The COVID-19 outbreak from the SARS-CoV-2 virus has shocking us with its fast transmission and deadly complication. Due to that, the movement restriction has been enforced to contain this pandemic. ...Recently, there is an increasing pressure to restart and resurrect social and economic sectors, and to allow people to get back to work. This must be well planned before the movement restriction is lifted. Because of that, this paper aims to review and make recommendations on the new normal for our daily activities and works. Firstly, the social and economic sectors must be opening in phases by emphasizing safety and health than an economic recovery. In the meantime, the WHO recommendations on social distancing and personal hygiene must be adapted and become a new normal. Because of that, the government and local authorities should develop a soft landing approach based on the WHO recommendations. Next, the community must be engaged and empowered to do their parts in preventing the spread of COVID-19. From the new normal recommendations, the people can continue their daily routines, and at the same time can reduce COVID-19 transmission. However, medical possibilities are not considered while compiling these new normals and procedures. The population must adapt and embrace the new normal to control, reduce and prevent the spreading of COVID-19, as it could be with us for a long time.
•The new normal and procedures for our daily activities and works during COVID-19 pandemic.•The new normal in workplace, industry, health care service and elderly care service.•The community must embrace new normal for their own safety and health.
Gait analysis is an essential tool for detecting biomechanical irregularities, designing personalized rehabilitation plans, and enhancing athletic performance. Currently, gait assessment depends on ...either visual observation, which lacks consistency between raters and requires clinical expertise, or instrumented evaluation, which is costly, invasive, time-consuming, and requires specialized equipment and trained personnel. Markerless gait analysis using 2D pose estimation techniques has emerged as a potential solution, but it still requires significant computational resources and human involvement, making it challenging to use. This research proposes an automated method for temporal gait analysis that employs the MediaPipe Pose, a low-computational-resource pose estimation model. The study validated this approach against the Vicon motion capture system to evaluate its reliability. The findings reveal that this approach demonstrates good (ICC
> 0.75) to excellent (ICC
> 0.90) agreement in all temporal gait parameters except for double support time (right leg switched to left leg) and swing time (right), which only exhibit a moderate (ICC
> 0.50) agreement. Additionally, this approach produces temporal gait parameters with low mean absolute error. It will be useful in monitoring changes in gait and evaluating the effectiveness of interventions such as rehabilitation or training programs in the community.
Protection of multimedia information from different types of attackers has become important for people and governments. A high definition image has a large amount of data, and thus, keeping it secret ...is difficult. Another challenge that security algorithms must face with respect to high definition images in medical and remote sensing applications is pattern appearances, which results from existing regions with high density in the same color, such as background regions. An encryption and hiding based new hybrid image security systems are proposed in this paper for the purpose of keeping high definition images secret. First, one hiding method and two encryption methods are used in two hybrid algorithms. The new hiding algorithm proposed here starts by applying reordering and scrambling operations to the six Most Significant Bit planes of the secret image, and then, it hides them in an unknown scene cover image using adding or subtracting operations. Second, two different ciphering algorithms are used to encrypt the stego-image to obtain two different hybrid image security systems. The first encryption algorithm is based on binary code decomposition, while the second algorithm is a modification of an advanced encryption standard. After evaluating each hybrid algorithm alone, a comparison between the two hybrid systems is introduced to determine the best system. Several parameters were used for the performance, including the visual scene, histogram analysis, entropy, security analysis, and execution time.
Currently, the use of telephone systems is highly popular in speech telecommunication and also they have a wide presence in transmission of digital signals. In recent years, audio-speech watermarking ...as a modern technique makes use of the telephone channel to transmit the watermark data, but addressing the watermark’s vulnerability to noise in the telephone channel is a difficult problem in digital audio-speech watermarking. This paper presents a robust audio-speech watermarking scheme that operates against channel noise according to audio-speech specifications, the channel coding and channel equalizer technique. The proposed scheme is based on the spread spectrum technique and a psychoacoustic model with use of the channel equalizer to remove or minimize the effects of channel noise over the watermark signal. The simulation results for imperceptibility of the watermark, voice quality, and robustness against channel noise are presented in this study. The results indicate that the proposed scheme is highly satisfactory for the cases mentioned above.
Illegal software manipulation is one of the biggest issues in software security. This includes the legally relevant software which are now crucial modules in weight and measuring instruments such as ...weighbridges. Despite the advancement and complexity of weight and measuring instruments, the inspection methodology is weak and lacks of innovation. The conventional inspection method is merely based on the observation printed certificate of the software. This paper introduces Malaysia Software-Assisted Non-Automatic Weighing Instrument (NAWI) Inspection (MySANI), a method used to enhance the software inspection scheme in legal metrology. MySANI introduces security objects in order to assist and enhance the inspection process. The security evaluation is based on the best practices in IT in metrology, where the attack model on relevant assets of the security objects is simulated for the Attack Probability Tree. The attack tree is verified by integrating formal notation and comparison with finite state transition system domain to verify the correctness properties of the tree design before the model can be further used in a risk analysis procedure within the Attack Probability Tree framework. Results show that the designed attack tree is consistent with the designed simulation.
This paper presents a review of the region of interest-based (ROI) image retrieval techniques. In this study, the techniques, the performance evaluation parameters, and databases used in image ...retrieval process are being reviewed. A part of an image that is considered important or a selected certain area of the image is what defines a region of interest. Retrieval performance in large databases can be improved with the application of content-based image retrieval systems which deals with the extraction of global and region features of images. The capability of reflecting users' specific interests with greater accuracy has shown to be more effective when using region-based features compared to global features. Segmentation, feature extraction, indexing, and retrieval of an image are the tasks required in retrieving images that contain similar regions as specified in a query. The idea of the region of interest-based image retrieval concepts is presented in this paper and it is expected to accommodate researchers that are working in the region-based image retrieval system field. This paper reviews the work of image retrieval researchers in the span of twenty years. The main goal of this paper is to provide a comprehensive reference source for scholars involved in image retrieval based on ROI.
One of the biggest problems the maritime industry is currently experiencing is corrosion, resulting in short and long-term damages. Early prediction and proper corrosion monitoring can reduce ...economic losses. Traditional approaches used in corrosion prediction and detection are time-consuming and challenging to execute in inaccessible areas. Due to these reasons, artificial intelligence-based algorithms have become the most popular tools for researchers. This study discusses state-of-the-art artificial intelligence (AI) methods for marine-related corrosion prediction and detection: (1) predictive maintenance approaches and (2) computer vision and image processing approaches. Furthermore, a brief description of AI is described. The outcomes of this review will bring forward new knowledge about AI and the development of prediction models which can avoid unexpected failures during corrosion detection and maintenance. Moreover, it will expand the understanding of computer vision and image processing approaches for accurately detecting corrosion in images and videos.
Sub-iris Technique for Non-ideal Iris Recognition Jamaludin, Shahrizan; Zainal, Nasharuddin; Zaki, W Mimi Diyana W
Arabian journal for science and engineering (2011),
12/2018, Letnik:
43, Številka:
12
Journal Article
Recenzirano
Iris recognition has become one of the most prominent biometrics due to its high recognition accuracy, and it is suitable for the verification and identification systems. Most iris recognition ...systems can recognize human identity especially when the iris region is free from noise. However, the iris region is typically occluded by noise, eyelid and eyelash. The occluded iris can hide rich iris features, which consists fewer iris features in the iris region, thus reducing the recognition accuracy of the system. The occluded iris is also called a non-ideal iris. In this study, an improvement is made to enhance the performance of an existing sub-iris technique. This can overcome the problem of obtaining iris features from the non-ideal iris. Moreover, the proposed method can also reduce the execution time of the iris recognition system. According to the results, the proposed method managed to localize the sub-iris region, while achieving an equal error rate of 3.75%; area under curve of 0.9832; execution time of 0.719 s; and decidability of 2.9332. These metrics are superior to those of other methods.
Iris recognition systems have demonstrated considerable improvement in recognizing people through their iris patterns. Recent iris recognition systems have focused on images acquired in unconstrained ...environments. Unconstrained imaging environments allow the capture of iris images at a distance, in motion and under visible wavelength illumination which lead to more noise factors such as off-focus, gaze deviation, and obstruction by eyelids, eyeglasses, hair, lighting and specular reflections. Segmenting irises taken in an unconstrained environment remains a challenging task for iris recognition. In this paper, a new iris segmentation method is developed and tested on UBIRIS.v2 and MICHE iris databases that reflect the challenges in recognition by unconstrained images. This method accurately localizes the iris by a model designed on the basis of the Histograms of Oriented Gradients (HOG) descriptor and Support Vector Machine (SVM), namely HOG-SVM. Based on this localization, iris texture is automatically extracted by means of a cellular automata which evolved via the GrowCut technique. Pre- and post-processing operations are also introduced to ensure higher segmentation accuracy. Extensive experimental results illustrate the effectiveness of the proposed method on unconstrained iris images.
•A new iris segmentation method for images acquired in unconstrained environments.•A robust SVM-HOG model for iris localization of unconstrained images.•An iris extraction method using GrowCut segmentation.•Images acquired by camera and mobile devices for performance evaluations.