Search results for: early detection of violence
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 7284

Search results for: early detection of violence

6024 Vehicle Timing Motion Detection Based on Multi-Dimensional Dynamic Detection Network

Authors: Jia Li, Xing Wei, Yuchen Hong, Yang Lu

Abstract:

Detecting vehicle behavior has always been the focus of intelligent transportation, but with the explosive growth of the number of vehicles and the complexity of the road environment, the vehicle behavior videos captured by traditional surveillance have been unable to satisfy the study of vehicle behavior. The traditional method of manually labeling vehicle behavior is too time-consuming and labor-intensive, but the existing object detection and tracking algorithms have poor practicability and low behavioral location detection rate. This paper proposes a vehicle behavior detection algorithm based on the dual-stream convolution network and the multi-dimensional video dynamic detection network. In the videos, the straight-line behavior of the vehicle will default to the background behavior. The Changing lanes, turning and turning around are set as target behaviors. The purpose of this model is to automatically mark the target behavior of the vehicle from the untrimmed videos. First, the target behavior proposals in the long video are extracted through the dual-stream convolution network. The model uses a dual-stream convolutional network to generate a one-dimensional action score waveform, and then extract segments with scores above a given threshold M into preliminary vehicle behavior proposals. Second, the preliminary proposals are pruned and identified using the multi-dimensional video dynamic detection network. Referring to the hierarchical reinforcement learning, the multi-dimensional network includes a Timer module and a Spacer module, where the Timer module mines time information in the video stream and the Spacer module extracts spatial information in the video frame. The Timer and Spacer module are implemented by Long Short-Term Memory (LSTM) and start from an all-zero hidden state. The Timer module uses the Transformer mechanism to extract timing information from the video stream and extract features by linear mapping and other methods. Finally, the model fuses time information and spatial information and obtains the location and category of the behavior through the softmax layer. This paper uses recall and precision to measure the performance of the model. Extensive experiments show that based on the dataset of this paper, the proposed model has obvious advantages compared with the existing state-of-the-art behavior detection algorithms. When the Time Intersection over Union (TIoU) threshold is 0.5, the Average-Precision (MP) reaches 36.3% (the MP of baselines is 21.5%). In summary, this paper proposes a vehicle behavior detection model based on multi-dimensional dynamic detection network. This paper introduces spatial information and temporal information to extract vehicle behaviors in long videos. Experiments show that the proposed algorithm is advanced and accurate in-vehicle timing behavior detection. In the future, the focus will be on simultaneously detecting the timing behavior of multiple vehicles in complex traffic scenes (such as a busy street) while ensuring accuracy.

Keywords: vehicle behavior detection, convolutional neural network, long short-term memory, deep learning

Procedia PDF Downloads 129
6023 Neuro-Connectivity Analysis Using Abide Data in Autism Study

Authors: Dulal Bhaumik, Fei Jie, Runa Bhaumik, Bikas Sinha

Abstract:

Human brain is an amazingly complex network. Aberrant activities in this network can lead to various neurological disorders such as multiple sclerosis, Parkinson’s disease, Alzheimer’s disease and autism. fMRI has emerged as an important tool to delineate the neural networks affected by such diseases, particularly autism. In this paper, we propose mixed-effects models together with an appropriate procedure for controlling false discoveries to detect disrupted connectivities in whole brain studies. Results are illustrated with a large data set known as Autism Brain Imaging Data Exchange or ABIDE which includes 361 subjects from 8 medical centers. We believe that our findings have addressed adequately the small sample inference problem, and thus are more reliable for therapeutic target for intervention. In addition, our result can be used for early detection of subjects who are at high risk of developing neurological disorders.

Keywords: ABIDE, autism spectrum disorder, fMRI, mixed-effects model

Procedia PDF Downloads 288
6022 Women’s Empowerment on Modern Contraceptive Use in Poor-Rich Segment of Population: Evidence From South Asian Countries

Authors: Muhammad Asim, Mehvish Amjad

Abstract:

Background: Less than half of women in South Asia (SA) use any modern contraceptive method which leads to a huge burden of unintended pregnancies, unsafe abortions, maternal deaths, and socioeconomic loss. Women empowerment plays a pivotal role in improving various health seeking behaviours, including contraceptive use. The objective of this study to explore the association between women's empowerment and modern contraceptive, among rich and poor segment of population in SA. Methods: We used the most recent, large-scale, demographic health survey data of five South Asian countries, namely Afghanistan, Pakistan, Bangladesh, India, and Nepal. The outcome variable was the current use of modern contraceptive methods. The main exposure variable was a combination (interaction) of socio-economic status (SES) and women’s level of empowerment (low, medium, and high), where SES was bifurcated into poor and rich; and women empowerment was divided into three categories: decision making, attitude to violence and social independence. Moreover, overall women empowerment indicator was also created by using three dimensions of women empowerment. We applied both descriptive statistics and multivariable logistic regression techniques for data analyses. Results: Most of the women possessed ‘medium’ level of empowerment across South Asian Countries. The lowest attitude to violence empowerment was found in Afghanistan, and the lowest social independence empowerment was observed in Bangladesh across SA. However, Pakistani women have the lowest decision-making empowerment in the region. The lowest modern contraceptive use (22.1%) was found in Afghanistan and the highest (53.2%) in Bangladesh. The multivariate results depict that the overall measure of women empowerment does not affect modern contraceptive use among poor and rich women in most of South Asian countries. However, the decision-making empowerment plays a significant role among both poor and rich women to use modern contraceptive methods across South Asian countries. Conclusions: The effect of women’s empowerment on modern contraceptive use is not consistent across countries, and among poor and rich segment of population. Of the three dimensions of women’s empowerment, the autonomy of decision making in household affairs emerged as a stronger determinant of mCPR as compared with social independence and attitude towards violence against women.

Keywords: women empowerment, modern contraceptive use, South Asia, socio economic status

Procedia PDF Downloads 78
6021 ANOVA-Based Feature Selection and Machine Learning System for IoT Anomaly Detection

Authors: Muhammad Ali

Abstract:

Cyber-attacks and anomaly detection on the Internet of Things (IoT) infrastructure is emerging concern in the domain of data-driven intrusion. Rapidly increasing IoT risk is now making headlines around the world. denial of service, malicious control, data type probing, malicious operation, DDos, scan, spying, and wrong setup are attacks and anomalies that can affect an IoT system failure. Everyone talks about cyber security, connectivity, smart devices, and real-time data extraction. IoT devices expose a wide variety of new cyber security attack vectors in network traffic. For further than IoT development, and mainly for smart and IoT applications, there is a necessity for intelligent processing and analysis of data. So, our approach is too secure. We train several machine learning models that have been compared to accurately predicting attacks and anomalies on IoT systems, considering IoT applications, with ANOVA-based feature selection with fewer prediction models to evaluate network traffic to help prevent IoT devices. The machine learning (ML) algorithms that have been used here are KNN, SVM, NB, D.T., and R.F., with the most satisfactory test accuracy with fast detection. The evaluation of ML metrics includes precision, recall, F1 score, FPR, NPV, G.M., MCC, and AUC & ROC. The Random Forest algorithm achieved the best results with less prediction time, with an accuracy of 99.98%.

Keywords: machine learning, analysis of variance, Internet of Thing, network security, intrusion detection

Procedia PDF Downloads 122
6020 Restructuring Cameroon's Educational System: The Value of Inclusive Education for Children with Visual Impairment

Authors: Samanta Tiague, Igor Michel Gachig

Abstract:

The practice of inclusive education within general education classrooms is becoming more prevalent in Cameroon. In this context, quality Education is an important driver of the development agenda in this era of global sustainable development. This requires that the Cameroon’s educational system be strategically restructured to provide every citizen with the needed quality education for sustainable development. This study thus examined the need for the restructuring of the Cameroon educational system towards inclusive education as a target of the Sustainable Development Goal #4 (Ensure Quality Education), from a critical disability theory perspective. Special focus was on the education of children with visual impairment in the early childhood classroom. This study is suggesting a model design of responsive and contextual inclusive education policies, and the provision of quality human, material and financial educational resources to support the improvement of curriculums and inclusive instructional strategies. This paper is therefore designed as a basic starting point for early childhood educators with limited to no experience in working with students having visual impairments. Ultimately, this work represents a contribution to early childhood educators toward understanding visual impairment challenges and innovative practices to approach accessibility in a meaningful way to students in Cameroon. This is important to achieve quality education due to the peculiar nature of the educational needs of children with visual impairment, toward attainment of the global sustainable development agenda.

Keywords: early childhood educators, inclusive education, sustainable development, visual impairment

Procedia PDF Downloads 147
6019 Care and Support for Infants and Toddlers with Special Needs

Authors: Florence A. Undiyaundeye, Aniashie Akpanke

Abstract:

Early identification of developmental disorders in infants and toddlers is critical for the well being of children. It is also an integral function of the primary care medical provider and the early care given in the home or crèche. This paper is focused at providing information on special need infants and toddlers and strategies to support them in developmental concern to cope with the challenges in and out of the classroom and to interact with their peers without stigmatization and inferiority complex. The target children are from birth through three years of age. There is a strong recommendation for developmental surveillance to be incorporated at every well child preventive care program in training and practical stage of formal school settings. The paper posits that any concerns raised during surveillance should be promptly addressed with standardized developmental screening by appropriate health service providers. In addition screening tests should be administered regularly at age 9+, 19+ and 30 months of these infants. The paper also establishes that the early identification of these developmental challenges of the infants and toddlers should lead to further developmental and medical evaluation, diagnosis and treatment, including early developmental school intervention, control and teaching and learning integration and inclusion for proper career build up. Children diagnosed with developmental disorders should be identified as children with special needs so that management is initiated and its underlying etiology may also drive a range of treatment of the child, to parents. Conselling and school integration as applicable to the child’s specific need and care for sustenance in societal functioning.

Keywords: care, special need, support, infants and toddlers, management and developmental disorders

Procedia PDF Downloads 385
6018 Terrorism and Sustainable Tourism Development

Authors: P. Okoro Ugo Chigozie, P. A. Igbojekwe, E. N. Ukabuilu

Abstract:

Tourism and terrorism experiences are best viewed as dynamic, complex systems with extreme diverse consequences on any nation’s economy. Tourism is one of the biggest industries in the world and one of the economical sectors which grows rapidly; tourism has positive impact on the nation’s economy. Terrorism is the method or the theory behind the method whereby an organized group or party seeks to achieve its avowed aims chiefly through the systematic use of violence; the consequences of terrorism on tourist destinations are inescapable and can be profound. Especially, it threatens the attractiveness of a tourist destination and strips the competitiveness of that destination. Destination’s vulnerability to politically motivated violence not only retracts tourists, but threatens sustainable tourism development. This paper examines the activities of the Jamaata Ahlis Sunna Liddaawati -an Islamic sect popularly known as Boko Haram – and its impact on sustainable tourism development in the Nigeria state. Possible triggers of this insurgency and potentially evolving measure against its influence on sustainable tourism including, strong image management of the tourism industry, feasible tourist safety policy, viable anti-terrorism measures, proactive respond to the challenge of terrorism, reinforcement of the legitimate frameworks and irrevocable penalty against menace of corruption; are discussed in this paper, as limiting the effects of insurgency on the attractiveness of Nigeria as safe tourists destination.

Keywords: Nigeria, terrorism, sustainable tourism development, corruption and competitiveness

Procedia PDF Downloads 619
6017 Multi-Criteria Evaluation of IDS Architectures in Cloud Computing

Authors: Elmahdi Khalil, Saad Enniari, Mostapha Zbakh

Abstract:

Cloud computing promises to increase innovation and the velocity with witch applications are deployed, all while helping any enterprise meet most IT service needs at a lower total cost of ownership and higher return investment. As the march of cloud continues, it brings both new opportunities and new security challenges. To take advantages of those opportunities while minimizing risks, we think that Intrusion Detection Systems (IDS) integrated in the cloud is one of the best existing solutions nowadays in the field. The concept of intrusion detection was known since past and was first proposed by a well-known researcher named Anderson in 1980's. Since that time IDS's are evolving. Although, several efforts has been made in the area of Intrusion Detection systems for cloud computing environment, many attacks still prevail. Therefore, the work presented in this paper proposes a multi criteria analysis and a comparative study between several IDS architectures designated to work in a cloud computing environments. To achieve this objective, in the first place we will search in the state of the art of several consistent IDS architectures designed to work in a cloud environment. Whereas, in a second step we will establish the criteria that will be useful for the evaluation of architectures. Later, using the approach of multi criteria decision analysis Mac Beth (Measuring Attractiveness by a Categorical Based Evaluation Technique we will evaluate the criteria and assign to each one the appropriate weight according to their importance in the field of IDS architectures in cloud computing. The last step is to evaluate architectures against the criteria and collecting results of the model constructed in the previous steps.

Keywords: cloud computing, cloud security, intrusion detection/prevention system, multi-criteria decision analysis

Procedia PDF Downloads 468
6016 Rejection Sensitivity and Romantic Relationships: A Systematic Review and Meta-Analysis

Authors: Mandira Mishra, Mark Allen

Abstract:

This meta-analysis explored whether rejection sensitivity relates to facets of romantic relationships. A comprehensive literature search identified 60 studies (147 effect sizes; 16,955 participants) that met inclusion criteria. Data were analysed using inverse-variance weighted random effects meta-analysis. Mean effect sizes from 21 meta-analyses provided evidence that more rejection sensitive individuals report lower levels of relationship satisfaction and relationship closeness, lower levels of perceived partner satisfaction, a greater likelihood of intimate partner violence (perpetration and victimization), higher levels of relationship concerns and relationship conflict, and higher levels of jealousy and self-silencing behaviours. There was also some evidence that rejection sensitive individuals are more likely to engage in risky sexual behaviour and are more prone to sexual compulsivity. There was no evidence of publication bias and various levels of heterogeneity in computed averages. Random effects meta-regression identified participant age and sex as important moderators of pooled mean effects. These findings provide a foundation for the theoretical development of rejection sensitivity in romantic relationships and should be of interest to relationship and marriage counsellors and other relationship professionals.

Keywords: intimate partner violence, relationship satisfaction, commitment, sexual orientation, risky sexual behaviour

Procedia PDF Downloads 79
6015 An ANN-Based Predictive Model for Diagnosis and Forecasting of Hypertension

Authors: Obe Olumide Olayinka, Victor Balanica, Eugen Neagoe

Abstract:

The effects of hypertension are often lethal thus its early detection and prevention is very important for everybody. In this paper, a neural network (NN) model was developed and trained based on a dataset of hypertension causative parameters in order to forecast the likelihood of occurrence of hypertension in patients. Our research goal was to analyze the potential of the presented NN to predict, for a period of time, the risk of hypertension or the risk of developing this disease for patients that are or not currently hypertensive. The results of the analysis for a given patient can support doctors in taking pro-active measures for averting the occurrence of hypertension such as recommendations regarding the patient behavior in order to lower his hypertension risk. Moreover, the paper envisages a set of three example scenarios in order to determine the age when the patient becomes hypertensive, i.e. determine the threshold for hypertensive age, to analyze what happens if the threshold hypertensive age is set to a certain age and the weight of the patient if being varied, and, to set the ideal weight for the patient and analyze what happens with the threshold of hypertensive age.

Keywords: neural network, hypertension, data set, training set, supervised learning

Procedia PDF Downloads 390
6014 Molecular Detection of Helicobacter Pylori and Its Association with TNFα-308 Polymorphism in Cardiovascular Diseases

Authors: Azar Sharafianpor, Hossein Rassi, Fahimeh Nemati Mansur

Abstract:

Cardiovascular diseases (CVD) are the most important cause of death in industrialized and developing countries such as Iran. The most important risk factors for the CVD, genetic factors and chronic infectious agents, such as Helicobacter pylori, can be mentioned. The TNFα gene is one of the most important anti-inflammatory cytokines that can affect the sensitivity, efficacy, and ability of the immune response to chronic infections. Some TNF-α gene polymorphisms, including the replacement of the G nucleotide G with A at position 308 in the promoter region of TNF-α, increase the transcription of cytokines in the target cells and thus predispose a person to chronic infections. This study examines the TNF-α 308 polymorphism and its association with Helicobacter pylori infection in this disease. This study was a case-control study in which 154 patients were examined as cases or patients with symptoms of myocardial infarction or angina and 160 as controls or healthy subjects. All of the subjects at different ages were given venous blood and age, BMI, cholesterol, LDL, and HDL were determined. DNA was extracted from the specimens, and the cagA gene from H. pylori and the TNF-α-308 polymorphism were determined by PCR in patients and healthy subjects. Statistical analysis was performed with Epi Info software. The results showed that the frequency of H. pylori infection in the patients and healthy group were 53.23% (82 out of 154) and 47.5% (76 out of 160). There was no significant difference in H. pylori outbreak between the two groups. The frequencies of TNF-α-308 genotype for GG, GA, and AA in patients were 0.17, 0.49, and 0.34, respectively, whereas for controls 0.47, 0.35, and 0.18 for GG, GA, and AA, respectively. The frequency of genotype analysis of TNF-α-308 polymorphisms in both patients and healthy groups showed that there was a significant difference in the frequency of genotypes and the AA genotype was higher in the affected individuals. Also, there was a significant relationship between the genotype and the contamination with H. pylori and changes in cholesterol, LDL, and HDL levels were observed. The results of the study indicate that H. pylori detection in individuals with AA genotype in people under 50 years of age can play an important role in early diagnosis and treatment of cardiovascular disease.

Keywords: Helicobacter pylori, TNFα gene, cardiovascular diseases, TNFα-308 polymorphism

Procedia PDF Downloads 150
6013 Piezo-Extracted Model Based Chloride/ Carbonation Induced Corrosion Assessment in Reinforced Concrete Structures

Authors: Gupta. Ashok, V. talakokula, S. bhalla

Abstract:

Rebar corrosion is one of the main causes of damage and premature failure of the reinforced concrete (RC) structures worldwide, causing enormous costs for inspection, maintenance, restoration and replacement. Therefore, early detection of corrosion and timely remedial action on the affected portion can facilitate an optimum utilization of the structure, imparting longevity to it. The recent advent of the electro-mechanical impedance (EMI) technique using piezo sensors (PZT) for structural health monitoring (SHM) has provided a new paradigm to the maintenance engineers to diagnose the onset of the damage at the incipient stage itself. This paper presents a model based approach for corrosion assessment based on the equivalent parameters extracted from the impedance spectrum of concrete-rebar system using the EMI technique via the PZT sensors.

Keywords: impedance, electro-mechanical, stiffness, mass, damping, equivalent parameters

Procedia PDF Downloads 542
6012 Using Building Information Modeling in Green Building Design and Performance Optimization

Authors: Moataz M. Hamed, Khalid S. M. Al Hagla, Zeyad El Sayad

Abstract:

Thinking in design energy-efficiency and high-performance green buildings require a different design mechanism and design approach than conventional buildings to achieve more sustainable result. By reasoning about specific issues at the correct time in the design process, the design team can minimize negative impacts, maximize building performance and keep both first and operation costs low. This paper attempts to investigate and exploit the sustainable dimension of building information modeling (BIM) in designing high-performance green buildings that require less energy for operation, emit less carbon dioxide and provide a conducive indoor environment for occupants through early phases of the design process. This objective was attained by a critical and extensive literature review that covers the following issues: the value of considering green strategies in the early design stage, green design workflow, and BIM-based performance analysis. Then the research proceeds with a case study that provides an in-depth comparative analysis of building performance evaluation between an office building in Alexandria, Egypt that was designed by the conventional design process with the same building if taking into account sustainability consideration and BIM-based sustainable analysis integration early through the design process. Results prove that using sustainable capabilities of building information modeling (BIM) in early stages of the design process side by side with green design workflow promote buildings performance and sustainability outcome.

Keywords: BIM, building performance analysis, BIM-based sustainable analysis, green building design

Procedia PDF Downloads 341
6011 Polish Catholic Discourse on Gender Equality in the Face of Social and Cultural Changes in Poland

Authors: Anna Jagielska

Abstract:

Five years ago, the word ‘gender’ was discussed in Poland exclusively in academic contexts. One year later, it was chosen as the word of the year and omnipresent in the Polish media. The rapid career of this word is due to the involvement of the Polish church hierarchy who strategically brought this term into relation with abortion, pornography and paedophilia. ‘Gender’ is more than a political slogan. It is a symbol of social anxiety and moral panic in Poland which need to be historically considered. The aim of this paper is to present selected rhetorical strategies used by the Polish Catholic clergy who strive to have an impact on the current gender discourse in Poland. In particular, the gender debate, culminated in the pastoral letter of the Bishops' Conference of Poland, will be discussed. The church’s protest against the Council of Europe’s Convention on Preventing and Combating Violence against Women and Domestic Violence will be analyzed and the recent heated debates in Poland on contraception, abortion, in vitro fertilization, and sex education will be mentioned. To provide explanations on the specificity of Polish gender debates the role of the Catholic Church in the fall of communism in Poland as well as the charismatisation of Polish society by Pope John Paul II will be explained. The social constructions of communism and feminism which are manifested in both written and symbolic contracts on gender equality between the Church and the State will be demonstrated. At the end of the paper, theories about the changing role of religion in society will be applied.

Keywords: gender, Poland, religion, catholicism, feminism

Procedia PDF Downloads 289
6010 R-Killer: An Email-Based Ransomware Protection Tool

Authors: B. Lokuketagoda, M. Weerakoon, U. Madushan, A. N. Senaratne, K. Y. Abeywardena

Abstract:

Ransomware has become a common threat in past few years and the recent threat reports show an increase of growth in Ransomware infections. Researchers have identified different variants of Ransomware families since 2015. Lack of knowledge of the user about the threat is a major concern. Ransomware detection methodologies are still growing through the industry. Email is the easiest method to send Ransomware to its victims. Uninformed users tend to click on links and attachments without much consideration assuming the emails are genuine. As a solution to this in this paper R-Killer Ransomware detection tool is introduced. Tool can be integrated with existing email services. The core detection Engine (CDE) discussed in the paper focuses on separating suspicious samples from emails and handling them until a decision is made regarding the suspicious mail. It has the capability of preventing execution of identified ransomware processes. On the other hand, Sandboxing and URL analyzing system has the capability of communication with public threat intelligence services to gather known threat intelligence. The R-Killer has its own mechanism developed in its Proactive Monitoring System (PMS) which can monitor the processes created by downloaded email attachments and identify potential Ransomware activities. R-killer is capable of gathering threat intelligence without exposing the user’s data to public threat intelligence services, hence protecting the confidentiality of user data.

Keywords: ransomware, deep learning, recurrent neural networks, email, core detection engine

Procedia PDF Downloads 207
6009 The Early Pleistocene Mustelidae and Hyaena Record of the Yuanmou Basin

Authors: Arya Farjand

Abstract:

This study delves into the Early Pleistocene fauna of the Yuanmou Basin, highlighting two significant findings. The first is the discovery of exceptionally well-preserved canid coprolites, which provide a rare glimpse into the diet and ecological niche of these ancient carnivores. The analysis of these coprolites has revealed a diet rich in diverse prey species, suggesting a complex food web and a dynamic ecological environment. This discovery not only sheds light on the dietary habits of these canids but also offers broader insights into the region's ecological dynamics during the Early Pleistocene. Additionally, the preservation of these coprolites allows for detailed study of the carnivore's role in the ecosystem, including their interactions with other species and the overall health of the environment. The second major finding is the identification of a mustelid species, Eirictis yuanmouensis, from the same fossil horizon as the coprolites. This discovery is crucial for understanding the diversity and evolution of Mustelidae in the region. The detailed analysis of cranial and dental morphology of Eirictis yuanmouensis indicates unique adaptations that suggest a specialized ecological niche. This finding, in conjunction with the coprolite analysis, provides a comprehensive view of the ecological niches occupied by both mustelids and hyenas, enhancing our understanding of their adaptations and interactions within this paleoenvironment. The study's significance is further amplified by the analysis of pollen data from the same horizon, which indicates a paleoenvironment characterized by rapid climatic changes and a dominant semiarid climate. This combination of faunal and floral data paints a detailed picture of the Early Pleistocene environment in the Yuanmou Basin, offering valuable insights into the interactions between different carnivore species and their adaptation strategies in response to changing environmental conditions.

Keywords: Yuanmou Basin, coprolite, Hyaena, eirictis yuanmouensis, early pleistocene

Procedia PDF Downloads 27
6008 A Less Complexity Deep Learning Method for Drones Detection

Authors: Mohamad Kassab, Amal El Fallah Seghrouchni, Frederic Barbaresco, Raed Abu Zitar

Abstract:

Detecting objects such as drones is a challenging task as their relative size and maneuvering capabilities deceive machine learning models and cause them to misclassify drones as birds or other objects. In this work, we investigate applying several deep learning techniques to benchmark real data sets of flying drones. A deep learning paradigm is proposed for the purpose of mitigating the complexity of those systems. The proposed paradigm consists of a hybrid between the AdderNet deep learning paradigm and the Single Shot Detector (SSD) paradigm. The goal was to minimize multiplication operations numbers in the filtering layers within the proposed system and, hence, reduce complexity. Some standard machine learning technique, such as SVM, is also tested and compared to other deep learning systems. The data sets used for training and testing were either complete or filtered in order to remove the images with mall objects. The types of data were RGB or IR data. Comparisons were made between all these types, and conclusions were presented.

Keywords: drones detection, deep learning, birds versus drones, precision of detection, AdderNet

Procedia PDF Downloads 178
6007 Evaluating the Effectiveness of Plantar Sensory Insoles and Remote Patient Monitoring for Early Intervention in Diabetic Foot Ulcer Prevention in Patients with Peripheral Neuropathy

Authors: Brock Liden, Eric Janowitz

Abstract:

Introduction: Diabetic peripheral neuropathy (DPN) affects 70% of individuals with diabetes1. DPN causes a loss of protective sensation, which can lead to tissue damage and diabetic foot ulcer (DFU) formation2. These ulcers can result in infections and lower-extremity amputations of toes, the entire foot, and the lower leg. Even after a DFU is healed, recurrence is common, with 49% of DFU patients developing another ulcer within a year and 68% within 5 years3. This case series examines the use of sensory insoles and newly available plantar data (pressure, temperature, step count, adherence) and remote patient monitoring in patients at risk of DFU. Methods: Participants were provided with custom-made sensory insoles to monitor plantar pressure, temperature, step count, and daily use and were provided with real-time cues for pressure offloading as they went about their daily activities. The sensory insoles were used to track subject compliance, ulceration, and response to feedback from real-time alerts. Patients were remotely monitored by a qualified healthcare professional and were contacted when areas of concern were seen and provided coaching on reducing risk factors and overall support to improve foot health. Results: Of the 40 participants provided with the sensory insole system, 4 presented with a DFU. Based on flags generated from the available plantar data, patients were contacted by the remote monitor to address potential concerns. A standard clinical escalation protocol detailed when and how concerns should be escalated to the provider by the remote monitor. Upon escalation to the provider, patients were brought into the clinic as needed, allowing for any issues to be addressed before more serious complications might arise. Conclusion: This case series explores the use of innovative sensory technology to collect plantar data (pressure, temperature, step count, and adherence) for DFU detection and early intervention. The results from this case series suggest the importance of sensory technology and remote patient monitoring in providing proactive, preventative care for patients at risk of DFU. This robust plantar data, with the addition of remote patient monitoring, allow for patients to be seen in the clinic when concerns arise, giving providers the opportunity to intervene early and prevent more serious complications, such as wounds, from occurring.

Keywords: diabetic foot ulcer, DFU prevention, digital therapeutics, remote patient monitoring

Procedia PDF Downloads 76
6006 The Impact of Non-Surgical and Non-Medical Interventions on the Treatment of Infertile Women with Ovarian Reserve Below One and Early Menopause Symptoms

Authors: Flora Tajiki

Abstract:

This study investigates the effectiveness of non-surgical and non-medical interventions in treating infertile women with severely diminished ovarian reserve (below one), low Anti-Müllerian Hormone (AMH) levels, and symptoms of early menopause. The intervention included yoga, sunlight exposure, vitamin and mineral supplementation, relaxation techniques, and daily prayers performed both before sleep and upon waking. These methods were applied to women who had shown poor response to high-dose fertility treatments, such as IVF and microinjection cycles, leading to low-quality egg production. The focus was on women with severely reduced ovarian reserve and early menopause symptoms, some of whom continued to experience relatively regular menstrual cycles despite the onset of these symptoms. This treatment was aimed at women for whom conventional fertility methods had been ineffective. The study sample consisted of 120 married women, aged 25 to 45, from the provinces of Tehran, Alborz, and western Iran, with 35 participants completing the intervention. Individual factors such as residence, education, employment status, marriage duration, family infertility history, and previous infertility treatments were examined, with income considered as a contextual variable. The results indicate that AMH may not be a definitive marker of ovarian reserve, as lifestyle modifications, such as those implemented in this study, were associated with increased AMH levels, the return of regular menstrual cycles, and successful pregnancies. No short- or long-term complications were reported during the two-year follow-up, highlighting the potential benefits of non-surgical interventions for women with early menopause symptoms and diminished ovarian reserve.

Keywords: anti-müllerian hormone, infertility, ovarian reserve, early menopause, fertility, women’s health, lifestyle modification, pregnancy

Procedia PDF Downloads 23
6005 Dynamic Background Updating for Lightweight Moving Object Detection

Authors: Kelemewerk Destalem, Joongjae Cho, Jaeseong Lee, Ju H. Park, Joonhyuk Yoo

Abstract:

Background subtraction and temporal difference are often used for moving object detection in video. Both approaches are computationally simple and easy to be deployed in real-time image processing. However, while the background subtraction is highly sensitive to dynamic background and illumination changes, the temporal difference approach is poor at extracting relevant pixels of the moving object and at detecting the stopped or slowly moving objects in the scene. In this paper, we propose a moving object detection scheme based on adaptive background subtraction and temporal difference exploiting dynamic background updates. The proposed technique consists of a histogram equalization, a linear combination of background and temporal difference, followed by the novel frame-based and pixel-based background updating techniques. Finally, morphological operations are applied to the output images. Experimental results show that the proposed algorithm can solve the drawbacks of both background subtraction and temporal difference methods and can provide better performance than that of each method.

Keywords: background subtraction, background updating, real time, light weight algorithm, temporal difference

Procedia PDF Downloads 340
6004 Identity Crisis and Class Difference in Charles Dickens' 'Great Expectations'

Authors: Ramin Barati, Atefeh Salemi

Abstract:

In Victorian era, the society had been surrounded by extreme class ranking in order to identify the people of the classes and to intensify power relationships due to the growth of industry in Charles Dickens's (1812-1870) Great Expectations (2003) in which he illustrates the clash and dichotomy in the 19th century London. The classes in Victorian period have socially divided the population into two parts, the lower and the upper class of the community. In such a panopticon society, the major character Pip was the best example of the working class who was under the domination of violence, malice, and abuse of Miss Havisham as a member of the ruling class in order to take revenge on her failures. The conflict and disunity represented in vindictiveness and the sense of revenge applied by Miss Havisham against his victim Pip, made him experience alienation and eventually suffer from identity crisis. This paper considers New Historicism based on the theories of the French critic Michel Foucault (1926-1984). The social concept, panopticism, was called after the panopticon society, basically elaborated by Foucault in his book Discipline and Punish (1975) and he considers the panopticon as a sign of punitive community of surveillance. This paper evaluates the problems of a dual society to show that the people of the lower class are under the domination of capitalist society.

Keywords: class, identity crisis, violence, panoptic society, domination

Procedia PDF Downloads 236
6003 Reflections on Economic Recession in the Early Period of Islam: Lessons for Nigeria

Authors: Khalid Ishola Bello

Abstract:

No condition is permanent in life. This phenomenon is more evident in the socio-economic and political life of man regardless of race, colour or religious affiliation. As the economy of an individual or nation stands to be favourable at one time, it may also experience decline and become unbearable at another time. Muslims, towards the third decade of Islam, experienced economic hardship due to some natural and artificial factors. The recession, which lasted for four years, was rescued by different approaches, and economic prosperity was later regained. Some years ago, Nigeria was drastically affected by an economic recession characterized by high rates of unemployment, illiquidity and inflation, which have caused depression to many individuals and organizations. It is the aim of this paper to look into the causes and remedies of the recession in that early period of Islam in order to suggest a way out of the unfriendly economic situation of Nigeria. An analytical method is adopted to draw some lessons from the situation of Muslims of that time to address the current economic challenges in Nigeria. Though Nigeria is not under any natural disaster, the causes seem to be a deliberate reaction of some Nigerians against the government's attempts to curb corruption at all costs and lapses in some government policies.

Keywords: recession, hardship, spiritual, lessons, early period of Islam

Procedia PDF Downloads 68
6002 Consent and the Construction of Unlawfulness

Authors: Susanna Menis

Abstract:

The context of this study revolves around the theme of consent and the construction of unlawfulness in judicial decisions. It aims to explore the formation of societal perceptions of unlawfulness within the context of consensual sexual acts leading to harmful consequences. This study investigates how judges create legal rules that reflect social solidarity and protect against violence. Specifically, the research aims to understand the justification behind criminalising consensual sexual activity when categorised under different offences. The main question addressed in this study will evaluate the way judges create legal rules that they believe reflect social solidarity and protect against violence. The study employs a historical genealogy approach as its methodology. This approach allows for tracing back the original formation of societal perspectives on unlawfulness, thus highlighting the socially constructed nature of the present understanding. The data for this study will be collected through an extensive literature review, examining historical legal cases and documents that shape the understanding of unlawfulness. This will provide a comprehensive view of how social attitudes toward private sexual relations influenced the creation of legal rules. The theoretical importance of this research lies in its contribution to socio-legal scholarship. This study adds to the existing knowledge on the topic by exploring questions of unconscious bias and its origins. The findings shed light on how and why individuals possess unconscious biases, particularly within the judicial system. In conclusion, this study investigates judicial decisions concerning consensual sexual acts and the construction of unlawfulness. By employing a historical genealogy approach, the research sheds light on how judges create legal rules that reflect social solidarity and aim to protect against violence. The theoretical importance of this study lies in its contribution to understanding unconscious bias and its origins within the judicial system. Through data collection and analysis procedures, this study aims to provide valuable insights into the formation of social attitudes towards private sexual relations and its impact on legal rulings.

Keywords: consent, sexual offences, offences against the person, legal genealogy, social construct

Procedia PDF Downloads 67
6001 Assessing Conceptions of Climate Change: An Exploratory Study among Japanese Early-Adolescents

Authors: Kelvin Tang

Abstract:

As the world is approaching global warming of 1.5°C above pre-industrial levels, more atrocious consequences of climate change are projected to occur in the future. Consequently, it is today’s adolescents who will encounter the grand consequences of climate change. Therefore, nurturing adolescents that are well-informed, emotionally engaged, and motivated to take actions for combating climate change may be pivotal. Climate change education has a role in not only raising awareness, but also promoting behaviour change for climate change mitigation and adaptation. However, what kind of climate change education is suitable for whom? Requiring a learner-centred approach, tailoring climate change education requires a comprehensive understanding of the audience and their preconditions. In Japan, where climate change education has yet to be recognised as a field of environmental education, understanding climate change conceptions possessed by early adolescents is critical for a better design and more impactful implementation of climate change education. This exploratory study aims to investigate climate change conceptions among Japanese early adolescents from the perspective of cognition, affective, and conative dimensions. Questionnaire surveys were conducted targeting 423 students aged 12–14 in three public junior high schools located in Kashiwa City and Oita City. Findings suggest that the majority of Japanese early adolescents belong to groups that exhibit lower levels of cognition, affect, and conation in relation to climate change. The relationships among those dimensions were found to be positive and bidirectional. Moreover, several misconceptions about climate change and the effectiveness of its solutions were identified among the sample.

Keywords: climate change conceptions, climate change education, environmental education, adolescents, three learning dimensions, Japan

Procedia PDF Downloads 63
6000 Youth Conflict-Related Trauma through Generations: An Ethnography on the Relationship between Health and Society in Post-Conflict Northern Ireland

Authors: Chiara Magliacane

Abstract:

This project aims to analyse the relationship between the post-conflict Northern Irish environment and youth trauma in deprived areas. Using an anthropological perspective and methodology, the study investigates the possible contribution that a socio-cultural perspective can give to the current research on the field, with a special focus on the role of transgenerational trauma. The recognition of the role that socio-economic determinants have on health is usually a challenge for social researchers. In post-conflict Northern Ireland, the overall lack of research about connections between the social context and youth trauma opens the way to the present project. Anthropological studies on social implications of mental disorders have achieved impressive results in many societies; they show how conditions of sufferance and poverty are not intrinsically given, but are the products of historical processes and events. The continuum of violence and the politics of victimhood sustains a culture of silence and fear in deprived areas; this implies the need of investigating the structural and symbolic violence that lies behind the diffusion of mental suffering. The project refers to these concepts from Medical Anthropology and looks at connections between trauma and social, political and economic structures. Accordingly, the study considers factors such as poverty, unemployment, social inequality and gender and class perspectives. At the same time, the project problematises categories such as youth and trauma. 'Trauma' is currently debated within the social sciences since the 'invention' of the Post-Traumatic Stress Disorder (PTSD) in 1980. Current critics made to its clinical conception show how trauma has been mainly analysed as a memory of the past. On the contrary, medical anthropological research focuses on wider perspectives on society and its structures; this is a new and original approach to the study of youth trauma considering that, to author’s best knowledge, there is no research of this kind regarding Northern Ireland. Methods: Qualitative interviews, participant observation. Expected Impact: Local Northern Ireland organizations, i.e. specific charities that provide mental health support. Ongoing and present connections will ensure they will hear about this research.

Keywords: health and social inequalities, Northern Ireland, structural violence, youth

Procedia PDF Downloads 210
5999 Auditory Brainstem Response in Wave VI for the Detection of Learning Disabilities

Authors: Maria Isabel Garcia-Planas, Maria Victoria Garcia-Camba

Abstract:

The use of brain stem auditory evoked potential (BAEP) is a common way to study the auditory function of people, a way to learn the functionality of a part of the brain neuronal groups that intervene in the learning process by studying the behaviour of wave VI. The latest advances in neuroscience have revealed the existence of different brain activity in the learning process that can be highlighted through the use of innocuous, low-cost, and easy-access techniques such as, among others, the BAEP that can help us to detect early possible neurodevelopmental difficulties for their subsequent assessment and cure. To date and to the authors' best knowledge, only the latency data obtained, observing the first to V waves and mainly in the left ear, were taken into account. This work shows that it is essential to take into account both ears; with these latest data, it has been possible had diagnosed more precise some cases than with the previous data had been diagnosed as 'normal' despite showing signs of some alteration that motivated the new consultation to the specialist.

Keywords: ear, neurodevelopment, auditory evoked potentials, intervals of normality, learning disabilities

Procedia PDF Downloads 162
5998 Breaking the Silence and Rewriting the Script

Authors: Carlette Groome

Abstract:

This paper examined the role of drama in the lives of four women. The researcher concluded that drama can be an avenue of healing and could be an effective means of social work intervention in the communities as well as female empowerment. The participants in the study were able to, through the dramatic process; re-write their life’s scripts by resolving paradoxes and conflicts related to the themes unearthed. The research conducted examined the role of drama in the lives of four women living in volatile communities in Jamaica, who were each exposed to violence in one, or multiple, forms. The women were trained by Sistren Theatre Collective in the use of drama for education (edutainment), and were actresses in Sistren's street theatre drama group. Using their own personal and collective experiences, they used drama to raise social consciousness at the community level, about violence and other issues affecting women. The study employed a narrative case study approach and was grounded in a constructivist paradigm. This paradigm was coupled with a basic interpretive qualitative method and the concept of the reflective practitioner provided the foundation for the analysis. Through individual conversations with the women, themes of abuse, resilience, self- esteem, and empowerment arose sharply. The women explored drama and understood it to be instrumental in healing different aspects of their lives. Also, through the dramatic process; they were able to re-write their life’s scripts by resolving paradoxes and conflicts related to the themes unearthed.

Keywords: women, drama, healing, community

Procedia PDF Downloads 339
5997 3D Images Representation to Provide Information on the Type of Castella Beams Hole

Authors: Cut Maisyarah Karyati, Aries Muslim, Sulardi

Abstract:

Digital image processing techniques to obtain detailed information from an image have been used in various fields, including in civil engineering, where the use of solid beam profiles in buildings and bridges has often been encountered since the early development of beams. Along with this development, the founded castellated beam profiles began to be more diverse in shape, such as the shape of a hexagon, triangle, pentagon, circle, ellipse and oval that could be a practical solution in optimizing a construction because of its characteristics. The purpose of this research is to create a computer application to edge detect the profile of various shapes of the castella beams hole. The digital image segmentation method has been used to obtain the grayscale images and represented in 2D and 3D formats. This application has been successfully made according to the desired function, which is to provide information on the type of castella beam hole.

Keywords: digital image, image processing, edge detection, grayscale, castella beams

Procedia PDF Downloads 140
5996 Financial Statement Fraud: The Need for a Paradigm Shift to Forensic Accounting

Authors: Ifedapo Francis Awolowo

Abstract:

The unrelenting series of embarrassing audit failures should stimulate a paradigm shift in accounting. And in this age of information revolution, there is need for a constant improvement on the products or services one offers to the market in order to be relevant. This study explores the perceptions of external auditors, forensic accountants and accounting academics on whether a paradigm shift to forensic accounting can reduce financial statement frauds. Through Neo-empiricism/inductive analytical approach, findings reveal that a paradigm shift to forensic accounting might be the right step in the right direction in order to increase the chances of fraud prevention and detection in the financial statement. This research has implication on accounting education on the need to incorporate forensic accounting into present day accounting curriculum. Accounting professional bodies, accounting standard setters and accounting firms all have roles to play in incorporating forensic accounting education into accounting curriculum. Particularly, there is need to alter the ISA 240 to make the prevention and detection of frauds the responsibilities of bot those charged with the management and governance of companies and statutory auditors.

Keywords: financial statement fraud, forensic accounting, fraud prevention and detection, auditing, audit expectation gap, corporate governance

Procedia PDF Downloads 365
5995 Modified Gold Screen Printed Electrode with Ruthenium Complex for Selective Detection of Porcine DNA

Authors: Siti Aishah Hasbullah

Abstract:

Studies on identification of pork content in food have grown rapidly to meet the Halal food standard in Malaysia. The used mitochondria DNA (mtDNA) approaches for the identification of pig species is thought to be the most precise marker due to the mtDNA genes are present in thousands of copies per cell, the large variability of mtDNA. The standard method commonly used for DNA detection is based on polymerase chain reaction (PCR) method combined with gel electrophoresis but has major drawback. Its major drawbacks are laborious, need longer time and toxic to handle. Therefore, the need for simplicity and fast assay of DNA is vital and has triggered us to develop DNA biosensors for porcine DNA detection. Therefore, the aim of this project is to develop electrochemical DNA biosensor based on ruthenium (II) complex, [Ru(bpy)2(p-PIP)]2+ as DNA hybridization label. The interaction of DNA and [Ru(bpy)2(p-HPIP)]2+ will be studied by electrochemical transduction using Gold Screen-Printed Electrode (GSPE) modified with gold nanoparticles (AuNPs) and succinimide acrylic microspheres. The electrochemical detection by redox active ruthenium (II) complex was measured by cyclic voltammetry (CV) and differential pulse voltammetry (DPV). The results indicate that the interaction of [Ru(bpy)2(PIP)]2+ with hybridization complementary DNA has higher response compared to single-stranded and mismatch complementary DNA. Under optimized condition, this porcine DNA biosensor incorporated modified GSPE shows good linear range towards porcine DNA.

Keywords: gold, screen printed electrode, ruthenium, porcine DNA

Procedia PDF Downloads 307