Search results for: image security
4018 4P-Model of Information Terrorism
Authors: Nataliya Venelinova
Abstract:
The paper proposes a new interdisciplinary model of reconsidering the role of mass communication effects by coverage of terrorism. The idea of 4P model is based on the synergy, created by the information strategy of threat, predominantly used by terrorist groups, the effects of mediating the symbolic action of the terrorist attacks or the taking of responsibility of any attacks, and the reshaped public perception for security after the attacks being mass communicated. The paper defines the mass communication cycle of terrorism, which leads not only to re-agenda setting of the societies, but also spirally amplifying the effect of propagating fears by over-informing on terrorism attacks. This finally results in the outlining of the so called 4P-model of information terrorism: mass propaganda, panic, paranoia and pandemic.Keywords: information terrorism, mass communication cycle, public perception, security
Procedia PDF Downloads 1774017 To Design a Full Stack Online Educational Website Using HTML, CSS and Java Script
Authors: Yash Goyal, Manish Korde, Juned Siddiqui
Abstract:
Today online education has gained more popularity so that people can easily complete their curriculum on their own time. Virtual learning has been widely used by many educators, especially in higher education institutions due to its benefits to students and faculty. A good knowledge of teaching theory and instructional design systems is required to experience meaningful learning. However, most educational websites are not designed to adapt to all screen sizes. Making the website accessible on all screen sizes is our main objective, so we have created a website that is readily accessible across all screen sizes and accepts all types of payment methods. And we see generally educational websites interface is simple and unexciting. So, we have made a user interface attractive and user friendly. It is not enough for a website to be user-friendly, but also to be familiar to admins and to reduce the workload of the admin as well. We visited so many popular websites under development that they all had issues like responsiveness, simple interface, security measures, payment methods, etc. To overcome this limitation, we have created a website which has taken care of security issues that is why we have created only one admin id and it can be control from that only. And if the user has successfully done the payment, then the admin can send him a username and password through mail individually so there will no fraud in the payment of the course.Keywords: responsive, accessible, attractive, interface, objective, security.
Procedia PDF Downloads 1084016 Breast Cancer Metastasis Detection and Localization through Transfer-Learning Convolutional Neural Network Classification Based on Convolutional Denoising Autoencoder Stack
Authors: Varun Agarwal
Abstract:
Introduction: With the advent of personalized medicine, histopathological review of whole slide images (WSIs) for cancer diagnosis presents an exceedingly time-consuming, complex task. Specifically, detecting metastatic regions in WSIs of sentinel lymph node biopsies necessitates a full-scanned, holistic evaluation of the image. Thus, digital pathology, low-level image manipulation algorithms, and machine learning provide significant advancements in improving the efficiency and accuracy of WSI analysis. Using Camelyon16 data, this paper proposes a deep learning pipeline to automate and ameliorate breast cancer metastasis localization and WSI classification. Methodology: The model broadly follows five stages -region of interest detection, WSI partitioning into image tiles, convolutional neural network (CNN) image-segment classifications, probabilistic mapping of tumor localizations, and further processing for whole WSI classification. Transfer learning is applied to the task, with the implementation of Inception-ResNetV2 - an effective CNN classifier that uses residual connections to enhance feature representation, adding convolved outputs in the inception unit to the proceeding input data. Moreover, in order to augment the performance of the transfer learning CNN, a stack of convolutional denoising autoencoders (CDAE) is applied to produce embeddings that enrich image representation. Through a saliency-detection algorithm, visual training segments are generated, which are then processed through a denoising autoencoder -primarily consisting of convolutional, leaky rectified linear unit, and batch normalization layers- and subsequently a contrast-normalization function. A spatial pyramid pooling algorithm extracts the key features from the processed image, creating a viable feature map for the CNN that minimizes spatial resolution and noise. Results and Conclusion: The simplified and effective architecture of the fine-tuned transfer learning Inception-ResNetV2 network enhanced with the CDAE stack yields state of the art performance in WSI classification and tumor localization, achieving AUC scores of 0.947 and 0.753, respectively. The convolutional feature retention and compilation with the residual connections to inception units synergized with the input denoising algorithm enable the pipeline to serve as an effective, efficient tool in the histopathological review of WSIs.Keywords: breast cancer, convolutional neural networks, metastasis mapping, whole slide images
Procedia PDF Downloads 1364015 Kinoform Optimisation Using Gerchberg- Saxton Iterative Algorithm
Authors: M. Al-Shamery, R. Young, P. Birch, C. Chatwin
Abstract:
Computer Generated Holography (CGH) is employed to create digitally defined coherent wavefronts. A CGH can be created by using different techniques such as by using a detour-phase technique or by direct phase modulation to create a kinoform. The detour-phase technique was one of the first techniques that was used to generate holograms digitally. The disadvantage of this technique is that the reconstructed image often has poor quality due to the limited dynamic range it is possible to record using a medium with reasonable spatial resolution.. The kinoform (phase-only hologram) is an alternative technique. In this method, the phase of the original wavefront is recorded but the amplitude is constrained to be constant. The original object does not need to exist physically and so the kinoform can be used to reconstruct an almost arbitrary wavefront. However, the image reconstructed by this technique contains high levels of noise and is not identical to the reference image. To improve the reconstruction quality of the kinoform, iterative techniques such as the Gerchberg-Saxton algorithm (GS) are employed. In this paper the GS algorithm is described for the optimisation of a kinoform used for the reconstruction of a complex wavefront. Iterations of the GS algorithm are applied to determine the phase at a plane (with known amplitude distribution which is often taken as uniform), that satisfies given phase and amplitude constraints in a corresponding Fourier plane. The GS algorithm can be used in this way to enhance the reconstruction quality of the kinoform. Different images are employed as the reference object and their kinoform is synthesised using the GS algorithm. The quality of the reconstructed images is quantified to demonstrate the enhanced reconstruction quality achieved by using this method.Keywords: computer generated holography, digital holography, Gerchberg-Saxton algorithm, kinoform
Procedia PDF Downloads 5394014 A Modern Method for Secure Online Voting System Using Blockchain and RFID Technology
Authors: Ali El Ksimi
Abstract:
In the modern digital landscape, the integrity and security of voting processes are paramount. Traditional voting methods have faced numerous challenges, including fraud, lack of transparency, and administrative inefficiencies. As these issues become increasingly critical, there is a growing need for advanced solutions that can enhance the security and reliability of elections. Blockchain technology, with its decentralized architecture, immutable nature, and advanced cryptographic techniques, offers a robust framework for transforming the voting process. By integrating Radio Frequency Identification (RFID) technology, voter authentication can be further streamlined, ensuring the authenticity of each vote cast. This article presents a decentralized IoT-based online voting system that utilizes blockchain, RFID, and cryptography to create a secure, transparent, and user-friendly voting experience. The proposed decentralized application (DApp) leverages Ethereum's blockchain and cryptographic protocols to manage the entire voting lifecycle, ensuring that each vote is recorded securely and transparently. By employing RFID tags for voter identification, this solution mitigates the risks associated with traditional identification methods while enhancing the accessibility of the voting process. We discuss the technical architecture, cryptographic mechanisms, scalability, and security advantages of this approach alongside its potential limitations, such as the dependence on RFID infrastructure, blockchain transaction costs, and possible latency in large-scale elections. Additionally, we explore the challenges in implementing the system across different jurisdictions and the regulatory hurdles that might arise with such decentralized solutions. Ultimately, this solution aims to redefine electoral processes, promoting trust and participation in democratic governance.Keywords: blockchain, RFID, authentication, security, IoT
Procedia PDF Downloads 174013 Together - A Decentralized Application Connects Ideas and Investors
Authors: Chandragiri Nagadeep, M. V. V. S. Durga, Sadu Mahikshith
Abstract:
Future generation is depended on new ideas and innovations that develops the country economical growth and technology standards so, Startups plays an important role in satisfying above goals. Startups includes support which is given by investing into it by investors but, single digit investors can’t keep supporting one startup and lot of security problems occurs while transferring large funds to startup’s bank account. Targeting security and most supportive funding, TogEther solves these issues by providing a platform where “Crowd Funding” is available in a decentralized way such that funding is done with digital currency called cryptocurrency where transactions are done in a secured way using “Block Chain Technology”. Not only Funding but also Ideas along with their documents can be presented and hosted with help of IPFS (Inter Planetary File System).Keywords: blockchain, ethereum, web3, reactjs, interplanetary file system, funding
Procedia PDF Downloads 2184012 Shattering Negative Stigmas, Creating Empathy and Willingness to Advocate for Unpopular Endangered Species: Evidence from Shark Watching in Israel
Authors: Nurit Carmi
Abstract:
There are many endangered species that are not popular but whose conservation is, nonetheless, important. The present study deals with sharks who suffer from demonization and, accordingly, from public indifference to the deteriorating state of their conservation. We used the seasonal appearance of sharks in the Israeli coastal zone to study public perceptions and attitudes towards sharks prior to ("control group") and after ("visitors") shark watching during a visit in an information center. We found that shark’s image was significantly more positive among the "visitors" compared to the control group. We found that visiting in the information center was strongly related to a more positive shark image, attitudes toward shark conservation, and willingness to act to preserve them.Keywords: wildlife tourism, shark conservation, attitudes towards animals, human-animal relationships, Smith's salience index
Procedia PDF Downloads 1754011 Endocardial Ultrasound Segmentation using Level Set method
Authors: Daoudi Abdelaziz, Mahmoudi Saïd, Chikh Mohamed Amine
Abstract:
This paper presents a fully automatic segmentation method of the left ventricle at End Systolic (ES) and End Diastolic (ED) in the ultrasound images by means of an implicit deformable model (level set) based on Geodesic Active Contour model. A pre-processing Gaussian smoothing stage is applied to the image, which is essential for a good segmentation. Before the segmentation phase, we locate automatically the area of the left ventricle by using a detection approach based on the Hough Transform method. Consequently, the result obtained is used to automate the initialization of the level set model. This initial curve (zero level set) deforms to search the Endocardial border in the image. On the other hand, quantitative evaluation was performed on a data set composed of 15 subjects with a comparison to ground truth (manual segmentation).Keywords: level set method, transform Hough, Gaussian smoothing, left ventricle, ultrasound images.
Procedia PDF Downloads 4684010 Ethical Concerns in the Internet of Things and Smart Devices: Case Studies and Analysis
Authors: Mitchell Browe, Oriehi Destiny Anyaiwe, Zahraddeen Gwarzo
Abstract:
The Internet of Things (IoT) is a major evolution of technology and of the internet, which has the power to revolutionize the way people live. IoT has the power to change the way people interact with each other and with their homes; It has the ability to give people new ways to interact with and monitor their health; It can alter socioeconomic landscapes by providing new and efficient methods of resource management, saving time and money for both individuals and society as a whole; It even has the potential to save lives through autonomous vehicle technology and smart security measures. Unfortunately, nearly every revolution bears challenges which must be addressed to minimize harm by the new technology upon its adopters. IoT represents an internet technology revolution which has the potential to risk privacy, safety, and security of its users, should devices be developed, implemented, or utilized improperly. This article examines past and current examples of these ethical faults in an attempt to highlight the importance of consumer awareness of potential dangers of these technologies in making informed purchasing and utilization decisions, as well as to reveal how deficiencies and limitations of IoT devices should be better addressed by both companies and by regulatory bodies. Aspects such as consumer trust, corporate transparency, and misuse of individual data are all factors in the implementation of proper ethical boundaries in the IoT.Keywords: IoT, ethical concerns, privacy, safety, security, smart devices
Procedia PDF Downloads 954009 Experimental Modeling of Spray and Water Sheet Formation Due to Wave Interactions with Vertical and Slant Bow-Shaped Model
Authors: Armin Bodaghkhani, Bruce Colbourne, Yuri S. Muzychka
Abstract:
The process of spray-cloud formation and flow kinematics produced from breaking wave impact on vertical and slant lab-scale bow-shaped models were experimentally investigated. Bubble Image Velocimetry (BIV) and Image Processing (IP) techniques were applied to study the various types of wave-model impacts. Different wave characteristics were generated in a tow tank to investigate the effects of wave characteristics, such as wave phase velocity, wave steepness on droplet velocities, and behavior of the process of spray cloud formation. The phase ensemble-averaged vertical velocity and turbulent intensity were computed. A high-speed camera and diffused LED backlights were utilized to capture images for further post processing. Various pressure sensors and capacitive wave probes were used to measure the wave impact pressure and the free surface profile at different locations of the model and wave-tank, respectively. Droplet sizes and velocities were measured using BIV and IP techniques to trace bubbles and droplets in order to measure their velocities and sizes by correlating the texture in these images. The impact pressure and droplet size distributions were compared to several previously experimental models, and satisfactory agreements were achieved. The distribution of droplets in front of both models are demonstrated. Due to the highly transient process of spray formation, the drag coefficient for several stages of this transient displacement for various droplet size ranges and different Reynolds number were calculated based on the ensemble average method. From the experimental results, the slant model produces less spray in comparison with the vertical model, and the droplet velocities generated from the wave impact with the slant model have a lower velocity as compared with the vertical model.Keywords: spray charachteristics, droplet size and velocity, wave-body interactions, bubble image velocimetry, image processing
Procedia PDF Downloads 3024008 Characterization of Inertial Confinement Fusion Targets Based on Transmission Holographic Mach-Zehnder Interferometer
Authors: B. Zare-Farsani, M. Valieghbal, M. Tarkashvand, A. H. Farahbod
Abstract:
To provide the conditions for nuclear fusion by high energy and powerful laser beams, it is required to have a high degree of symmetry and surface uniformity of the spherical capsules to reduce the Rayleigh-Taylor hydrodynamic instabilities. In this paper, we have used the digital microscopic holography based on Mach-Zehnder interferometer to study the quality of targets for inertial fusion. The interferometric pattern of the target has been registered by a CCD camera and analyzed by Holovision software. The uniformity of the surface and shell thickness are investigated and measured in reconstructed image. We measured shell thickness in different zone where obtained non uniformity 22.82 percent.Keywords: inertial confinement fusion, mach-zehnder interferometer, digital holographic microscopy, image reconstruction, holovision
Procedia PDF Downloads 3074007 Automatic Measurement of Garment Sizes Using Deep Learning
Authors: Maulik Parmar, Sumeet Sandhu
Abstract:
The online fashion industry experiences high product return rates. Many returns are because of size/fit mismatches -the size scale on labels can vary across brands, the size parameters may not capture all fit measurements, or the product may have manufacturing defects. Warehouse quality check of garment sizes can be semi-automated to improve speed and accuracy. This paper presents an approach for automatically measuring garment sizes from a single image of the garment -using Deep Learning to learn garment keypoints. The paper focuses on the waist size measurement of jeans and can be easily extended to other garment types and measurements. Experimental results show that this approach can greatly improve the speed and accuracy of today’s manual measurement process.Keywords: convolutional neural networks, deep learning, distortion, garment measurements, image warping, keypoints
Procedia PDF Downloads 3174006 Determinants of Mobile Banking Apps Adoption among Bank Customers in Ghana
Authors: Masud Ibrahim
Abstract:
in Ghana. The sample of the study comprised 450 bank customers from universal banks operating in Ghana. A conceptual framework was framed from a revised TAM model. A total of nine hypotheses were developed and tested using Structural Equation Modeling Technique. Findings from this study revealed that perceived ease of use and perceived usefulness are influenced positively by design and perceived security. Also, perceived ease of use, social influence and perceived security risk were found to have a strong influence on mobile banking app adoption intention. This study provides significant insights and implications for banking organizations on how to ensure the adoption and usage of their mobile banking apps.Keywords: mobile banking app, perceived ease of use, perceived usefulness, technology acceptance model
Procedia PDF Downloads 1664005 Using Hyperspectral Camera and Deep Learning to Identify the Ripeness of Sugar Apples
Authors: Kuo-Dung Chiou, Yen-Xue Chen, Chia-Ying Chang
Abstract:
This study uses AI technology to establish an expert system and establish a fruit appearance database for pineapples and custard apples. It collects images based on appearance defects and fruit maturity. It uses deep learning to detect the location of the fruit and can detect the appearance of the fruit in real-time. Flaws and maturity. In addition, a hyperspectral camera was used to scan pineapples and custard apples, and the light reflection at different frequency bands was used to find the key frequency band for pectin softening in post-ripe fruits. Conducted a large number of multispectral image collection and data analysis to establish a database of Pineapple Custard Apple and Big Eyed Custard Apple, which includes a high-definition color image database, a hyperspectral database in the 377~1020 nm frequency band, and five frequency band images (450, 500, 670, 720, 800nm) multispectral database, which collects 4896 images and manually labeled ground truth; 26 hyperspectral pineapple custard apple fruits (520 images each); multispectral custard apple 168 fruits (5 images each). Using the color image database to train deep learning Yolo v4's pre-training network architecture and adding the training weights established by the fruit database, real-time detection performance is achieved, and the recognition rate reaches over 97.96%. We also used multispectral to take a large number of continuous shots and calculated the difference and average ratio of the fruit in the 670 and 720nm frequency bands. They all have the same trend. The value increases until maturity, and the value will decrease after maturity. Subsequently, the sub-bands will be added to analyze further the numerical analysis of sugar content and moisture, and the absolute value of maturity and the data curve of maturity will be found.Keywords: hyperspectral image, fruit firmness, deep learning, automatic detection, automatic measurement, intelligent labor saving
Procedia PDF Downloads 104004 Structural Inequality and Precarious Workforce: The Role of Labor Laws in Destabilizing the Labor Force in Iran
Authors: Iman Shabanzadeh
Abstract:
Over the last three decades, the main demands of the Iranian workforce have been focused on three areas: "The right to a decent wage", "The right to organize" and "The right to job security". In order to investigate and analyze this situation, the present study focuses on the component of job security. The purpose of the study is to figure out what mechanisms in Iran's Labor Law have led to the destabilization and undermining of workers' job security. The research method is descriptive-analytical. To collect information, library and document sources in the field of laws related to labor rights in Iran and, semi-structured interviews with experts have been used. In the data analysis stage, the qualitative content analysis method was also used. The trend analysis of the statistics related to the labor force situation in Iran in the last three decades shows that the employment structure has been facing an increase in the active population, but in the last decade, a large part of this population has been mainly active in the service sector, and contract-free enterprises, so a smaller share of this employment has insurance coverage and a larger share has underemployment. In this regard, the results of this study show that four contexts have been proposed as the main legal and executive mechanisms of labor instability in Iran, which are: 1) temporaryization of the labor force by providing different interpretations of labor law, 2) adjustment labor in the public sector and the emergence of manpower contracting companies, 3) the cessation of labor law protection of workers in small workshops and 4) the existence of numerous restrictions on the effective organization of workers. The theoretical conclusion of this article is that the main root of the challenges of the labor society and the destabilized workforce in Iran is the existence of structural inequalities in the field of labor security, whose traces can be seen in the legal provisions and executive regulations of this field.Keywords: inequality, precariat, temporaryization, labor force, labor law
Procedia PDF Downloads 674003 A Single Feature Probability-Object Based Image Analysis for Assessing Urban Landcover Change: A Case Study of Muscat Governorate in Oman
Authors: Salim H. Al Salmani, Kevin Tansey, Mohammed S. Ozigis
Abstract:
The study of the growth of built-up areas and settlement expansion is a major exercise that city managers seek to undertake to establish previous and current developmental trends. This is to ensure that there is an equal match of settlement expansion needs to the appropriate levels of services and infrastructure required. This research aims at demonstrating the potential of satellite image processing technique, harnessing the utility of single feature probability-object based image analysis technique in assessing the urban growth dynamics of the Muscat Governorate in Oman for the period 1990, 2002 and 2013. This need is fueled by the continuous expansion of the Muscat Governorate beyond predicted levels of infrastructural provision. Landsat Images of the years 1990, 2002 and 2013 were downloaded and preprocessed to forestall appropriate radiometric and geometric standards. A novel approach of probability filtering of the target feature segment was implemented to derive the spatial extent of the final Built-Up Area of the Muscat governorate for the three years period. This however proved to be a useful technique as high accuracy assessment results of 55%, 70%, and 71% were recorded for the Urban Landcover of 1990, 2002 and 2013 respectively. Furthermore, the Normalized Differential Built – Up Index for the various images were derived and used to consolidate the results of the SFP-OBIA through a linear regression model and visual comparison. The result obtained showed various hotspots where urbanization have sporadically taken place. Specifically, settlement in the districts (Wilayat) of AL-Amarat, Muscat, and Qurayyat experienced tremendous change between 1990 and 2002, while the districts (Wilayat) of AL-Seeb, Bawshar, and Muttrah experienced more sporadic changes between 2002 and 2013.Keywords: urban growth, single feature probability, object based image analysis, landcover change
Procedia PDF Downloads 2774002 Vibration Imaging Method for Vibrating Objects with Translation
Authors: Kohei Shimasaki, Tomoaki Okamura, Idaku Ishii
Abstract:
We propose a vibration imaging method for high frame rate (HFR)-video-based localization of vibrating objects with large translations. When the ratio of the translation speed of a target to its vibration frequency is large, obtaining its frequency response in image intensities becomes difficult because one or no waves are observable at the same pixel. Our method can precisely localize moving objects with vibration by virtually translating multiple image sequences for pixel-level short-time Fourier transform to observe multiple waves at the same pixel. The effectiveness of the proposed method is demonstrated by analyzing several HFR videos of flying insects in real scenarios.Keywords: HFR video analysis, pixel-level vibration source localization, short-time Fourier transform, virtual translation
Procedia PDF Downloads 1104001 The Death of Ruan Lingyu: Leftist Aesthetics and Cinematic Reality in the 1930s Shanghai
Authors: Chen Jin
Abstract:
This topic seeks to re-examine the New Women Incident in 1935 Shanghai from the perspective of the influence of leftist cinematic aesthetics on public discourse in 1930s Shanghai. Accordingly, an original means of interpreting the death of Ruan Lingyu will be provided. On 8th March 1935, Ruan Lingyu, the queen of Chinese silent film, committed suicide through overdosing on sleeping tablets. Her last words, ‘gossip is fearful thing’, interlinks her destiny with the protagonist she played in the film The New Women (Cai Chusheng, 1935). The coincidence was constantly questioned by the masses following her suicide, constituting the enduring question: ‘who killed Ruan Lingyu?’ Responding to this query, previous scholars primarily analyze the characters played by women -particularly new women as part of the leftist movement or public discourse of 1930s Shanghai- as a means of approaching the truth. Nevertheless, alongside her status as a public celebrity, Ruan Lingyu also plays as a screen image of mechanical reproduction. The overlap between her screen image and personal destiny attracts limited academic focus in terms of the effect and implications of leftist aesthetics of reality in relation to her death, which itself has provided impetus to this research. With the reconfiguration of early Chinese film theory in the 1980s, early discourses on the relationship between cinematic reality and consciousness proposed by Hou Yao and Gu Kenfu in the 1920s are integrated into the category of Chinese film ontology, which constitutes a transcultural contrast with the Euro-American ontology that advocates the representation of reality. The discussion of Hou and Gu overlaps cinematic reality with effect, which emphasizes the empathy of cinema that is directly reflected in the leftist aesthetics of the 1930s. As the main purpose of leftist cinema is to encourage revolution through depicting social reality truly, Ruan Lingyu became renowned for her natural and realistic acting proficiency, playing leading roles in several esteemed leftist films. The realistic reproduction and natural acting skill together constitute the empathy of leftist films, which establishes a dialogue with the virtuous female image within the 1930s public discourse. On this basis, this research considers Chinese cinematic ontology and affect theory as the theoretical foundation for investigating the relationship between the screen image of Ruan Lingyu reproduced by the leftist film The New Women and the female image in the 1930s public discourse. Through contextualizing Ruan Lingyu’s death within the Chinese leftist movement, the essay indicates that the empathy embodied within leftist cinematic reality limits viewers’ cognition of the actress, who project their sentiments for the perfect screen image on to Ruan Lingyu’s image in reality. Essentially, Ruan Lingyu is imprisoned in her own perfect replication. Consequently, this article states that alongside leftist anti-female consciousness, the leftist aesthetics of reality restricts women in a passive position within public discourse, which ultimately plays a role in facilitating the death of Ruan Lingyu.Keywords: cinematic reality, leftist aesthetics, Ruan Lingyu, The New Women
Procedia PDF Downloads 1264000 Evaluating the Water Balance of Sokoto Basement Complex to Address Water Security Challenges
Authors: Murtala Gada Abubakar, Aliyu T. Umar
Abstract:
A substantial part of Nigeria is part of semi-arid areas of the world, underlain by basement complex (hard) rocks which are very poor in both transmission and storage of appreciable quantity of water. Recently, a growing attention is being paid on the need to develop water resources in these areas largely due to concerns about increasing droughts and the need to maintain water security challenges. While there is ample body of knowledge that captures the hydrological behaviours of the sedimentary part, reported research which unambiguously illustrates water distribution in the basement complex of the Sokoto basin remains sparse. Considering the growing need to meet the water requirements of those living in this region necessitated the call for accurate water balance estimations that can inform a sustainable planning and development to address water security challenges for the area. To meet this task, a one-dimensional soil water balance model was developed and utilised to assess the state of water distribution within the Sokoto basin basement complex using measured meteorological variables and information about different landscapes within the complex. The model simulated the soil water storage and rates of input and output of water in response to climate and irrigation where applicable using data from 2001 to 2010 inclusive. The results revealed areas within the Sokoto basin basement complex that are rich and deficient in groundwater resource. The high potential areas identified includes the fadama, the fractured rocks and the cultivated lands, while the low potential areas are the sealed surfaces and non-fractured rocks. This study concludes that the modelling approach is a useful tool for assessing the hydrological behaviour and for better understanding the water resource availability within a basement complex.Keywords: basement complex, hydrological processes, Sokoto Basin, water security
Procedia PDF Downloads 3233999 Added Value of 3D Ultrasound Image Guided Hepatic Interventions by X Matrix Technology
Authors: Ahmed Abdel Sattar Khalil, Hazem Omar
Abstract:
Background: Image-guided hepatic interventions are integral to the management of infective and neoplastic liver lesions. Over the past decades, 2D ultrasound was used for guidance of hepatic interventions; with the recent advances in ultrasound technology, 3D ultrasound was used to guide hepatic interventions. The aim of this study was to illustrate the added value of 3D image guided hepatic interventions by x matrix technology. Patients and Methods: This prospective study was performed on 100 patients who were divided into two groups; group A included 50 patients who were managed by 2D ultrasonography probe guidance, and group B included 50 patients who were managed by 3D X matrix ultrasonography probe guidance. Thermal ablation was done for 70 patients, 40 RFA (20 by the 2D probe and 20 by the 3D x matrix probe), and 30 MWA (15 by the 2D probe and 15 by the 3D x matrix probe). Chemical ablation (PEI) was done on 20 patients (10 by the 2D probe and 10 by the 3D x matrix probe). Drainage of hepatic collections and biopsy from undiagnosed hepatic focal lesions was done on 10 patients (5 by the 2D probe and 5 by the 3D x matrix probe). Results: The efficacy of ultrasonography-guided hepatic interventions by 3D x matrix probe was higher than the 2D probe but not significantly higher, with a p-value of 0.705, 0.5428 for RFA, MWA respectively, 0.5312 for PEI, 0.2918 for drainage of hepatic collections and biopsy. The complications related to the use of the 3D X matrix probe were significantly lower than the 2D probe, with a p-value of 0.003. The timing of the procedure was shorter by the usage of 3D x matrix probe in comparison to the 2D probe with a p-value of 0.08,0.34 for RFA and PEI and significantly shorter for MWA, and drainage of hepatic collection, biopsy with a P-value of 0.02,0.001 respectively. Conclusions: 3D ultrasonography-guided hepatic interventions by  x matrix probe have better efficacy, less complication, and shorter time of procedure than the 2D ultrasonography-guided hepatic interventions.Keywords: 3D, X matrix, 2D, ultrasonography, MWA, RFA, PEI, drainage of hepatic collections, biopsy
Procedia PDF Downloads 1003998 A Review of Ultralightweight Mutual Authentication Protocols
Authors: Umar Mujahid, Greatzel Unabia, Hongsik Choi, Binh Tran
Abstract:
Radio Frequency Identification (RFID) is one of the most commonly used technologies in IoTs and Wireless Sensor Networks which makes the devices identification and tracking extremely easy to manage. Since RFID uses wireless channel for communication, which is open for all types of adversaries, researchers have proposed many Ultralightweight Mutual Authentication Protocols (UMAPs) to ensure security and privacy in a cost-effective manner. These UMAPs involve simple bitwise logical operators such as XOR, AND, OR & Rot, etc., to design the protocol messages. However, most of these UMAPs were later reported to be vulnerable against many malicious attacks. In this paper, we have presented a detailed overview of some eminent UMAPs and also discussed the many security attacks on them. Finally, some recommendations and suggestions have been discussed, which can improve the design of the UMAPs.Keywords: RFID, Ultralightweight, UMAP, SASI
Procedia PDF Downloads 1593997 The Layout Analysis of Handwriting Characters and the Fusion of Multi-style Ancient Books’ Background
Authors: Yaolin Tian, Shanxiong Chen, Fujia Zhao, Xiaoyu Lin, Hailing Xiong
Abstract:
Ancient books are significant culture inheritors and their background textures convey the potential history information. However, multi-style texture recovery of ancient books has received little attention. Restricted by insufficient ancient textures and complex handling process, the generation of ancient textures confronts with new challenges. For instance, training without sufficient data usually brings about overfitting or mode collapse, so some of the outputs are prone to be fake. Recently, image generation and style transfer based on deep learning are widely applied in computer vision. Breakthroughs within the field make it possible to conduct research upon multi-style texture recovery of ancient books. Under the circumstances, we proposed a network of layout analysis and image fusion system. Firstly, we trained models by using Deep Convolution Generative against Networks (DCGAN) to synthesize multi-style ancient textures; then, we analyzed layouts based on the Position Rearrangement (PR) algorithm that we proposed to adjust the layout structure of foreground content; at last, we realized our goal by fusing rearranged foreground texts and generated background. In experiments, diversified samples such as ancient Yi, Jurchen, Seal were selected as our training sets. Then, the performances of different fine-turning models were gradually improved by adjusting DCGAN model in parameters as well as structures. In order to evaluate the results scientifically, cross entropy loss function and Fréchet Inception Distance (FID) are selected to be our assessment criteria. Eventually, we got model M8 with lowest FID score. Compared with DCGAN model proposed by Radford at el., the FID score of M8 improved by 19.26%, enhancing the quality of the synthetic images profoundly.Keywords: deep learning, image fusion, image generation, layout analysis
Procedia PDF Downloads 1633996 Segmentation of Korean Words on Korean Road Signs
Authors: Lae-Jeong Park, Kyusoo Chung, Jungho Moon
Abstract:
This paper introduces an effective method of segmenting Korean text (place names in Korean) from a Korean road sign image. A Korean advanced directional road sign is composed of several types of visual information such as arrows, place names in Korean and English, and route numbers. Automatic classification of the visual information and extraction of Korean place names from the road sign images make it possible to avoid a lot of manual inputs to a database system for management of road signs nationwide. We propose a series of problem-specific heuristics that correctly segments Korean place names, which is the most crucial information, from the other information by leaving out non-text information effectively. The experimental results with a dataset of 368 road sign images show 96% of the detection rate per Korean place name and 84% per road sign image.Keywords: segmentation, road signs, characters, classification
Procedia PDF Downloads 4463995 Automatic Extraction of Water Bodies Using Whole-R Method
Authors: Nikhat Nawaz, S. Srinivasulu, P. Kesava Rao
Abstract:
Feature extraction plays an important role in many remote sensing applications. Automatic extraction of water bodies is of great significance in many remote sensing applications like change detection, image retrieval etc. This paper presents a procedure for automatic extraction of water information from remote sensing images. The algorithm uses the relative location of R-colour component of the chromaticity diagram. This method is then integrated with the effectiveness of the spatial scale transformation of whole method. The whole method is based on water index fitted from spectral library. Experimental results demonstrate the improved accuracy and effectiveness of the integrated method for automatic extraction of water bodies.Keywords: feature extraction, remote sensing, image retrieval, chromaticity, water index, spectral library, integrated method
Procedia PDF Downloads 3923994 Sociocultural Influences on Men of Color’s Body Image Concerns: A Structural Equation Modeling Study
Authors: Zikun Li, Regine Talleyrand
Abstract:
Negative body image is one of the most common causes of eating disorders, and it is not only happening to women. Regardless of the increasing attention that researchers and practitioners have been paying to the male population and their body image concerns, men of color have yet to be fully represented or studied. Given the consensus that the sociocultural experiences of people of color may play a significant role in their health and well-being, this study focused on assessing the mechanism through which sociocultural factors may influence men of color’s perceptions of body image. In particular, this study focused on untangling how interpersonal and media pressure, as well as ethnic-racial identities and perceptions, would impact body dissatisfaction in terms of muscularity, body fat, and height in men of color and how this mechanism is moderated across different ethnic-racial groups. The structural equation modeling approach was therefore applied to achieve the research goal. With the sample size of 181 self-identified Black, Indigenous, and People of Color male participants aged 20-50 (M=33.33, SD=6.9) through surveying on Amazon’s MTurk platform, the proposed model achieved a modestly acceptable model fit with the pooled sample, X2(836) = 1412.184, CFI = 0.900, RMSEA = 0.062 [0.056, 0.067]. And SRMR = 0.088, And it explained 89.5% of the variance in body dissatisfaction. The results showed that of all the direct effects on body dissatisfaction, interpersonal appearance pressure exhibited the strongest effect (β = 0.410***), followed by media appearance pressure (β = 0.272**) and self-hatred feeling (β = 0.245**). The ethnic-racial related factors (i.e., stereotype endorsement, ethnic-racial salience, and nationalistic assimilation) statistically influenced body dissatisfaction through the mediators of media appearance pressure and/or self-hatred feeling. Furthermore, the moderation analysis between Black/African American men and non-Black/African American men revealed the substantial differences in how ethnic/racial identity impacts one’s perception of body image, and the Black/African American men were found to be influenced by sociocultural factors at a higher level, compared with their counterparts. The impacts of demographic characteristics (i.e., SES, weight, height) on body dissatisfaction were also examined. Instead of considering interpersonal appearance pressure and media pressure as two subscales under one construct, this study considered them as two separate and distinct sociocultural factors. The good model fit to the data indicates this rationality and encourages scholars to reconsider the impacts of two sources of social pressures on body dissatisfaction. In addition, this study also provided empirical evidence of the moderation effect existing within the population of men of color, which reveals the heterogeneity existing across different ethnic-racial groups and implies the necessity to study individual ethnic-racial groups so as to better understand the mechanism of sociocultural influences on men of color’s body dissatisfaction. These findings strengthened the current understanding of the body image concerns exciting among men of color and meanwhile provided empirical evidence for practitioners to provide tailored health prevention and treatment options for this growing population in the United States.Keywords: men of color, body image concerns, sociocultural factors, structural equation modeling
Procedia PDF Downloads 733993 Methods for Restricting Unwanted Access on the Networks Using Firewall
Authors: Bhagwant Singh, Sikander Singh Cheema
Abstract:
This paper examines firewall mechanisms routinely implemented for network security in depth. A firewall can't protect you against all the hazards of unauthorized networks. Consequently, many kinds of infrastructure are employed to establish a secure network. Firewall strategies have already been the subject of significant analysis. This study's primary purpose is to avoid unnecessary connections by combining the capability of the firewall with the use of additional firewall mechanisms, which include packet filtering and NAT, VPNs, and backdoor solutions. There are insufficient studies on firewall potential and combined approaches, but there aren't many. The research team's goal is to build a safe network by integrating firewall strength and firewall methods. The study's findings indicate that the recommended concept can form a reliable network. This study examines the characteristics of network security and the primary danger, synthesizes existing domestic and foreign firewall technologies, and discusses the theories, benefits, and disadvantages of different firewalls. Through synthesis and comparison of various techniques, as well as an in-depth examination of the primary factors that affect firewall effectiveness, this study investigated firewall technology's current application in computer network security, then introduced a new technique named "tight coupling firewall." Eventually, the article discusses the current state of firewall technology as well as the direction in which it is developing.Keywords: firewall strategies, firewall potential, packet filtering, NAT, VPN, proxy services, firewall techniques
Procedia PDF Downloads 1073992 Refined Edge Detection Network
Authors: Omar Elharrouss, Youssef Hmamouche, Assia Kamal Idrissi, Btissam El Khamlichi, Amal El Fallah-Seghrouchni
Abstract:
Edge detection is represented as one of the most challenging tasks in computer vision, due to the complexity of detecting the edges or boundaries in real-world images that contains objects of different types and scales like trees, building as well as various backgrounds. Edge detection is represented also as a key task for many computer vision applications. Using a set of backbones as well as attention modules, deep-learning-based methods improved the detection of edges compared with the traditional methods like Sobel and Canny. However, images of complex scenes still represent a challenge for these methods. Also, the detected edges using the existing approaches suffer from non-refined results while the image output contains many erroneous edges. To overcome this, n this paper, by using the mechanism of residual learning, a refined edge detection network is proposed (RED-Net). By maintaining the high resolution of edges during the training process, and conserving the resolution of the edge image during the network stage, we make the pooling outputs at each stage connected with the output of the previous layer. Also, after each layer, we use an affined batch normalization layer as an erosion operation for the homogeneous region in the image. The proposed methods are evaluated using the most challenging datasets including BSDS500, NYUD, and Multicue. The obtained results outperform the designed edge detection networks in terms of performance metrics and quality of output images.Keywords: edge detection, convolutional neural networks, deep learning, scale-representation, backbone
Procedia PDF Downloads 1063991 Artificial Intelligence Based Analysis of Magnetic Resonance Signals for the Diagnosis of Tissue Abnormalities
Authors: Kapila Warnakulasuriya, Walimuni Janaka Mendis
Abstract:
In this study, an artificial intelligence-based approach is developed to diagnose abnormal tissues in human or animal bodies by analyzing magnetic resonance signals. As opposed to the conventional method of generating an image from the magnetic resonance signals, which are then evaluated by a radiologist for the diagnosis of abnormalities, in the discussed approach, the magnetic resonance signals are analyzed by an artificial intelligence algorithm without having to generate or analyze an image. The AI-based program compares magnetic resonance signals with millions of possible magnetic resonance waveforms which can be generated from various types of normal tissues. Waveforms generated by abnormal tissues are then identified, and images of the abnormal tissues are generated with the possible location of them in the body for further diagnostic tests.Keywords: magnetic resonance, artificial intelligence, magnetic waveform analysis, abnormal tissues
Procedia PDF Downloads 953990 Spatial Object-Oriented Template Matching Algorithm Using Normalized Cross-Correlation Criterion for Tracking Aerial Image Scene
Authors: Jigg Pelayo, Ricardo Villar
Abstract:
Leaning on the development of aerial laser scanning in the Philippine geospatial industry, researches about remote sensing and machine vision technology became a trend. Object detection via template matching is one of its application which characterized to be fast and in real time. The paper purposely attempts to provide application for robust pattern matching algorithm based on the normalized cross correlation (NCC) criterion function subjected in Object-based image analysis (OBIA) utilizing high-resolution aerial imagery and low density LiDAR data. The height information from laser scanning provides effective partitioning order, thus improving the hierarchal class feature pattern which allows to skip unnecessary calculation. Since detection is executed in the object-oriented platform, mathematical morphology and multi-level filter algorithms were established to effectively avoid the influence of noise, small distortion and fluctuating image saturation that affect the rate of recognition of features. Furthermore, the scheme is evaluated to recognized the performance in different situations and inspect the computational complexities of the algorithms. Its effectiveness is demonstrated in areas of Misamis Oriental province, achieving an overall accuracy of 91% above. Also, the garnered results portray the potential and efficiency of the implemented algorithm under different lighting conditions.Keywords: algorithm, LiDAR, object recognition, OBIA
Procedia PDF Downloads 2493989 Promoting Community Food Security and Empowerment among Somali Bantu Refugees: A Case for Community Kitchen Gardens
Authors: Michelle D. Hand, Michelle L. Kaiser
Abstract:
African refugees are among the fastest-growing populations in the United States and nearly half of these refugees come from Somalia, many of whom are Somali Bantus, the most marginalized group in Somali society. Yet limited research is available on Somali Bantu refugees. In this paper, Empowerment Theory is used to guide an in-depth exploration of the potential benefits of using community kitchen gardens to increase community food security among Somali Bantu refugees. In addition, recommendations for future research, policy and practice are offered following existing scholarly and grey source literature guidelines as informed by an Empowerment perspective to best meet the needs of this under-researched and underserved yet growing population.Keywords: community kitchen gardens, food insecurity, refugees, Somali Bantu
Procedia PDF Downloads 278