Search results for: malicious images detector
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 2877

Search results for: malicious images detector

1227 Digital Subsistence of Cultural Heritage: Digital Media as a New Dimension of Cultural Ecology

Authors: Dan Luo

Abstract:

With the climate change can exacerbate exposure of cultural heritage to climatic stressors, scholars pin their hope on digital technology can help the site avoid surprises. Virtual museum has been regarded as a highly effective technology that enables people to gain enjoyable visiting experience and immersive information about cultural heritage. The technology clearly reproduces the images of the tangible cultural heritage, and the aesthetic experience created by new media helps consumers escape from the realistic environment full of uncertainty. The new cultural anchor has appeared outside the cultural sites. This article synthesizes the international literature on the virtual museum by developing diagrams of Citespace focusing on the tangible cultural heritage and the alarmingly situation has emerged in the process of resolving climate change: (1) Digital collections are the different cultural assets for public. (2) The media ecology change people ways of thinking and meeting style of cultural heritage. (3) Cultural heritage may live forever in the digital world. This article provides a typical practice information to manage cultural heritage in a changing climate—the Dunhuang Mogao Grottoes in the far northwest of China, which is a worldwide cultural heritage site famous for its remarkable and sumptuous murals. This monument is a typical synthesis of art containing 735 Buddhist temples, which was listed by UNESCO as one of the World Cultural Heritage sites. The caves contain some extraordinary examples of Buddhist art spanning a period of 1,000 years - the architectural form, the sculptures in the caves, and the murals on the walls, all together constitute a wonderful aesthetic experience. Unfortunately, this magnificent treasure cave has been threatened by increasingly frequent dust storms and precipitation. The Dunhuang Academy has been using digital technology since the last century to preserve these immovable cultural heritages, especially the murals in the caves. And then, Dunhuang culture has become a new media culture after introduce the art to the world audience through exhibitions, VR, video, etc. The paper chooses qualitative research method that used Nvivo software to encode the collected material to answer this question. The author paid close attention to the survey in Dunhuang City, including participated in 10 exhibition and 20 salons that are Dunhuang-themed on network. What’s more, 308 visitors were interviewed who are fans of the art and have experienced Dunhuang culture online(6-75 years).These interviewees have been exposed to Dunhuang culture through different media, and they are acutely aware of the threat to this cultural heritage. The conclusion is that the unique halo of the cultural heritage was always emphasized, and digital media breeds twin brothers of cultural heritage. In addition, the digital media make it possible for cultural heritage to reintegrate into the daily life of the masses. Visitors gain the opportunity to imitate the mural figures through enlarged or emphasized images but also lose the perspective of understanding the whole cultural life. New media construct a new life aesthetics apart from the Authorized heritage discourse.

Keywords: cultural ecology, digital twins, life aesthetics, media

Procedia PDF Downloads 81
1226 Utilizing Federated Learning for Accurate Prediction of COVID-19 from CT Scan Images

Authors: Jinil Patel, Sarthak Patel, Sarthak Thakkar, Deepti Saraswat

Abstract:

Recently, the COVID-19 outbreak has spread across the world, leading the World Health Organization to classify it as a global pandemic. To save the patient’s life, the COVID-19 symptoms have to be identified. But using an AI (Artificial Intelligence) model to identify COVID-19 symptoms within the allotted time was challenging. The RT-PCR test was found to be inadequate in determining the COVID status of a patient. To determine if the patient has COVID-19 or not, a Computed Tomography Scan (CT scan) of patient is a better alternative. It will be challenging to compile and store all the data from various hospitals on the server, though. Federated learning, therefore, aids in resolving this problem. Certain deep learning models help to classify Covid-19. This paper will have detailed work of certain deep learning models like VGG19, ResNet50, MobileNEtv2, and Deep Learning Aggregation (DLA) along with maintaining privacy with encryption.

Keywords: federated learning, COVID-19, CT-scan, homomorphic encryption, ResNet50, VGG-19, MobileNetv2, DLA

Procedia PDF Downloads 73
1225 Novel Algorithm for Restoration of Retina Images

Authors: P. Subbuthai, S. Muruganand

Abstract:

Diabetic Retinopathy is one of the complicated diseases and it is caused by the changes in the blood vessels of the retina. Extraction of retina image through Fundus camera sometimes produced poor contrast and noises. Because of this noise, detection of blood vessels in the retina is very complicated. So preprocessing is needed, in this paper, a novel algorithm is implemented to remove the noisy pixel in the retina image. The proposed algorithm is Extended Median Filter and it is applied to the green channel of the retina because green channel vessels are brighter than the background. Proposed extended median filter is compared with the existing standard median filter by performance metrics such as PSNR, MSE and RMSE. Experimental results show that the proposed Extended Median Filter algorithm gives a better result than the existing standard median filter in terms of noise suppression and detail preservation.

Keywords: fundus retina image, diabetic retinopathy, median filter, microaneurysms, exudates

Procedia PDF Downloads 342
1224 Non-Destructing Testing of Sandstones from Unconventional Reservoir in Poland with Use of Ultrasonic Pulse Velocity Technique and X-Ray Computed Microtomography

Authors: Michał Maksimczuk, Łukasz Kaczmarek, Tomasz Wejrzanowski

Abstract:

This study concerns high-resolution X-ray computed microtomography (µCT) and ultrasonic pulse analysis of Cambrian sandstones from a borehole located in the Baltic Sea Coast of northern Poland. µCT and ultrasonic technique are non-destructive methods commonly used to determine the internal structure of reservoir rock sample. The spatial resolution of the µCT images obtained was 27 µm, which enabled the author to create accurate 3-D visualizations of structure geometry and to calculate the ratio of pores volume to the total sample volume. A copper X-ray source filter was used to reduce image artifacts. Furthermore, samples Young’s modulus and Poisson ratio were obtained with use of ultrasonic pulse technique. µCT and ultrasonic pulse technique provide complex information which can be used for explorations and characterization of reservoir rocks.

Keywords: elastic parameters, linear absorption coefficient, northern Poland, tight gas

Procedia PDF Downloads 251
1223 Principles of Music Composition in Impressionism by Focusing on Claude Debussy and Maurice Ravel’s Piano Works

Authors: Parham Bakhtiari

Abstract:

The essence of Musical Impressionism is best captured in the compositions of Claude Debussy and Maurice Ravel. These two important individuals represent the core of this art form, with their piano compositions remaining significant, impactful, and commonly performed in contemporary times. Their piano works reflected a revolutionary compositional style that strayed from classical romanticism and drew heavy inspiration from Symbolist poets and Asian arts. Additionally, numerous technical applications are commonly utilized to exemplify the principles of impressionism style by composers who did not frequently use them in prior eras, resulting in effectively evoking impressionistic images through diverse sonorities. The goal of this study is to showcase the range of impressionistic elements and compositional techniques, such as dissonances, pentatonic and whole-tone scales, parallel movements, and polytonality, through an examination of their piano compositions.

Keywords: music, impressionism, Debussy, ravel, piano, composition

Procedia PDF Downloads 38
1222 Preserved Relative Differences between Regions of Different Thermal Scans

Authors: Tahir Majeed, Michael Handschuh, René Meier

Abstract:

Rheumatoid arthritis patients have swelling and pain at the joints of the hand. The regions where the patient feels pain also show increased body temperature. Thermal cameras can be used to detect the rise in temperature of the affected regions. To monitor the disease progression of rheumatoid arthritis patients, they must visit the clinic regularly for scanning and examination. After scanning and evaluation, the dosage of the medicine is regulated accordingly. To monitor the disease progression over time, the correlation between the images between different visits must be established. It has been observed that by using low-cost thermal cameras, the thermal measurements do not remain the same over time, even within a single scanning. In some situations, temperatures can vary as much as 2°C within the same scanning sequence. In this paper, it has been shown that although the absolute temperature varies over time, the relative difference between the different regions remains similar. Results have been computed over four scanning sequences and are presented.

Keywords: relative thermal difference, rheumatoid arthritis, thermal imaging, thermal sensors

Procedia PDF Downloads 196
1221 Application Research of Stilbene Crystal for the Measurement of Accelerator Neutron Sources

Authors: Zhao Kuo, Chen Liang, Zhang Zhongbing, Ruan Jinlu. He Shiyi, Xu Mengxuan

Abstract:

Stilbene, C₁₄H₁₂, is well known as one of the most useful organic scintillators for pulse shape discrimination (PSD) technique for its good scintillation properties. An on-line acquisition system and an off-line acquisition system were developed with several CAMAC standard plug-ins, NIM plug-ins, neutron/γ discriminating plug-in named 2160A and a digital oscilloscope with high sampling rate respectively for which stilbene crystals and photomultiplier tube detectors (PMT) as detector for accelerator neutron sources measurement carried out in China Institute of Atomic Energy. Pulse amplitude spectrums and charge amplitude spectrums were real-time recorded after good neutron/γ discrimination whose best PSD figure-of-merits (FoMs) are 1.756 for D-D accelerator neutron source and 1.393 for D-T accelerator neutron source. The probability of neutron events in total events was 80%, and neutron detection efficiency was 5.21% for D-D accelerator neutron sources, which were 50% and 1.44% for D-T accelerator neutron sources after subtracting the background of scattering observed by the on-line acquisition system. Pulse waveform signals were acquired by the off-line acquisition system randomly while the on-line acquisition system working. The PSD FoMs obtained by the off-line acquisition system were 2.158 for D-D accelerator neutron sources and 1.802 for D-T accelerator neutron sources after waveform digitization off-line processing named charge integration method for just 1000 pulses. In addition, the probabilities of neutron events in total events obtained by the off-line acquisition system matched very well with the probabilities of the on-line acquisition system. The pulse information recorded by the off-line acquisition system could be repetitively used to adjust the parameters or methods of PSD research and obtain neutron charge amplitude spectrums or pulse amplitude spectrums after digital analysis with a limited number of pulses. The off-line acquisition system showed equivalent or better measurement effects compared with the online system with a limited number of pulses which indicated a feasible method based on stilbene crystals detectors for the measurement of prompt neutrons neutron sources like prompt accelerator neutron sources emit a number of neutrons in a short time.

Keywords: stilbene crystal, accelerator neutron source, neutron / γ discrimination, figure-of-merits, CAMAC, waveform digitization

Procedia PDF Downloads 187
1220 Morphological Features Fusion for Identifying INBREAST-Database Masses Using Neural Networks and Support Vector Machines

Authors: Nadia el Atlas, Mohammed el Aroussi, Mohammed Wahbi

Abstract:

In this paper a novel technique of mass characterization based on robust features-fusion is presented. The proposed method consists of mainly four stages: (a) the first phase involves segmenting the masses using edge information’s. (b) The second phase is to calculate and fuse the most relevant morphological features. (c) The last phase is the classification step which allows us to classify the images into benign and malignant masses. In this step we have implemented Support Vectors Machines (SVM) and Artificial Neural Networks (ANN), which were evaluated with the following performance criteria: confusion matrix, accuracy, sensitivity, specificity, receiver operating characteristic ROC, and error histogram. The effectiveness of this new approach was evaluated by a recently developed database: INBREAST database. The fusion of the most appropriate morphological features provided very good results. The SVM gives accuracy to within 64.3%. Whereas the ANN classifier gives better results with an accuracy of 97.5%.

Keywords: breast cancer, mammography, CAD system, features, fusion

Procedia PDF Downloads 599
1219 Engineering the Topological Insulator Structures for Terahertz Detectors

Authors: M. Marchewka

Abstract:

The article is devoted to the possible optical transitions in double quantum wells system based on HgTe/HgCd(Mn)Te heterostructures. Such structures can find applications as detectors and sources of radiation in the terahertz range. The Double Quantum Wells (DQW) systems consist of two QWs separated by the transparent for electrons barrier. Such systems look promising from the point of view of the additional degrees of freedom. In the case of the topological insulator in about 6.4nm wide HgTe QW or strained 3D HgTe films at the interfaces, the topologically protected surface states appear at the interfaces/surfaces. Electrons in those edge states move along the interfaces/surfaces without backscattering due to time-reversal symmetry. Combination of the topological properties, which was already verified by the experimental way, together with the very well know properties of the DQWs, can be very interesting from the applications point of view, especially in the THz area. It is important that at the present stage, the technology makes it possible to create high-quality structures of this type, and intensive experimental and theoretical studies of their properties are already underway. The idea presented in this paper is based on the eight-band KP model, including the additional terms related to the structural inversion asymmetry, interfaces inversion asymmetry, the influence of the magnetically content, and the uniaxial strain describe the full pictures of the possible real structure. All of this term, together with the external electric field, can be sources of breaking symmetry in investigated materials. Using the 8 band KP model, we investigated the electronic shape structure with and without magnetic field from the application point of view as a THz detector in a small magnetic field (below 2T). We believe that such structures are the way to get the tunable topological insulators and the multilayer topological insulator. Using the one-dimensional electrons at the topologically protected interface states as fast and collision-free signal carriers as charge and signal carriers, the detection of the optical signal should be fast, which is very important in the high-resolution detection of signals in the THz range. The proposed engineering of the investigated structures is now one of the important steps on the way to get the proper structures with predicted properties.

Keywords: topological insulator, THz spectroscopy, KP model, II-VI compounds

Procedia PDF Downloads 122
1218 Risks beyond Cyber in IoT Infrastructure and Services

Authors: Mattias Bergstrom

Abstract:

Significance of the Study: This research will provide new insights into the risks with digital embedded infrastructure. Through this research, we will analyze each risk and its potential negation strategies, especially for AI and autonomous automation. Moreover, the analysis that is presented in this paper will convey valuable information for future research that can create more stable, secure, and efficient autonomous systems. To learn and understand the risks, a large IoT system was envisioned, and risks with hardware, tampering, and cyberattacks were collected, researched, and evaluated to create a comprehensive understanding of the potential risks. Potential solutions have then been evaluated on an open source IoT hardware setup. This list shows the identified passive and active risks evaluated in the research. Passive Risks: (1) Hardware failures- Critical Systems relying on high rate data and data quality are growing; SCADA systems for infrastructure are good examples of such systems. (2) Hardware delivers erroneous data- Sensors break, and when they do so, they don’t always go silent; they can keep going, just that the data they deliver is garbage, and if that data is not filtered out, it becomes disruptive noise in the system. (3) Bad Hardware injection- Erroneous generated sensor data can be pumped into a system by malicious actors with the intent to create disruptive noise in critical systems. (4) Data gravity- The weight of the data collected will affect Data-Mobility. (5) Cost inhibitors- Running services that need huge centralized computing is cost inhibiting. Large complex AI can be extremely expensive to run. Active Risks: Denial of Service- It is one of the most simple attacks, where an attacker just overloads the system with bogus requests so that valid requests disappear in the noise. Malware- Malware can be anything from simple viruses to complex botnets created with specific goals, where the creator is stealing computer power and bandwidth from you to attack someone else. Ransomware- It is a kind of malware, but it is so different in its implementation that it is worth its own mention. The goal with these pieces of software is to encrypt your system so that it can only be unlocked with a key that is held for ransom. DNS spoofing- By spoofing DNS calls, valid requests and data dumps can be sent to bad destinations, where the data can be extracted for extortion or to corrupt and re-inject into a running system creating a data echo noise loop. After testing multiple potential solutions. We found that the most prominent solution to these risks was to use a Peer 2 Peer consensus algorithm over a blockchain to validate the data and behavior of the devices (sensors, storage, and computing) in the system. By the devices autonomously policing themselves for deviant behavior, all risks listed above can be negated. In conclusion, an Internet middleware that provides these features would be an easy and secure solution to any future autonomous IoT deployments. As it provides separation from the open Internet, at the same time, it is accessible over the blockchain keys.

Keywords: IoT, security, infrastructure, SCADA, blockchain, AI

Procedia PDF Downloads 107
1217 The Artificial Intelligence Driven Social Work

Authors: Avi Shrivastava

Abstract:

Our world continues to grapple with a lot of social issues. Economic growth and scientific advancements have not completely eradicated poverty, homelessness, discrimination and bias, gender inequality, health issues, mental illness, addiction, and other social issues. So, how do we improve the human condition in a world driven by advanced technology? The answer is simple: we will have to leverage technology to address some of the most important social challenges of the day. AI, or artificial intelligence, has emerged as a critical tool in the battle against issues that deprive marginalized and disadvantaged groups of the right to enjoy benefits that a society offers. Social work professionals can transform their lives by harnessing it. The lack of reliable data is one of the reasons why a lot of social work projects fail. Social work professionals continue to rely on expensive and time-consuming primary data collection methods, such as observation, surveys, questionnaires, and interviews, instead of tapping into AI-based technology to generate useful, real-time data and necessary insights. By leveraging AI’s data-mining ability, we can gain a deeper understanding of how to solve complex social problems and change lives of people. We can do the right work for the right people and at the right time. For example, AI can enable social work professionals to focus their humanitarian efforts on some of the world’s poorest regions, where there is extreme poverty. An interdisciplinary team of Stanford scientists, Marshall Burke, Stefano Ermon, David Lobell, Michael Xie, and Neal Jean, used AI to spot global poverty zones – identifying such zones is a key step in the fight against poverty. The scientists combined daytime and nighttime satellite imagery with machine learning algorithms to predict poverty in Nigeria, Uganda, Tanzania, Rwanda, and Malawi. In an article published by Stanford News, Stanford researchers use dark of night and machine learning, Ermon explained that they provided the machine-learning system, an application of AI, with the high-resolution satellite images and asked it to predict poverty in the African region. “The system essentially learned how to solve the problem by comparing those two sets of images [daytime and nighttime].” This is one example of how AI can be used by social work professionals to reach regions that need their aid the most. It can also help identify sources of inequality and conflict, which could reduce inequalities, according to Nature’s study, titled The role of artificial intelligence in achieving the Sustainable Development Goals, published in 2020. The report also notes that AI can help achieve 79 percent of the United Nation’s (UN) Sustainable Development Goals (SDG). AI is impacting our everyday lives in multiple amazing ways, yet some people do not know much about it. If someone is not familiar with this technology, they may be reluctant to use it to solve social issues. So, before we talk more about the use of AI to accomplish social work objectives, let’s put the spotlight on how AI and social work can complement each other.

Keywords: social work, artificial intelligence, AI based social work, machine learning, technology

Procedia PDF Downloads 102
1216 Popular Modern Devotional Prints: The Construction of Identity between the Visual and Viewer in Public Interaction Spaces

Authors: Muhammad Asghar, Muhammad Ali, Farwah Batool

Abstract:

Despite the general belief in Islam that figural representations should be avoided, particularly propagated by the Deobandis, a religious group influenced by Salafi and Wahhabi ideas, nevertheless the public interaction spaces such as Shops and offices are decorated with popular, mass-produced, modern devotional prints. This study seeks to focus on popular visual culture, its display in public interaction places such as shops and discusses how people establish relationships with images. The method adopted was basically ethnographic: to describe as precisely and completely as possible the phenomena to be studied, using the language and conceptual categories of the interlocutors themselves. This study has been enriched by ethnographic field research conducted during the months from October to December 2015 in the major cities of Punjab and their brief forays and surroundings where we explored how seeing upon images performs religious identity within the public space. The study examines the pattern of aesthetics and taste in the shops of especially common people whose sensibilities have not been refined or influenced by being exposed to any narrative or fine arts. Furthermore, it is our intention to question the general beliefs and opinions in the context of popular practices, the way in which people relate to these prints. The interpretations and analyses presented in this study illuminate how people create meaning through the display of such items of material culture in the immediate settings of their spaces. This study also seeks to demonstrate how popular Islam is practiced, transformed and understood through the display of popular representations of popular figures of piety like Sufi saints or their shrines are important to many believers and thus occupy important places in their shops. The findings are supported with empirical evidence and based on interviews with the shopkeepers, owners and office employees. Looking upon those popular modern devotional prints keeps people’s reverence of the personages alive. Because of their sacred themes they affect a relationship between the saint and the beholders as well as serve to symbolize and reinforce their belief since they become powerful loci of emotional attachment. Collectively such devotional prints satisfy a local taste to help people establish contact with God through the saints’ intercession in order to receive protection and benediction, and help in spiritual, mental and material problems. By putting all these facets of belief together we gain an insight into both the subjective and cognizant role that icons’ of saints play in the lives of believers. Their veneration through ingeniously contrived modern means of production makes a significant contribution to an understanding of how such imagery promotes a powerful belief in Sufi saints, which ultimately gives indications of how popular Islam is practiced and understood at its gross roots level.

Keywords: ethnographic field research, popular visual culture, protected space, religious identity

Procedia PDF Downloads 227
1215 A Bio-Inspired Approach to Produce Wettable Nylon Fabrics

Authors: Sujani B. Y. Abeywardena, Srimala Perera, K. M. Nalin De Silva, S. Walpalage

Abstract:

Surface modifications are vital to accomplish the moisture management property in highly demanded synthetic fabrics. Biomimetic and bio-inspired surface modifications are identified as one of the fascinating areas of research. In this study, nature’s way of cooling elephants’ body temperature using mud bathing was mimicked to create a superior wettable nylon fabric with improved comfortability. For that, bentonite nanoclay was covalently grafted on nylon fabric using silane as a coupling agent. Fourier transform infrared spectra and Scanning electron microscopy images confirmed the successful grafting of nanoclay on nylon. The superior wettability of surface modified nylon was proved by standard protocols. This fabric coating strongly withstands more than 50 cycles of laundry. It is expected that this bio-inspired wettable nylon fabric may break the barrier of using nylon in various hydrophilic textile applications.

Keywords: bentonite nanoclay, biomimetic, covalent modification, nylon fabric, surface, wettability

Procedia PDF Downloads 201
1214 Novel Technique for calculating Surface Potential Gradient of Overhead Line Conductors

Authors: Sudip Sudhir Godbole

Abstract:

In transmission line surface potential gradient is a critical design parameter for planning overhead line, as it determines the level of corona loss (CL), radio interference (RI) and audible noise (AN).With increase of transmission line voltage level bulk power transfer is possible, using bundle conductor configuration used, it is more complex to find accurate surface stress in bundle configuration. The majority of existing models for surface gradient calculations are based on analytical methods which restrict their application in simulating complex surface geometry. This paper proposes a novel technique which utilizes both analytical and numerical procedure to predict the surface gradient. One of 400 kV transmission line configurations has been selected as an example to compare the results for different methods. The different strand shapes are a key variable in determining.

Keywords: surface gradient, Maxwell potential coefficient method, market and Mengele’s method, successive images method, charge simulation method, finite element method

Procedia PDF Downloads 538
1213 Anodization-Assisted Synthesis of Shape-Controlled Cubic Zirconia Nanotubes

Authors: Ibrahim Dauda Muhammad, Mokhtar Awang

Abstract:

To synthesize a specific phase of zirconia (ZrO₂) nanotubes, zirconium (Zr) foil was subjected to the anodization process in a fluorine-containing electrochemical bath for a fixed duration. The resulting zirconia nanotubes (ZNTs) were then characterized using various techniques, including UV-vis spectroscopy, Fourier-transform infrared spectroscopy (FTIR), transmission electron microscopy (TEM), energy-dispersive X-ray spectroscopy (EDX), and X-ray diffraction (XRD). The XRD diffraction pattern confirmed that the ZNTs were crystalline, with a predominant texture along the [111] direction, indicating that the majority of the phase was cubic. TEM images revealed that most of the nanotubes were vertically aligned and self-organized, with diameters ranging from 32.9 to 38.8 nm and wall thicknesses between 3.0 and 7.3 nm. Additionally, the synthesized ZNTs had a length-to-width ratio of 235, which closely matches the ratio of 240 observed in another study where anodization was not used. This study demonstrates that a specific phase of zirconia nanotube can be successfully synthesized, with promising potential applications in catalysis and other areas.

Keywords: zirconia nanotubes, anodization, characterization, cubic phase

Procedia PDF Downloads 18
1212 The Role of Emotion in Attention Allocation

Authors: Michaela Porubanova

Abstract:

In this exploratory study to examine the effects of emotional significance on change detection using the flicker paradigm, three different categories of scenes were randomly presented (neutral, positive and negative) in three different blocks. We hypothesized that because of the different effects on attention, performance in change detection tasks differs for scenes with different effective values. We found the greatest accuracy of change detection was for changes occurring in positive and negative scenes (compared with neutral scenes). Secondly and most importantly, changes in negative scenes (and also positive scenes, though not with statistical significance) were detected faster than changes in neutral scenes. Interestingly, women were less accurate than men in detecting changes in emotionally significant scenes (both negative and positive), i.e., women detected fewer changes in emotional scenes in the time limit of 40s. But on the other hand, women were quicker to detect changes in positive and negative images than men. The study makes important contributions to the area of the role of emotions on information processing. The role of emotion in attention will be discussed.

Keywords: attention, emotion, flicker task, IAPS

Procedia PDF Downloads 354
1211 Production and Quality Control of a Novel 153Sm-Complex for Radiotherapy of Bone-Metastases

Authors: H. Yousefnia, R. Enayati, M. Hosntalab, S. Zolghadri, A. Bahrami-Samani

Abstract:

Bone metastases occur in many cases at an early stage of the tumour disease, however their symptoms are recognized rather late. The aim of this study was the preparation of 153Sm-(4-{[bis-(phosphonomethyl))carbamoyl]methyl}-7,10-bis(carboxymethyl) 1,4,7,10-tetraazacyclododec-1-yl) acetic acid (BPAMD) for bone pain palliation therapy. 153Sm was produced at Tehran research reactor via 152Sm(n,γ)153Sm reaction. 200 µl of 1mg/ml BPAMD solution was added to the vial containing 1 mCi 153Sm and the mixture was heated up to 90 0C for 1 h. The radiochemical purity of the complex was measured by ITLC method. The final solution with radiochemical purity of more than 95% was injected to BALB mice and bio distribution was determined up to 48 h. SPECT images were acquired after 2 and 24 h post injection. While high bone uptake was confirmed by both the bio distribution studies and SPECT imaging, accumulation in other organs was approximately negligible. The results show that 153Sm-BPAMD can be used as an excellent tracer for bone pain palliation therapy.

Keywords: bone metastases, BPAMD, 153Sm, radiotherapy

Procedia PDF Downloads 597
1210 The Design of Children’s Picture Book from the Tales of Amphawa Fireflies

Authors: Marut Phichetvit

Abstract:

The research objective aims to search information about storytelling and fable associated with fireflies in Amphawa community, in order to design and create a story book which is appropriate for the interests of children in early childhood. This book should help building the development of learning about the natural environment, imagination, and creativity among children, which then, brings about the promotion of the development, conservation and dissemination of cultural values and uniqueness of the Amphawa community. The population used in this study were 30 students in early childhood aged between 6-8 years-old, grade 1-3 from the Demonstration School of Suan Sunandha Rajabhat University. The method used for this study was purposive sampling and the research conducted by the query and analysis of data from both the document and the narrative field tales and fable associated with the fireflies of Amphawa community. Then, using the results to synthesize and create a conceptual design in a form of 8 visual images which were later applied to 1 illustrated children’s book and presented to the experts to evaluate and test this media.

Keywords: children’s illustrated book, fireflies, Amphawa

Procedia PDF Downloads 205
1209 Detection of Curvilinear Structure via Recursive Anisotropic Diffusion

Authors: Sardorbek Numonov, Hyohun Kim, Dongwha Shin, Yeonseok Kim, Ji-Su Ahn, Dongeun Choi, Byung-Woo Hong

Abstract:

The detection of curvilinear structures often plays an important role in the analysis of images. In particular, it is considered as a crucial step for the diagnosis of chronic respiratory diseases to localize the fissures in chest CT imagery where the lung is divided into five lobes by the fissures that are characterized by linear features in appearance. However, the characteristic linear features for the fissures are often shown to be subtle due to the high intensity variability, pathological deformation or image noise involved in the imaging procedure, which leads to the uncertainty in the quantification of anatomical or functional properties of the lung. Thus, it is desired to enhance the linear features present in the chest CT images so that the distinctiveness in the delineation of the lobe is improved. We propose a recursive diffusion process that prefers coherent features based on the analysis of structure tensor in an anisotropic manner. The local image features associated with certain scales and directions can be characterized by the eigenanalysis of the structure tensor that is often regularized via isotropic diffusion filters. However, the isotropic diffusion filters involved in the computation of the structure tensor generally blur geometrically significant structure of the features leading to the degradation of the characteristic power in the feature space. Thus, it is required to take into consideration of local structure of the feature in scale and direction when computing the structure tensor. We apply an anisotropic diffusion in consideration of scale and direction of the features in the computation of the structure tensor that subsequently provides the geometrical structure of the features by its eigenanalysis that determines the shape of the anisotropic diffusion kernel. The recursive application of the anisotropic diffusion with the kernel the shape of which is derived from the structure tensor leading to the anisotropic scale-space where the geometrical features are preserved via the eigenanalysis of the structure tensor computed from the diffused image. The recursive interaction between the anisotropic diffusion based on the geometry-driven kernels and the computation of the structure tensor that determines the shape of the diffusion kernels yields a scale-space where geometrical properties of the image structure are effectively characterized. We apply our recursive anisotropic diffusion algorithm to the detection of curvilinear structure in the chest CT imagery where the fissures present curvilinear features and define the boundary of lobes. It is shown that our algorithm yields precise detection of the fissures while overcoming the subtlety in defining the characteristic linear features. The quantitative evaluation demonstrates the robustness and effectiveness of the proposed algorithm for the detection of fissures in the chest CT in terms of the false positive and the true positive measures. The receiver operating characteristic curves indicate the potential of our algorithm as a segmentation tool in the clinical environment. This work was supported by the MISP(Ministry of Science and ICT), Korea, under the National Program for Excellence in SW (20170001000011001) supervised by the IITP(Institute for Information and Communications Technology Promotion).

Keywords: anisotropic diffusion, chest CT imagery, chronic respiratory disease, curvilinear structure, fissure detection, structure tensor

Procedia PDF Downloads 232
1208 Infra Red Laser Induced Ablation of Graphene Based Polymer Nanocomposites

Authors: Jadranka Blazhevska Gilev

Abstract:

IR laser-induced ablation of poly(butylacrylate-methylmethacrylate/hydroxyl ethyl methacrylate)/reduced graphene oxide (p(BA/MMA/HEMA)/rGO) was examined with 0.5, 0.75 and 1 wt% reduced graphene oxide content in relation to polymer. The irradiation was performed with TEA (transversely excited atmosphere) CO₂ laser using incident fluence of 15-20 J/cm², repetition frequency of 1 Hz, in an evacuated (10-3 Pa) Pyrex spherical vessel. Thin deposited nanocomposites films with large specific area were obtained using different substrates. The properties of the films deposited on these substrates were evaluated by TGA, FTIR, (Thermogravimetric analysis, Fourier Transformation Infrared) Raman spectroscopy and SEM microscopy. Homogeneous distribution of graphene sheets was observed from the SEM images, making polymer/rGO deposit an ideal candidate for SERS application. SERS measurements were performed using Rhodamine 6G as probe molecule on the substrate Ag/p(BA/MMA/HEMA)/rGO.

Keywords: laser ablation, reduced graphene oxide, polymer/rGO nanocomposites, thin deposited film

Procedia PDF Downloads 198
1207 Nonuniformity Correction Technique in Infrared Video Using Feedback Recursive Least Square Algorithm

Authors: Flavio O. Torres, Maria J. Castilla, Rodrigo A. Augsburger, Pedro I. Cachana, Katherine S. Reyes

Abstract:

In this paper, we present a scene-based nonuniformity correction method using a modified recursive least square algorithm with a feedback system on the updates. The feedback is designed to remove impulsive noise contamination images produced by a recursive least square algorithm by measuring the output of the proposed algorithm. The key advantage of the method is based on its capacity to estimate detectors parameters and then compensate for impulsive noise contamination image in a frame by frame basics. We define the algorithm and present several experimental results to demonstrate the efficacy of the proposed method in comparison to several previously published recursive least square-based methods. We show that the proposed method removes impulsive noise contamination image.

Keywords: infrared focal plane arrays, infrared imaging, least mean square, nonuniformity correction

Procedia PDF Downloads 143
1206 A Context-Sensitive Algorithm for Media Similarity Search

Authors: Guang-Ho Cha

Abstract:

This paper presents a context-sensitive media similarity search algorithm. One of the central problems regarding media search is the semantic gap between the low-level features computed automatically from media data and the human interpretation of them. This is because the notion of similarity is usually based on high-level abstraction but the low-level features do not sometimes reflect the human perception. Many media search algorithms have used the Minkowski metric to measure similarity between image pairs. However those functions cannot adequately capture the aspects of the characteristics of the human visual system as well as the nonlinear relationships in contextual information given by images in a collection. Our search algorithm tackles this problem by employing a similarity measure and a ranking strategy that reflect the nonlinearity of human perception and contextual information in a dataset. Similarity search in an image database based on this contextual information shows encouraging experimental results.

Keywords: context-sensitive search, image search, similarity ranking, similarity search

Procedia PDF Downloads 365
1205 Livestock Activity Monitoring Using Movement Rate Based on Subtract Image

Authors: Keunho Park, Sunghwan Jeong

Abstract:

The 4th Industrial Revolution, the next-generation industrial revolution, which is made up of convergence of information and communication technology (ICT), is no exception to the livestock industry, and various studies are being conducted to apply the livestock smart farm. In order to monitor livestock using sensors, it is necessary to drill holes in the organs such as the nose, ears, and even the stomach of the livestock to wear or insert the sensor into the livestock. This increases the stress of livestock, which in turn lowers the quality of livestock products or raises the issue of animal ethics, which has become a major issue in recent years. In this paper, we conducted a study to monitor livestock activity based on vision technology, effectively monitoring livestock activity without increasing animal stress and violating animal ethics. The movement rate was calculated based on the difference images between the frames, and the livestock activity was evaluated. As a result, the average F1-score was 96.67.

Keywords: barn monitoring, livestock, machine vision, smart farm

Procedia PDF Downloads 124
1204 Thermal Annealing Effects on Nonradiative Recombination Parameters of GaInAsSb/GaSb by Means of Photothermal Defection Technique

Authors: Souha Bouagila, Soufiene Ilahi, Noureddine Yacoubi

Abstract:

We have used Photothermal deflection spectroscopy PTD to investigate the impact of thermal annealing on electronics properties of GaInAsSb/GaSb.GaInAsSb used as an active layer for Vertical Cavity Surface Emitting laser (VCSEL). We have remarked that surface recombination velocity (SRV) from 7963 m / s (± 6.3%) to 1450 m / s (± 3.6) for as grown to sample annealed for 60 min. Accordingly, Force Microscopy images analyses agree well with the measure of surface recombination velocity. We have found that Root-Mean-Square Roughness (RMS) decreases as respect of annealing time. In addition, we have that the diffusion length and minority carrier mobility have been enhanced according to annealing time. However, due to annealing effects, the interface recombination velocity (IRV) is increased from 1196 m / s (± 5) to 6000 m/s (5%) for GaInAsSb in respect of annealed times.

Keywords: nonradiative lifetime, mobility of minority carrier, diffusion length, Surface and interface recombination velocity

Procedia PDF Downloads 74
1203 Drone Classification Using Classification Methods Using Conventional Model With Embedded Audio-Visual Features

Authors: Hrishi Rakshit, Pooneh Bagheri Zadeh

Abstract:

This paper investigates the performance of drone classification methods using conventional DCNN with different hyperparameters, when additional drone audio data is embedded in the dataset for training and further classification. In this paper, first a custom dataset is created using different images of drones from University of South California (USC) datasets and Leeds Beckett university datasets with embedded drone audio signal. The three well-known DCNN architectures namely, Resnet50, Darknet53 and Shufflenet are employed over the created dataset tuning their hyperparameters such as, learning rates, maximum epochs, Mini Batch size with different optimizers. Precision-Recall curves and F1 Scores-Threshold curves are used to evaluate the performance of the named classification algorithms. Experimental results show that Resnet50 has the highest efficiency compared to other DCNN methods.

Keywords: drone classifications, deep convolutional neural network, hyperparameters, drone audio signal

Procedia PDF Downloads 104
1202 Starch Incorporated Hydroxyapatite/Chitin Nanocomposite as a Novel Bone Construct

Authors: Reshma Jolly, Mohammad Shakir, Mohammad Shoeb Khan, Noor E. Iram

Abstract:

A nanocomposite system integrating hydroxyapatite, chitin and starch (n-HA/CT/ST) has been synthesized via co-precipitation approach at room temperature, addressing the issues of biocompatibility, mechanical strength and cytotoxicity required for Bone tissue engineering. The interactions, crystallite size and surface morphology against n-HA/CT (nano-hydroxyapatite/chitin) nanocomposite have been obtained by correlating and comparing the results of FTIR, SEM, TEM and XRD. The comparative study of the bioactivity of n-HA/CT and n-HA/CT/ST nanocomposites revealed that the incorporation of starch as templating agent improved these properties in n-HA/CT/ST nanocomposite. The rise in thermal stability in n-HA/CT/ST nanocomposite as compared to n-HA/CT has been observed by comparing the TGA results. The comparison of SEM images of both the scaffolds indicated that the addition of ST influenced the surface morphology of n-HA/CT scaffold which appeared to be rougher and porous. The MTT assay on murine fibroblast L929 cells and in-vitro bioactivity of n-HA/CT/ST matrix referred superior non-toxic property of n-HA/CT/ST nanocomposite and higher possibility of osteo-integration in-vivo, respectively.

Keywords: bioactive, chitin, hyroxyapatite, nanocomposite

Procedia PDF Downloads 493
1201 Clinical Application of Measurement of Eyeball Movement for Diagnose of Autism

Authors: Ippei Torii, Kaoruko Ohtani, Takahito Niwa, Naohiro Ishii

Abstract:

This paper shows developing an objectivity index using the measurement of subtle eyeball movement to diagnose autism. The developmentally disabled assessment varies, and the diagnosis depends on the subjective judgment of professionals. Therefore, a supplementary inspection method that will enable anyone to obtain the same quantitative judgment is needed. The diagnosis are made based on a comparison of the time of gazing an object in the conventional autistic study, but the results do not match. First, we divided the pupil into four parts from the center using measurements of subtle eyeball movement and comparing the number of pixels in the overlapping parts based on an afterimage. Then we developed the objective evaluation indicator to judge non-autistic and autistic people more clearly than conventional methods by analyzing the differences of subtle eyeball movements between the right and left eyes. Even when a person gazes at one point and his/her eyeballs always stay fixed at that point, their eyes perform subtle fixating movements (ie. tremors, drifting, microsaccades) to keep the retinal image clear. Particularly, the microsaccades link with nerves and reflect the mechanism that process the sight in a brain. We converted the differences between these movements into numbers. The process of the conversion is as followed: 1) Select the pixel indicating the subject's pupil from images of captured frames. 2) Set up a reference image, known as an afterimage, from the pixel indicating the subject's pupil. 3) Divide the pupil of the subject into four from the center in the acquired frame image. 4) Select the pixel in each divided part and count the number of the pixels of the overlapping part with the present pixel based on the afterimage. 5) Process the images with precision in 24 - 30fps from a camera and convert the amount of change in the pixels of the subtle movements of the right and left eyeballs in to numbers. The difference in the area of the amount of change occurs by measuring the difference between the afterimage in consecutive frames and the present frame. We set the amount of change to the quantity of the subtle eyeball movements. This method made it possible to detect a change of the eyeball vibration in numerical value. By comparing the numerical value between the right and left eyes, we found that there is a difference in how much they move. We compared the difference in these movements between non-autistc and autistic people and analyzed the result. Our research subjects consists of 8 children and 10 adults with autism, and 6 children and 18 adults with no disability. We measured the values through pasuit movements and fixations. We converted the difference in subtle movements between the right and left eyes into a graph and define it in multidimensional measure. Then we set the identification border with density function of the distribution, cumulative frequency function, and ROC curve. With this, we established an objective index to determine autism, normal, false positive, and false negative.

Keywords: subtle eyeball movement, autism, microsaccade, pursuit eye movements, ROC curve

Procedia PDF Downloads 278
1200 Digital Skepticism In A Legal Philosophical Approach

Authors: dr. Bendes Ákos

Abstract:

Digital skepticism, a critical stance towards digital technology and its pervasive influence on society, presents significant challenges when analyzed from a legal philosophical perspective. This abstract aims to explore the intersection of digital skepticism and legal philosophy, emphasizing the implications for justice, rights, and the rule of law in the digital age. Digital skepticism arises from concerns about privacy, security, and the ethical implications of digital technology. It questions the extent to which digital advancements enhance or undermine fundamental human values. Legal philosophy, which interrogates the foundations and purposes of law, provides a framework for examining these concerns critically. One key area where digital skepticism and legal philosophy intersect is in the realm of privacy. Digital technologies, particularly data collection and surveillance mechanisms, pose substantial threats to individual privacy. Legal philosophers must grapple with questions about the limits of state power and the protection of personal autonomy. They must consider how traditional legal principles, such as the right to privacy, can be adapted or reinterpreted in light of new technological realities. Security is another critical concern. Digital skepticism highlights vulnerabilities in cybersecurity and the potential for malicious activities, such as hacking and cybercrime, to disrupt legal systems and societal order. Legal philosophy must address how laws can evolve to protect against these new forms of threats while balancing security with civil liberties. Ethics plays a central role in this discourse. Digital technologies raise ethical dilemmas, such as the development and use of artificial intelligence and machine learning algorithms that may perpetuate biases or make decisions without human oversight. Legal philosophers must evaluate the moral responsibilities of those who design and implement these technologies and consider the implications for justice and fairness. Furthermore, digital skepticism prompts a reevaluation of the concept of the rule of law. In an increasingly digital world, maintaining transparency, accountability, and fairness becomes more complex. Legal philosophers must explore how legal frameworks can ensure that digital technologies serve the public good and do not entrench power imbalances or erode democratic principles. Finally, the intersection of digital skepticism and legal philosophy has practical implications for policy-making. Legal scholars and practitioners must work collaboratively to develop regulations and guidelines that address the challenges posed by digital technology. This includes crafting laws that protect individual rights, ensure security, and promote ethical standards in technology development and deployment. In conclusion, digital skepticism provides a crucial lens for examining the impact of digital technology on law and society. A legal philosophical approach offers valuable insights into how legal systems can adapt to protect fundamental values in the digital age. By addressing privacy, security, ethics, and the rule of law, legal philosophers can help shape a future where digital advancements enhance, rather than undermine, justice and human dignity.

Keywords: legal philosophy, privacy, security, ethics, digital skepticism

Procedia PDF Downloads 44
1199 Image Reconstruction Method Based on L0 Norm

Authors: Jianhong Xiang, Hao Xiang, Linyu Wang

Abstract:

Compressed sensing (CS) has a wide range of applications in sparse signal reconstruction. Aiming at the problems of low recovery accuracy and long reconstruction time of existing reconstruction algorithms in medical imaging, this paper proposes a corrected smoothing L0 algorithm based on compressed sensing (CSL0). First, an approximate hyperbolic tangent function (AHTF) that is more similar to the L0 norm is proposed to approximate the L0 norm. Secondly, in view of the "sawtooth phenomenon" in the steepest descent method and the problem of sensitivity to the initial value selection in the modified Newton method, the use of the steepest descent method and the modified Newton method are jointly optimized to improve the reconstruction accuracy. Finally, the CSL0 algorithm is simulated on various images. The results show that the algorithm proposed in this paper improves the reconstruction accuracy of the test image by 0-0. 98dB.

Keywords: smoothed L0, compressed sensing, image processing, sparse reconstruction

Procedia PDF Downloads 116
1198 Main Chaos-Based Image Encryption Algorithm

Authors: Ibtissem Talbi

Abstract:

During the last decade, a variety of chaos-based cryptosystems have been investigated. Most of them are based on the structure of Fridrich, which is based on the traditional confusion-diffusion architecture proposed by Shannon. Compared with traditional cryptosystems (DES, 3DES, AES, etc.), the chaos-based cryptosystems are more flexible, more modular and easier to be implemented, which make them suitable for large scale-data encyption, such as images and videos. The heart of any chaos-based cryptosystem is the chaotic generator and so, a part of the efficiency (robustness, speed) of the system depends greatly on it. In this talk, we give an overview of the state of the art of chaos-based block ciphers and we describe some of our schemes already proposed. Also we will focus on the essential characteristics of the digital chaotic generator, The needed performance of a chaos-based block cipher in terms of security level and speed of calculus depends on the considered application. There is a compromise between the security and the speed of the calculation. The security of these block block ciphers will be analyzed.

Keywords: chaos-based cryptosystems, chaotic generator, security analysis, structure of Fridrich

Procedia PDF Downloads 684