Friday, January 24, 2020

The Ashley Treatment Essay -- Medical Research

Parents, no matter their profession, are eternally in the business of raising their children. From their earliest ages, kids are told who they can play with, what they can eat, where they can go, and even when they have to go to bed. But is there a point where parents go too far? In other words, is there a time when in raising a child, a parent interjects in a child’s life so much that those actions become detrimental to the child’s development? This is the physically moral dilemma that comes out of the Ashley Treatment. The procedure that has opened up society’s view on human development brings with it an incredible amount of controversy. Turning to a more theological approach, this procedure raises so many questions regarding the human condition. For instance, how do humans accommodate those with severe disabilities without stripping them of certain natural human rights that every individual is afforded? To take it to a more fundamental level, what ought we to do as humans to help people with disabilities, while at the same time making sure we are treating them as equal beings? Once questions like these can be addressed, the more pointed question can be reflected upon: is the Ashley Treatment ethical? When answering this, it is important to remember that all people deserve a voice in the goings on in the world, particularly when those issues pertain to themselves. Additionally ponder the fact that there are unique cases in which someone else may need to speak on behalf of an individual for that person to be heard. Such is the case for many with profound disabilities like Ashley. The Ashley Treatment is a pretty novel and groundbreaking procedure with incredible ethical discord. This treatment was devised by the doctors of ... ... over their child, in particular regards to profound disability and the â€Å"Ashley Treatment.† Liao, S., Julian Savulescu, and Mark Sheehan. â€Å"The Ashley Treatment: Best Interests, Convenience, and Parental Decision-Making.† Hastings Center Report. 37.2 (2012): 16- 20. Web. 25 Mar. 2012. This essay weighs the benefits and consequences of the â€Å"Ashley Treatment† procedure. It looks at how it was created, why it was used, and ethical justification to validate its use. Ryan, Christine. â€Å"Revisiting the Legal Standards that Govern Requests to Sterilize Profoundly Incompetent Children: In Light of the Ashley Treatment, Is a New Standard Appropriate.† Fordham Law Review. 77.1 (2008): 287-325. Print. This article talks about the controversial â€Å"Ashley Treatment† from a legal and ethical standpoint. It uses the court decisions on this matter to create the author’s argument.

Wednesday, January 15, 2020

License Plate Recognition

Emerging Trends in Computer Science and Information Technology -2012(ETCSIT2012) Proceedings published in International Journal of Computer Applications ® (IJCA) Automatic Vehicle Identification Using License Plate Recognition for Indian Vehicles Sandra Sivanandan Department of Computer Engineering K. K. Wagh Institute Of Engineering Education & Research, Hirabai Haridas Vidyanagari Amrut-Dham, Panchavati, Nashik-422003 University of Pune, Maharashtra Ashwini Dhanait Department of Computer Engineering K. K.Wagh Institute Of Engineering Education & Research, Hirabai Haridas Vidyanagari Amrut-Dham, Panchavati, Nashik-422003 University of Pune, Maharashtra Yogita Dhepale Department of Computer Engineering K. K. Wagh Institute Of Engineering Education & Research, Hirabai Haridas Vidyanagari Amrut-Dham, Panchavati, Nashik-422003. Yasmin Saiyyad Department of Computer Engineering K. K. Wagh Institute Of Engineering Education & Research, Hirabai Haridas Vidyanagari Amrut-Dham, Panchavati, Nashik-422003. ABSTRACT In this study, a smart and simple algorithm is presented for vehicle’s license plate recognition system.The proposed algorithm consists of three major parts: Extraction of plate region, segmentation of characters and recognition of plate characters. For extracting the plate region edge detection and morphological operations are used. In segmentation part scan line algorithm is used. Character Segmentation for Devanagari Number Plates is also presented. Optical character recognition technique is used for the character recognition. The objective is to design an efficient automatic authorized vehicle identification system by using the vehicle number plate.Here we are presenting a smart and simple algorithm for vehicle’s license plate recognition system for Indian Vehicles. In this study, the proposed algorithm is based on extraction of plate region, segmentation of plate characters and recognition of characters. In India we find plates having Deva nagari fonts as well (though according to rules it is not allowed). Character extraction for Devanagari font is slightly different as compared to English font because of the header line (shirorekha). We propose algorithm for character extraction for Devanagari font. The recognized plate an be then compared with police hotlist database to identify stolen vehicles. The paper is organized as follows: Section II provides an overview of the overall system. Extracting the plate region is explained in Section III. Section IV gives the segmentation of individual plate characters. Section V deals with recognition of characters using optical character recognition based on statistical based template matching algorithm which uses correlation and section VI deals with verification of plate according to Indian rules. The paper concludes with Section VII. KeywordsDevanagari, Edge detection, License plate recognition, Optical character recognition, segmentation. 1. INTRODUCTION License plate recogn ition (LPR) is a form of Automatic Vehicle Identification. It is an image processing technology used to identify vehicles by only their license plates. Real time LPR plays a major role in automatic monitoring of traffic rules and maintaining law enforcement on public roads. The LPR system’s significant advantage is that the system can keep an image record of the vehicle which is useful in order to fight crime and fraud (â€Å"an image is worth a thousand words†).Early LPR systems suffered from a low recognition rate, lower than required by practical systems. The external effects (sun and headlights, bad plates, wide number of plate types) and the limited level of the recognition software and vision hardware yielded low quality systems. However, recent improvements in the software and hardware have made the LPR systems much more reliable and wide spread. 23 Emerging Trends in Computer Science and Information Technology -2012(ETCSIT2012) Proceedings published in Internat ional Journal of Computer Applications ® (IJCA) in night condition, contrast enhancement is important before further processing [1]. . STRUCTURE OF LPR SYSTEM Fig. 1) Original Image Fig. 2) Gray Scale Image Flowchart of Proposed System The algorithm proposed in this paper is designed to recognize license plates of vehicles automatically. Input of the system is the image of a vehicle captured by a camera. The captured image taken from 3-5 meters away is first converted to gray scale. We apply vertical edge detection algorithm and morphological operation i. e. open and close for plate extraction. After applying morphological operations image is filtered out to get exact plate region. Plate region is cropped.Row segmentation separates row in plate and column separation separates characters from row. Finally recognition part OCR recognizes the characters giving the result as the plate number in ASCII format. The result in ASCII format is can be verified on the basis of rules followed in India. Fig. 3) Gray image after contrast enhancement 3. 2 Vertical Edge Detection Before applying edge detection median filter is to be applied to image for removing noise. The main idea of median filter is to run through the signal, entry by entry, replacing each entry with the median of neighboring entries.Such noise reduction is a typical preprocessing step to improve the results of later processing (edge detection) [2]. 3. EXTRACTION OF PLATE REGION Plate Extraction is done in following steps 3. 1 Convert image to Gray Scale 3. 2 Apply Vertical Edge detection 3. 3 Candidate Plate Area Detection ? Morphologically Close image ? Fill holes in image ? Morphologically Open image 3. 3 Filtration of non Plate region 3. 1 Conversion To Gray Scale This is pre-processing step for plate extraction. We apply Formula: I( i, j) = 0. 114*A( i, j,1) + 0. 587*A(i, j, 2) + 0. 99* A(i, j,3) where, I(i,j) is the array of gray image, A(i,j,1), A(i,j,2), A(i,j,3) are the R,G,B value of original im age respectively. Sometimes the image may be too dark, contain blur, thereby making the task of extracting the license plate difficult. In order to recognize the license plate even In ascending order of values: 0, 2, 3, 3, 4, 6, 10, 15, 97. Center value (previously 97) is replaced by the median of all nine values (4). Edge detection is performed on the given image, which aims at identifying points in digital image at which image brightness changes sharply or, more formally, has discontinuities.There mainly exists several edge detection methods (Sobel, Prewitt, Roberts, Canny). We use here Sobel operator for vertical edge detection. If we define A as the source image, and Gx and Gy are two images which at each point contain the horizontal and vertical derivative approximations, the computations are as follows: 24 Emerging Trends in Computer Science and Information Technology -2012(ETCSIT2012) Proceedings published in International Journal of Computer Applications ® (IJCA) Where * i s 2D convolution operation. Fig. 5) Closed Image Fig. 4) Sobel Vertical Edge detection Fig. 6) Filled Image 3. Candidate Plate Area Detection A morphological operator is applied to the image for specifying the plate location. We build a morphological operator that is sensitive to a specific shape in the input image. In our system rectangular box is employed as a structural element to detect the car plates. In mathematical morphology structuring element are represented as matrices. Structuring element is a characteristic of certain structure and features to measure the shape of an image and is used to carry out other image processing operations [4]. Typical rectangular structuring element is shown in figure. Fig. ) Opened Image 3. 4 Filtration Of Non Plate Region After identify the ROI, image is then filtered using following filtering techniques. First find the connected components in image. The first technique involves removing of all white patches which has more or less area than t he threshold. For instance components having area < 2000 or >20000 are eliminated. Using Bounding Box method, draw Bounding Box around components and fill the image. According to the height values, for instance, only the objects with a height greater than Tmin_h and less than Tmax_h are retained, and eliminate the other objects.After that, if the width values of the retained objects are greater than Tmin_w and less than Tmax_w, the objects are retained; otherwise, the objects are removed, and so on. Where: Tmin_h : Minimum height of the object. Tmax_h : Maximum height of the object. Tmin_w : Minimum width of the object. Tmax_w : Maximum width of the object [6]. After filtering plate region is cropped by searching for the first and last white pixels starting from top left corner of an image. Plate is cropped from original image after getting coordinates. Using two basic operation of morphology (erosion and dilation), opening and closing of image is done.The opening of A by B is obtai ned by the erosion of A by B, followed by dilation of the resulting image by B. The closing of A by B is obtained by the dilation of A by B, followed by erosion of the resulting structure by B. For closing image 10*20 rectangular structuring element is used. After closing image we have to fill the holes in this image. A hole is a set of background pixels that cannot be reached by filling in the background from the edge of the image [3]. Then image is opened using 5*10 rectangular structural element. Values are determined according to the size of the image.Here we have used 1280X980 resolution images. 25 Emerging Trends in Computer Science and Information Technology -2012(ETCSIT2012) Proceedings published in International Journal of Computer Applications ® (IJCA) 4. SEGMENTATION OF PLATE CHARACTERS Before applying the OCR, the individual lines in the text are separated using line separation process and individual characters from separated lines. Steps for Character Segmentation: 4. 1 Binarization of Plate image 4. 2 Scan Line Algorithm for row segmentation 4. 3 Vertical Projection for column segmentationFig 6) Filtered Image on basis of area Fig. 7) Bounding Box and filled image 4. 1 Binarization Of Plate Image Binarize the plate image. Threshold for binarization must be such that characters are displayed well. For that we take average of all pixel values in plate image and calculate threshold. Fig. 10) Binarized image Fig. 8) Image after filtration on basis of height &width of objects 4. 2 Scan Line Algorithm The scan line algorithm is based on the feature that there is transition from 1 to 0 and 0 to 1 transition in character region in a binary image.Thus the total number of transition in character region is more than the total number of transition in other region. There are at least seven characters in license plate region and every character has more than two Jumps[7]. We can choose twelve as the threshold value. If the total number of transitions in a ce rtain line is greater than twelve, this line may be in character region. Otherwise, it is not in character region. Algorithm: 1) Let H be height and W be Width of Plate image. 2) for(i=H/2 to 0) { Count no of transitions ie 0 to 1 and 1 to 0 in cnt; if cnt

Tuesday, January 7, 2020

Essay on Research on Cyber Bullying - 2847 Words

Maria Castro May 30, 2010 Research Paper Cyber Bullying Within Teenagers Bullying has changed in many different ways over time. Just how everything around us becomes more technical and easier to use, in some way so has bullying. Technology has changed bullying because it has only made it easier and more available to cyber bullies. Cyber bullying is a new trend that has evolved in the United States over the past few years. Cyber bullying is wrong and dangerous, it has caused various deaths and all types of negativity inside people’s lives. No one should practice bullying in the first place but thanks to the internet it occurs every second and it can happen to anyone. Cyber bullying has become very popular especially to†¦show more content†¦Megan couldn’t take it anymore and decided to take her life away (Parents: Cyber Bullying Led to Teen’s Suicide). Teenagers are not aware and don’t come to full reorganization of what they’re doing on the internet. They take advantage of the technology we have and use it in th eir advantage. They are not realizing that their words even if they’re through the internet, they hurt other people and take them to depression. Not only does cyber bullying take victims to depression but it takes away lives. Cyber bullying also causes it’s victims to have a low self esteem. Having a low self esteem causes teenagers to act poorly in school and they become less and less excited about life. Everyone is different and everyone deals with situations differently. At the end of the day Cyber bullying is a form of abuse. It shouldn’t be practiced no matter what the reason behind it is. Cyber bullying is just as wrong as physical bullying. In some situations cyber bullying may seem like there is no physical threat or even contact but in reality it hurts the victims more than actual physical bullying. When teenagers practice cyber bullying not only are they hurting their victims but they are hurting themselves. Cyber bullies can end up in jail because the re are now many laws that go against cyber bullying. â€Å"One day after the anti bullying legislation became a law in Massachusetts; New York lawmakers are trying to doShow MoreRelatedCyber Bullying Research Paper1670 Words   |  7 Pagesforming a Bullying Prevention Coordinating Committee, consisting of representatives from each key stakeholder group such as school administrators, teaching staff, and non-teaching staff, parents, and other local authorities. The Bullying Prevention Coordinating Committee (BPCC) will attend a two-day training to better understand program implementation. The Olweus Student Questionnaire will be administered to all high school students in order to obtain a baseline for the prevalence of bullying. The questionnaireRead MoreCyber-Bullying: A Brief Research Proposal Essay1685 Words   |  7 Pagesform of bullying has developed – Cyber bullying. Cyber bullying can be defined as â€Å"the electronic posting of mean-spirited messages about a person,† (Merriam-Webster, 2012). This form of bull ying can come through various mediums including but not limited to text messages, emails, videos, and social networking sites. There is an overwhelming amount of information that defines cyber bullying, identifies the demographics of bullies and victims of cyber bullying, and identifies the outcomes of cyber bullyingRead MoreEssay on Cyber Bullying Annotated Bibliography1013 Words   |  5 Pagesinternet dose to the youth. With two main points; cyber bullying and sexting, the author briefly discusses what they are and what threat that occurs from them. The article is useful to me because it shows the harmfulness on what could happen on the internet. However, this article is very vague and lakes a certain amount of information to achieve its point. Cyber Bullying Crackdown: Recent Tragedies And A New Survey Shine A Spotlight On Online Bullying. Current Events, a Weekly Reader publicationRead MoreCyber Bullying1493 Words   |  6 PagesKNOWN AS CYBER BULLYING. IN THE YEARS SINCE I FIRST HEARD THIS STORY I’VE HEARD PLENTY MORE STORIES THAT FIT THIS CATEGORY SUCH AS THE SUICIDE OF RYAN HALLIGAN, AND TYLER CLEMENTI JUST TO NAME A COUPLE. CONSTANTLY HEARING THESE STORIES IN THE NEWS LET ME KNOW THAT CYBER-BULLYING IS A GROWING PHENOMENON AFFECTING MANY LIVES AROUND THE WORLD WHICH IS WHY I CHOSE THIS TOPIC TO RESEARCH. TODAY I WANT TO TELL YOU WHAT PROFESSIONALS DESCRIBE AS CYBER-BULLYING ,SOME OF THE ACCREDITED RESEARCH DONE ON CYBERRead MoreTeens as Victims of Cyberbullying1482 Words   |  6 Pages â€Å"Around half of teens have been the victims of cyber bullies,† Richard Webster from the â€Å"Cyber bullying is when a person or a group is trying to embarrass and harm or intimidate those who are weaker than t hem†. â€Å"Cyber bullying to texting: What’s on your kids ‘Cell?† What is cyber bullying? The Stop bullying Organization explains what the meaning of cyber bullying is. Cyber bullies are able to use cells phones and the internet to make it very easy bully other people. Lawmakers and Schools shouldRead MoreBullying And The Cyber Bullying Essay1010 Words   |  5 PagesIDENTIFICATION PROBLEM STATEMENT BACKGROUND Cyber bullying refers to something when one uses their cell phone, computers or an electronic device to access internet and technology for the purpose of harassment and providing harms to others. Sending inappropriate messages, uploading disturbing images, threatening and posting something without someone’s’ approval are the forms of cyber bullying. The main aim of this research study is to look after the cyber bullying and the possible reasons of occurrenceRead MoreCyber Bullying And Its Effect On Society1536 Words   |  7 PagesBullying has been an extreme issue all around the world for hundreds of years, and since modern technology has advanced, so has cyber bullying. â€Å"‘Gimme’ your lunch money† has turned into texting and posting gruesome threats and embarrassing material all over social media. Millions of kids all over the world have taken their own lives due to the harmful effects of cyber bullying. Problems that cannot be resolved indepe ndently are brought to court, and the government has become increasingly involvedRead MorePrevention And Intervention Of Cyber Bullying Essay1458 Words   |  6 PagesAtlantic University, and Internet safety expert Dr. Justin Patchin set worth to study the topic of cyber-bullying, since there wasn’t much research on the topic up until that point. In Bullying Beyond the Schoolyard (2009), the authors paint a picture of the online aggressions adolescents are facing on a daily basis. Hinduja Patchin (2009) included stories of victims, ongoing research on cyber bullying, and an overall review of current legislature pertaining to the topic. The authors also highlightRead MoreThe Spreading of Cyber Bullying1599 Words   |  6 Pages Cyber bullying is a growing problem and has moved to the forefront of public concern in recent years due to a large number of incidents that have received media attention (Tokunaga, 2009). Most recently, a case involving a 12-year old girl who c ommitted suicide as a result from cyber bullying received national attention. This case occurred in Polk County, Fl., and has been described as one of the most tragic cyber bullying stories of our time (Hellmich, 2013). Rebecca Sedwick of Lakeland, FlaRead MoreCyber Bullying : The Third Leading Cause Death For American Youths901 Words   |  4 Pagesyouths between the ages of 10-24. Research has identified that bullying is an environmental stress that increases the risk of adolescent suicide substantially. Approximately 20-35% of adolescents report being involved in bullying as a bully, victim or both (Litwiller Brausch, 2013). Traditional forms of bullying include; physical bullying which involves the infliction of physical harm, emotional bullying which includes verbal harassment or teasing and social bullying when someone is purposefully excluded