Search results for: cover image
1992 The Application of Video Segmentation Methods for the Purpose of Action Detection in Videos
Authors: Nassima Noufail, Sara Bouhali
Abstract:
In this work, we develop a semi-supervised solution for the purpose of action detection in videos and propose an efficient algorithm for video segmentation. The approach is divided into video segmentation, feature extraction, and classification. In the first part, a video is segmented into clips, and we used the K-means algorithm for this segmentation; our goal is to find groups based on similarity in the video. The application of k-means clustering into all the frames is time-consuming; therefore, we started by the identification of transition frames where the scene in the video changes significantly, and then we applied K-means clustering into these transition frames. We used two image filters, the gaussian filter and the Laplacian of Gaussian. Each filter extracts a set of features from the frames. The Gaussian filter blurs the image and omits the higher frequencies, and the Laplacian of gaussian detects regions of rapid intensity changes; we then used this vector of filter responses as an input to our k-means algorithm. The output is a set of cluster centers. Each video frame pixel is then mapped to the nearest cluster center and painted with a corresponding color to form a visual map. The resulting visual map had similar pixels grouped. We then computed a cluster score indicating how clusters are near each other and plotted a signal representing frame number vs. clustering score. Our hypothesis was that the evolution of the signal would not change if semantically related events were happening in the scene. We marked the breakpoints at which the root mean square level of the signal changes significantly, and each breakpoint is an indication of the beginning of a new video segment. In the second part, for each segment from part 1, we randomly selected a 16-frame clip, then we extracted spatiotemporal features using convolutional 3D network C3D for every 16 frames using a pre-trained model. The C3D final output is a 512-feature vector dimension; hence we used principal component analysis (PCA) for dimensionality reduction. The final part is the classification. The C3D feature vectors are used as input to a multi-class linear support vector machine (SVM) for the training model, and we used a multi-classifier to detect the action. We evaluated our experiment on the UCF101 dataset, which consists of 101 human action categories, and we achieved an accuracy that outperforms the state of art by 1.2%.Keywords: video segmentation, action detection, classification, Kmeans, C3D
Procedia PDF Downloads 801991 PatchMix: Learning Transferable Semi-Supervised Representation by Predicting Patches
Authors: Arpit Rai
Abstract:
In this work, we propose PatchMix, a semi-supervised method for pre-training visual representations. PatchMix mixes patches of two images and then solves an auxiliary task of predicting the label of each patch in the mixed image. Our experiments on the CIFAR-10, 100 and the SVHN dataset show that the representations learned by this method encodes useful information for transfer to new tasks and outperform the baseline Residual Network encoders by on CIFAR 10 by 12% on ResNet 101 and 2% on ResNet-56, by 4% on CIFAR-100 on ResNet101 and by 6% on SVHN dataset on the ResNet-101 baseline model.Keywords: self-supervised learning, representation learning, computer vision, generalization
Procedia PDF Downloads 911990 Non-Singular Gravitational Collapse of a Homogeneous Scalar Field in Deformed Phase Space
Authors: Amir Hadi Ziaie
Abstract:
In the present work, we revisit the collapse process of a spherically symmetric homogeneous scalar field (in FRW background) minimally coupled to gravity, when the phase-space deformations are taken into account. Such a deformation is mathematically introduced as a particular type of noncommutativity between the canonical momenta of the scale factor and of the scalar field. In the absence of such deformation, the collapse culminates in a spacetime singularity. However, when the phase-space is deformed, we find that the singularity is removed by a non-singular bounce, beyond which the collapsing cloud re-expands to infinity. More precisely, for negative values of the deformation parameter, we identify the appearance of a negative pressure, which decelerates the collapse to finally avoid the singularity formation. While in the un-deformed case, the horizon curve monotonically decreases to finally cover the singularity, in the deformed case the horizon has a minimum value that this value depends on deformation parameter and initial configuration of the collapse. Such a setting predicts a threshold mass for black hole formation in stellar collapse and manifests the role of non-commutative geometry in physics and especially in stellar collapse and supernova explosion.Keywords: gravitational collapse, non-commutative geometry, spacetime singularity, black hole physics
Procedia PDF Downloads 3481989 A Lifetime-Enhancing Monitoring Node Distribution Using Minimum Spanning Tree in Mobile Ad Hoc Networks
Authors: Sungchul Ha, Hyunwoo Kim
Abstract:
In mobile ad hoc networks, all nodes in a network only have limited resources and calculation ability. Therefore communication topology which have long lifetime is good for all nodes in mobile ad hoc networks. There are a variety of researches on security problems in wireless ad hoc networks. The existing many researches try to make efficient security schemes to reduce network power consumption and enhance network lifetime. Because a new node can join the network at any time, the wireless ad hoc networks are exposed to various threats and can be destroyed by attacks. Resource consumption is absolutely necessary to secure networks, but more resource consumption can be a critical problem to network lifetime. This paper focuses on efficient monitoring node distribution to enhance network lifetime in wireless ad hoc networks. Since the wireless ad hoc networks cannot use centralized infrastructure and security systems of wired networks, a new special IDS scheme is necessary. The scheme should not only cover all nodes in a network but also enhance the network lifetime. In this paper, we propose an efficient IDS node distribution scheme using minimum spanning tree (MST) method. The simulation results show that the proposed algorithm has superior performance in comparison with existing algorithms.Keywords: MANETs, IDS, power control, minimum spanning tree
Procedia PDF Downloads 3751988 Implementation of Invisible Digital Watermarking
Authors: V. Monisha, D. Sindhuja, M. Sowmiya
Abstract:
Over the decade, the applications about multimedia have been developed rapidly. The advancement in the communication field at the faster pace, it is necessary to protect the data during transmission. Thus, security of multimedia contents becomes a vital issue, and it is a need for protecting the digital content against malfunctions. Digital watermarking becomes the solution for the copyright protection and authentication of data in the network. In multimedia applications, embedded watermarks should be robust, and imperceptible. For improving robustness, the discrete wavelet transform is used. Both encoding and extraction algorithm can be done using MATLAB R2012a. In this Discrete wavelet transform (DWT) domain of digital image, watermarking algorithm is used, and hardware implementation can be done on Xilinx based FPGA.Keywords: digital watermarking, DWT, robustness, FPGA
Procedia PDF Downloads 4161987 An Approach to Consumption of Exhaustible Resources Based on Islamic Justice and Hartwick Criteria
Authors: Hamed Najafi, Ghasem Nikjou
Abstract:
Nowadays, there is an increasing attention to the resources scarcity issues. Because of failure in present patterns in the field of the allocation of exhaustible resources between generations and the challenges related to economic justice supply, it is supposed, to present a pattern from the Islamic perspective in this essay. By using content analysis of religious texts, we conclude that governments should remove the gap which is exists between the per capita income of the poor and their minimum consumption (necessary consumption). In order to preserve the exhaustible resources for poor people) not for all), between all generations, government should invest exhaustible resources on endless resources according to Hartwick’s criteria and should spend these benefits for poor people. But, if benefits did not cover the gap between minimum consumption and per capita income of poor levels in one generation, in this case, the government is responsible for covering this gap through the direct consumption of exhaustible resources. For an exact answer to this question, ‘how much of exhaustible resources should expense to maintain justice between generations?’ The theoretical and mathematical modeling has been used and proper function has been provided. The consumption pattern is presented for economic policy makers in Muslim countries, and non-Muslim even, it can be useful.Keywords: exhaustible resources, Islamic justice, intergenerational justice, distribution of resources, Hartwick criteria
Procedia PDF Downloads 1921986 Impact of Construction Risk Factors into Actual Construction Price in PPP Projects
Authors: Saleh Alzahrani, Halim Boussabaine
Abstract:
The majority of Public Private Partnership (PPP) are developed based on the rationale that the design, construction, operation, and financing of a public project is to be awarded to a private party within a single contractual framework. PPP project risks normally include the development and construction of a new asset as well as its operation for decades. Undoubtedly the most serious consequences of risks during the construction period are price and time overruns. These events are amongst the most broadly used scenarios in value for money analysis risks. The sources of risk change over the life cycle of a PPP project. In traditional procurement, the public sector normally has to cover all price distress from these risks. At least there is plenty evidence to suggest that price distress is a norm in some of the projects that are delivered under traditional procurement. This paper will find the impact of construction risk factors into actual construction price into PPP projects. The paper will present a brief literature review on PPP risk pricing strategies, and then using system dynamics (SD) to analyses of the risks associated with the estimated project price. Based on the finding from these analyses a risk pricing association model is presented and discussed. The paper concludes with thoughts for future research.Keywords: Public Private Partnership (PPP), Risk, Risk Pricing, System Dynamics (SD), construction price
Procedia PDF Downloads 5681985 Trajectory Design and Power Allocation for Energy -Efficient UAV Communication Based on Deep Reinforcement Learning
Authors: Yuling Cui, Danhao Deng, Chaowei Wang, Weidong Wang
Abstract:
In recent years, unmanned aerial vehicles (UAVs) have been widely used in wireless communication, attracting more and more attention from researchers. UAVs can not only serve as a relay for auxiliary communication but also serve as an aerial base station for ground users (GUs). However, limited energy means that they cannot work all the time and cover a limited range of services. In this paper, we investigate 2D UAV trajectory design and power allocation in order to maximize the UAV's service time and downlink throughput. Based on deep reinforcement learning, we propose a depth deterministic strategy gradient algorithm for trajectory design and power distribution (TDPA-DDPG) to solve the energy-efficient and communication service quality problem. The simulation results show that TDPA-DDPG can extend the service time of UAV as much as possible, improve the communication service quality, and realize the maximization of downlink throughput, which is significantly improved compared with existing methods.Keywords: UAV trajectory design, power allocation, energy efficient, downlink throughput, deep reinforcement learning, DDPG
Procedia PDF Downloads 1521984 A New Scheme for Chain Code Normalization in Arabic and Farsi Scripts
Authors: Reza Shakoori
Abstract:
This paper presents a structural correction of Arabic and Persian strokes using manipulation of their chain codes in order to improve the rate and performance of Persian and Arabic handwritten word recognition systems. It collects pure and effective features to represent a character with one consolidated feature vector and reduces variations in order to decrease the number of training samples and increase the chance of successful classification. Our results also show that how the proposed approaches can simplify classification and consequently recognition by reducing variations and possible noises on the chain code by keeping orientation of characters and their backbone structures.Keywords: Arabic, chain code normalization, OCR systems, image processing
Procedia PDF Downloads 4061983 Comparing Two Unmanned Aerial Systems in Determining Elevation at the Field Scale
Authors: Brock Buckingham, Zhe Lin, Wenxuan Guo
Abstract:
Accurate elevation data is critical in deriving topographic attributes for the precision management of crop inputs, especially water and nutrients. Traditional ground-based elevation data acquisition is time consuming, labor intensive, and often inconvenient at the field scale. Various unmanned aerial systems (UAS) provide the capability of generating digital elevation data from high-resolution images. The objective of this study was to compare the performance of two UAS with different global positioning system (GPS) receivers in determining elevation at the field scale. A DJI Phantom 4 Pro and a DJI Phantom 4 RTK(real-time kinematic) were applied to acquire images at three heights, including 40m, 80m, and 120m above ground. Forty ground control panels were placed in the field, and their geographic coordinates were determined using an RTK GPS survey unit. For each image acquisition using a UAS at a particular height, two elevation datasets were generated using the Pix4D stitching software: a calibrated dataset using the surveyed coordinates of the ground control panels and an uncalibrated dataset without using the surveyed coordinates of the ground control panels. Elevation values for each panel derived from the elevation model of each dataset were compared to the corresponding coordinates of the ground control panels. The coefficient of the determination (R²) and the root mean squared error (RMSE) were used as evaluation metrics to assess the performance of each image acquisition scenario. RMSE values for the uncalibrated elevation dataset were 26.613 m, 31.141 m, and 25.135 m for images acquired at 120 m, 80 m, and 40 m, respectively, using the Phantom 4 Pro UAS. With calibration for the same UAS, the accuracies were significantly improved with RMSE values of 0.161 m, 0.165, and 0.030 m, respectively. The best results showed an RMSE of 0.032 m and an R² of 0.998 for calibrated dataset generated using the Phantom 4 RTK UAS at 40m height. The accuracy of elevation determination decreased as the flight height increased for both UAS, with RMSE values greater than 0.160 m for the datasets acquired at 80 m and 160 m. The results of this study show that calibration with ground control panels improves the accuracy of elevation determination, especially for the UAS with a regular GPS receiver. The Phantom 4 Pro provides accurate elevation data with substantial surveyed ground control panels for the 40 m dataset. The Phantom 4 Pro RTK UAS provides accurate elevation at 40 m without calibration for practical precision agriculture applications. This study provides valuable information on selecting appropriate UAS and flight heights in determining elevation for precision agriculture applications.Keywords: unmanned aerial system, elevation, precision agriculture, real-time kinematic (RTK)
Procedia PDF Downloads 1661982 Molecular Detection and Isolation of Benzimidazole Resistant Haemonchus contortus from Pakistan
Authors: K. Ali, M. F. Qamar, M. A. Zaman, M. Younus, I. Khan, S. Ehtisham-ul-Haque, R. Tamkeen, M. I. Rashid, Q. Ali
Abstract:
This study centers on molecular identification of Haemonchus contortus and isolation of Benz-imidazoles (BZ) resistant strains. Different abattoirs’ of two geographic regions of Punjab (Pakistan) were frequently visited for the collection of worms. Out of 1500 (n=1500) samples that were morphologically confirmed as H. contortus, 30 worms were subjected to molecular procedures for isolation of resistant strains. Resistant worms (n=8) were further subjected to DNA gene sequencing. Bio edit sequence alignment editor software was used to detect the possible mutation, deletion, replacement of nucleotides. Genetic diversity was noticed and genetic variation existing in β-tubulin isotype 1 of the H. contortus population of small ruminants of different regions considered in this study. H. contortus showed three different type of genetic sequences. 75%, 37.5%, 25% and 12.5% of the studied samples showed 100% query cover and identity with isolates and clones of China, UK, Australia and other countries, respectively. Interestingly the neighbor countries such as India and Iran haven’t many similarities with the Pakistani isolates. Thus, it suggests that population density of same genetic makeup H. contortus is scattered worldwide rather than clustering in a single region.Keywords: Haemonchus contortus, Benzimidazole resistant, β-tubulin-1 gene, abattoirs
Procedia PDF Downloads 1791981 Brain Age Prediction Based on Brain Magnetic Resonance Imaging by 3D Convolutional Neural Network
Authors: Leila Keshavarz Afshar, Hedieh Sajedi
Abstract:
Estimation of biological brain age from MR images is a topic that has been much addressed in recent years due to the importance it attaches to early diagnosis of diseases such as Alzheimer's. In this paper, we use a 3D Convolutional Neural Network (CNN) to provide a method for estimating the biological age of the brain. The 3D-CNN model is trained by MRI data that has been normalized. In addition, to reduce computation while saving overall performance, some effectual slices are selected for age estimation. By this method, the biological age of individuals using selected normalized data was estimated with Mean Absolute Error (MAE) of 4.82 years.Keywords: brain age estimation, biological age, 3D-CNN, deep learning, T1-weighted image, SPM, preprocessing, MRI, canny, gray matter
Procedia PDF Downloads 1501980 Review of the Anatomy of the Middle Cerebral Artery and Its Anomalies
Authors: Karen Cilliers, Benedict John Page
Abstract:
The middle cerebral artery (MCA) is the most complex cerebral artery although few anomalies are found compared to the other cerebral arteries. The branches of the MCA cover a large part of each hemisphere, therefore it is exposed in various operations. Although the segments of the MCA are similarly described by most authors, there is some disagreement on the branching pattern of the MCA. The aim of this study was to review the available literature on the anatomy and variations of the MCA, and to compare this to a pilot study. For the pilot study, 20 hemispheres were perfused with coloured silicone and the MCA was dissected. According to the literature, the two most common branching configurations are the bifurcating and trifurcating patterns. In the pilot study, bifurcation was observed in 19 hemispheres, and in one hemisphere there was no branching (monofurcation). No trifurcation was observed. The most commonly duplicated branch was the anterior parietal artery in 30%, and most commonly absent was the common temporal artery in 65% and the temporal polar artery in 40%. Very few studies describe the origins of the branches of the MCA, therefore a detailed description is given. Middle cerebral artery variations that are occasionally reported in the literature include fenestration, and a duplicated or accessory MCA, although no variations were observed in the pilot study. Aneurysms can frequently be observed at the branching of cerebral vessels, therefore a thorough knowledge of the vascular anatomy is vital. Furthermore, knowledge of possible variations is important since variations can have serious clinical implications.Keywords: anatomy, anomaly, description, middle cerebral artery, origin, variation
Procedia PDF Downloads 3491979 The Strategy of Orbit Avoidance for Optical Remote Sensing Satellite
Authors: Dianxun Zheng, Wuxing Jing, Lin Hetong
Abstract:
Optical remote sensing satellite, always running on the Sun-synchronous orbit, equipped laser warning equipment to alert CCD camera from laser attack. There have three ways to protect the CCD camera, closing the camera cover satellite attitude maneuver and satellite orbit avoidance. In order to enhance the safety of optical remote sensing satellite in orbit, this paper explores the strategy of satellite avoidance. The avoidance strategy is expressed as the evasion of pre-determined target points in the orbital coordinates of virtual satellite. The so-called virtual satellite is a passive vehicle which superposes a satellite at the initial stage of avoidance. The target points share the consistent cycle time and the same semi-major axis with the virtual satellite, which ensures the properties of the Sun-synchronous orbit remain unchanged. Moreover, to further strengthen the avoidance capability of satellite, it can perform multi-object avoid maneuvers. On occasions of fulfilling the orbit tasks of the satellite, the orbit can be restored back to virtual satellite through orbit maneuvers. There into, the avoid maneuvers adopts pulse guidance. and the fuel consumption is also optimized. The avoidance strategy discussed in this article is applicable to avoidance for optical remote sensing satellite when encounter the laser hostile attacks.Keywords: optical remote sensing satellite, always running on the sun-synchronous
Procedia PDF Downloads 4031978 Comparing the Gap Formation around Composite Restorations in Three Regions of Tooth Using Optical Coherence Tomography (OCT)
Authors: Rima Zakzouk, Yasushi Shimada, Yuan Zhou, Yasunori Sumi, Junji Tagami
Abstract:
Background and Purpose: Swept source optical coherence tomography (OCT) is an interferometric imaging technique that has been recently used in cariology. In spite of progress made in adhesive dentistry, the composite restoration has been failing due to secondary caries which occur due to environmental factors in oral cavities. Therefore, a precise assessment to effective marginal sealing of restoration is highly required. The aim of this study was evaluating gap formation at composite/cavity walls interface with or without phosphoric acid etching using SS-OCT. Materials and Methods: Round tapered cavities (2×2 mm) were prepared in three locations, mid-coronal, cervical, and root of bovine incisors teeth in two groups (SE and PA Groups). While self-etching adhesive (Clearfil SE Bond) was applied for the both groups, Group PA had been already pretreated with phosphoric acid etching (K-Etchant gel). Subsequently, both groups were restored by Estelite Flow Quick Flowable Composite Resin. Following 5000 thermal cycles, three cross-sectionals were obtained from each cavity using OCT at 1310-nm wavelength at 0°, 60°, 120° degrees. Scanning was repeated after two months to monitor the gap progress. Then the average percentage of gap length was calculated using image analysis software, and the difference of mean between both groups was statistically analyzed by t-test. Subsequently, the results were confirmed by sectioning and observing representative specimens under Confocal Laser Scanning Microscope (CLSM). Results: The results showed that pretreatment with phosphoric acid etching, Group PA, led to significantly bigger gaps in mid-coronal and cervical compared to SE group, while in the root cavity no significant difference was observed between both groups. On the other hand, the gaps formed in root’s cavities were significantly bigger than those in mid-coronal and cervical within the same group. This study investigated the effect of phosphoric acid on gap length progress on the composite restorations. In conclusions, phosphoric acid etching treatment did not reduce the gap formation even in different regions of the tooth. Significance: The cervical region of tooth was more exposing to gap formation than mid-coronal region, especially when we added pre-etching treatment.Keywords: image analysis, optical coherence tomography, phosphoric acid etching, self-etch adhesives
Procedia PDF Downloads 2231977 Analysis of the Effect of Food Veils on the Preservation of Button and Oyster Mushrooms, Case Study: Zein Corn Coating
Authors: Mohamad Javad Shakouri, Hamid Tavakkolipour, Mahdis Jamshidi Tehranian
Abstract:
The inclination toward using food coatings is increasing daily, due to containing natural elements and not producing environmental pollution. Food coatings are uniform and thin layers of natural substances that cover the food product and act as a barrier against moisture, oxygen, and substances dissolved in food. Using food coatings on fruits and vegetables can delay water dissipation, losing aroma, decolorization, and improve the appearance of the product, and in general, preserve and protect the quality of fresh produce. When fruits and vegetables grow, they are equipped with a natural shield, called cuticle– a layer of wax. Washing the products, after harvest, the cuticle – this protective coating – is removed. In order to replace the cuticle, we can use an edible protective coating. This coating delays dehydration and deterioration and hence increases the life of the product while keeping its moisture. In this study, it was concluded that using food coatings, such as corn zein, carrageenan, and starch can have a substantial effect on the quantitative and qualitative preservation of food products, such as fruits, vegetables, and mushrooms.Keywords: food coating, corn zein, button and oyster mushrooms, ascorbic and citric acids
Procedia PDF Downloads 3001976 From Waste to Wealth: A Future Paradigm for Plastic Management Using Blockchain Technology
Authors: Jim Shi, Jasmine Chang, Nesreen El-Rayes
Abstract:
The world has been experiencing a steadily increasing trend in both the production and consumption of plastic. The global consumer revolution should not have been possible without plastic, thanks to its salient feature of inexpensiveness and durability. But, as a two-edged sword, its durable quality has returned to haunt and even jeopardized us. That exacerbating the plastic crisis has attracted various global initiatives and actions. Simultaneously, firms are eager to adopt new technology as they witness and perceive more potential and merit of Industry 4.0 technologies. For example, Blockchain technology (BCT) is drawing the attention of numerous stakeholders because of its wide range of outstanding features that promise to enhance supply chain operations. However, from a research perspective, most of the literature addresses the plastic crisis from either environmental or social perspectives. In contrast, analysis from the data science perspective and technology is relatively scarce. To this end, this study aims to fill this gap and cover the plastic crisis from a holistic view of environmental, social, technological, and business perspectives. In particular, we propose a mathematical model to examine the inclusion of BCT to enhance and improve the efficiency on the upstream and the downstream sides of the plastic value, where the whole value chain is coordinated systematically, and its interoperability can be optimized. Consequently, the Environmental, Social, and Governance (ESG) goal and Circular Economics (CE) sustainability can be maximized.Keywords: blockchain technology, plastic, circular economy, sustainability
Procedia PDF Downloads 831975 Hydrocarbon New Business Opportunities in the Bida Basin of Central Nigeria: Prospect and Challenges
Authors: N. G. Obaje, S. I. Ibrahim, N. Dadi-Mamud, M. K. Musa, I. Yusuf
Abstract:
An integrated study combining geological prospectivity mapping and geophysical aeromagnetic interpretation was carried out to determine hydrocarbon new business opportunities that may exist in the Bida Basin of Central Nigeria. Geological mapping was used to delineate the geological boundaries between the formations which is a significant initial criterion in evaluating hydrocarbon prospectivity. Processed and interpreted geophysical aeromagnetic data over the basin juxtaposed against the geological map has led to ranking of the prospectivity as less prospective, prospective and more prospective. The prospective and more prospective areas constitute new hydrocarbon business opportunities in the basin. The more prospective areas are at Pattishabakolo near Bida and at Kandi near Gulu. Prospective areas cover Badegi, Lemu, Duba, Kutigi, Auna, Mashegu and Mokwa. Geochemical data show that hydrocarbon source rocks exist within the Enagi and Patti formations in the northern and southern sections respectively. The geophysical aeromagnetic data indicates depths of more than 2,000m (> 2 Km) within the identified prospective areas. New business opportunities as used here refer to open acreages in Nigeria’s sedimentary basins that have not been licensed out by the government (Department of Petroleum Resources) to any operator but with significant potentials for commercial hydrocarbon accumulation.Keywords: hydrocarbon, aeromagnetic, business opportunity, Bida Basin
Procedia PDF Downloads 2751974 Runoff Estimation Using NRCS-CN Method
Authors: E. K. Naseela, B. M. Dodamani, Chaithra Chandran
Abstract:
The GIS and remote sensing techniques facilitate accurate estimation of surface runoff from watershed. In the present study an attempt has been made to evaluate the applicability of Natural Resources Service Curve Number method using GIS and Remote sensing technique in the upper Krishna basin (69,425 Sq.km). Landsat 7 (with resolution 30 m) satellite data for the year 2012 has been used for the preparation of land use land cover (LU/LC) map. The hydrologic soil group is mapped using GIS platform. The weighted curve numbers (CN) for all the 5 subcatchments calculated on the basis of LU/LC type and hydrologic soil class in the area by considering antecedent moisture condition. Monthly rainfall data was available for 58 raingauge stations. Overlay technique is adopted for generating weighted curve number. Results of the study show that land use changes determined from satellite images are useful in studying the runoff response of the basin. The results showed that there is no significant difference between observed and estimated runoff depths. For each subcatchment, statistically positive correlations were detected between observed and estimated runoff depth (0.61973 Engineering Seismological Studies in and around Zagazig City, Sharkia, Egypt
Authors: M. El-Eraki, A. A. Mohamed, A. A. El-Kenawy, M. S. Toni, S. I. Mustafa
Abstract:
The aim of this paper is to study the ground vibrations using Nakamura technique to evaluate the relation between the ground conditions and the earthquake characteristics. Microtremor measurements were carried out at 55 sites in and around Zagazig city. The signals were processed using horizontal to vertical spectral ratio (HVSR) technique to estimate the fundamental frequencies of the soil deposits and its corresponding H/V amplitude. Seismic measurements were acquired at nine sites for recording the surface waves. The recorded waveforms were processed using the multi-channel analysis of surface waves (MASW) method to infer the shear wave velocity profile. The obtained fundamental frequencies were found to be ranging from 0.7 to 1.7 Hz and the maximum H/V amplitude reached 6.4. These results together with the average shear wave velocity in the surface layers were used for the estimation of the thickness of the upper most soft cover layers (depth to bedrock). The sediment thickness generally increases at the northeastern and southwestern parts of the area, which is in good agreement with the local geological structure. The results of this work showed the zones of higher potential damage in the event of an earthquake in the study area.Keywords: ambient vibrations, fundamental frequency, surface waves, zagazig
Procedia PDF Downloads 2841972 Juniperus thurefera Multiplication Tests by Cauttigs in Aures, Algeria
Authors: N. Khater, S. A. Menina, H. Benbouza
Abstract:
Juniperus thurefera is an endemic cupressacée constitutes a forest cover in the mountains of Aures (Algeria). It is a heritage and important ecological richness but continues to decline, highly endangered species in danger of extinction, these populations show significant originality due to climatic conditions of the environment, because of its strength and extraordinary vitality, made a powerful but fragile and unique ecosystem in which natural regeneration by seed is almost absent in Algeria. Because of the quality of seeds that are either dormant or affected at the tree and the ground level by a large number of pests and parasites, which will lead to the total disappearance of this species and consequently leading to the biodiversity. View the ecological and socio- economic interest presented by this case, it deserves to be preserved and produced in large quantities in this respect. The present work aims to try to regenerate the Juniperus thurefera via vegetative propagation. We studied the potential of cuttings to form adventitious roots and buds. Cuttings were taken from young subjects from 5 to 20 years treated with indole butyric acid (AIB) and planted out-inside perlite under atomizer whose temperature and light are controlled. Results indicated that the percentage of developing buds on cuttings is better than the rooting ones.Keywords: Juniperus thurefera, indole butyric acid, cutting, buds, rooting
Procedia PDF Downloads 2741971 Standardizing and Achieving Protocol Objectives for ChestWall Radiotherapy Treatment Planning Process using an O-ring Linac in High-, Low- and Middle-income Countries
Authors: Milton Ixquiac, Erick Montenegro, Francisco Reynoso, Matthew Schmidt, Thomas Mazur, Tianyu Zhao, Hiram Gay, Geoffrey Hugo, Lauren Henke, Jeff Michael Michalski, Angel Velarde, Vicky de Falla, Franky Reyes, Osmar Hernandez, Edgar Aparicio Ruiz, Baozhou Sun
Abstract:
Purpose: Radiotherapy departments in low- and middle-income countries (LMICs) like Guatemala have recently introduced intensity-modulated radiotherapy (IMRT). IMRT has become the standard of care in high-income countries (HIC) due to reduced toxicity and improved outcomes in some cancers. The purpose of this work is to show the agreement between the dosimetric results shown in the Dose Volume Histograms (DVH) to the objectives proposed in the adopted protocol. This is the initial experience with an O-ring Linac. Methods and Materials: An O-Linac Linac was installed at our clinic in Guatemala in 2019 and has been used to treat approximately 90 patients daily with IMRT. This Linac is a completely Image Guided Device since to deliver each radiotherapy session must take a Mega Voltage Cone Beam Computerized Tomography (MVCBCT). In each MVCBCT, the Linac deliver 9 UM, and they are taken into account while performing the planning. To start the standardization, the TG263 was employed in the nomenclature and adopted a hypofractionated protocol to treat ChestWall, including supraclavicular nodes achieving 40.05Gy in 15 fractions. The planning was developed using 4 semiarcs from 179-305 degrees. The planner must create optimization volumes for targets and Organs at Risk (OARs); the difficulty for the planner was the dose base due to the MVCBCT. To evaluate the planning modality, we used 30 chestwall cases. Results: The plans created manually achieve the protocol objectives. The protocol objectives are the same as the RTOG1005, and the DHV curves look clinically acceptable. Conclusions: Despite the O-ring Linac doesn´t have the capacity to obtain kv images, the cone beam CT was created using MV energy, the dose delivered by the daily image setup process still without affect the dosimetric quality of the plans, and the dose distribution is acceptable achieving the protocol objectives.Keywords: hypofrationation, VMAT, chestwall, radiotherapy planning
Procedia PDF Downloads 1201970 Validating Thermal Performance of Existing Wall Assemblies Using In-Situ Measurements
Authors: Shibei Huang
Abstract:
In deep energy retrofits, the thermal performance of existing building envelopes is often difficult to determine with a high level of accuracy. For older buildings, the records of existing assemblies are often incomplete or inaccurate. To obtain greater baseline performance accuracy for energy models, in-field measurement tools can be used to obtain data on the thermal performance of the existing assemblies. For a known assembly, these field measurements assist in validating the U-factor estimates. If the field-measured U-factor consistently varies from the calculated prediction, those measurements prompt further study. For an unknown assembly, successful field measurements can provide approximate U-factor evaluation, validate assumptions, or identify anomalies requiring further investigation. Using case studies, this presentation will focus on the non-destructive methods utilizing a set of various field tools to validate the baseline U-factors for a range of existing buildings with various wall assemblies. The lessons learned cover what can be achieved, the limitations of these approaches and tools, and ideas for improving the validity of measurements. Key factors include the weather conditions, the interior conditions, the thermal mass of the measured assemblies, and the thermal profiles of the assemblies in question.Keywords: existing building, sensor, thermal analysis, retrofit
Procedia PDF Downloads 681969 Enhanced Face Recognition with Daisy Descriptors Using 1BT Based Registration
Authors: Sevil Igit, Merve Meric, Sarp Erturk
Abstract:
In this paper, it is proposed to improve Daisy descriptor based face recognition using a novel One-Bit Transform (1BT) based pre-registration approach. The 1BT based pre-registration procedure is fast and has low computational complexity. It is shown that the face recognition accuracy is improved with the proposed approach. The proposed approach can facilitate highly accurate face recognition using DAISY descriptor with simple matching and thereby facilitate a low-complexity approach.Keywords: face recognition, Daisy descriptor, One-Bit Transform, image registration
Procedia PDF Downloads 3701968 A Fast, Reliable Technique for Face Recognition Based on Hidden Markov Model
Authors: Sameh Abaza, Mohamed Ibrahim, Tarek Mahmoud
Abstract:
Due to the development in the digital image processing, its wide use in many applications such as medical, security, and others, the need for more accurate techniques that are reliable, fast and robust is vehemently demanded. In the field of security, in particular, speed is of the essence. In this paper, a pattern recognition technique that is based on the use of Hidden Markov Model (HMM), K-means and the Sobel operator method is developed. The proposed technique is proved to be fast with respect to some other techniques that are investigated for comparison. Moreover, it shows its capability of recognizing the normal face (center part) as well as face boundary.Keywords: HMM, K-Means, Sobel, accuracy, face recognition
Procedia PDF Downloads 3361967 Meitu and the Case of the AI Art Movement
Authors: Taliah Foudah, Sana Masri, Jana Al Ghamdi, Rimaz Alzaaqi
Abstract:
This research project explores the creative works of the app Metui, which allows consumers to edit their photos and use the new and popular AI feature, which turns any photo into a cartoon-like animated image with beautified enhancements. Studying this AI app demonstrates the significance of the ability in which AI can develop intricate designs which verily replicate the human mind. Our goal was to investigate the Metui app by asking our audience certain questions about its functionality and their personal feelings about its credibility as well as their beliefs as to how this app will add to the future of the AI generation, both positively and negatively. Their responses were further explored by analyzing the questions and responses thoroughly and calculating the results through pie charts. Overall, it was concluded that the Metui app is a powerful step forward for AI by replicating the intelligence of humans and its creativity to either benefit society or do the opposite.Keywords: AI Art, Meitu, application, photo editing
Procedia PDF Downloads 721966 Privacy Policy Prediction for Uploaded Image on Content Sharing Sites
Authors: Pallavi Mane, Nikita Mankar, Shraddha Mazire, Rasika Pashankar
Abstract:
Content sharing sites are very useful in sharing information and images. However, with the increasing demand of content sharing sites privacy and security concern have also increased. There is need to develop a tool for controlling user access to their shared content. Therefore, we are developing an Adaptive Privacy Policy Prediction (A3P) system which is helpful for users to create privacy settings for their images. We propose the two-level framework which assigns the best available privacy policy for the users images according to users available histories on the site.Keywords: online information services, prediction, security and protection, web based services
Procedia PDF Downloads 3621965 Optimization in Locating Firefighting Stations Using GIS Data and AHP Model; A Case Study on Arak City
Authors: Hasan Heydari
Abstract:
In recent decades, locating urban services is one of the significant discussions in urban planning. Among these considerations, cities require more accurate planning in order to supply citizen needs, especially part of urban safety. In order to gain this goal, one of the main tasks of urban planners and managers is specifying suitable sites to locate firefighting stations. This study has been done to reach this purpose. Therefore effective criteria consist of coverage radius, population density, proximity to pathway network, land use (compatible and incompatible neighborhood) have been specified. After that, descriptive and local information of the criteria was provided and their layers were created in ArcGIS 9.3. Using Analytic Hierarchy Process (AHP) these criteria and their sub-criteria got the weights. These layers were classified regarding their weights and finally were overlaid by Index Overlay Model and provided the final site selection map for firefighting stations of Arak city. The results gained by analyzing in GIS environment indicate the existing fire station don’t cover the whole city sufficiently and some of the stations have established on the unsuitable sites. The output map indicates the best sites to locate firefighting stations of Arak.Keywords: site-selection, firefighting stations, analytic hierarchy process (AHP), GIS, index overlay model
Procedia PDF Downloads 3491964 The Influence of Concept-Based Teaching on High School Students’ Research Skills
Authors: Nazym Alykpashova
Abstract:
This article is based on the results of the action research at Nazarbayev Intellectual School in Pavlodar, Kazakhstan. The participants of this research were high school students who study Global Perspectives and Project Work course. Intellectual schools are designed to become an experimental site that develops, monitors, studies, analyzes, approves, implements modern models of educational programs. Subjects in NIS aimed to develop skills that will be useful for students in their life. Students learn how to do projects, research credible information, solve different issues. Many subjects cover complex topics, and most teachers feel that they often have to deliver a lot of information within one hour. Many educators recognize Conceptual Teaching, as well as Conceptual Learning, has a lot of benefits for students in terms of developing their perception of the subject topics. This qualitative paper presents findings of two research questions which explored high school students’ perception of conceptual teaching and its impact on their academic performance. Individual semi-structured interviews and observations were conducted with Global Perspectives teachers and students. The results of this action research assist teachers reflect on their professional practice.Keywords: concept-based teaching, students’ research skills, teacher’s professional development, kazakhstan
Procedia PDF Downloads 1381963 Data Structure Learning Platform to Aid in Higher Education IT Courses (DSLEP)
Authors: Estevan B. Costa, Armando M. Toda, Marcell A. A. Mesquita, Jacques D. Brancher
Abstract:
The advances in technology in the last five years allowed an improvement in the educational area, as the increasing in the development of educational software. One of the techniques that emerged in this lapse is called Gamification, which is the utilization of video game mechanics outside its bounds. Recent studies involving this technique provided positive results in the application of these concepts in many areas as marketing, health and education. In the last area there are studies that cover from elementary to higher education, with many variations to adequate to the educators methodologies. Among higher education, focusing on IT courses, data structures are an important subject taught in many of these courses, as they are base for many systems. Based on the exposed this paper exposes the development of an interactive web learning environment, called DSLEP (Data Structure Learning Platform), to aid students in higher education IT courses. The system includes basic concepts seen on this subject such as stacks, queues, lists, arrays, trees and was implemented to ease the insertion of new structures. It was also implemented with gamification concepts, such as points, levels, and leader boards, to engage students in the search for knowledge and stimulate self-learning.Keywords: gamification, Interactive learning environment, data structures, e-learning
Procedia PDF Downloads 497