Search results for: image security
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 5488

Search results for: image security

3388 Influence of Different Ripening Agents on the Shelf-Life and Microbial Load of Organic and Inorganic Musaceae, during the Ripening Process, and the Health Implication for Food Security

Authors: Wisdom Robert Duruji

Abstract:

Local farmers and fruit processors in developing countries of West Africa use different ripening agents to accelerate the ripening process of plantain and banana. This study reports on the influence of different ripening agents on the shelf-life and microbial load of organic and inorganic plantain (Musa paradisiaca) and banana (Musa sapientum) during ripening process and the health implication for food security in Nigeria. The experiment consisted of four treatments, namely: Calcium carbide, Irvingia gabonensis fruits, Newbouldia laevis leaves and a control, where no ripening agent was applied to the fingers of plantain and banana. The unripe and ripened plantain and banana were subjected to microbial analysis by isolating their micro flora (Bacteria, Yeast and Mould) using pour plate method. Microbes present in the samples were enumerated, characterized and classified to genera and species. The result indicated that the microbial load of inorganic plantain from (Urban day) open market in Ile-Ife increased from 8.00 for unripe to 12.11 cfu/g for ripened; and the microbial load of organic plantain from Obafemi Awolowo University Teaching and Research Farm (OAUTRF) increased from 6.00 for unripe to 11.60 cfu/g for ripened. Also, the microbial load of inorganic banana from (Urban day) open market in Ile-Ife increased from 8.00 for unripe to 11.50 cfu/g for ripened; while the microbial load of organic banana from OAUTRF increased from 6.50 for unripe to 9.40 cfu/g for ripened. The microbial effects of the ripening agents increased from 10.00 for control to 16.00 cfu/g for treated (ripened) organic and inorganic plantain; while that of organic and inorganic banana increased from 7.50 for control to 14.50 cfu/g for ripened. Visual observation for the presence of fungal colonies and deterioration rates were monitored till seven days after the plantain and banana fingers have fully ripened. Inorganic plantain and banana from (Urban day) open market in Ile-Ife are more contaminated than organic plantain and banana fingers from OAUTRF. The ripening accelerators reduced the shelf life, increased senescence, and microbial load of plantain and banana. This study concluded that organic Agriculture is better and microbial friendlier than inorganic farming.

Keywords: organic agriculture, food security, Musaceae, calcium carbide, Irvingia gabonensis, Newbouldia laevis

Procedia PDF Downloads 597
3387 Criminal Attitude vs Transparency in the Arab World

Authors: Keroles Akram Saed Ghatas

Abstract:

The political violence that characterized 1992 continued into 1993, creating a major security crisis for President Hosni Mubarak's government as the death toll and human rights abuses soared. Increasingly sensitive to criticism of 's human rights activities, the government established human rights departments in key ministries, beginning with the Foreign Office in February. Similar offices have been set up in the Justice and Agriculture Ministries, and plans to set up an office in the Home Office have been announced. It turned out that the main task of the law unit was to overturn the conclusions of international human rights organizations.President Mubarak was elected in a national referendum on October 4 for a third six-year term after being appointed on July 21 by the People's Assembly, an elected parliament overwhelmingly dominated by the in-power National Democratic Party will Mr. Mubarak ran unhindered. The Interior Ministry announced that nearly 16 million people cast their votes (84% of eligible voters), of which 96.28%. voted for presidential re-election.In 1993, armed Islamic extremists escalated their attacks on Christian citizens, government officials, police officers and senior security officials, resulting in casualties among the intended victims and bystanders. Sporadic attacks on buses, boats and tourist attractions also occurred throughout the year. From March 1992 to October 28, 1993, a total of 222 people lost their lives in the riots: 36 Coptic Christians and 38 other citizens; If one is a foreigner; sixty-six members of the Security Forces; and seventy-six known or suspected activists who were killed while resisting arrest. The latter was killed in airstrikes and firefights with security forces and at the site of planned attacks. On March 9-10, a series of airstrikes in Cairo, Giza, Qalyubiya province north of the capital and Aswan killed fifteen suspected militants and five members of the security forces.One of the airstrikes in Giza, part of Greater Cairo, killed the wife and son of Khalifa Mahmoud Ramadan, a suspected militant who was himself killed. The government agency Middle East News Agency reported on March 10 that the raids were part of a "broad confrontational plan aimed at ofterrorist elements"The state of emergency declared in October 1981 after the assassination of President Anwar el-Sadat was still in force in Egypt. The law, previously in effect continuously from June 1967 to May 1980, continued to grant the executive branch unique legal powers that effectively overrode the human rights guarantees of the Egyptian constitution. These provisions included wide discretionary powers in arresting and detaining individuals, as well as the ability to try civilians in military courts. The Cairo-based Independent Organization for Human Rights said so in a document sent to the United Nations in July 1993The human rights committee said the continued imposition of the state of emergency had resulted in "another constitution for the country" and "led to widespread misconduct by the security apparatus".

Keywords: constitution, human rights, legal power, president, anwar, el-sadat, assassination, state of emergency, middle east, news, agency, confrontational, arresting, fugitive, leaders, terrorist, elements, armed islamic extremists.

Procedia PDF Downloads 50
3386 Anti-crisis Public Relations and Aspects of Effective Management in Georgian Companies

Authors: Marine Kobalava

Abstract:

Introduction. The paper substantiates the crucial role of anti-crisis PR in managing the image and reputation of companies. The critical situation caused by the Covid-19 virus in various countries of the world and the actions taken have had a significant negative impact on the image of companies and public groups. The mentioned circumstance has caused some problems for companies’ products in terms of customer demand. Accordingly, the main goal of PR has become to achieve the optimal relationship between companies and society with effective management. It should also be taken into account that the range of action of PR in crisis situations is much wider than that of advertising. In the paper, Public Relations is evaluated as a determining factor of the companies' prestige, its reliability, which has a decisive effect on the goodwill, trust, and general reputation of the public towards the company. The purpose of the study is to reveal the challenges of anti-crisis PR in Georgian companies and to develop recommendations on effective management mechanisms. Methodologies. Analysis, induction, synthesis, and other methods are used in the paper; Matrix and SWOT analysis are constructed. Ways of establishing and implementing an anti-crisis PR system in companies are proposed. The main aspects of anti-crisis management are identified by using the matrix of the choice of diversification strategy of the companies' activities, the possibilities of making adequate decisions using PR are studied according to the characteristics of the companies' activities and priority directions. Conclusion. The paper draws conclusions on modern problems of anti-crisis PR, offers recommendations on ways to solve it through PR strategies.

Keywords: anti-crisis PR, effective management, company, PR strategy

Procedia PDF Downloads 85
3385 A Supervised Learning Data Mining Approach for Object Recognition and Classification in High Resolution Satellite Data

Authors: Mais Nijim, Rama Devi Chennuboyina, Waseem Al Aqqad

Abstract:

Advances in spatial and spectral resolution of satellite images have led to tremendous growth in large image databases. The data we acquire through satellites, radars and sensors consists of important geographical information that can be used for remote sensing applications such as region planning, disaster management. Spatial data classification and object recognition are important tasks for many applications. However, classifying objects and identifying them manually from images is a difficult task. Object recognition is often considered as a classification problem, this task can be performed using machine-learning techniques. Despite of many machine-learning algorithms, the classification is done using supervised classifiers such as Support Vector Machines (SVM) as the area of interest is known. We proposed a classification method, which considers neighboring pixels in a region for feature extraction and it evaluates classifications precisely according to neighboring classes for semantic interpretation of region of interest (ROI). A dataset has been created for training and testing purpose; we generated the attributes by considering pixel intensity values and mean values of reflectance. We demonstrated the benefits of using knowledge discovery and data-mining techniques, which can be on image data for accurate information extraction and classification from high spatial resolution remote sensing imagery.

Keywords: remote sensing, object recognition, classification, data mining, waterbody identification, feature extraction

Procedia PDF Downloads 342
3384 Detection of Curvilinear Structure via Recursive Anisotropic Diffusion

Authors: Sardorbek Numonov, Hyohun Kim, Dongwha Shin, Yeonseok Kim, Ji-Su Ahn, Dongeun Choi, Byung-Woo Hong

Abstract:

The detection of curvilinear structures often plays an important role in the analysis of images. In particular, it is considered as a crucial step for the diagnosis of chronic respiratory diseases to localize the fissures in chest CT imagery where the lung is divided into five lobes by the fissures that are characterized by linear features in appearance. However, the characteristic linear features for the fissures are often shown to be subtle due to the high intensity variability, pathological deformation or image noise involved in the imaging procedure, which leads to the uncertainty in the quantification of anatomical or functional properties of the lung. Thus, it is desired to enhance the linear features present in the chest CT images so that the distinctiveness in the delineation of the lobe is improved. We propose a recursive diffusion process that prefers coherent features based on the analysis of structure tensor in an anisotropic manner. The local image features associated with certain scales and directions can be characterized by the eigenanalysis of the structure tensor that is often regularized via isotropic diffusion filters. However, the isotropic diffusion filters involved in the computation of the structure tensor generally blur geometrically significant structure of the features leading to the degradation of the characteristic power in the feature space. Thus, it is required to take into consideration of local structure of the feature in scale and direction when computing the structure tensor. We apply an anisotropic diffusion in consideration of scale and direction of the features in the computation of the structure tensor that subsequently provides the geometrical structure of the features by its eigenanalysis that determines the shape of the anisotropic diffusion kernel. The recursive application of the anisotropic diffusion with the kernel the shape of which is derived from the structure tensor leading to the anisotropic scale-space where the geometrical features are preserved via the eigenanalysis of the structure tensor computed from the diffused image. The recursive interaction between the anisotropic diffusion based on the geometry-driven kernels and the computation of the structure tensor that determines the shape of the diffusion kernels yields a scale-space where geometrical properties of the image structure are effectively characterized. We apply our recursive anisotropic diffusion algorithm to the detection of curvilinear structure in the chest CT imagery where the fissures present curvilinear features and define the boundary of lobes. It is shown that our algorithm yields precise detection of the fissures while overcoming the subtlety in defining the characteristic linear features. The quantitative evaluation demonstrates the robustness and effectiveness of the proposed algorithm for the detection of fissures in the chest CT in terms of the false positive and the true positive measures. The receiver operating characteristic curves indicate the potential of our algorithm as a segmentation tool in the clinical environment. This work was supported by the MISP(Ministry of Science and ICT), Korea, under the National Program for Excellence in SW (20170001000011001) supervised by the IITP(Institute for Information and Communications Technology Promotion).

Keywords: anisotropic diffusion, chest CT imagery, chronic respiratory disease, curvilinear structure, fissure detection, structure tensor

Procedia PDF Downloads 235
3383 Image Making: The Spectacle of Photography and Text in Obituary Programs as Contemporary Practice of Social Visibility in Southern Nigeria

Authors: Soiduate Ogoye-Atanga

Abstract:

During funeral ceremonies, it has become common for attendees to jostle for burial programs in some southern Nigerian towns. Beginning from ordinary typewritten text only sheets of paper in the 1980s to their current digitally formatted multicolor magazine style, burial programs continue to be collected and kept in homes where they remain as archival documents of family photo histories and as a veritable form of leveraging family status and visibility in a social economy through the inclusion of lots of choreographically arranged photographs and text. The biographical texts speak of idealized and often lofty and aestheticized accomplishments of deceased peoples, which are often corroborated by an accompanying section of tributes from first the immediate family members, and then from affiliations as well as organizations deceased people belonged, in the form of scanned letterheaded corporate tributes. Others speak of modest biographical texts when the deceased accomplished little. Usually, in majority of the cases, the display of photographs and text in these programs follow a trajectory of historical compartmentalization of the deceased, beginning from parentage to the period of youth, occupation, retirement, and old age as the case may be, which usually drives from black and white historical photographs to the color photography of today. This compartmentalization follows varied models but is designed to show the deceased in varying activities during his lifetime. The production of these programs ranges from the extremely expensive and luscious full colors of near fifty-eighty pages to bland and very simplified low-quality few-page editions in a single color and no photographs, except on the cover. Cost and quality, therefore, become determinants of varying family status and social visibility. By a critical selection of photographs and text, family members construct an idealized image of deceased people and themselves, concentrating on mutuality based on appropriate sartorial selections, socioeconomic grade, and social temperaments that are framed to corroborate the public’s perception of them. Burial magazines, therefore, serve purposes beyond their primary use; they symbolize an orchestrated social site for image-making and the validation of the social status of families, shaped by prior family histories.

Keywords: biographical texts, burial programs, compartmentalization, magazine, multicolor, photo-histories, social status

Procedia PDF Downloads 194
3382 The Security Challenges of Urbanization and Environmental Degradation in the Niger-Delta Area of Nigeria

Authors: Gloria Ogungbade, Ogaba Oche, Moses Duruji, Chris Ehiobuche, Lady Ajayi

Abstract:

Human’s continued sustenance on earth and the quality of living are heavily dependent on the environment. The major components of the environment being air, water and land are the supporting pillars of the human existence, which they depend on directly or indirectly for survival and well-being. Unfortunately, due to some of the human activities on the environment, there seems to be a war between humans and the environment, which is evident in his over-exploitation and inadequate management of the basic components of the environment. Since the discovery of crude oil in the Niger Delta, the region has experienced various forms of degradation caused by pollution from oil spillage, gas flaring and other forms of environmental pollution, as a result of reckless way and manner with which oil is being exploited by the International Oil Corporations (IOCs) operating within the region. The Nigerian government on the other, not having strong regulations guiding the activities of the operations of these IOCs, has done almost nothing to curtail the activities of these IOCs because of the revenue generated the IOCs, as such the region is deprived of the basic social amenities and infrastructures. The degree of environmental pollution suffered within the region affects their major sources of livelihood – being fishing and farming, and has also left the region in poverty, which has led to a large number of people migrating to the urban areas to escape poverty. This paper investigates how environment degradation impact urbanization and security in the region.

Keywords: environmental degradation, environmental pollution, gas flaring, oil spillage, urbanization

Procedia PDF Downloads 295
3381 A Convolutional Neural Network-Based Model for Lassa fever Virus Prediction Using Patient Blood Smear Image

Authors: A. M. John-Otumu, M. M. Rahman, M. C. Onuoha, E. P. Ojonugwa

Abstract:

A Convolutional Neural Network (CNN) model for predicting Lassa fever was built using Python 3.8.0 programming language, alongside Keras 2.2.4 and TensorFlow 2.6.1 libraries as the development environment in order to reduce the current high risk of Lassa fever in West Africa, particularly in Nigeria. The study was prompted by some major flaws in existing conventional laboratory equipment for diagnosing Lassa fever (RT-PCR), as well as flaws in AI-based techniques that have been used for probing and prognosis of Lassa fever based on literature. There were 15,679 blood smear microscopic image datasets collected in total. The proposed model was trained on 70% of the dataset and tested on 30% of the microscopic images in avoid overfitting. A 3x3x3 convolution filter was also used in the proposed system to extract features from microscopic images. The proposed CNN-based model had a recall value of 96%, a precision value of 93%, an F1 score of 95%, and an accuracy of 94% in predicting and accurately classifying the images into clean or infected samples. Based on empirical evidence from the results of the literature consulted, the proposed model outperformed other existing AI-based techniques evaluated. If properly deployed, the model will assist physicians, medical laboratory scientists, and patients in making accurate diagnoses for Lassa fever cases, allowing the mortality rate due to the Lassa fever virus to be reduced through sound decision-making.

Keywords: artificial intelligence, ANN, blood smear, CNN, deep learning, Lassa fever

Procedia PDF Downloads 125
3380 Evaluation of Deformable Boundary Condition Using Finite Element Method and Impact Test for Steel Tubes

Authors: Abed Ahmed, Mehrdad Asadi, Jennifer Martay

Abstract:

Stainless steel pipelines are crucial components to transportation and storage in the oil and gas industry. However, the rise of random attacks and vandalism on these pipes for their valuable transport has led to more security and protection for incoming surface impacts. These surface impacts can lead to large global deformations of the pipe and place the pipe under strain, causing the eventual failure of the pipeline. Therefore, understanding how these surface impact loads affect the pipes is vital to improving the pipes’ security and protection. In this study, experimental test and finite element analysis (FEA) have been carried out on EN3B stainless steel specimens to study the impact behaviour. Low velocity impact tests at 9 m/s with 16 kg dome impactor was used to simulate for high momentum impact for localised failure. FEA models of clamped and deformable boundaries were modelled to study the effect of the boundaries on the pipes impact behaviour on its impact resistance, using experimental and FEA approach. Comparison of experimental and FE simulation shows good correlation to the deformable boundaries in order to validate the robustness of the FE model to be implemented in pipe models with complex anisotropic structure.

Keywords: dynamic impact, deformable boundary conditions, finite element modelling, LS-DYNA, stainless steel pipe

Procedia PDF Downloads 152
3379 Malware Beaconing Detection by Mining Large-scale DNS Logs for Targeted Attack Identification

Authors: Andrii Shalaginov, Katrin Franke, Xiongwei Huang

Abstract:

One of the leading problems in Cyber Security today is the emergence of targeted attacks conducted by adversaries with access to sophisticated tools. These attacks usually steal senior level employee system privileges, in order to gain unauthorized access to confidential knowledge and valuable intellectual property. Malware used for initial compromise of the systems are sophisticated and may target zero-day vulnerabilities. In this work we utilize common behaviour of malware called ”beacon”, which implies that infected hosts communicate to Command and Control servers at regular intervals that have relatively small time variations. By analysing such beacon activity through passive network monitoring, it is possible to detect potential malware infections. So, we focus on time gaps as indicators of possible C2 activity in targeted enterprise networks. We represent DNS log files as a graph, whose vertices are destination domains and edges are timestamps. Then by using four periodicity detection algorithms for each pair of internal-external communications, we check timestamp sequences to identify the beacon activities. Finally, based on the graph structure, we infer the existence of other infected hosts and malicious domains enrolled in the attack activities.

Keywords: malware detection, network security, targeted attack, computational intelligence

Procedia PDF Downloads 272
3378 The Effect of Development of Two-Phase Flow Regimes on the Stability of Gas Lift Systems

Authors: Khalid. M. O. Elmabrok, M. L. Burby, G. G. Nasr

Abstract:

Flow instability during gas lift operation is caused by three major phenomena – the density wave oscillation, the casing heading pressure and the flow perturbation within the two-phase flow region. This paper focuses on the causes and the effect of flow instability during gas lift operation and suggests ways to control it in order to maximise productivity during gas lift operations. A laboratory-scale two-phase flow system to study the effects of flow perturbation was designed and built. The apparatus is comprised of a 2 m long by 66 mm ID transparent PVC pipe with air injection point situated at 0.1 m above the base of the pipe. This is the point where stabilised bubbles were visibly clear after injection. Air is injected into the water filled transparent pipe at different flow rates and pressures. The behavior of the different sizes of the bubbles generated within the two-phase region was captured using a digital camera and the images were analysed using the advanced image processing package. It was observed that the average maximum bubbles sizes increased with the increase in the length of the vertical pipe column from 29.72 to 47 mm. The increase in air injection pressure from 0.5 to 3 bars increased the bubble sizes from 29.72 mm to 44.17 mm and then decreasing when the pressure reaches 4 bars. It was observed that at higher bubble velocity of 6.7 m/s, larger diameter bubbles coalesce and burst due to high agitation and collision with each other. This collapse of the bubbles causes pressure drop and reverse flow within two phase flow and is the main cause of the flow instability phenomena.

Keywords: gas lift instability, bubbles forming, bubbles collapsing, image processing

Procedia PDF Downloads 421
3377 Climate Change and Its Impact on Water Security and Health in Coastal Community: A Gender Outlook

Authors: Soorya Vennila

Abstract:

The present study answers the questions; how does climate change affect the water security in drought prone Ramanathapuram district? and what has water insecurity done to the health of the coastal community? The study area chosen is Devipattinam in Ramanathapuram district. Climate change evidentially wreaked havoc on the community with saltwater intrusion, water quality degradation, water scarcity and its eventual economic, social like power inequality within family and community and health hazards. The climatological data such as rainfall, minimum temperature and maximum temperature were statistically analyzed for trend using Mann-Kendall test. The test was conducted for 14 years (1989-2002) of rainfall data, maximum and minimum temperature and the data were statistically analyzed. At the outset, the water quality samples were collected from Devipattinam to test its physical and chemical parameters and their spatial variation. The results were derived as shown in ARC GIS. Using the water quality test water quality index were framed. And finally, key Informant interview, questionnaire were conducted to capture the gender perception and problem. The data collected were thereafter interpreted using SPSS software for recommendations and suggestions to overcome water scarcity and health problems.

Keywords: health, watersecurity, water quality, climate change

Procedia PDF Downloads 85
3376 Household Earthquake Absorptive Capacity Impact on Food Security: A Case Study in Rural Costa Rica

Authors: Laura Rodríguez Amaya

Abstract:

The impact of natural disasters on food security can be devastating, especially in rural settings where livelihoods are closely tied to their productive assets. In hazards studies, absorptive capacity is seen as a threshold that impacts the degree of people’s recovery after a natural disaster. Increasing our understanding of households’ capacity to absorb natural disaster shocks can provide the international community with viable measurements for assessing at-risk communities’ resilience to food insecurities. The purpose of this study is to identify the most important factors in determining a household’s capacity to absorb the impact of a natural disaster. This is an empirical study conducted in six communities in Costa Rica affected by earthquakes. The Earthquake Impact Index was developed for the selection of the communities in this study. The households coded as total loss in the selected communities constituted the sampling frame from which the sample population was drawn. Because of the study area geographically dispersion over a large surface, the stratified clustered sampling hybrid technique was selected. Of the 302 households identified as total loss in the six communities, a total of 126 households were surveyed, constituting 42 percent of the sampling frame. A list of indicators compiled based on theoretical and exploratory grounds for the absorptive capacity construct served to guide the survey development. These indicators were included in the following variables: (1) use of informal safety nets, (2) Coping Strategy, (3) Physical Connectivity, and (4) Infrastructure Damage. A multivariate data analysis was conducted using Statistical Package for Social Sciences (SPSS). The results show that informal safety nets such as family and friends assistance exerted the greatest influence on the ability of households to absorb the impact of earthquakes. In conclusion, communities that experienced the highest environmental impact and human loss got disconnected from the social networks needed to absorb the shock’s impact. This resulted in higher levels of household food insecurity.

Keywords: absorptive capacity, earthquake, food security, rural

Procedia PDF Downloads 258
3375 Metaphorical Devices in Political Cartoons with Reference to Political Confrontation in Pakistan after Panama Leaks

Authors: Ayesha Ashfaq, Muhammad Ajmal Ashfaq

Abstract:

It has been assumed that metaphorical and symbolic contests are waged with metaphors, captions, and signs in political cartoons that play a significant role in image construction of political actors, situations or events in the political arena. This paper is an effort to explore the metaphorical devices in political cartoons related to the political confrontation in Pakistan between the ruling party Pakistan Muslim League Nawaz (PMLN) and opposition parties especially after Panama leaks. For this purpose, political cartoons sketched by five renowned political cartoonists on the basis of their belongings to the most highly circulated mainstream English newspapers of Pakistan and their professional experiences in their genre, were selected. The cartoons were analyzed through the Barthes’s model of Semiotics under the umbrella of the first level of agenda setting theory ‘framing’. It was observed that metaphorical devices in political cartoons are one of the key weapons of cartoonists’ armory. These devices are used to attack the candidates and contribute to the image and character building. It was found that all the selected political cartoonists used different forms of metaphors including situational metaphors and embodying metaphors. Not only the physical stature but also the debates and their activities were depicted metaphorically in the cartoons that create the scenario of comparison between the cartoons and their real political confrontation. It was examined that both forms of metaphors shed light on cartoonist’s perception and newspaper’s policy about political candidates, political parties and particular events. In addition, it was found that zoomorphic metaphors and metaphors of diminishments were also predominantly used to depict the conflict between two said political actors.

Keywords: metaphor, Panama leaks, political cartoons, political communication

Procedia PDF Downloads 313
3374 A Questionnaire Survey Reviewing Radiographers' Knowledge of Computed Tomography Exposure Parameters

Authors: Mohammad Rawashdeh, Mark McEntee, Maha Zaitoun, Mostafa Abdelrahman, Patrick Brennan, Haytham Alewaidat, Sarah Lewis, Charbel Saade

Abstract:

Despite the tremendous advancements that have been generated by Computed Tomography (CT) in the field of diagnosis, concerns have been raised about the potential cancer induction risk from CT because of the exponentially increased use of it in medicine. This study aims at investigating the application and knowledge of practicing radiographers in Jordan about CT radiation. In order to collect the primary data of this study, a questionnaire was designed and distributed by social media using a snow-balling sampling method. The respondents (n=54) have answered 36 questions including the questions about their demographic information, knowledge about Diagnostic Reference Levels (DRLs), CT exposure and adaptation of pediatric patients exposure. The educational level of the respondents was either at a diploma degree (35.2%) or bachelor (64.8%). The results of this study have indicated a good level of general knowledge between radiographers about the relationship between image quality, exposure parameters, and patient dose. The level of knowledge related to DRL was poor where less than 7.4 percent of the sample members were able to give specific values for a number of common anatomical fields, including abdomen, brain, and chest. Overall, Jordanian radiographers need to gain more knowledge about the expected levels of the dose when applying good practice. Additional education on DRL or DRL inclusion in educational programs is highlighted.

Keywords: computed tomography, CT scan, DRLs, exposure parameters, image quality, radiation dose

Procedia PDF Downloads 150
3373 Preliminary Analysis on Land Use-Land Cover Assessment of Post-Earthquake Geohazard: A Case Study in Kundasang, Sabah

Authors: Nur Afiqah Mohd Kamal, Khamarrul Azahari Razak

Abstract:

The earthquake aftermath has become a major concern, especially in high seismicity region. In Kundasang, Sabah, the earthquake on 5th June 2015 resulted in several catastrophes; landslides, rockfalls, mudflows and major slopes affected regardless of the series of the aftershocks. Certainly, the consequences of earthquake generate and induce the episodic disaster, not only life-threatening but it also affects infrastructure and economic development. Therefore, a need for investigating the change in land use and land cover (LULC) of post-earthquake geohazard is essential for identifying the extent of disastrous effects towards the development in Kundasang. With the advancement of remote sensing technology, post-earthquake geohazards (landslides, mudflows, rockfalls, debris flows) assessment can be evaluated by the employment of object-based image analysis in investigating the LULC change which consists of settlements, public infrastructure and vegetation cover. Therefore, this paper discusses the preliminary results on post-earthquakes geohazards distribution in Kundasang and evaluates the LULC classification effect upon the occurrences of geohazards event. The result of this preliminary analysis will provide an overview to determine the extent of geohazard impact on LULC. This research also provides beneficial input to the local authority in Kundasang about the risk of future structural development on the geohazard area.

Keywords: geohazard, land use land cover, object-based image analysis, remote sensing

Procedia PDF Downloads 249
3372 Disease Level Assessment in Wheat Plots Using a Residual Deep Learning Algorithm

Authors: Felipe A. Guth, Shane Ward, Kevin McDonnell

Abstract:

The assessment of disease levels in crop fields is an important and time-consuming task that generally relies on expert knowledge of trained individuals. Image classification in agriculture problems historically has been based on classical machine learning strategies that make use of hand-engineered features in the top of a classification algorithm. This approach tends to not produce results with high accuracy and generalization to the classes classified by the system when the nature of the elements has a significant variability. The advent of deep convolutional neural networks has revolutionized the field of machine learning, especially in computer vision tasks. These networks have great resourcefulness of learning and have been applied successfully to image classification and object detection tasks in the last years. The objective of this work was to propose a new method based on deep learning convolutional neural networks towards the task of disease level monitoring. Common RGB images of winter wheat were obtained during a growing season. Five categories of disease levels presence were produced, in collaboration with agronomists, for the algorithm classification. Disease level tasks performed by experts provided ground truth data for the disease score of the same winter wheat plots were RGB images were acquired. The system had an overall accuracy of 84% on the discrimination of the disease level classes.

Keywords: crop disease assessment, deep learning, precision agriculture, residual neural networks

Procedia PDF Downloads 340
3371 A Study and Design Scarf Collection Applied Vietnamese Traditional Patterns by Using Printing Method on Fabric

Authors: Mai Anh Pham Ho

Abstract:

Scarf products today is a symbol of fashion to decorate, to make our life more beautiful and bring new features to our living space. It also shows the cultural identity by using the traditional patterns that make easily to introduce the image of Vietnam to other nations all over the world. Therefore, the purpose of this research is to classify Vietnamese traditional patterns according to the era and dynasties. Vietnamese traditional patterns through the dynasties of Vietnamese history are done and classified by five groups of patterns including the geometric patterns, the natural patterns, the animal patterns, the floral patterns, and the character patterns in the Prehistoric times, the Bronze and Iron age, the Chinese domination, the Ngo-Dinh-TienLe-Ly-Tran-Ho dynasty, and the LeSo-Mac-LeTrinh-TaySon-Nguyen dynasty. Besides, there are some special kinds of Vietnamese traditional patterns like buffalo, lotus, bronze-drum, Phuc Loc Tho character, and so on. Extensive research was conducted for modernizing scarf collection applied Vietnamese traditional patterns which the fashion trend is used on creating works. The concept, target, image map, lifestyle map, motif, colours, arrangement and completion of patterns on scarf were set up. The scarf collection is designed and developed by the Adobe Illustrator program with three colour ways for each scarf. Upon completion of the research, digital printing technology is chosen for using on scarf collection which Vietnamese traditional patterns were researched deeply and widely with the purpose of establishment the basic background for Vietnamese culture in order to identify Vietnamese national personality as well as establish and preserve the cultural heritage.

Keywords: scarf collection, Vietnamese traditional patterns, printing methods, fabric design

Procedia PDF Downloads 347
3370 Experimental Investigation of the Impact of Biosurfactants on Residual-Oil Recovery

Authors: S. V. Ukwungwu, A. J. Abbas, G. G. Nasr

Abstract:

The increasing high price of natural gas and oil with attendant increase in energy demand on world markets in recent years has stimulated interest in recovering residual oil saturation across the globe. In order to meet the energy security, efforts have been made in developing new technologies of enhancing the recovery of oil and gas, utilizing techniques like CO2 flooding, water injection, hydraulic fracturing, surfactant flooding etc. Surfactant flooding however optimizes production but poses risk to the environment due to their toxic nature. Amongst proven records that have utilized other type of bacterial in producing biosurfactants for enhancing oil recovery, this research uses a technique to combine biosurfactants that will achieve a scale of EOR through lowering interfacial tension/contact angle. In this study, three biosurfactants were produced from three Bacillus species from freeze dried cultures using sucrose 3 % (w/v) as their carbon source. Two of these produced biosurfactants were screened with the TEMCO Pendant Drop Image Analysis for reduction in IFT and contact angle. Interfacial tension was greatly reduced from 56.95 mN.m-1 to 1.41 mN.m-1 when biosurfactants in cell-free culture (Bacillus licheniformis) were used compared to 4. 83mN.m-1 cell-free culture of Bacillus subtilis. As a result, cell-free culture of (Bacillus licheniformis) changes the wettability of the biosurfactant treatment for contact angle measurement to more water-wet as the angle decreased from 130.75o to 65.17o. The influence of microbial treatment on crushed rock samples was also observed by qualitative wettability experiments. Treated samples with biosurfactants remained in the aqueous phase, indicating a water-wet system. These results could prove that biosurfactants can effectively change the chemistry of the wetting conditions against diverse surfaces, providing a desirable condition for efficient oil transport in this way serving as a mechanism for EOR. The environmental friendly effect of biosurfactants applications for industrial purposes play important advantages over chemically synthesized surfactants, with various possible structures, low toxicity, eco-friendly and biodegradability.

Keywords: bacillus, biosurfactant, enhanced oil recovery, residual oil, wettability

Procedia PDF Downloads 282
3369 Iterative Segmentation and Application of Hausdorff Dilation Distance in Defect Detection

Authors: S. Shankar Bharathi

Abstract:

Inspection of surface defects on metallic components has always been challenging due to its specular property. Occurrences of defects such as scratches, rust, pitting are very common in metallic surfaces during the manufacturing process. These defects if unchecked can hamper the performance and reduce the life time of such component. Many of the conventional image processing algorithms in detecting the surface defects generally involve segmentation techniques, based on thresholding, edge detection, watershed segmentation and textural segmentation. They later employ other suitable algorithms based on morphology, region growing, shape analysis, neural networks for classification purpose. In this paper the work has been focused only towards detecting scratches. Global and other thresholding techniques were used to extract the defects, but it proved to be inaccurate in extracting the defects alone. However, this paper does not focus on comparison of different segmentation techniques, but rather describes a novel approach towards segmentation combined with hausdorff dilation distance. The proposed algorithm is based on the distribution of the intensity levels, that is, whether a certain gray level is concentrated or evenly distributed. The algorithm is based on extraction of such concentrated pixels. Defective images showed higher level of concentration of some gray level, whereas in non-defective image, there seemed to be no concentration, but were evenly distributed. This formed the basis in detecting the defects in the proposed algorithm. Hausdorff dilation distance based on mathematical morphology was used to strengthen the segmentation of the defects.

Keywords: metallic surface, scratches, segmentation, hausdorff dilation distance, machine vision

Procedia PDF Downloads 433
3368 Filtering Intrusion Detection Alarms Using Ant Clustering Approach

Authors: Ghodhbani Salah, Jemili Farah

Abstract:

With the growth of cyber attacks, information safety has become an important issue all over the world. Many firms rely on security technologies such as intrusion detection systems (IDSs) to manage information technology security risks. IDSs are considered to be the last line of defense to secure a network and play a very important role in detecting large number of attacks. However the main problem with today’s most popular commercial IDSs is generating high volume of alerts and huge number of false positives. This drawback has become the main motivation for many research papers in IDS area. Hence, in this paper we present a data mining technique to assist network administrators to analyze and reduce false positive alarms that are produced by an IDS and increase detection accuracy. Our data mining technique is unsupervised clustering method based on hybrid ANT algorithm. This algorithm discovers clusters of intruders’ behavior without prior knowledge of a possible number of classes, then we apply K-means algorithm to improve the convergence of the ANT clustering. Experimental results on real dataset show that our proposed approach is efficient with high detection rate and low false alarm rate.

Keywords: intrusion detection system, alarm filtering, ANT class, ant clustering, intruders’ behaviors, false alarms

Procedia PDF Downloads 406
3367 Convolutional Neural Networks versus Radiomic Analysis for Classification of Breast Mammogram

Authors: Mehwish Asghar

Abstract:

Breast Cancer (BC) is a common type of cancer among women. Its screening is usually performed using different imaging modalities such as magnetic resonance imaging, mammogram, X-ray, CT, etc. Among these modalities’ mammogram is considered a powerful tool for diagnosis and screening of breast cancer. Sophisticated machine learning approaches have shown promising results in complementing human diagnosis. Generally, machine learning methods can be divided into two major classes: one is Radiomics analysis (RA), where image features are extracted manually; and the other one is the concept of convolutional neural networks (CNN), in which the computer learns to recognize image features on its own. This research aims to improve the incidence of early detection, thus reducing the mortality rate caused by breast cancer through the latest advancements in computer science, in general, and machine learning, in particular. It has also been aimed to ease the burden of doctors by improving and automating the process of breast cancer detection. This research is related to a relative analysis of different techniques for the implementation of different models for detecting and classifying breast cancer. The main goal of this research is to provide a detailed view of results and performances between different techniques. The purpose of this paper is to explore the potential of a convolutional neural network (CNN) w.r.t feature extractor and as a classifier. Also, in this research, it has been aimed to add the module of Radiomics for comparison of its results with deep learning techniques.

Keywords: breast cancer (BC), machine learning (ML), convolutional neural network (CNN), radionics, magnetic resonance imaging, artificial intelligence

Procedia PDF Downloads 230
3366 A Rotating Facility with High Temporal and Spatial Resolution Particle Image Velocimetry System to Investigate the Turbulent Boundary Layer Flow

Authors: Ruquan You, Haiwang Li, Zhi Tao

Abstract:

A time-resolved particle image velocimetry (PIV) system is developed to investigate the boundary layer flow with the effect of rotating Coriolis and buoyancy force. This time-resolved PIV system consists of a 10 Watts continuous laser diode and a high-speed camera. The laser diode is able to provide a less than 1mm thickness sheet light, and the high-speed camera can capture the 6400 frames per second with 1024×1024 pixels. The whole laser and the camera are fixed on the rotating facility with 1 radius meters and up to 500 revolutions per minute, which can measure the boundary flow velocity in the rotating channel with and without ribs directly at rotating conditions. To investigate the effect of buoyancy force, transparent heater glasses are used to provide the constant thermal heat flux, and then the density differences are generated near the channel wall, and the buoyancy force can be simulated when the channel is rotating. Due to the high temporal and spatial resolution of the system, the proper orthogonal decomposition (POD) can be developed to analyze the characteristic of the turbulent boundary layer flow at rotating conditions. With this rotating facility and PIV system, the velocity profile, Reynolds shear stress, spatial and temporal correlation, and the POD modes of the turbulent boundary layer flow can be discussed.

Keywords: rotating facility, PIV, boundary layer flow, spatial and temporal resolution

Procedia PDF Downloads 184
3365 Imaginations of the Silk Road in Sven Hedin’s Travel Writings: 1900-1936

Authors: Kexin Tan

Abstract:

The Silk Road is a concept idiosyncratic in nature. Western scholars co-created and conceptualized in its early days, transliterated into the countries along the Silk Road, redefined, reimagined, and reconfigured by the public in the second half of the twentieth century. Therefore, the image is not only a mirror of the discursive interactions between East and West but Self and Other. The travel narrative of Sven Hedin, through which the Silk Road was enriched in meanings and popularized, is the focus of this study. This article examines how the Silk Road was imagined in three key texts of Sven Hedin: The Silk Road, The Wandering Lake, and The Flight of “Big Horse”. Three recurring themes are extracted and analyzed: the Silk Road, the land of enigmas, the virgin land, and the reconnecting road. Ideas about ethnotypes and images drawn from theorists such as Joep Leerssen have been deployed in the analysis. This research tracks how the images were configured, concentrating on China’s ethnotypes, travel writing tropes, and the Silk Road discourse that preceded Sven Hedin. Hedin’s role in his expedition, his geopolitical viewpoints, and the commercial considerations of his books are also discussed in relation to the intellectual construct of the Silk Road. It is discovered that the images of the Silk Road and the discursive traditions behind it are mobile rather than static, inclusive than antithetical. The paradoxical characters of the Silk Road reveal the complexity of the socio-historical background of Hedin’s time, as well as the collision of discursive traditions and practical issues. While it is true that Hedin’s discursive construction of the Silk Road image embodies the bias of Self-West against Other-East, its characteristics such as fluidity and openness could probably offer a hint at its resurgence in the postcolonial era.

Keywords: the silk road, Sven Hedin, imagology, ethnotype, travelogue

Procedia PDF Downloads 199
3364 The Stereotypical Images of Marginalized Women in the Poetry of Rita Dove

Authors: Wafaa Kamal Isaac

Abstract:

This paper attempts to shed light upon the stereotypical images of marginalized black women as shown through the poetry of Rita Dove. Meanwhile, it explores how stereotypical images held by the society and public perceptions perpetuate the marginalization of black women. Dove is considered one of the most fundamental African-American poets who devoted her writings to explore the problem of identity that confronted marginalized women in America. Besides tackling the issue of black women’s stereotypical images, this paper focuses upon the psychological damage which the black women had suffered from due to their stripped identity. In ‘Thomas and Beulah’, Dove reflects the black woman’s longing for her homeland in order to make up for her lost identity. This poem represents atavistic feelings deal with certain recurrent images, both aural and visual, like the image of Beulah who represents the African-American woman who searches for an identity, as she is being denied and humiliated one in the newly founded society. In an attempt to protest against the stereotypical mule image that had been imposed upon black women in America, Dove in ‘On the Bus with Rosa Parks’ tries to ignite the beaten spirits to struggle for their own rights by revitalizing the rebellious nature and strong determination of the historical figure ‘Rosa Parks’ that sparked the Civil Rights Movement. In ‘Daystar’, Dove proves that black women are subjected to double-edged oppression; firstly, in terms of race as a black woman in an unjust white society that violates her rights due to her black origins and secondly, in terms of gender as a member of the female sex that is meant to exist only to serve man’s needs. Similarly, in the ‘Adolescence’ series, Dove focuses on the double marginalization which the black women had experienced. It concludes that the marginalization of black women has resulted from the domination of the masculine world and the oppression of the white world. Moreover, Dove’s ‘Beauty and the Beast’ investigates the African-American women’s problem of estrangement and identity crisis in America. It also sheds light upon the psychological consequences that resulted from the violation of marginalized women’s identity. Furthermore, this poem shows the black women’s self-debasement, helplessness, and double consciousness that emanate from the sense of uprootedness. Finally, this paper finds out that the negative, debased and inferior stereotypical image held by the society did not only contribute to the marginalization of black women but also silenced and muted their voices.

Keywords: stereotypical images, marginalized women, Rita Dove, identity

Procedia PDF Downloads 170
3363 Evaluation of Real-Time Background Subtraction Technique for Moving Object Detection Using Fast-Independent Component Analysis

Authors: Naoum Abderrahmane, Boumehed Meriem, Alshaqaqi Belal

Abstract:

Background subtraction algorithm is a larger used technique for detecting moving objects in video surveillance to extract the foreground objects from a reference background image. There are many challenges to test a good background subtraction algorithm, like changes in illumination, dynamic background such as swinging leaves, rain, snow, and the changes in the background, for example, moving and stopping of vehicles. In this paper, we propose an efficient and accurate background subtraction method for moving object detection in video surveillance. The main idea is to use a developed fast-independent component analysis (ICA) algorithm to separate background, noise, and foreground masks from an image sequence in practical environments. The fast-ICA algorithm is adapted and adjusted with a matrix calculation and searching for an optimum non-quadratic function to be faster and more robust. Moreover, in order to estimate the de-mixing matrix and the denoising de-mixing matrix parameters, we propose to convert all images to YCrCb color space, where the luma component Y (brightness of the color) gives suitable results. The proposed technique has been verified on the publicly available datasets CD net 2012 and CD net 2014, and experimental results show that our algorithm can detect competently and accurately moving objects in challenging conditions compared to other methods in the literature in terms of quantitative and qualitative evaluations with real-time frame rate.

Keywords: background subtraction, moving object detection, fast-ICA, de-mixing matrix

Procedia PDF Downloads 100
3362 Comparison of Authentication Methods in Internet of Things Technology

Authors: Hafizah Che Hasan, Fateen Nazwa Yusof, Maslina Daud

Abstract:

Internet of Things (IoT) is a powerful industry system, which end-devices are interconnected and automated, allowing the devices to analyze data and execute actions based on the analysis. The IoT technology leverages the technology of Radio-Frequency Identification (RFID) and Wireless Sensor Network (WSN), including mobile and sensor. These technologies contribute to the evolution of IoT. However, due to more devices are connected each other in the Internet, and data from various sources exchanged between things, confidentiality of the data becomes a major concern. This paper focuses on one of the major challenges in IoT; authentication, in order to preserve data integrity and confidentiality are in place. A few solutions are reviewed based on papers from the last few years. One of the proposed solutions is securing the communication between IoT devices and cloud servers with Elliptic Curve Cryptograhpy (ECC) based mutual authentication protocol. This solution focuses on Hyper Text Transfer Protocol (HTTP) cookies as security parameter.  Next proposed solution is using keyed-hash scheme protocol to enable IoT devices to authenticate each other without the presence of a central control server. Another proposed solution uses Physical Unclonable Function (PUF) based mutual authentication protocol. It emphasizes on tamper resistant and resource-efficient technology, which equals a 3-way handshake security protocol.

Keywords: Internet of Things (IoT), authentication, PUF ECC, keyed-hash scheme protocol

Procedia PDF Downloads 270
3361 Rescaling Global Health and International Relations: Globalization of Health in a Low Security Environment

Authors: F. Argurio, F. G. Vaccaro

Abstract:

In a global environment defined by ever-increasing health issues, in spite of the progress made by modern medicine, this paper seeks to readdress the question of global health in an international relations perspective. The research hypothesis is: the lower the security environment, the higher the spread of communicable diseases. This question will be channeled by re-scaling the connotation of 'global' and 'international' dimension through the theoretical lens of glocalization, a theory by Bauman that starts its analysis from simple systems to get to the most complex ones. Glocalization theory will be operationalized by analyzing health in an armed-conflict context. In this respect, the independent variable 'low security environment' translates into the cases of Syria and Yemen, which provide a clear example of the all-encompassing nature of conflict on national health and the effects on regional development. In fact, Syria and Yemen have been affected by poliomyelitis and cholera outbreaks respectively. The dependent variable will be constructed on said communicable diseases which belong to the families of sanitation-related and vaccine-preventable diseases. The research will be both qualitative and quantitative, based on primary (interviews) and secondary (WHO and other NGO’s reports) sources. The methodology is based on the assessment of the vaccine coverage and case-analysis in time and space using epidemiological data. Moreover, local health facilities’ functioning and efficiency will be studied. The article posits that the intervention and cooperation of international organizations with the local authorities becomes crucial to provide the local populations with their primary health needs. In Yemen, the majority of fatal cholera cases were in the regions controlled by the Houthi rebels, not officially accredited by the International Community. Similarly, the polio outbreak in Syria primarily affected the areas not controlled by the Syrian Arab Republic forces, recognized as the leading interlocutor by the WHO. The jeopardized possibilities to access these countries have been pivotal to the determining the problem in controlling sanitation-related and vaccine preventable diseases. This represents a potential threat to global health.

Keywords: health in conflict-affected areas, cholera, polio, Yemen, Syria, glocalization

Procedia PDF Downloads 137
3360 Study on Impact of Existence of an Open Boundary Foreign Enclave and a 24-Hours Open Corridor for Foreigners inside Indian Territory

Authors: Debarshi Bhattacharya

Abstract:

In 2015, historic Land Boundary Agreement (LBA) executed between India and Bangladesh finally settled almost seven decades long overdue critical enclave problems of the two neighbouring countries. Enclaves within India and Bangladesh were the awful outcome of the partition of India in 1947. As a dire consequence, the populace within these enclaves enormously suffered from getting basic rights and opportunities and governmental support services till long 67 years after India’s independence and partition. As per LBA, 2015, 51 Bangladeshi (BD) enclaves inside Indian territory and 111 Indian enclaves inside Bangladesh territory were actually transferred to each other. But, by virtue of LBA, 1974 executed earlier between the two countries, one BD enclave situated inside India, namely Dohogram-Angarpota (D-A) twin enclave, had not yet been exchanged by means of LBA, 2015 and it still remains as an integral part, may not be contiguous, of Bangladesh completely surrounded by Indian territory. A study was undertaken through an extensive field survey to assess the impact of the existence of D-A BD enclave inside Indian territory from India’s perspective. Field survey was conducted for the purpose in the form of an interview, group discussion, questionnaire survey, personal interaction etc. to gather information from the Indian people residing adjacent to D-A enclave and Tin Bigha Corridor (TBC), people of D-A enclave, officials of Border Security Forces of India and Bangladesh, public representatives, representatives of political organizations etc. The issue of the existence of D-A BD enclave inside Indian territory seriously brought apprehension of future problems to the people of Kuchlibari Region of Mekhligunj Block, India, on its contiguity with Indian mainland due to 24-hour open access for the BD people through TBC. The anxiety of the local Indian people regarding threats to the national security of India as well as to the law and order issues of the locality due to the open border of D-A BD enclave in the region. On the other hand, it was observed that 24 hours opening of TBC brought significant positive changes to the people of D-A BD enclave in terms of their socio-economic condition and security status.

Keywords: enclave, exchange of enclaves, land boundary agreement, Dohogram-Angarpota (D-A) Bangladeshi (BD) enclave, Tin Bigha Corridor

Procedia PDF Downloads 90
3359 Trend and Cuses of Decline in Trifoliate Yam (Dioscorea dumentorum) Production in Enugu State, Nigeria: Implication for Food Security and Biodiversity Conservation

Authors: J. C. Iwuchukwu, K. C. Okwor

Abstract:

In recent time and in the study area, yam farmers are moving into less laborious and more economical crops and very few yam farmers are growing trifoliate yam. In yam markets, little or no bitter yam is displayed or sold. The work was therefore designed to ascertain trend and causes of decline in trifoliate yam production in Enugu state. Three agricultural zones, six blocks, eighteen circles and one hundred and eight trifoliate yam farmers that were purposively selected constituted sample for the study. An interview schedule was used to collect data while percentage, mean score and standard deviation were used for data analysis. Findings of the study revealed that the respondents had no extension contact, Majority (90.7%) sourced information on trifoliate yam from neighbours/friends/relatives and produced mainly for consumption (67.6%) during rainy season (70.4%). Trifoliate yam was produced manually(71.3%) and organically (58.3%) in a mixture of other crops (87%) using indigenous/local varieties (73.1%). Mean size of land allocated to trifoliate yam production was relatively steady, mean cost of input and income were increasing while output was decreasing within the years under consideration (before 2001 to 2014). Poor/lack of finance(M=1.8) and drudgery associated with trifoliate yam product(M=1.72) were some of the causes of decline in trifoliate yam production in the area. The study recommended that more research and public enlightenment campaigns on the importance of trifoliate yam should be carried out to encourage and consolidate farmers and the masses effort in production and consumption of the crop so that it will not go extinct and then contribute to food security.

Keywords: causes, decline, trend, trifoliate yam

Procedia PDF Downloads 407