Search results for: open source data
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 30071

Search results for: open source data

26171 Intrusion Detection System Using Linear Discriminant Analysis

Authors: Zyad Elkhadir, Khalid Chougdali, Mohammed Benattou

Abstract:

Most of the existing intrusion detection systems works on quantitative network traffic data with many irrelevant and redundant features, which makes detection process more time’s consuming and inaccurate. A several feature extraction methods, such as linear discriminant analysis (LDA), have been proposed. However, LDA suffers from the small sample size (SSS) problem which occurs when the number of the training samples is small compared with the samples dimension. Hence, classical LDA cannot be applied directly for high dimensional data such as network traffic data. In this paper, we propose two solutions to solve SSS problem for LDA and apply them to a network IDS. The first method, reduce the original dimension data using principal component analysis (PCA) and then apply LDA. In the second solution, we propose to use the pseudo inverse to avoid singularity of within-class scatter matrix due to SSS problem. After that, the KNN algorithm is used for classification process. We have chosen two known datasets KDDcup99 and NSLKDD for testing the proposed approaches. Results showed that the classification accuracy of (PCA+LDA) method outperforms clearly the pseudo inverse LDA method when we have large training data.

Keywords: LDA, Pseudoinverse, PCA, IDS, NSL-KDD, KDDcup99

Procedia PDF Downloads 226
26170 Investigation of the Flow in Impeller Sidewall Gap of a Centrifugal Pump Using CFD

Authors: Mohammadreza DaqiqShirazi, Rouhollah Torabi, Alireza Riasi, Ahmad Nourbakhsh

Abstract:

In this paper, the flow in a sidewall gap of an impeller which belongs to a centrifugal pump is studied using numerical method. The flow in sidewall gap forms internal leakage and is the source of “disk friction loss” which is the most important cause of reduced efficiency in low specific speed centrifugal pumps. Simulation is done using CFX software and a high quality mesh, therefore the modeling error has been reduced. Navier-Stokes equations have been solved for this domain. In order to predict the turbulence effects the SST model has been employed.

Keywords: numerical study, centrifugal pumps, disk friction loss, sidewall gap

Procedia PDF Downloads 530
26169 Resistance of Mycobacterium tuberculosis to Daptomycin

Authors: Ji-Chan Jang

Abstract:

Tuberculosis is still major health problem because there is an increase of multidrug-resistant and extensively drug-resistant forms of the disease. Therefore, the most urgent clinical need is to discover potent agents and develop novel drug combination capable of reducing the duration of MDR and XDR tuberculosis therapy. Three reference strains H37Rv, CDC1551, W-Beijing GC1237 and six clinical isolates of MDRTB were tested to daptomycin in the range of 0.013 to 256 mg/L. Daptomycin is resistant to all tested M. tuberculosis strains not only laboratory strains but also clinical MDR strains that were isolated at different source. Daptomycin will not be an antibiotic of choice for treating infection of Gram positive atypical slowly growing M. tuberculosis.

Keywords: tuberculosis, daptomycin, resistance, Mycobacterium tuberculosis

Procedia PDF Downloads 385
26168 Optimal Wheat Straw to Bioethanol Supply Chain Models

Authors: Abdul Halim Abdul Razik, Ali Elkamel, Leonardo Simon

Abstract:

Wheat straw is one of the alternative feedstocks that may be utilized for bioethanol production especially when sustainability criteria are the major concerns. To increase market competitiveness, optimal supply chain plays an important role since wheat straw is a seasonal agricultural residue. In designing the supply chain optimization model, economic profitability of the thermochemical and biochemical conversion routes options were considered. It was found that torrefied pelletization with gasification route to be the most profitable option to produce bioethanol from the lignocellulosic source of wheat straw.

Keywords: bio-ethanol, optimization, supply chain, wheat straw

Procedia PDF Downloads 737
26167 Improved Photo-Active Layer Properties for Efficient Organic Solar Cells

Authors: Chahrazed Bendenia, Souhila Bendenia, Samia Moulebhar, Hanaa Merad-Dib, Sarra Merabet, Sid Ahmed Khantar, Baghdad Hadri

Abstract:

In recent years, organic solar cells (OSCs) have become the fundamental concern of researchers thanks to their advantages in terms of flexibility, manufacturing processes and low cost. The performance of these devices is influenced by various factors, such as the layers introduced in the stacking of the solar cell realized. In our work, the modeling of a reverse OSC under AM1.5G illumination will be determined. The photo-active polymer/fullerene layer will be analyzed from the polymer variation of this layer using the SCAPS simulator to extract the J-V characteristics: open circuit voltage (Voc), short circuit current (Jsc), filling factor (FF) and power conversion efficiency (η). The results obtained indicated that the materials used have a significant impact on improving the photovoltaic parameters of the devices studied.

Keywords: solar, polymer, simulator, characteristics

Procedia PDF Downloads 78
26166 Studies of Rule Induction by STRIM from the Decision Table with Contaminated Attribute Values from Missing Data and Noise — in the Case of Critical Dataset Size —

Authors: Tetsuro Saeki, Yuichi Kato, Shoutarou Mizuno

Abstract:

STRIM (Statistical Test Rule Induction Method) has been proposed as a method to effectively induct if-then rules from the decision table which is considered as a sample set obtained from the population of interest. Its usefulness has been confirmed by simulation experiments specifying rules in advance, and by comparison with conventional methods. However, scope for future development remains before STRIM can be applied to the analysis of real-world data sets. The first requirement is to determine the size of the dataset needed for inducting true rules, since finding statistically significant rules is the core of the method. The second is to examine the capacity of rule induction from datasets with contaminated attribute values created by missing data and noise, since real-world datasets usually contain such contaminated data. This paper examines the first problem theoretically, in connection with the rule length. The second problem is then examined in a simulation experiment, utilizing the critical size of dataset derived from the first step. The experimental results show that STRIM is highly robust in the analysis of datasets with contaminated attribute values, and hence is applicable to realworld data.

Keywords: rule induction, decision table, missing data, noise

Procedia PDF Downloads 396
26165 Modelling Urban Rigidity and Elasticity Growth Boundaries: A Spatial Constraints-Suitability Based Perspective

Authors: Pengcheng Xiang Jr., Xueqing Sun, Dong Ngoduy

Abstract:

In the context of rapid urbanization, urban sprawl has brought about extensive negative impacts on ecosystems and the environment, resulting in a gradual shift from "incremental growth" to ‘stock growth’ in cities. A detailed urban growth boundary is a prerequisite for urban renewal and management. This study takes Shenyang City, China, as the study area and evaluates the spatial distribution of urban spatial suitability in the study area from the perspective of spatial constraints-suitability using multi-source data and simulates the future rigid and elastic growth boundaries of the city in the study area using the CA-Markov model. The results show that (1) the suitable construction area and moderate construction area in the study area account for 8.76% and 19.01% of the total area, respectively, and the suitable construction area and moderate construction area show a trend of distribution from the urban centre to the periphery, mainly in Shenhe District, the southern part of Heping District, the western part of Dongling District, and the central part of Dadong District; (2) the area of expansion of construction land in the study area in the period of 2023-2030 is 153274.6977hm2, accounting for 44.39% of the total area of the study area; (3) the rigid boundary of the study area occupies an area of 153274.6977 hm2, accounting for 44.39% of the total area of the study area, and the elastic boundary of the study area contains an area of 75362.61 hm2, accounting for 21.69% of the total area of the study area. The study constructed a method for urban growth boundary delineation, which helps to apply remote sensing to guide future urban spatial growth management and urban renewal.

Keywords: urban growth boundary, spatial constraints, spatial suitability, urban sprawl

Procedia PDF Downloads 32
26164 Fate of Sustainability and Land Use Array in Urbanized Cities

Authors: Muhammad Yahaya Ubale

Abstract:

Substantial rate of urbanization as well as economic growth is the tasks and prospects of sustainability. Objectives of the paper are: to ascertain the fate of sustainability in urbanized cities and; to identify the challenges of land use array in urbanized cities. Methodology engaged in this paper employed the use of secondary data where articles, conference proceedings, seminar papers and literature materials were effectively used. The paper established the fact that while one thinks globally, it is reciprocal to act locally if at all sustainability should be achieved. The speed and scale of urbanization must be equal to natural and cost-effective deliberations. It also discovered a podium that allows a city to work together as an ideal conglomerate, engaging all city departments as a source of services, engaging residents, businesses, and contractors. It also revealed that city should act as a leader and partner within an urban region, engaging senior government officials, utilities, rural settlements, private sector stakeholders, NGOs, and academia. Cities should assimilate infrastructure system design and management to enhance efficiency of resource flows in an urban area. They should also coordinate spatial development; integrate urban forms and urban flows, combine land use, urban design, urban density, and other spatial attributes with infrastructural development. Finally, by 2050, urbanized cities alone could be consuming 140 billion tons of minerals, ores, fossil fuels and biomass annually (three times its current rate of consumption), sustainability can be accomplished through land use control, limited access to finite resources, facilities, utilities and services as well as property right and user charge.

Keywords: sustainability, land use array, urbanized cities, fate of sustainability and perseverance

Procedia PDF Downloads 272
26163 Machine Learning Strategies for Data Extraction from Unstructured Documents in Financial Services

Authors: Delphine Vendryes, Dushyanth Sekhar, Baojia Tong, Matthew Theisen, Chester Curme

Abstract:

Much of the data that inform the decisions of governments, corporations and individuals are harvested from unstructured documents. Data extraction is defined here as a process that turns non-machine-readable information into a machine-readable format that can be stored, for instance, in a database. In financial services, introducing more automation in data extraction pipelines is a major challenge. Information sought by financial data consumers is often buried within vast bodies of unstructured documents, which have historically required thorough manual extraction. Automated solutions provide faster access to non-machine-readable datasets, in a context where untimely information quickly becomes irrelevant. Data quality standards cannot be compromised, so automation requires high data integrity. This multifaceted task is broken down into smaller steps: ingestion, table parsing (detection and structure recognition), text analysis (entity detection and disambiguation), schema-based record extraction, user feedback incorporation. Selected intermediary steps are phrased as machine learning problems. Solutions leveraging cutting-edge approaches from the fields of computer vision (e.g. table detection) and natural language processing (e.g. entity detection and disambiguation) are proposed.

Keywords: computer vision, entity recognition, finance, information retrieval, machine learning, natural language processing

Procedia PDF Downloads 113
26162 Regression Approach for Optimal Purchase of Hosts Cluster in Fixed Fund for Hadoop Big Data Platform

Authors: Haitao Yang, Jianming Lv, Fei Xu, Xintong Wang, Yilin Huang, Lanting Xia, Xuewu Zhu

Abstract:

Given a fixed fund, purchasing fewer hosts of higher capability or inversely more of lower capability is a must-be-made trade-off in practices for building a Hadoop big data platform. An exploratory study is presented for a Housing Big Data Platform project (HBDP), where typical big data computing is with SQL queries of aggregate, join, and space-time condition selections executed upon massive data from more than 10 million housing units. In HBDP, an empirical formula was introduced to predict the performance of host clusters potential for the intended typical big data computing, and it was shaped via a regression approach. With this empirical formula, it is easy to suggest an optimal cluster configuration. The investigation was based on a typical Hadoop computing ecosystem HDFS+Hive+Spark. A proper metric was raised to measure the performance of Hadoop clusters in HBDP, which was tested and compared with its predicted counterpart, on executing three kinds of typical SQL query tasks. Tests were conducted with respect to factors of CPU benchmark, memory size, virtual host division, and the number of element physical host in cluster. The research has been applied to practical cluster procurement for housing big data computing.

Keywords: Hadoop platform planning, optimal cluster scheme at fixed-fund, performance predicting formula, typical SQL query tasks

Procedia PDF Downloads 232
26161 Model Predictive Controller for Pasteurization Process

Authors: Tesfaye Alamirew Dessie

Abstract:

Our study focuses on developing a Model Predictive Controller (MPC) and evaluating it against a traditional PID for a pasteurization process. Utilizing system identification from the experimental data, the dynamics of the pasteurization process were calculated. Using best fit with data validation, residual, and stability analysis, the quality of several model architectures was evaluated. The validation data fit the auto-regressive with exogenous input (ARX322) model of the pasteurization process by roughly 80.37 percent. The ARX322 model structure was used to create MPC and PID control techniques. After comparing controller performance based on settling time, overshoot percentage, and stability analysis, it was found that MPC controllers outperform PID for those parameters.

Keywords: MPC, PID, ARX, pasteurization

Procedia PDF Downloads 163
26160 Point Estimation for the Type II Generalized Logistic Distribution Based on Progressively Censored Data

Authors: Rana Rimawi, Ayman Baklizi

Abstract:

Skewed distributions are important models that are frequently used in applications. Generalized distributions form a class of skewed distributions and gain widespread use in applications because of their flexibility in data analysis. More specifically, the Generalized Logistic Distribution with its different types has received considerable attention recently. In this study, based on progressively type-II censored data, we will consider point estimation in type II Generalized Logistic Distribution (Type II GLD). We will develop several estimators for its unknown parameters, including maximum likelihood estimators (MLE), Bayes estimators and linear estimators (BLUE). The estimators will be compared using simulation based on the criteria of bias and Mean square error (MSE). An illustrative example of a real data set will be given.

Keywords: point estimation, type II generalized logistic distribution, progressive censoring, maximum likelihood estimation

Procedia PDF Downloads 198
26159 Exploring the Profiles of Militants in the SWAT Valley of Pakistan

Authors: Lateef Hakim Zai Khyber, Syed Rashid Ali

Abstract:

In the post 9/11 era, a new trend has developed of terrorist profiling on the basis of the ethnic, religious, political, psychological, social, and economic background of the terrorists to anticipate and assess the possible risk and to prevent and prosecute the suspected before they commit any violent act. The same profiling approach was adopted in different militant or terrorist de-radicalization and rehabilitation programs across the world in order to evaluate and identify the reasons and causes for joining terrorism in terms of push and pull factors. This paper attempts to explore and investigate the profiles of the detainees in the Sabaoon de-radicalization and Emancipation program, which aimed at de-radicalizing the former militants of Tehrik-e-Taliban (TTP) Pakistan in the Swat valley of Pakistan. This research attempted to use qualitative methods for collecting data, including a number of formal and informal open-ended interviews with the former staff members of Sabaoon to explore various aspects of the program, such as various approaches used at Sabaoon for terrorist profiling. It conducts a thorough examination of the profiles of the terrorist through their socioeconomic, ideological, emotional, intellectual, and psychological conditions and orientations, personal details, family issues, social preferences, etc. The study finds out that the majority of the terrorists belonged to the marginalized groups or lower class, including underprivileged tenants and poor laborers, of society having no access to land. They possess almost the same profiles, including low socioeconomic status, absence of a father or strict behavior of parents, large and combined families, lack of education, lack of religious understanding, etc. They also possess some common traits such as anxiety disorder, emotional instability, aggressive impulses and insecurity, depression, inferiority complex, lack of critical thinking and logical reasoning, authority-seeking behavior, and revenge-seeking behavior.

Keywords: terrorist profiling, Sabaoon, de-radicalization, rehabilitation, Swat, Pakistan, juvenile militants

Procedia PDF Downloads 155
26158 Omni: Data Science Platform for Evaluate Performance of a LoRaWAN Network

Authors: Emanuele A. Solagna, Ricardo S, Tozetto, Roberto dos S. Rabello

Abstract:

Nowadays, physical processes are becoming digitized by the evolution of communication, sensing and storage technologies which promote the development of smart cities. The evolution of this technology has generated multiple challenges related to the generation of big data and the active participation of electronic devices in society. Thus, devices can send information that is captured and processed over large areas, but there is no guarantee that all the obtained data amount will be effectively stored and correctly persisted. Because, depending on the technology which is used, there are parameters that has huge influence on the full delivery of information. This article aims to characterize the project, currently under development, of a platform that based on data science will perform a performance and effectiveness evaluation of an industrial network that implements LoRaWAN technology considering its main parameters configuration relating these parameters to the information loss.

Keywords: Internet of Things, LoRa, LoRaWAN, smart cities

Procedia PDF Downloads 148
26157 Efficiency of Virtual Reality Exercises with Nintendo Wii System on Balance and Independence in Motor Functions in Hemiparetic Patients: A Randomized Controlled Study

Authors: Ayça Utkan Karasu, Elif Balevi Batur, Gülçin Kaymak Karataş

Abstract:

The aim of this study was to examine the efficiency of virtual reality exercises with Nintendo Wii system on balance and independence in motor functions. This randomized controlled assessor-blinded study included 23 stroke inpatients with hemiparesis all within 12 months poststroke. Patients were randomly assigned to control group (n=11) or experimental group (n=12) via block randomization method. Control group participated in a conventional balance rehabilitation programme. Study group received a four-week balance training programme five times per week with a session duration of 20 minutes in addition to the conventional balance rehabilitation programme. Balance was assessed by the Berg’s balance scale, the functional reach test, the timed up and go test, the postural assessment scale for stroke, the static balance index. Also, displacement of centre of pressure sway and centre of pressure displacement during weight shifting was calculated by Emed-SX system. Independence in motor functions was assessed by The Functional Independence Measure (FIM) ambulation and FIM transfer subscales. The outcome measures were evaluated at baseline, 4th week (posttreatment), 8th week (follow-up). Repeated measures analysis of variance was performed for each of the outcome measure. Significant group time interaction was detected in the scores of the Berg’s balance scale, the functional reach test, eyes open anteroposterior and mediolateral center of pressure sway distance, eyes closed anteroposterior center of pressure sway distance, center of pressure displacement during weight shifting to effected side, unaffected side and total centre of pressure displacement during weight shifting (p < 0.05). Time effect was statistically significant in the scores of the Berg’s balance scale, the functional reach test, the timed up and go test, the postural assessment scale for stroke, the static balance index, eyes open anteroposterior and mediolateral center of pressure sway distance, eyes closed mediolateral center of pressure sway distance, the center of pressure displacement during weight shifting to effected side, the functional independence measure ambulation and transfer scores (p < 0.05). Virtual reality exercises with Nintendo Wii system combined with a conventional balance rehabilitation programme enhances balance performance and independence in motor functions in stroke patients.

Keywords: balance, hemiplegia, stroke rehabilitation, virtual reality

Procedia PDF Downloads 221
26156 Analysis the Impacts of WeChat Mobile Payment in China Teens' Online Purchasing Behaviors

Authors: Lok Yi Joyce Poon

Abstract:

China's mobile payment market has boomed in the past few years. WeChat (Chinese name as Weixin) owned by Tencent is known as the fastest growing all-in-one social messaging platforms. The company has launched the WeChat Pay in 2013, in which users can link their credit card to their user account and make payments within the app’s built in digital wallet. WeChat Payment is a one-stop payment tool that can provide a seamless online experience for the shoppers to transfer money between WeChat users (peer-to-peer) and make payments online by scanning a QR code, a prominent facilitator for transactions in WeChat, to complete the payment with the app without directing the users to the external websites. The aims of this study are to examine the effectiveness of WeChat mobile payment in China as well as the impacts of the China teen’s online purchasing behavior since the establishment of WeChat Payment. The research method of this study is conducted by both online survey on Sojump, a popular online survey platform in China. A total of 120 respondents among 18 to 25 teens in China completed the survey. Data sources included participants’ response to an end-of-session questionnaire, encompassing with the types of multiple choice, open-ended questions. To have an in-depth analysis, a face-to-face interview with a Chinese teen who is a frequent user of the WeChat Pay. The main finding of the study shows that the majority of the teenagers frequently use the WeChat payment tool because of its convenience, user-friendliness and the scenarios offered within the WeChat Wallet. The respondents claimed that they will settle the bills in their daily lives via WeChat Pay. However, the respondents in the age group of 40 or above will not use the WeChat Pay due to the security concern and they do not see the app as a platform for commercial activities like online shopping. Throughout the study, it is recommended WeChat should put more efforts on the security issue and improve the payment technology by adopting the near-field communication terminals instead of requiring users to scan QR codes before they complete the transaction.

Keywords: digital wallet, mobile payment, online purchasing behavior, WeChat Pay

Procedia PDF Downloads 393
26155 The Emergence of Construction Mafia in South Africa: The Implication on the Construction Industry

Authors: Thandokazi Nyangiwe, Christopher Amoah, Charles P. Mukumba

Abstract:

The South African construction sector is threatened by emerging black business forums called construction mafias. The emergence of the construction mafia has culminated in the disruptions and abandonment of construction sites resulting in the loss of jobs for construction workers. The paper examines the origin of construction mafias and their impact on the construction sector, including the potential ways to cope with their operations. A qualitative research approach was adopted for this study using open-ended interview questions to gather information from 30 key construction industry stakeholders, including contractors, subcontractors, consultants, and the construction project communities. Content and thematic analysis were used to analyse the data collected. The findings suggest that most participants do not fully understand the existence and operations of construction mafias in the construction industry. Construction mafias claim to be part of the local business forums. They disrupt construction projects and demand a certain amount, usually 30% of the construction value. Construction mafias frequently resort to intimidation and violence if their demands are unmet. Their operations have resulted in delayed completion of construction projects, abandonment of projects, and loss of income for the contractor and jobs for the construction workers. The interviews were limited to construction stakeholders. Because of the nature of the mafias’ operations, they could not be accessed for interviews for fear of being identified because of the connotation attached to their role as construction mafias. Construction project owners face disruptions of projects resulting in loss of equipment, materials, and income. Therefore, there is a need to sensitise the construction stakeholders in the construction industry regarding the existence and operations of the construction mafia and the implications on construction project performance and delivery. The findings will give insight into the operations of the construction mafias in the South African construction industry, which has caused disruptions in construction project sites. Stakeholders must find solutions to address the construction mafias’ disruptive actions on construction projects. The study presents an initial inquiry that will come up with how to manage and cope with the growing operations of construction mafias in the South African construction industry.

Keywords: black business forums, construction mafia, emergence, implication

Procedia PDF Downloads 134
26154 Cybervetting and Online Privacy in Job Recruitment – Perspectives on the Current and Future Legislative Framework Within the EU

Authors: Nicole Christiansen, Hanne Marie Motzfeldt

Abstract:

In recent years, more and more HR professionals have been using cyber-vetting in job recruitment in an effort to find the perfect match for the company. These practices are growing rapidly, accessing a vast amount of data from social networks, some of which is privileged and protected information. Thus, there is a risk that the right to privacy is becoming a duty to manage your private data. This paper investigates to which degree a job applicant's fundamental rights are protected adequately in current and future legislation in the EU. This paper argues that current data protection regulations and forthcoming regulations on the use of AI ensure sufficient protection. However, even though the regulation on paper protects employees within the EU, the recruitment sector may not pay sufficient attention to the regulation as it not specifically targeting this area. Therefore, the lack of specific labor and employment regulation is a concern that the social partners should attend to.

Keywords: AI, cyber vetting, data protection, job recruitment, online privacy

Procedia PDF Downloads 86
26153 Performance Analysis of a Shell and Tube Heat Exchanger in the Organic Rankine Cycle Power Plant

Authors: Yogi Sirodz Gaos, Irvan Wiradinata

Abstract:

In the 500 kW Organic Rankine Cycle (ORC) power plant in Indonesia, an AFT (according to the Tubular Exchanger Manufacturers Association – TEMA) type shell and tube heat exchanger device is used as a pre-heating system for the ORC’s hot water circulation system. The pre-heating source is a waste heat recovery of the brine water, which is tapped from a geothermal power plant. The brine water itself has 5 MWₜₕ capacities, with average temperature of 170ᵒC, and 7 barg working pressure. The aim of this research is to examine the performance of the heat exchanger in the ORC system in a 500 kW ORC power plant. The data for this research were collected during the commissioning on the middle of December 2016. During the commissioning, the inlet temperature and working pressure of the brine water to the shell and tube type heat exchanger was 149ᵒC, and 4.4 barg respectively. Furthermore, the ΔT for the hot water circulation of the ORC system to the heat exchanger was 27ᵒC, with the inlet temperature of 140ᵒC. The pressure in the hot circulation system was dropped slightly from 7.4ᵒC to 7.1ᵒC. The flow rate of the hot water circulation was 80.5 m³/h. The presentation and discussion of a case study on the performance of the heat exchanger on the 500 kW ORC system is presented as follows: (1) the heat exchange duty is 2,572 kW; (2) log mean temperature of the heat exchanger is 13.2ᵒC; (3) the actual overall thermal conductivity is 1,020.6 W/m².K (4) the required overall thermal conductivity is 316.76 W/m².K; and (5) the over design for this heat exchange performance is 222.2%. An analysis of the heat exchanger detailed engineering design (DED) is briefly discussed. To sum up, this research concludes that the shell and tube heat exchangers technology demonstrated a good performance as pre-heating system for the ORC’s hot water circulation system. Further research need to be conducted to examine the performance of heat exchanger system on the ORC’s hot water circulation system.

Keywords: shell and tube, heat exchanger, organic Rankine cycle, performance, commissioning

Procedia PDF Downloads 143
26152 Sequential Pattern Mining from Data of Medical Record with Sequential Pattern Discovery Using Equivalent Classes (SPADE) Algorithm (A Case Study : Bolo Primary Health Care, Bima)

Authors: Rezky Rifaini, Raden Bagus Fajriya Hakim

Abstract:

This research was conducted at the Bolo primary health Care in Bima Regency. The purpose of the research is to find out the association pattern that is formed of medical record database from Bolo Primary health care’s patient. The data used is secondary data from medical records database PHC. Sequential pattern mining technique is the method that used to analysis. Transaction data generated from Patient_ID, Check_Date and diagnosis. Sequential Pattern Discovery Algorithms Using Equivalent Classes (SPADE) is one of the algorithm in sequential pattern mining, this algorithm find frequent sequences of data transaction, using vertical database and sequence join process. Results of the SPADE algorithm is frequent sequences that then used to form a rule. It technique is used to find the association pattern between items combination. Based on association rules sequential analysis with SPADE algorithm for minimum support 0,03 and minimum confidence 0,75 is gotten 3 association sequential pattern based on the sequence of patient_ID, check_Date and diagnosis data in the Bolo PHC.

Keywords: diagnosis, primary health care, medical record, data mining, sequential pattern mining, SPADE algorithm

Procedia PDF Downloads 401
26151 Estimation of Maximum Earthquake for Gujarat Region, India

Authors: Ashutosh Saxena, Kumar Pallav, Ramji Dwivedi

Abstract:

The present study estimates the seismicity parameter 'b' and maximum possible magnitude of an earthquake (Mmax) for Gujarat region with three well-established methods viz. Kijiko parametric model (KP), Kijiko-Sellevol-Bayern (KSB) and Tapered Gutenberg-Richter (TGR), as a combined seismic source regime. The earthquake catalogue is prepared for a period of 1330 to 2013 in the region Latitudes 20o N to 250 N and Longitudinally extending from 680 to 750 E for earthquake moment magnitude (Mw) ≥4.0. The ’a’ and 'b' value estimated for the region as 4.68 and 0.58. Further, Mmax estimated as 8.54 (± 0.29), 8.69 (± 0.48), and 8.12 with KP, KSB, and TGR, respectively.

Keywords: Mmax, seismicity parameter, Gujarat, Tapered Gutenberg-Richter

Procedia PDF Downloads 542
26150 Governance, Risk Management, and Compliance Factors Influencing the Adoption of Cloud Computing in Australia

Authors: Tim Nedyalkov

Abstract:

A business decision to move to the cloud brings fundamental changes in how an organization develops and delivers its Information Technology solutions. The accelerated pace of digital transformation across businesses and government agencies increases the reliance on cloud-based services. They are collecting, managing, and retaining large amounts of data in cloud environments makes information security and data privacy protection essential. It becomes even more important to understand what key factors drive successful cloud adoption following the commencement of the Privacy Amendment Notifiable Data Breaches (NDB) Act 2017 in Australia as the regulatory changes impact many organizations and industries. This quantitative correlational research investigated the governance, risk management, and compliance factors contributing to cloud security success. The factors influence the adoption of cloud computing within an organizational context after the commencement of the NDB scheme. The results and findings demonstrated that corporate information security policies, data storage location, management understanding of data governance responsibilities, and regular compliance assessments are the factors influencing cloud computing adoption. The research has implications for organizations, future researchers, practitioners, policymakers, and cloud computing providers to meet the rapidly changing regulatory and compliance requirements.

Keywords: cloud compliance, cloud security, data governance, privacy protection

Procedia PDF Downloads 116
26149 Pioneering Technology of Night Photo-Stimulation of the Brain Lymphatic System: Therapy of Brain Diseases during Sleep

Authors: Semyachkina-Glushkovskaya Oxana, Fedosov Ivan, Blokhina Inna, Terskov Andrey, Evsukova Arina, Elovenko Daria, Adushkina Viktoria, Dubrovsky Alexander, Jürgen Kurths

Abstract:

In modern neurobiology, sleep is considered a novel biomarker and a promising therapeutic target for brain diseases. This is due to recent discoveries of the nighttime activation of the brain lymphatic system (BLS), playing an important role in the removal of wastes and toxins from the brain and contributes neuroprotection of the central nervous system (CNS). In our review, we discuss that night stimulation of BLS might be a breakthrough strategy in a new treatment of Alzheimer’s and Parkinson’s disease, stroke, brain trauma, and oncology. Although this research is in its infancy, however, there are pioneering and promising results suggesting that night transcranial photostimulation (tPBM) stimulates more effectively lymphatic removal of amyloid-beta from mouse brain than daily tPBM that is associated with a greater improvement of the neurological status and recognition memory of animals. In our previous study, we discovered that tPBM modulates the tone and permeability of the lymphatic endothelium by stimulating NO formation, promoting lymphatic clearance of wastes and toxins from the brain tissues. We also demonstrate that tPBM can also lead to angio- and lymphangiogenesis, which is another mechanism underlying tPBM-mediated stimulation of BLS. Thus, photo-augmentation of BLS might be a promising therapeutic target for preventing or delaying brain diseases associated with BLS dysfunction. Here we present pioneering technology for simultaneous tPBM in humans and sleep monitoring for stimulation of BLS to remove toxins from CNS and modulation of brain immunity. The wireless-controlled gadget includes a flexible organic light-emitting diode (LED) source that is controlled directly by a sleep-tracking device via a mobile application. The designed autonomous LED source is capable of providing the required therapeutic dose of light radiation at a certain region of the patient’s head without disturbing of sleeping patient. To minimize patients' discomfort, advanced materials like flexible organic LEDs were used. Acknowledgment: This study was supported by RSF project No. 23-75-30001.

Keywords: brain diseases, brain lymphatic system, phototherapy, sleep

Procedia PDF Downloads 72
26148 Simulations to Predict Solar Energy Potential by ERA5 Application at North Africa

Authors: U. Ali Rahoma, Nabil Esawy, Fawzia Ibrahim Moursy, A. H. Hassan, Samy A. Khalil, Ashraf S. Khamees

Abstract:

The design of any solar energy conversion system requires the knowledge of solar radiation data obtained over a long period. Satellite data has been widely used to estimate solar energy where no ground observation of solar radiation is available, yet there are limitations on the temporal coverage of satellite data. Reanalysis is a “retrospective analysis” of the atmosphere parameters generated by assimilating observation data from various sources, including ground observation, satellites, ships, and aircraft observation with the output of NWP (Numerical Weather Prediction) models, to develop an exhaustive record of weather and climate parameters. The evaluation of the performance of reanalysis datasets (ERA-5) for North Africa against high-quality surface measured data was performed using statistical analysis. The estimation of global solar radiation (GSR) distribution over six different selected locations in North Africa during ten years from the period time 2011 to 2020. The root means square error (RMSE), mean bias error (MBE) and mean absolute error (MAE) of reanalysis data of solar radiation range from 0.079 to 0.222, 0.0145 to 0.198, and 0.055 to 0.178, respectively. The seasonal statistical analysis was performed to study seasonal variation of performance of datasets, which reveals the significant variation of errors in different seasons—the performance of the dataset changes by changing the temporal resolution of the data used for comparison. The monthly mean values of data show better performance, but the accuracy of data is compromised. The solar radiation data of ERA-5 is used for preliminary solar resource assessment and power estimation. The correlation coefficient (R2) varies from 0.93 to 99% for the different selected sites in North Africa in the present research. The goal of this research is to give a good representation for global solar radiation to help in solar energy application in all fields, and this can be done by using gridded data from European Centre for Medium-Range Weather Forecasts ECMWF and producing a new model to give a good result.

Keywords: solar energy, solar radiation, ERA-5, potential energy

Procedia PDF Downloads 211
26147 Evaluation of Chemopreventive Activity of Medicinal Plant, Gromwell Seed against Tumor Promoting Stage

Authors: Harukuni Tokuda, Takanari Arai, Xu FengHao, Nobutaka Suzuki

Abstract:

In our continuous search for anti-tumor promoting, chemopreventive active potency from natural source material, a kind of healthy tea, Gromwell seed (Coix lachryma-jobi) ext., and including compounds Monoolein and Trilinolein have been screened using the in vitro synergistic assay indicated by inhibitory effects on the induction of Epstein-Barr virus early antigen (EBV-EA) by TPA. In assay, Gromwell seed aqueous extract and hot aqueous extract exhibited the potential inhibitory effects on EBV-EA activation without strong cytotoxicity on Raji cells. In our experimental system, the inhibitory effects of both Gromwell extracts and compounds were greater than that of beta-carotene, which is known anti-tumor promoting agent and/or chemopreventive agent. These compounds were evaluated for their in vitro inhibitory effect on EBV-EA activation induced by TPA. The percentages of the inhibition of TPA-induced EBV-EA activation for these materials were 60% and 30% at concentration 100 μg. Based on the results obtained in vitro, we studied the inhibitory effect of compounds, in an in vivo two-stage carcinogenesis test of mouse skin papilloma using DMBA as an initiator and TPA as a potential promoter. The control animals showed a 100% incidence of papilloma at 20 weeks after DMBA-TPA tumor promotion, while treatment with compounds reduced the percentage of number of tumor to 60 % after 20 weeks. Results from in vitro and in vivo studies showing chemopreventive activity against TPA promoting stage and these data support the effective potency of carcinogenic stage in clinical evaluation of integrative oncology.

Keywords: gromwell seed, medicinal plant, chemoprevention, pharmaceutical medicine

Procedia PDF Downloads 408
26146 Selection and Identification of Some Spontaneous Plant Species Having the Ability to Grow Naturally on Crude Oil Contaminated Soil for a Possible Approach to Decontaminate and Rehabilitate an Industrial Area

Authors: Salima Agoun-Bahar, Ouzna Abrous-Belbachir, Souad Amelal

Abstract:

Industrial areas generally contain heavy metals; thus, negative consequences can appear in the medium and long term on the fauna and flora, but also on the food chain, which man constitutes the final link. The SONATRACH Company has become aware of the importance of environmental protection by setting up a rehabilitation program for polluted sites in order to avoid major ecological disasters and find both curative and preventive solutions. The aim of this work consists to study industrial pollution located around a crude oil storage tank in the Algiers refinery of Sidi R'cine and to select the plants which accumulate the most heavy metals for possible use in phytotechnology. Sampling of whole plants with their soil clod was realized around the pollution source at a depth of twenty centimeters, then transported to the laboratory to identify them. The quantification of heavy metals, lead, zinc, copper, and nickel was carried out by atomic absorption spectrophotometry with flame in the soil and at the level of the aerial and underground parts of the plants. Ten plant species were recorded in the polluted site, three of them belonging to the grass family with a dominance percentage higher than 50%, followed by three other species belonging to the Composite family represented by 12% and one species for each of the families Linaceae, Plantaginaceae, Papilionaceae, and Boraginaceae. Koeleria phleoïdes L. and Avena sterilis L. of the grass family seem to be the dominant plants, although they are quite far from the pollution source. Lead pollution of soils is the most pronounced for all stations, with values varying from 237.5 to 2682.5 µg.g⁻¹. Other peaks are observed for zinc (1177 µg.g⁻¹) and copper (635 µg.g⁻¹) at station 8 and nickel (1800 µg.g⁻¹) at station 10. Among the inventoried plants, some species accumulate a significant amount of metals: Trifolium sp and K.phleoides for lead and zinc, P.lanceolata and G.tomentosa for nickel, and A.clavatus for zinc. K.phloides is a very interesting species because it accumulates an important quantity of heavy metals, especially in its aerial part. This can be explained by its use of the phytoextraction technique, which will facilitate the recovery of the pollutants by the simple removal of shoots.

Keywords: heavy metals, industrial pollution, phytotechnology, rehabilitation

Procedia PDF Downloads 66
26145 Environmental Impacts on the Appearance of Disbonds in Metal Rotor Blades of Mi-2 Helicopters

Authors: Piotr Synaszko, Michał Sałaciński, Andrzej Leski

Abstract:

This paper describes the analysis of construction Mi-2 helicopter rotor blades in order to determine the causes of appearance disbonds. Authors describe construction of rotor blade with impact on bonded joins and areas of water migration. They also made analysis which determines possibility of disbond between critical parts of rotor blades based on more than one hundred non-destructive inspections results. They showed which parts of the blades most likely to damage. The main source of damage is water presence.

Keywords: disbonds, environmental effect, helicopter rotor blades, service life extension

Procedia PDF Downloads 311
26144 Diverse Sensitivity to Ultraviolet Radiation of DNA and RNA Viruses

Authors: Nickolay Nosik, Dmitry Nosik, Marina Bochkova, Nina Kondrashina, Olga Lobach

Abstract:

The bactericidal effect of UV radiation is known for long time and widely used for inactivation of pathogens but for viruses it is not so uniform. Due to a wide variety of viruses their sensitivity to UV radiation is quite different and not quite predictable. The goal of the study was to determine the inactivation kinetics of UV radiation ( 254 nm) of the viruses of social importance (HIV), as well as test-viruses (poliovirus, adenovirus) used for the evaluation of the viral inactivation efficacy of germicides. Methods: DNA viruses- adenovirus, type 5; Herpes simplex virus (HSV), type 1, and RNA viruses–human immunodeficiency virus (HIV), type 1 and poliovirus, type 1 (Sabin strain) were obtained from State collection of viruses ( The D.I. Ivanovsky Institute of Virology). The source of UV radiation was a 15-watt low-pressure mercury vapor lamp (over 60% 254nm). The samples of 5cm2 were placed direct under the UV lamp flow (h-0.3m). Log reduction value was used as a marker for the rate of virus inactivation. Results: The data obtained indicate that poliovirus (one of the viruses most resistant to chemical germicides) and HSV are rather sensitive to UV radiation ( D90 =250-311 J/m2). Adenovirus is much more resistant to UV radiation (750 J/m2 ). The kinetics of adenovirus inactivation : 0 min- 5.0 lg TCID50, 10 min - 5,0, 15 min -4,0, 30 min – 3.5, 60 min – 1,0, 75 min -0,5 lg TCID50, 90 min –virus not detectable. HIV is most resistant to UV radiation among the studied viruses. It takes more than 4 hrs to inactivate the virus on the surface. D90 = 2000 J/m2 Conclusion: The results of the study show that there is no direct dependence between sensitivity to UV light and the size of the virion or presence\absence of the envelope of the virus. Poliovirus and adenovirus are small viruses (20-30nm poliovirus and 70-90nm adenovirus) and both are non-enveloped viruses but adenovirus 3-fold more resistant to UV radiation than poliovirus. It can be expected that viruses with more complicate structure, like Herpes virus (200nm) or HIV (80-100 nm), would be more sensitive to UV light. However, the very high resistance of HIV to UV radiation needs further investigation. The diverse resistance of the different viruses to UV radiation should be taken into the account when UV light is used to inactivate infectious viruses in hospitals and other public environments.

Keywords: HIV, HSV, inhibition of viruses, UV radiation

Procedia PDF Downloads 455
26143 Meta Mask Correction for Nuclei Segmentation in Histopathological Image

Authors: Jiangbo Shi, Zeyu Gao, Chen Li

Abstract:

Nuclei segmentation is a fundamental task in digital pathology analysis and can be automated by deep learning-based methods. However, the development of such an automated method requires a large amount of data with precisely annotated masks which is hard to obtain. Training with weakly labeled data is a popular solution for reducing the workload of annotation. In this paper, we propose a novel meta-learning-based nuclei segmentation method which follows the label correction paradigm to leverage data with noisy masks. Specifically, we design a fully conventional meta-model that can correct noisy masks by using a small amount of clean meta-data. Then the corrected masks are used to supervise the training of the segmentation model. Meanwhile, a bi-level optimization method is adopted to alternately update the parameters of the main segmentation model and the meta-model. Extensive experimental results on two nuclear segmentation datasets show that our method achieves the state-of-the-art result. In particular, in some noise scenarios, it even exceeds the performance of training on supervised data.

Keywords: deep learning, histopathological image, meta-learning, nuclei segmentation, weak annotations

Procedia PDF Downloads 140
26142 Ionic Liquids as Substrates for Metal-Organic Framework Synthesis

Authors: Julian Mehler, Marcus Fischer, Martin Hartmann, Peter S. Schulz

Abstract:

During the last two decades, the synthesis of metal-organic frameworks (MOFs) has gained ever increasing attention. Based on their pore size and shape as well as host-guest interactions, they are of interest for numerous fields related to porous materials, like catalysis and gas separation. Usually, MOF-synthesis takes place in an organic solvent between room temperature and approximately 220 °C, with mixtures of polyfunctional organic linker molecules and metal precursors as substrates. Reaction temperatures above the boiling point of the solvent, i.e. solvothermal reactions, are run in autoclaves or sealed glass vessels under autogenous pressures. A relatively new approach for the synthesis of MOFs is the so-called ionothermal synthesis route. It applies an ionic liquid as a solvent, which can serve as a structure-directing template and/or a charge-compensating agent in the final coordination polymer structure. Furthermore, this method often allows for less harsh reaction conditions than the solvothermal route. Here a variation of the ionothermal approach is reported, where the ionic liquid also serves as an organic linker source. By using 1-ethyl-3-methylimidazolium terephthalates ([EMIM][Hbdc] and [EMIM]₂[bdc]), the one-step synthesis of MIL-53(Al)/Boehemite composites with interesting features is possible. The resulting material is already formed at moderate temperatures (90-130 °C) and is stabilized in the usually unfavored ht-phase. Additionally, in contrast to already published procedures for MIL-53(Al) synthesis, no further activation at high temperatures is mandatory. A full characterization of this novel composite material is provided, including XRD, SS-NMR, El-Al., SEM as well as sorption measurements and its interesting features are compared to MIL-53(Al) samples produced by the classical solvothermal route. Furthermore, the syntheses of the applied ionic liquids and salts is discussed. The influence of the degree of ionicity of the linker source [EMIM]x[H(2-x)bdc] on the crystal structure and the achievable synthesis temperature are investigated and give insight into the role of the IL during synthesis. Aside from the synthesis of MIL-53 from EMIM terephthalates, the use of the phosphonium cation in this approach is discussed as well. Additionally, the employment of ILs in the preparation of other MOFs is presented briefly. This includes the ZIF-4 framework from the respective imidazolate ILs and chiral camphorate based frameworks from their imidazolium precursors.

Keywords: ionic liquids, ionothermal synthesis, material synthesis, MIL-53, MOFs

Procedia PDF Downloads 208