Search results for: copy-move image forgery
1034 A Novel Combined Finger Counting and Finite State Machine Technique for ASL Translation Using Kinect
Authors: Rania Ahmed Kadry Abdel Gawad Birry, Mohamed El-Habrouk
Abstract:
This paper presents a brief survey of the techniques used for sign language recognition along with the types of sensors used to perform the task. It presents a modified method for identification of an isolated sign language gesture using Microsoft Kinect with the OpenNI framework. It presents the way of extracting robust features from the depth image provided by Microsoft Kinect and the OpenNI interface and to use them in creating a robust and accurate gesture recognition system, for the purpose of ASL translation. The Prime Sense’s Natural Interaction Technology for End-user - NITE™ - was also used in the C++ implementation of the system. The algorithm presents a simple finger counting algorithm for static signs as well as directional Finite State Machine (FSM) description of the hand motion in order to help in translating a sign language gesture. This includes both letters and numbers performed by a user, which in-turn may be used as an input for voice pronunciation systems.Keywords: American sign language, finger counting, hand tracking, Microsoft Kinect
Procedia PDF Downloads 2961033 Experimental Study of the Behavior of Elongated Non-spherical Particles in Wall-Bounded Turbulent Flows
Authors: Manuel Alejandro Taborda Ceballos, Martin Sommerfeld
Abstract:
Transport phenomena and dispersion of non-spherical particle in turbulent flows are found everywhere in industrial application and processes. Powder handling, pollution control, pneumatic transport, particle separation are just some examples where the particle encountered are not only spherical. These types of multiphase flows are wall bounded and mostly highly turbulent. The particles found in these processes are rarely spherical but may have various shapes (e.g., fibers, and rods). Although research related to the behavior of regular non-spherical particles in turbulent flows has been carried out for many years, it is still necessary to refine models, especially near walls where the interaction fiber-wall changes completely its behavior. Imaging-based experimental studies on dispersed particle-laden flows have been applied for many decades for a detailed experimental analysis. These techniques have the advantages that they provide field information in two or three dimensions, but have a lower temporal resolution compared to point-wise techniques such as PDA (phase-Doppler anemometry) and derivations therefrom. The applied imaging techniques in dispersed two-phase flows are extensions from classical PIV (particle image velocimetry) and PTV (particle tracking velocimetry) and the main emphasis was simultaneous measurement of the velocity fields of both phases. In a similar way, such data should also provide adequate information for validating the proposed models. Available experimental studies on the behavior of non-spherical particles are uncommon and mostly based on planar light-sheet measurements. Especially for elongated non-spherical particles, however, three-dimensional measurements are needed to fully describe their motion and to provide sufficient information for validation of numerical computations. For further providing detailed experimental results allowing a validation of numerical calculations of non-spherical particle dispersion in turbulent flows, a water channel test facility was built around a horizontal closed water channel. Into this horizontal main flow, a small cross-jet laden with fiber-like particles was injected, which was also solely driven by gravity. The dispersion of the fibers was measured by applying imaging techniques based on a LED array for backlighting and high-speed cameras. For obtaining the fluid velocity fields, almost neutrally buoyant tracer was used. The discrimination between tracer and fibers was done based on image size which was also the basis to determine fiber orientation with respect to the inertial coordinate system. The synchronous measurement of fluid velocity and fiber properties also allow the collection of statistics of fiber orientation, velocity fields of tracer and fibers, the angular velocity of the fibers and the orientation between fiber and instantaneous relative velocity. Consequently, an experimental study the behavior of elongated non-spherical particles in wall bounded turbulent flows was achieved. The development of a comprehensive analysis was succeeded, especially near the wall region, where exists hydrodynamic wall interaction effects (e.g., collision or lubrication) and abrupt changes of particle rotational velocity. This allowed us to predict numerically afterwards the behavior of non-spherical particles within the frame of the Euler/Lagrange approach, where the particles are therein treated as “point-particles”.Keywords: crossflow, non-spherical particles, particle tracking velocimetry, PIV
Procedia PDF Downloads 861032 Exploring Relationship between Attention and Consciousness
Authors: Aarushi Agarwal, Tara Singh, Anju Lata Singh, Trayambak Tiwari, Indramani Lal Singh
Abstract:
The existing interdependent relationship between attention and consciousness has been put to debate since long. To testify the nature, dual-task paradigm has been used to simultaneously manipulate awareness and attention. With central discrimination task which is attentional demanding, participants also perform simple discrimination task in the periphery in near absence of attention. Individual-based analysis of performance accuracy in single and dual condition showed and above chance level performance i.e. more than 80%. In order to widen the understanding of extent of discrimination carried in near absence of attention, natural image and its geometric equivalent shape were presented in the periphery; synthetic objects accounted to lower level of performance than natural objects in dual condition. The gaze plot and heatmap indicate that peripheral performance do not necessarily involve saccade every time, verifying the discrimination in the periphery was in near absence of attention. Thus our studies show an interdependent nature of attention and awareness.Keywords: attention, awareness, dual task paradigm, natural and geometric images
Procedia PDF Downloads 5181031 Protocol for Dynamic Load Distributed Low Latency Web-Based Augmented Reality and Virtual Reality
Authors: Rohit T. P., Sahil Athrij, Sasi Gopalan
Abstract:
Currently, the content entertainment industry is dominated by mobile devices. As the trends slowly shift towards Augmented/Virtual Reality applications the computational demands on these devices are increasing exponentially and we are already reaching the limits of hardware optimizations. This paper proposes a software solution to this problem. By leveraging the capabilities of cloud computing we can offload the work from mobile devices to dedicated rendering servers that are way more powerful. But this introduces the problem of latency. This paper introduces a protocol that can achieve high-performance low latency Augmented/Virtual Reality experience. There are two parts to the protocol, 1) In-flight compression The main cause of latency in the system is the time required to transmit the camera frame from client to server. The round trip time is directly proportional to the amount of data transmitted. This can therefore be reduced by compressing the frames before sending. Using some standard compression algorithms like JPEG can result in minor size reduction only. Since the images to be compressed are consecutive camera frames there won't be a lot of changes between two consecutive images. So inter-frame compression is preferred. Inter-frame compression can be implemented efficiently using WebGL but the implementation of WebGL limits the precision of floating point numbers to 16bit in most devices. This can introduce noise to the image due to rounding errors, which will add up eventually. This can be solved using an improved interframe compression algorithm. The algorithm detects changes between frames and reuses unchanged pixels from the previous frame. This eliminates the need for floating point subtraction thereby cutting down on noise. The change detection is also improved drastically by taking the weighted average difference of pixels instead of the absolute difference. The kernel weights for this comparison can be fine-tuned to match the type of image to be compressed. 2) Dynamic Load distribution Conventional cloud computing architectures work by offloading as much work as possible to the servers, but this approach can cause a hit on bandwidth and server costs. The most optimal solution is obtained when the device utilizes 100% of its resources and the rest is done by the server. The protocol balances the load between the server and the client by doing a fraction of the computing on the device depending on the power of the device and network conditions. The protocol will be responsible for dynamically partitioning the tasks. Special flags will be used to communicate the workload fraction between the client and the server and will be updated in a constant interval of time ( or frames ). The whole of the protocol is designed so that it can be client agnostic. Flags are available to the client for resetting the frame, indicating latency, switching mode, etc. The server can react to client-side changes on the fly and adapt accordingly by switching to different pipelines. The server is designed to effectively spread the load and thereby scale horizontally. This is achieved by isolating client connections into different processes.Keywords: 2D kernelling, augmented reality, cloud computing, dynamic load distribution, immersive experience, mobile computing, motion tracking, protocols, real-time systems, web-based augmented reality application
Procedia PDF Downloads 721030 The Gap between Elite Catholic Education and Inclusive Education
Authors: Viktorija Voidogaitė
Abstract:
Catholic education is based on the belief that every human being is created in the image and likeness of God. It is also influenced by the idea that the Kingdom of Heaven belongs to the humble and vulnerable. These principles emphasize the importance of serving the most vulnerable members of the Church community and promoting inclusivity without discrimination. This perspective emphasizes the need to protect the weakest members with compassion. However, realizing such an ideal in practice proves challenging, as the shortcomings and errors prevalent in any society often stem from the actions of Christians within that society. The evolution of these connections is observed throughout the historical development of Catholic education. In some European countries, Catholic education has become elitist, with limited room for inclusivity. This creates a conspicuous gap between the principles of the Evangelical community and elite Catholic schools and gymnasiums. Some schools appear to be most inclined to educate only those students who best align with their profile, leaving those needing assistance on the margins. As we advance into the third decade of the 21st century, there emerges a fundamental consideration: whether individuals who can assist the underprivileged and the infirm are being emphasized. Yet, it remains an open question whether these individuals will also possess the willingness and capability to construct a community or society that is inclusive and accessible to all.Keywords: inclusion, Catholic education, inclusive education, becoming
Procedia PDF Downloads 651029 Optimizing the Capacity of a Convolutional Neural Network for Image Segmentation and Pattern Recognition
Authors: Yalong Jiang, Zheru Chi
Abstract:
In this paper, we study the factors which determine the capacity of a Convolutional Neural Network (CNN) model and propose the ways to evaluate and adjust the capacity of a CNN model for best matching to a specific pattern recognition task. Firstly, a scheme is proposed to adjust the number of independent functional units within a CNN model to make it be better fitted to a task. Secondly, the number of independent functional units in the capsule network is adjusted to fit it to the training dataset. Thirdly, a method based on Bayesian GAN is proposed to enrich the variances in the current dataset to increase its complexity. Experimental results on the PASCAL VOC 2010 Person Part dataset and the MNIST dataset show that, in both conventional CNN models and capsule networks, the number of independent functional units is an important factor that determines the capacity of a network model. By adjusting the number of functional units, the capacity of a model can better match the complexity of a dataset.Keywords: CNN, convolutional neural network, capsule network, capacity optimization, character recognition, data augmentation, semantic segmentation
Procedia PDF Downloads 1531028 Evaluation of Computed Tomographic Anatomy of Respiratory System in Caspian Pond Turtle (Mauremys caspica)
Authors: Saghar Karimi, Mohammad Saeed Ahrari Khafi, Amin Abolhasani Foroughi
Abstract:
In recent decades, keeping exotic species as pet animals has become widespread. Turtles are exotic species from chelonians, which are interested by many people. Caspian pond and European pond turtles from Emydidea family are commonly kept as pets in Iran. Presence of the shell in turtles makes achievement to a comprehensive clinical examination impossible. Respiratory system is one of the most important structures to be examined completely. Presence of the air in the respiratory system makes radiography the first modality to think of; however, image quality would be affected by the shell. Computed tomography (CT) as a radiography-based and non-invasive technique provides cross-sectional scans with little superimposition. The aim of this study was to depict normal computed tomographic anatomy of the respiratory system in Caspian Pond Turtle. Five adult Caspian pond turtle were scanned using a 16-detector CT machine. Our results showed that computed tomography is able to well illustrated different parts of respiratory system in turtle and can be used for detecting abnormalities and disorders.Keywords: anatomy, computed tomography, respiratory system, turtle
Procedia PDF Downloads 2011027 Dual-Channel Reliable Breast Ultrasound Image Classification Based on Explainable Attribution and Uncertainty Quantification
Authors: Haonan Hu, Shuge Lei, Dasheng Sun, Huabin Zhang, Kehong Yuan, Jian Dai, Jijun Tang
Abstract:
This paper focuses on the classification task of breast ultrasound images and conducts research on the reliability measurement of classification results. A dual-channel evaluation framework was developed based on the proposed inference reliability and predictive reliability scores. For the inference reliability evaluation, human-aligned and doctor-agreed inference rationals based on the improved feature attribution algorithm SP-RISA are gracefully applied. Uncertainty quantification is used to evaluate the predictive reliability via the test time enhancement. The effectiveness of this reliability evaluation framework has been verified on the breast ultrasound clinical dataset YBUS, and its robustness is verified on the public dataset BUSI. The expected calibration errors on both datasets are significantly lower than traditional evaluation methods, which proves the effectiveness of the proposed reliability measurement.Keywords: medical imaging, ultrasound imaging, XAI, uncertainty measurement, trustworthy AI
Procedia PDF Downloads 1011026 SC-LSH: An Efficient Indexing Method for Approximate Similarity Search in High Dimensional Space
Authors: Sanaa Chafik, Imane Daoudi, Mounim A. El Yacoubi, Hamid El Ouardi
Abstract:
Locality Sensitive Hashing (LSH) is one of the most promising techniques for solving nearest neighbour search problem in high dimensional space. Euclidean LSH is the most popular variation of LSH that has been successfully applied in many multimedia applications. However, the Euclidean LSH presents limitations that affect structure and query performances. The main limitation of the Euclidean LSH is the large memory consumption. In order to achieve a good accuracy, a large number of hash tables is required. In this paper, we propose a new hashing algorithm to overcome the storage space problem and improve query time, while keeping a good accuracy as similar to that achieved by the original Euclidean LSH. The Experimental results on a real large-scale dataset show that the proposed approach achieves good performances and consumes less memory than the Euclidean LSH.Keywords: approximate nearest neighbor search, content based image retrieval (CBIR), curse of dimensionality, locality sensitive hashing, multidimensional indexing, scalability
Procedia PDF Downloads 3211025 Post-modernist Tragi-Comedy: A Study of Tom Stoppard’s “Rosencrantz and Guildenstern Are Dead”
Authors: Azza Taha Zaki
Abstract:
The death of tragedy is probably the most distinctive literary controversy of the twentieth century. There is common critical consent that tragedy in the classical sense of the word is no longer possible. Thinkers, philosophers, and critics such as Nietzsche, Durrenmatt, and George Steiner have all agreed that the decline of the genre in the modern age is due to the total lack of a unified world image and the absence of a shared vision in a fragmented and ideologically diversified world. The production of Rosencrantz and Guildenstern are Dead in 1967 marked the rise of the genre of tragi-comedy as a more appropriate reflection of the spirit of the age. At the hands of such great dramatists as Tom Stoppard (1937- ), the revived genre was not used as an extra comic element to give some comic relief to an otherwise tragic text, but it was given a postmodernist touch to serve the interpretation of the dilemma of man in the postmodernist world. This paper will study features of postmodernist tragi-comedy in Rosencrantz and Guildenstern are Dead as one of the most important plays in modern British theatre and investigate Stoppard’s vision of man and life as influenced by postmodernist thought and philosophy.Keywords: British, drama, postmodernist, Stoppard, tragi-comedy
Procedia PDF Downloads 1861024 Deep Learning for SAR Images Restoration
Authors: Hossein Aghababaei, Sergio Vitale, Giampaolo Ferraioli
Abstract:
In the context of Synthetic Aperture Radar (SAR) data, polarization is an important source of information for Earth's surface monitoring. SAR Systems are often considered to transmit only one polarization. This constraint leads to either single or dual polarimetric SAR imaging modalities. Single polarimetric systems operate with a fixed single polarization of both transmitted and received electromagnetic (EM) waves, resulting in a single acquisition channel. Dual polarimetric systems, on the other hand, transmit in one fixed polarization and receive in two orthogonal polarizations, resulting in two acquisition channels. Dual polarimetric systems are obviously more informative than single polarimetric systems and are increasingly being used for a variety of remote sensing applications. In dual polarimetric systems, the choice of polarizations for the transmitter and the receiver is open. The choice of circular transmit polarization and coherent dual linear receive polarizations forms a special dual polarimetric system called hybrid polarimetry, which brings the properties of rotational invariance to geometrical orientations of features in the scene and optimizes the design of the radar in terms of reliability, mass, and power constraints. The complete characterization of target scattering, however, requires fully polarimetric data, which can be acquired with systems that transmit two orthogonal polarizations. This adds further complexity to data acquisition and shortens the coverage area or swath of fully polarimetric images compared to the swath of dual or hybrid polarimetric images. The search for solutions to augment dual polarimetric data to full polarimetric data will therefore take advantage of full characterization and exploitation of the backscattered field over a wider coverage with less system complexity. Several methods for reconstructing fully polarimetric images using hybrid polarimetric data can be found in the literature. Although the improvements achieved by the newly investigated and experimented reconstruction techniques are undeniable, the existing methods are, however, mostly based upon model assumptions (especially the assumption of reflectance symmetry), which may limit their reliability and applicability to vegetation and forest scenarios. To overcome the problems of these techniques, this paper proposes a new framework for reconstructing fully polarimetric information from hybrid polarimetric data. The framework uses Deep Learning solutions to augment hybrid polarimetric data without relying on model assumptions. A convolutional neural network (CNN) with a specific architecture and loss function is defined for this augmentation problem by focusing on different scattering properties of the polarimetric data. In particular, the method controls the CNN training process with respect to several characteristic features of polarimetric images defined by the combination of different terms in the cost or loss function. The proposed method is experimentally validated with real data sets and compared with a well-known and standard approach from the literature. From the experiments, the reconstruction performance of the proposed framework is superior to conventional reconstruction methods. The pseudo fully polarimetric data reconstructed by the proposed method also agree well with the actual fully polarimetric images acquired by radar systems, confirming the reliability and efficiency of the proposed method.Keywords: SAR image, polarimetric SAR image, convolutional neural network, deep learnig, deep neural network
Procedia PDF Downloads 671023 Improved Feature Extraction Technique for Handling Occlusion in Automatic Facial Expression Recognition
Authors: Khadijat T. Bamigbade, Olufade F. W. Onifade
Abstract:
The field of automatic facial expression analysis has been an active research area in the last two decades. Its vast applicability in various domains has drawn so much attention into developing techniques and dataset that mirror real life scenarios. Many techniques such as Local Binary Patterns and its variants (CLBP, LBP-TOP) and lately, deep learning techniques, have been used for facial expression recognition. However, the problem of occlusion has not been sufficiently handled, making their results not applicable in real life situations. This paper develops a simple, yet highly efficient method tagged Local Binary Pattern-Histogram of Gradient (LBP-HOG) with occlusion detection in face image, using a multi-class SVM for Action Unit and in turn expression recognition. Our method was evaluated on three publicly available datasets which are JAFFE, CK, SFEW. Experimental results showed that our approach performed considerably well when compared with state-of-the-art algorithms and gave insight to occlusion detection as a key step to handling expression in wild.Keywords: automatic facial expression analysis, local binary pattern, LBP-HOG, occlusion detection
Procedia PDF Downloads 1691022 The Wear Recognition on Guide Surface Based on the Feature of Radar Graph
Authors: Youhang Zhou, Weimin Zeng, Qi Xie
Abstract:
Abstract: In order to solve the wear recognition problem of the machine tool guide surface, a new machine tool guide surface recognition method based on the radar-graph barycentre feature is presented in this paper. Firstly, the gray mean value, skewness, projection variance, flat degrees and kurtosis features of the guide surface image data are defined as primary characteristics. Secondly, data Visualization technology based on radar graph is used. The visual barycentre graphical feature is demonstrated based on the radar plot of multi-dimensional data. Thirdly, a classifier based on the support vector machine technology is used, the radar-graph barycentre feature and wear original feature are put into the classifier separately for classification and comparative analysis of classification and experiment results. The calculation and experimental results show that the method based on the radar-graph barycentre feature can detect the guide surface effectively.Keywords: guide surface, wear defects, feature extraction, data visualization
Procedia PDF Downloads 5191021 Durability and Early-Age Behavior of Sprayed Concrete with an Expansion Admixture
Authors: Kyong-Ku Yun, Kyeo-Re Lee, Kyong Namkung, Seung-Yeon Han, Pan-Gil Choi
Abstract:
Sprayed concrete is a way to spray a concrete using a machinery with high air pressure. There are insufficient studies on the durability and early-age behavior of sprayed concrete using high quality expansion agent. A series of an experiment were executed with 5 varying expansion agent replacement rates, while all the other conditions were kept constant, including cement binder content and water-cement ratio. The tests includes early-age shrinkage test, rapid chloride permeability test, and image analysis of air void structure. The early-age expansion test with the variation of expansion agent show that the expansion strain increases as the ratio of expansion agent increases. The rapid chloride permeability test shows that it decrease as the expansion agent increase. Therefore, expansion agent affects into the rapid chloride permeability in a better way. As expansion agent content increased, spacing factor slightly decreased while specific surface kept relatively stable. As a results, the optimum ratio of expansion agent would be selected between 7 % and 11%.Keywords: sprayed concrete, durability, early-age behavior, expansion admixture
Procedia PDF Downloads 5071020 Finite Element Simulation of Embankment Bumps at Bridge Approaches, Comparison Study
Authors: F. A. Hassona, M. D. Hashem, R. I. Melek, B. M. Hakeem
Abstract:
A differential settlement at the end of a bridge near the interface between the abutment and the embankment is a persistent problem for highway agencies. The differential settlement produces the common ‘bump at the end of the bridge’. Reduction in steering response, distraction to the driver, added risk and expense to maintenance operation, and reduction in a transportation agency’s public image are all undesirable effects of these uneven and irregular transitions. This paper attempts to simulate the bump at the end of the bridge using PLAXIS finite element 2D program. PLAXIS was used to simulate a laboratory model called Bridge to Embankment Simulator of Transition (B.E.S.T.) device which was built by others to investigate this problem. A total of six numerical simulations were conducted using hardening- soil model with rational assumptions of missing soil parameters to estimate the bump at the end of the bridge. The results show good agreements between the numerical and the laboratory models. Important factors influencing bumps at bridge ends were also addressed in light of the model results.Keywords: bridge approach slabs, bridge bump, hardening-soil, PLAXIS 2D, settlement
Procedia PDF Downloads 3481019 The Flow Separation Delay on the Aircraft Wing
Authors: Ishtiaq A. Chaudhry, Z. R. Tahir, F. A. Siddiqui, Z. Anwar, F. Valenzuelacalva
Abstract:
A series of experiments involving the particle image velocimetry technique are carried out to analyse the quantitative effectiveness of the synthesized vortical structures towards actual flow separation control. The streamwise vortices are synthesized from the synthetic jet actuator and introduced into the attached and separating boundary layer developed on the flat plate surface. Two types of actuators with different geometrical set up are used to analyse the evolution of vortical structures in the near wall region and their impact towards achieving separation delay on the actual aircraft wing. Firstly a single circular jet is synthesized at varying actuator operating parameters and issued into the boundary layer to evaluate the dynamics of the interaction between the vortical structures and the near wall low momentum fluid in the separated region. Secondly, an array of jets has been issued into the artificially separated region to assess the effectiveness of various vortical structures towards achieving the reattachment of the separated flow in the streamwise direction.Keywords: boundary layer, flow separation, streamwise vortices, synthetic jet actuator
Procedia PDF Downloads 4621018 Optical Imaging Based Detection of Solder Paste in Printed Circuit Board Jet-Printing Inspection
Authors: D. Heinemann, S. Schramm, S. Knabner, D. Baumgarten
Abstract:
Purpose: Applying solder paste to printed circuit boards (PCB) with stencils has been the method of choice over the past years. A new method uses a jet printer to deposit tiny droplets of solder paste through an ejector mechanism onto the board. This allows for more flexible PCB layouts with smaller components. Due to the viscosity of the solder paste, air blisters can be trapped in the cartridge. This can lead to missing solder joints or deviations in the applied solder volume. Therefore, a built-in and real-time inspection of the printing process is needed to minimize uncertainties and increase the efficiency of the process by immediate correction. The objective of the current study is the design of an optimal imaging system and the development of an automatic algorithm for the detection of applied solder joints from optical from the captured images. Methods: In a first approach, a camera module connected to a microcomputer and LED strips are employed to capture images of the printed circuit board under four different illuminations (white, red, green and blue). Subsequently, an improved system including a ring light, an objective lens, and a monochromatic camera was set up to acquire higher quality images. The obtained images can be divided into three main components: the PCB itself (i.e., the background), the reflections induced by unsoldered positions or screw holes and the solder joints. Non-uniform illumination is corrected by estimating the background using a morphological opening and subtraction from the input image. Image sharpening is applied in order to prevent error pixels in the subsequent segmentation. The intensity thresholds which divide the main components are obtained from the multimodal histogram using three probability density functions. Determining the intersections delivers proper thresholds for the segmentation. Remaining edge gradients produces small error areas which are removed by another morphological opening. For quantitative analysis of the segmentation results, the dice coefficient is used. Results: The obtained PCB images show a significant gradient in all RGB channels, resulting from ambient light. Using different lightings and color channels 12 images of a single PCB are available. A visual inspection and the investigation of 27 specific points show the best differentiation between those points using a red lighting and a green color channel. Estimating two thresholds from analyzing the multimodal histogram of the corrected images and using them for segmentation precisely extracts the solder joints. The comparison of the results to manually segmented images yield high sensitivity and specificity values. Analyzing the overall result delivers a Dice coefficient of 0.89 which varies for single object segmentations between 0.96 for a good segmented solder joints and 0.25 for single negative outliers. Conclusion: Our results demonstrate that the presented optical imaging system and the developed algorithm can robustly detect solder joints on printed circuit boards. Future work will comprise a modified lighting system which allows for more precise segmentation results using structure analysis.Keywords: printed circuit board jet-printing, inspection, segmentation, solder paste detection
Procedia PDF Downloads 3361017 Semi-Automated Tracking of Vibrissal Movements in Free-Moving Rodents Captured by High-Speed Videos
Authors: Hyun June Kim, Tailong Shi, Seden Akdagli, Sam Most, Yuling Yan
Abstract:
Quantitative analysis of mouse whisker movement can be used to study functional recovery and regeneration of facial nerve after an injury. However, it is challenging to accurately track mouse whisker movements, and most whisker tracking methods require manual intervention, e.g. fixing the head of the mouse during a study. Here we describe a semi-automated image processing method that is applied to high-speed video recordings of free-moving mice to track whisker movements. We first track the head movement of a mouse by delineating the lower head contour frame-by-frame to locate and determine the orientation of its head. Then, a region of interest is identified for each frame, with subsequent application of the Hough transform to track individual whisker movements on each side of the head. Our approach is used to examine the functional recovery of damaged facial nerves in mice over a course of 21 days.Keywords: mystacial macrovibrissae, whisker tracking, head tracking, facial nerve recovery
Procedia PDF Downloads 5901016 Human Identification and Detection of Suspicious Incidents Based on Outfit Colors: Image Processing Approach in CCTV Videos
Authors: Thilini M. Yatanwala
Abstract:
CCTV (Closed-Circuit-Television) Surveillance System is being used in public places over decades and a large variety of data is being produced every moment. However, most of the CCTV data is stored in isolation without having integrity. As a result, identification of the behavior of suspicious people along with their location has become strenuous. This research was conducted to acquire more accurate and reliable timely information from the CCTV video records. The implemented system can identify human objects in public places based on outfit colors. Inter-process communication technologies were used to implement the CCTV camera network to track people in the premises. The research was conducted in three stages and in the first stage human objects were filtered from other movable objects available in public places. In the second stage people were uniquely identified based on their outfit colors and in the third stage an individual was continuously tracked in the CCTV network. A face detection algorithm was implemented using cascade classifier based on the training model to detect human objects. HAAR feature based two-dimensional convolution operator was introduced to identify features of the human face such as region of eyes, region of nose and bridge of the nose based on darkness and lightness of facial area. In the second stage outfit colors of human objects were analyzed by dividing the area into upper left, upper right, lower left, lower right of the body. Mean color, mod color and standard deviation of each area were extracted as crucial factors to uniquely identify human object using histogram based approach. Color based measurements were written in to XML files and separate directories were maintained to store XML files related to each camera according to time stamp. As the third stage of the approach, inter-process communication techniques were used to implement an acknowledgement based CCTV camera network to continuously track individuals in a network of cameras. Real time analysis of XML files generated in each camera can determine the path of individual to monitor full activity sequence. Higher efficiency was achieved by sending and receiving acknowledgments only among adjacent cameras. Suspicious incidents such as a person staying in a sensitive area for a longer period or a person disappeared from the camera coverage can be detected in this approach. The system was tested for 150 people with the accuracy level of 82%. However, this approach was unable to produce expected results in the presence of group of people wearing similar type of outfits. This approach can be applied to any existing camera network without changing the physical arrangement of CCTV cameras. The study of human identification and suspicious incident detection using outfit color analysis can achieve higher level of accuracy and the project will be continued by integrating motion and gait feature analysis techniques to derive more information from CCTV videos.Keywords: CCTV surveillance, human detection and identification, image processing, inter-process communication, security, suspicious detection
Procedia PDF Downloads 1811015 Critical Analysis of Ideology of Non-Religious Spirituality (SBNR) Case Study of Sam Harris’ Theory
Authors: Muhammad Samiullah
Abstract:
Religion and spirit always goes side by side. In this era spirit and religion are studied separately with thought of an anti-religious phenomenon is there with its vast impacts. Non-religious mind and religious one have a lot of things that differs, they have spiritual struggles.so there is theme arises that is in the name of non-religious spirituality(SBNR). The thinking prevailing in west and now in east in reverse of the religious institutional thought and spirituality. Religious disputes created an image to the world that is nontolerant and companionate, rising a question of god existence and self-existence. Thus giving rise in Atheism, nihilism, free thinking. The thinking of spirituality also gone in another side with superstitions and spiritual meditation. Christian religious bodies and scholar criticized the stance with their religious aspect but there should be an Islamic counter narrative should be there. Here in this dissertation the phenomenon is addressed and analyzed in respect with some of the literature presented from 2014 till present year. The phenomenon was not analyzed before in broader sense. There are some introductory and static views presented in this regard. So there is a literature gap to be filled by this effort, the Muslim counter narrative is still not there though Christians do their part.Keywords: SBNR, non-spirituality, superstitions, Sam Harris
Procedia PDF Downloads 901014 A New Distributed Computing Environment Based On Mobile Agents for Massively Parallel Applications
Authors: Fatéma Zahra Benchara, Mohamed Youssfi, Omar Bouattane, Hassan Ouajji, Mohamed Ouadi Bensalah
Abstract:
In this paper, we propose a new distributed environment for High Performance Computing (HPC) based on mobile agents. It allows us to perform parallel programs execution as distributed one over a flexible grid constituted by a cooperative mobile agent team works. The distributed program to be performed is encapsulated on team leader agent which deploys its team workers as Agent Virtual Processing Unit (AVPU). Each AVPU is asked to perform its assigned tasks and provides the computational results which make the data and team works tasks management difficult for the team leader agent and that influence the performance computing. In this work we focused on the implementation of the Mobile Provider Agent (MPA) in order to manage the distribution of data and instructions and to ensure a load balancing model. It grants also some interesting mechanisms to manage the others computing challenges thanks to the mobile agents several skills.Keywords: image processing, distributed environment, mobile agents, parallel and distributed computing
Procedia PDF Downloads 4101013 Remote Sensing of Urban Land Cover Change: Trends, Driving Forces, and Indicators
Authors: Wei Ji
Abstract:
This study was conducted in the Kansas City metropolitan area of the United States, which has experienced significant urban sprawling in recent decades. The remote sensing of land cover changes in this area spanned over four decades from 1972 through 2010. The project was implemented in two stages: the first stage focused on detection of long-term trends of urban land cover change, while the second one examined how to detect the coupled effects of human impact and climate change on urban landscapes. For the first-stage study, six Landsat images were used with a time interval of about five years for the period from 1972 through 2001. Four major land cover types, built-up land, forestland, non-forest vegetation land, and surface water, were mapped using supervised image classification techniques. The study found that over the three decades the built-up lands in the study area were more than doubled, which was mainly at the expense of non-forest vegetation lands. Surprisingly and interestingly, the area also saw a significant gain in surface water coverage. This observation raised questions: How have human activities and precipitation variation jointly impacted surface water cover during recent decades? How can we detect such coupled impacts through remote sensing analysis? These questions led to the second stage of the study, in which we designed and developed approaches to detecting fine-scale surface waters and analyzing coupled effects of human impact and precipitation variation on the waters. To effectively detect urban landscape changes that might be jointly shaped by precipitation variation, our study proposed “urban wetscapes” (loosely-defined urban wetlands) as a new indicator for remote sensing detection. The study examined whether urban wetscape dynamics was a sensitive indicator of the coupled effects of the two driving forces. To better detect this indicator, a rule-based classification algorithm was developed to identify fine-scale, hidden wetlands that could not be appropriately detected based on their spectral differentiability by a traditional image classification. Three SPOT images for years 1992, 2008, and 2010, respectively were classified with this technique to generate the four types of land cover as described above. The spatial analyses of remotely-sensed wetscape changes were implemented at the scales of metropolitan, watershed, and sub-watershed, as well as based on the size of surface water bodies in order to accurately reveal urban wetscape change trends in relation to the driving forces. The study identified that urban wetscape dynamics varied in trend and magnitude from the metropolitan, watersheds, to sub-watersheds in response to human impacts at different scales. The study also found that increased precipitation in the region in the past decades swelled larger wetlands in particular while generally smaller wetlands decreased mainly due to human development activities. These results confirm that wetscape dynamics can effectively reveal the coupled effects of human impact and climate change on urban landscapes. As such, remote sensing of this indicator provides new insights into the relationships between urban land cover changes and driving forces.Keywords: urban land cover, human impact, climate change, rule-based classification, across-scale analysis
Procedia PDF Downloads 3081012 Flow Control around Bluff Bodies by Attached Permeable Plates
Authors: Gokturk Memduh Ozkan, Huseyin Akilli
Abstract:
The aim of present study is to control the unsteady flow structure downstream of a circular cylinder by use of attached permeable plates. Particle image velocimetry (PIV) technique and dye visualization experiments were performed in deep water and the flow characteristics were evaluated by means of time-averaged streamlines, Reynolds Shear Stress and Turbulent Kinetic Energy concentrations. The permeable plate was made of a chrome-nickel screen having a porosity value of β=0.6 and it was attached on the cylinder surface along its midspan. Five different angles were given to the plate (θ=0°, 15°, 30°, 45°, 60°) with respect to the centerline of the cylinder in order to examine its effect on the flow control. It was shown that the permeable plate is effective on elongating the vortex formation length and reducing the fluctuations in the wake region. Compared to the plain cylinder, the reductions in the values of maximum Reynolds shear stress and Turbulent Kinetic Energy were evaluated as 72.5% and 66%, respectively for the plate angles of θ=45° and 60° which were also found to be suggested for applications concerning the vortex shedding and consequent Vortex-Induced Vibrations.Keywords: bluff body, flow control, permeable plate, PIV, VIV, vortex shedding
Procedia PDF Downloads 3601011 Walkability and Urban Social Identity
Authors: Reihaneh Rafiemanzelat
Abstract:
One of the most recent fields of investigation in urban issues focuses on the walkability in urban spaces. The paper aims to establish the theoretical relationship between the people's link with definite urban public spaces and the social identity processes derived from the relation with these places. The theoretical aspects which are examined for this purpose are: the concept of walkability and its developments and the social identity theories derived from walkable spaces. In fact, the paper presents the main results obtained from an empirical investigation which concern to the genesis of urban social identity in particular street as one of the main elements of public spaces in cities. İsmet İnönü Blvd which known as Salamis Street in Famagusta, North Cyprus is one of the main street in city whit high level of physical and social activities all the time. The urban social identity of users was analyzed, focusing on three main factors: walkability of space, social identification, and image of the space. These three factors were analyzed in relation to a series of items in the initial questionnaire, evaluation of existing natural resources, and environmental attitudes.Keywords: walkability, urban public space, pedestrian, social activity, social identity
Procedia PDF Downloads 4331010 The Role of Coaching in Fostering Entrepreneurial Intention among Graduate Students in Tunisia
Authors: Abdellatif Amouri, Sami Boudabbous
Abstract:
The current study provides insights on the importance of entrepreneurial coaching as a source of developing entrepreneurial intentions among entrepreneurs and a determinant factor of business creation process and growth. Coaching, which implies exchange of adequate information and a mutual understanding between entrepreneurs and their partners, requires a better mutual knowledge of the representations and the perceptions of ideas which are widely present in their dealings and transactions. Therefore, to analyze entrepreneurs’ perceptions of business creation, we addressed a survey questionnaire to a group of Tunisian entrepreneurs and experts in business creation to indicate their level of approval concerning the prominence of coaching. The factor analysis indicates that more than 60% of the respondents believe that each statement reflects an aspect of coaching, with no bias to its position in the entrepreneurial process. Therefore, the image drawn from our respondents’ perceptions is that an entrepreneur is rather "constructed" and "shaped" by multiple apprenticeships both before and during the entrepreneurial act, through an accompaniment process and within interactions with trainers, consultants or professionals in starting a business. Similarly, the results indicate that the poor support structures and lack of accompaniment procedures stand as an obstacle impeding the development of entrepreneurial intention among business creators.Keywords: Entrepreneurial Behavior, Entrepreneurial Coaching, Entrepreneurial Intention, Perceptions, Venture Creation
Procedia PDF Downloads 4381009 A Scoping Review of Technology-Facilitated Gender-Based Violence: Findings from Asia
Authors: Vaiddehi Bansal, Laura Hinson, Mayumi Rezwan, Erin Leasure, Mithila Iyer, Connor Roth, Poulomi Pal, Kareem Kysia
Abstract:
As digital usage becomes increasingly ubiquitous worldwide, technology-facilitated gender-based violence (GBV) has garnered increasing attention in the recent years, especially during the COVID-19 pandemic. This form of violence is defined as “action by one or more people that harms others based on their sexual or gender identity or by enforcing harmful gender norms. This action is carried out using the internet and/or mobile technology that harms others based on their sexual or gender identity or by enforcing harmful gender norms”.Common forms of technology-facilitated GBV include cyberstalking, cyberbullying, sexual harassment, image-based abuse, doxing, hacking, gendertrolling, hate speech, and impersonation. Most literature on this pervasive yet complex issue has emerged from high-income countries, and few studies comprehensively summarize its prevalence, manifestations, and implications. This rigorous scoping review examines the evidence base of this phenomenon in low and middle-income countries across Asia, summarizing trends and gaps to inform actionable recommendations. The research team developed search terms to conduct a comprehensive search of peer-reviewed and grey literature. Query results were eligible for inclusion if they were published in English between 2006-2021 and with an explicit emphasis on technology-facilitated violence, gender, and the countries of interest in the Asia region. Title, abstracts, and full-texts were independently screened by two reviewers based on inclusion criteria, and data was extracted through deductive coding. Of 2,042 articles screened, 97 met inclusion criteria. The review revealed a gap in the evidence-base in Central Asia and the Pacific Islands. Findings across South and Southeast Asia indicate that technology-facilitated GBV comprises various forms of abuse, violence, and harassment that are largely shaped by country-specific societal norms and technological landscapes. The literature confirms that women, girls, and sexual minorities, especially those with intersecting marginalized identities, are often more vulnerable to experiencing online violence. Cultural norms and patriarchal structures tend to stigmatize survivors, limiting their ability to seek social and legal support. Survivors are also less likely to report their experience due to barriers such as lack of awareness of reporting mechanisms, the perception that digital platforms will not address their complaints, and cumbersome reporting systems. The COVID-19 pandemic has further exacerbated perpetration and strained support mechanisms. Prevalence varies by the form of violence but is difficult to estimate accurately due to underreporting and disjointed, outdated, or non-existent legal definitions. Addressing technology-facilitated GBV in Asia requires collective action from multiple actors, including government authorities, technology companies, digital and feminist movements, NGOs, and researchers.Keywords: gender-based violence, technology, online sexual harassment, image-based abuse
Procedia PDF Downloads 1311008 Corrosion Behaviour of Hypereutectic Al-Si Automotive Alloy in Different pH Environment
Authors: M. Al Nur, M. S. Kaiser
Abstract:
Corrosion behaviour of hypereutectic Al-19Si automotive alloy in different pH=1, 3, 5, 7, 9, 11, and 13 environments was carried out using conventional gravimetric measurements and was complemented by resistivity, optical micrograph, scanning electron microscopy (SEM) and X-ray analyzer (EDX) investigations. Gravimetric analysis confirmed that the highest corrosion rate is shown at pH 13 followed by pH 1. Minimum corrosion occurs in the pH range of 3.0 to 11 due to establishment of passive layer on the surface. The highest corrosion rate at pH 13 is due to the presence of sodium hydroxide in the solution which dissolves the surface oxide film at a steady rate. At pH 1, it can be attributed that the presence of aggressive chloride ions serves to pick up the damage of the passive films at localized regions. With varying exposure periods by both, the environment complies with the normal corrosion rate profile that is an initial steep rise followed by a nearly constant value of corrosion rate. Resistivity increases in case of pH 1 solution for the higher pit formation and decreases at pH 13 due to formation of thin film. The SEM image of corroded samples immersed in pH 1 solution clearly shows pores on the surface and in pH 13 solution, and the corrosion layer seems more compact and homogenous and not porous.Keywords: Al-Si alloy, corrosion, pH, resistivity, scanning electron microscopy (SEM)
Procedia PDF Downloads 1661007 A Practical and Efficient Evaluation Function for 3D Model Based Vehicle Matching
Authors: Yuan Zheng
Abstract:
3D model-based vehicle matching provides a new way for vehicle recognition, localization and tracking. Its key is to construct an evaluation function, also called fitness function, to measure the degree of vehicle matching. The existing fitness functions often poorly perform when the clutter and occlusion exist in traffic scenarios. In this paper, we present a practical and efficient fitness function. Unlike the existing evaluation functions, the proposed fitness function is to study the vehicle matching problem from both local and global perspectives, which exploits the pixel gradient information as well as the silhouette information. In view of the discrepancy between 3D vehicle model and real vehicle, a weighting strategy is introduced to differently treat the fitting of the model’s wireframes. Additionally, a normalization operation for the model’s projection is performed to improve the accuracy of the matching. Experimental results on real traffic videos reveal that the proposed fitness function is efficient and robust to the cluttered background and partial occlusion.Keywords: 3D-2D matching, fitness function, 3D vehicle model, local image gradient, silhouette information
Procedia PDF Downloads 3991006 Potential Effects of Green Infrastructures on the Land Surface Temperatures in Arid Areas
Authors: Adila Shafqat
Abstract:
Climate change and urbanization has changed the face of many cities in developing countries. Urbanization is linked with land use and land cover change, that is further intensify by the effects of changing climates. Green infrastructures provide numerous ecosystem services which effect the physical set up of the cities in the long run. Land surface temperatures is considered as defining parameter in the studies of the thermal impact on the land cover. Current study is conducted in the semi-arid urban areas of the Bahawalpur region. Accordingly, Land Surface Temperatures and land cover maps are derived from Landsat image through remote sensing techniques. The cooling impact of green infrastructure is determined by calculating land surface temperature of buffered zones around green infrastructures. A regression model is applied for results. It is seen that land surface temperature around green infrastructures in 1 to 3 degrees lower than the built up surroundings. The result indicates that the urban green infrastructures should be planned according to the local needs and characteristics of landuse so that they can effectively tackle land surface temperatures of urban areas.Keywords: climate change, surface temperatures, green spaces, urban planning
Procedia PDF Downloads 1201005 Vehicle Detection and Tracking Using Deep Learning Techniques in Surveillance Image
Authors: Abe D. Desta
Abstract:
This study suggests a deep learning-based method for identifying and following moving objects in surveillance video. The proposed method uses a fast regional convolution neural network (F-RCNN) trained on a substantial dataset of vehicle images to first detect vehicles. A Kalman filter and a data association technique based on a Hungarian algorithm are then used to monitor the observed vehicles throughout time. However, in general, F-RCNN algorithms have been shown to be effective in achieving high detection accuracy and robustness in this research study. For example, in one study The study has shown that the vehicle detection and tracking, the system was able to achieve an accuracy of 97.4%. In this study, the F-RCNN algorithm was compared to other popular object detection algorithms and was found to outperform them in terms of both detection accuracy and speed. The presented system, which has application potential in actual surveillance systems, shows the usefulness of deep learning approaches in vehicle detection and tracking.Keywords: artificial intelligence, computer vision, deep learning, fast-regional convolutional neural networks, feature extraction, vehicle tracking
Procedia PDF Downloads 126