Search results for: image security
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 5488

Search results for: image security

3538 Colour Segmentation of Satellite Imagery to Estimate Total Suspended Solid at Rawa Pening Lake, Central Java, Indonesia

Authors: Yulia Chalri, E. T. P. Lussiana, Sarifuddin Madenda, Bambang Trisakti, Yuhilza Hanum

Abstract:

Water is a natural resource needed by humans and other living creatures. The territorial water of Indonesia is 81% of the country area, consisting of inland waters and the sea. The research object is inland waters in the form of lakes and reservoirs, since 90% of inland waters are in them, therefore the water quality should be monitored. One of water quality parameters is Total Suspended Solid (TSS). Most of the earlier research did direct measurement by taking the water sample to get TSS values. This method takes a long time and needs special tools, resulting in significant cost. Remote sensing technology has solved a lot of problems, such as the mapping of watershed and sedimentation, monitoring disaster area, mapping coastline change, and weather analysis. The aim of this research is to estimate TSS of Rawa Pening lake in Central Java by using the Lansat 8 image. The result shows that the proposed method successfully estimates the Rawa Pening’s TSS. In situ TSS shows normal water quality range, and so does estimation result of segmentation method.

Keywords: total suspended solid (TSS), remote sensing, image segmentation, RGB value

Procedia PDF Downloads 418
3537 Scenario Analysis to Assess the Competitiveness of Hydrogen in Securing the Italian Energy System

Authors: Gianvito Colucci, Valeria Di Cosmo, Matteo Nicoli, Orsola Maria Robasto, Laura Savoldi

Abstract:

The hydrogen value chain deployment is likely to be boosted in the near term by the energy security measures planned by European countries to face the recent energy crisis. In this context, some countries are recognized to have a crucial role in the geopolitics of hydrogen as importers, consumers and exporters. According to the European Hydrogen Backbone Initiative, Italy would be part of one of the 5 corridors that will shape the European hydrogen market. However, the set targets are very ambitious and require large investments to rapidly develop effective hydrogen policies: in this regard, scenario analysis is becoming increasingly important to support energy planning, and energy system optimization models appear to be suitable tools to quantitively carry on that kind of analysis. The work aims to assess the competitiveness of hydrogen in contributing to the Italian energy security in the coming years, under different price and import conditions, using the energy system model TEMOA-Italy. A wide spectrum of hydrogen technologies is included in the analysis, covering the production, storage, delivery, and end-uses stages. National production from fossil fuels with and without CCS, as well as electrolysis and import of low-carbon hydrogen from North Africa, are the supply solutions that would compete with other ones, such as natural gas, biomethane and electricity value chains, to satisfy sectoral energy needs (transport, industry, buildings, agriculture). Scenario analysis is then used to study the competition under different price and import conditions. The use of TEMOA-Italy allows the work to catch the interaction between the economy and technological detail, which is much needed in the energy policies assessment, while the transparency of the analysis and of the results is ensured by the full accessibility of the TEMOA open-source modeling framework.

Keywords: energy security, energy system optimization models, hydrogen, natural gas, open-source modeling, scenario analysis, TEMOA

Procedia PDF Downloads 121
3536 A Proposed Optimized and Efficient Intrusion Detection System for Wireless Sensor Network

Authors: Abdulaziz Alsadhan, Naveed Khan

Abstract:

In recent years intrusions on computer network are the major security threat. Hence, it is important to impede such intrusions. The hindrance of such intrusions entirely relies on its detection, which is primary concern of any security tool like Intrusion Detection System (IDS). Therefore, it is imperative to accurately detect network attack. Numerous intrusion detection techniques are available but the main issue is their performance. The performance of IDS can be improved by increasing the accurate detection rate and reducing false positive. The existing intrusion detection techniques have the limitation of usage of raw data set for classification. The classifier may get jumble due to redundancy, which results incorrect classification. To minimize this problem, Principle Component Analysis (PCA), Linear Discriminant Analysis (LDA), and Local Binary Pattern (LBP) can be applied to transform raw features into principle features space and select the features based on their sensitivity. Eigen values can be used to determine the sensitivity. To further classify, the selected features greedy search, back elimination, and Particle Swarm Optimization (PSO) can be used to obtain a subset of features with optimal sensitivity and highest discriminatory power. These optimal feature subset used to perform classification. For classification purpose, Support Vector Machine (SVM) and Multilayer Perceptron (MLP) used due to its proven ability in classification. The Knowledge Discovery and Data mining (KDD’99) cup dataset was considered as a benchmark for evaluating security detection mechanisms. The proposed approach can provide an optimal intrusion detection mechanism that outperforms the existing approaches and has the capability to minimize the number of features and maximize the detection rates.

Keywords: Particle Swarm Optimization (PSO), Principle Component Analysis (PCA), Linear Discriminant Analysis (LDA), Local Binary Pattern (LBP), Support Vector Machine (SVM), Multilayer Perceptron (MLP)

Procedia PDF Downloads 376
3535 Investigating the Performance of Power Industry in a Developing Nation for Industrialization and Environmental Security

Authors: Abel Edeowede Abhulimen

Abstract:

Due to supply irregularity and frequent outages, the need for reliability in power supply has grown unsatisfactorily over time in developing nations, impeding industrialization and fueling insecurity. This article attempts to break down the Nigerian power issue into its numerous sub-sectors in order to pinpoint the industry's ailment and suggest a viable fix. Monthly average performance data were obtained for the various sub-sectors across the industry for eight consecutive quarters. Whereas the amount of energy generated was found to be insufficient to engender industrialization in a nation like Nigeria, the transmission infrastructure was inadequate for the amount of power needed to be wheeled. Additionally, the distribution sub-sector was plagued with problems such as revenue collection inefficiency, severe enough to impede the growth of the entire industry. The country's goal of attaining energy sufficiency and industrialization would significantly be closer to reality with a conscious effort to increase the base of power generation through aggressive investment in Combined Cycle Gas Turbines (CCGT), decentralization of the transmission infrastructure, and strict monitoring of the distribution sub-sector for improved accountability and system reliability.

Keywords: performance, power industry, industrialization, security, energy

Procedia PDF Downloads 79
3534 An Empirical Study of Factors that Impact Government E-Services Acceptance by Citizens: Case Study from UAE

Authors: Emad Bataineh, Sara Al-Mutawa

Abstract:

The primary focus of this study is to investigate and identify the perceptions of potential end users relating to factors which impact on e-services acceptance. Technology Acceptance Model (TAM) has been adopted in this study as it can be extended when technologies are introduced. This research validates the developed TAM model and evaluates the variance of the outcome variable (acceptance of e-services). Five factors were adopted as determinants of acceptance of e-services: ease of use, security, trust, web skills, and language. The study was undertaken in the General Directorate of Residency and Foreigners Affairs (GDRFA) in the UAE. A quantitative survey methodology was adopted in this study, which surveyed 466 customers who use the GDRFA e-services. The overall findings revealed that security language, web skills and support significantly affected ease of use and perceived usefulness. However, the trust doesn’t affect the ease of use. Further, ease of use significantly affects intention to use and perceived usefulness while in turn intention to use was influenced by perceived usefulness. This study offers an understanding of people’s adoption of e-government services with the help of established theories such as TAM and various factors that influence the e-government adoption with reference to UAE.

Keywords: e-government portal, e-service, usability, TAM model

Procedia PDF Downloads 438
3533 An Analysis of Non-Elliptic Curve Based Primality Tests

Authors: William Wong, Zakaria Alomari, Hon Ching Lai, Zhida Li

Abstract:

Modern-day information security depends on implementing Diffie-Hellman, which requires the generation of prime numbers. Because the number of primes is infinite, it is impractical to store prime numbers for use, and therefore, primality tests are indispensable in modern-day information security. A primality test is a test to determine whether a number is prime or composite. There are two types of primality tests, which are deterministic tests and probabilistic tests. Deterministic tests are adopting algorithms that provide a definite answer whether a given number is prime or composite. While in probabilistic tests, a probabilistic result would be provided, there is a degree of uncertainty. In this paper, we review three probabilistic tests: the Fermat Primality Test, the Miller-Rabin Test, and the Baillie-PSW Test, as well as one deterministic test, the Agrawal-Kayal-Saxena (AKS) Test. Furthermore, we do an analysis of these tests. All of the reviews discussed are not based on the Elliptic Curve. The analysis demonstrates that, in the majority of real-world scenarios, the Baillie- PSW test’s favorability stems from its typical operational complexity of O(log 3n) and its capacity to deliver accurate results for numbers below 2^64.

Keywords: primality tests, Fermat’s primality test, Miller-Rabin primality test, Baillie-PSW primality test, AKS primality test

Procedia PDF Downloads 95
3532 Shedding Light on the Black Box: Explaining Deep Neural Network Prediction of Clinical Outcome

Authors: Yijun Shao, Yan Cheng, Rashmee U. Shah, Charlene R. Weir, Bruce E. Bray, Qing Zeng-Treitler

Abstract:

Deep neural network (DNN) models are being explored in the clinical domain, following the recent success in other domains such as image recognition. For clinical adoption, outcome prediction models require explanation, but due to the multiple non-linear inner transformations, DNN models are viewed by many as a black box. In this study, we developed a deep neural network model for predicting 1-year mortality of patients who underwent major cardio vascular procedures (MCVPs), using temporal image representation of past medical history as input. The dataset was obtained from the electronic medical data warehouse administered by Veteran Affairs Information and Computing Infrastructure (VINCI). We identified 21,355 veterans who had their first MCVP in 2014. Features for prediction included demographics, diagnoses, procedures, medication orders, hospitalizations, and frailty measures extracted from clinical notes. Temporal variables were created based on the patient history data in the 2-year window prior to the index MCVP. A temporal image was created based on these variables for each individual patient. To generate the explanation for the DNN model, we defined a new concept called impact score, based on the presence/value of clinical conditions’ impact on the predicted outcome. Like (log) odds ratio reported by the logistic regression (LR) model, impact scores are continuous variables intended to shed light on the black box model. For comparison, a logistic regression model was fitted on the same dataset. In our cohort, about 6.8% of patients died within one year. The prediction of the DNN model achieved an area under the curve (AUC) of 78.5% while the LR model achieved an AUC of 74.6%. A strong but not perfect correlation was found between the aggregated impact scores and the log odds ratios (Spearman’s rho = 0.74), which helped validate our explanation.

Keywords: deep neural network, temporal data, prediction, frailty, logistic regression model

Procedia PDF Downloads 155
3531 Sustaining Efficiency in Electricity Distribution to Enhance Effective Human Security for the Vulnerable People in Ghana

Authors: Anthony Nyamekeh-Armah Adjei, Toshiaki Aoki

Abstract:

The unreliable and poor efficiency of electricity distribution leading to frequent power outages and high losses are the major challenge facing the power distribution sector in Ghana. Distribution system routes electricity from the power generating station at a higher voltage through the transmission grid and steps it down through the low voltage lines to end users. Approximately all electricity problems and disturbances that have increased the call for renewable and sustainable energy in recent years have their roots in the distribution system. Therefore, sustaining electricity distribution efficiency can potentially contribute to the reserve of natural energy resources use in power generation, reducing greenhouse gas emission (GHG), decreasing tariffs for consumers and effective human security. Human Security is a people-centered approach where individual human being is the principal object of concern, focuses on protecting the vital core of all human lives in ways for meeting basic needs that enhance the safety and protection of individuals and communities. The vulnerability is the diminished capacity of an individual or group to anticipate, resist and recover from the effect of natural, human-induced disaster. The research objectives are to explore the causes of frequent power outages to consumers, high losses in the distribution network and the effect of poor electricity distribution efficiency on the vulnerable (poor and ordinary) people that mostly depend on electricity for their daily activities or life to survive. The importance of the study is that in a developing country like Ghana where raising a capital for new infrastructure project is difficult, it would be beneficial to enhance the efficiency that will significantly minimize the high energy losses, reduce power outage, to ensure safe and reliable delivery of electric power to consumers to secure the security of people’s livelihood. The methodology used in this study is both interview and questionnaire survey to analyze the response from the respondents on causes of power outages and high losses facing the electricity company of Ghana (ECG) and its effect on the livelihood on the vulnerable people. Among the outcome of both administered questionnaire and the interview survey from the field were; poor maintenance of existing sub-stations, use of aging equipment, use of poor distribution infrastructure and poor metering and billing system. The main observation of this paper is that the poor network efficiency (high losses and power outages) affects the livelihood of the vulnerable people. Therefore, the paper recommends that policymakers should insist on all regulation guiding electricity distribution to improve system efficiency. In conclusion, there should be decentralization of off-grid solar PV technologies to provide a sustainable and cost-effective, which can increase daily productivity and improve the quality of life of the vulnerable people in the rural communities.

Keywords: electricity efficiency, high losses, human security, power outage

Procedia PDF Downloads 289
3530 Effects of the Americans with Disabilities Act on Disability Representation in Mid-Century American Media Discourse

Authors: Si On Na

Abstract:

The development of American radio and print media since World War II has allowed people with disabilities to engage more directly with the public, gradually changing the perception that disabled people constitute a kind of social impairment or burden. People with disabilities have rarely been portrayed as equal to the non-disabled. In the postwar period, a dramatic shift from eugenicist conceptualizations of disability and widespread institutionalization gradually evolved into conditions of greater openness in public discourse. This discourse was marked at mid-century by telethons and news media (both print and television) which sought to commodify people with disabilities for commercial gain through stories that promoted alienating forms of empowerment alternating with paternalistic pity. By comparing studies of the history of American disability advocacy in the twentieth century and the evolution of the image of disability characteristic of mid-century media discourse, this paper will examine the relationship between the passage of the American with Disabilities Act of 1990 (ADA) and the expanded media representation of people with disabilities. This paper will argue that the legal mandate of the ADA ultimately transformed the image of people with disabilities from those who are weak and in need of support to viable consumers, encouraging traditional American print, film, and television media outlets to solicit the agency of people with disabilities in the authentic portrayal of themselves and their disabilities.

Keywords: ADA, disability representation, media portrayal, postwar United States

Procedia PDF Downloads 185
3529 Characterization of Shrinkage-Induced Cracking of Clay Soils

Authors: Ahmad El Hajjar, Joanna Eid, Salima Bouchemella, Tariq Ouahbi, Benoit Duchemin, Said Taibi

Abstract:

In our present society, raw earth presents an alternative as an energy-saving building material for dealing with climate and environmental issues. Nevertheless, it has a sensitivity to water, due to the presence of fines, which has a direct effect on its consistency. This can be expressed during desiccation, by shrinkage deformations resulting in cracking that begins once the internal tensile stresses developed, due to suction, exceed the tensile strength of the material. This work deals with the evolution of the strain of clay samples, from the beginning of shrinkage until the initiation of crack, using the DIC (Digital Image Correlation) technique. In order to understand the origin of cracking, desiccation is studied for different boundary conditions and depending on the intrinsic characteristics of the material. On the other hand, a study of restrained shrinkage is carried out on the ring test to investigate the ultimate tensile strength from which the crack begins in the dough of clay. The purpose of this test is to find the type of reinforcement adapted to thwart in the cracking of the material. A microscopic analysis of the damaged area is necessary to link the macroscopic mechanisms of cracking to the various physicochemical phenomena at the microscopic scale in order to understand the different microstructural mechanisms and their impact on the macroscopic shrinkage.

Keywords: clayey soil, shrinkage, strain, cracking, digital image correlation

Procedia PDF Downloads 162
3528 Brain Tumor Detection and Classification Using Pre-Trained Deep Learning Models

Authors: Aditya Karade, Sharada Falane, Dhananjay Deshmukh, Vijaykumar Mantri

Abstract:

Brain tumors pose a significant challenge in healthcare due to their complex nature and impact on patient outcomes. The application of deep learning (DL) algorithms in medical imaging have shown promise in accurate and efficient brain tumour detection. This paper explores the performance of various pre-trained DL models ResNet50, Xception, InceptionV3, EfficientNetB0, DenseNet121, NASNetMobile, VGG19, VGG16, and MobileNet on a brain tumour dataset sourced from Figshare. The dataset consists of MRI scans categorizing different types of brain tumours, including meningioma, pituitary, glioma, and no tumour. The study involves a comprehensive evaluation of these models’ accuracy and effectiveness in classifying brain tumour images. Data preprocessing, augmentation, and finetuning techniques are employed to optimize model performance. Among the evaluated deep learning models for brain tumour detection, ResNet50 emerges as the top performer with an accuracy of 98.86%. Following closely is Xception, exhibiting a strong accuracy of 97.33%. These models showcase robust capabilities in accurately classifying brain tumour images. On the other end of the spectrum, VGG16 trails with the lowest accuracy at 89.02%.

Keywords: brain tumour, MRI image, detecting and classifying tumour, pre-trained models, transfer learning, image segmentation, data augmentation

Procedia PDF Downloads 82
3527 Intrusion Detection Systems in Autonomous Vehicles Using Machine Learning

Authors: Hashim Babat, Nirangan Dangi, Anish Dabhane

Abstract:

As autonomous vehicles (AVs) and the Internet of Vehicles (IoV) transform transportation, ensuring the security of vehicular networks is crucial. Increased connectivity through Vehicle-to-Everything (V2X) technology exposes both intra-vehicle (CAN) and external networks to cyber-attacks. This survey examines state-of-the-art Intrusion Detection Systems (IDS) designed to counter threats like DoS, message injection, spoofing, and sniffing attacks. We focus on key IDS frameworks—Multi-Tiered Hybrid IDS (MTH-IDS), Tree-Based IDS, and Leader Class Confidence Decision Ensemble (LCCDE)—that leverage machine learning models such as decision trees, ensemble learning, XGBoost, and LightGBM. Their performance on datasets like CICIDS2017 and CAN-Intrusion is compared based on detection accuracy, false alarms, and real-time feasibility. We also discuss challenges such as computational limits and propose future directions, including advanced ML and blockchain, to enhance AV and IoV security.

Keywords: autonomous vehicles, internet of vehicles, V2X, CAN, intrusion detection systems, cyber-attacks, decision trees, ensemble learning, gradient-boosting, XGBoost, LightGBM, CAN-intrusion, zero-day attacks

Procedia PDF Downloads 4
3526 Tanzanian Food Origins and Protected Geographical Indications

Authors: Innocensia John, Henrik Egelyng, Razack Lokina

Abstract:

As the world`s population is constantly growing, food security has become a thorny trending issue. The impact has particularly been felt more in Africa as most of the people depend on food Agriculture products. Geographical Indications can aid in transforming the Tanzania agriculture-dependent economy through tapping the unique attributes of their quality products like soil, taste color etc. Consumers worldwide demand more uniquer products featuring a ´connect´ with the land use systems producing particular qualities. Tanzania has demonstrated the capacity to tap into the organic world market and has untapped potential for harvesting market value from geographical indications. This paper presents preliminary results from VALOR — a research project investigating conditions under which Tanzanian origin food producers can add value by incorporating territory specific cultural, environmental and social qualities into marketing, production and processing of unique local, niche and specialty products. Cases are investigated of the prospects for Tanzania to leapfrog perhaps into exports of geographical indications products, and certainly into allowing smallholders to create employment and build monetary value, while stewarding local food cultures and natural environments and resources, and increasing the diversity of supply of natural and unique quality products and so contribute to enhanced food security. Rice from Kyela, coffee and Sugar from Kilimanjaro, are some of the product cases investigated and provides for the in-depth case study, as ´landscape´ products incorporating ´taste of place´. Framework conditions for producers creating or capturing market value as stewards of cultural and landscape values and environments and institutional requirements for such creation or capturing to happen, including presence of export opportunities, are discussed.

Keywords: food origins, food security, protected geographical indications, case study analysis

Procedia PDF Downloads 306
3525 Copy Effect Myopic Anisometropia in a Pair of Monozygotic Twins: A Case Report

Authors: Fatma Sümer

Abstract:

Introduction: This case report aims to report myopic anisometropia with copy-image in monozygotic twins. Methods: In February 2021, a 6-year-old identical twin was seen, who was referred to us with the diagnosis of amblyopia in their left eye from an external center. Both twins had a full ophthalmic examination, which included visual acuity testing, ocular motility testing, cycloplegic refraction, and fundus examination. Results: On examination, “copy image” myopic anisometropia was discovered. Twin 1 had anisometropia with myopic astigmatism in the left eye. His cycloplegic refraction was +1.00 (-0.75x 75) in the right eye and -8.0 (-1.50x175) in the left eye. Similarly, twin 2 had anisometropia with myopic astigmatism in the left eye. His cycloplegic refraction was -7.75 (-1.50x180) in the left eye and +1.25 (-0.75x90 ) in the right eye. The best-corrected visual acuity was 20/60 in the amblyopic eyes and 20/20 in the unaffected eyes. There was no ocular deviation. In either patient, a slit-lamp microscopic examination revealed no abnormalities in the anterior parts of either eye. Fundoscopic examination revealed no abnormalities. No abnormal ocular movements were demonstrated. Conclusion: As far as we have reviewed in the literature, previous studies with twins were mostly concerned with mirror-effect myopic anisometropia and myopic anisometropia, whereas ipsilateral amblyopia and anisometropia were not reported in monozygotic twins. This case underscores the possible genetic basis of myopic anisometropia.

Keywords: amblyopia, anisometropia, myopia, twins

Procedia PDF Downloads 162
3524 Women's Vulnerability to Cross-Border Criminality in Saki/Iseyin Area of Oyo State in Nigeria: Insight and Experiences

Authors: Samuel Kehinde Okunade, Daniel Sunday Tolorunshagba

Abstract:

Globally women are classified to be part of the vulnerable group in any environment. In a conflict-ridden environment, women being vulnerable often suffer the consequences as it relates to security and access to basic social services such as medical care. This is the situation in border communities in Nigeria where cross-border crimes are on the rife, thus, putting women at a disadvantaged position and, eventually, victims of such inimical activities. Border communities in the Saki/Iseyin area of Oyo state are a case in point where the lives of inhabitants are daily threatened most, especially women. In light of the above, this article examined the security situation of the Saki/Iseyin area of Oyo State with a view to ascertaining its status in terms of safety of lives and property. This paper also explored the experiences of women in the border communities within the area as it relates to their safety, the safety of their children, access to good health facilities in their immediate environment, and above all, how they have been able to cope or manage the situation. The qualitative research model was adopted utilizing a phenomenological case study approach. A Focused Group Discussion was conducted with 10 pregnant women and 10 mothers in Okerete and Abugudu communities while a Key Informant Interview was conducted with the women leaders in both communities of the Saki/Iseyin border area of Oyo State. The findings of the study revealed the poor state of basic infrastructure. So bad to a point that inhabitants of these communities no longer see themselves as Nigerians because they have been neglected by the government for too long. The only solution is for the government to embark on developmental projects within these communities so that they can live a good life just as those in the cities do. More importantly, this will increase the loyalty of these communities to the Nigeria state by defending and resisting all forms of cross-border criminal activities that go on along the porous borders.

Keywords: security, women, Saki/Iseyin border area, cross-border criminalities, basic infrastructure

Procedia PDF Downloads 135
3523 The Effects of Perceived Service Quality on Customers' Satisfaction, Trust and Loyalty in Online Shopping: A Case of Saudi Consumers' Perspectives

Authors: Nawt Almutairi, Ramzi El-Haddadeh

Abstract:

With the extensive increase in the number of online shops, loyalty becomes the most purpose for e-retailers by which they can maintain their exit customers and regular income instead of spending large deal of money to target new segmentation. To obtain customers’ loyalty e-marketers should firstly satisfy customers by providing a high quality of services that could fulfil their demand. They have to satisfy them to trust the web-site then increase their intention to re-visit it. This study intends to investigate to what extend the elements of e-service quality presented in the literature affect customers’ satisfaction and how these influences contribute to customers’ trust and loyalty. Three dimensions of service quality are estimated. The first element is web-site interactivity, which is perceived the quality of interactive support and the accessible communications-tool. The second aspect is security/privacy, which is perceived the quality of controlling security and privacy while transaction over the web-site. The third element is web-design that perceived a pleasant user interface with visual appealing. These elements present positive effects on shoppers’ satisfaction. Thus, To examine the proposed constructs of this research, some measurements scale-items adapted from similar prior studies. Survey data collected online from Saudi customers (n=106) were utilized to test the research hypotheses. After that, the hypotheses were analyzed by using a variety of regression tools. The analytical results of this study propose that perceived quality of interactivity and security/privacy affects customers’ satisfaction. As well as trust seems to be a substantial construct that highly affects loyalty in online shopping. This study provides a developed model to obtain a simple understanding of the series of customers’ loyalty in online shopping. One construct presenting in the research model is web-design appears to be not important antecedent of satisfaction (the path to loyalty) in online shopping.

Keywords: e-service, satisfaction, trust, loyalty

Procedia PDF Downloads 260
3522 Semiautomatic Calculation of Ejection Fraction Using Echocardiographic Image Processing

Authors: Diana Pombo, Maria Loaiza, Mauricio Quijano, Alberto Cadena, Juan Pablo Tello

Abstract:

In this paper, we present a semi-automatic tool for calculating ejection fraction from an echocardiographic video signal which is derived from a database in DICOM format, of Clinica de la Costa - Barranquilla. Described in this paper are each of the steps and methods used to find the respective calculation that includes acquisition and formation of the test samples, processing and finally the calculation of the parameters to obtain the ejection fraction. Two imaging segmentation methods were compared following a methodological framework that is similar only in the initial stages of processing (process of filtering and image enhancement) and differ in the end when algorithms are implemented (Active Contour and Region Growing Algorithms). The results were compared with the measurements obtained by two different medical specialists in cardiology who calculated the ejection fraction of the study samples using the traditional method, which consists of drawing the region of interest directly from the computer using echocardiography equipment and a simple equation to calculate the desired value. The results showed that if the quality of video samples are good (i.e., after the pre-processing there is evidence of an improvement in the contrast), the values provided by the tool are substantially close to those reported by physicians; also the correlation between physicians does not vary significantly.

Keywords: echocardiography, DICOM, processing, segmentation, EDV, ESV, ejection fraction

Procedia PDF Downloads 430
3521 Preparation and Characterizations of Hydroxyapatite-Sodium Alginate Nanocomposites for Biomedical Applications

Authors: Friday Godwin Okibe, Christian Chinweuba Onoyima, Edith Bolanle Agbaji, Victor Olatunji Ajibola

Abstract:

Polymer-inorganic nanocomposites are presently impacting diverse areas, specifically in biomedical sciences. In this research, hydroxyapatite-sodium alginate has been prepared, and characterized, with emphasis on the influence of sodium alginate on its characteristics. In situ wet chemical precipitation method was used in the preparation. The prepared nanocomposite was characterized with Fourier Transform Infrared spectroscopy (FTIR), Scanning Electron Microscopy (SEM), with image analysis, and X-Ray Diffraction (XRD). The FTIR study shows peaks characteristics of hydroxyapatite and confirmed formation of the nanocomposite via chemical interaction between sodium alginate and hydroxyapatite. Image analysis shows the nanocomposites to be of irregular morphologies which did not show significant change with increasing sodium alginate addition, while particle size decreased with increase in sodium alginate addition (359.46 nm to 109.98 nm). From the XRD data, both the crystallite size and degree of crystallinity also decreased with increasing sodium alginate composition (32.36 nm to 9.47 nm and 72.87% to 1.82% respectively), while the specific surface area and microstrain increased with increasing sodium alginate composition (0.0041 to 0.0139 and 58.99 m²/g to 201.58 m²/g respectively). The results show that the formulation with 50%wt of sodium alginate (HASA-50%wt), possess exceptional characteristics for biomedical applications such as drug delivery.

Keywords: nanocomposite, sodium alginate, hydroxyapatite, biomedical, FTIR, XRD, SEM

Procedia PDF Downloads 334
3520 Satellite Photogrammetry for DEM Generation Using Stereo Pair and Automatic Extraction of Terrain Parameters

Authors: Tridipa Biswas, Kamal Pandey

Abstract:

A Digital Elevation Model (DEM) is a simple representation of a surface in 3 dimensional space with elevation as the third dimension along with X (horizontal coordinates) and Y (vertical coordinates) in rectangular coordinates. DEM has wide applications in various fields like disaster management, hydrology and watershed management, geomorphology, urban development, map creation and resource management etc. Cartosat-1 or IRS P5 (Indian Remote Sensing Satellite) is a state-of-the-art remote sensing satellite built by ISRO (May 5, 2005) which is mainly intended for cartographic applications.Cartosat-1 is equipped with two panchromatic cameras capable of simultaneous acquiring images of 2.5 meters spatial resolution. One camera is looking at +26 degrees forward while another looks at –5 degrees backward to acquire stereoscopic imagery with base to height ratio of 0.62. The time difference between acquiring of the stereopair images is approximately 52 seconds. The high resolution stereo data have great potential to produce high-quality DEM. The high-resolution Cartosat-1 stereo image data is expected to have significant impact in topographic mapping and watershed applications. The objective of the present study is to generate high-resolution DEM, quality evaluation in different elevation strata, generation of ortho-rectified image and associated accuracy assessment from CARTOSAT-1 data based Ground Control Points (GCPs) for Aglar watershed (Tehri-Garhwal and Dehradun district, Uttarakhand, India). The present study reveals that generated DEMs (10m and 30m) derived from the CARTOSAT-1 stereo pair is much better and accurate when compared with existing DEMs (ASTER and CARTO DEM) also for different terrain parameters like slope, aspect, drainage, watershed boundaries etc., which are derived from the generated DEMs, have better accuracy and results when compared with the other two (ASTER and CARTO) DEMs derived terrain parameters.

Keywords: ASTER-DEM, CARTO-DEM, CARTOSAT-1, digital elevation model (DEM), ortho-rectified image, photogrammetry, RPC, stereo pair, terrain parameters

Procedia PDF Downloads 313
3519 Psycholgical Contract Violation and Its Impact on Job Satisfaction Level: A Study on Subordinate Employees in Enterprises of Hanoi, Vietnam

Authors: Quangyen Tran, YeZhuang Tian, Chengfeng Li

Abstract:

Psychological contract violations may lead to damaging an organization through losing its potential employees; it is a very significant concept in understanding the employment relationships. The authors selected contents of psychological contract violation scale based on the nine areas of violation most relevant to managerial samples (High pay, training, job security, career development, pay based on performance, promotion, feedback, expertise and quality of co-workers and support with personal problems), using regression analysis, the degree of psychological contract violations was measured by an adaptation of a multiplicative scale with Cronbach’s alpha as a measure of reliability. Through the regression analysis, psychological contract violations was found have a positive impact on employees’ job satisfaction, the frequency of psychological contract violations was more intense among male employees particularly in terms of training, job security and pay based on performance. Job dissatisfaction will lead to a lowering of employee commitment in the job, enterprises in Hanoi, Vietnam should therefore offer lucrative jobs in terms of salary and other emoluments to their employees.

Keywords: psychological contract, psychological contract violation, job satisfaction, subordinate employees, employers’ obligation

Procedia PDF Downloads 327
3518 An Innovative Auditory Impulsed EEG and Neural Network Based Biometric Identification System

Authors: Ritesh Kumar, Gitanjali Chhetri, Mandira Bhatia, Mohit Mishra, Abhijith Bailur, Abhinav

Abstract:

The prevalence of the internet and technology in our day to day lives is creating more security issues than ever. The need for protecting and providing a secure access to private and business data has led to the development of many security systems. One of the potential solutions is to employ the bio-metric authentication technique. In this paper we present an innovative biometric authentication method that utilizes a person’s EEG signal, which is acquired in response to an auditory stimulus,and transferred wirelessly to a computer that has the necessary ANN algorithm-Multi layer perceptrol neural network because of is its ability to differentiate between information which is not linearly separable.In order to determine the weights of the hidden layer we use Gaussian random weight initialization. MLP utilizes a supervised learning technique called Back propagation for training the network. The complex algorithm used for EEG classification reduces the chances of intrusion into the protected public or private data.

Keywords: EEG signal, auditory evoked potential, biometrics, multilayer perceptron neural network, back propagation rule, Gaussian random weight initialization

Procedia PDF Downloads 418
3517 PD-L1 Expression in Papillary Thyroid Carcinoma Arising Denovo or on Top of Autoimmune Thyroiditis

Authors: Dalia M. Abouelfadl, Noha N. Yassen, Marwa E. Shabana

Abstract:

Background: The evolution of immune therapy motivated many to study the relation between immune response and progression of cancer. Little is known about expression of PD-L1 (a newly evolving immunotherapeutic drug) in papillary thyroid carcinoma (PTC) arising de-novo and PTC arising on top of autoimmune thyroiditis (Hashimoto's (HT) and lymphocytic thyroiditis (LT)). The aim of this work is to study the alteration of expression of PD-L1 in PTCs arising from de-novo or on top of HT OR LT using immunohistochemistry and image analyser system. Method: 100 paraffin blocks for PTC cases were collected retrospectively for staining using PD-L1 rabbit monoclonal antibody (BIOCARE-ACI 3171 A, C). The antibody expression is measured digitally using Image Analyzer Leica Qwin 3000, and the membranous and cytoplasmic expression of PD-L1 in tumor cells was considered positive. The results were correlated with tumor grade, size, and LN status. Results: The study samples consisted of 41 cases of PTC arising De novo, 36 cases on top of HT, and 23 on top of LT. Expression of PD-L1 was highest among the PTC-HL group (25 case-69%) followed by PTC-TL group (14 case-60.8%) then de-novo PTC (19 case-46%) with P Value < 0.05. PD-L1 expression correlated with nodal metastasis and was not relevant to tumor size or grade. Conclusion: The severity of the immune response in tumor microenvironment directly influences PTC prognosis. The anti PD-L1 Ab can be a very successful therapeutic agent for PTC arising on top of HT.

Keywords: carcinoma, Hashimoto's, lymphocytic, papillary, PD-L1, thyroiditis

Procedia PDF Downloads 185
3516 Estimation of Lungs Physiological Motion for Patient Undergoing External Lung Irradiation

Authors: Yousif Mohamed Y. Abdallah

Abstract:

This is an experimental study deals with detection, measurement and analysis of the periodic physiological organ motion during external beam radiotherapy; to improve the accuracy of the radiation field placement, and to reduce the exposure of healthy tissue during radiation treatments. The importance of this study is to detect the maximum path of the mobile structures during radiotherapy delivery, to define the planning target volume (PTV) and irradiated volume during both inspiration and expiration period and to verify the target volume. In addition to its role to highlight the importance of the application of Intense Guided Radiotherapy (IGRT) methods in the field of radiotherapy. The results showed (body contour was equally (3.17 + 0.23 mm), for left lung displacement reading (2.56 + 0.99 mm) and right lung is (2.42 + 0.77 mm) which the radiation oncologist to take suitable countermeasures in case of significant errors. In addition, the use of the image registration technique for automatic position control is predicted potential motion. The motion ranged between 2.13 mm and 12.2 mm (low and high). In conclusion, individualized assessment of tumor mobility can improve the accuracy of target areas definition in patients undergo Sterostatic RT for stage I, II and III lung cancer (NSCLC). Definition of the target volume based on a single CT scan with a margin of 10 mm is clearly inappropriate.

Keywords: respiratory motion, external beam radiotherapy, image processing, lung

Procedia PDF Downloads 538
3515 Blockchain-Based Decentralized Architecture for Secure Medical Records Management

Authors: Saeed M. Alshahrani

Abstract:

This research integrated blockchain technology to reform medical records management in healthcare informatics. It was aimed at resolving the limitations of centralized systems by establishing a secure, decentralized, and user-centric platform. The system was architected with a sophisticated three-tiered structure, integrating advanced cryptographic methodologies, consensus algorithms, and the Fast Healthcare Interoperability Resources (HL7 FHIR) standard to ensure data security, transaction validity, and semantic interoperability. The research has profound implications for healthcare delivery, patient care, legal compliance, operational efficiency, and academic advancements in blockchain technology and healthcare IT sectors. The methodology adapted in this research comprises of Preliminary Feasibility Study, Literature Review, Design and Development, Cryptographic Algorithm Integration, Modeling the data and testing the system. The research employed a permissioned blockchain with a Practical Byzantine Fault Tolerance (PBFT) consensus algorithm and Ethereum-based smart contracts. It integrated advanced cryptographic algorithms, role-based access control, multi-factor authentication, and RESTful APIs to ensure security, regulate access, authenticate user identities, and facilitate seamless data exchange between the blockchain and legacy healthcare systems. The research contributed to the development of a secure, interoperable, and decentralized system for managing medical records, addressing the limitations of the centralized systems that were in place. Future work will delve into optimizing the system further, exploring additional blockchain use cases in healthcare, and expanding the adoption of the system globally, contributing to the evolution of global healthcare practices and policies.

Keywords: healthcare informatics, blockchain, medical records management, decentralized architecture, data security, cryptographic algorithms

Procedia PDF Downloads 58
3514 Nation Building versus Self Determination: Thai State’s Response to Insurgency in South

Authors: Sunaina Sunaina

Abstract:

The emergence of Thailand as a modern nation was amalgamation of several minority groups. Eventually, the nation tried to mitigate these diversities in the name of nationalism in the backdrop of colonial powers presence in neighboring nations. However, the continued imposition of modern nation building processes (which is a western concept) in the post-colonial era deepen the feelings of alienation among the minority groups and leads to separatist conflicts. It is significant that whatever form these conflicts take, will impact the security of nation as well as the region of Southeast Asia. This paper tries to explore the possible factors behind the state policies adopted by the government of Thailand to manage the insurgency in Southern provinces in the south. The protracted insurgency in the South has historical roots as Pattani kingdom had glorious period whether it was trade or commerce or education and its assimilation was never accepted by the leaders of these areas. But after assimilation of southern provinces in the state, it has been the state policy as an important factor in promoting or mitigating the insurgency. Initial protests from the elite class of southern provinces inflated into a more organized and violent uprising after Second World War. It was only the decade of 1990s that a relative peace could prevail for some time. The violence reemerged in 2004 with more intensity and till today this area is suffering with violence. Period of different Prime Ministers dealt this insurgency in different ways sometimes very hard line approach had been adopted especially under Primeminstership of Thaksin Shinawatra. Recently, the peace talks which were started during the period of Yinglunck Shinawatra and were carried forward by Junta government also halted. And again, the region stays in a very volatile state. Violence in these provinces not only questions the capability of government to provide political solution to the problem, but also emerges as a major threat to the internal security of the state. The current era where global terrorism is spreading fast, such vulnerable areas may work as a new ground for its proliferation in Southeast Asia. The paper attempts to understand how Thailand’s historical experience of security determines a different approach to national unity which limits the prospects for autonomy in the South. In conjunction with this experience it is nature of national politics and leadership that influences the nature of policies on the ground in Southern Thailand. The paper also tries to bring out conflict between state sovereignty and self-determination as demanded by many in the southern provinces.

Keywords: insurgency, southern Thailand, security, nation building

Procedia PDF Downloads 130
3513 Remote Sensing Reversion of Water Depths and Water Management for Waterbird Habitats: A Case Study on the Stopover Site of Siberian Cranes at Momoge, China

Authors: Chunyue Liu, Hongxing Jiang

Abstract:

Traditional water depth survey of wetland habitats used by waterbirds needs intensive labor, time and money. The optical remote sensing image relies on passive multispectral scanner data has been widely employed to study estimate water depth. This paper presents an innovative method for developing the water depth model based on the characteristics of visible and thermal infrared spectra of Landsat ETM+ image, combing with 441 field water depth data at Etoupao shallow wetland. The wetland is located at Momoge National Nature Reserve of Northeast China, where the largest stopover habitat along the eastern flyway of globally, critically-endangered Siberian Cranes are. The cranes mainly feed on the tubers of emergent aquatic plants such as Scirpus planiculmis and S. nipponicus. The effective water control is a critical step for maintaining the production of tubers and food availability for this crane. The model employing multi-band approach can effectively simulate water depth for this shallow wetland. The model parameters of NDVI and GREEN indicated the vegetation growth and coverage affecting the reflectance from water column change are uneven. Combining with the field-observed water level at the same date of image acquisition, the digital elevation model (DEM) for the underwater terrain was generated. The wetland area and water volume of different water levels were then calculated from the DEM using the function of Area and Volume Statistics under the 3D Analyst of ArcGIS 10.0. The findings provide good references to effectively monitor changes in water level and water demand, develop practical plan for water level regulation and water management, and to create best foraging habitats for the cranes. The methods here can be adopted for the bottom topography simulation and water management in waterbirds’ habitats, especially in the shallow wetlands.

Keywords: remote sensing, water depth reversion, shallow wetland habitat management, siberian crane

Procedia PDF Downloads 257
3512 Opportunities for Lesbian/Gay/Bisexual/Transgender/Queer/Questioning Tourism in Vietnam

Authors: Eric D. Olson

Abstract:

The lesbian/gay/bisexual/transgender/queer/questioning tourist (LGBTQ+) travels more frequently, spends more money on travel, and is more likely to travel internationally compared to their straight/heterosexual counterparts. For Vietnam, this represents a huge opportunity to increase international tourism, considering social advancements and recognition of the LGBTQ+ have greatly increased in the past few years in Vietnam. For example, Vietnam’s Health Ministry confirmed in 2022 that same-sex attraction and being transgender is not a mental health condition. A robust hospitality ecosystem of LGBTQ+ tourism suppliers already exists in Vietnam catering to LGBTQ+ tourists (e.g., Gay Hanoi Tours, VietPride). Vietnam is a safe and welcoming destination with incredible nature, cosmopolitan cities, and friendly people; however, there is a dearth of academic and industry research that has examined how LGBTQ+ international tourists perceive Vietnam as an LGBTQ+ friendly destination. To rectify this gap, this research examines Vietnam as an LGBTQ+ destination in order to provide government officials, destination marketers, and industry practitioners with insight into this increasingly visible tourist market segment. A self-administered survey instrument was administered to n=375 international LGBTQ+ tourists to examine their perceptions of Vietnam. A factor analysis found three categories of LGBTQ+ factors of visitation to Vietnam: safety and security (Eigenvalue = 4.12, variance = 32.45, α = .82); LGBTQ+ attractions (Eigenvalue = 3.65 variance = 24.23, α = .75); and friendly interactions (Eigenvalue = 3.71, variance = 10.45, α = .96). Multiple regression was used to examine LGBTQ+ visitation factors and intention to visit Vietnam, F=12.20 (2, 127), p < .001, R2 = .56. Safety and security (β = 0.42, p < .001), LGBTQ+ attractions (β = 0.61, p < .001) and friendly interactions (β = 0.42, p < .001) are predictors to visit Vietnam. Results are consistent with previous research that highlight safety/security is of utmost importance to the community when traveling. Attractions, such as LGBTQ+ tours, suppliers, and festivals can also be used as a pull factor in encouraging tourism. Implications/limitations will be discussed.

Keywords: tourism, LGBTQ, vietnam, regression

Procedia PDF Downloads 71
3511 India’s Deterrence Program: Defense or Development

Authors: Aneri Mehta, Krunal Mehta

Abstract:

A doctrine, any doctrine, incorporates a set of beliefs or principles held by a body of persons. A national nuclear doctrine represents, therefore, the collective set of beliefs or principles held by the nation in regard to the utility of its nuclear weapons. India’s foreign policy has been profoundly affected by the nuclear explosions conducted in May 1998. The departure from the professed peaceful nuclear policies has had several implications for India’s defense and foreign policies. The explosions in Pokhran have aggravated tensions in south Asia by disrupting diplomatic initiatives with Pak and China. Diplomacy has been reduced to damage control. The object of India’s nuclear deterrence is to persuade an adversary that the costs to him of seeking a military solution to his political problems with India will far outweigh the benefits. The paper focuses on India’s guidelines governing nuclear policy, development of nuclear materials for effective deterrence as well as civil development purpose. The paper finds that security concerns and technological capabilities are important determinants of whether India develops a nuclear weapons programs, while security concerns, economic capabilities, and domestic politics help to explain the possession of nuclear weapons.

Keywords: foreign policy, nuclear deterrence, nuclear policy, development

Procedia PDF Downloads 523
3510 Optical Characterization of Anisotropic Thiophene-Phenylene Co-Oligomer Micro Crystals by Spectroscopic Imaging Ellipsometry

Authors: Christian Röling, Elena Y. Poimanova, Vladimir V. Bruevich

Abstract:

Here we demonstrate a non-destructive optical technique to localize and characterize single crystals of semiconductive organic materials – Spectroscopic Imaging Ellipsometry. With a combination of microscopy and ellipsometry, it is possible to characterize even micro-sized thin film crystals on plane surface regarding anisotropy, optical properties, crystalline domains and thickness. The semiconducting thiophene-phenylene co-oligomer 1,4-bis(5'-hexyl-[2,2'-bithiophen]-5-yl)benzene (dHex-TTPTT) crystals were grown by solvent based self-assembly technique on silicon substrate with 300 nm thermally silicon dioxide. The ellipsometric measurements were performed with an Ep4-SE (Accurion). In an ellipsometric high-contrast image of the complete sample, we have localized high-quality single crystals. After demonstrating the uniaxial anisotropy of the crystal by using Müller-Matrix imaging ellipsometry, we determined the optical axes by rotating the sample and performed spectroscopic measurements (λ = 400-700 nm) in 5 nm intervals. The optical properties were described by using a Lorentz term in the Ep4-Model. After determining the dispersion of the crystals, we converted a recorded Delta and Psi-map into a 2D thickness image. Based on a quantitative analysis of the resulting thickness map, we have calculated the height of a molecular layer (3.49 nm).

Keywords: anisotropy, ellipsometry, SCFET, thin film

Procedia PDF Downloads 253
3509 The Philippine Collegian and the Catalyst's Journalistic Presentation of the UP and PUP: A Content Analysis

Authors: Diana Mariz Catangay, Irish-Ann Montano, Frances Janine Suyat

Abstract:

As an active pedestal for student’s interaction with both issues happening inside the school and out; may it be political, societal, international, or other current events, a school paper should at least meet the standard of providing a representation of the school’s morals and values and help the institution uplift its image. The researchers seek to ascertain how the two student publications from the Philippines’ two prime state universities, the University of the Philippines’ Philippine Collegian, and the Polytechnic University of the Philippines’ the Catalyst, presents iii their school through balanced journalism and objective documentation. The objectives include determining the number of school-related articles published versus those articles that are concerned outside the school’s jurisdiction, analyzing the insight it provides on the image of the university, assessing the similarities and/or differences between the two publications, and, finally, coming up with the conclusion of how the two newspapers uses their medium to present their respective schools. The research used the quantitative method of research in order to further analyze the articles that will serve as bases in coming up with the right conclusion based on the objectives of the study. Coding sheets and coding guides are utilized for the chosen research method. The gathered findings will then be interpreted as fitting to the goal of the research.

Keywords: content analysis, journalistic presentation, student publications, state universities

Procedia PDF Downloads 184