Search results for: image manipulation
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 3068

Search results for: image manipulation

1028 Durability and Early-Age Behavior of Sprayed Concrete with an Expansion Admixture

Authors: Kyong-Ku Yun, Kyeo-Re Lee, Kyong Namkung, Seung-Yeon Han, Pan-Gil Choi

Abstract:

Sprayed concrete is a way to spray a concrete using a machinery with high air pressure. There are insufficient studies on the durability and early-age behavior of sprayed concrete using high quality expansion agent. A series of an experiment were executed with 5 varying expansion agent replacement rates, while all the other conditions were kept constant, including cement binder content and water-cement ratio. The tests includes early-age shrinkage test, rapid chloride permeability test, and image analysis of air void structure. The early-age expansion test with the variation of expansion agent show that the expansion strain increases as the ratio of expansion agent increases. The rapid chloride permeability test shows that it decrease as the expansion agent increase. Therefore, expansion agent affects into the rapid chloride permeability in a better way. As expansion agent content increased, spacing factor slightly decreased while specific surface kept relatively stable. As a results, the optimum ratio of expansion agent would be selected between 7 % and 11%.

Keywords: sprayed concrete, durability, early-age behavior, expansion admixture

Procedia PDF Downloads 499
1027 Finite Element Simulation of Embankment Bumps at Bridge Approaches, Comparison Study

Authors: F. A. Hassona, M. D. Hashem, R. I. Melek, B. M. Hakeem

Abstract:

A differential settlement at the end of a bridge near the interface between the abutment and the embankment is a persistent problem for highway agencies. The differential settlement produces the common ‘bump at the end of the bridge’. Reduction in steering response, distraction to the driver, added risk and expense to maintenance operation, and reduction in a transportation agency’s public image are all undesirable effects of these uneven and irregular transitions. This paper attempts to simulate the bump at the end of the bridge using PLAXIS finite element 2D program. PLAXIS was used to simulate a laboratory model called Bridge to Embankment Simulator of Transition (B.E.S.T.) device which was built by others to investigate this problem. A total of six numerical simulations were conducted using hardening- soil model with rational assumptions of missing soil parameters to estimate the bump at the end of the bridge. The results show good agreements between the numerical and the laboratory models. Important factors influencing bumps at bridge ends were also addressed in light of the model results.

Keywords: bridge approach slabs, bridge bump, hardening-soil, PLAXIS 2D, settlement

Procedia PDF Downloads 344
1026 The Flow Separation Delay on the Aircraft Wing

Authors: Ishtiaq A. Chaudhry, Z. R. Tahir, F. A. Siddiqui, Z. Anwar, F. Valenzuelacalva

Abstract:

A series of experiments involving the particle image velocimetry technique are carried out to analyse the quantitative effectiveness of the synthesized vortical structures towards actual flow separation control. The streamwise vortices are synthesized from the synthetic jet actuator and introduced into the attached and separating boundary layer developed on the flat plate surface. Two types of actuators with different geometrical set up are used to analyse the evolution of vortical structures in the near wall region and their impact towards achieving separation delay on the actual aircraft wing. Firstly a single circular jet is synthesized at varying actuator operating parameters and issued into the boundary layer to evaluate the dynamics of the interaction between the vortical structures and the near wall low momentum fluid in the separated region. Secondly, an array of jets has been issued into the artificially separated region to assess the effectiveness of various vortical structures towards achieving the reattachment of the separated flow in the streamwise direction.

Keywords: boundary layer, flow separation, streamwise vortices, synthetic jet actuator

Procedia PDF Downloads 461
1025 Optical Imaging Based Detection of Solder Paste in Printed Circuit Board Jet-Printing Inspection

Authors: D. Heinemann, S. Schramm, S. Knabner, D. Baumgarten

Abstract:

Purpose: Applying solder paste to printed circuit boards (PCB) with stencils has been the method of choice over the past years. A new method uses a jet printer to deposit tiny droplets of solder paste through an ejector mechanism onto the board. This allows for more flexible PCB layouts with smaller components. Due to the viscosity of the solder paste, air blisters can be trapped in the cartridge. This can lead to missing solder joints or deviations in the applied solder volume. Therefore, a built-in and real-time inspection of the printing process is needed to minimize uncertainties and increase the efficiency of the process by immediate correction. The objective of the current study is the design of an optimal imaging system and the development of an automatic algorithm for the detection of applied solder joints from optical from the captured images. Methods: In a first approach, a camera module connected to a microcomputer and LED strips are employed to capture images of the printed circuit board under four different illuminations (white, red, green and blue). Subsequently, an improved system including a ring light, an objective lens, and a monochromatic camera was set up to acquire higher quality images. The obtained images can be divided into three main components: the PCB itself (i.e., the background), the reflections induced by unsoldered positions or screw holes and the solder joints. Non-uniform illumination is corrected by estimating the background using a morphological opening and subtraction from the input image. Image sharpening is applied in order to prevent error pixels in the subsequent segmentation. The intensity thresholds which divide the main components are obtained from the multimodal histogram using three probability density functions. Determining the intersections delivers proper thresholds for the segmentation. Remaining edge gradients produces small error areas which are removed by another morphological opening. For quantitative analysis of the segmentation results, the dice coefficient is used. Results: The obtained PCB images show a significant gradient in all RGB channels, resulting from ambient light. Using different lightings and color channels 12 images of a single PCB are available. A visual inspection and the investigation of 27 specific points show the best differentiation between those points using a red lighting and a green color channel. Estimating two thresholds from analyzing the multimodal histogram of the corrected images and using them for segmentation precisely extracts the solder joints. The comparison of the results to manually segmented images yield high sensitivity and specificity values. Analyzing the overall result delivers a Dice coefficient of 0.89 which varies for single object segmentations between 0.96 for a good segmented solder joints and 0.25 for single negative outliers. Conclusion: Our results demonstrate that the presented optical imaging system and the developed algorithm can robustly detect solder joints on printed circuit boards. Future work will comprise a modified lighting system which allows for more precise segmentation results using structure analysis.

Keywords: printed circuit board jet-printing, inspection, segmentation, solder paste detection

Procedia PDF Downloads 332
1024 Semi-Automated Tracking of Vibrissal Movements in Free-Moving Rodents Captured by High-Speed Videos

Authors: Hyun June Kim, Tailong Shi, Seden Akdagli, Sam Most, Yuling Yan

Abstract:

Quantitative analysis of mouse whisker movement can be used to study functional recovery and regeneration of facial nerve after an injury. However, it is challenging to accurately track mouse whisker movements, and most whisker tracking methods require manual intervention, e.g. fixing the head of the mouse during a study. Here we describe a semi-automated image processing method that is applied to high-speed video recordings of free-moving mice to track whisker movements. We first track the head movement of a mouse by delineating the lower head contour frame-by-frame to locate and determine the orientation of its head. Then, a region of interest is identified for each frame, with subsequent application of the Hough transform to track individual whisker movements on each side of the head. Our approach is used to examine the functional recovery of damaged facial nerves in mice over a course of 21 days.

Keywords: mystacial macrovibrissae, whisker tracking, head tracking, facial nerve recovery

Procedia PDF Downloads 587
1023 Disrupting Traditional Industries: A Scenario-Based Experiment on How Blockchain-Enabled Trust and Transparency Transform Nonprofit Organizations

Authors: Michael Mertel, Lars Friedrich, Kai-Ingo Voigt

Abstract:

Based on principle-agent theory, an information asymmetry exists in the traditional donation process. Consumers cannot comprehend whether nonprofit organizations (NPOs) use raised funds according to the designated cause after the transaction took place (hidden action). Therefore, charity organizations have tried to appear transparent and gain trust by using the same marketing instruments for decades (e.g., releasing project success reports). However, none of these measures can guarantee consumers that charities will use their donations for the purpose. With awareness of misuse of donations rising due to the Ukraine conflict (e.g., funding crime), consumers are increasingly concerned about the destination of their charitable purposes. Therefore, innovative charities like the Human Rights Foundation have started to offer donations via blockchain. Blockchain technology has the potential to establish profound trust and transparency in the donation process: Consumers can publicly track the progress of their donation at any time after deciding to donate. This ensures that the charity is not using donations against its original intent. Hence, the aim is to investigate the effect of blockchain-enabled transactions on the willingness to donate. Sample and Design: To investigate consumers' behavior, we use a scenario-based experiment. After removing participants (e.g., due to failed attention checks), 3192 potential donors participated (47.9% female, 62.4% bachelor or above). Procedure: We randomly assigned the participants to one of two scenarios. In all conditions, the participants read a scenario about a fictive charity organization called "Helper NPO." Afterward, the participants answered questions regarding their perception of the charity. Manipulation: The first scenario (n = 1405) represents a typical donation process, where consumers donate money without any option to track and trace. The second scenario (n = 1787) represents a donation process via blockchain, where consumers can track and trace their donations respectively. Using t-statistics, the findings demonstrate a positive effect of donating via blockchain on participants’ willingness to donate (mean difference = 0.667, p < .001, Cohen’s d effect size = 0.482). A mediation analysis shows significant effects for the mediation of transparency (Estimate = 0.199, p < .001), trust (Estimate = 0.144, p < .001), and transparency and trust (Estimate = 0.158, p < .001). The total effect of blockchain usage on participants’ willingness to donate (Estimate = 0.690, p < .001) consists of the direct effect (Estimate = 0.189, p < .001) and the indirect effects of transparency and trust (Estimate = 0.501, p < .001). Furthermore, consumers' affinity for technology moderates the direct effect of blockchain usage on participants' willingness to donate (Estimate = 0.150, p < .001). Donating via blockchain is a promising way for charities to engage consumers for several reasons: (1) Charities can emphasize trust and transparency in their advertising campaigns. (2) Established charities can target new customer segments by specifically engaging technology-affine consumers in the future. (3) Charities can raise international funds without previous barriers (e.g., setting up bank accounts). Nevertheless, increased transparency can also backfire (e.g., disclosure of costs). Such cases require further research.

Keywords: blockchain, social sector, transparency, trust

Procedia PDF Downloads 94
1022 Human Identification and Detection of Suspicious Incidents Based on Outfit Colors: Image Processing Approach in CCTV Videos

Authors: Thilini M. Yatanwala

Abstract:

CCTV (Closed-Circuit-Television) Surveillance System is being used in public places over decades and a large variety of data is being produced every moment. However, most of the CCTV data is stored in isolation without having integrity. As a result, identification of the behavior of suspicious people along with their location has become strenuous. This research was conducted to acquire more accurate and reliable timely information from the CCTV video records. The implemented system can identify human objects in public places based on outfit colors. Inter-process communication technologies were used to implement the CCTV camera network to track people in the premises. The research was conducted in three stages and in the first stage human objects were filtered from other movable objects available in public places. In the second stage people were uniquely identified based on their outfit colors and in the third stage an individual was continuously tracked in the CCTV network. A face detection algorithm was implemented using cascade classifier based on the training model to detect human objects. HAAR feature based two-dimensional convolution operator was introduced to identify features of the human face such as region of eyes, region of nose and bridge of the nose based on darkness and lightness of facial area. In the second stage outfit colors of human objects were analyzed by dividing the area into upper left, upper right, lower left, lower right of the body. Mean color, mod color and standard deviation of each area were extracted as crucial factors to uniquely identify human object using histogram based approach. Color based measurements were written in to XML files and separate directories were maintained to store XML files related to each camera according to time stamp. As the third stage of the approach, inter-process communication techniques were used to implement an acknowledgement based CCTV camera network to continuously track individuals in a network of cameras. Real time analysis of XML files generated in each camera can determine the path of individual to monitor full activity sequence. Higher efficiency was achieved by sending and receiving acknowledgments only among adjacent cameras. Suspicious incidents such as a person staying in a sensitive area for a longer period or a person disappeared from the camera coverage can be detected in this approach. The system was tested for 150 people with the accuracy level of 82%. However, this approach was unable to produce expected results in the presence of group of people wearing similar type of outfits. This approach can be applied to any existing camera network without changing the physical arrangement of CCTV cameras. The study of human identification and suspicious incident detection using outfit color analysis can achieve higher level of accuracy and the project will be continued by integrating motion and gait feature analysis techniques to derive more information from CCTV videos.

Keywords: CCTV surveillance, human detection and identification, image processing, inter-process communication, security, suspicious detection

Procedia PDF Downloads 178
1021 Critical Analysis of Ideology of Non-Religious Spirituality (SBNR) Case Study of Sam Harris’ Theory

Authors: Muhammad Samiullah

Abstract:

Religion and spirit always goes side by side. In this era spirit and religion are studied separately with thought of an anti-religious phenomenon is there with its vast impacts. Non-religious mind and religious one have a lot of things that differs, they have spiritual struggles.so there is theme arises that is in the name of non-religious spirituality(SBNR). The thinking prevailing in west and now in east in reverse of the religious institutional thought and spirituality. Religious disputes created an image to the world that is nontolerant and companionate, rising a question of god existence and self-existence. Thus giving rise in Atheism, nihilism, free thinking. The thinking of spirituality also gone in another side with superstitions and spiritual meditation. Christian religious bodies and scholar criticized the stance with their religious aspect but there should be an Islamic counter narrative should be there. Here in this dissertation the phenomenon is addressed and analyzed in respect with some of the literature presented from 2014 till present year. The phenomenon was not analyzed before in broader sense. There are some introductory and static views presented in this regard. So there is a literature gap to be filled by this effort, the Muslim counter narrative is still not there though Christians do their part.

Keywords: SBNR, non-spirituality, superstitions, Sam Harris

Procedia PDF Downloads 85
1020 A New Distributed Computing Environment Based On Mobile Agents for Massively Parallel Applications

Authors: Fatéma Zahra Benchara, Mohamed Youssfi, Omar Bouattane, Hassan Ouajji, Mohamed Ouadi Bensalah

Abstract:

In this paper, we propose a new distributed environment for High Performance Computing (HPC) based on mobile agents. It allows us to perform parallel programs execution as distributed one over a flexible grid constituted by a cooperative mobile agent team works. The distributed program to be performed is encapsulated on team leader agent which deploys its team workers as Agent Virtual Processing Unit (AVPU). Each AVPU is asked to perform its assigned tasks and provides the computational results which make the data and team works tasks management difficult for the team leader agent and that influence the performance computing. In this work we focused on the implementation of the Mobile Provider Agent (MPA) in order to manage the distribution of data and instructions and to ensure a load balancing model. It grants also some interesting mechanisms to manage the others computing challenges thanks to the mobile agents several skills.

Keywords: image processing, distributed environment, mobile agents, parallel and distributed computing

Procedia PDF Downloads 400
1019 Remote Sensing of Urban Land Cover Change: Trends, Driving Forces, and Indicators

Authors: Wei Ji

Abstract:

This study was conducted in the Kansas City metropolitan area of the United States, which has experienced significant urban sprawling in recent decades. The remote sensing of land cover changes in this area spanned over four decades from 1972 through 2010. The project was implemented in two stages: the first stage focused on detection of long-term trends of urban land cover change, while the second one examined how to detect the coupled effects of human impact and climate change on urban landscapes. For the first-stage study, six Landsat images were used with a time interval of about five years for the period from 1972 through 2001. Four major land cover types, built-up land, forestland, non-forest vegetation land, and surface water, were mapped using supervised image classification techniques. The study found that over the three decades the built-up lands in the study area were more than doubled, which was mainly at the expense of non-forest vegetation lands. Surprisingly and interestingly, the area also saw a significant gain in surface water coverage. This observation raised questions: How have human activities and precipitation variation jointly impacted surface water cover during recent decades? How can we detect such coupled impacts through remote sensing analysis? These questions led to the second stage of the study, in which we designed and developed approaches to detecting fine-scale surface waters and analyzing coupled effects of human impact and precipitation variation on the waters. To effectively detect urban landscape changes that might be jointly shaped by precipitation variation, our study proposed “urban wetscapes” (loosely-defined urban wetlands) as a new indicator for remote sensing detection. The study examined whether urban wetscape dynamics was a sensitive indicator of the coupled effects of the two driving forces. To better detect this indicator, a rule-based classification algorithm was developed to identify fine-scale, hidden wetlands that could not be appropriately detected based on their spectral differentiability by a traditional image classification. Three SPOT images for years 1992, 2008, and 2010, respectively were classified with this technique to generate the four types of land cover as described above. The spatial analyses of remotely-sensed wetscape changes were implemented at the scales of metropolitan, watershed, and sub-watershed, as well as based on the size of surface water bodies in order to accurately reveal urban wetscape change trends in relation to the driving forces. The study identified that urban wetscape dynamics varied in trend and magnitude from the metropolitan, watersheds, to sub-watersheds in response to human impacts at different scales. The study also found that increased precipitation in the region in the past decades swelled larger wetlands in particular while generally smaller wetlands decreased mainly due to human development activities. These results confirm that wetscape dynamics can effectively reveal the coupled effects of human impact and climate change on urban landscapes. As such, remote sensing of this indicator provides new insights into the relationships between urban land cover changes and driving forces.

Keywords: urban land cover, human impact, climate change, rule-based classification, across-scale analysis

Procedia PDF Downloads 306
1018 Ankle Fracture Management: A Unique Cross Departmental Quality Improvement Project

Authors: Langhit Kurar, Loren Charles

Abstract:

Introduction: In light of recent BOAST 12 (August 2016) published guidance on management of ankle fractures, the project aimed to highlight key discrepancies throughout the care trajectory from admission to point of discharge at a district general hospital. Wide breadth of data covering three key domains: accident and emergency, radiology, and orthopaedic surgery were subsequently stratified and recommendations on note documentation, and outpatient follow up were made. Methods: A retrospective twelve month audit was conducted reviewing results of ankle fracture management in 37 patients. Inclusion criterion involved all patients seen at Darent Valley Hospital (DVH) emergency department with radiographic evidence of an ankle fracture. Exclusion criterion involved all patients managed solely by nursing staff or having sustained purely ligamentous injury. Medical notes, including discharge summaries and the PACS online radiographic tool were used for data extraction. Results: Cross-examination of the A & E domain revealed limited awareness of the BOAST 12 recent publication including requirements to document skin integrity and neurovascular assessment. This had direct implications as this would have changed the surgical plan for acutely compromised patients. The majority of results obtained from the radiographic domain were satisfactory with appropriate X-rays taken in over 95% of cases. However, due to time pressures within A & E, patients were often left without a post manipulation XRAY in a backslab. Poorly reduced fractures were subsequently left for a long period resulting in swollen ankles and a time-dependent lag to surgical intervention. This had knocked on implications for prolonged inpatient stay resulting in hospital-acquired co-morbidity including pressure sores. Discussion: The audit has highlighted several areas of improvement throughout the disease trajectory from review in the emergency department to follow up as an outpatient. This has prompted the creation of an algorithm to ensure patients with significant fractures presenting to the emergency department are seen promptly and treatment expedited as per recent guidance. This includes timing for X-rays taken in A & E. Re-audit has shown significant improvement in both documentation at time of presentation and appropriate follow-up strategies. Within the orthopedic domain, we are in the process of creating an ankle fracture pathway to ensure imaging and weight bearing status are made clear to the consulting clinicians in an outpatient setting. Significance/Clinical Relevance: As a result of the ankle fracture algorithm we have adapted the BOAST 12 guidance to shape an intrinsic pathway to not only improve patient management within the emergency department but also create a standardised format for follow up.

Keywords: ankle, fracture, BOAST, radiology

Procedia PDF Downloads 174
1017 Flow Control around Bluff Bodies by Attached Permeable Plates

Authors: Gokturk Memduh Ozkan, Huseyin Akilli

Abstract:

The aim of present study is to control the unsteady flow structure downstream of a circular cylinder by use of attached permeable plates. Particle image velocimetry (PIV) technique and dye visualization experiments were performed in deep water and the flow characteristics were evaluated by means of time-averaged streamlines, Reynolds Shear Stress and Turbulent Kinetic Energy concentrations. The permeable plate was made of a chrome-nickel screen having a porosity value of β=0.6 and it was attached on the cylinder surface along its midspan. Five different angles were given to the plate (θ=0°, 15°, 30°, 45°, 60°) with respect to the centerline of the cylinder in order to examine its effect on the flow control. It was shown that the permeable plate is effective on elongating the vortex formation length and reducing the fluctuations in the wake region. Compared to the plain cylinder, the reductions in the values of maximum Reynolds shear stress and Turbulent Kinetic Energy were evaluated as 72.5% and 66%, respectively for the plate angles of θ=45° and 60° which were also found to be suggested for applications concerning the vortex shedding and consequent Vortex-Induced Vibrations.

Keywords: bluff body, flow control, permeable plate, PIV, VIV, vortex shedding

Procedia PDF Downloads 358
1016 Walkability and Urban Social Identity

Authors: Reihaneh Rafiemanzelat

Abstract:

One of the most recent fields of investigation in urban issues focuses on the walkability in urban spaces. The paper aims to establish the theoretical relationship between the people's link with definite urban public spaces and the social identity processes derived from the relation with these places. The theoretical aspects which are examined for this purpose are: the concept of walkability and its developments and the social identity theories derived from walkable spaces. In fact, the paper presents the main results obtained from an empirical investigation which concern to the genesis of urban social identity in particular street as one of the main elements of public spaces in cities. İsmet İnönü Blvd which known as Salamis Street in Famagusta, North Cyprus is one of the main street in city whit high level of physical and social activities all the time. The urban social identity of users was analyzed, focusing on three main factors: walkability of space, social identification, and image of the space. These three factors were analyzed in relation to a series of items in the initial questionnaire, evaluation of existing natural resources, and environmental attitudes.

Keywords: walkability, urban public space, pedestrian, social activity, social identity

Procedia PDF Downloads 428
1015 The Role of Coaching in Fostering Entrepreneurial Intention among Graduate Students in Tunisia

Authors: Abdellatif Amouri, Sami Boudabbous

Abstract:

The current study provides insights on the importance of entrepreneurial coaching as a source of developing entrepreneurial intentions among entrepreneurs and a determinant factor of business creation process and growth. Coaching, which implies exchange of adequate information and a mutual understanding between entrepreneurs and their partners, requires a better mutual knowledge of the representations and the perceptions of ideas which are widely present in their dealings and transactions. Therefore, to analyze entrepreneurs’ perceptions of business creation, we addressed a survey questionnaire to a group of Tunisian entrepreneurs and experts in business creation to indicate their level of approval concerning the prominence of coaching. The factor analysis indicates that more than 60% of the respondents believe that each statement reflects an aspect of coaching, with no bias to its position in the entrepreneurial process. Therefore, the image drawn from our respondents’ perceptions is that an entrepreneur is rather "constructed" and "shaped" by multiple apprenticeships both before and during the entrepreneurial act, through an accompaniment process and within interactions with trainers, consultants or professionals in starting a business. Similarly, the results indicate that the poor support structures and lack of accompaniment procedures stand as an obstacle impeding the development of entrepreneurial intention among business creators.

Keywords: Entrepreneurial Behavior, Entrepreneurial Coaching, Entrepreneurial Intention, Perceptions, Venture Creation

Procedia PDF Downloads 430
1014 A Scoping Review of Technology-Facilitated Gender-Based Violence: Findings from Asia

Authors: Vaiddehi Bansal, Laura Hinson, Mayumi Rezwan, Erin Leasure, Mithila Iyer, Connor Roth, Poulomi Pal, Kareem Kysia

Abstract:

As digital usage becomes increasingly ubiquitous worldwide, technology-facilitated gender-based violence (GBV) has garnered increasing attention in the recent years, especially during the COVID-19 pandemic. This form of violence is defined as “action by one or more people that harms others based on their sexual or gender identity or by enforcing harmful gender norms. This action is carried out using the internet and/or mobile technology that harms others based on their sexual or gender identity or by enforcing harmful gender norms”.Common forms of technology-facilitated GBV include cyberstalking, cyberbullying, sexual harassment, image-based abuse, doxing, hacking, gendertrolling, hate speech, and impersonation. Most literature on this pervasive yet complex issue has emerged from high-income countries, and few studies comprehensively summarize its prevalence, manifestations, and implications. This rigorous scoping review examines the evidence base of this phenomenon in low and middle-income countries across Asia, summarizing trends and gaps to inform actionable recommendations. The research team developed search terms to conduct a comprehensive search of peer-reviewed and grey literature. Query results were eligible for inclusion if they were published in English between 2006-2021 and with an explicit emphasis on technology-facilitated violence, gender, and the countries of interest in the Asia region. Title, abstracts, and full-texts were independently screened by two reviewers based on inclusion criteria, and data was extracted through deductive coding. Of 2,042 articles screened, 97 met inclusion criteria. The review revealed a gap in the evidence-base in Central Asia and the Pacific Islands. Findings across South and Southeast Asia indicate that technology-facilitated GBV comprises various forms of abuse, violence, and harassment that are largely shaped by country-specific societal norms and technological landscapes. The literature confirms that women, girls, and sexual minorities, especially those with intersecting marginalized identities, are often more vulnerable to experiencing online violence. Cultural norms and patriarchal structures tend to stigmatize survivors, limiting their ability to seek social and legal support. Survivors are also less likely to report their experience due to barriers such as lack of awareness of reporting mechanisms, the perception that digital platforms will not address their complaints, and cumbersome reporting systems. The COVID-19 pandemic has further exacerbated perpetration and strained support mechanisms. Prevalence varies by the form of violence but is difficult to estimate accurately due to underreporting and disjointed, outdated, or non-existent legal definitions. Addressing technology-facilitated GBV in Asia requires collective action from multiple actors, including government authorities, technology companies, digital and feminist movements, NGOs, and researchers.

Keywords: gender-based violence, technology, online sexual harassment, image-based abuse

Procedia PDF Downloads 128
1013 Corrosion Behaviour of Hypereutectic Al-Si Automotive Alloy in Different pH Environment

Authors: M. Al Nur, M. S. Kaiser

Abstract:

Corrosion behaviour of hypereutectic Al-19Si automotive alloy in different pH=1, 3, 5, 7, 9, 11, and 13 environments was carried out using conventional gravimetric measurements and was complemented by resistivity, optical micrograph, scanning electron microscopy (SEM) and X-ray analyzer (EDX) investigations. Gravimetric analysis confirmed that the highest corrosion rate is shown at pH 13 followed by pH 1. Minimum corrosion occurs in the pH range of 3.0 to 11 due to establishment of passive layer on the surface. The highest corrosion rate at pH 13 is due to the presence of sodium hydroxide in the solution which dissolves the surface oxide film at a steady rate. At pH 1, it can be attributed that the presence of aggressive chloride ions serves to pick up the damage of the passive films at localized regions. With varying exposure periods by both, the environment complies with the normal corrosion rate profile that is an initial steep rise followed by a nearly constant value of corrosion rate. Resistivity increases in case of pH 1 solution for the higher pit formation and decreases at pH 13 due to formation of thin film. The SEM image of corroded samples immersed in pH 1 solution clearly shows pores on the surface and in pH 13 solution, and the corrosion layer seems more compact and homogenous and not porous.

Keywords: Al-Si alloy, corrosion, pH, resistivity, scanning electron microscopy (SEM)

Procedia PDF Downloads 163
1012 A Practical and Efficient Evaluation Function for 3D Model Based Vehicle Matching

Authors: Yuan Zheng

Abstract:

3D model-based vehicle matching provides a new way for vehicle recognition, localization and tracking. Its key is to construct an evaluation function, also called fitness function, to measure the degree of vehicle matching. The existing fitness functions often poorly perform when the clutter and occlusion exist in traffic scenarios. In this paper, we present a practical and efficient fitness function. Unlike the existing evaluation functions, the proposed fitness function is to study the vehicle matching problem from both local and global perspectives, which exploits the pixel gradient information as well as the silhouette information. In view of the discrepancy between 3D vehicle model and real vehicle, a weighting strategy is introduced to differently treat the fitting of the model’s wireframes. Additionally, a normalization operation for the model’s projection is performed to improve the accuracy of the matching. Experimental results on real traffic videos reveal that the proposed fitness function is efficient and robust to the cluttered background and partial occlusion.

Keywords: 3D-2D matching, fitness function, 3D vehicle model, local image gradient, silhouette information

Procedia PDF Downloads 393
1011 Potential Effects of Green Infrastructures on the Land Surface Temperatures in Arid Areas

Authors: Adila Shafqat

Abstract:

Climate change and urbanization has changed the face of many cities in developing countries. Urbanization is linked with land use and land cover change, that is further intensify by the effects of changing climates. Green infrastructures provide numerous ecosystem services which effect the physical set up of the cities in the long run. Land surface temperatures is considered as defining parameter in the studies of the thermal impact on the land cover. Current study is conducted in the semi-arid urban areas of the Bahawalpur region. Accordingly, Land Surface Temperatures and land cover maps are derived from Landsat image through remote sensing techniques. The cooling impact of green infrastructure is determined by calculating land surface temperature of buffered zones around green infrastructures. A regression model is applied for results. It is seen that land surface temperature around green infrastructures in 1 to 3 degrees lower than the built up surroundings. The result indicates that the urban green infrastructures should be planned according to the local needs and characteristics of landuse so that they can effectively tackle land surface temperatures of urban areas.

Keywords: climate change, surface temperatures, green spaces, urban planning

Procedia PDF Downloads 114
1010 Vehicle Detection and Tracking Using Deep Learning Techniques in Surveillance Image

Authors: Abe D. Desta

Abstract:

This study suggests a deep learning-based method for identifying and following moving objects in surveillance video. The proposed method uses a fast regional convolution neural network (F-RCNN) trained on a substantial dataset of vehicle images to first detect vehicles. A Kalman filter and a data association technique based on a Hungarian algorithm are then used to monitor the observed vehicles throughout time. However, in general, F-RCNN algorithms have been shown to be effective in achieving high detection accuracy and robustness in this research study. For example, in one study The study has shown that the vehicle detection and tracking, the system was able to achieve an accuracy of 97.4%. In this study, the F-RCNN algorithm was compared to other popular object detection algorithms and was found to outperform them in terms of both detection accuracy and speed. The presented system, which has application potential in actual surveillance systems, shows the usefulness of deep learning approaches in vehicle detection and tracking.

Keywords: artificial intelligence, computer vision, deep learning, fast-regional convolutional neural networks, feature extraction, vehicle tracking

Procedia PDF Downloads 120
1009 How Whatsappization of the Chatbot Affects User Satisfaction, Trust, and Acceptance in a Drive-Sharing Task

Authors: Nirit Gavish, Rotem Halutz, Liad Neta

Abstract:

Nowadays, chatbots are gaining more and more attention due to the advent of large language models. One of the important considerations in chatbot design is how to create an interface to achieve high user satisfaction, trust, and acceptance. Since WhatsApp conversations sometimes substitute for face-to-face communication, we studied whether WhatsAppization of the chatbot -making the conversation resemble a WhatsApp conversation more- will improve user satisfaction, trust, and acceptance, or whether the opposite will occur due to the Uncanny Valley (UV) effect. The task was a drive-sharing task, in which participants communicated with a textual chatbot via WhatsApp and could decide whether to participate in a ride to college with a driver suggested by the chatbot. WhatsAppization of the chatbot was done in two ways: By a dialog-style conversation (Dialog versus No Dialog), and by adding WhatsApp indicators – “Last Seen”, “Connected”, “Read Receipts”, and “Typing…” (Indicators versus No Indicators). Our 120 participants were randomly assigned to one of the four 2 by 2 design groups, with 30 participants in each. They interacted with the WhatsApp chatbot and then filled out a questionnaire. The results demonstrated that, as expected from the manipulation, the interaction with the chatbot was longer for the dialog condition compared to the no dialog. This extra interaction, however, did not lead to higher acceptance -quite the opposite, since participants in the dialog condition were less willing to implement the decision made at the end of the conversation with the chatbot and continue the interaction with the driver they chose. The results are even more striking when considering the Indicators condition. Both for the satisfaction measures and the trust measures, participants’ ratings were lower in the Indicators condition compared to the No Indicators. Participants in the Indicators condition felt that the ride search process was harder to operate, and slower (even though the actual interaction time was similar). They were less convinced that the chatbot suggested real trips and they trusted the person offering the ride and referred to them by the chatbot less. These effects were more evident for participants who preferred to share their rides using WhatsApp compared to participants who preferred chatbots for that purpose. Considering our findings, we can say that the WhatsAppization of the chatbot was detrimental. This is true for the both chatbot WhatsAppization methods – by making the conversation more a dialog and adding WhatsApp indicators. For the chosen drive-sharing task, the results were, in addition to lower satisfaction, less trust in the chatbot’s suggestion and even in the driver suggested by the chatbot, and lower willingness to actually undertake the suggested ride. In addition, it seems that the most problematic WhatsAppization method was using WhatsApp’s indicators during the interaction with the chatbot. The current study suggests that a conversation with an artificial agent should also not imitate a WhatsApp conversation very closely. With the proliferation of WhatsApp use, the emotional and social aspect of face-to face commination are moving to WhatsApp communication. Based on the current study’s findings, it is possible that the UV effect also occurs in WhatsAppization, and not only in humanization, of the chatbot, with a similar feeling of eeriness, and is more pronounced for people who prefer to use WhatsApp over chatbots. The current research can serve as a starting point to study the very interesting and important topic of chatbots WhatsAppization. More methods of WhatsAppization and other tasks could be the focus of further studies.

Keywords: chatbot, WhatsApp, humanization, Uncanny Valley, drive sharing

Procedia PDF Downloads 44
1008 Assessing Land Cover Change Trajectories in Olomouc, Czech Republic

Authors: Mukesh Singh Boori, Vít Voženílek

Abstract:

Olomouc is a unique and complex landmark with widespread forestation and land use. This research work was conducted to assess important and complex land use change trajectories in Olomouc region. Multi-temporal satellite data from 1991, 2001 and 2013 were used to extract land use/cover types by object oriented classification method. To achieve the objectives, three different aspects were used: (1) Calculate the quantity of each transition; (2) Allocate location based landscape pattern (3) Compare land use/cover evaluation procedure. Land cover change trajectories shows that 16.69% agriculture, 54.33% forest and 21.98% other areas (settlement, pasture and water-body) were stable in all three decade. Approximately 30% of the study area maintained as a same land cove type from 1991 to 2013. Here broad scale of political and socio-economic factors was also affect the rate and direction of landscape changes. Distance from the settlements was the most important predictor of land cover change trajectories. This showed that most of landscape trajectories were caused by socio-economic activities and mainly led to virtuous change on the ecological environment.

Keywords: remote sensing, land use/cover, change trajectories, image classification

Procedia PDF Downloads 400
1007 Face Recognition Using Eigen Faces Algorithm

Authors: Shweta Pinjarkar, Shrutika Yawale, Mayuri Patil, Reshma Adagale

Abstract:

Face recognition is the technique which can be applied to the wide variety of problems like image and film processing, human computer interaction, criminal identification etc. This has motivated researchers to develop computational models to identify the faces, which are easy and simple to implement. In this, demonstrates the face recognition system in android device using eigenface. The system can be used as the base for the development of the recognition of human identity. Test images and training images are taken directly with the camera in android device.The test results showed that the system produces high accuracy. The goal is to implement model for particular face and distinguish it with large number of stored faces. face recognition system detects the faces in picture taken by web camera or digital camera and these images then checked with training images dataset based on descriptive features. Further this algorithm can be extended to recognize the facial expressions of a person.recognition could be carried out under widely varying conditions like frontal view,scaled frontal view subjects with spectacles. The algorithm models the real time varying lightning conditions. The implemented system is able to perform real-time face detection, face recognition and can give feedback giving a window with the subject's info from database and sending an e-mail notification to interested institutions using android application. Face recognition is the technique which can be applied to the wide variety of problems like image and film processing, human computer interaction, criminal identification etc. This has motivated researchers to develop computational models to identify the faces, which are easy and simple to implement. In this , demonstrates the face recognition system in android device using eigenface. The system can be used as the base for the development of the recognition of human identity. Test images and training images are taken directly with the camera in android device.The test results showed that the system produces high accuracy. The goal is to implement model for particular face and distinguish it with large number of stored faces. face recognition system detects the faces in picture taken by web camera or digital camera and these images then checked with training images dataset based on descriptive features. Further this algorithm can be extended to recognize the facial expressions of a person.recognition could be carried out under widely varying conditions like frontal view,scaled frontal view subjects with spectacles. The algorithm models the real time varying lightning conditions. The implemented system is able to perform real-time face detection, face recognition and can give feedback giving a window with the subject's info from database and sending an e-mail notification to interested institutions using android application.

Keywords: face detection, face recognition, eigen faces, algorithm

Procedia PDF Downloads 355
1006 Existence of Nano-Organic Carbon Particles below the Size Range of 10 nm in the Indoor Air Environment

Authors: Bireswar Paul, Amitava Datta

Abstract:

Indoor air environment is a big concern in the last few decades in the developing countries, with increased focus on monitoring the air quality. In this work, an experimental study has been conducted to establish the existence of carbon nanoparticles below the size range of 10 nm in the non-sooting zone of a LPG/air partially premixed flame. Mainly, four optical techniques, UV absorption spectroscopy, fluorescence spectroscopy, dynamic light scattering and TEM have been used to characterize and measure the size of carbon nanoparticles in the sampled materials collected from the inner surface of the flame front. The existence of the carbon nanoparticles in the sampled material has been confirmed with the typical nature of the absorption and fluorescence spectra already reported in the literature. The band gap energy shows that the particles are made up of three to six aromatic rings. The size measurement by DLS technique also shows that the particles below the size range of 10 nm. The results of DLS are also corroborated by the TEM image of the same material. 

Keywords: indoor air, carbon nanoparticle, lpg, partially premixed flame, optical techniques

Procedia PDF Downloads 274
1005 Improved Anatomy Teaching by the 3D Slicer Platform

Authors: Ahmedou Moulaye Idriss, Yahya Tfeil

Abstract:

Medical imaging technology has become an indispensable tool in many branches of the biomedical, health area, and research and is vitally important for the training of professionals in these fields. It is not only about the tools, technologies, and knowledge provided but also about the community that this training project proposes. In order to be able to raise the level of anatomy teaching in the medical school of Nouakchott in Mauritania, it is necessary and even urgent to facilitate access to modern technology for African countries. The role of technology as a key driver of justifiable development has long been recognized. Anatomy is an essential discipline for the training of medical students; it is a key element for the training of medical specialists. The quality and results of the work of a young surgeon depend on his better knowledge of anatomical structures. The teaching of anatomy is difficult as the discipline is being neglected by medical students in many academic institutions. However, anatomy remains a vital part of any medical education program. When anatomy is presented in various planes medical students approve of difficulties in understanding. They do not increase their ability to visualize and mentally manipulate 3D structures. They are sometimes not able to correctly identify neighbouring or associated structures. This is the case when they have to make the identification of structures related to the caudate lobe when the liver is moved to different positions. In recent decades, some modern educational tools using digital sources tend to replace old methods. One of the main reasons for this change is the lack of cadavers in laboratories with poorly qualified staff. The emergence of increasingly sophisticated mathematical models, image processing, and visualization tools in biomedical imaging research have enabled sophisticated three-dimensional (3D) representations of anatomical structures. In this paper, we report our current experience in the Faculty of Medicine in Nouakchott Mauritania. One of our main aims is to create a local learning community in the fields of anatomy. The main technological platform used in this project is called 3D Slicer. 3D Slicer platform is an open-source application available for free for viewing, analysis, and interaction with biomedical imaging data. Using the 3D Slicer platform, we created from real medical images anatomical atlases of parts of the human body, including head, thorax, abdomen, liver, and pelvis, upper and lower limbs. Data were collected from several local hospitals and also from the website. We used MRI and CT-Scan imaging data from children and adults. Many different anatomy atlases exist, both in print and digital forms. Anatomy Atlas displays three-dimensional anatomical models, image cross-sections of labelled structures and source radiological imaging, and a text-based hierarchy of structures. Open and free online anatomical atlases developed by our anatomy laboratory team will be available to our students. This will allow pedagogical autonomy and remedy the shortcomings by responding more fully to the objectives of sustainable local development of quality education and good health at the national level. To make this work a reality, our team produced several atlases available in our faculty in the form of research projects.

Keywords: anatomy, education, medical imaging, three dimensional

Procedia PDF Downloads 233
1004 Experimental Study on Aerodynamic Noise of Radiator Cooling Fan with Different Diameter in Hemi-Anechoic Chamber

Authors: Malinda Sabrina, F. Andree Yohanes, Khoerul Anwar

Abstract:

There are many sources that cause noise in a car, one of them is noise from radiator cooling fan. This part is used to control engine temperature by ensuring adequate airflow through radiator. Radiator cooling fan noise is a very important matter especially for vehicle manufacturers. This can affect brand image of the car and their customer satisfaction. Therefore, some experiments to measure noise level of the fan are required. Sound pressure level measurements for two axial fans with different diameter have been investigated in a hemi-anechoic chamber based on standard JIS-B8346, focusing on aerodynamic noise. Both fans have the same profile and shape with diameter respectively 43 cm and 49 cm. The measurement was performed in hemi-anechoic chamber in order to obtain a background noise at measuring point as low as possible. Noise characterizations of these radiator cooling fans were measured in five different rotating speed and the results were compared. The measurement result shows that the sound pressure level increases with increasing rotational speed of the fan. In comparison with a smaller diameter, it is shown that fan with larger diameter produces higher noise level at the same rotational speed.

Keywords: aerodynamics noise, hemi-anechoic chamber, radiator cooling fan, sound pressure level

Procedia PDF Downloads 328
1003 Characteristics of Female Offenders: Using Childhood Victimization Model for Treatment

Authors: Jane E. Hill

Abstract:

Sexual, physical, or emotional abuses are behaviors used by one person in a relationship or within a family unit to control the other person. Physical abuse can consist of, but not limited to hitting, pushing, and shoving. Sexual abuse is unwanted or forced sexual activity on a person without their consent. Abusive behaviors include intimidation, manipulation, humiliation, isolation, frightening, terrorizing, coercing, threatening, blaming, hurting, injuring, or wounding another individual. Although emotional, psychological and financial abuses are not criminal behaviors, they are forms of abuse and can leave emotional scars on their victim. The purpose of this literature review research was to examine characteristics of female offenders, past abuse, and pathways to offending. The question that guided this research: does past abuse influence recidivism? The theoretical foundation used was relational theory by Jean Baker Miller. One common feature of female offenders is abuse (sexual, physical, or verbal). Abuse can cause mental illnesses and substance abuse. The abuse does not directly affect the women's recidivism. However, results indicated the psychological and maladaptive behaviors as a result of the abuse did contribute to indirect pathways to continue offending. The female offenders’ symptoms of ongoing depression, anxiety, and engaging in substance abuse (self medicating) did lead to the women's incarceration. Using the childhood victimization model as the treatment approach for women's mental illness and substance abuse disorders that were a result from history of child abuse have shown success. With that in mind, if issues surrounding early victimization are not addressed, then the women offenders may not recover from their mental illness or addiction and are at a higher risk of reoffending. However, if the women are not emotionally ready to engage in the treatment process, then it should not be forced onto them because it may cause harm (targeting prior traumatic experiences). Social capital is family support and sources that assist in helping the individual with education, employment opportunities that can lead to success. Human capital refers to internal knowledge, skills, and capacities that help the individual act in new and appropriate ways. The lack of human and social capital is common among female offenders, which leads to extreme poverty and economic marginalization, more often in frequent numbers than men. In addition, the changes in welfare reform have exacerbated women’s difficulties in gaining adequate-paying jobs to support themselves and their children that have contributed to female offenders reoffending. With that in mind, one way to lower the risk factor of female offenders from reoffending is to provide them with educational and vocational training, enhance their self-efficacy, and teach them appropriate coping skills and life skills. Furthermore, it is important to strengthen family bonds and support. Having a supportive family relationship was a statistically significant protective factor for women offenders.

Keywords: characteristics, childhood victimization model, female offenders, treatment

Procedia PDF Downloads 109
1002 The State Support to the Tourism Policy Formation Mechanism in Black Sea Basin Countries (Azerbaijan, Turkey, Russia, Georgia) and Its Impact on Sustainable Tourism Development

Authors: A. Bahar Ganiyeva, M. Sabuhi Tanriverdiyev

Abstract:

The article analyzes state support and policy mechanisms aimed at driving tourism as one of the vibrant and rapidly developing economies. State programs and long-range strategic roadmaps and previous programs execution, results and their impact on the particular countries economy have been raised during the research. This theme provides a useful framework for discussions with a wider range of stakeholders as the implications arising are of importance both for academics and practitioners engaged in hospitality and tourism development and research. The impact that tourism has on sustainable regional development in emerging markets is highly substantial. For Azerbaijan, Turkey, Georgia, and Russia, with their rich natural resources and cultural heritage, tourism can be an important basis for economic expansion, and a way to form an acceptable image of the countries as safe, open, hospitable, and complex.

Keywords: Sustainable tourism, hospitality, destination, strategic roadmap, tourism, economy, growth, state support, mechanism, policy formation, state program

Procedia PDF Downloads 152
1001 Comparative Study of Titanium and Polyetheretherketone Cranial Implant Using Finite Element Model

Authors: Khaja Moiduddin, Sherif Mohammed Elseufy, Hisham Alkhalefah

Abstract:

Recent advances in three-dimensional (3D) printing, medical imaging, and implant design may alter how craniomaxillofacial surgeons construct individualized treatments using patient data. By utilizing medical image data, medical professionals can obtain detailed information about a patient's injuries, enabling them to conduct a thorough preoperative assessment while ensuring the implant's accuracy. However, selecting the right implant material requires careful consideration of various mechanical properties. This study aims to compare the two commonly used implant material for cranial reconstruction which includes titanium (Ti6Al4V) and Polyetheretherketone (PEEK). Biomechanical analysis was performed to study the implant behavior, by keeping the implant design and fixation constant in both cases. A finite element model was created and analyzed under loading conditions. The finite element analysis proves that although Ti6Al4V is stronger than PEEK but, its mechanical strength is adequate to bear the loads of the adjacent bone tissue.

Keywords: cranial reconstruction, titanium implants, PEEK, finite element model

Procedia PDF Downloads 64
1000 Product Features Extraction from Opinions According to Time

Authors: Kamal Amarouche, Houda Benbrahim, Ismail Kassou

Abstract:

Nowadays, e-commerce shopping websites have experienced noticeable growth. These websites have gained consumers’ trust. After purchasing a product, many consumers share comments where opinions are usually embedded about the given product. Research on the automatic management of opinions that gives suggestions to potential consumers and portrays an image of the product to manufactures has been growing recently. After launching the product in the market, the reviews generated around it do not usually contain helpful information or generic opinions about this product (e.g. telephone: great phone...); in the sense that the product is still in the launching phase in the market. Within time, the product becomes old. Therefore, consumers perceive the advantages/ disadvantages about each specific product feature. Therefore, they will generate comments that contain their sentiments about these features. In this paper, we present an unsupervised method to extract different product features hidden in the opinions which influence its purchase, and that combines Time Weighting (TW) which depends on the time opinions were expressed with Term Frequency-Inverse Document Frequency (TF-IDF). We conduct several experiments using two different datasets about cell phones and hotels. The results show the effectiveness of our automatic feature extraction, as well as its domain independent characteristic.

Keywords: opinion mining, product feature extraction, sentiment analysis, SentiWordNet

Procedia PDF Downloads 403
999 The Change of Urban Land Use/Cover Using Object Based Approach for Southern Bali

Authors: I. Gusti A. A. Rai Asmiwyati, Robert J. Corner, Ashraf M. Dewan

Abstract:

Change on land use/cover (LULC) dominantly affects spatial structure and function. It can have such impacts by disrupting social culture practice and disturbing physical elements. Thus, it has become essential to understand of the dynamics in time and space of LULC as it can be used as a critical input for developing sustainable LULC. This study was an attempt to map and monitor the LULC change in Bali Indonesia from 2003 to 2013. Using object based classification to improve the accuracy, and change detection, multi temporal land use/cover data were extracted from a set of ASTER satellite image. The overall accuracies of the classification maps of 2003 and 2013 were 86.99% and 80.36%, respectively. Built up area and paddy field were the dominant type of land use/cover in both years. Patch increase dominantly in 2003 illustrated the rapid paddy field fragmentation and the huge occurring transformation. This approach is new for the case of diverse urban features of Bali that has been growing fast and increased the classification accuracy than the manual pixel based classification.

Keywords: land use/cover, urban, Bali, ASTER

Procedia PDF Downloads 539