Search results for: skin detection
4071 Effect of Pomegranate (Punica granatum) Seed Oil on Keratinocytes in Patients with Atopic Dermatitis
Authors: Fardis Teifoori, Mehdi Dehghani, Idoia Postigo, Jorge Martinez
Abstract:
Introduction: Many skin disorders, such as atopic dermatitis (AD), is characterized by inflammation, infection, and hyperplasia. In this work, keratinocytes from AD patients are used to study the pomegranate seed oil properties for skin care. Material and methods: Isolated keratinocytes from patients with AD were cultured and stimulated by IL-9 (20 ng/ml) and TNF-α (50ng/ml) for 48h to induce vascular endothelial growth factor (VEGF) and Regulated upon activation, normal T cell expressed and secreted (RANTES) production, respectively, in the presence of different concentrations of pomegranate seed oil (20, 50, 100, and 200 µM). Finally, the concentrations of RANTES and VEGF in the cell culture supernatant were quantified according to the standard protocol of commercial ELISA kits. Results: The results indicated that pomegranate seed oil concentrations of 50, 100, and 200 µM could significantly inhibit the production of VEGF and RANTES by stimulating keratinocytes with IL-9 (20 ng/ml) and TNF-α (50ng/ml), respectively. The decrease in VEGF and RANTES concentration in the presence of the pomegranate seed oil concentrations of 20 and 50 uM was not significant. Conclusion: It was concluded that pomegranate seed oil (PSO) counteracts atopic dermatitis conditions dose-dependently: with the highest effect at the concentration of 200 µM. We suggest that the inexpensive and easily available pomegranate seed oil is a good candidate for cosmetics and clinical utilization for skin care.Keywords: atopic dermatitis, pomegranate, Punica granatum, RANTES, VEGF
Procedia PDF Downloads 794070 Design of an Improved Distributed Framework for Intrusion Detection System Based on Artificial Immune System and Neural Network
Authors: Yulin Rao, Zhixuan Li, Burra Venkata Durga Kumar
Abstract:
Intrusion detection refers to monitoring the actions of internal and external intruders on the system and detecting the behaviours that violate security policies in real-time. In intrusion detection, there has been much discussion about the application of neural network technology and artificial immune system (AIS). However, many solutions use static methods (signature-based and stateful protocol analysis) or centralized intrusion detection systems (CIDS), which are unsuitable for real-time intrusion detection systems that need to process large amounts of data and detect unknown intrusions. This article proposes a framework for a distributed intrusion detection system (DIDS) with multi-agents based on the concept of AIS and neural network technology to detect anomalies and intrusions. In this framework, multiple agents are assigned to each host and work together, improving the system's detection efficiency and robustness. The trainer agent in the central server of the framework uses the artificial neural network (ANN) rather than the negative selection algorithm of AIS to generate mature detectors. Mature detectors can distinguish between self-files and non-self-files after learning. Our analyzer agents use genetic algorithms to generate memory cell detectors. This kind of detector will effectively reduce false positive and false negative errors and act quickly on known intrusions.Keywords: artificial immune system, distributed artificial intelligence, multi-agent, intrusion detection system, neural network
Procedia PDF Downloads 1094069 Intrusion Detection System Based on Peer to Peer
Authors: Alireza Pour Ebrahimi, Vahid Abasi
Abstract:
Recently by the extension of internet usage, Research on the intrusion detection system takes a significant importance. Many of improvement systems prevent internal and external network attacks by providing security through firewalls and antivirus. In recently years, intrusion detection systems gradually turn from host-based systems and depend on O.S to the distributed systems which are running on multiple O.S. In this work, by considering the diversity of computer networks whit respect to structure, architecture, resource, services, users and also security goals requirement a fully distributed collaborative intrusion detection system based on peer to peer architecture is suggested. in this platform each partner device (matched device) considered as a peer-to-peer network. All transmitted information to network are visible only for device that use security scanning of a source. Experimental results show that the distributed architecture is significantly upgradeable in respect to centralized approach.Keywords: network, intrusion detection system, peer to peer, internal and external network
Procedia PDF Downloads 5474068 Properties and Antimicrobial Activity of Fish Protein Isolate/Fish Skin Gelatin Film Containing Basil Leaf Essential Oil and Zinc Oxide Nanoparticles
Authors: Yasir Ali Arfat
Abstract:
Composite films based on fish protein isolate (FPI) and fish skin gelatin (FSG) blend incorporated with 50 and 100% (w/w, protein) basil leaf essential oil (BEO) in the absence and presence of 3% (w/w, protein) ZnO nanoparticles (ZnONP) were prepared and characterised. Tensile strength (TS) decreased, whilst elongation at break (EAB) increased as BEO level increased (p < 0.05). However, ZnONP addition resulted in higher TS but lower EAB (p < 0.05). The lowest water vapour permeability (WVP) was observed for the film incorporated with 100% BEO and 3% ZnONP (p < 0.05). BEO and ZnONP incorporation decreased transparency of FPI/FSG films (p < 0.05). FTIR spectra indicated that films added with BEO exhibited higher hydrophobicity. Both BEO and ZnONP had a marked impact on thermal stability of the films. Microstructural study revealed that presence of ZnONP prevented bilayer formation of film containing 100% BEO. FPI/FSG films incorporated with 100% BEO, especially in combination with ZnONP, exhibited strong antibacterial activity against food pathogenic and spoilage bacteria and thus could be used as an active food packaging material to ensure safety and to extend the shelf-life of packaged foods.Keywords: bionanocomposite, fish protein isolate, fish skin gelatin, basil essential oil, ZnO nanoparticles, antimicrobial packaging
Procedia PDF Downloads 4714067 Rapid and Culture-Independent Detection of Staphylococcus Aureus by PCR Based Protocols
Authors: V. Verma, Syed Riyaz-ul-Hassan
Abstract:
Staphylococcus aureus is one of the most commonly found pathogenic bacteria and is hard to eliminate from the human environment. It is responsible for many nosocomial infections, besides being the main causative agent of food intoxication by virtue of its variety of enterotoxins. Routine detection of S. aureus in food is usually carried out by traditional methods based on morphological and biochemical characterization. These methods are time-consuming and tedious. In addition, misclassifications with automated susceptibility testing systems or commercially available latex agglutination kits have been reported by several workers. Consequently, there is a need for methods to specifically discriminate S. aureus from other staphylococci as quickly as possible. Data on protocols developed using molecular means like PCR technology will be presented for rapid and specific detection of this pathogen in food, clinical and environmental samples, especially milk.Keywords: food Pathogens, PCR technology, rapid and specific detection, staphylococcus aureus
Procedia PDF Downloads 5134066 Effect of Bored Pile Diameter in Sand on Friction Resistance
Authors: Ashraf Mohammed M. Eid, Hossam El Badry
Abstract:
The bored pile friction resistance may be affected by many factors such as the method of construction, pile length and diameter, the soil properties, as well as the depth below ground level. These factors can be represented analytically to study the influence of diameter on the unit skin friction. In this research, the Egyptian Code of soil mechanics is used to assess the skin friction capacity for either the ordinary pile diameter as well as for the large pile diameter. The later is presented in the code and through the work of some researchers based on the results of investigations adopted for a sufficient number of field tests. The comparative results of these researchers with respect to the Egyptian Code are used to check the adequacy of both methods. Based on the results of this study, the traditional static formula adopted for piles of diameter less than 60 cm may be continually used for larger piles by correlating the analyzed formulae. Accordingly, the corresponding modified angle of internal friction is concluded demonstrating a reduction of shear strength due to soil disturbance along the pile shaft. Based on this research the difference between driven piles and bored piles constructed in same soil can be assessed and a better understanding can be evaluated for the effect of different factors on pile skin friction capacity.Keywords: large piles, static formula, friction piles, sandy soils
Procedia PDF Downloads 5004065 Fabrication of Immune-Affinity Monolithic Array for Detection of α-Fetoprotein and Carcinoembryonic Antigen
Authors: Li Li, Li-Ru Xia, He-Ye Wang, Xiao-Dong Bi
Abstract:
In this paper, we presented a highly sensitive immune-affinity monolithic array for detection of α-fetoprotein (AFP) and carcinoembryonic antigen (CEA). Firstly, the epoxy functionalized monolith arrays were fabricated using UV initiated copolymerization method. Scanning electron microscopy (SEM) image showed that the poly(BABEA-co-GMA) monolith exhibited a well-controlled skeletal and well-distributed porous structure. Then, AFP and CEA immune-affinity monolithic arrays were prepared by immobilization of AFP and CEA antibodies on epoxy functionalized monolith arrays. With a non-competitive immune response format, the presented AFP and CEA immune-affinity arrays were demonstrated as an inexpensive, flexible, homogeneous and stable array for detection of AFP and CEA.Keywords: chemiluminescent detection, immune-affinity, monolithic copolymer array, UV-initiated copolymerization
Procedia PDF Downloads 3394064 PCR Detection, Histopathological Characterization, and Autogenous Immunization of Bovine Papillomatosis (Wart) in Cattle, in Mekelle, Northern Ethiopia
Authors: Kidane Workelul, Yohans Tekle, Guesh Negash, Haftay Abraha, Nigus Abebe Shumuye, Yisehak Tsegaye Redda
Abstract:
Bovine papillomatosis (wart) is one of the economically important bovine skin diseases worldwide, caused by a group of viruses named papillomaviruses (PVs). However, it has often been misdiagnosed as other skin diseases and remained untreated. In order to determine the status of the diseases, twenty-two farms were visited, and fourteen infected cattle with cutaneous papillomatosis were identified from a total of 235. Papilloma biopsies were taken for molecular and histopathological characterization, the therapeutic trial of an autogenous vaccine was evaluated on infected animals. The overall status of bovine papillomatosis in this study was calculated as 5.96% (14/235). The disease was found to be statistically significant in the age groups less than two years (X² = 26.69, P = 0.0001). The more prominent histologically characterized lesions in the sampled tissue were identified as squamous papilloma and fibro-papilloma. The Polymerase Chain Reaction (PCR) based identification revealed that all the clinically and histo-pathologically characterized papillomatosis cases were found to be infected with Bovine Papilloma Virus1(BPV1), indicating that BPV1 was the most common and sole causative agent of the diseases in the study area. In immunizing active bovine papillomatosis, an autogenous vaccine therapeutic trial demonstrated excellent results, with practically full recovery and no recurrence of the infection. Hence, it is concluded that bovine papillomatosis is an economically important disease of young age group cattle as well as a treatable disease. So, the production of marketable autogenous vaccines against bovine papillomatosis should be started and given at an early stage.Keywords: autogenous vaccine, bovine papillomatosis, bovine papilloma virus1 clinical-pathology, polymerase chine reaction, wart
Procedia PDF Downloads 804063 An Optimal Matching Design Method of Space-Based Optical Payload for Typical Aerial Target Detection
Authors: Yin Zhang, Kai Qiao, Xiyang Zhi, Jinnan Gong, Jianming Hu
Abstract:
In order to effectively detect aerial targets over long distances, an optimal matching design method of space-based optical payload is proposed. Firstly, main factors affecting optical detectability of small targets under complex environment are analyzed based on the full link of a detection system, including band center, band width and spatial resolution. Then a performance characterization model representing the relationship between image signal-to-noise ratio (SCR) and the above influencing factors is established to describe a detection system. Finally, an optimal matching design example is demonstrated for a typical aerial target by simulating and analyzing its SCR under different scene clutter coupling with multi-scale characteristics, and the optimized detection band and spatial resolution are presented. The method can provide theoretical basis and scientific guidance for space-based detection system design, payload specification demonstration and information processing algorithm optimization.Keywords: space-based detection, aerial targets, optical system design, detectability characterization
Procedia PDF Downloads 1684062 An Improved Two-dimensional Ordered Statistical Constant False Alarm Detection
Authors: Weihao Wang, Zhulin Zong
Abstract:
Two-dimensional ordered statistical constant false alarm detection is a widely used method for detecting weak target signals in radar signal processing applications. The method is based on analyzing the statistical characteristics of the noise and clutter present in the radar signal and then using this information to set an appropriate detection threshold. In this approach, the reference cell of the unit to be detected is divided into several reference subunits. These subunits are used to estimate the noise level and adjust the detection threshold, with the aim of minimizing the false alarm rate. By using an ordered statistical approach, the method is able to effectively suppress the influence of clutter and noise, resulting in a low false alarm rate. The detection process involves a number of steps, including filtering the input radar signal to remove any noise or clutter, estimating the noise level based on the statistical characteristics of the reference subunits, and finally, setting the detection threshold based on the estimated noise level. One of the main advantages of two-dimensional ordered statistical constant false alarm detection is its ability to detect weak target signals in the presence of strong clutter and noise. This is achieved by carefully analyzing the statistical properties of the signal and using an ordered statistical approach to estimate the noise level and adjust the detection threshold. In conclusion, two-dimensional ordered statistical constant false alarm detection is a powerful technique for detecting weak target signals in radar signal processing applications. By dividing the reference cell into several subunits and using an ordered statistical approach to estimate the noise level and adjust the detection threshold, this method is able to effectively suppress the influence of clutter and noise and maintain a low false alarm rate.Keywords: two-dimensional, ordered statistical, constant false alarm, detection, weak target signals
Procedia PDF Downloads 784061 Tool for Fast Detection of Java Code Snippets
Authors: Tomáš Bublík, Miroslav Virius
Abstract:
This paper presents general results on the Java source code snippet detection problem. We propose the tool which uses graph and sub graph isomorphism detection. A number of solutions for all of these tasks have been proposed in the literature. However, although that all these solutions are really fast, they compare just the constant static trees. Our solution offers to enter an input sample dynamically with the Scripthon language while preserving an acceptable speed. We used several optimizations to achieve very low number of comparisons during the matching algorithm.Keywords: AST, Java, tree matching, scripthon source code recognition
Procedia PDF Downloads 4254060 Image Recognition and Anomaly Detection Powered by GANs: A Systematic Review
Authors: Agastya Pratap Singh
Abstract:
Generative Adversarial Networks (GANs) have emerged as powerful tools in the fields of image recognition and anomaly detection due to their ability to model complex data distributions and generate realistic images. This systematic review explores recent advancements and applications of GANs in both image recognition and anomaly detection tasks. We discuss various GAN architectures, such as DCGAN, CycleGAN, and StyleGAN, which have been tailored to improve accuracy, robustness, and efficiency in visual data analysis. In image recognition, GANs have been used to enhance data augmentation, improve classification models, and generate high-quality synthetic images. In anomaly detection, GANs have proven effective in identifying rare and subtle abnormalities across various domains, including medical imaging, cybersecurity, and industrial inspection. The review also highlights the challenges and limitations associated with GAN-based methods, such as instability during training and mode collapse, and suggests future research directions to overcome these issues. Through this review, we aim to provide researchers with a comprehensive understanding of the capabilities and potential of GANs in transforming image recognition and anomaly detection practices.Keywords: generative adversarial networks, image recognition, anomaly detection, DCGAN, CycleGAN, StyleGAN, data augmentation
Procedia PDF Downloads 204059 The Effect of Early Skin-To-Skin Contact with Fathers on Their Supporting Breastfeeding
Authors: Shu-Ling Wang
Abstract:
Background: Multiple studies showed early skin-to-skin contact (SSC) with mothers was beneficial to newborns such as breastfeeding and maternal childcare. In cases of newborns unable to have early SSC with mothers, fathers’ involvement could let early SSC continue without interruption. However, few studies had explored the effects of early SSC by fathers in comparison to early SSC with mothers. Paternal involvement of early SSC should be equally important in term of childcare and breastfeeding. The purpose of this study was to evaluate the efficacy of early SSC by fathers in particular in their support of breastfeeding. Methods: A quasi-experimental design was employed by the study. One hundred and forty-four father-infant pairs had participated the study, in which infants were assigned either to SSC with their fathers (n = 72) or to routine care (n = 72) as the control group. The study was conducted at a regional hospital in northern Taiwan. Participants included parents of both vaginal delivery (VD) and caesarean section birth (CS) infants. To be eligible for inclusion, infants must be over 37-week gestational ages. Data were collected twice: as pretest upon admission and as posttest with online questionnaire during first, second, and third postpartum months. The questionnaire included items for Breastfeeding Social Support, methods of feeding, and the mother-infant 24-hour rooming-in rate. The efficacy of early SSC with fathers was evaluated using the generalized estimating equation (GEE) modeling. Research Result: The primary finding was that SSC with fathers had positive impact on fathers’ support of breastfeeding. Analysis of the online questionnaire indicated that early SSC with fathers improved the support of breastfeeding than the control group (VD: t = -4.98, p < .001; CS: t = -2.37, p = .02). Analysis of mother-infant 24-hour rooming-in rate showed that SSC with fathers after CS had a positive impact on the rooming-in rate (χ² = 5.79, p = .02); however, with VD the difference between early SSC with fathers and the control group was insignificant (χ² = .23, p = .63). Analysis of the rate of exclusive breastfeeding indicated that early SSC with fathers had a higher rate than the control group during first three postpartum months for both delivery methods (VD: χ² = 12.51, p < .001 on 1st postpartum month, χ² = 8.13, p < .05 on 2nd postpartum month, χ² = 4.43, p < .05 on 3rd postpartum month; CS: χ² = 6.92, p < .05 on 1st postpartum month, χ² = 7.41, p < .05 on 2nd postpartum month, χ² = 6.24, p < .05 on 3rd postpartum month). No significant difference was found on the rate of exclusive breastfeeding with both methods of delivery between two groups during hospitalization. (VD: χ² =2 .00, p = .16; CS: χ² = .73, p = .39). Conclusion: Implementing early SSC with fathers has many benefits to both parents. The result of this study showed increasing fathers’ support of breastfeeding. This encourages our nursing personnel to focus the needs of father during breastfeeding, therefore further enhancing the quality of parental care, the rate and duration of breastfeeding.Keywords: breastfeeding, skin-to-skin contact, support of breastfeeding, rooming-in
Procedia PDF Downloads 2154058 Adopting Flocks of Birds Approach to Predator for Anomalies Detection on Industrial Control Systems
Abstract:
Industrial Control Systems (ICS) such as Supervisory Control And Data Acquisition (SCADA) can be seen in many different critical infrastructures, from nuclear management to utility, medical equipment, power, waste and engine management on ships and planes. The role SCADA plays in critical infrastructure has resulted in a call to secure them. Many lives depend on it for daily activities and the attack vectors are becoming more sophisticated. Hence, the security of ICS is vital as malfunction of it might result in huge risk. This paper describes how the application of Prey Predator (PP) approach in flocks of birds could enhance the detection of malicious activities on ICS. The PP approach explains how these animals in groups or flocks detect predators by following some simple rules. They are not necessarily very intelligent animals but their approach in solving complex issues such as detection through corporation, coordination and communication worth emulating. This paper will emulate flocking behavior seen in birds in detecting predators. The PP approach will adopt six nearest bird approach in detecting any predator. Their local and global bests are based on the individual detection as well as group detection. The PP algorithm was designed following MapReduce methodology that follows a Split Detection Convergence (SDC) approach.Keywords: artificial life, industrial control system (ICS), IDS, prey predator (PP), SCADA, SDC
Procedia PDF Downloads 3014057 Performance Evaluation of Contemporary Classifiers for Automatic Detection of Epileptic EEG
Authors: K. E. Ch. Vidyasagar, M. Moghavvemi, T. S. S. T. Prabhat
Abstract:
Epilepsy is a global problem, and with seizures eluding even the smartest of diagnoses a requirement for automatic detection of the same using electroencephalogram (EEG) would have a huge impact in diagnosis of the disorder. Among a multitude of methods for automatic epilepsy detection, one should find the best method out, based on accuracy, for classification. This paper reasons out, and rationalizes, the best methods for classification. Accuracy is based on the classifier, and thus this paper discusses classifiers like quadratic discriminant analysis (QDA), classification and regression tree (CART), support vector machine (SVM), naive Bayes classifier (NBC), linear discriminant analysis (LDA), K-nearest neighbor (KNN) and artificial neural networks (ANN). Results show that ANN is the most accurate of all the above stated classifiers with 97.7% accuracy, 97.25% specificity and 98.28% sensitivity in its merit. This is followed closely by SVM with 1% variation in result. These results would certainly help researchers choose the best classifier for detection of epilepsy.Keywords: classification, seizure, KNN, SVM, LDA, ANN, epilepsy
Procedia PDF Downloads 5204056 An Insight into Early Stage Detection of Malignant Tumor by Microwave Imaging
Authors: Muhammad Hassan Khalil, Xu Jiadong
Abstract:
Detection of malignant tumor inside the breast of women is a challenging field for the researchers. MWI (Microwave imaging) for breast cancer diagnosis has been of interest for last two decades, newly it suggested for finding cancerous tissues of women breast. A simple and basic idea of the mathematical modeling is used throughout this paper for imaging of malignant tumor. In this paper, the authors explained inverse scattering method in the microwave imaging and also present some simulation results.Keywords: breast cancer detection, microwave imaging, tomography, tumor
Procedia PDF Downloads 4104055 Toward Subtle Change Detection and Quantification in Magnetic Resonance Neuroimaging
Authors: Mohammad Esmaeilpour
Abstract:
One of the important open problems in the field of medical image processing is detection and quantification of small changes. In this poster, we try to investigate that, how the algebraic decomposition techniques can be used for semiautomatically detecting and quantifying subtle changes in Magnetic Resonance (MR) neuroimaging volumes. We mostly focus on the low-rank values of the matrices achieved from decomposing MR image pairs during a period of time. Besides, a skillful neuroradiologist will help the algorithm to distinguish between noises and small changes.Keywords: magnetic resonance neuroimaging, subtle change detection and quantification, algebraic decomposition, basis functions
Procedia PDF Downloads 4744054 A Survey on Genetic Algorithm for Intrusion Detection System
Authors: Prikhil Agrawal, N. Priyanka
Abstract:
With the increase of millions of users on Internet day by day, it is very essential to maintain highly reliable and secured data communication between various corporations. Although there are various traditional security imparting techniques such as antivirus software, password protection, data encryption, biometrics and firewall etc. But still network security has become the main issue in various leading companies. So IDSs have become an essential component in terms of security, as it can detect various network attacks and respond quickly to such occurrences. IDSs are used to detect unauthorized access to a computer system. This paper describes various intrusion detection techniques using GA approach. The intrusion detection problem has become a challenging task due to the conception of miscellaneous computer networks under various vulnerabilities. Thus the damage caused to various organizations by malicious intrusions can be mitigated and even be deterred by using this powerful tool.Keywords: genetic algorithm (GA), intrusion detection system (IDS), dataset, network security
Procedia PDF Downloads 2974053 Anti-Aging Effects of Retinol and Alpha Hydroxy Acid on Elastin Fibers of Artificially Photo-Aged Human Dermal Fibroblast Cell Lines
Authors: Mohammed Jarrar, Shalini Behl, Nadia Shaheen, Abeer Fatima, Reem Nasab
Abstract:
Skin aging is a slow multifactorial process influenced by both internal as well as external factors. Ultra-violet radiations (UV), diet, smoking and personal habits are the most common environmental factors that affect skin aging. Fat contents and fibrous proteins as collagen and elastin are core internal structural components. The direct influence of UV on elastin integrity and health is crucial on aging of skin by time. The deposition of abnormal elastic material is a major marker in a photo-aged skin. Searching for compounds that may protect against cutaneous photo-damage is highly valued. Retinoids and Alpha Hydroxy Acids protective and or repairing effects of UV have been endorsed by some researchers. For consolidating a better understanding of anti and protective effects of such anti-aging agents, we evaluated the combinatory effects of various dosages of lactic acid and retinol on the dermal fibroblasts elastin levels exposed to UV. The UV exposed cells showed significant reduction in the elastin levels. A combination of drugs with a higher concentration of lactic acid (30-35 mM) and a lower concentration of retinol (10-15mg/mL) showed to work better in enhancing elastin concentration in UV exposed cells. We assume this enhancement could be the result of increased tropo-elastin gene expression stimulated by retinol and lactic acid probably repaired the UV irradiated damage by enhancing the amount and integrity of the elastin fibers.Keywords: alpha hydroxy acid, elastin, retinol, ultraviolet radiations
Procedia PDF Downloads 3424052 Intrusion Detection Based on Graph Oriented Big Data Analytics
Authors: Ahlem Abid, Farah Jemili
Abstract:
Intrusion detection has been the subject of numerous studies in industry and academia, but cyber security analysts always want greater precision and global threat analysis to secure their systems in cyberspace. To improve intrusion detection system, the visualisation of the security events in form of graphs and diagrams is important to improve the accuracy of alerts. In this paper, we propose an approach of an IDS based on cloud computing, big data technique and using a machine learning graph algorithm which can detect in real time different attacks as early as possible. We use the MAWILab intrusion detection dataset . We choose Microsoft Azure as a unified cloud environment to load our dataset on. We implement the k2 algorithm which is a graphical machine learning algorithm to classify attacks. Our system showed a good performance due to the graphical machine learning algorithm and spark structured streaming engine.Keywords: Apache Spark Streaming, Graph, Intrusion detection, k2 algorithm, Machine Learning, MAWILab, Microsoft Azure Cloud
Procedia PDF Downloads 1464051 Design an Intelligent Fire Detection System Based on Neural Network and Particle Swarm Optimization
Authors: Majid Arvan, Peyman Beygi, Sina Rokhsati
Abstract:
In-time detection of fire in buildings is of great importance. Employing intelligent methods in data processing in fire detection systems leads to a significant reduction of fire damage at lowest cost. In this paper, the raw data obtained from the fire detection sensor networks in buildings is processed by using intelligent methods based on neural networks and the likelihood of fire happening is predicted. In order to enhance the quality of system, the noise in the sensor data is reduced by analyzing wavelets and applying SVD technique. Meanwhile, the proposed neural network is trained using particle swarm optimization (PSO). In the simulation work, the data is collected from sensor network inside the room and applied to the proposed network. Then the outputs are compared with conventional MLP network. The simulation results represent the superiority of the proposed method over the conventional one.Keywords: intelligent fire detection, neural network, particle swarm optimization, fire sensor network
Procedia PDF Downloads 3804050 Inflammatory Alleviation on Microglia Cells by an Apoptotic Mimicry
Authors: Yi-Feng Kao, Huey-Jine Chai, Chin-I Chang, Yi-Chen Chen, June-Ru Chen
Abstract:
Microglia is a macrophage that resides in brain, and overactive microglia may result in brain neuron damage or inflammation. In this study, the phospholipids was extracted from squid skin and manufactured into a liposome (SQ liposome) to mimic apoptotic body. We then evaluated anti-inflammatory effects of SQ liposome on mouse microglial cell line (BV-2) by lipopolysaccharide (LPS) induction. First, the major phospholipid constituents in the squid skin extract were including 46.2% of phosphatidylcholine, 18.4% of phosphatidylethanolamine, 7.7% of phosphatidylserine, 3.5% of phosphatidylinositol, 4.9% of Lysophosphatidylcholine and 19.3% of other phospholipids by HPLC-UV analysis. The contents of eicosapentaenoic acid (EPA) and docosahexaenoic acid (DHA) in the squid skin extract were 11.8 and 28.7%, respectively. The microscopic images showed that microglia cells can engulf apoptotic cells or SQ-liposome. In cell based studies, there was no cytotoxicity to BV-2 as the concentration of SQ-liposome was less than 2.5 mg/mL. The LPS induced pro-inflammatory cytokines, including tumor necrosis factor-alpha (TNF-α) and interleukin-6 (IL-6), were significant suppressed (P < 0.05) by pretreated 0.03~2.5mg/ml SQ liposome. Oppositely, the anti-inflammatory cytokines transforming growth factor-beta (TGF-β) and interleukin-10 (IL-10) secretion were enhanced (P < 0.05). The results suggested that SQ-liposome possess anti-inflammatory properties on BV-2 and may be a good strategy for against neuro-inflammatory disease.Keywords: apoptotic mimicry, neuroinflammation, microglia, squid processing by-products
Procedia PDF Downloads 4824049 Embedded Electrochemistry with Miniaturized, Drone-Based, Potentiostat System for Remote Detection Chemical Warfare Agents
Authors: Amer Dawoud, Jesy Motchaalangaram, Arati Biswakarma, Wujan Mio, Karl Wallace
Abstract:
The development of an embedded miniaturized drone-based system for remote detection of Chemical Warfare Agents (CWA) is proposed. The paper focuses on the software/hardware system design of the electrochemical Cyclic Voltammetry (CV) and Differential Pulse Voltammetry (DPV) signal processing for future deployment on drones. The paper summarizes the progress made towards hardware and electrochemical signal processing for signature detection of CWA. Also, the miniature potentiostat signal is validated by comparing it with the high-end lab potentiostat signal.Keywords: drone-based, remote detection chemical warfare agents, miniaturized, potentiostat
Procedia PDF Downloads 1364048 Object Detection in Digital Images under Non-Standardized Conditions Using Illumination and Shadow Filtering
Authors: Waqqas-ur-Rehman Butt, Martin Servin, Marion Pause
Abstract:
In recent years, object detection has gained much attention and very encouraging research area in the field of computer vision. The robust object boundaries detection in an image is demanded in numerous applications of human computer interaction and automated surveillance systems. Many methods and approaches have been developed for automatic object detection in various fields, such as automotive, quality control management and environmental services. Inappropriately, to the best of our knowledge, object detection under illumination with shadow consideration has not been well solved yet. Furthermore, this problem is also one of the major hurdles to keeping an object detection method from the practical applications. This paper presents an approach to automatic object detection in images under non-standardized environmental conditions. A key challenge is how to detect the object, particularly under uneven illumination conditions. Image capturing conditions the algorithms need to consider a variety of possible environmental factors as the colour information, lightening and shadows varies from image to image. Existing methods mostly failed to produce the appropriate result due to variation in colour information, lightening effects, threshold specifications, histogram dependencies and colour ranges. To overcome these limitations we propose an object detection algorithm, with pre-processing methods, to reduce the interference caused by shadow and illumination effects without fixed parameters. We use the Y CrCb colour model without any specific colour ranges and predefined threshold values. The segmented object regions are further classified using morphological operations (Erosion and Dilation) and contours. Proposed approach applied on a large image data set acquired under various environmental conditions for wood stack detection. Experiments show the promising result of the proposed approach in comparison with existing methods.Keywords: image processing, illumination equalization, shadow filtering, object detection
Procedia PDF Downloads 2164047 Bidirectional Long Short-Term Memory-Based Signal Detection for Orthogonal Frequency Division Multiplexing With All Index Modulation
Authors: Mahmut Yildirim
Abstract:
This paper proposed the bidirectional long short-term memory (Bi-LSTM) network-aided deep learning (DL)-based signal detection for Orthogonal frequency division multiplexing with all index modulation (OFDM-AIM), namely Bi-DeepAIM. OFDM-AIM is developed to increase the spectral efficiency of OFDM with index modulation (OFDM-IM), a promising multi-carrier technique for communication systems beyond 5G. In this paper, due to its strong classification ability, Bi-LSTM is considered an alternative to the maximum likelihood (ML) algorithm, which is used for signal detection in the classical OFDM-AIM scheme. The performance of the Bi-DeepAIM is compared with LSTM network-aided DL-based OFDM-AIM (DeepAIM) and classic OFDM-AIM that uses (ML)-based signal detection via BER performance and computational time criteria. Simulation results show that Bi-DeepAIM obtains better bit error rate (BER) performance than DeepAIM and lower computation time in signal detection than ML-AIM.Keywords: bidirectional long short-term memory, deep learning, maximum likelihood, OFDM with all index modulation, signal detection
Procedia PDF Downloads 724046 Tank Barrel Surface Damage Detection Algorithm
Authors: Tomáš Dyk, Stanislav Procházka, Martin Drahanský
Abstract:
The article proposes a new algorithm for detecting damaged areas of the tank barrel based on the image of the inner surface of the tank barrel. Damage position is calculated using image processing techniques such as edge detection, discrete wavelet transformation and image segmentation for accurate contour detection. The algorithm can detect surface damage in smoothbore and even in rifled tank barrels. The algorithm also calculates the volume of the detected damage from the depth map generated, for example, from the distance measurement unit. The proposed method was tested on data obtained by a tank barrel scanning device, which generates both surface image data and depth map. The article also discusses tank barrel scanning devices and how damaged surface impacts material resistance.Keywords: barrel, barrel diagnostic, image processing, surface damage detection, tank
Procedia PDF Downloads 1374045 Flicker Detection with Motion Tolerance for Embedded Camera
Authors: Jianrong Wu, Xuan Fu, Akihiro Higashi, Zhiming Tan
Abstract:
CMOS image sensors with a rolling shutter are used broadly in the digital cameras embedded in mobile devices. The rolling shutter suffers the flicker artifacts from the fluorescent lamp, and it could be observed easily. In this paper, the characteristics of illumination flicker in motion case were analyzed, and two efficient detection methods based on matching fragment selection were proposed. According to the experimental results, our methods could achieve as high as 100% accuracy in static scene, and at least 97% in motion scene.Keywords: illumination flicker, embedded camera, rolling shutter, detection
Procedia PDF Downloads 4204044 Fault Location Detection in Active Distribution System
Authors: R. Rezaeipour, A. R. Mehrabi
Abstract:
Recent increase of the DGs and microgrids in distribution systems, disturbs the tradition structure of the system. Coordination between protection devices in such a system becomes the concern of the network operators. This paper presents a new method for fault location detection in the active distribution networks, independent of the fault type or its resistance. The method uses synchronized voltage and current measurements at the interconnection of DG units and is able to adapt to changes in the topology of the system. The method has been tested on a 38-bus distribution system, with very encouraging results.Keywords: fault location detection, active distribution system, micro grids, network operators
Procedia PDF Downloads 7874043 Delusional Parasitosis (A Rare Primary Psychiatric Diagnosis)
Authors: Jaspinder Kaur, Jatinder Pal Singh
Abstract:
Introduction- Delusional parasitosis is a rare psychotic illness characterized by a fixed belief of manifesting a parasite in a body when in reality, it was not. Also known as Ekbom syndrome or delusional infestations, or acarophobia. Although the patient has no primary skin pathology, but all skin findings were secondary to skin manipulation by the patient itself, which is why up to 90% of patients first seek consultation from a dermatologist. Most commonly, it was seen in older people with female to male ratio is 2:1. For treatment, the patient first need to be investigated to rule all other possible causes, as Delusional parasitosis can be caused by Vitamin B12 deficiency, pellagra, hepatic and renal disease, diabetes mellitus, multiple sclerosis, and leprosy. When all possible causes ruled out, psychiatric referral to be done. Rule out other psychiatric comorbidities, and treatment should be done accordingly. Patient with delusional parasitosis responds well to second generation antipsychotics and need to continuous medication over years, and relapse is likely if treatment is stopped. Case Presentation- A 79-year-old female, belonging to lower socio-economic status, presented with complaints of itching sensation with erythematous patches over the scalp and multiple scratch excoriations lesion over the scalp, face and neck from the past 7-8 months. She had a feeling of small insect crawling under her skin and scalp area. To reduce the itching and kill the insect, she would scratch and squeeze her skin repeatedly. When the family tried to give her explanation that there was no insect in her body, she would not get convinced, rather got angry and abuse family members for not believing her. Gradually, her sleep would remain disturbed, she would be seen awake at night, seen to be scratching her skin, pull her scalp hair, even squeeze out her healed lesions. She collected her skin debris, scalp hairs and look out for insect. Because of her continuous illness, the patient started to remain sad and had crying spells. Her appetite decreased. She became socially isolated and stopped doing her activities of daily living. Family member’s first consulted dermatologist, investigated thoroughly with routine investigations, autoimmune and malignancy workup. As all investigations were normal, following which patient was referred for psychiatric evaluation. The patient was started on Tablet Olanzapine 2.5 mg, gradually increased to 7.5 mg. Over 1 month, there was reduction in itching, skin pricking. Lesions were gradually healed, and the patient continued to take other dermatological medications and ointment and was in regular follow up with psychiatric liaison from past 2 months with 70-80 % improvement in her symptoms. Conclusion- Delusional parasitosis is a psychiatric disorder of insidious onset, seen commonly in middle and old age people. Both psychiatric and dermatology consultation liaison will help the patient for an early diagnosis and adequate treatment. If a primary psychiatric diagnosis, the patient respond well to second generation antipsychotics but always require a further evaluation and treatment management if it is secondary to some physical or other psychiatric comorbidity.Keywords: delusional parasitosis, delusional infestations, rare, primary psychiatric diagnosis, antipsychotic agents
Procedia PDF Downloads 824042 Research on ARQ Transmission Technique in Mars Detection Telecommunications System
Authors: Zhongfei Cai, Hui He, Changsheng Li
Abstract:
This paper studied in the automatic repeat request (ARQ) transmission technique in Mars detection telecommunications system. An ARQ method applied to proximity-1 space link protocol was proposed by this paper. In order to ensure the efficiency of data reliable transmission, this ARQ method combined these different ARQ maneuvers characteristics. Considering the Mars detection communication environments, this paper analyzed the characteristics of the saturation throughput rate, packet dropping probability, average delay and energy efficiency with different ARQ algorithms. Combined thus results with the theories of ARQ transmission technique, an ARQ transmission project in Mars detection telecommunications system was established. The simulation results showed that this algorithm had excellent saturation throughput rate and energy efficiency with low complexity.Keywords: ARQ, mars, CCSDS, proximity-1, deepspace
Procedia PDF Downloads 340