to the q-recursive method.Keywords: Chebyshev polynomial, fourier transform, fast algorithms, image recognition, pseudo Zernike moments, Zernike moments
Procedia PDF Downloads 2651091 Application of Artificial Neural Network and Background Subtraction for Determining Body Mass Index (BMI) in Android Devices Using Bluetooth
Authors: Neil Erick Q. Madariaga, Noel B. Linsangan
Abstract:
Body Mass Index (BMI) is one of the different ways to monitor the health of a person. It is based on the height and weight of the person. This study aims to compute for the BMI using an Android tablet by obtaining the height of the person by using a camera and measuring the weight of the person by using a weighing scale or load cell. The height of the person was estimated by applying background subtraction to the image captured and applying different processes such as getting the vanishing point and applying Artificial Neural Network. The weight was measured by using Wheatstone bridge load cell configuration and sending the value to the computer by using Gizduino microcontroller and Bluetooth technology after the amplification using AD620 instrumentation amplifier. The application will process the images and read the measured values and show the BMI of the person. The study met all the objectives needed and further studies will be needed to improve the design project.Keywords: body mass index, artificial neural network, vanishing point, bluetooth, wheatstone bridge load cell
Procedia PDF Downloads 3241090 Integrating the Modbus SCADA Communication Protocol with Elliptic Curve Cryptography
Authors: Despoina Chochtoula, Aristidis Ilias, Yannis Stamatiou
Abstract:
Modbus is a protocol that enables the communication among devices which are connected to the same network. This protocol is, often, deployed in connecting sensor and monitoring units to central supervisory servers in Supervisory Control and Data Acquisition, or SCADA, systems. These systems monitor critical infrastructures, such as factories, power generation stations, nuclear power reactors etc. in order to detect malfunctions and ignite alerts and corrective actions. However, due to their criticality, SCADA systems are vulnerable to attacks that range from simple eavesdropping on operation parameters, exchanged messages, and valuable infrastructure information to malicious modification of vital infrastructure data towards infliction of damage. Thus, the SCADA research community has been active over strengthening SCADA systems with suitable data protection mechanisms based, to a large extend, on cryptographic methods for data encryption, device authentication, and message integrity protection. However, due to the limited computation power of many SCADA sensor and embedded devices, the usual public key cryptographic methods are not appropriate due to their high computational requirements. As an alternative, Elliptic Curve Cryptography has been proposed, which requires smaller key sizes and, thus, less demanding cryptographic operations. Until now, however, no such implementation has been proposed in the SCADA literature, to the best of our knowledge. In order to fill this gap, our methodology was focused on integrating Modbus, a frequently used SCADA communication protocol, with Elliptic Curve based cryptography and develop a server/client application to demonstrate the proof of concept. For the implementation we deployed two C language libraries, which were suitably modify in order to be successfully integrated: libmodbus (https://github.com/stephane/libmodbus) and ecc-lib https://www.ceid.upatras.gr/webpages/faculty/zaro/software/ecc-lib/). The first library provides a C implementation of the Modbus/TCP protocol while the second one offers the functionality to develop cryptographic protocols based on Elliptic Curve Cryptography. These two libraries were combined, after suitable modifications and enhancements, in order to give a modified version of the Modbus/TCP protocol focusing on the security of the data exchanged among the devices and the supervisory servers. The mechanisms we implemented include key generation, key exchange/sharing, message authentication, data integrity check, and encryption/decryption of data. The key generation and key exchange protocols were implemented with the use of Elliptic Curve Cryptography primitives. The keys established by each device are saved in their local memory and are retained during the whole communication session and are used in encrypting and decrypting exchanged messages as well as certifying entities and the integrity of the messages. Finally, the modified library was compiled for the Android environment in order to run the server application as an Android app. The client program runs on a regular computer. The communication between these two entities is an example of the successful establishment of an Elliptic Curve Cryptography based, secure Modbus wireless communication session between a portable device acting as a supervisor station and a monitoring computer. Our first performance measurements are, also, very promising and demonstrate the feasibility of embedding Elliptic Curve Cryptography into SCADA systems, filling in a gap in the relevant scientific literature.Keywords: elliptic curve cryptography, ICT security, modbus protocol, SCADA, TCP/IP protocol
Procedia PDF Downloads 2711089 Modeling and Controlling the Rotational Degree of a Quadcopter Using Proportional Integral and Derivative Controller
Authors: Sanjay Kumar, Lillie Dewan
Abstract:
The study of complex dynamic systems has advanced through various scientific approaches with the help of computer modeling. The common design trends in aerospace system design can be applied to quadcopter design. A quadcopter is a nonlinear, under-actuated system with complex aerodynamics parameters and creates challenges that demand new, robust, and effective control approaches. The flight control stability can be improved by planning and tracking the trajectory and reducing the effect of sensors and the operational environment. This paper presents a modern design Simmechanics visual modeling approach for a mechanical model of a quadcopter with three degrees of freedom. The Simmechanics model, considering inertia, mass, and geometric properties of a dynamic system, produces multiple translation and rotation maneuvers. The proportional, integral, and derivative (PID) controller is integrated with the Simmechanics model to follow a predefined quadcopter rotational trajectory for a fixed time interval. The results presented are satisfying. The simulation of the quadcopter control performed operations successfully.Keywords: nonlinear system, quadcopter model, simscape modelling, proportional-integral-derivative controller
Procedia PDF Downloads 1961088 A Nexus between Research and Teaching: Fostering Student Expectations of Research-Informed Teaching Approaches
Authors: Lina S. Calucag
Abstract:
Integration of research and teaching in higher education can provide valuable ways of enhancing the student learning experience, but establishing such integrative links can be complex and problematic, given different practices and levels of understanding. This study contributes to the pedagogical literature in drawing on findings from students’ survey exploring perceptions of research-informed teaching to examine how links between research and teaching can be suitably strengthened. The study employed a descriptive research design limited to the undergraduate students taking thesis/capstone courses in the tertiary levels private or public colleges and universities across the globe as respondents of the study. The findings noted that the students’ responses from different disciplines: engineering, science, education, business-related, and computer on the nexus between research and teaching is remarkable in fostering student expectations of research-informed teaching approaches. Students’ expectations on research-led, research-oriented, research-based, and research-tutored are enablers in linking research and teaching. It is recommended that experimental studies should be conducted using the four different research-informed teaching approaches in the classroom, namely: research-led, research-oriented, research-based, and research-tutored.Keywords: research-led, research-informed teaching, research-oriented teaching, research-tutored, research-based
Procedia PDF Downloads 1611087 Reviewing Image Recognition and Anomaly Detection Methods Utilizing GANs
Authors: Agastya Pratap Singh
Abstract:
This review paper examines the emerging applications of generative adversarial networks (GANs) in the fields of image recognition and anomaly detection. With the rapid growth of digital image data, the need for efficient and accurate methodologies to identify and classify images has become increasingly critical. GANs, known for their ability to generate realistic data, have gained significant attention for their potential to enhance traditional image recognition systems and improve anomaly detection performance. The paper systematically analyzes various GAN architectures and their modifications tailored for image recognition tasks, highlighting their strengths and limitations. Additionally, it delves into the effectiveness of GANs in detecting anomalies in diverse datasets, including medical imaging, industrial inspection, and surveillance. The review also discusses the challenges faced in training GANs, such as mode collapse and stability issues, and presents recent advancements aimed at overcoming these obstacles.Keywords: generative adversarial networks, image recognition, anomaly detection, synthetic data generation, deep learning, computer vision, unsupervised learning, pattern recognition, model evaluation, machine learning applications
Procedia PDF Downloads 251086 Improved Super-Resolution Using Deep Denoising Convolutional Neural Network
Authors: Pawan Kumar Mishra, Ganesh Singh Bisht
Abstract:
Super-resolution is the technique that is being used in computer vision to construct high-resolution images from a single low-resolution image. It is used to increase the frequency component, recover the lost details and removing the down sampling and noises that caused by camera during image acquisition process. High-resolution images or videos are desired part of all image processing tasks and its analysis in most of digital imaging application. The target behind super-resolution is to combine non-repetition information inside single or multiple low-resolution frames to generate a high-resolution image. Many methods have been proposed where multiple images are used as low-resolution images of same scene with different variation in transformation. This is called multi-image super resolution. And another family of methods is single image super-resolution that tries to learn redundancy that presents in image and reconstruction the lost information from a single low-resolution image. Use of deep learning is one of state of art method at present for solving reconstruction high-resolution image. In this research, we proposed Deep Denoising Super Resolution (DDSR) that is a deep neural network for effectively reconstruct the high-resolution image from low-resolution image.Keywords: resolution, deep-learning, neural network, de-blurring
Procedia PDF Downloads 5171085 Understanding Evolutionary Algorithms through Interactive Graphical Applications
Authors: Javier Barrachina, Piedad Garrido, Manuel Fogue, Julio A. Sanguesa, Francisco J. Martinez
Abstract:
It is very common to observe, especially in Computer Science studies that students have difficulties to correctly understand how some mechanisms based on Artificial Intelligence work. In addition, the scope and limitations of most of these mechanisms are usually presented by professors only in a theoretical way, which does not help students to understand them adequately. In this work, we focus on the problems found when teaching Evolutionary Algorithms (EAs), which imitate the principles of natural evolution, as a method to solve parameter optimization problems. Although this kind of algorithms can be very powerful to solve relatively complex problems, students often have difficulties to understand how they work, and how to apply them to solve problems in real cases. In this paper, we present two interactive graphical applications which have been specially designed with the aim of making Evolutionary Algorithms easy to be understood by students. Specifically, we present: (i) TSPS, an application able to solve the ”Traveling Salesman Problem”, and (ii) FotEvol, an application able to reconstruct a given image by using Evolution Strategies. The main objective is that students learn how these techniques can be implemented, and the great possibilities they offer.Keywords: education, evolutionary algorithms, evolution strategies, interactive learning applications
Procedia PDF Downloads 3381084 Assessment of Exposure Dose Rate from Scattered X-Radiation during Diagnostic Examination in Nigerian University Teaching Hospital
Authors: Martins Gbenga., Orosun M. M., Olowookere C. J., Bamidele Lateef
Abstract:
Radiation exposures from diagnostic medical examinations are almost always justified by the benefits of accurate diagnosis of possible disease conditions. The aim is to assess the influence of selected exposure parameters on scattered dose rates. The research was carried out using Gamma Scout software installation on the Computer system (Laptop) to record the radiation counts, pulse rate, and dose rate for 136 patients. Seventy-three patients participated in the male category with 53.7%, while 63 females participated with 46.3%. The mean and standard deviation value for each parameter is recorded, and tube potential is within 69.50±11.75 ranges between 52.00 and 100.00, tube current is within 23.20±17.55 ranges between 4.00 and 100.00, focus skin distance is within 73.195±33.99 and ranges between 52.00 and 100.00. Dose Rate (DRate in µSv/hr) is significant at an interval of 0.582 and 0.587 for tube potential and body thickness (cm). Tube potential is significant at an interval of 0.582 and 0.842 of DRate (µSv/hr) and body thickness (cm). The study was compared with other studies. The exposure parameters selected during each examination contributed to scattered radiation. A quality assurance program (QAP) is advised for the center.Keywords: x-radiation, exposure rate, dose rate, tube potentials, scattered radiation, diagnostic examination
Procedia PDF Downloads 1451083 Investigating the Effect of the Pedagogical Agent on Visual Attention in Attention Deficit Hyperactivity Disorder Students
Authors: Nasrin Mohammadhasani, Rosa Angela Fabio
Abstract:
The attention to relevance information is the key element for learning. Otherwise, Attention Deficit Hyperactivity Disorder (ADHD) students have a fuzzy visual pattern that prevents them to attention and remember learning subject. The present study aimed to test the hypothesis that the presence of a pedagogical agent can effectively support ADHD learner's attention and learning outcomes in a multimedia learning environment. The learning environment was integrated with a pedagogical agent, named Koosha as a social peer. This study employed a pretest and posttest experimental design with control group. The statistical population was 30 boys students, age 10-11 with ADHD that randomly assigned to learn with/without an agent in well designed environment for mathematic. The results suggested that experimental and control groups show a significant difference in time when they participated and mathematics achievement. According to this research, using the pedagogical agent can enhance learning of ADHD students by gaining and guiding their attention to relevance information part on display, so it can be considered as asocial cue that provides theme cognitive supports.Keywords: attention, computer assisted instruction, multimedia learning environment, pedagogical agent
Procedia PDF Downloads 314