Search results for: privacy preserving
564 Far-Field Noise Prediction of Tandem Cylinders Using Incompressible Large Eddy Simulation
Authors: Jesus Ruano, Francesc Xavier Trias, Asensi Oliva
Abstract:
A three-dimensional incompressible Large Eddy Simulation (LES) is performed to compute the hydrodynamic field around a pair of tandem cylinders. Symmetry-preserving schemes will be used during this simulation in conjunction with Finite Volume Method (FVM) to obtain the hydrodynamic field around the selected geometry. A set of results consisting of pressure and velocity and the combination of them will be stored at different surfaces near the cylinders as the initial input for the second part of the study. A post-processing of the obtained results based on Ffowcs-Williams and Hawkings (FWH) equation with a Fourier Transform of the acoustic sources will be used to compute noise at several probes located far away from the region where the hydrodynamics are computed. Directivities as well as spectral profile of the obtained acoustic field will be analyzed.Keywords: far-field noise, Ffowcs-Williams and Hawkings, finite volume method, large eddy simulation, long-span bodies
Procedia PDF Downloads 378563 Comparison of Different DNA Extraction Platforms with FFPE tissue
Authors: Wang Yanping Karen, Mohd Rafeah Siti, Park MI Kyoung
Abstract:
Formalin-fixed paraffin embedded (FFPE) tissue is important in the area of oncological diagnostics. This method of preserving tissues enabling them to be stored easily at ambient temperature for a long time. This decreases the risk of losing the DNA quantity and quality after extraction, reducing sample wastage, and making FFPE more cost effective. However, extracting DNA from FFPE tissue is a challenge as DNA purified is often highly cross-linked, fragmented, and degraded. In addition, this causes problems for many downstream processes. In this study, there will be a comparison of DNA extraction efficiency between One BioMed’s Xceler8 automated platform with commercial available extraction kits (Qiagen and Roche). The FFPE tissue slices were subjected to deparaffinization process, pretreatment and then DNA extraction using the three mentioned platforms. The DNA quantity were determined with real-time PCR (BioRad CFX ) and gel electrophoresis. The amount of DNA extracted with the One BioMed’s X8 platform was found to be comparable with the other two manual extraction kits.Keywords: DNA extraction, FFPE tissue, qiagen, roche, one biomed X8
Procedia PDF Downloads 109562 Harnessing the Power of Artificial Intelligence: Advancements and Ethical Considerations in Psychological and Behavioral Sciences
Authors: Nayer Mofidtabatabaei
Abstract:
Advancements in artificial intelligence (AI) have transformed various fields, including psychology and behavioral sciences. This paper explores the diverse ways in which AI is applied to enhance research, diagnosis, therapy, and understanding of human behavior and mental health. We discuss the potential benefits and challenges associated with AI in these fields, emphasizing the ethical considerations and the need for collaboration between AI researchers and psychological and behavioral science experts. Artificial Intelligence (AI) has gained prominence in recent years, revolutionizing multiple industries, including healthcare, finance, and entertainment. One area where AI holds significant promise is the field of psychology and behavioral sciences. AI applications in this domain range from improving the accuracy of diagnosis and treatment to understanding complex human behavior patterns. This paper aims to provide an overview of the various AI applications in psychological and behavioral sciences, highlighting their potential impact, challenges, and ethical considerations. Mental Health Diagnosis AI-driven tools, such as natural language processing and sentiment analysis, can analyze large datasets of text and speech to detect signs of mental health issues. For example, chatbots and virtual therapists can provide initial assessments and support to individuals suffering from anxiety or depression. Autism Spectrum Disorder (ASD) Diagnosis AI algorithms can assist in early ASD diagnosis by analyzing video and audio recordings of children's behavior. These tools help identify subtle behavioral markers, enabling earlier intervention and treatment. Personalized Therapy AI-based therapy platforms use personalized algorithms to adapt therapeutic interventions based on an individual's progress and needs. These platforms can provide continuous support and resources for patients, making therapy more accessible and effective. Virtual Reality Therapy Virtual reality (VR) combined with AI can create immersive therapeutic environments for treating phobias, PTSD, and social anxiety. AI algorithms can adapt VR scenarios in real-time to suit the patient's progress and comfort level. Data Analysis AI aids researchers in processing vast amounts of data, including survey responses, brain imaging, and genetic information. Privacy Concerns Collecting and analyzing personal data for AI applications in psychology and behavioral sciences raise significant privacy concerns. Researchers must ensure the ethical use and protection of sensitive information. Bias and Fairness AI algorithms can inherit biases present in training data, potentially leading to biased assessments or recommendations. Efforts to mitigate bias and ensure fairness in AI applications are crucial. Transparency and Accountability AI-driven decisions in psychology and behavioral sciences should be transparent and subject to accountability. Patients and practitioners should understand how AI algorithms operate and make decisions. AI applications in psychological and behavioral sciences have the potential to transform the field by enhancing diagnosis, therapy, and research. However, these advancements come with ethical challenges that require careful consideration. Collaboration between AI researchers and psychological and behavioral science experts is essential to harness AI's full potential while upholding ethical standards and privacy protections. The future of AI in psychology and behavioral sciences holds great promise, but it must be navigated with caution and responsibility.Keywords: artificial intelligence, psychological sciences, behavioral sciences, diagnosis and therapy, ethical considerations
Procedia PDF Downloads 72561 Preservation of Artistic Heritage: Effect of Modernization on Antiquities and Traditional Murals in Nigeria
Authors: Uchenna Bella Onu
Abstract:
Traditional art is one of Nigerian cultural heritage. It is an excellent instrument for documentation and identification. Antiquities are priceless and irreplaceable. They are basically preserved for future generations. Sadly, preserving these highly prized cultural heritage is becoming a serious challenge. This paper examines the extent modernization has affected the preservation of traditional art in Nigeria. Particularly hit is the antiquities and traditional murals of eastern part of Nigeria. Participatory visual methods were used for this study. Efforts were made to reach the few surviving and aged mural artists. Oral information was collected from them as well as first hand drawings and some photographs of their works. Findings indicate that modernization has seriously affected the preservation of Nigerian artistic heritage. Further findings show that traditional mural artists are gradually dwindling and dangerously going into extinct. Antiquities are indiscriminately destroyed due to sheer ignorance and the blind quest to fit into the so called modern world.Keywords: antiquities, artistic heritage, cultural preservation, drawings, modernization, murals
Procedia PDF Downloads 171560 Secure Transfer of Medical Images Using Hybrid Encryption Authentication, Confidentiality, Integrity
Authors: Boukhatem Mohammed Belkaid, Lahdir Mourad
Abstract:
In this paper, we propose a new encryption system for security issues medical images. The hybrid encryption scheme is based on AES and RSA algorithms to validate the three security services are authentication, integrity, and confidentiality. Privacy is ensured by AES, authenticity is ensured by the RSA algorithm. Integrity is assured by the basic function of the correlation between adjacent pixels. Our system generates a unique password every new session of encryption, that will be used to encrypt each frame of the medical image basis to strengthen and ensure his safety. Several metrics have been used for various tests of our analysis. For the integrity test, we noticed the efficiencies of our system and how the imprint cryptographic changes at reception if a change affects the image in the transmission channel.Keywords: AES, RSA, integrity, confidentiality, authentication, medical images, encryption, decryption, key, correlation
Procedia PDF Downloads 540559 Blockchain Platform Configuration for MyData Operator in Digital and Connected Health
Authors: Minna Pikkarainen, Yueqiang Xu
Abstract:
The integration of digital technology with existing healthcare processes has been painfully slow, a huge gap exists between the fields of strictly regulated official medical care and the quickly moving field of health and wellness technology. We claim that the promises of preventive healthcare can only be fulfilled when this gap is closed – health care and self-care becomes seamless continuum “correct information, in the correct hands, at the correct time allowing individuals and professionals to make better decisions” what we call connected health approach. Currently, the issues related to security, privacy, consumer consent and data sharing are hindering the implementation of this new paradigm of healthcare. This could be solved by following MyData principles stating that: Individuals should have the right and practical means to manage their data and privacy. MyData infrastructure enables decentralized management of personal data, improves interoperability, makes it easier for companies to comply with tightening data protection regulations, and allows individuals to change service providers without proprietary data lock-ins. This paper tackles today’s unprecedented challenges of enabling and stimulating multiple healthcare data providers and stakeholders to have more active participation in the digital health ecosystem. First, the paper systematically proposes the MyData approach for healthcare and preventive health data ecosystem. In this research, the work is targeted for health and wellness ecosystems. Each ecosystem consists of key actors, such as 1) individual (citizen or professional controlling/using the services) i.e. data subject, 2) services providing personal data (e.g. startups providing data collection apps or data collection devices), 3) health and wellness services utilizing aforementioned data and 4) services authorizing the access to this data under individual’s provided explicit consent. Second, the research extends the existing four archetypes of orchestrator-driven healthcare data business models for the healthcare industry and proposes the fifth type of healthcare data model, the MyData Blockchain Platform. This new architecture is developed by the Action Design Research approach, which is a prominent research methodology in the information system domain. The key novelty of the paper is to expand the health data value chain architecture and design from centralization and pseudo-decentralization to full decentralization, enabled by blockchain, thus the MyData blockchain platform. The study not only broadens the healthcare informatics literature but also contributes to the theoretical development of digital healthcare and blockchain research domains with a systemic approach.Keywords: blockchain, health data, platform, action design
Procedia PDF Downloads 100558 A Review of Ultralightweight Mutual Authentication Protocols
Authors: Umar Mujahid, Greatzel Unabia, Hongsik Choi, Binh Tran
Abstract:
Radio Frequency Identification (RFID) is one of the most commonly used technologies in IoTs and Wireless Sensor Networks which makes the devices identification and tracking extremely easy to manage. Since RFID uses wireless channel for communication, which is open for all types of adversaries, researchers have proposed many Ultralightweight Mutual Authentication Protocols (UMAPs) to ensure security and privacy in a cost-effective manner. These UMAPs involve simple bitwise logical operators such as XOR, AND, OR & Rot, etc., to design the protocol messages. However, most of these UMAPs were later reported to be vulnerable against many malicious attacks. In this paper, we have presented a detailed overview of some eminent UMAPs and also discussed the many security attacks on them. Finally, some recommendations and suggestions have been discussed, which can improve the design of the UMAPs.Keywords: RFID, Ultralightweight, UMAP, SASI
Procedia PDF Downloads 154557 The Impact of a Weak Constitutional Review of Executive Actions in Implementing Women Rights in Saudi Arabia
Authors: Aysha Alshehri
Abstract:
This paper provides a literature review of the sources of women’s rights under the Saudi legal framework, taking account of the constitutional primacy of Sharia under the Saudi legal system as well as the state’s obligations under international law. Building on one of the central aims of the paper, it conducts an exploration of how Saudi Arabia already has or might be further able to more clearly delineate its position and reservations in the adoptions of international human rights agreements while preserving its core religious beliefs and societal practices in regard to women’s rights at the domestic level. In this regard, the paper will consider the apparent tension between certain jurisprudential and customary aspects on gender equality and contemporary discourses of women’s rights from within and outside the Muslim world. Particular attention will be devoted to the question of the causes behind the lack of direct application of women’s rights mentioned by international reports and any challenges this may bring in the contexts of Saudi Arabia’s evolving gender equality policies.Keywords: Islamic Constitution, executive actions, gender equality, judicial review
Procedia PDF Downloads 123556 An Anthropological Perspective: Interaction with Extended Kinship in Saudi Arabia in the 21st Century
Authors: Alaa Alshehri
Abstract:
It has been thought that kinship in modernization is moving in a linear Western model; however, the literature shows that different cultures adjust to modernization by preserving its norms and values. Saudi Arabia is a young country experiencing rapid expansion from oil discovery until economic diversification. By conducting 10 interviews from different provinces of the country from the age of 27-47, these anthropological studies suggest that Saudi people adapted to modernization and globalization through unique interactions with extended families by asking the participants to give detailed descriptions of their interactions with their kinship. With almost all the participants noticing the changes within the last few years, this interaction is rooted in their religious beliefs, which they stressed, even with the free choice of life opportunities. They tried to find a balance between individuality and collectivity and connect the gap between the older and younger generations. This study adds to the anthropological debate on kinship definition and ties in modernization and provides a perspective on the social reality of one of the major Middle Eastern countries, Saudi Arabia.Keywords: collectivity, economic diversification, kinship, modernization theory, individuality
Procedia PDF Downloads 103555 Secure Image Retrieval Based on Orthogonal Decomposition under Cloud Environment
Authors: Y. Xu, L. Xiong, Z. Xu
Abstract:
In order to protect data privacy, image with sensitive or private information needs to be encrypted before being outsourced to the cloud. However, this causes difficulties in image retrieval and data management. A secure image retrieval method based on orthogonal decomposition is proposed in the paper. The image is divided into two different components, for which encryption and feature extraction are executed separately. As a result, cloud server can extract features from an encrypted image directly and compare them with the features of the queried images, so that the user can thus obtain the image. Different from other methods, the proposed method has no special requirements to encryption algorithms. Experimental results prove that the proposed method can achieve better security and better retrieval precision.Keywords: secure image retrieval, secure search, orthogonal decomposition, secure cloud computing
Procedia PDF Downloads 487554 Far-Field Acoustic Prediction of a Supersonic Expanding Jet Using Large Eddy Simulation
Authors: Jesus Ruano, Asensi Oliva
Abstract:
The hydrodynamic field generated by a jet expansion is computed via three dimensional compressible Large Eddy Simulation (LES). Finite Volume Method (FVM) will be the discretization used during this simulation as well as hybrid schemes based on Kinetic Energy Preserving (KEP) schemes and up-winding Godunov based schemes with instabilities detectors. Velocity and pressure fields will be stored at different surfaces near the jet, but far enough to enclose all the fluctuations, in order to use them as input for the acoustic solver. The acoustic field is obtained in the far-field region at several locations by means of a hybrid method based on Ffowcs-Williams and Hawkings (FWH) equation. This equation will be formulated in the spectral domain, via Fourier Transform of the acoustic sources, which are modeled from the results of the initial simulation. The obtained results will allow the study of the broadband noise generated as well as sound directivities.Keywords: far-field noise, Ffowcs-Williams and Hawkings, finite volume method, large eddy simulation, jet noise
Procedia PDF Downloads 298553 Analysis of Green Wood Preservation Chemicals
Authors: Aitor Barbero-López, Soumaya Chibily, Gerhard Scheepers, Thomas Grahn, Martti Venäläinen, Antti Haapala
Abstract:
Wood decay is addressed continuously within the wood industry through use and development of wood preservatives. The increasing awareness on the negative effects of many chemicals towards the environment is causing political restrictions in their use and creating more urgent need for research on green alternatives. This paper discusses some of the possible natural extracts for wood preserving applications and compares the analytical methods available for testing their behavior and efficiency against decay fungi. The results indicate that natural extracts have interesting chemical constituents that delay fungal growth but vary in efficiency depending on the chemical concentration and substrate used. Results also suggest that presence and redistribution of preservatives in wood during exposure trials can be assessed by spectral imaging methods although standardized methods are not available. This study concludes that, in addition to the many standard methods available, there is a need to develop new faster methods for screening potential preservative formulation while maintaining the comparability and relevance of results.Keywords: analytics, methods, preservatives, wood decay
Procedia PDF Downloads 233552 The Internet of Things Ecosystem: Survey of the Current Landscape, Identity Relationship Management, Multifactor Authentication Mechanisms, and Underlying Protocols
Authors: Nazli W. Hardy
Abstract:
A critical component in the Internet of Things (IoT) ecosystem is the need for secure and appropriate transmission, processing, and storage of the data. Our current forms of authentication, and identity and access management do not suffice because they are not designed to service cohesive, integrated, interconnected devices, and service applications. The seemingly endless opportunities of IoT are in fact circumscribed on multiple levels by concerns such as trust, privacy, security, loss of control, and related issues. This paper considers multi-factor authentication (MFA) mechanisms and cohesive identity relationship management (IRM) standards. It also surveys messaging protocols that are appropriate for the IoT ecosystem.Keywords: identity relation management, multifactor authentication, protocols, survey of internet of things ecosystem
Procedia PDF Downloads 356551 Exploring De-Fi through 3 Case Studies: Transparency, Social Impact, and Regulation
Authors: Dhaksha Vivekanandan
Abstract:
DeFi is a network that avoids reliance on financial intermediaries through its peer-to-peer financial network. DeFi operates outside of government control; hence it is important for us to understand its impacts. This study employs a literature review to understand DeFi and its emergence, as well as its implications on transparency, social impact, and regulation. Further, 3 case studies are analysed within the context of these categories. DeFi’s provision of increased transparency poses environmental and storage costs and can lead to user privacy being endangered. DeFi allows for the provision of entrepreneurial incentives and protection against monetary censorship and capital control. Despite DeFi's transparency issues and volatility costs, it has huge potential to reduce poverty; however, regulation surrounding DeFi still requires further tightening by governments.Keywords: DeFi, transparency, regulation, social impact
Procedia PDF Downloads 85550 Continual Learning Using Data Generation for Hyperspectral Remote Sensing Scene Classification
Authors: Samiah Alammari, Nassim Ammour
Abstract:
When providing a massive number of tasks successively to a deep learning process, a good performance of the model requires preserving the previous tasks data to retrain the model for each upcoming classification. Otherwise, the model performs poorly due to the catastrophic forgetting phenomenon. To overcome this shortcoming, we developed a successful continual learning deep model for remote sensing hyperspectral image regions classification. The proposed neural network architecture encapsulates two trainable subnetworks. The first module adapts its weights by minimizing the discrimination error between the land-cover classes during the new task learning, and the second module tries to learn how to replicate the data of the previous tasks by discovering the latent data structure of the new task dataset. We conduct experiments on HSI dataset Indian Pines. The results confirm the capability of the proposed method.Keywords: continual learning, data reconstruction, remote sensing, hyperspectral image segmentation
Procedia PDF Downloads 268549 Investigation of Active Modified Atmosphere and Nanoparticle Packaging on Quality of Tomatoes
Authors: M. Ghasemi-Varnamkhasti, S. H. Yoosefian, A. Mohammad-Razdari
Abstract:
This study investigated the effects of Ag nanoparticle polyethylene film and active modified atmosphere on the postharvest quality of tomatoes stored at 6 ºC. The atmosphere composition used in the packaging was 7% O2 + 7% CO2 + 86% N2, and synthetic air (control). The variables measured were weight loss, firmness, color and respiration rate over 21 days. The results showed that the combination of Ag nanoparticle polyethylene film and modified atmosphere could extend the shelf life of tomatoes to 21 days and could influence the postharvest quality of tomatoes. Also, existence of Ag nanoparticles caused preventing from increasing weight loss, a*, b*, Chroma, Hue angle and reducing firmness and L*. As well as, tomatoes at Ag nanoparticle polyethylene films had lower respiration rate than Polyethylene and paper bags to 13.27% and 23.50%, respectively. The combination of Ag nanoparticle polyethylene film and active modified atmosphere was effective with regard to delaying maturity during the storage period, and preserving the quality of tomatoes.Keywords: ag nanoparticles, modified atmosphere, polyethylene film, tomato
Procedia PDF Downloads 276548 An Axiomatic Approach to Constructing an Applied Theory of Possibility
Authors: Oleksii Bychkov
Abstract:
The fundamental difference between randomness and vagueness is that the former requires statistical research. These issues were studied by Zadeh L, Dubois D., Prad A. The theory of possibility works with expert assessments, hypotheses, etc. gives an idea of the characteristics of the problem situation, the nature of the goals and real limitations. Possibility theory examines experiments that are not repeated. The article discusses issues related to the formalization of a fuzzy, uncertain idea of reality. The author proposes to expand the classical model of the theory of possibilities by introducing a measure of necessity. The proposed model of the theory of possibilities allows us to extend the measures of possibility and necessity onto a Boolean while preserving the properties of the measure. Thus, upper and lower estimates are obtained to describe the fact that the event will occur. Knowledge of the patterns that govern mass random, uncertain, fuzzy events allows us to predict how these events will proceed. The article proposed for publication quite fully reveals the essence of the construction and use of the theory of probability and the theory of possibility.Keywords: possibility, artificial, modeling, axiomatics, intellectual approach
Procedia PDF Downloads 35547 Radio Based Location Detection
Authors: M. Pallikonda Rajasekaran, J. Joshapath, Abhishek Prasad Shaw
Abstract:
Various techniques has been employed to find location such as GPS, GLONASS, Galileo, and Beidou (compass). This paper currently deals with finding location using the existing FM signals that operates between 88-108 MHz. The location can be determined based on the received signal strength of nearby existing FM stations by mapping the signal strength values using trilateration concept. Thus providing security to users data and maintains eco-friendly environment at zero installation cost as this technology already existing FM stations operating in commercial FM band 88-108 MHZ. Along with the signal strength based trilateration it also finds azimuthal angle of the transmitter by employing directional antenna like Yagi-Uda antenna at the receiver side.Keywords: location, existing FM signals, received signal strength, trilateration, security, eco-friendly, direction, privacy, zero installation cost
Procedia PDF Downloads 519546 MSG Image Encryption Based on AES and RSA Algorithms "MSG Image Security"
Authors: Boukhatem Mohammed Belkaid, Lahdir Mourad
Abstract:
In this paper, we propose a new encryption system for security issues meteorological images from Meteosat Second Generation (MSG), which generates 12 images every 15 minutes. The hybrid encryption scheme is based on AES and RSA algorithms to validate the three security services are authentication, integrity and confidentiality. Privacy is ensured by AES, authenticity is ensured by the RSA algorithm. Integrity is assured by the basic function of the correlation between adjacent pixels. Our system generates a unique password every 15 minutes that will be used to encrypt each frame of the MSG meteorological basis to strengthen and ensure his safety. Several metrics have been used for various tests of our analysis. For the integrity test, we noticed the efficiencies of our system and how the imprint cryptographic changes at reception if a change affects the image in the transmission channel.Keywords: AES, RSA, integrity, confidentiality, authentication, satellite MSG, encryption, decryption, key, correlation
Procedia PDF Downloads 385545 Abnormality Detection of Persons Living Alone Using Daily Life Patterns Obtained from Sensors
Authors: Ippei Kamihira, Takashi Nakajima, Taiyo Matsumura, Hikaru Miura, Takashi Ono
Abstract:
In this research, the goal was construction of a system by which multiple sensors were used to observe the daily life behavior of persons living alone (while respecting their privacy). Using this information to judge such conditions as a bad physical condition or falling in the home, etc., so that these abnormal conditions can be made known to relatives and third parties. The daily life patterns of persons living alone are expressed by the number of responses of sensors each time that a set time period has elapsed. By comparing data for the prior two weeks, it was possible to judge a situation as 'normal' when the person was in a good physical condition or as 'abnormal' when the person was in a bad physical condition.Keywords: sensors, elderly living alone, abnormality detection, iifestyle habit
Procedia PDF Downloads 254544 The Importance of Conserving Pre-Historical, Historical and Cultural Heritage and Its Tourist Exploitation
Authors: Diego Renan G. Tudela, Veruska C. Dutra, Mary Lucia Gomes Silveira de Senna, Afonso R. Aquino
Abstract:
Tourism in the present is the largest industry in the world, being an important global activity that has grown a lot in recent times. In this context, the activity of cultural tourism is growing, being seen as an important source of knowledge and information enjoyed by visitors. This article aims to discuss the cultural tourism, archaeological records and indigenous communities and the importance of preserving these invaluable sources of information, focusing on the records of the first peoples inhabiting the South American and North American lands. The study was based on discussions, theoretical studies, bibliographical research. Archaeological records are an important source of knowledge and information. Indigenous ethnic tourism represents a rescue of the authenticity of indigenous traditional cultures and their relation to the natural habitat. Cultural and indigenous tourism activity requires long-term planning to make it a sustainable activity.Keywords: tourism, culture, preservation, discussions
Procedia PDF Downloads 262543 Secure E-Pay System Using Steganography and Visual Cryptography
Authors: K. Suganya Devi, P. Srinivasan, M. P. Vaishnave, G. Arutperumjothi
Abstract:
Today’s internet world is highly prone to various online attacks, of which the most harmful attack is phishing. The attackers host the fake websites which are very similar and look alike. We propose an image based authentication using steganography and visual cryptography to prevent phishing. This paper presents a secure steganographic technique for true color (RGB) images and uses Discrete Cosine Transform to compress the images. The proposed method hides the secret data inside the cover image. The use of visual cryptography is to preserve the privacy of an image by decomposing the original image into two shares. Original image can be identified only when both qualified shares are simultaneously available. Individual share does not reveal the identity of the original image. Thus, the existence of the secret message is hard to be detected by the RS steganalysis.Keywords: image security, random LSB, steganography, visual cryptography
Procedia PDF Downloads 330542 Use of Cloud Computing and Smart Devices in Healthcare
Authors: Nikunj Agarwal, M. P. Sebastian
Abstract:
Cloud computing can reduce the start-up expenses of implementing EHR (Electronic Health Records). However, many of the healthcare institutions are yet to implement cloud computing due to the associated privacy and security issues. In this paper, we analyze the challenges and opportunities of implementing cloud computing in healthcare. We also analyze data of over 5000 US hospitals that use Telemedicine applications. This analysis helps to understand the importance of smart phones over the desktop systems in different departments of the healthcare institutions. The wide usage of smartphones and cloud computing allows ubiquitous and affordable access to the health data by authorized persons, including patients and doctors. Cloud computing will prove to be beneficial to a majority of the departments in healthcare. Through this analysis, we attempt to understand the different healthcare departments that may benefit significantly from the implementation of cloud computing.Keywords: cloud computing, smart devices, healthcare, telemedicine
Procedia PDF Downloads 397541 An Indoor Positioning System in Wireless Sensor Networks with Measurement Delay
Authors: Pyung Soo Kim, Eung Hyuk Lee, Mun Suck Jang
Abstract:
In the current paper, an indoor positioning system is proposed with consideration of measurement delay. Firstly, an estimation filter with a measurement delay is designed for the indoor positioning mechanism under a weighted least square criterion, which utilizes only finite measurements on the most recent window. The proposed estimation filtering based scheme gives the filtered estimates for position, velocity and acceleration of moving target in real-time, while removing undesired noisy effects and preserving desired moving positions. Secondly, the proposed scheme is shown to have good inherent properties such as unbiasedness, efficiency, time-invariance, deadbeat, and robustness due to the finite memory structure. Finally, computer simulations shows that the performance of the proposed estimation filtering based scheme can outperform to the existing infinite memory filtering based mechanism.Keywords: indoor positioning system, wireless sensor networks, measurement delay
Procedia PDF Downloads 484540 Using Machine Learning Techniques for Autism Spectrum Disorder Analysis and Detection in Children
Authors: Norah Mohammed Alshahrani, Abdulaziz Almaleh
Abstract:
Autism Spectrum Disorder (ASD) is a condition related to issues with brain development that affects how a person recognises and communicates with others which results in difficulties with interaction and communication socially and it is constantly growing. Early recognition of ASD allows children to lead safe and healthy lives and helps doctors with accurate diagnoses and management of conditions. Therefore, it is crucial to develop a method that will achieve good results and with high accuracy for the measurement of ASD in children. In this paper, ASD datasets of toddlers and children have been analyzed. We employed the following machine learning techniques to attempt to explore ASD and they are Random Forest (RF), Decision Tree (DT), Na¨ıve Bayes (NB) and Support Vector Machine (SVM). Then Feature selection was used to provide fewer attributes from ASD datasets while preserving model performance. As a result, we found that the best result has been provided by the Support Vector Machine (SVM), achieving 0.98% in the toddler dataset and 0.99% in the children dataset.Keywords: autism spectrum disorder, machine learning, feature selection, support vector machine
Procedia PDF Downloads 153539 Minimizing Mutant Sets by Equivalence and Subsumption
Authors: Samia Alblwi, Amani Ayad
Abstract:
Mutation testing is the art of generating syntactic variations of a base program and checking whether a candidate test suite can identify all the mutants that are not semantically equivalent to the base: this technique is widely used by researchers to select quality test suites. One of the main obstacles to the widespread use of mutation testing is cost: even small pro-grams (a few dozen lines of code) can give rise to a large number of mutants (up to hundreds): this has created an incentive to seek to reduce the number of mutants while preserving their collective effectiveness. Two criteria have been used to reduce the size of mutant sets: equiva-lence, which aims to partition the set of mutants into equivalence classes modulo semantic equivalence, and selecting one representative per class; subsumption, which aims to define a partial ordering among mutants that ranks mutants by effectiveness and seeks to select maximal elements in this ordering. In this paper we analyze these two policies using analytical and em-pirical criteria.Keywords: mutation testing, mutant sets, mutant equivalence, mutant subsumption, mutant set minimization
Procedia PDF Downloads 64538 Post-Harvest Preservation of Mango Fruit Using Freeze and Tray Drying Methods
Authors: O. A. Adeyeye, E. R. Sadiku, Periyar Selvam Sellamuthu, Anand Babu Perumal, Reshma B. Nambiar
Abstract:
Mango is a tropical fruit which is often labelled as ‘super-fruit’ because of its unquantifiable benefits to human beings. However, despite its great importance, mango is a seasonal fruit and only very few off-seasonal cultivars are available in the market for consumption. Therefore, to overcome the seasonal variation and to increase the shelf-life of mango fruits, different drying methods are considered. In this study, freeze drying and tray drying methods were used to preserve two different cultivars of mango from South Africa. Moisture content, total soluble solid, ascorbic acid, total phenol content (TPC), antioxidant activity (DPPH) and organoleptic tests were carried out on the samples before and after drying. The effects of different edible preservatives and selected packaging materials used were analyzed on each sample. The result showed that freeze drying method is the best method of preserving the selected cultivar.Keywords: postharvest, Mangos, cultivar, total soluble solid, total phenol content, antioxidant
Procedia PDF Downloads 353537 Econometric Analysis of Organic Vegetable Production in Turkey
Authors: Ersin Karakaya, Halit Tutar
Abstract:
Reliable foods must be consumed in terms of healthy nutrition. The production and dissemination of diatom products in Turkey is rapidly evolving on the basis of preserving ecological balance, ensuring sustainability in agriculture and offering quality, reliable products to consumers. In this study, year in Turkey as (2002- 2015) to determine values of such as cultivated land of organic vegetable production, production levels, production quantity, number of products, number of farmers. It is intended to make the econometric analysis of the factors affecting the production of organic vegetable production (Number of products, Number of farmers and cultivated land). The main material of the study has created secondary data in relation to the 2002-2015 period as organic vegetable production in Turkey and regression analysis of the factors affecting the value of production of organic vegetable is determined by the Least Squares Method with EViews statistical software package.Keywords: number of farmers, cultivated land, Eviews, Turkey
Procedia PDF Downloads 307536 Ethical, Legal and Societal Aspects of Unmanned Aircraft in Defence
Authors: Henning Lahmann, Benjamyn I. Scott, Bart Custers
Abstract:
Suboptimal adoption of AI in defence organisations carries risks for the protection of the freedom, safety, and security of society. Despite the vast opportunities that defence AI-technology presents, there are also a variety of ethical, legal, and societal concerns. To ensure the successful use of AI technology by the military, ethical, legal, and societal aspects (ELSA) need to be considered, and their concerns continuously addressed at all levels. This includes ELSA considerations during the design, manufacturing and maintenance of AI-based systems, as well as its utilisation via appropriate military doctrine and training. This raises the question how defence organisations can remain strategically competitive and at the edge of military innovation, while respecting the values of its citizens. This paper will explain the set-up and share preliminary results of a 4-year research project commissioned by the National Research Council in the Netherlands on the ethical, legal, and societal aspects of AI in defence. The project plans to develop a future-proof, independent, and consultative ecosystem for the responsible use of AI in the defence domain. In order to achieve this, the lab shall devise a context-dependent methodology that focuses on the ‘analysis’, ‘design’ and ‘evaluation’ of ELSA of AI-based applications within the military context, which include inter alia unmanned aircraft. This is bolstered as the Lab also recognises and complements the existing methods in regards to human-machine teaming, explainable algorithms, and value-sensitive design. Such methods will be modified for the military context and applied to pertinent case-studies. These case-studies include, among others, the application of autonomous robots (incl. semi- autonomous) and AI-based methods against cognitive warfare. As the perception of the application of AI in the military context, by both society and defence personnel, is important, the Lab will study how these perceptions evolve and vary in different contexts. Furthermore, the Lab will monitor – as they may influence people’s perception – developments in the global technological, military and societal spheres. Although the emphasis of the research project is on different forms of AI in defence, it focuses on several case studies. One of these case studies is on unmanned aircraft, which will also be the focus of the paper. Hence, ethical, legal, and societal aspects of unmanned aircraft in the defence domain will be discussed in detail, including but not limited to privacy issues. Typical other issues concern security (for people, objects, data or other aircraft), privacy (sensitive data, hindrance, annoyance, data collection, function creep), chilling effects, PlayStation mentality, and PTSD.Keywords: autonomous weapon systems, unmanned aircraft, human-machine teaming, meaningful human control, value-sensitive design
Procedia PDF Downloads 93535 Post Harvest Preservation of Mango Fruit Using Freeze Drying and Tray Drying Methods
Authors: O. A. Adeyeye, E. R. Sadiku, Selvam Sellamuthu Periyar, Babu Perumal Anand, B. Nambiar Reshma
Abstract:
Mango is a tropical fruit which is often labelled as ‘super-fruit’ because of its unquantifiable benefits to human beings. However, despite its great importance, mango is a seasonal fruit, and only very few off-seasonal species are available in the market for consumption. Therefore, in order to overcome the seasonal variation and to increase the shelf-life of mango fruits, different drying methods are considered In this study, freeze drying and tray drying methods were used to preserve two different cultivars of mango from South Africa. Moisture content, total soluble solid, ascorbic acid, total phenol content (TPC), antioxidant activity (DPPH) and organoleptic tests were carried out on the samples before and after drying. The effects of different edible preservatives and selected packaging materials used were analyzed on each sample. The result showed that freeze drying method is the best method of preserving the selected cultivar.Keywords: postharvest, mangos, cultivar, total soluble solid, total phenol content, antioxidant
Procedia PDF Downloads 393