Search results for: medical surveillance process
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 18418

Search results for: medical surveillance process

18298 Stochastic Multicast Routing Protocol for Flying Ad-Hoc Networks

Authors: Hyunsun Lee, Yi Zhu

Abstract:

Wireless ad-hoc network is a decentralized type of temporary machine-to-machine connection that is spontaneous or impromptu so that it does not rely on any fixed infrastructure and centralized administration. As unmanned aerial vehicles (UAVs), also called drones, have recently become more accessible and widely utilized in military and civilian domains such as surveillance, search and detection missions, traffic monitoring, remote filming, product delivery, to name a few. The communication between these UAVs become possible and materialized through Flying Ad-hoc Networks (FANETs). However, due to the high mobility of UAVs that may cause different types of transmission interference, it is vital to design robust routing protocols for FANETs. In this talk, the multicast routing method based on a modified stochastic branching process is proposed. The stochastic branching process is often used to describe an early stage of an infectious disease outbreak, and the reproductive number in the process is used to classify the outbreak into a major or minor outbreak. The reproductive number to regulate the local transmission rate is adapted and modified for flying ad-hoc network communication. The performance of the proposed routing method is compared with other well-known methods such as flooding method and gossip method based on three measures; average reachability, average node usage and average branching factor. The proposed routing method achieves average reachability very closer to flooding method, average node usage closer to gossip method, and outstanding average branching factor among methods. It can be concluded that the proposed multicast routing scheme is more efficient than well-known routing schemes such as flooding and gossip while it maintains high performance.

Keywords: Flying Ad-hoc Networks, Multicast Routing, Stochastic Branching Process, Unmanned Aerial Vehicles

Procedia PDF Downloads 122
18297 Learners' Perception of Digitalization of Medical Education in a Low Middle-Income Country – A Case Study of the Lecturio Platform

Authors: Naomi Nathan

Abstract:

Introduction Digitalization of medical education can revolutionize how medical students learn and interact with the medical curriculum across contexts. With the increasing availability of the internet and mobile connectivity in LMICs, online medical education platforms and digital learning tools are becoming more widely available, providing new opportunities for learners to access high-quality medical education and training. However, the adoption and integration of digital technologies in medical education in LMICs is a complex process influenced by various factors, including learners' perceptions and attitudes toward digital learning. In Ethiopia, the adoption of digital platforms for medical education has been slow, with traditional face-to-face teaching methods still being the norm. However, as access to technology improves and more universities adopt digital platforms, it is crucial to understand how medical students perceive this shift. Methodology This study investigated medical students' perception of the digitalization of medical education in relation to their access to the Lecturio Digital Medical Education Platform through a capacity-building project. 740 medical students from over 20 medical universities participated in the study. The students were surveyed using a questionnaire that included their attitudes toward the digitalization of medical education, their frequency of use of the digital platform, and their perceived benefits and challenges. Results The study results showed that most medical students had a positive attitude toward digitalizing medical education. The most commonly cited benefit was the convenience and flexibility of accessing course material/curriculum online. Many students also reported that they found the platform more interactive and engaging, leading to a more meaningful learning experience. The study also identified several challenges medical students faced when using the platform. The most commonly reported challenge was the need for more reliable internet access, which made it difficult for students to access content consistently. Overall, the results of this study suggest that medical students in Ethiopia have a positive perception of the digitalization of medical education. Over 97% of students continuously expressed a need for access to the Lecturio platform throughout their studies. Conclusion Significant challenges still need to be addressed to fully realize the Lecturio digital platform's benefits. Universities, relevant ministries, and various stakeholders must work together to address these challenges to ensure that medical students fully participate in and benefit from digitalized medical education - sustainably and effectively.

Keywords: digital medical education, EdTech, LMICs, e-learning

Procedia PDF Downloads 90
18296 Impact of Meteorological Factors on Influenza Activity in Pakistan; A Tale of Two Cities

Authors: Nadia Nisar

Abstract:

Background: In the temperate regions Influenza activities occur sporadically all year round with peaks coinciding during cold months. Meteorological and environmental conditions play significant role in the transmission of influenza globally. In this study, we assessed the relationship between meteorological parameters and influenza activity in two geographical areas of Pakistan. Methods: Influenza data were collected from Islamabad (north) and Multan (south) regions of national influenza surveillance system during 2010-2015. Meteorological database was obtained from National Climatic Data Center (Pakistan). Logistic regression model with a stepwise approach was used to explore the relationship between meteorological parameters with influenza peaks. In statistical model, we used the weekly proportion of laboratory-confirmed influenza positive samples to represent Influenza activity with metrological parameters as the covariates (temperature, humidity and precipitation). We also evaluate the link between environmental conditions associated with seasonal influenza epidemics: 'cold-dry' and 'humid-rainy'. Results: We found that temperature and humidity was positively associated with influenza in north and south both locations (OR = 0.927 (0.88-0.97)) & (OR = 0.1.078 (1.027-1.132)) and (OR = 1.023 (1.008-1.037)) & (OR = 0.978 (0.964-0.992)) respectively, whilst precipitation was negatively associated with influenza (OR = 1.054 (1.039-1.070)) & (OR = 0.949 (0.935-0.963)). In both regions, temperature and humidity had the highest contribution to the model as compared to the precipitation. We revealed that the p-value for all of climate parameters is <0.05 by Independent-sample t-test. These results demonstrate that there were significant relationships between climate factors and influenza infection with correlation coefficients: 0.52-0.90. The total contribution of these three climatic variables accounted for 89.04%. The reported number of influenza cases increased sharply during the cold-dry season (i.e., winter) when humidity and temperature are at minimal levels. Conclusion: Our findings showed that measures of temperature, humidity and cold-dry season (winter) can be used as indicators to forecast influenza infections. Therefore integrating meteorological parameters for influenza forecasting in the surveillance system may benefit the public health efforts in reducing the burden of seasonal influenza. More studies are necessary to understand the role of these parameters in the viral transmission and host susceptibility process.

Keywords: influenza, climate, metrological, environmental

Procedia PDF Downloads 200
18295 A Study on Unix Process Crash Based on Efficient Process Management Method

Authors: Guo Haonan, Chen Peiyu, Zhao Hanyu, Burra Venkata Durga Kumar

Abstract:

Unix and Unix-like operating systems are widely used due to their high stability but are limited by the parent-child process structure, and the child process depends on the parent process, so the crash of a single process may cause the entire process group or even the entire system to fail. Another possibility of unexpected process termination is that the system administrator inadvertently closed the terminal or pseudo-terminal where the application was launched, causing the application process to terminate unexpectedly. This paper mainly analyzes the reasons for the problems and proposes two solutions.

Keywords: process management, daemon, login-bash and non-login bash, process group

Procedia PDF Downloads 132
18294 Image Processing techniques for Surveillance in Outdoor Environment

Authors: Jayanth C., Anirudh Sai Yetikuri, Kavitha S. N.

Abstract:

This paper explores the development and application of computer vision and machine learning techniques for real-time pose detection, facial recognition, and number plate extraction. Utilizing MediaPipe for pose estimation, the research presents methods for detecting hand raises and ducking postures through real-time video analysis. Complementarily, facial recognition is employed to compare and verify individual identities using the face recognition library. Additionally, the paper demonstrates a robust approach for extracting and storing vehicle number plates from images, integrating Optical Character Recognition (OCR) with a database management system. The study highlights the effectiveness and versatility of these technologies in practical scenarios, including security and surveillance applications. The findings underscore the potential of combining computer vision techniques to address diverse challenges and enhance automated systems for both individual and vehicular identification. This research contributes to the fields of computer vision and machine learning by providing scalable solutions and demonstrating their applicability in real-world contexts.

Keywords: computer vision, pose detection, facial recognition, number plate extraction, machine learning, real-time analysis, OCR, database management

Procedia PDF Downloads 24
18293 Medical Images Enhancement Using New Dynamic Band Pass Filter

Authors: Abdellatif Baba

Abstract:

In order to facilitate medical images analysis by improving their quality and readability, we present in this paper a new dynamic band pass filter as a general and suitable operator for different types of medical images. Our objective is to enrich the details of any treated medical image to make it sufficiently clear enough to give an understood and simplified meaning even for unspecialized people in the medical domain.

Keywords: medical image enhancement, dynamic band pass filter, analysis improvement

Procedia PDF Downloads 287
18292 Trajectory Tracking of Fixed-Wing Unmanned Aerial Vehicle Using Fuzzy-Based Sliding Mode Controller

Authors: Feleke Tsegaye

Abstract:

The work in this thesis mainly focuses on trajectory tracking of fixed wing unmanned aerial vehicle (FWUAV) by using fuzzy based sliding mode controller(FSMC) for surveillance applications. Unmanned Aerial Vehicles (UAVs) are general-purpose aircraft built to fly autonomously. This technology is applied in a variety of sectors, including the military, to improve defense, surveillance, and logistics. The model of FWUAV is complex due to its high non-linearity and coupling effect. In this thesis, input decoupling is done through extracting the dominant inputs during the design of the controller and considering the remaining inputs as uncertainty. The proper and steady flight maneuvering of UAVs under uncertain and unstable circumstances is the most critical problem for researchers studying UAVs. A FSMC technique was suggested to tackle the complexity of FWUAV systems. The trajectory tracking control algorithm primarily uses the sliding-mode (SM) variable structure control method to address the system’s control issue. In the SM control, a fuzzy logic control(FLC) algorithm is utilized in place of the discontinuous phase of the SM controller to reduce the chattering impact. In the reaching and sliding stages of SM control, Lyapunov theory is used to assure finite-time convergence. A comparison between the conventional SM controller and the suggested controller is done in relation to the chattering effect as well as tracking performance. It is evident that the chattering is effectively reduced, the suggested controller provides a quick response with a minimum steady-state error, and the controller is robust in the face of unknown disturbances. The designed control strategy is simulated with the nonlinear model of FWUAV using the MATLAB® / Simulink® environments. The simulation result shows the suggested controller operates effectively, maintains an aircraft’s stability, and will hold the aircraft’s targeted flight path despite the presence of uncertainty and disturbances.

Keywords: fixed-wing UAVs, sliding mode controller, fuzzy logic controller, chattering, coupling effect, surveillance, finite-time convergence, Lyapunov theory, flight path

Procedia PDF Downloads 56
18291 Landmines and the Postcolonial Security Discourse in Zimbabwe

Authors: Fradreck Jockonia Mujuru

Abstract:

The effects of landmine residues from the Zimbabwean liberation war are persisting. Landmines are violently maiming and killing people and animals, causing certain areas inaccessible for agriculture and habitation, instilling fear, and even inducing forced migration. A significant gap in landmines literature is that they are mainly treated as a humanitarian issue and less scholarly. This paper engaged in theorising landmines using postcolonial literature as an epistemology. The results exhibit three issues. One, postcolonial literature provides a timeframe, a process, a space, and an attitude towards modernity on the inquiry of landmines. Two, landmines are understood in the context of war and were further decolonised to pick unique principles studied. Lastly, some of the unique principles found in landmines after decolonising are their ability to provide surveillance, repression and violent fate to all who cross the set boundaries. Therefore, theorising landmines can also be pushed further to be understood through repression. This article concluded that landmines can be theorised outside mainstream International Relations theories using postcolonial literature.

Keywords: landmines, postcolonial, repression, security, violence

Procedia PDF Downloads 75
18290 Social Technology and Youth Justice: An Exploration of Ethical and Practical Challenges

Authors: Ravinder Barn, Balbir Barn

Abstract:

This paper outlines ethical and practical challenges in the building of social technology for use with socially excluded and marginalised groups. The primary aim of this study was to design, deploy and evaluate social technology that may help to promote better engagement between case workers and young people to help prevent recidivism, and support young people’s transition towards social inclusion in society. A total of 107 practitioners/managers (n=64), and young people (n=43) contributed to the data collection via surveys, focus groups and 1-1 interviews. Through a process of co-design where end-users are involved as key contributors to social technological design, this paper seeks to make an important contribution to the area of participatory methodologies by arguing that whilst giving ‘voice’ to key stakeholders in the research process is crucial, there is a risk that competing voices may lead to tensions and unintended outcomes. The paper is contextualized within a Foucauldian perspective to examine significant concepts including power, authority and surveillance. Implications for youth justice policy and practice are considered. The authors conclude that marginalized youth and over-stretched practitioners are better served when such social technology is perceived and adopted as a tool of empowerment within a framework of child welfare and child rights.

Keywords: youth justice, social technology, marginalization, participatory research, power

Procedia PDF Downloads 447
18289 Epidemiological, Clinical and Bacteriological Profile of Human Brucellosis in the District of Tunis

Authors: Jihene Bettaieb, Ghassen kharroubi, Rym mallekh, Ines Cherif, Taoufik Atawa, Kaouther Harrabech

Abstract:

Brucellosis is a major worldwide zoonosis. It is a reportable condition in Tunisia where the disease remains endemic, especially in rural areas. The aim of this study was to describe the epidemiological, clinical, and bacteriological profile of human brucellosis cases notified in the district of Tunis. It was a retrospective descriptive study of cases reported in the district of Tunis through the national surveillance system between the 1st January and 31th December 2017. During the study period, 133 brucellosis confirmed cases were notified. The mean age was 37.5 ± 18.0 years, and 54.9% of cases were males. More than four-fifths (82.7%) of cases were reported in spring and summer with a peak in the month of May (36 cases). Fever and sweats were the most common symptoms; they occurred in 95% and 72% of cases, respectively. Osteoarticular complications occurred in 10 cases, meningitis in one case and endocarditis in one other case. Wright agglutination test and Rose Bengale test were positive in 100% and 91% of cases, respectively. While blood culture was positive in 9 cases and PCR in 2 cases. Brucella melitensis was the only identified specie (9 cases). Almost all cases (99.2%) reported the habit of consuming raw dairy products. Only 5 cases had a suspect contact with animals; among them, 3 persons were livestock breeders. The transmission was essentially due to raw dairy product consumption. It is important to enhance preventive measures to control animal Brucellosis and to educate the population regarding the risk factors of the disease.

Keywords: brucellosis, risk factors, surveillance system, Tunisia

Procedia PDF Downloads 133
18288 The Use of Urine Cytology in an Australian Regional Hospital Compared to International Guidelines

Authors: Jake Tempo, Stephen Brough

Abstract:

Introduction and Objectives: Urine cytology has a role in the diagnosis of urothelial cancer when used alongside cystoscopy and imaging, according to the European Association of Urology guidelines. It also has a role in the surveillance post-treatment of urothelial carcinoma. Collecting and analysing urine cytology is costly and time-consuming. We investigated the use of urine cytology in an Australian regional hospital to determine whether clinicians are following international guidelines. Materials and Methods: We analysed all urine cytology requests performed in an Australian regional hospital between 1st January 2017 and 31st December 2018. We reviewed the indication for urine cytology and the patients’ case notes to determine whether urine cytology changed management. Results: During the two-year study period, 153 patients had urine cytology analysed for a variety of indications. In no cases did cytology change the outcome of patient management significantly. In total, 69 of 153 (41%) urine cytology requests were not supported by urological society guidelines. Fifty requests were for haematuria, and twenty requests were for urothelial cancer surveillance. Seven were analysed for follow-up from previous urological investigations. Nine samples were sent for ureteric obstruction of unknown origin. Conclusion: Urine cytology, even when positive, did not significantly change management for the investigation of potential urothelial cancer, and therefore, its use as a diagnostic tool for this purpose should be reconsidered. Many cytology tests are expensive, unnecessary, and not supported by urological society guidelines.

Keywords: cytology, bladder cancer, urine, urothelial carcinoma

Procedia PDF Downloads 91
18287 Rabies Surveillance Data Analysis in Addis Ababa, Ethiopia during 2012/13: Retrospective Cross Sectional Study

Authors: Fantu Lombamo Untiso, Sylvia Murphy, Emily Pieracci

Abstract:

Background: Rabies is a highly fatal viral disease of all warm-blooded animals including human globally. However, effective rabies control program still remains to be a reality and needs to be strengthened. Objective: Reviewing of recorded data and analyzing it to generate information on the status of rabies in Addis Ababa in the year 2012/13. Methods: A retrospective data were used from the Ethiopian Public Health Institute rabies case record book registered in the year 2012/13. Results: Among 1357 suspected rabid animals clinically examined; only 8.84% were positive for rabies. Out of 216 animal brains investigated in the laboratory with Fluorescent Antibody Technique, 55.5% were confirmed rabies positive. Among the laboratory confirmed positive rabies cases, high percentage of the animals came from Yeka (20%) and lower number from Kirkos subcity (3.3%). Out of 1149 humans who came to the institute seeking anti-rabies post-exposure prophylaxis, 85.65% and 7.87% of them were exposed to suspected dogs and cats respectively. 3 human deaths due to rabies were reported in the year after exposure to dog bite of unknown vaccination status. Conclusion: The principal vector of rabies in Addis Ababa is dog. Effective rabies management and control based on confirmed cases and mass-immunization and control of stray dog populations is recommended.

Keywords: Addis Ababa, exposure, rabies, surveillance

Procedia PDF Downloads 178
18286 Indicators to Assess the Quality of Health Services

Authors: Muyatdinova Aigul, Aitkaliyeva Madina

Abstract:

The article deals with the evaluation of the quality of medical services on the basis of quality indicators. For this purpose allocated initially the features of the medical services market. The Features of the market directly affect on the evaluation process that takes a multi-level and multi-stakeholder nature. Unlike ordinary goods market assessment of medical services does not only market. Such an assessment is complemented by continuous internal and external evaluation, including experts and accrediting bodies. In the article highlighted the composition of indicators for a comprehensive evaluation

Keywords: health care market, quality of health services, indicators of care quality

Procedia PDF Downloads 435
18285 Application of Bundle Care to Reduce Invasive Catheter-Associated Infection in High Risk Units at a Medical Center

Authors: Hsin-Hsin Chang, Jann-Tay Wang, Wang-Huei Sheng

Abstract:

Background: Hospital-associated infections (HAIs) have significant medical and social resource consumption. In view of medical technology change rapidly and the prolonged average life expectancy, the patients' chances of receiving invasive medical devices have also increased. As well as the potential disease of the patients, the aging, and immune dysfunction makes the disease more serious, raising the risk of HAIs. In our adult intensive care units, catheter-associated urinary tract infections (CAUTIs) have an average of 4.6% in 2014, which is much higher than that of the National Healthcare Safety Network (NHSN). Therefore, we started the intervention of CAUTI bundle care. Methods: This 3-year intervention was conducted in adults’ intensive care units (ICUs) during January 2015 to December 2017. The implementation of CAUTI bundle care in order to reduce invasive catheter-associated infections were built on evidence-based infection control measures. Prospective surveillance was performed on all patients admitted to hospital. The four major directions are 'Leader Engagement', 'Educate Personnel', 'Executive Multidisciplinary Teamwork', 'Innovation and Improvement of Tools'. Results: During the intervention period, there were 167,024 patient-days with a total of 508 episodes of CAUTIs in the entire adult ICUs identified. The incidence of CAUTIs in adult ICU was significantly decreased in the intervention period (from 2015 to 2017), from 4.6 to 3.6 per 1000 catheter days (p=0.05). Conclusion: The necessity for the implementation of CAUTI bundle care in the health care system plays an important role in the quality and policy of infection control. Multidisciplinary teamwork, education, a comprehensive checklist and from time to time audit feedback to improve healthcare workers’ compliance are the keys to success.

Keywords: bundle care, hospital-associated infections, leader engagement, multidisciplinary team work

Procedia PDF Downloads 152
18284 Medical Image Watermark and Tamper Detection Using Constant Correlation Spread Spectrum Watermarking

Authors: Peter U. Eze, P. Udaya, Robin J. Evans

Abstract:

Data hiding can be achieved by Steganography or invisible digital watermarking. For digital watermarking, both accurate retrieval of the embedded watermark and the integrity of the cover image are important. Medical image security in Teleradiology is one of the applications where the embedded patient record needs to be extracted with accuracy as well as the medical image integrity verified. In this research paper, the Constant Correlation Spread Spectrum digital watermarking for medical image tamper detection and accurate embedded watermark retrieval is introduced. In the proposed method, a watermark bit from a patient record is spread in a medical image sub-block such that the correlation of all watermarked sub-blocks with a spreading code, W, would have a constant value, p. The constant correlation p, spreading code, W and the size of the sub-blocks constitute the secret key. Tamper detection is achieved by flagging any sub-block whose correlation value deviates by more than a small value, ℇ, from p. The major features of our new scheme include: (1) Improving watermark detection accuracy for high-pixel depth medical images by reducing the Bit Error Rate (BER) to Zero and (2) block-level tamper detection in a single computational process with simultaneous watermark detection, thereby increasing utility with the same computational cost.

Keywords: Constant Correlation, Medical Image, Spread Spectrum, Tamper Detection, Watermarking

Procedia PDF Downloads 192
18283 Dengue Prevention and Control in Kaohsiung City

Authors: Chiu-Wen Chang, I-Yun Chang, Wei-Ting Chen, Hui-Ping Ho, Ruei-Hun Chang, Joh-Jong Huang

Abstract:

Kaohsiung City is located in the tropical region where has Aedes aegypti and Aedes albopictus distributed; once the virus invades, it’s can easily trigger local epidemic. Besides, Kaohsiung City has a world-class airport and harbor, trade and tourism are close and frequently with every country, especially with the Southeast Asian countries which also suffer from dengue. Therefore, Kaohsiung City faces the difficult challenge of dengue every year. The objectives of this study was to enhance dengue clinical care, border management and vector surveillance in Kaohsiung City by establishing an larger scale, innovatively and more coordinated dengue prevention and control strategies in 2016, including (1) Integrated medical programs: facilitated 657 contract medical institutions, widely set up NS1 rapid test in clinics, enhanced triage and referrals system, dengue case daily-monitoring management (2) Border quarantine: comprehensive NS1 screening for foreign workers and fisheries when immigration, hospitalization and isolation for suspected cases, health education for high risk groups (foreign students, other tourists) (3) Mosquito control: Widely use Gravitrap to monitor mosquito density in environment, use NS1 rapid screening test to detect community dengue virus (4) Health education: create a dengue app for people to immediately inquire the risk map and nearby medical resources, routine health education to all districts to strengthen public’s dengue knowledge, neighborhood cleaning awards program. The results showed that after new integration of dengue prevention and control strategies fully implemented in Kaohsiung City, the number of confirmed cases in 2016 declined to 342 cases, the majority of these cases are the continuation epidemic in 2015; in fact, only two cases confirmed after the 2016 summer. Besides, the dengue mortality rate successfully decreased to 0% in 2016. Moreover, according to the reporting rate from medical institutions in 2014 and 2016, it dropped from 27.07% to 19.45% from medical center, and it decreased from 36.55% to 29.79% from regional hospital; however, the reporting rate of district hospital increased from 11.88% to 15.87% and also increased from 24.51% to 34.89% in general practice clinics. Obviously, it showed that under the action of strengthening medical management, it reduced the medical center’s notification ratio and improved the notification ratio of general clinics which achieved the great effect of dengue clinical management and dengue control.

Keywords: dengue control, integrated control strategies, clinical management, NS1

Procedia PDF Downloads 269
18282 Automatic Detection and Update of Region of Interest in Vehicular Traffic Surveillance Videos

Authors: Naydelis Brito Suárez, Deni Librado Torres Román, Fernando Hermosillo Reynoso

Abstract:

Automatic detection and generation of a dynamic ROI (Region of Interest) in vehicle traffic surveillance videos based on a static camera in Intelligent Transportation Systems is challenging for computer vision-based systems. The dynamic ROI, being a changing ROI, should capture any other moving object located outside of a static ROI. In this work, the video is represented by a Tensor model composed of a Background and a Foreground Tensor, which contains all moving vehicles or objects. The values of each pixel over a time interval are represented by time series, and some pixel rows were selected. This paper proposes a pixel entropy-based algorithm for automatic detection and generation of a dynamic ROI in traffic videos under the assumption of two types of theoretical pixel entropy behaviors: (1) a pixel located at the road shows a high entropy value due to disturbances in this zone by vehicle traffic, (2) a pixel located outside the road shows a relatively low entropy value. To study the statistical behavior of the selected pixels, detecting the entropy changes and consequently moving objects, Shannon, Tsallis, and Approximate entropies were employed. Although Tsallis entropy achieved very high results in real-time, Approximate entropy showed results slightly better but in greater time.

Keywords: convex hull, dynamic ROI detection, pixel entropy, time series, moving objects

Procedia PDF Downloads 73
18281 Saudi Arabia Border Security Informatics: Challenges of a Harsh Environment

Authors: Syed Ahsan, Saleh Alshomrani, Ishtiaq Rasool, Ali Hassan

Abstract:

In this oral presentation, we will provide an overview of the technical and semantic architecture of a desert border security and critical infrastructure protection security system. Modern border security systems are designed to reduce the dependability and intrusion of human operators. To achieve this, different types of sensors are use along with video surveillance technologies. Application of these technologies in a harsh desert environment of Saudi Arabia poses unique challenges. Environmental and geographical factors including high temperatures, desert storms, temperature variations and remoteness adversely affect the reliability of surveillance systems. To successfully implement a reliable, effective system in a harsh desert environment, the following must be achieved: i) Selection of technology including sensors, video cameras, and communication infrastructure that suit desert environments. ii) Reduced power consumption and efficient usage of equipment to increase the battery life of the equipment. iii) A reliable and robust communication network with efficient usage of bandwidth. Also, to reduce the expert bottleneck, an ontology-based intelligent information systems needs to be developed. Domain knowledge unique and peculiar to Saudi Arabia needs to be formalized to develop an expert system that can detect abnormal activities and any intrusion.

Keywords: border security, sensors, abnormal activity detection, ontologies

Procedia PDF Downloads 480
18280 Face Recognition Using Body-Worn Camera: Dataset and Baseline Algorithms

Authors: Ali Almadan, Anoop Krishnan, Ajita Rattani

Abstract:

Facial recognition is a widely adopted technology in surveillance, border control, healthcare, banking services, and lately, in mobile user authentication with Apple introducing “Face ID” moniker with iPhone X. A lot of research has been conducted in the area of face recognition on datasets captured by surveillance cameras, DSLR, and mobile devices. Recently, face recognition technology has also been deployed on body-worn cameras to keep officers safe, enabling situational awareness and providing evidence for trial. However, limited academic research has been conducted on this topic so far, without the availability of any publicly available datasets with a sufficient sample size. This paper aims to advance research in the area of face recognition using body-worn cameras. To this aim, the contribution of this work is two-fold: (1) collection of a dataset consisting of a total of 136,939 facial images of 102 subjects captured using body-worn cameras in in-door and daylight conditions and (2) evaluation of various deep-learning architectures for face identification on the collected dataset. Experimental results suggest a maximum True Positive Rate(TPR) of 99.86% at False Positive Rate(FPR) of 0.000 obtained by SphereFace based deep learning architecture in daylight condition. The collected dataset and the baseline algorithms will promote further research and development. A downloadable link of the dataset and the algorithms is available by contacting the authors.

Keywords: face recognition, body-worn cameras, deep learning, person identification

Procedia PDF Downloads 161
18279 Simulation of a Fluid Catalytic Cracking Process

Authors: Sungho Kim, Dae Shik Kim, Jong Min Lee

Abstract:

Fluid catalytic cracking (FCC) process is one of the most important process in modern refinery indusrty. This paper focuses on the fluid catalytic cracking (FCC) process. As the FCC process is difficult to model well, due to its nonlinearities and various interactions between its process variables, rigorous process modeling of whole FCC plant is demanded for control and plant-wide optimization of the plant. In this study, a process design for the FCC plant includes riser reactor, main fractionator, and gas processing unit was developed. A reactor model was described based on four-lumped kinetic scheme. Main fractionator, gas processing unit and other process units are designed to simulate real plant data, using a process flowsheet simulator, Aspen PLUS. The custom reactor model was integrated with the process flowsheet simulator to develop an integrated process model.

Keywords: fluid catalytic cracking, simulation, plant data, process design

Procedia PDF Downloads 452
18278 Space Time Adaptive Algorithm in Bi-Static Passive Radar Systems for Clutter Mitigation

Authors: D. Venu, N. V. Koteswara Rao

Abstract:

Space – time adaptive processing (STAP) is an effective tool for detecting a moving target in spaceborne or airborne radar systems. Since airborne passive radar systems utilize broadcast, navigation and excellent communication signals to perform various surveillance tasks and also has attracted significant interest from the distinct past, therefore the need of the hour is to have cost effective systems as compared to conventional active radar systems. Moreover, requirements of small number of secondary samples for effective clutter suppression in bi-static passive radar offer abundant illuminator resources for passive surveillance radar systems. This paper presents a framework for incorporating knowledge sources directly in the space-time beam former of airborne adaptive radars. STAP algorithm for clutter mitigation for passive bi-static radar has better quantitation of the reduction in sample size thereby amalgamating the earlier data bank with existing radar data sets. Also, we proposed a novel method to estimate the clutter matrix and perform STAP for efficient clutter suppression based on small sample size. Furthermore, the effectiveness of the proposed algorithm is verified using MATLAB simulations in order to validate STAP algorithm for passive bi-static radar. In conclusion, this study highlights the importance for various applications which augments traditional active radars using cost-effective measures.

Keywords: bistatic radar, clutter, covariance matrix passive radar, STAP

Procedia PDF Downloads 293
18277 Human Identification and Detection of Suspicious Incidents Based on Outfit Colors: Image Processing Approach in CCTV Videos

Authors: Thilini M. Yatanwala

Abstract:

CCTV (Closed-Circuit-Television) Surveillance System is being used in public places over decades and a large variety of data is being produced every moment. However, most of the CCTV data is stored in isolation without having integrity. As a result, identification of the behavior of suspicious people along with their location has become strenuous. This research was conducted to acquire more accurate and reliable timely information from the CCTV video records. The implemented system can identify human objects in public places based on outfit colors. Inter-process communication technologies were used to implement the CCTV camera network to track people in the premises. The research was conducted in three stages and in the first stage human objects were filtered from other movable objects available in public places. In the second stage people were uniquely identified based on their outfit colors and in the third stage an individual was continuously tracked in the CCTV network. A face detection algorithm was implemented using cascade classifier based on the training model to detect human objects. HAAR feature based two-dimensional convolution operator was introduced to identify features of the human face such as region of eyes, region of nose and bridge of the nose based on darkness and lightness of facial area. In the second stage outfit colors of human objects were analyzed by dividing the area into upper left, upper right, lower left, lower right of the body. Mean color, mod color and standard deviation of each area were extracted as crucial factors to uniquely identify human object using histogram based approach. Color based measurements were written in to XML files and separate directories were maintained to store XML files related to each camera according to time stamp. As the third stage of the approach, inter-process communication techniques were used to implement an acknowledgement based CCTV camera network to continuously track individuals in a network of cameras. Real time analysis of XML files generated in each camera can determine the path of individual to monitor full activity sequence. Higher efficiency was achieved by sending and receiving acknowledgments only among adjacent cameras. Suspicious incidents such as a person staying in a sensitive area for a longer period or a person disappeared from the camera coverage can be detected in this approach. The system was tested for 150 people with the accuracy level of 82%. However, this approach was unable to produce expected results in the presence of group of people wearing similar type of outfits. This approach can be applied to any existing camera network without changing the physical arrangement of CCTV cameras. The study of human identification and suspicious incident detection using outfit color analysis can achieve higher level of accuracy and the project will be continued by integrating motion and gait feature analysis techniques to derive more information from CCTV videos.

Keywords: CCTV surveillance, human detection and identification, image processing, inter-process communication, security, suspicious detection

Procedia PDF Downloads 181
18276 Level Set and Morphological Operation Techniques in Application of Dental Image Segmentation

Authors: Abdolvahab Ehsani Rad, Mohd Shafry Mohd Rahim, Alireza Norouzi

Abstract:

Medical image analysis is one of the great effects of computer image processing. There are several processes to analysis the medical images which the segmentation process is one of the challenging and most important step. In this paper the segmentation method proposed in order to segment the dental radiograph images. Thresholding method has been applied to simplify the images and to morphologically open binary image technique performed to eliminate the unnecessary regions on images. Furthermore, horizontal and vertical integral projection techniques used to extract the each individual tooth from radiograph images. Segmentation process has been done by applying the level set method on each extracted images. Nevertheless, the experiments results by 90% accuracy demonstrate that proposed method achieves high accuracy and promising result.

Keywords: integral production, level set method, morphological operation, segmentation

Procedia PDF Downloads 315
18275 Security Analysis of Mod. S Transponder Technology and Attack Examples

Authors: M. Rutkowski, J. Cwiklak, M. Grzegorzewski, M. Adamski

Abstract:

All class A Airplanes have to be equipped with Mod. S transponder for ATC surveillance purposes. This technology was designed to provide a robust and dependable solution to localize, identify and exchange data with the airplane. The purpose of this paper is to analyze potential hazards that are a result of lack of any security or encryption on a design level. Secondary Surveillance Radars rely on an active response from an airplane. SSR radar installation is broadcasting a directional interrogation signal to the planes in range on 1030MHz frequency with DPSK modulation. If the interrogation is correctly received by the transponder located on the plane, a proper answer is sent on 1090MHz with PPM modulation containing plane’s SQUAWK, barometric altitude, GPS coordinates and 24bit unique address code. This technology does not use any kind of encryption. All of the specifications from the previous chapter can be found easily on the internet. Since there is no encryption or security measure to ensure the credibility of the sender and message, it is highly hazardous to use such technology to ensure the safety of the air traffic. The only thing that identifies the airplane is the 24-bit unique address. Most of the planes have been sniffed by aviation enthusiasts and cataloged in web databases. In the moment of writing this article, The PoFung Technologies has announced that they are planning to release all band SDR transceiver – this device would be more than enough to build your own Mod. S Transponder. With fake transponder, a potential terrorist can identify as a different airplane. By replacing the transponder in a poorly controlled airspace, hijackers can enter another airspace identifying themselves as another plane and land in the desired area.

Keywords: flight safety, hijack, mod S transponder, security analysis

Procedia PDF Downloads 294
18274 Evaluation of Real-Time Background Subtraction Technique for Moving Object Detection Using Fast-Independent Component Analysis

Authors: Naoum Abderrahmane, Boumehed Meriem, Alshaqaqi Belal

Abstract:

Background subtraction algorithm is a larger used technique for detecting moving objects in video surveillance to extract the foreground objects from a reference background image. There are many challenges to test a good background subtraction algorithm, like changes in illumination, dynamic background such as swinging leaves, rain, snow, and the changes in the background, for example, moving and stopping of vehicles. In this paper, we propose an efficient and accurate background subtraction method for moving object detection in video surveillance. The main idea is to use a developed fast-independent component analysis (ICA) algorithm to separate background, noise, and foreground masks from an image sequence in practical environments. The fast-ICA algorithm is adapted and adjusted with a matrix calculation and searching for an optimum non-quadratic function to be faster and more robust. Moreover, in order to estimate the de-mixing matrix and the denoising de-mixing matrix parameters, we propose to convert all images to YCrCb color space, where the luma component Y (brightness of the color) gives suitable results. The proposed technique has been verified on the publicly available datasets CD net 2012 and CD net 2014, and experimental results show that our algorithm can detect competently and accurately moving objects in challenging conditions compared to other methods in the literature in terms of quantitative and qualitative evaluations with real-time frame rate.

Keywords: background subtraction, moving object detection, fast-ICA, de-mixing matrix

Procedia PDF Downloads 96
18273 Measurement and Modelling of HIV Epidemic among High Risk Groups and Migrants in Two Districts of Maharashtra, India: An Application of Forecasting Software-Spectrum

Authors: Sukhvinder Kaur, Ashok Agarwal

Abstract:

Background: For the first time in 2009, India was able to generate estimates of HIV incidence (the number of new HIV infections per year). Analysis of epidemic projections helped in revealing that the number of new annual HIV infections in India had declined by more than 50% during the last decade (GOI Ministry of Health and Family Welfare, 2010). Then, National AIDS Control Organisation (NACO) planned to scale up its efforts in generating projections through epidemiological analysis and modelling by taking recent available sources of evidence such as HIV Sentinel Surveillance (HSS), India Census data and other critical data sets. Recently, NACO generated current round of HIV estimates-2012 through globally recommended tool “Spectrum Software” and came out with the estimates for adult HIV prevalence, annual new infections, number of people living with HIV, AIDS-related deaths and treatment needs. State level prevalence and incidence projections produced were used to project consequences of the epidemic in spectrum. In presence of HIV estimates generated at state level in India by NACO, USIAD funded PIPPSE project under the leadership of NACO undertook the estimations and projections to district level using same Spectrum software. In 2011, adult HIV prevalence in one of the high prevalent States, Maharashtra was 0.42% ahead of the national average of 0.27%. Considering the heterogeneity of HIV epidemic between districts, two districts of Maharashtra – Thane and Mumbai were selected to estimate and project the number of People-Living-with-HIV/AIDS (PLHIV), HIV-prevalence among adults and annual new HIV infections till 2017. Methodology: Inputs in spectrum included demographic data from Census of India since 1980 and sample registration system, programmatic data on ‘Alive and on ART (adult and children)’,‘Mother-Baby pairs under PPTCT’ and ‘High Risk Group (HRG)-size mapping estimates’, surveillance data from various rounds of HSS, National Family Health Survey–III, Integrated Biological and Behavioural Assessment and Behavioural Sentinel Surveillance. Major Findings: Assuming current programmatic interventions in these districts, an estimated decrease of 12% points in Thane and 31% points in Mumbai among new infections in HRGs and migrants is observed from 2011 by 2017. Conclusions: Project also validated decrease in HIV new infection among one of the high risk groups-FSWs using program cohort data since 2012 to 2016. Though there is a decrease in HIV prevalence and new infections in Thane and Mumbai, further decrease is possible if appropriate programme response, strategies and interventions are envisaged for specific target groups based on this evidence. Moreover, evidence need to be validated by other estimation/modelling techniques; and evidence can be generated for other districts of the state, where HIV prevalence is high and reliable data sources are available, to understand the epidemic within the local context.

Keywords: HIV sentinel surveillance, high risk groups, projections, new infections

Procedia PDF Downloads 210
18272 A Comparative Evaluation of Broiler Strains Chickens, Arbor Acres, and Ross in Experimental Coccidiosis

Authors: S. S. R. Shojaei, S. Kord Afshari

Abstract:

The study was initiated to compare the production and defecation of Eimerial oocysts of two internationally reputed broiler strains under the local environmental and management conditions. 40 one-day old male chickens of Arbor Acres strain and ROSS strain (20 chicks from each strain) used in this study and were divided randomly into four control and challenge groups. Feed and water were provided for ad libitum consumption. At 15 d of age, chickens of challenge groups (from each strain) were individually inoculated with a mixture of 50000 of sporulated oocysts of 4 species including of E. acervulina (20%), E. maxima (40%), E. tenella (25%) and E. necatrix (15%) and also from the fourth day after Eimerial challenge, faecal droppings (litter samples) were collected 10 days consecutively for counting oocyst per gram (OPG). The results indicated that in the challenge groups, there was an increasing process of OPG in days of 4 to 7 post challenging and the pick level of OPG was seen at seventh day after challenging. From day 8 to 9, decreasing of OPG was happened. This decreasing continues with mild, fast and mild process to day of 13. Respectively and totally the average of OPG in the Arbor Acres group was lower than the group Ross in all days post inoculation and this difference was significant according to t-test. According to the obtained results in this study and since oocyst index almost always is considered as one of the most important indicators for coccidiosis evaluation, it can be realized that in the same surveillance condition the regarding the severity evaluation of coccidiosis, Arbor Acres strain broilers shed less oocysts than Ross strain broilers.

Keywords: arbor acres, ross, coccidiosis, OPG

Procedia PDF Downloads 509
18271 Automated Video Surveillance System for Detection of Suspicious Activities during Academic Offline Examination

Authors: G. Sandhya Devi, G. Suvarna Kumar, S. Chandini

Abstract:

This research work aims to develop a system that will analyze and identify students who indulge in malpractices/suspicious activities during the course of an academic offline examination. Automated Video Surveillance provides an optimal solution which helps in monitoring the students and identifying the malpractice event immediately. This work is organized into three modules. The first module deals with performing an impersonation check using a PCA-based face recognition method which is done by cross checking his profile with the database. The presence or absence of the student is even determined in this module by implementing an image registration technique wherein a grid is formed by considering all the images registered using the frontal camera at the determined positions. Second, detecting such facial malpractices in which a student gets involved in conversation with another, trying to obtain unauthorized information etc., based on the threshold range evaluated by considering his/her mouth state whether open or closed. The third module deals with identification of unauthorized material or gadgets used in the examination hall by training the positive samples of the object through various stages. Here, a top view camera feed is analyzed to detect the suspicious activities. The system automatically alerts the administration when any suspicious activities are identified, thereby reducing the error rate caused due to manual monitoring. This work is an improvement over our previous work published in identifying suspicious activities done by examinees in an offline examination.

Keywords: impersonation, image registration, incrimination, object detection, threshold evaluation

Procedia PDF Downloads 228
18270 Medical Ethics: Knowledge, Attitude and Practices among Young Healthcare Professionals – A Survey from Islamabad, Pakistan

Authors: Asima Mehaboob Khan, Rizwan Taj

Abstract:

Purpose: This study aims to estimate the knowledge, attitude and practices of medical ethics among young healthcare professionals. Method: A qualitative descriptive study was conducted among young healthcare professionals from both public and private sector medical institutions. Using the convenience sampling technique, 272 healthcare professionals participated in this study. A pre-structured modified questionnaire was used to collect the data. Descriptive analyses were executed for each variable. Result: About 76.47% of healthcare professional considers the importance of adequate knowledge of medical ethics, and 82.24% declared lecture, seminars and clinical discussion as the source of their medical knowledge of biomedical ethics. About 42.44% of healthcare professionals exhibited a negative attitude toward medical ethics, 57.72% showed a mildly positive attitude, whereas 1.10% and 0.74% indicated a moderately positive attitude and a highly positive attitude towards medical ethics. Similarly, the level of practice according to medical ethics is also very poor among young healthcare professionals. 34.56% of healthcare professionals deviated from medical ethics during their clinical practices, whereas 0.74% showed a good level of medical practice according to medical ethics. Conclusion: It is concluded in this research study that young healthcare professionals have adequate theoretical knowledge of medical ethics but are not properly trained to perform their clinical practices according to the guidelines of medical ethics. Furthermore, their professional attitude is poorly developed to maintain medical ethics during their clinical practices.

Keywords: knowledge, attitude, practices, medical ethics

Procedia PDF Downloads 104
18269 Controlling Drone Flight Missions through Natural Language Processors Using Artificial Intelligence

Authors: Sylvester Akpah, Selasi Vondee

Abstract:

Unmanned Aerial Vehicles (UAV) as they are also known, drones have attracted increasing attention in recent years due to their ubiquitous nature and boundless applications in the areas of communication, surveying, aerial photography, weather forecasting, medical delivery, surveillance amongst others. Operated remotely in real-time or pre-programmed, drones can fly autonomously or on pre-defined routes. The application of these aerial vehicles has successfully penetrated the world due to technological evolution, thus a lot more businesses are utilizing their capabilities. Unfortunately, while drones are replete with the benefits stated supra, they are riddled with some problems, mainly attributed to the complexities in learning how to master drone flights, collision avoidance and enterprise security. Additional challenges, such as the analysis of flight data recorded by sensors attached to the drone may take time and require expert help to analyse and understand. This paper presents an autonomous drone control system using a chatbot. The system allows for easy control of drones using conversations with the aid of Natural Language Processing, thus to reduce the workload needed to set up, deploy, control, and monitor drone flight missions. The results obtained at the end of the study revealed that the drone connected to the chatbot was able to initiate flight missions with just text and voice commands, enable conversation and give real-time feedback from data and requests made to the chatbot. The results further revealed that the system was able to process natural language and produced human-like conversational abilities using Artificial Intelligence (Natural Language Understanding). It is recommended that radio signal adapters be used instead of wireless connections thus to increase the range of communication with the aerial vehicle.

Keywords: artificial ntelligence, chatbot, natural language processing, unmanned aerial vehicle

Procedia PDF Downloads 141