Search results for: police image
1187 Jordan Curves in the Digital Plane with Respect to the Connectednesses given by Certain Adjacency Graphs
Authors: Josef Slapal
Abstract:
Digital images are approximations of real ones and, therefore, to be able to study them, we need the digital plane Z2 to be equipped with a convenient structure that behaves analogously to the Euclidean topology on the real plane. In particular, it is required that such a structure allows for a digital analogue of the Jordan curve theorem. We introduce certain adjacency graphs on the digital plane and prove digital Jordan curves for them thus showing that the graphs provide convenient structures on Z2 for the study and processing of digital images. Further convenient structures including the wellknown Khalimsky and Marcus-Wyse adjacency graphs may be obtained as quotients of the graphs introduced. Since digital Jordan curves represent borders of objects in digital images, the adjacency graphs discussed may be used as background structures on the digital plane for solving the problems of digital image processing that are closely related to borders like border detection, contour filling, pattern recognition, thinning, etc.Keywords: digital plane, adjacency graph, Jordan curve, quotient adjacency
Procedia PDF Downloads 3811186 Bipolar Impulse Noise Removal and Edge Preservation in Color Images and Video Using Improved Kuwahara Filter
Authors: Reji Thankachan, Varsha PS
Abstract:
Both image capturing devices and human visual systems are nonlinear. Hence nonlinear filtering methods outperforms its linear counterpart in many applications. Linear methods are unable to remove impulsive noise in images by preserving its edges and fine details. In addition, linear algorithms are unable to remove signal dependent or multiplicative noise in images. This paper presents an approach to denoise and smoothen the Bipolar impulse noised images and videos using improved Kuwahara filter. It involves a 2 stage algorithm which includes a noise detection followed by filtering. Numerous simulation demonstrate that proposed method outperforms the existing method by eliminating the painting like flattening effect along the local feature direction while preserving edge with improvement in PSNR and MSE.Keywords: bipolar impulse noise, Kuwahara, PSNR MSE, PDF
Procedia PDF Downloads 5001185 Using Priority Order of Basic Features for Circumscribed Masses Detection in Mammograms
Authors: Minh Dong Le, Viet Dung Nguyen, Do Huu Viet, Nguyen Huu Tu
Abstract:
In this paper, we present a new method for circumscribed masses detection in mammograms. Our method is evaluated on 23 mammographic images of circumscribed masses and 20 normal mammograms from public Mini-MIAS database. The method is quite sanguine with sensitivity (SE) of 95% with only about 1 false positive per image (FPpI). To achieve above results we carry out a progression following: Firstly, the input images are preprocessed with the aim to enhance key information of circumscribed masses; Next, we calculate and evaluate statistically basic features of abnormal regions on training database; Then, mammograms on testing database are divided into equal blocks which calculated corresponding features. Finally, using priority order of basic features to classify blocks as an abnormal or normal regions.Keywords: mammograms, circumscribed masses, evaluated statistically, priority order of basic features
Procedia PDF Downloads 3351184 Semi-Supervised Outlier Detection Using a Generative and Adversary Framework
Authors: Jindong Gu, Matthias Schubert, Volker Tresp
Abstract:
In many outlier detection tasks, only training data belonging to one class, i.e., the positive class, is available. The task is then to predict a new data point as belonging either to the positive class or to the negative class, in which case the data point is considered an outlier. For this task, we propose a novel corrupted Generative Adversarial Network (CorGAN). In the adversarial process of training CorGAN, the Generator generates outlier samples for the negative class, and the Discriminator is trained to distinguish the positive training data from the generated negative data. The proposed framework is evaluated using an image dataset and a real-world network intrusion dataset. Our outlier-detection method achieves state-of-the-art performance on both tasks.Keywords: one-class classification, outlier detection, generative adversary networks, semi-supervised learning
Procedia PDF Downloads 1541183 Adolescents' Perspectives on Parental Responses to Teen Dating Violence
Authors: Beverly Black
Abstract:
Teen dating violence (TDV) is a significant public health problem with severe negative impact on youths’ mental and physical health and well-being. Exacerbating the negative impact of TDV victimization is the fact that teens rarely report the violence. They are fearful to tell friends or family, especially parents. The family context is the first place where children learn about interpersonal relationships, and therefore, parental response of teens’ life experiences influences teens’ actions and development. This study examined youths’ perspectives on parental responses to TDV. Effective parental responses to TDV may increase the likelihood that youth will leave abusive relationships. Method. Eleven gender-separate focus groups were conducted with 27 females and 28 males, ages 12 to 17, to discuss parental responses to teen dating violence. Youth were recruited from a metropolitan community in the southwestern part of the United States. Focus groups questions asked the middle and high school youth how they would want their parents to respond to them if they approached them about various incidents of dating violence. All focus groups were transcribed. Using QSR-N10, two researchers’ analyzed data first using open and axial coding techniques to find overarching themes. Researchers triangulated the coded data to ensure accurate interpretations of the participants’ messages and used the scenario questions to structure the coded results. Results. Most youths suggested that parents should simply talk with them; they recognized the importance of communication. Teens wanted parents to ask questions, educate them about healthy relationships, share their personal experiences, and give teens advice (tell them to break up, limit contact with perpetrator, go to police). Younger youth expressed more willingness to listen to parental advice. Older youth wanted their parents to give them the opportunity to make their decisions. Many of the teens’ comments focused on the importance of parents protecting the teen, providing support and empathy for the teen, and especially refraining from overreacting (not yelling, not getting angry and staying calm). Implications. Parents need to know how to effectively respond to youth needing to leave unhealthy relationships. Demanding that their children end a relationship may not be a realistic approach to TDV. A parent’s ineffective response, when approached by an adolescent for assistance in TDV, may influence a youth to dismiss parents and other adults as viable options for seeking assistance. Parents and prevention educators can learn from hearing youths’ voices about effective responses to TDV.Keywords: adolescents dating abuse, adolescent and parent communication, parental responses to teen dating violence, teen dating violence
Procedia PDF Downloads 2741182 A Construct to Perform in Situ Deformation Measurement of Material Extrusion-Fabricated Structures
Authors: Daniel Nelson, Valeria La Saponara
Abstract:
Material extrusion is an additive manufacturing modality that continues to show great promise in the ability to create low-cost, highly intricate, and exceedingly useful structural elements. As more capable and versatile filament materials are devised, and the resolution of manufacturing systems continues to increase, the need to understand and predict manufacturing-induced warping will gain ever greater importance. The following study presents an in situ remote sensing and data analysis construct that allows for the in situ mapping and quantification of surface displacements induced by residual stresses on a specified test structure. This proof-of-concept experimental process shows that it is possible to provide designers and manufacturers with insight into the manufacturing parameters that lead to the manifestation of these deformations and a greater understanding of the behavior of these warping events over the course of the manufacturing process.Keywords: additive manufacturing, deformation, digital image correlation, fused filament fabrication, residual stress, warping
Procedia PDF Downloads 911181 Mean Shift-Based Preprocessing Methodology for Improved 3D Buildings Reconstruction
Authors: Nikolaos Vassilas, Theocharis Tsenoglou, Djamchid Ghazanfarpour
Abstract:
In this work we explore the capability of the mean shift algorithm as a powerful preprocessing tool for improving the quality of spatial data, acquired from airborne scanners, from densely built urban areas. On one hand, high resolution image data corrupted by noise caused by lossy compression techniques are appropriately smoothed while at the same time preserving the optical edges and, on the other, low resolution LiDAR data in the form of normalized Digital Surface Map (nDSM) is upsampled through the joint mean shift algorithm. Experiments on both the edge-preserving smoothing and upsampling capabilities using synthetic RGB-z data show that the mean shift algorithm is superior to bilateral filtering as well as to other classical smoothing and upsampling algorithms. Application of the proposed methodology for 3D reconstruction of buildings of a pilot region of Athens, Greece results in a significant visual improvement of the 3D building block model.Keywords: 3D buildings reconstruction, data fusion, data upsampling, mean shift
Procedia PDF Downloads 3171180 Recognition of Grocery Products in Images Captured by Cellular Phones
Authors: Farshideh Einsele, Hassan Foroosh
Abstract:
In this paper, we present a robust algorithm to recognize extracted text from grocery product images captured by mobile phone cameras. Recognition of such text is challenging since text in grocery product images varies in its size, orientation, style, illumination, and can suffer from perspective distortion. Pre-processing is performed to make the characters scale and rotation invariant. Since text degradations can not be appropriately defined using wellknown geometric transformations such as translation, rotation, affine transformation and shearing, we use the whole character black pixels as our feature vector. Classification is performed with minimum distance classifier using the maximum likelihood criterion, which delivers very promising Character Recognition Rate (CRR) of 89%. We achieve considerably higher Word Recognition Rate (WRR) of 99% when using lower level linguistic knowledge about product words during the recognition process.Keywords: camera-based OCR, feature extraction, document, image processing, grocery products
Procedia PDF Downloads 4071179 An Investigation of the University Council’s Image: A Case of Suan Sunandha Rajabhat University
Authors: Phitsanu Phunphetchphan
Abstract:
The purposes of this research was to investigate opinions of Rajabhat University staff towards performance of the university council committee by focusing on (1) personal characteristics of the committees; (2) duties designated by the university council; and (3) relationship between university council and staff. The population of this study included all high level of management from Suan Sunandha Rajabhat University which made a total of 200 respondents. Data analysis included frequency, percentage, mean and standard deviation. The findings revealed that the majority of staff rated the performance of university council at a high level. The 'overall appropriate qualification of the university council' was rated as the highest score while 'good governance' was rated as the lowest mean score. Moreover, the findings also revealed that the relationship between university council’s members and the staff was rated at a high level while 'the integrity of policy implementation' was rated as the lowest score.Keywords: investigation, performance, university council, management
Procedia PDF Downloads 2501178 Imaging Based On Bi-Static SAR Using GPS L5 Signal
Authors: Tahir Saleem, Mohammad Usman, Nadeem Khan
Abstract:
GPS signals are used for navigation and positioning purposes by a diverse set of users. However, this project intends to utilize the reflected GPS L5 signals for location of target in a region of interest by generating an image that highlights the positions of targets in the area of interest. The principle of bi-static radar is used to detect the targets or any movement or changes. The idea is confirmed by the results obtained during MATLAB simulations. A matched filter based technique is employed in the signal processing to improve the system resolution. The simulation is carried out under different conditions with moving receiver and targets. Noise and attenuation is also induced and atmospheric conditions that affect the direct and reflected GPS signals have been simulated to generate a more practical scenario. A realistic GPS L5 signal has been simulated, the simulation results verify that the detection and imaging of targets is possible by employing reflected GPS using L5 signals and matched filter processing technique with acceptable spatial resolution.Keywords: GPS, L5 Signal, SAR, spatial resolution
Procedia PDF Downloads 5361177 Voxel Models as Input for Heat Transfer Simulations with Siemens NX Based on X-Ray Microtomography Images of Random Fibre Reinforced Composites
Authors: Steven Latré, Frederik Desplentere, Ilya Straumit, Stepan V. Lomov
Abstract:
A method is proposed in order to create a three-dimensional finite element model representing fibre reinforced insulation materials for the simulation software Siemens NX. VoxTex software, a tool for quantification of µCT images of fibrous materials, is used for the transformation of microtomography images of random fibre reinforced composites into finite element models. An automatic tool was developed to execute the import of the models to the thermal solver module of Siemens NX. The paper describes the numerical tools used for the image quantification and the transformation and illustrates them on several thermal simulations of fibre reinforced insulation blankets filled with low thermal conductive fillers. The calculation of thermal conductivity is validated by comparison with the experimental data.Keywords: analysis, modelling, thermal, voxel
Procedia PDF Downloads 2881176 Fast Tumor Extraction Method Based on Nl-Means Filter and Expectation Maximization
Authors: Sandabad Sara, Sayd Tahri Yassine, Hammouch Ahmed
Abstract:
The development of science has allowed computer scientists to touch the medicine and bring aid to radiologists as we are presenting it in our article. Our work focuses on the detection and localization of tumors areas in the human brain; this will be a completely automatic without any human intervention. In front of the huge volume of MRI to be treated per day, the radiologist can spend hours and hours providing a tremendous effort. This burden has become less heavy with the automation of this step. In this article we present an automatic and effective tumor detection, this work consists of two steps: the first is the image filtering using the filter Nl-means, then applying the expectation maximization algorithm (EM) for retrieving the tumor mask from the brain MRI and extracting the tumor area using the mask obtained from the second step. To prove the effectiveness of this method multiple evaluation criteria will be used, so that we can compare our method to frequently extraction methods used in the literature.Keywords: MRI, Em algorithm, brain, tumor, Nl-means
Procedia PDF Downloads 3381175 Enhancing the Work of Art through Fashion Attire
Authors: A. N. Roslen, S. A. Syed-Sahil, A. Musavir
Abstract:
In Malaysia, there are only few fashion designers who are inspired by the work of artists when creating their collections. The researchers confirmed this statement by interviewing fashion experts in Malaysia. The objectives of this study are to: 1. Investigate the acceptance of fashion inspired by the work of art among consumers. 2. Encourage more designers to use work of art as their inspirations. 3. Promote Malaysian Artists through fashion. Thus, the researchers interviewed Malaysian fashion designers, image consultants, and one famous Malaysian Artist (Awang Damit). All of them had agreed that the fashion inspired by the work of art in Malaysia has a long way to go. Therefore, the researchers’ aim is to attract more fashion designers to use the work of local artists in their creations. The researchers had used interview, survey and experimentation as methods of this study. In the experimentation procedure, paintings of local artist, Awang Damit was used as a source of inspiration in creating a design Line. The result of this study had shown that fashion inspired by work of art is acknowledged and accepted by the designers and consumers.Keywords: art, fashion, inspiration, local artist
Procedia PDF Downloads 4611174 Studying the Role of Teachers’ Self-Acceptance in the Development of Their Self-Esteem and Efficacy Level: A Case Study Applied to 37 Teachers at the English Department, Sidi Bel Abbes, Algeria
Authors: Asmaa Baghli
Abstract:
Self-acceptance is one of the most pertinent notions that attracted the attention of many scholars. These latters believed that the sense of self-acceptance for people contributes in the emergence of their self-esteem and helps to improve their efficacy level. Simply defined, self-acceptance stands for the ability of the person to admire and accept herself and her potentials. This fact is believed to participate in the personal image creation depending on the qualities and features possessed. Hitherto, the following paper aims, first, to provide a brief and concise definition of self-acceptance, self-esteem and self-efficacy. It tries to explain the correlation between the three concepts along with its linkage to language teaching. Then, it examines teachers’ acceptance level and its influence on their classroom actions. For that purpose, the main methodology undertaken is the mixed method. That means the combination between both quantitative and qualitative research methods. The prime tools selected are a questionnaire and self-acceptance test for teachers. Finally, it suggests some techniques for developing teachers’ self-acceptance.Keywords: competence, development, efficacy, Self-acceptance, self-esteem, teachers
Procedia PDF Downloads 1431173 A TiO₂-Based Memristor Reliable for Neuromorphic Computing
Authors: X. S. Wu, H. Jia, P. H. Qian, Z. Zhang, H. L. Cai, F. M. Zhang
Abstract:
A bipolar resistance switching behaviour is detected for a Ti/TiO2-x/Au memristor device, which is fabricated by a masked designed magnetic sputtering. The current dependence of voltage indicates the curve changes slowly and continuously. When voltage pulses are applied to the device, the set and reset processes maintains linearity, which is used to simulate the synapses. We argue that the conduction mechanism of the device is from the oxygen vacancy channel model, and the resistance of the device change slowly due to the reaction between the titanium electrode and the intermediate layer and the existence of a large number of oxygen vacancies in the intermediate layer. Then, Hopfield neural network is constructed to simulate the behaviour of neural network in image processing, and the accuracy rate is more than 98%. This shows that titanium dioxide memristor has a broad application prospect in high performance neural network simulation.Keywords: memristor fabrication, neuromorphic computing, bionic synaptic application, TiO₂-based
Procedia PDF Downloads 911172 The Role of Social Media in the Rise of Islamic State in India: An Analytical Overview
Authors: Yasmeen Cheema, Parvinder Singh
Abstract:
The evolution of Islamic State (acronym IS) has an ultimate goal of restoring the caliphate. IS threat to the global security is main concern of international community but has also raised a factual concern for India about the regular radicalization of IS ideology among Indian youth. The incident of joining Arif Ejaz Majeed, an Indian as ‘jihadist’ in IS has set strident alarm in law & enforcement agencies. On 07.03.2017, many people were injured in an Improvised Explosive Device (IED) blast on-board of Bhopal Ujjain Express. One perpetrator of this incident was killed in encounter with police. But, the biggest shock is that the conspiracy was pre-planned and the assailants who carried out the blast were influenced by the ideology perpetrated by the Islamic State. This is the first time name of IS has cropped up in a terror attack in India. It is a red indicator of violent presence of IS in India, which is spreading through social media. The IS have the capacity to influence the younger Muslim generation in India through its brutal and aggressive propaganda videos, social media apps and hatred speeches. It is a well known fact that India is on the radar of IS, as well on its ‘Caliphate Map’. IS uses Twitter, Facebook and other social media platforms constantly. Islamic State has used enticing videos, graphics, and articles on social media and try to influence persons from India & globally that their jihad is worthy. According to arrested perpetrator of IS in different cases in India, the most of Indian youths are victims to the daydreams which are fondly shown by IS. The dreams that the Muslim empire as it was before 1920 can come back with all its power and also that the Caliph and its caliphate can be re-established are shown by the IS. Indian Muslim Youth gets attracted towards these euphemistic ideologies. Islamic State has used social media for disseminating its poisonous ideology, recruitment, operational activities and for future direction of attacks. IS through social media inspired its recruits & lone wolfs to continue to rely on local networks to identify targets and access weaponry and explosives. Recently, a pro-IS media group on its Telegram platform shows Taj Mahal as the target and suggested mode of attack as a Vehicle Born Improvised Explosive Attack (VBIED). Islamic State definitely has the potential to destroy the Indian national security & peace, if timely steps are not taken. No doubt, IS has used social media as a critical mechanism for recruitment, planning and executing of terror attacks. This paper will therefore examine the specific characteristics of social media that have made it such a successful weapon for Islamic State. The rise of IS in India should be viewed as a national crisis and handled at the central level with efficient use of modern technology.Keywords: ideology, India, Islamic State, national security, recruitment, social media, terror attack
Procedia PDF Downloads 2311171 A Method for Allocation of Smart Intersections Using Traffic Information
Authors: Sang-Tae Ji, Jeong-Woo Park, Jun-Ho Park, Kwang-Woo Nam
Abstract:
This study aims is to suggest the basic factors by considering the priority of intersection in the diffusion project of Smart intersection. Busan Metropolitan City is conducting a smart intersection project for efficient traffic management. The smart intersection project aims to make breakthrough improvement of the intersection congestion by optimizing the signal system using CCTV (closed-circuit television camera) image analysis technology. This study investigated trends of existing researches and analyzed by setting three things of traffic volume, characteristics of intersection road, and whether or not to conduct the main arterial road as factors for selecting new intersection when spreading smart intersection. Using this, we presented the priority of the newly installed intersection through the present situation and analysis for the Busan Metropolitan City which is the main destination of the spreading project of the smart intersection. The results of this study can be used as a consideration in the implementation of smart intersection business.Keywords: CCTV, GIS, ICT, Smart City, smart intersection
Procedia PDF Downloads 3881170 Livestock Activity Monitoring Using Movement Rate Based on Subtract Image
Authors: Keunho Park, Sunghwan Jeong
Abstract:
The 4th Industrial Revolution, the next-generation industrial revolution, which is made up of convergence of information and communication technology (ICT), is no exception to the livestock industry, and various studies are being conducted to apply the livestock smart farm. In order to monitor livestock using sensors, it is necessary to drill holes in the organs such as the nose, ears, and even the stomach of the livestock to wear or insert the sensor into the livestock. This increases the stress of livestock, which in turn lowers the quality of livestock products or raises the issue of animal ethics, which has become a major issue in recent years. In this paper, we conducted a study to monitor livestock activity based on vision technology, effectively monitoring livestock activity without increasing animal stress and violating animal ethics. The movement rate was calculated based on the difference images between the frames, and the livestock activity was evaluated. As a result, the average F1-score was 96.67.Keywords: barn monitoring, livestock, machine vision, smart farm
Procedia PDF Downloads 1251169 Efficient Ground Targets Detection Using Compressive Sensing in Ground-Based Synthetic-Aperture Radar (SAR) Images
Authors: Gherbi Nabil
Abstract:
Detection of ground targets in SAR radar images is an important area for radar information processing. In the literature, various algorithms have been discussed in this context. However, most of them are of low robustness and accuracy. To this end, we discuss target detection in SAR images based on compressive sensing. Firstly, traditional SAR image target detection algorithms are discussed, and their limitations are highlighted. Secondly, a compressive sensing method is proposed based on the sparsity of SAR images. Next, the detection problem is solved using Multiple Measurements Vector configuration. Furthermore, a robust Alternating Direction Method of Multipliers (ADMM) is developed to solve the optimization problem. Finally, the detection results obtained using raw complex data are presented. Experimental results on real SAR images have verified the effectiveness of the proposed algorithm.Keywords: compressive sensing, raw complex data, synthetic aperture radar, ADMM
Procedia PDF Downloads 231168 The Association between Attachment Styles, Satisfaction of Life, Alexithymia, and Psychological Resilience: The Mediational Role of Self-Esteem
Authors: Zahide Tepeli Temiz, Itir Tari Comert
Abstract:
Attachment patterns based on early emotional interactions between infant and primary caregiver continue to be influential in adult life, in terms of mental health and behaviors of individuals. Several studies reveal that infant-caregiver relationships have impressed the affect regulation, coping with stressful and negative situations, general satisfaction of life, and self image in adulthood, besides the attachment styles. The present study aims to examine the relationships between university students’ attachment style and their self-esteem, alexithymic features, satisfaction of life, and level of resilience. In line with this aim, the hypothesis of the prediction of attachment styles (anxious and avoidant) over life satisfaction, self-esteem, alexithymia, and psychological resilience was tested. Additionally, in this study Structural Equational Modeling was conducted to investigate the mediational role of self-esteem in the relationship between attachment styles and alexithymia, life satisfaction, and resilience. This model was examined with path analysis. The sample of the research consists of 425 university students who take education from several region of Turkey. The participants who sign the informed consent completed the Demographic Information Form, Experiences in Close Relationships-Revised, Rosenberg Self-Esteem Scale, The Satisfaction with Life Scale, Toronto Alexithymia Scale, and Resilience Scale for Adults. According to results, anxious, and avoidant dimensions of insecure attachment predicted the self-esteem score and alexithymia in positive direction. On the other hand, these dimensions of attachment predicted life satisfaction in negative direction. The results of linear regression analysis indicated that anxious and avoidant attachment styles didn’t predict the resilience. This result doesn’t support the theory and research indicating the relationship between attachment style and psychological resilience. The results of path analysis revealed the mediational role self esteem in the relation between anxious, and avoidant attachment styles and life satisfaction. In addition, SEM analysis indicated the indirect effect of attachment styles over alexithymia and resilience besides their direct effect. These findings support the hypothesis of this research relation to mediating role of self-esteem. Attachment theorists suggest that early attachment experiences, including supportive and responsive family interactions, have an effect on resilience to harmful situations in adult life, ability to identify, describe, and regulate emotions and also general satisfaction with life. Several studies examining the relationship between attachment styles and life satisfaction, alexithymia, and psychological resilience draw attention to mediational role of self-esteem. Results of this study support the theory of attachment patterns with the mediation of self-image influence the emotional, cognitive, and behavioral regulation of person throughout the adulthood. Therefore, it is thought that any intervention intended for recovery in attachment relationship will increase the self-esteem, life satisfaction, and resilience level, on the one side, decrease the alexithymic features, on the other side.Keywords: alexithymia, anxious attachment, avoidant attachment, life satisfaction, path analysis, resilience, self-esteem, structural equation
Procedia PDF Downloads 1981167 A Weighted Approach to Unconstrained Iris Recognition
Authors: Yao-Hong Tsai
Abstract:
This paper presents a weighted approach to unconstrained iris recognition. Nowadays, commercial systems are usually characterized by strong acquisition constraints based on the subject’s cooperation. However, it is not always achievable for real scenarios in our daily life. Researchers have been focused on reducing these constraints and maintaining the performance of the system by new techniques at the same time. With large variation in the environment, there are two main improvements to develop the proposed iris recognition system. For solving extremely uneven lighting condition, statistic based illumination normalization is first used on eye region to increase the accuracy of iris feature. The detection of the iris image is based on Adaboost algorithm. Secondly, the weighted approach is designed by Gaussian functions according to the distance to the center of the iris. Furthermore, local binary pattern (LBP) histogram is then applied to texture classification with the weight. Experiment showed that the proposed system provided users a more flexible and feasible way to interact with the verification system through iris recognition.Keywords: authentication, iris recognition, adaboost, local binary pattern
Procedia PDF Downloads 2261166 Automatic Facial Skin Segmentation Using Possibilistic C-Means Algorithm for Evaluation of Facial Surgeries
Authors: Elham Alaee, Mousa Shamsi, Hossein Ahmadi, Soroosh Nazem, Mohammad Hossein Sedaaghi
Abstract:
Human face has a fundamental role in the appearance of individuals. So the importance of facial surgeries is undeniable. Thus, there is a need for the appropriate and accurate facial skin segmentation in order to extract different features. Since Fuzzy C-Means (FCM) clustering algorithm doesn’t work appropriately for noisy images and outliers, in this paper we exploit Possibilistic C-Means (PCM) algorithm in order to segment the facial skin. For this purpose, first, we convert facial images from RGB to YCbCr color space. To evaluate performance of the proposed algorithm, the database of Sahand University of Technology, Tabriz, Iran was used. In order to have a better understanding from the proposed algorithm; FCM and Expectation-Maximization (EM) algorithms are also used for facial skin segmentation. The proposed method shows better results than the other segmentation methods. Results include misclassification error (0.032) and the region’s area error (0.045) for the proposed algorithm.Keywords: facial image, segmentation, PCM, FCM, skin error, facial surgery
Procedia PDF Downloads 5861165 A Comparative Assessment Method For Map Alignment Techniques
Authors: Rema Daher, Theodor Chakhachiro, Daniel Asmar
Abstract:
In the era of autonomous robot mapping, assessing the goodness of the generated maps is important, and is usually performed by aligning them to ground truth. Map alignment is difficult for two reasons: first, the query maps can be significantly distorted from ground truth, and second, establishing what constitutes ground truth for different settings is challenging. Most map alignment techniques to this date have addressed the first problem, while paying too little importance to the second. In this paper, we propose a benchmark dataset, which consists of synthetically transformed maps with their corresponding displacement fields. Furthermore, we propose a new system for comparison, where the displacement field of any map alignment technique can be computed and compared to the ground truth using statistical measures. The local information in displacement fields renders the evaluation system applicable to any alignment technique, whether it is linear or not. In our experiments, the proposed method was applied to different alignment methods from the literature, allowing for a comparative assessment between them all.Keywords: assessment methods, benchmark, image deformation, map alignment, robot mapping, robot motion
Procedia PDF Downloads 1241164 Main Chaos-Based Image Encryption Algorithm
Authors: Ibtissem Talbi
Abstract:
During the last decade, a variety of chaos-based cryptosystems have been investigated. Most of them are based on the structure of Fridrich, which is based on the traditional confusion-diffusion architecture proposed by Shannon. Compared with traditional cryptosystems (DES, 3DES, AES, etc.), the chaos-based cryptosystems are more flexible, more modular and easier to be implemented, which make them suitable for large scale-data encyption, such as images and videos. The heart of any chaos-based cryptosystem is the chaotic generator and so, a part of the efficiency (robustness, speed) of the system depends greatly on it. In this talk, we give an overview of the state of the art of chaos-based block ciphers and we describe some of our schemes already proposed. Also we will focus on the essential characteristics of the digital chaotic generator, The needed performance of a chaos-based block cipher in terms of security level and speed of calculus depends on the considered application. There is a compromise between the security and the speed of the calculation. The security of these block block ciphers will be analyzed.Keywords: chaos-based cryptosystems, chaotic generator, security analysis, structure of Fridrich
Procedia PDF Downloads 6881163 Identification of Healthy and BSR-Infected Oil Palm Trees Using Color Indices
Authors: Siti Khairunniza-Bejo, Yusnida Yusoff, Nik Salwani Nik Yusoff, Idris Abu Seman, Mohamad Izzuddin Anuar
Abstract:
Most of the oil palm plantations have been threatened by Basal Stem Rot (BSR) disease which causes serious economic impact. This study was conducted to identify the healthy and BSR-infected oil palm tree using thirteen color indices. Multispectral and thermal camera was used to capture 216 images of the leaves taken from frond number 1, 9 and 17. Indices of normalized difference vegetation index (NDVI), red (R), green (G), blue (B), near infrared (NIR), green – blue (GB), green/blue (G/B), green – red (GR), green/red (G/R), hue (H), saturation (S), intensity (I) and thermal index (T) were used. From this study, it can be concluded that G index taken from frond number 9 is the best index to differentiate between the healthy and BSR-infected oil palm trees. It not only gave high value of correlation coefficient (R=-0.962), but also high value of separation between healthy and BSR-infected oil palm tree. Furthermore, power and S model developed using G index gave the highest R2 value which is 0.985.Keywords: oil palm, image processing, disease, leaves
Procedia PDF Downloads 5021162 The Micro-Activated Organic Regeneration in Rural Construction: A Case Study of Yangdun Village in Deqing County, Zhejiang Province
Authors: Chengyuan Zhu, Zhu Wang
Abstract:
With the strategy of Rural Rejuvenation proposed in China, the rural has become the focus of all works today. In addition to the support of industry and policy, the rural planning and construction which is the space dependence of Rural Rejuvenation are also very crucial. Based on an analysis of the case of Yangdun Village in Deqing County, this paper summarizes village existing resources and construction status quo. It tries to illuminate the micro-activated organic renewal strategies and methods, based on ecological landscape, history context, industry development and living life requirements. It takes advantage of industrial linkage and then asks for the coordination of both spatial and industrial planning, the revival and remodeling of the rural image can be achieved through shaping the of architectural and landscape nodes as well as the activation of street space.Keywords: rural construction, rural human settlements, micro-activation, organic renewal
Procedia PDF Downloads 2321161 The Relationship between Religiosity, Childhood Attachment, and Childhood Trauma in Adulthood
Authors: Ashley Sainvil
Abstract:
The present study explores the relationship and possible effects of religiosity on both adverse childhood experiences and childhood attachment. Furthermore, to explore the idea that adult religiousness may play as a protective role, specifically protecting adults with a past of adverse childhood experiences and an insecure childhood attachment from reporting depression. Analyses are based on 57 participants (N= 57, 32.1% of ages 18-22; 70.2% female, 28.1% male, 1.8% other). In the form of an online Qualtrics survey through questionnaires, childhood attachment, adverse childhood experiences, sense of religiosity, and depression were measured. While not significant at conventional levels, there was no direct relationship between adverse childhood experiences, insecure childhood attachment, and sense of religiosity, and when assessing age for the relationship in later adulthood, there was no significance. Positive childhood experiences of feeling protected, love, and special had a direct relationship with a positive image and sense of closeness to God. Results highlight the importance of positive childhood experiences, secure childhood attachment quality relationship, such as trust, communication for positive health outcomes, such as less depression.Keywords: religiosity, childhood trauma, childhood attachment, depression
Procedia PDF Downloads 841160 Data Integration in a GIS Geographic Information System Mapping of Agriculture in Semi-Arid Region of Setif, Algeria
Authors: W. Riahi, M. L. Mansour
Abstract:
Using tools of data processing such as geographic information system (GIS) for the contribution of the space management becomes more and more frequent. It allows collecting and analyzing diverse natural information relative to the same territory. Space technologies play crucial role in agricultural phenomenon analysis. For this, satellite images treatment were used to classify vegetation density and particularly agricultural areas in Setif province by making recourse to the Normalized Difference Vegetation Index (NDVI). This step was completed by mapping agricultural activities of the province by using ArcGIS.10 software in order to display an overall view and to realize spatial analysis of various themes combined between them which are chosen according to their strategic importance in different thematic maps. The synthesis map elaborately showed that geographic information system can contribute significantly to agricultural management by describing potentialities and development opportunities of production systems and agricultural sectors.Keywords: GIS, satellite image, agriculture, NDVI, thematic map
Procedia PDF Downloads 4271159 Micro-CT Assessment of Fracture Healing in Androgen-Deficient Osteoporosis Model
Authors: Ahmad N. Shuid, Azri Jalil, Sabarul A. Mokhtar, Mohd F. Khamis, Norliza Muhammad
Abstract:
Micro-CT provides a 3-D image of fracture callus, which can be used to calculate quantitative parameters. In this study, micro-CT was used to assess the fracture healing of orchidectomised rats, an androgen-deficient osteoporosis model. The effect of testosterone (hormone replacement) on fracture healing was also assessed with micro-CT. The rats were grouped into orchidectomised-control (ORX), sham-operated (SHAM), and orchidectomised; and injected with testosterone intramuscularly once weekly (TEN). Treatment duration was six weeks. The fracture was induced and fixed with plates and screws in the right tibia of all the rats. An in vitro micro-CT was used to scan the fracture callus area which consisted of 100 axial slices above and below fracture line. The analysis has shown that micro-CT was able to detect a significant difference in the fracture healing rate of ORX and TEN groups. In conclusion, micro-CT can be used to assess fracture healing in androgen-deficient osteoporosis. This imaging tool can be used to test agents that influence fracture healing in the androgen-deficient model.Keywords: androgen, fracture, orchidectomy, osteoporosis
Procedia PDF Downloads 5451158 Event-Led Strategy for Cultural Tourism Development: The Case of Liverpool as the 2008 European Capital of Culture
Authors: Yi-De Liu
Abstract:
Cultural tourism is one of the largest and fastest growing global tourism markets and the cultures are increasingly being used to promote cities and to increase their competitiveness and attractiveness. One of the major forms of cultural tourism development undertaken throughout Europe has been the staging of a growing number of cultural events. The event of European Capitals of Culture (ECOC) is probably the best example of the new trends of cultural tourism in Europe, which is therefore used in this article to demonstrate some of the key issues surrounding the event-led strategy for cultural tourism development. Based on the experience of the 2008 ECOC Liverpool, UK, the study’s findings point to a number of ways in which the ECOC constitutes a boost for the development of cultural tourism in terms of realising experience economy, enhancing city image, facilitating urban regeneration, promoting cultural production and consumption, as well as establishing partnerships. This study is concluded by drawing some critical factors that event and tourism organisers should consider.Keywords: cultural tourism, event tourism, cultural event, European capital of culture, Liverpool
Procedia PDF Downloads 708