Search results for: port safety and security
2818 Trust Management for an Authentication System in Ubiquitous Computing
Authors: Malika Yaici, Anis Oussayah, Mohamed Ahmed Takerrabet
Abstract:
Security of context-aware ubiquitous systems is paramount, and authentication plays an important aspect in cloud computing and ubiquitous computing. Trust management has been identified as vital component for establishing and maintaining successful relational exchanges between trading partners in cloud and ubiquitous systems. Establishing trust is the way to build good relationship with both client and provider which positive activates will increase trust level, otherwise destroy trust immediately. We propose a new context-aware authentication system using a trust management system between client and server, and between servers, a trust which induces partnership, thus to a close cooperation between these servers. We defined the rules (algorithms), as well as the formulas to manage and calculate the trusting degrees depending on context, in order to uniquely authenticate a user, thus a single sign-on, and to provide him better services.Keywords: ubiquitous computing, authentication, context-awareness, trust management
Procedia PDF Downloads 2432817 Risk Analysis in Road Transport of Dangerous Goods Using Complex Multi-Criteria Analysis Method
Authors: Zoran Masoničić, Siniša Dragutinović, Ivan Lazović
Abstract:
In the management and organization of the road transport of dangerous goods, in addition to the existing influential criteria and restrictions that apply to the road transport in general, it is necessary to include an additional criteria related to the safety of people and the environment, considering the danger that comes from the substances being transported. In that manner, the decision making process becomes very complex and rather challenging task that is inherent to the application of complex numerical multi-criteria analysis methods. In this paper some initial results of application of complex analysis method in decision making process are presented. Additionally, the method for minimization or even complete elimination of subjective element in the decision making process is provided. The results obtained can be used in order to point the direction towards some measures have to be applied in order to minimize or completely annihilate the influence of the risk source identified.Keywords: road transport, dangerous goods, risk analysis, risk evaluation
Procedia PDF Downloads 162816 Evaluating Electronic Service Quality in Banking Iran
Authors: Vahid Bairami Rad
Abstract:
With the rapid growth of the Internet and the globalization of the market, most enterprises are trying to attract and win customers in the highly competitive electronic market. Better e-service quality will enhance the relationship with customers and their satisfaction. So the measurement of eservice quality is very important but it is a complex process due to the complex nature of services. Literature predicts that there is a lack of universal definition of e-service quality. The e-service quality measures in banking have great importance in achieving high customer base. This paper proposes a conceptual model for measuring e-service quality in Iranian Banking Iran. Nine dimensions reliability, ease of use, personalization, security and trust, website aesthetic, responsiveness, contact and speed of delivery had been identified. The results of this paper may help to develop a proper scale to measure the e-service quality in Iranian Banking Industry, which may assist to maintain and improve the performance and effectiveness of e-service quality to retain customers.Keywords: electronic banking, Dimensions, customer service quality, electronic, communication
Procedia PDF Downloads 5002815 Security in Resource Constraints Network Light Weight Encryption for Z-MAC
Authors: Mona Almansoori, Ahmed Mustafa, Ahmad Elshamy
Abstract:
Wireless sensor network was formed by a combination of nodes, systematically it transmitting the data to their base stations, this transmission data can be easily compromised if the limited processing power and the data consistency from these nodes are kept in mind; there is always a discussion to address the secure data transfer or transmission in actual time. This will present a mechanism to securely transmit the data over a chain of sensor nodes without compromising the throughput of the network by utilizing available battery resources available in the sensor node. Our methodology takes many different advantages of Z-MAC protocol for its efficiency, and it provides a unique key by sharing the mechanism using neighbor node MAC address. We present a light weighted data integrity layer which is embedded in the Z-MAC protocol to prove that our protocol performs well than Z-MAC when we introduce the different attack scenarios.Keywords: hybrid MAC protocol, data integrity, lightweight encryption, neighbor based key sharing, sensor node dataprocessing, Z-MAC
Procedia PDF Downloads 1442814 Feasibility Study of Wireless Communication for the Control and Monitoring of Rotating Electrical Machine
Authors: S. Ben Brahim, T. H. Vuong, J. David, R. Bouallegue, M. Pietrzak-David
Abstract:
Electrical machine monitoring is important to protect motor from unexpected problems. Today, using wireless communication for electrical machines is interesting for both real time monitoring and diagnostic purposes. In this paper, we propose a system based on wireless communication IEEE 802.11 to control electrical machine. IEEE 802.11 standard is recommended for this type of applications because it provides a faster connection, better range from the base station, and better security. Therefore, our contribution is to study a new technique to control and monitor the rotating electrical machines (motors, generators) using wireless communication. The reliability of radio channel inside rotating electrical machine is also discussed. Then, the communication protocol, software and hardware design used for the proposed system are presented in detail and the experimental results of our system are illustrated.Keywords: control, DFIM machine, electromagnetic field, EMC, IEEE 802.11, monitoring, rotating electrical machines, wireless communication
Procedia PDF Downloads 6952813 On-Line Data-Driven Multivariate Statistical Prediction Approach to Production Monitoring
Authors: Hyun-Woo Cho
Abstract:
Detection of incipient abnormal events in production processes is important to improve safety and reliability of manufacturing operations and reduce losses caused by failures. The construction of calibration models for predicting faulty conditions is quite essential in making decisions on when to perform preventive maintenance. This paper presents a multivariate calibration monitoring approach based on the statistical analysis of process measurement data. The calibration model is used to predict faulty conditions from historical reference data. This approach utilizes variable selection techniques, and the predictive performance of several prediction methods are evaluated using real data. The results shows that the calibration model based on supervised probabilistic model yielded best performance in this work. By adopting a proper variable selection scheme in calibration models, the prediction performance can be improved by excluding non-informative variables from their model building steps.Keywords: calibration model, monitoring, quality improvement, feature selection
Procedia PDF Downloads 3562812 Automated Buffer Box Assembly Cell Concept for the Canadian Used Fuel Packing Plant
Authors: Dimitrie Marinceu, Alan Murchison
Abstract:
The Canadian Used Fuel Container (UFC) is a mid-size hemispherical headed copper coated steel container measuring 2.5 meters in length and 0.5 meters in diameter containing 48 used fuel bundles. The contained used fuel produces significant gamma radiation requiring automated assembly processes to complete the assembly. The design throughput of 2,500 UFCs per year places constraints on equipment and hot cell design for repeatability, speed of processing, robustness and recovery from upset conditions. After UFC assembly, the UFC is inserted into a Buffer Box (BB). The BB is made from adequately pre-shaped blocks (lower and upper block) and Highly Compacted Bentonite (HCB) material. The blocks are practically ‘sandwiching’ the UFC between them after assembly. This paper identifies one possible approach for the BB automatic assembly cell and processes. Automation of the BB assembly will have a significant positive impact on nuclear safety, quality, productivity, and reliability.Keywords: used fuel packing plant, automatic assembly cell, used fuel container, buffer box, deep geological repository
Procedia PDF Downloads 2752811 Authentication of Physical Objects with Dot-Based 2D Code
Authors: Michał Glet, Kamil Kaczyński
Abstract:
Counterfeit goods and documents are a global problem, which needs more and more sophisticated methods of resolving it. Existing techniques using watermarking or embedding symbols on objects are not suitable for all use cases. To address those special needs, we created complete system allowing authentication of paper documents and physical objects with flat surface. Objects are marked using orientation independent and resistant to camera noise 2D graphic codes, named DotAuth. Based on the identifier stored in 2D code, the system is able to perform basic authentication and allows to conduct more sophisticated analysis methods, e.g., relying on augmented reality and physical properties of the object. In this paper, we present the complete architecture, algorithms and applications of the proposed system. Results of the features comparison of the proposed solution and other products are presented as well, pointing to the existence of many advantages that increase usability and efficiency in the means of protecting physical objects.Keywords: anti-forgery, authentication, paper documents, security
Procedia PDF Downloads 1332810 Beneficial Effect of Biotin in Combination with Canagliflozin on High Fat Diet Induced Diabetes in Rats
Authors: Rayhana Begum, HongBin Wang, Nur Alam Siddiquee, Md.Yasin Ahmed
Abstract:
Biotin treatment has significant effects on blood glucose, and pharmacological doses of biotin improve hyperglycemia. The present study was aimed to investigate the efficacy and safety of biotin in combination with canagliflozin in improving glycemic control on High Fat Diet-induced diabetes in Rats. Thirty male rats were divided into five groups (six rats /group): control, high fat diet (HFD), canagliflozin (CAG), biotin (BIO), and CAG + BIO. The treatments with CAG and /or BIO significantly reduced the body weight gain, blood glucose and HbA1c levels, whereas CAG in combination with BIO revealed greater glycemic improvement than CAG monotherapy. The treatment with CAG and /or BIO causes significant change in lipid profile and CK level while the treatment with CAG in combination with BIO showed better results as compared with CAG monotherapy. Furthermore, combination of biotin with CAG improved the pancreatic and cardiac damage when compared with other treated groups.Keywords: canagliflozin, biotin, HbA1c, lipid profile
Procedia PDF Downloads 1602809 ATM Location Problem and Cash Management in ATM's
Authors: M. Erol Genevois, D. Celik, H. Z. Ulukan
Abstract:
Automated teller machines (ATMs) can be considered among one of the most important service facilities in the banking industry. The investment in ATMs and the impact on the banking industry is growing steadily in every part of the world. The banks take into consideration many factors like safety, convenience, visibility, cost in order to determine the optimum locations of ATMs. Today, ATMs are not only available in bank branches but also at retail locations. Another important factor is the cash management in ATMs. A cash demand model for every ATM is needed in order to have an efficient cash management system. This forecasting model is based on historical cash demand data which is highly related to the ATMs location. So, the location and the cash management problem should be considered together. Although the literature survey on facility location models is quite large, it is surprising that there are only few studies which handle together ATMs location and cash management problem. In order to fulfill the gap, this paper provides a general review on studies, efforts and development in ATMs location and cash management problem.Keywords: ATM location problem, cash management problem, ATM cash replenishment problem, literature review in ATMs
Procedia PDF Downloads 4802808 Colorimetric Detection of Melamine in Milk Sample by Using In-Situ Formed Silver Nanoparticles by Tannic Acid
Authors: Md Fazle Alam, Amaj Ahmed Laskar, Hina Younus
Abstract:
Melamine toxicity which causes renal failure and death of humans and animals have recently attracted worldwide attention. Developing an easy, fast and sensitive method for the routine melamine detection is the need of the hour. Herein, we have developed a rapid, sensitive, one step and selective colorimetric method for the detection of melamine in milk samples based upon in-situ formation of silver nanoparticles (AgNPs) via tannic acid at room temperature. These AgNPs thus formed were characterized by UV-VIS spectrophotometer, transmission electron microscope (TEM), zetasizer and dynamic light scattering (DLS). Under optimal conditions, melamine could be selectively detected within the concentration range of 0.05-1.4 µM with a limit of detection (LOD) of 10.1 nM, which is lower than the strictest melamine safety requirement of 1 ppm. This assay does not utilize organic cosolvents, enzymatic reactions, light sensitive dye molecules and sophisticated instrumentation, thereby overcoming some of the limitations of conventional methods.Keywords: milk adulteration, melamine, silver nanoparticles, tannic acid
Procedia PDF Downloads 2462807 Rail Degradation Modelling Using ARMAX: A Case Study Applied to Melbourne Tram System
Authors: M. Karimpour, N. Elkhoury, L. Hitihamillage, S. Moridpour, R. Hesami
Abstract:
There is a necessity among rail transportation authorities for a superior understanding of the rail track degradation overtime and the factors influencing rail degradation. They need an accurate technique to identify the time when rail tracks fail or need maintenance. In turn, this will help to increase the level of safety and comfort of the passengers and the vehicles as well as improve the cost effectiveness of maintenance activities. An accurate model can play a key role in prediction of the long-term behaviour of railroad tracks. An accurate model can decrease the cost of maintenance. In this research, the rail track degradation is predicted using an autoregressive moving average with exogenous input (ARMAX). An ARMAX has been implemented on Melbourne tram data to estimate the values for the tram track degradation. Gauge values and rail usage in Million Gross Tone (MGT) are the main parameters used in the model. The developed model can accurately predict the future status of the tram tracks.Keywords: ARMAX, dynamic systems, MGT, prediction, rail degradation
Procedia PDF Downloads 2482806 Mapping and Measuring the Vulnerability Level of the Belawan District Community in Encountering the Rob Flood Disaster
Authors: Dessy Pinem, Rahmadian Sembiring, Adanil Bushra
Abstract:
Medan Belawan is one of the subdistricts of 21 districts in Medan. Medan Belawan Sub-district is directly adjacent to the Malacca Strait in the North. Due to its direct border with the Malacca Strait, the problem in this sub-district, which has continued for many years, is a flood of rob. In 2015, rob floods inundated Sicanang urban village, Belawan I urban village, Belawan Bahagia urban village and Bagan Deli village. The extent of inundation in the flood of rob that occurred in September 2015 reached 540, 938 ha. Rob flood is a phenomenon where the sea water is overflowing into the mainland. Rob floods can also be interpreted as a puddle of water on the coastal land that occurs when the tidal waters. So this phenomenon will inundate parts of the coastal plain or lower place of high tide sea level. Rob flood is a daily disaster faced by the residents in the district of Medan Belawan. Rob floods can happen every month and last for a week. The flood is not only the residents' houses, the flood also soaked the main road to Belawan Port reaching 50 cm. To deal with the problems caused by the flood and to prepare coastal communities to face the character of coastal areas, it is necessary to know the vulnerability of the people who are always the victims of the rob flood. Are the people of Medan Belawan sub-district, especially in the flood-affected villages, able to cope with the consequences of the floods? To answer this question, it is necessary to assess the vulnerability of the Belawan District community in the face of the flood disaster. This research is descriptive, qualitative and quantitative. Data were collected by observation, interview and questionnaires in 4 urban villages often affected by rob flood. The vulnerabilities measured are physical, economic, social, environmental, organizational and motivational vulnerabilities. For vulnerability in the physical field, the data collected is the distance of the building, floor area ratio, drainage, and building materials. For economic vulnerability, data collected are income, employment, building ownership, and insurance ownership. For the vulnerability in the social field, the data collected is education, number of family members, children, the elderly, gender, training for disasters, and how to dispose of waste. For the vulnerability in the field of organizational data collected is the existence of organizations that advocate for the victims, their policies and laws governing the handling of tidal flooding. The motivational vulnerability is seen from the information center or question and answer about the rob flood, and the existence of an evacuation plan or path to avoid disaster or reduce the victim. The results of this study indicate that most people in Medan Belawan sub-district have a high-level vulnerability in physical, economic, social, environmental, organizational and motivational fields. They have no access to economic empowerment, no insurance, no motivation to solve problems and only hope to the government, not to have organizations that support and defend them, and have physical buildings that are easily destroyed by rob floods.Keywords: disaster, rob flood, Medan Belawan, vulnerability
Procedia PDF Downloads 1262805 Pharmacokinetics and Safety of Pacritinib in Patients with Hepatic Impairment and Healthy Volunteers
Authors: Suliman Al-Fayoumi, Sherri Amberg, Huafeng Zhou, Jack W. Singer, James P. Dean
Abstract:
Pacritinib is an oral kinase inhibitor with specificity for JAK2, FLT3, IRAK1, and CSF1R. In clinical studies, pacritinib was well tolerated with clinical activity in patients with myelofibrosis. The most frequent adverse events (AEs) observed with pacritinib are gastrointestinal (diarrhea, nausea, and vomiting; mostly grade 1-2 in severity) and typically resolve within 2 weeks. A human ADME mass balance study demonstrated that pacritinib is predominantly cleared via hepatic metabolism and biliary excretion (>85% of administered dose). The major hepatic metabolite identified, M1, is not thought to materially contribute to the pharmacological activity of pacritinib. Hepatic diseases are known to impair hepatic blood flow, drug-metabolizing enzymes, and biliary transport systems and may affect drug absorption, disposition, efficacy, and toxicity. This phase 1 study evaluated the pharmacokinetics (PK) and safety of pacritinib and the M1 metabolite in study subjects with mild, moderate, or severe hepatic impairment (HI) and matched healthy subjects with normal liver function to determine if pacritinib dosage adjustments are necessary for patients with varying degrees of hepatic insufficiency. Study participants (aged 18-85 y) were enrolled into 4 groups based on their degree of HI as defined by Child-Pugh Clinical Assessment Score: mild (n=8), moderate (n=8), severe (n=4), and healthy volunteers (n=8) matched for age, BMI, and sex. Individuals with concomitant renal dysfunction or progressive liver disease were excluded. A single 400 mg dose of pacritinib was administered to all participants. Blood samples were obtained for PK evaluation predose and at multiple time points postdose through 168 h. Key PK parameters evaluated included maximum plasma concentration (Cmax), time to Cmax (Tmax), area under the plasma concentration time curve (AUC) from hour zero to last measurable concentration (AUC0-t), AUC extrapolated to infinity (AUC0-∞), and apparent terminal elimination half-life (t1/2). Following treatment, pacritinib was quantifiable for all study participants at 1 h through 168 h postdose. Systemic pacritinib exposure was similar between healthy volunteers and individuals with mild HI. However, there was a significant difference between those with moderate and severe HI and healthy volunteers with respect to peak concentration (Cmax) and plasma exposure (AUC0-t, AUC0-∞). Mean Cmax decreased by 47% and 57% respectively in participants with moderate and severe HI vs matched healthy volunteers. Similarly, mean AUC0-t decreased by 36% and 45% and mean AUC0-∞ decreased by 46% and 48%, respectively in individuals with moderate and severe HI vs healthy volunteers. Mean t1/2 ranged from 51.5 to 74.9 h across all groups. The variability on exposure ranged from 17.8% to 51.8% across all groups. Systemic exposure of M1 was also significantly decreased in study participants with moderate or severe HI vs. healthy participants and individuals with mild HI. These changes were not significantly dissimilar from the inter-patient variability in these parameters observed in healthy volunteers. All AEs were grade 1-2 in severity. Diarrhea and headache were the only AEs reported in >1 participant (n=4 each). Based on these observations, it is unlikely that dosage adjustments would be warranted in patients with mild, moderate, or severe HI treated with pacritinib.Keywords: pacritinib, myelofibrosis, hepatic impairment, pharmacokinetics
Procedia PDF Downloads 2992804 Artificial Intelligence and Police
Authors: Mehrnoosh Abouzari
Abstract:
Artificial intelligence has covered all areas of human life and has helped or replaced many jobs. One of the areas of application of artificial intelligence in the police is to detect crime, identify the accused or victim and prove the crime. It will play an effective role in implementing preventive justice and creating security in the community, and improving judicial decisions. This will help improve the performance of the police, increase the accuracy of criminal investigations, and play an effective role in preventing crime and high-risk behaviors in society. This article presents and analyzes the capabilities and capacities of artificial intelligence in police and similar examples used worldwide to prove the necessity of using artificial intelligence in the police. The main topics discussed include the performance of artificial intelligence in crime detection and prediction, the risk capacity of criminals and the ability to apply arbitray institutions, and the introduction of artificial intelligence programs implemented worldwide in the field of criminal investigation for police.Keywords: police, artificial intelligence, forecasting, prevention, software
Procedia PDF Downloads 2072803 Fiber Stiffness Detection of GFRP Using Combined ABAQUS and Genetic Algorithms
Authors: Gyu-Dong Kim, Wuk-Jae Yoo, Sang-Youl Lee
Abstract:
Composite structures offer numerous advantages over conventional structural systems in the form of higher specific stiffness and strength, lower life-cycle costs, and benefits such as easy installation and improved safety. Recently, there has been a considerable increase in the use of composites in engineering applications and as wraps for seismic upgrading and repairs. However, these composites deteriorate with time because of outdated materials, excessive use, repetitive loading, climatic conditions, manufacturing errors, and deficiencies in inspection methods. In particular, damaged fibers in a composite result in significant degradation of structural performance. In order to reduce the failure probability of composites in service, techniques to assess the condition of the composites to prevent continual growth of fiber damage are required. Condition assessment technology and nondestructive evaluation (NDE) techniques have provided various solutions for the safety of structures by means of detecting damage or defects from static or dynamic responses induced by external loading. A variety of techniques based on detecting the changes in static or dynamic behavior of isotropic structures has been developed in the last two decades. These methods, based on analytical approaches, are limited in their capabilities in dealing with complex systems, primarily because of their limitations in handling different loading and boundary conditions. Recently, investigators have introduced direct search methods based on metaheuristics techniques and artificial intelligence, such as genetic algorithms (GA), simulated annealing (SA) methods, and neural networks (NN), and have promisingly applied these methods to the field of structural identification. Among them, GAs attract our attention because they do not require a considerable amount of data in advance in dealing with complex problems and can make a global solution search possible as opposed to classical gradient-based optimization techniques. In this study, we propose an alternative damage-detection technique that can determine the degraded stiffness distribution of vibrating laminated composites made of Glass Fiber-reinforced Polymer (GFRP). The proposed method uses a modified form of the bivariate Gaussian distribution function to detect degraded stiffness characteristics. In addition, this study presents a method to detect the fiber property variation of laminated composite plates from the micromechanical point of view. The finite element model is used to study free vibrations of laminated composite plates for fiber stiffness degradation. In order to solve the inverse problem using the combined method, this study uses only first mode shapes in a structure for the measured frequency data. In particular, this study focuses on the effect of the interaction among various parameters, such as fiber angles, layup sequences, and damage distributions, on fiber-stiffness damage detection.Keywords: stiffness detection, fiber damage, genetic algorithm, layup sequences
Procedia PDF Downloads 2742802 Effects of the Flow Direction on the Fluid Flow and Heat Transfer in the Rod Bundle
Authors: Huirui Han, Chao Zhang
Abstract:
The rod bundle is used in the fuel assembly of the supercritical water-cooled nuclear reactor. In the rod bundle, the coolant absorbs the heat contributed by the fission process. Because of the dramatic variations in the thermophysical properties of water at supercritical conditions, it is essential to investigate the heat transfer characteristics of supercritical water in the rod bundle to ensure the safety of the nuclear power plant. In this study, the effects of the flow direction, including horizontal, upward, and downward, on the fluid flow and heat transfer of the supercritical water in the rod bundle were studied numerically. The results show the possibility of gap vortices in the flow subchannels of the rod bundle. In addition, the distributions of the circumferential wall temperature show differences in different flow direction conditions. It was also found that the circumferential cladding surface temperature distribution in the upward flow condition is extremely non-uniform, and there is a large difference between the maximum wall temperatures for different fuel rods.Keywords: heat transfer, rod bundle, supercritical water, wall temperature
Procedia PDF Downloads 1012801 Rock Thickness Measurement by Using Self-Excited Acoustical System
Authors: Janusz Kwaśniewski, Ireneusz Dominik, Krzysztof Lalik
Abstract:
The knowledge about rock layers thickness, especially above drilled mining pavements are crucial for workers safety. The measuring systems used nowadays are generally imperfect and there is a strong demand for improvement. The application of a new type of a measurement system called Self-Excited Acoustical System is presented in the paper. The system was applied until now to monitor stress changes in metal and concrete constructions. The change in measurement methodology resulted in possibility of measuring the thickness of the rocks above the tunnels as well as thickness of a singular rock layer. The idea is to find two resonance frequencies of the self-exited system, which consists of a vibration exciter and vibration receiver placed at a distance, which are coupled with a proper power amplifier, and which operate in a closed loop with a positive feedback. The resonance with the higher amplitude determines thickness of the whole rock, whereas the lower amplitude resonance indicates thickness of a singular layer. The results of the laboratory tests conducted on a group of different rock materials are also presented.Keywords: auto-oscillator, non-destructive testing, rock thickness measurement, geotechnic
Procedia PDF Downloads 3742800 Design of a Pneumonia Ontology for Diagnosis Decision Support System
Authors: Sabrina Azzi, Michal Iglewski, Véronique Nabelsi
Abstract:
Diagnosis error problem is frequent and one of the most important safety problems today. One of the main objectives of our work is to propose an ontological representation that takes into account the diagnostic criteria in order to improve the diagnostic. We choose pneumonia disease since it is one of the frequent diseases affected by diagnosis errors and have harmful effects on patients. To achieve our aim, we use a semi-automated method to integrate diverse knowledge sources that include publically available pneumonia disease guidelines from international repositories, biomedical ontologies and electronic health records. We follow the principles of the Open Biomedical Ontologies (OBO) Foundry. The resulting ontology covers symptoms and signs, all the types of pneumonia, antecedents, pathogens, and diagnostic testing. The first evaluation results show that most of the terms are covered by the ontology. This work is still in progress and represents a first and major step toward a development of a diagnosis decision support system for pneumonia.Keywords: Clinical decision support system, Diagnostic errors, Ontology, Pneumonia
Procedia PDF Downloads 1892799 Generation of Automated Alarms for Plantwide Process Monitoring
Authors: Hyun-Woo Cho
Abstract:
Earlier detection of incipient abnormal operations in terms of plant-wide process management is quite necessary in order to improve product quality and process safety. And generating warning signals or alarms for operating personnel plays an important role in process automation and intelligent plant health monitoring. Various methodologies have been developed and utilized in this area such as expert systems, mathematical model-based approaches, multivariate statistical approaches, and so on. This work presents a nonlinear empirical monitoring methodology based on the real-time analysis of massive process data. Unfortunately, the big data includes measurement noises and unwanted variations unrelated to true process behavior. Thus the elimination of such unnecessary patterns of the data is executed in data processing step to enhance detection speed and accuracy. The performance of the methodology was demonstrated using simulated process data. The case study showed that the detection speed and performance was improved significantly irrespective of the size and the location of abnormal events.Keywords: detection, monitoring, process data, noise
Procedia PDF Downloads 2522798 Traffic Light Detection Using Image Segmentation
Authors: Vaishnavi Shivde, Shrishti Sinha, Trapti Mishra
Abstract:
Traffic light detection from a moving vehicle is an important technology both for driver safety assistance functions as well as for autonomous driving in the city. This paper proposed a deep-learning-based traffic light recognition method that consists of a pixel-wise image segmentation technique and a fully convolutional network i.e., UNET architecture. This paper has used a method for detecting the position and recognizing the state of the traffic lights in video sequences is presented and evaluated using Traffic Light Dataset which contains masked traffic light image data. The first stage is the detection, which is accomplished through image processing (image segmentation) techniques such as image cropping, color transformation, segmentation of possible traffic lights. The second stage is the recognition, which means identifying the color of the traffic light or knowing the state of traffic light which is achieved by using a Convolutional Neural Network (UNET architecture).Keywords: traffic light detection, image segmentation, machine learning, classification, convolutional neural networks
Procedia PDF Downloads 1742797 Scientific and Regulatory Challenges of Advanced Therapy Medicinal Products
Authors: Alaa Abdellatif, Gabrièle Breda
Abstract:
Background. Advanced therapy medicinal products (ATMPs) are innovative therapies that mainly target orphan diseases and high unmet medical needs. ATMP includes gene therapy medicinal products (GTMP), somatic cell therapy medicinal products (CTMP), and tissue-engineered therapies (TEP). Since legislation opened the way in 2007, 25 ATMPs have been approved in the EU, which is about the same amount as the U.S. Food and Drug Administration. However, not all of the ATMPs that have been approved have successfully reached the market and retained their approval. Objectives. We aim to understand all the factors limiting the market access to very promising therapies in a systemic approach, to be able to overcome these problems, in the future, with scientific, regulatory and commercial innovations. Further to recent reviews that focus either on specific countries, products, or dimensions, we will address all the challenges faced by ATMP development today. Methodology. We used mixed methods and a multi-level approach for data collection. First, we performed an updated academic literature review on ATMP development and their scientific and market access challenges (papers published between 2018 and April 2023). Second, we analyzed industry feedback from cell and gene therapy webinars and white papers published by providers and pharmaceutical industries. Finally, we established a comparative analysis of the regulatory guidelines published by EMA and the FDA for ATMP approval. Results: The main challenges in bringing these therapies to market are the high development costs. Developing ATMPs is expensive due to the need for specialized manufacturing processes. Furthermore, the regulatory pathways for ATMPs are often complex and can vary between countries, making it challenging to obtain approval and ensure compliance with different regulations. As a result of the high costs associated with ATMPs, challenges in obtaining reimbursement from healthcare payers lead to limited patient access to these treatments. ATMPs are often developed for orphan diseases, which means that the patient population is limited for clinical trials which can make it challenging to demonstrate their safety and efficacy. In addition, the complex manufacturing processes required for ATMPs can make it challenging to scale up production to meet demand, which can limit their availability and increase costs. Finally, ATMPs face safety and efficacy challenges: dangerous adverse events of these therapies like toxicity related to the use of viral vectors or cell therapy, starting material and donor-related aspects. Conclusion. As a result of our mixed method analysis, we found that ATMPs face a number of challenges in their development, regulatory approval, and commercialization and that addressing these challenges requires collaboration between industry, regulators, healthcare providers, and patient groups. This first analysis will help us to address, for each challenge, proper and innovative solution(s) in order to increase the number of ATMPs approved and reach the patientsKeywords: advanced therapy medicinal products (ATMPs), product development, market access, innovation
Procedia PDF Downloads 762796 Occupational Health Hazards of Itinerant Waste Buyers (IWBs) in Kathmandu, Nepal
Authors: Ashish Khanal, Suja Giri
Abstract:
The scrap collection work is associated with multiple health hazards. Cut and scratches during collection and transportation of scraps are common. IWBs purchase the scraps mainly papers, cartoons, glass bottles and metals from the households. This study was conducted in Kathmandu, the capital city of Nepal. The location was chosen because Kathmandu is the biggest city of Nepal with highest number of IWBs. The research used a case study strategy to examine the occupational health hazards of IWBs. The only mode of collecting and transporting of scraps in Kathmandu is the bicycle. They have to do this regular work even during the scorching sun and chilled winter. The musculoskeletal and gastrointestinal disorders are the common health problem shared by IWBs in Kathmandu, Nepal. Despite of these problems, IWBs don’t take it seriously and rarely goes for the health check-up. There is need of personal protective equipment and guidance for safety of IWBs. IWBs need to wear closed shoes and use gloves to avoid cuts during the collection and transportation of the recyclables.Keywords: itinerant waste buyers, Kathmandu, occupational health, scrap
Procedia PDF Downloads 1812795 The Determination of Total Microbial Count and Prevalence of Salmonella in the Shrimp Supply in Khuzestan Province
Authors: Sana Mohammad Jafar
Abstract:
Salmonella is one of the major causes of foodborne diseases throughout the world. Shrimp are an important commodity in world fishery trade. The microbiological quality of shrimp must be evaluated for assurance of shrimp. The aim of this study was to evaluate the microbiological quality and to determine the prevalence of Salmonella in shrimp sold in Khuzestan province. In this study, a total of 245 samples of shrimp sold in Khuzestan province were tested for Salmonella prevalence and total microbial population. The mean aerobic bacterial count in 50.2% of samples was 2200, in 29.8% of samples was 13,600, in 20% of samples was 36,700, and the mean aerobic bacterial count in the total samples was 20,000. (20,000 cfu/cc). Of the total samples, 33 samples were positive for Salmonella and the prevalence of Salmonella was determined 13.4%. These results indicate the possibility that shrimp contribute to foodborne infections. The improvement of shrimp quality is an important issue, and shrimp before consuming should be washed with water containing chlorine, with the aim of increasing safety. In addition, it should be avoided to eat shrimp as raw or not cooked properly.Keywords: determination, total microbial, Salmonella, shrimp
Procedia PDF Downloads 2402794 Understanding Human Rights Violations in the Fight against Boko Haram: A Historical Perspective
Authors: Anthony Mpiani
Abstract:
Recent media and NGO reports suggest that human rights violations have been a salient characteristic of the government Joint Task Force (JTF) in the war on Boko Haram. However, there has been relatively scant scholarly engagement with the forms of abuses committed by the JTF against civilians and why such human rights violations occur. The focus of this paper is to analyse the various human rights violations committed by JTF in the war against Boko Haram. Employing a historical approach, it argues that the JTF's human rights violations is shaped by the philosophy of colonial policing in Nigeria. Consequently, the failure of successive post-colonial governments to ideologically transform policing is accountable for the human rights abuses being witnessed in Nigeria today. A philosophical transformation in Nigeria's security forces especially the police and military is a prerequisite for ending human rights abuses in the fight against Boko Haram.Keywords: colonialism, policing, joint task force, counterinsurgency, Boko Haram, human rights violations
Procedia PDF Downloads 1642793 Japanese and Europe Legal Frameworks on Data Protection and Cybersecurity: Asymmetries from a Comparative Perspective
Authors: S. Fantin
Abstract:
This study is the result of the legal research on cybersecurity and data protection within the EUNITY (Cybersecurity and Privacy Dialogue between Europe and Japan) project, aimed at fostering the dialogue between the European Union and Japan. Based on the research undertaken therein, the author offers an outline of the main asymmetries in the laws governing such fields in the two regions. The research is a comparative analysis of the two legal frameworks, taking into account specific provisions, ratio legis and policy initiatives. Recent doctrine was taken into account, too, as well as empirical interviews with EU and Japanese stakeholders and project partners. With respect to the protection of personal data, the European Union has recently reformed its legal framework with a package which includes a regulation (General Data Protection Regulation), and a directive (Directive 680 on personal data processing in the law enforcement domain). In turn, the Japanese law under scrutiny for this study has been the Act on Protection of Personal Information. Based on a comparative analysis, some asymmetries arise. The main ones refer to the definition of personal information and the scope of the two frameworks. Furthermore, the rights of the data subjects are differently articulated in the two regions, while the nature of sanctions take two opposite approaches. Regarding the cybersecurity framework, the situation looks similarly misaligned. Japan’s main text of reference is the Basic Cybersecurity Act, while the European Union has a more fragmented legal structure (to name a few, Network and Information Security Directive, Critical Infrastructure Directive and Directive on the Attacks at Information Systems). On an relevant note, unlike a more industry-oriented European approach, the concept of cyber hygiene seems to be neatly embedded in the Japanese legal framework, with a number of provisions that alleviate operators’ liability by turning such a burden into a set of recommendations to be primarily observed by citizens. With respect to the reasons to fill such normative gaps, these are mostly grounded on three basis. Firstly, the cross-border nature of cybercrime brings to consider both magnitude of the issue and its regulatory stance globally. Secondly, empirical findings from the EUNITY project showed how recent data breaches and cyber-attacks had shared implications between Europe and Japan. Thirdly, the geopolitical context is currently going through the direction of bringing the two regions to significant agreements from a trade standpoint, but also from a data protection perspective (with an imminent signature by both parts of a so-called ‘Adequacy Decision’). The research conducted in this study reveals two asymmetric legal frameworks on cyber security and data protection. With a view to the future challenges presented by the strengthening of the collaboration between the two regions and the trans-national fashion of cybercrime, it is urged that solutions are found to fill in such gaps, in order to allow European Union and Japan to wisely increment their partnership.Keywords: cybersecurity, data protection, European Union, Japan
Procedia PDF Downloads 1232792 Modeling of Single Bay Precast Residential House Using Ruaumoko 2D Program
Authors: N. H. Hamid, N. M. Mohamed, S. A. Anuar
Abstract:
Precast residential houses are normally constructed in Malaysia using precast shear-key wall panel and precast wall panel are designed using BS8110 where there is no provision for earthquake. However, the safety of this house under moderate and strong earthquake is still questionable. Consequently, the full-scale of residential house are designed, constructed, tested and analyzed under in-plane lateral cyclic loading. Hysteresis loops are plotted based on the experimental work and compared with modeling of hysteresis loops using HYSTERES in RUAUMOKO 2D program. Modified Takeda hysteresis model is chosen to behave a similar pattern with experimental work. This program will display the earthquake excitations, spectral displacements, pseudo spectral acceleration, and deformation shape of the structure. It can be concluded that this building is suffering severe cracks and damage under moderate and severe earthquake.Keywords: precast shear-key, hysteresis loops, spectral displacements, deformation shape
Procedia PDF Downloads 4562791 Four Phase Methodology for Developing Secure Software
Authors: Carlos Gonzalez-Flores, Ernesto Liñan-García
Abstract:
A simple and robust approach for developing secure software. A Four Phase methodology consists in developing the non-secure software in phase one, and for the next three phases, one phase for each of the secure developing types (i.e. self-protected software, secure code transformation, and the secure shield). Our methodology requires first the determination and understanding of the type of security level needed for the software. The methodology proposes the use of several teams to accomplish this task. One Software Engineering Developing Team, a Compiler Team, a Specification and Requirements Testing Team, and for each of the secure software developing types: three teams of Secure Software Developing, three teams of Code Breakers, and three teams of Intrusion Analysis. These teams will interact among each other and make decisions to provide a secure software code protected against a required level of intruder.Keywords: secure software, four phases methodology, software engineering, code breakers, intrusion analysis
Procedia PDF Downloads 3992790 Prevalence of Non-Adherence among Psychiatric Patients in Jordan: A Cross Sectional Study
Authors: Tareq L. Mukattash, Karem H. Alzoubi, Ejlal Abu El-Rub, Anan S. Jarab, Sayyer I. Al-Azzam, Maher Khdour, Mohammed Shara, Yazid N. Alhamarneh
Abstract:
Background: It has been estimated that up to 50% of any patient population is at least partially non-adherent to their prescribed treatment. Identifying barriers to adherence is required to develop effective interventions for psychiatric patients. Objective: To explore the prevalence and factors of non-adherence among psychiatric patients present at four psychiatric clinics. Method: A cross-sectional questionnaire-based study. A sample of psychiatric patients attending outpatient psychiatric clinics was enrolled between March and April 2011. Results: A total of 243 psychiatric patients took part in this study with the majority of patients (92.5%) being prescribed more than one psychiatric disorder. The majority (64.2%) of the patients was classified as non-adherent according to the Morisky adherence questionnaire and forgetfulness was the most prevalent reason for that. Conclusions: Non-adherence is a common and important issue among psychiatric patients. Polypharmacy, safety concerns and lack of insight towards the prescribed treatment were reported as the main reasons of non-adherence.Keywords: medication adherence, psychiatric disorders, clinical pharmacy, polypharmacy
Procedia PDF Downloads 3322789 Implementation of ALD in Product Development: Study of ROPS to Improve Energy Absorption Performance Using Absorption Part
Authors: Zefry Darmawan, Shigeyuki Haruyama, Ken Kaminishi
Abstract:
Product development is a big issue in the industrial competition and takes a serious part in development of technology. Product development process could adapt high changes of market needs and transform into engineering concept in order to produce high-quality product. One of the latest methods in product development is Analysis-Led-Design (ALD). It utilizes digital engineering design tools with finite analysis to perform product robust analysis and valuable for product reliability assurance. Heavy machinery which operates under severe condition should maintain safety to the customer when faced with potential hazard. Cab frame should able to absorb the energy while collision. Through ALD, a series of improvement of cab frame to increase energy absorption was made and analyzed. Improvement was made by modifying shapes of frame and-or install absorption device in certain areas. Simulation result showed that install absorption device could increase absorption energy than modifying shape.Keywords: ALD, ROPS, energy absorption, cab frame
Procedia PDF Downloads 371