Search results for: painful vision loss
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 4445

Search results for: painful vision loss

3995 Investigation of Biocorrosion in Brass by Arthrobacter sulfureus in Neutral Medium

Authors: Ramachandran Manivannan, B. Sakthi Swaroop, Selvam Noyel Victoria

Abstract:

Microbial corrosion of brass gauze by the aerobic film forming bacteria Arthrobacter sulfurous in neutral media was investigated using gravimetric studies. Maximum weight loss of 166.98 mg was observed for a period of 28 days of exposure to the bacterial medium as against the weight loss of 13.69 mg for control. The optical density studies for the bacterial culture was found to show attainment of stationary phase in 48 h. Scanning electron microscopy analysis of the samples shows the presence of pitting corrosion. The energy dispersive X-ray analysis of the samples showed increased oxygen and phosphorus content in the sample due to bacterial activity.

Keywords: Arthrobacter sulfureus, biocorrosion, brass, neutral medium

Procedia PDF Downloads 149
3994 Tensile Force Estimation for Real-Size Pre-Stressed Concrete Girder using Embedded Elasto-Magnetic Sensor

Authors: Junkyeong Kim, Jooyoung Park, Aoqi Zhang, Seunghee Park

Abstract:

The tensile force of Pre-Stressed Concrete (PSC) girder is the most important factor for evaluating the performance of PSC girder bridges. To measure the tensile force of PSC girder, several NDT methods were studied. However, conventional NDT method cannot be applied to the real-size PSC girder because the PS tendons could not be approached. To measure the tensile force of real-size PSC girder, this study proposed embedded EM sensor based tensile force estimation method. The embedded EM sensor could be installed inside of PSC girder as a sheath joint before the concrete casting. After curing process, the PS tendons were installed, and the tensile force was induced step by step using hydraulic jacking machine. The B-H loop was measured using embedded EM sensor at each tensile force steps and to compare with actual tensile force, the load cell was installed at each end of girder. The magnetization energy loss, that is the closed area of B-H loop, was decreased according to the increase of tensile force with regular pattern. Thus, the tensile force could be estimated by the tracking the change of magnetization energy loss of PS tendons. Through the experimental result, the proposed method can be used to estimate the tensile force of the in-situ real-size PSC girder bridge.

Keywords: tensile force estimation, embedded EM sensor, magnetization energy loss, PSC girder

Procedia PDF Downloads 317
3993 Machine Learning for Aiding Meningitis Diagnosis in Pediatric Patients

Authors: Karina Zaccari, Ernesto Cordeiro Marujo

Abstract:

This paper presents a Machine Learning (ML) approach to support Meningitis diagnosis in patients at a children’s hospital in Sao Paulo, Brazil. The aim is to use ML techniques to reduce the use of invasive procedures, such as cerebrospinal fluid (CSF) collection, as much as possible. In this study, we focus on predicting the probability of Meningitis given the results of a blood and urine laboratory tests, together with the analysis of pain or other complaints from the patient. We tested a number of different ML algorithms, including: Adaptative Boosting (AdaBoost), Decision Tree, Gradient Boosting, K-Nearest Neighbors (KNN), Logistic Regression, Random Forest and Support Vector Machines (SVM). Decision Tree algorithm performed best, with 94.56% and 96.18% accuracy for training and testing data, respectively. These results represent a significant aid to doctors in diagnosing Meningitis as early as possible and in preventing expensive and painful procedures on some children.

Keywords: machine learning, medical diagnosis, meningitis detection, pediatric research

Procedia PDF Downloads 130
3992 Psychological Well-Being Among the Freed Kamhalari Girls in Dang

Authors: Jug Maya Chaudhary

Abstract:

The principal objective of this paper has been to assess the level of psychological well-being (PWB) of freed Kamhalari girls sheltered in a governmental rehabilitation center in the Dang district. All the girls (N=100) have been selected for a quantitative study, including 15 cases of in-depth interviews for qualitative study in 2013. The study results suggest that the level of psychological well-being of freed Kamhalaris has not been found to be high; rather they are moderate, with small incidences of a lower level of psychological well-being. Regarding the qualitative study, a total of six themes was identified: physical pain and fatigue then and now, the lasting experience of anxiety, unfair treatment, low self-esteem, depressed mood, and frustration due to current state and confusion. These themes reflected the unrelenting intrusive nature of painful experiences of those affected. This research will provide empathic insight into their past experience. It will add to the body of research on Psychological Well-being of Freed Kamhalari Girls and may generate ideas for intervention research.

Keywords: Kamhalari, Experiences, Tharu, Psychological Wellbeing

Procedia PDF Downloads 41
3991 Security Report Profiling for Mobile Banking Applications in Indonesia Based on OWASP Mobile Top 10-2016

Authors: Bambang Novianto, Rizal Aditya Herdianto, Raphael Bianco Huwae, Afifah, Alfonso Brolin Sihite, Rudi Lumanto

Abstract:

The mobile banking application is a type of mobile application that is growing rapidly. This is caused by the ease of service and time savings in making transactions. On the other hand, this certainly provides a challenge in security issues. The use of mobile banking can not be separated from cyberattacks that may occur which can result the theft of sensitive information or financial loss. The financial loss and the theft of sensitive information is the most avoided thing because besides harming the user, it can also cause a loss of customer trust in a bank. Cyberattacks that are often carried out against mobile applications are phishing, hacking, theft, misuse of data, etc. Cyberattack can occur when a vulnerability is successfully exploited. OWASP mobile Top 10 has recorded as many as 10 vulnerabilities that are most commonly found in mobile applications. In the others, android permissions also have the potential to cause vulnerabilities. Therefore, an overview of the profile of the mobile banking application becomes an urgency that needs to be known. So that it is expected to be a consideration of the parties involved for improving security. In this study, an experiment has been conducted to capture the profile of the mobile banking applications in Indonesia based on android permission and OWASP mobile top 10 2016. The results show that there are six basic vulnerabilities based on OWASP Mobile Top 10 that are most commonly found in mobile banking applications in Indonesia, i.e. M1:Improper Platform Usage, M2:Insecure Data Storage, M3:Insecure Communication, M5:Insufficient Cryptography, M7:Client Code Quality, and M9:Reverse Engineering. The most permitted android permissions are the internet, status network access, and telephone read status.

Keywords: mobile banking application, OWASP mobile top 10 2016, android permission, sensitive information, financial loss

Procedia PDF Downloads 120
3990 Sexual Health Experiences of Older Men: Health Care Professionals' Perspectives

Authors: Andriana E. Tran, Anna Chur-Hansen

Abstract:

Sexual health is an important aspect of overall wellbeing. This study aimed to explore the sexual health experiences of men aged 50 years and over from the perspective of health care professional participants who were specializing in sexual health care and who consulted with older men. A total of ten interviews were conducted. Eleven themes were identified regarding men’s experiences with sexual health care as reported by participants. 1) Biologically focused: older male clients focus largely on the biological aspect of their sexual health without consideration of other factors which might affect their functioning. 2) Psychological concerns: there is an interaction between mental and sexual health but older male clients do not necessarily see this. 3) Medicalization of sexual functioning: advances in medicine that aid with erectile difficulties which consequently mean that older men tend to favor a medical solution to their sexual concerns. 4) Masculine identity: sexual health concerns are linked to older male clients’ sense of masculinity. 5) Penile functionality: most concerns that older male clients have center on their penile functionality. 6) Relationships: many male clients seek sexual help as they believe it improves relationships. Conversely, having supportive partners may mean older male clients focus less on the physicality of sex. 7) Grief and loss: men experience grief and loss – the loss of their sexual functioning, grief from loss of a long-term partner, and loss of intimacy and privacy when moving from independent living to residential care. 8) Social stigma: older male clients experience stigma around aging sexuality and sex in general. 9) Help-seeking behavior: older male clients will usually seek mechanistic solution for biological sexual concerns, such as medication used for penile dysfunction. 10) Dismissed by health care professionals: many older male clients seek specialist sexual health care without the knowledge of their doctors as they feel dismissed due to lack of expertise, lack of time, and the doctor’s personal attitudes and characteristics. Finally, 11) Lack of resources: there is a distinct lack of resources and training to understand sexuality for healthy older men. These findings may inform future research, professional training, public health campaigns and policies for sexual health in older men.

Keywords: ageing, biopsychosocial model, men's health, sexual health

Procedia PDF Downloads 152
3989 Changing Geomorphosites in a Changing Lake: How Environmental Changes in Urmia Lake Have Been Driving Vanishing or Creating of Geomorphosites

Authors: D. Mokhtari

Abstract:

Any variation in environmental characteristics of geomorphosites would lead to destabilisation of their geotouristic values all around the planet. The Urmia lake, with an area of approximately 5,500 km2 and a catchment area of 51,876 km2, and to which various reasons over time, especially in the last fifty years have seen a sharp decline and have decreased by about 93 % in two recent decades. These variations are not only driving significant changes in the morphology and ecology of the present lake landscape, but at the same time are shaping newly formed morphologies, which vanished some valuable geomorphosites or develop into smaller geomorphosites with significant value from a scientific and cultural point of view. This paper analyses and discusses features and evolution in several representative coastal and island geomorphosites. For this purpose, a total of 23 geomorphosites were studied in two data series (1963 and 2015) and the respective data were compared and analysed. The results showed, The total loss in geomorphosites area in a half century amounted to a loss of more than 90% of the valuable geomorphosites. Moreover, the comparison between the mean yearly value of coastal area lost over the entire period and the yearly average calculated for the shorter period (1998-2014) clearly indicates a pattern of acceleration. This acceleration in the rate of reduction in lake area was seen in most of the southern half of the lake. In the region as well, the general water-level falling is not only causing the loss of a significant water resource, which is followed by major impact on regional ecosystems, but is also driving the most marked recent (last century) changes in the geotouristic landscapes. In fact, the disappearance of geomorphosites means the loss of tourism phenomenon. In this context attention must be paid to the question of conservation. The action needed to safeguard geomorphosites includes: 1) Preventive action, 2) Corrective action, and 3) Sharing knowledge.

Keywords: geomorphosite, environmental changes, changing lake, Urmia lake, northwest of Iran

Procedia PDF Downloads 356
3988 To Access the Knowledge, Awareness and Factors Associated With Diabetes Mellitus in Buea, Cameroon

Authors: Franck kem Acho

Abstract:

This is a chronic metabolic disorder which is a fast-growing global problem with a huge social, health, and economic consequences. It is estimated that in 2010 there were globally 285 million people (approximately 6.4% of the adult population) suffering from this disease. This number is estimated to increase to 430 million in the absence of better control or cure. An ageing population and obesity are two main reasons for the increase. Diabetes mellitus is a chronic heterogeneous metabolic disorder with a complex pathogenesis. It is characterized by elevated blood glucose levels or hyperglycemia, which results from abnormalities in either insulin secretion or insulin action or both. Hyperglycemia manifests in various forms with a varied presentation and results in carbohydrate, fat, and protein metabolic dysfunctions. Long-term hyperglycemia often leads to various microvascular and macrovascular diabetic complications, which are mainly responsible for diabetes-associated morbidity and mortality. Hyperglycemia serves as the primary biomarker for the diagnosis of diabetes as well. Furthermore, it has been shown that almost 50% of the putative diabetics are not diagnosed until 10 years after onset of the disease, hence the real prevalence of global diabetes must be astronomically high. This study was conducted in a locality to access the level of knowledge, awareness and risk factors associated with people leaving with diabetes mellitus. A month before the screening was to be conducted, a health screening in some selected churches and on the local community radio as well as on relevant WhatsApp groups were advertised. A general health talk was delivered by the head of the screening unit to all attendees who were all educated on the procedure to be carried out with benefits and any possible discomforts after which the attendee’s consent was obtained. Evaluation of the participants for any leads to the diabetes selected for the screening was done by taking adequate history and physical examinations such as excessive thirst, increased urination, tiredness, hunger, unexplained weight loss, feeling irritable or having other mood changes, having blurry vision, having slow-healing sores, getting a lot of infections, such as gum, skin and vaginal infections. Out of the 94 participants the finding show that 78 were females and 16 were males, 70.21% of participants with diabetes were between the ages of 60-69yrs.The study found that only 10.63% of respondents declared a good level of knowledge of diabetes. Out of 3 symptoms of diabetes analyzed in this study, high blood sugar (58.5%) and chronic fatigue (36.17%) were the most recognized. Out of 4 diabetes risk factors analyzed in this study, obesity (21.27%) and unhealthy diet (60.63%) were the most recognized diabetes risk factors, while only 10.6% of respondents indicated tobacco use. The diabetic foot was the most recognized diabetes complication (50.57%), but some the participants indicated vision problems (30.8%),or cardiovascular diseases (20.21%) as diabetes complications.

Keywords: diabetes mellitus, non comunicable disease, general health talk, hyperglycemia

Procedia PDF Downloads 38
3987 Knowledge Decision of Food Waste and Loss Reduction in Supply Chain System: A Case Study of Kingdom of Saudi Arabia

Authors: Nadia Adnan, Muhammad Mohsin Raza, Latha Ravindran

Abstract:

Based on the principles above, the study presents an economic model of food waste for consumers, intermediaries, and producers. We discriminate between purchasing and selling, purchases versus customers consumption, and gross output versus sales for each intermediary. To compensate for waste at each level of the supply chain, agents must charge higher sales prices. The research model can produce more accurate predictions about how actions (public regulations or private efforts) to reduce food waste impact markets, including indirect (cascading) effects. With a formal model, researchers demonstrate the uniqueness of these interaction effects and simulate an empirical model calibrated to market characteristics and waste rates in Saudi Arabia. Researchers demonstrate that the effects of waste reduction differ per commodity, depending on supply and demand elasticities, degree of openness to international commerce, and the beginning rates of food loss and waste at each level of the value chain. Because of the consequential effects related to the supply chain, initiatives to minimize food waste will be strengthened in some circumstances and partially countered in others.

Keywords: food loss, food waste, supply chain management, Saudi Arabia, food supply

Procedia PDF Downloads 77
3986 Preservation and Packaging Techniques for Extending the Shelf Life of Cucumbers: A Review of Methods and Factors Affecting Quality

Authors: Abdul Umaro Tholley

Abstract:

The preservation and packaging of cucumbers are essential to maintain their shelf life and quality. Cucumbers are a perishable food item that is highly susceptible to spoilage due to their high-water content and delicate nature. Therefore, proper preservation and packaging techniques are crucial to extend their shelf life and prevent economic loss. There are several methods of preserving cucumbers, including refrigeration, canning, pickling, and dehydration. Refrigeration is the most used preservation method, as it slows down the rate of deterioration and maintains the freshness and quality of the cucumbers. Canning and pickling are also popular preservation methods that use heat treatment and acidic solutions, respectively, to prevent microbial growth and increase shelf life. Dehydration involves removing the water content from cucumbers to increase their shelf life, but it may affect their texture and taste. Packaging also plays a vital role in preserving cucumbers. The packaging materials should be selected based on their ability to maintain the quality and freshness of the cucumbers. The most used packaging materials for cucumbers are polyethylene bags, which prevent moisture loss and protect the cucumbers from physical damage. Other packaging materials, such as corrugated boxes and wooden crates, may also be used, but they offer less protection against moisture loss and damage. The quality of cucumbers is affected by several factors, including storage temperature, humidity, and exposure to light. Cucumbers should be stored at temperatures between 7 and 10 °C, with a relative humidity of 90-95%, to maintain their freshness and quality. Exposure to light should also be minimized to prevent the formation of yellowing and decay. In conclusion, the preservation and packaging of cucumbers are essential to maintain their quality and extend their shelf life. Refrigeration, canning, pickling, and dehydration are common preservation methods that can be used to preserve cucumbers. The packaging materials used should be carefully selected to prevent moisture loss and physical damage. Proper storage conditions, such as temperature, humidity, and light exposure, should also be maintained to ensure the quality and freshness of cucumbers. Overall, proper preservation and packaging techniques can help reduce economic loss and provide consumers with high-quality cucumbers.

Keywords: cucumbers, preservation, packaging, shelf life

Procedia PDF Downloads 66
3985 Examination of Relationship between Internet Addiction and Cyber Bullying in Adolescents

Authors: Adem Peker, Yüksel Eroğlu, İsmail Ay

Abstract:

As the information and communication technologies have become embedded in everyday life of adolescents, both their possible benefits and risks to adolescents are being identified. The information and communication technologies provide opportunities for adolescents to connect with peers and to access to information. However, as with other social connections, users of information and communication devices have the potential to meet and interact with in harmful ways. One emerging example of such interaction is cyber bullying. Cyber bullying occurs when someone uses the information and communication technologies to harass or embarrass another person. Cyber bullying can take the form of malicious text messages and e-mails, spreading rumours, and excluding people from online groups. Cyber bullying has been linked to psychological problems for cyber bullies and victims. Therefore, it is important to determine how internet addiction contributes to cyber bullying. Building on this question, this study takes a closer look at the relationship between internet addiction and cyber bullying. For this purpose, in this study, based on descriptive relational model, it was hypothesized that loss of control, excessive desire to stay online, and negativity in social relationships, which are dimensions of internet addiction, would be associated positively with cyber bullying and victimization. Participants were 383 high school students (176 girls and 207 boys; mean age, 15.7 years). Internet addiction was measured by using Internet Addiction Scale. The Cyber Victim and Bullying Scale was utilized to measure cyber bullying and victimization. The scales were administered to the students in groups in the classrooms. In this study, stepwise regression analyses were utilized to examine the relationships between dimensions of internet addiction and cyber bullying and victimization. Before applying stepwise regression analysis, assumptions of regression were verified. According to stepwise regression analysis, cyber bullying was predicted by loss of control (β=.26, p<.001) and negativity in social relationships (β=.13, p<.001). These variables accounted for 9 % of the total variance, with the loss of control explaining the higher percentage (8 %). On the other hand, cyber victimization was predicted by loss of control (β=.19, p<.001) and negativity in social relationships (β=.12, p<.001). These variables altogether accounted for 8 % of the variance in cyber victimization, with the best predictor loss of control (7 % of the total variance). The results of this study demonstrated that, as expected, loss of control and negativity in social relationships predicted cyber bullying and victimization positively. However, excessive desire to stay online did not emerge a significant predictor of both cyberbullying and victimization. Consequently, this study would enhance our understanding of the predictors of cyber bullying and victimization since the results proposed that internet addiction is related with cyber bullying and victimization.

Keywords: cyber bullying, internet addiction, adolescents, regression

Procedia PDF Downloads 293
3984 Efficacy Of Tranexamic Acid On Blood Loss After Primary Total Hip Replacement : A Case-control Study In 154 Patients

Authors: Fedili Benamar, Belloulou Mohamed Lamine, Ouahes Hassane, Ghattas Samir

Abstract:

Introduction: Perioperative blood loss is a frequent cause of complications in total hip replacement (THR). The present prospective study assessed the efficacy of tranexamic acid (Exacyl(®)) in reducing blood loss in primary THR. Hypothesis: Tranexamic acid reduces blood loss in THR. Material and method: -This is a prospective randomized study on the effectiveness of Exacyl (tranexamic acid) in total hip replacement surgery performed on a standardized technique between 2019 and September 2022. -It involved 154 patients, of which 84 received a single injection of Exacyl (group 1) at a dosage of 10 mg/kg over 20 minutes during the perioperative period. -All patients received postoperative thromboprophylaxis with enoxaparin 0.4 ml subcutaneously. -All patients were admitted to the post-interventional intensive care unit for a duration of 24 hours for monitoring and pain management as per the service protocol. Results: 154 patients, of which 84 received a single injection of Exacyl (group 1) and 70 patients patients who did not receive Exacyl perioperatively : (Group 2 ) The average age is 57 +/- 15 years The distribution by gender was nearly equal with 56% male and 44% female; "The distribution according to the ASA score was as follows: 20.2% ASA1, 82.3% ASA2, and 17.5% ASA3. "There was a significant difference in the average volume of intraoperative and postoperative bleeding during the 48 hours." The average bleeding volume for group 1 (received Exacyl) was 614 ml +/- 228, while the average bleeding volume for group 2 was 729 +/- 300, with a chi-square test of 6.35 and a p-value < 0.01, which is highly significant. The ANOVA test showed an F-statistic of 7.11 and a p-value of 0.008. A Bartlett test revealed a chi-square of 6.35 and a p-value < 0.01." "In Group 1 (patients who received Exacyl), 73% had bleeding less than 750 ml (Group A), and 26% had bleeding exceeding 750 ml (Group B). In Group 2 (patients who did not receive Exacyl perioperatively), 52% had bleeding less than 750 ml (Group A), and 47% had bleeding exceeding 750 ml (Group B). "Thus, the use of Exacyl reduced perioperative bleeding and specifically decreased the risk of severe bleeding exceeding 750 ml by 43% with a relative risk (RR) of 1.37 and a p-value < 0.01. The transfusion rate was 1.19% in the population of Group 1 (Exacyl), whereas it was 10% in the population of Group 2 (no Exacyl). It can be stated that the use of Exacyl resulted in a reduction in perioperative blood transfusion with an RR of 0.1 and a p-value of 0.02. Conclusions: The use of Exacyl significantly reduced perioperative bleeding in this type of surgery.

Keywords: acid tranexamic, blood loss, anesthesia, total hip replacement, surgery

Procedia PDF Downloads 57
3983 Domain Adaptation Save Lives - Drowning Detection in Swimming Pool Scene Based on YOLOV8 Improved by Gaussian Poisson Generative Adversarial Network Augmentation

Authors: Simiao Ren, En Wei

Abstract:

Drowning is a significant safety issue worldwide, and a robust computer vision-based alert system can easily prevent such tragedies in swimming pools. However, due to domain shift caused by the visual gap (potentially due to lighting, indoor scene change, pool floor color etc.) between the training swimming pool and the test swimming pool, the robustness of such algorithms has been questionable. The annotation cost for labeling each new swimming pool is too expensive for mass adoption of such a technique. To address this issue, we propose a domain-aware data augmentation pipeline based on Gaussian Poisson Generative Adversarial Network (GP-GAN). Combined with YOLOv8, we demonstrate that such a domain adaptation technique can significantly improve the model performance (from 0.24 mAP to 0.82 mAP) on new test scenes. As the augmentation method only require background imagery from the new domain (no annotation needed), we believe this is a promising, practical route for preventing swimming pool drowning.

Keywords: computer vision, deep learning, YOLOv8, detection, swimming pool, drowning, domain adaptation, generative adversarial network, GAN, GP-GAN

Procedia PDF Downloads 70
3982 Analysis of Facial Expressions with Amazon Rekognition

Authors: Kashika P. H.

Abstract:

The development of computer vision systems has been greatly aided by the efficient and precise detection of images and videos. Although the ability to recognize and comprehend images is a strength of the human brain, employing technology to tackle this issue is exceedingly challenging. In the past few years, the use of Deep Learning algorithms to treat object detection has dramatically expanded. One of the key issues in the realm of image recognition is the recognition and detection of certain notable people from randomly acquired photographs. Face recognition uses a way to identify, assess, and compare faces for a variety of purposes, including user identification, user counting, and classification. With the aid of an accessible deep learning-based API, this article intends to recognize various faces of people and their facial descriptors more accurately. The purpose of this study is to locate suitable individuals and deliver accurate information about them by using the Amazon Rekognition system to identify a specific human from a vast image dataset. We have chosen the Amazon Rekognition system, which allows for more accurate face analysis, face comparison, and face search, to tackle this difficulty.

Keywords: Amazon rekognition, API, deep learning, computer vision, face detection, text detection

Procedia PDF Downloads 82
3981 Monitoring the Responses to Nociceptive Stimuli During General Anesthesia Based on Electroencephalographic Signals in Surgical Patients Undergoing General Anesthesia with Laryngeal Mask Airway (LMA)

Authors: Ofelia Loani Elvir Lazo, Roya Yumul, Sevan Komshian, Ruby Wang, Jun Tang

Abstract:

Background: Monitoring the anti-nociceptive drug effect is useful because a sudden and strong nociceptive stimulus may result in untoward autonomic responses and muscular reflex movements. Monitoring the anti-nociceptive effects of perioperative medications has long been desiredas a way to provide anesthesiologists information regarding a patient’s level of antinociception and preclude any untoward autonomic responses and reflexive muscular movements from painful stimuli intraoperatively.To this end, electroencephalogram (EEG) based tools includingBIS and qCON were designed to provide information about the depth of sedation whileqNOXwas produced to informon the degree of antinociception.The goal of this study was to compare the reliability of qCON/qNOX to BIS asspecific indicators of response to nociceptive stimulation. Methods: Sixty-two patients undergoing general anesthesia with LMA were included in this study. Institutional Review Board(IRB) approval was obtained, and informed consent was acquired prior to patient enrollment. Inclusion criteria included American Society of Anesthesiologists (ASA) class I-III, 18 to 80 years of age, and either gender. Exclusion criteria included the inability to consent. Withdrawal criteria included conversion to endotracheal tube and EEG malfunction. BIS and qCON/qNOX electrodes were simultaneously placed o62n all patientsprior to induction of anesthesia and were monitored throughout the case, along with other perioperative data, including patient response to noxious stimuli. All intraoperative decisions were made by the primary anesthesiologist without influence from qCON/qNOX. Student’s t-distribution, prediction probability (PK), and ANOVA were used to statistically compare the relative ability to detect nociceptive stimuli for each index. Twenty patients were included for the preliminary analysis. Results: A comparison of overall intraoperative BIS, qCON and qNOX indices demonstrated no significant difference between the three measures (N=62, p> 0.05). Meanwhile, index values for qNOX (62±18) were significantly higher than those for BIS (46±14) and qCON (54±19) immediately preceding patient responses to nociceptive stimulation in a preliminary analysis (N=20, * p= 0.0408). Notably, certain hemodynamic measurements demonstrated a significant increase in response to painful stimuli (MAP increased from74±13 mm Hg at baseline to 84± 18 mm Hg during noxious stimuli [p= 0.032] and HR from 76±12 BPM at baseline to 80±13BPM during noxious stimuli[p=0.078] respectively). Conclusion: In this observational study, BIS and qCON/qNOX provided comparable information on patients’ level of sedation throughout the course of an anesthetic. Meanwhile, increases in qNOX values demonstrated a superior correlation to an imminent response to stimulation relative to all other indices.

Keywords: antinociception, bispectral index (BIS), general anesthesia, laryngeal mask airway, qCON/qNOX

Procedia PDF Downloads 76
3980 Short-Term Physiological Evaluation of Augmented Reality System for Thanatophobia Psychotherapy

Authors: Kais Siala, Mohamed Kharrat, Mohamed Abid

Abstract:

Exposure therapies encourage patients to gradually begin facing their painful memories of the trauma in order to reduce fear and anxiety. In this context, virtual reality techniques are widely used for treatment of different kinds of phobia. The particular case of fear of death phobia (thanataphobia) is addressed in this paper. For this purpose, we propose to make a simulation of Near Death Experience (NDE) using augmented reality techniques. We propose in particular to simulate the Out-of-Body experience (OBE) which is the first step of a Near-Death-Experience (NDE). In this paper, we present technical aspects of this simulation as well as short-term impact in terms of physiological measures. The non-linear Poincéré plot is used to describe the difference in Heart Rate Variability between In-Body and Out-Of-Body conditions.

Keywords: Out-of-Body simulation, physiological measure, augmented reality, phobia psychotherapy, HRV, Poincaré plot

Procedia PDF Downloads 281
3979 Temperature Dependent Tribological Properties of Graphite

Authors: Pankaj Kumar Das, Niranjan Kumar, Prasun Chakraborti

Abstract:

Temperature dependent tribologiocal properties of nuclear grade turbostatic graphite were studied using 100Cr6 steel counterbody. High value of friction coefficient (0.25) and high wear loss was observed at room temperature and this value decreased to 0.1 at 150oC. Consequently, wear loss is also decreased. Such behavior is explained by oxidation/vaporization of graphite and water molecules. At room temperature, the adsorbed water in graphite does not decompose and effect of passivation mechanism does not work. However, at 150oC, the water decomposed into OH, atomic hydrogen and oxygen which efficiently passivates the carbon dangling bonds. This effect is known to decrease the energy of the contact and protect against abrasive wear.

Keywords: high temperature tribology, oxidation, turbostratic graphite, wear

Procedia PDF Downloads 482
3978 The Seller’s Sense: Buying-Selling Perspective Affects the Sensitivity to Expected-Value Differences

Authors: Taher Abofol, Eldad Yechiam, Thorsten Pachur

Abstract:

In four studies, we examined whether seller and buyers differ not only in subjective price levels for objects (i.e., the endowment effect) but also in their relative accuracy given objects varying in expected value. If, as has been proposed, sellers stand to accrue a more substantial loss than buyers do, then their pricing decisions should be more sensitive to expected-value differences between objects. This is implied by loss aversion due to the steeper slope of prospect theory’s value function for losses than for gains, as well as by loss attention account, which posits that losses increase the attention invested in a task. Both accounts suggest that losses increased sensitivity to relative values of different objects, which should result in better alignment of pricing decisions to the objective value of objects on the part of sellers. Under loss attention, this characteristic should only emerge under certain boundary conditions. In Study 1 a published dataset was reanalyzed, in which 152 participants indicated buying or selling prices for monetary lotteries with different expected values. Relative EV sensitivity was calculated for participants as the Spearman rank correlation between their pricing decisions for each of the lotteries and the lotteries' expected values. An ANOVA revealed a main effect of perspective (sellers versus buyers), F(1,150) = 85.3, p < .0001 with greater EV sensitivity for sellers. Study 2 examined the prediction (implied by loss attention) that the positive effect of losses on performance emerges particularly under conditions of time constraints. A published dataset was reanalyzed, where 84 participants were asked to provide selling and buying prices for monetary lotteries in three deliberations time conditions (5, 10, 15 seconds). As in Study 1, an ANOVA revealed greater EV sensitivity for sellers than for buyers, F(1,82) = 9.34, p = .003. Importantly, there was also an interaction of perspective by deliberation time. Post-hoc tests revealed that there were main effects of perspective both in the condition with 5s deliberation time, and in the condition with 10s deliberation time, but not in the 15s condition. Thus, sellers’ EV-sensitivity advantage disappeared with extended deliberation. Study 3 replicated the design of study 1 but administered the task three times to test if the effect decays with repeated presentation. The results showed that the difference between buyers and sellers’ EV sensitivity was replicated in repeated task presentations. Study 4 examined the loss attention prediction that EV-sensitivity differences can be eliminated by manipulations that reduce the differential attention investment of sellers and buyers. This was carried out by randomly mixing selling and buying trials for each participant. The results revealed no differences in EV sensitivity between selling and buying trials. The pattern of results is consistent with an attentional resource-based account of the differences between sellers and buyers. Thus, asking people to price, an object from a seller's perspective rather than the buyer's improves the relative accuracy of pricing decisions; subtle changes in the framing of one’s perspective in a trading negotiation may improve price accuracy.

Keywords: decision making, endowment effect, pricing, loss aversion, loss attention

Procedia PDF Downloads 325
3977 NSBS: Design of a Network Storage Backup System

Authors: Xinyan Zhang, Zhipeng Tan, Shan Fan

Abstract:

The first layer of defense against data loss is the backup data. This paper implements an agent-based network backup system used the backup, server-storage and server-backup agent these tripartite construction, and we realize the snapshot and hierarchical index in the NSBS. It realizes the control command and data flow separation, balances the system load, thereby improving the efficiency of the system backup and recovery. The test results show the agent-based network backup system can effectively improve the task-based concurrency, reasonably allocate network bandwidth, the system backup performance loss costs smaller and improves data recovery efficiency by 20%.

Keywords: agent, network backup system, three architecture model, NSBS

Procedia PDF Downloads 434
3976 Multi-Spectral Deep Learning Models for Forest Fire Detection

Authors: Smitha Haridasan, Zelalem Demissie, Atri Dutta, Ajita Rattani

Abstract:

Aided by the wind, all it takes is one ember and a few minutes to create a wildfire. Wildfires are growing in frequency and size due to climate change. Wildfires and its consequences are one of the major environmental concerns. Every year, millions of hectares of forests are destroyed over the world, causing mass destruction and human casualties. Thus early detection of wildfire becomes a critical component to mitigate this threat. Many computer vision-based techniques have been proposed for the early detection of forest fire using video surveillance. Several computer vision-based methods have been proposed to predict and detect forest fires at various spectrums, namely, RGB, HSV, and YCbCr. The aim of this paper is to propose a multi-spectral deep learning model that combines information from different spectrums at intermediate layers for accurate fire detection. A heterogeneous dataset assembled from publicly available datasets is used for model training and evaluation in this study. The experimental results show that multi-spectral deep learning models could obtain an improvement of about 4.68 % over those based on a single spectrum for fire detection.

Keywords: deep learning, forest fire detection, multi-spectral learning, natural hazard detection

Procedia PDF Downloads 208
3975 Experimental Investigation of the Performance and Emission Characteristics of a Diesel Engine Fuelled by Bio-Additives under Variable Loads

Authors: Faisal Mahroogi, Mahmoud Bady, Ahmed Alsisi

Abstract:

The Saudi Vision 2030 program is a government initiative aimed at increasing economic, social, and cultural diversification. Dedicated to clean energy, the Kingdom has been working on solutions such as the circular carbon economy (CCE) and diversifying its energy mix to address energy and climate challenges. With a goal of a Net Zero future by 2060, Saudi Arabia's Vision 2030 emphasizes sustainability. Vision 2030 approa ches today's energy and climate challenges responsibly and creatively as a model for a sustainable future. As per the Ambitions of the National Environment Strategy of the Saudi Ministry of Environment, Agriculture, and Water (MEWA), raising environmental compliance across all sectors and reducing pollution and adverse environmental impacts are critical focus areas.Therefore, the present paper introduces an experimental investigation of a diesel engine's performance and exhaust emissions operating with waste cooking oil (WCO) as a diesel additive. The engine type used is a one-cylinder natural-aspirated constant-speed direct-injection diesel engine. The main variables of the study were the load and the fuel type. The engine performance and emission characteristics were investigated when fueled with three blends. The first blend (D70B10W10DD10) is composed of 70% diesel, 10% butanol,10% WCO, and 10% diethyl ether. The second blend (D60B10W20DD10) is composed of 60% diesel, 10% butanol, 20% WCO, and 10% diethyl ether. The third blend (D50B10W30DD10) comprises 50% diesel, 10% butanol, 30% WCO, and 10% diethyl ether. The study results show that the engine emissions of carbon monoxide (CO) and nitrogen oxides (NOX) vary considerably with the fuel composition and applied load. Concerning engine performance, the cylinder pressure is sensitive to the load and fuel type variation.

Keywords: ICE, waste cooking oil, bio additives, butanol, combustion and emission characteristics

Procedia PDF Downloads 22
3974 Resisting Adversarial Assaults: A Model-Agnostic Autoencoder Solution

Authors: Massimo Miccoli, Luca Marangoni, Alberto Aniello Scaringi, Alessandro Marceddu, Alessandro Amicone

Abstract:

The susceptibility of deep neural networks (DNNs) to adversarial manipulations is a recognized challenge within the computer vision domain. Adversarial examples, crafted by adding subtle yet malicious alterations to benign images, exploit this vulnerability. Various defense strategies have been proposed to safeguard DNNs against such attacks, stemming from diverse research hypotheses. Building upon prior work, our approach involves the utilization of autoencoder models. Autoencoders, a type of neural network, are trained to learn representations of training data and reconstruct inputs from these representations, typically minimizing reconstruction errors like mean squared error (MSE). Our autoencoder was trained on a dataset of benign examples; learning features specific to them. Consequently, when presented with significantly perturbed adversarial examples, the autoencoder exhibited high reconstruction errors. The architecture of the autoencoder was tailored to the dimensions of the images under evaluation. We considered various image sizes, constructing models differently for 256x256 and 512x512 images. Moreover, the choice of the computer vision model is crucial, as most adversarial attacks are designed with specific AI structures in mind. To mitigate this, we proposed a method to replace image-specific dimensions with a structure independent of both dimensions and neural network models, thereby enhancing robustness. Our multi-modal autoencoder reconstructs the spectral representation of images across the red-green-blue (RGB) color channels. To validate our approach, we conducted experiments using diverse datasets and subjected them to adversarial attacks using models such as ResNet50 and ViT_L_16 from the torch vision library. The autoencoder extracted features used in a classification model, resulting in an MSE (RGB) of 0.014, a classification accuracy of 97.33%, and a precision of 99%.

Keywords: adversarial attacks, malicious images detector, binary classifier, multimodal transformer autoencoder

Procedia PDF Downloads 52
3973 F-VarNet: Fast Variational Network for MRI Reconstruction

Authors: Omer Cahana, Maya Herman, Ofer Levi

Abstract:

Magnetic resonance imaging (MRI) is a long medical scan that stems from a long acquisition time. This length is mainly due to the traditional sampling theorem, which defines a lower boundary for sampling. However, it is still possible to accelerate the scan by using a different approach, such as compress sensing (CS) or parallel imaging (PI). These two complementary methods can be combined to achieve a faster scan with high-fidelity imaging. In order to achieve that, two properties have to exist: i) the signal must be sparse under a known transform domain, ii) the sampling method must be incoherent. In addition, a nonlinear reconstruction algorithm needs to be applied to recover the signal. While the rapid advance in the deep learning (DL) field, which has demonstrated tremendous successes in various computer vision task’s, the field of MRI reconstruction is still in an early stage. In this paper, we present an extension of the state-of-the-art model in MRI reconstruction -VarNet. We utilize VarNet by using dilated convolution in different scales, which extends the receptive field to capture more contextual information. Moreover, we simplified the sensitivity map estimation (SME), for it holds many unnecessary layers for this task. Those improvements have shown significant decreases in computation costs as well as higher accuracy.

Keywords: MRI, deep learning, variational network, computer vision, compress sensing

Procedia PDF Downloads 129
3972 Optimal Planning of Dispatchable Distributed Generators for Power Loss Reduction in Unbalanced Distribution Networks

Authors: Mahmoud M. Othman, Y. G. Hegazy, A. Y. Abdelaziz

Abstract:

This paper proposes a novel heuristic algorithm that aims to determine the best size and location of distributed generators in unbalanced distribution networks. The proposed heuristic algorithm can deal with the planning cases where power loss is to be optimized without violating the system practical constraints. The distributed generation units in the proposed algorithm is modeled as voltage controlled node with the flexibility to be converted to constant power factor node in case of reactive power limit violation. The proposed algorithm is implemented in MATLAB and tested on the IEEE 37 -node feeder. The results obtained show the effectiveness of the proposed algorithm.

Keywords: distributed generation, heuristic approach, optimization, planning

Procedia PDF Downloads 497
3971 Hot Carrier Photocurrent as a Candidate for an Intrinsic Loss in a Single Junction Solar Cell

Authors: Jonas Gradauskas, Oleksandr Masalskyi, Ihor Zharchenko

Abstract:

The advancement in improving the efficiency of conventional solar cells toward the Shockley-Queisser limit seems to be slowing down or reaching a point of saturation. The challenges hindering the reduction of this efficiency gap can be categorized into extrinsic and intrinsic losses, with the former being theoretically avoidable. Among the five intrinsic losses, two — the below-Eg loss (resulting from non-absorption of photons with energy below the semiconductor bandgap) and thermalization loss —contribute to approximately 55% of the overall lost fraction of solar radiation at energy bandgap values corresponding to silicon and gallium arsenide. Efforts to minimize the disparity between theoretically predicted and experimentally achieved efficiencies in solar cells necessitate the integration of innovative physical concepts. Hot carriers (HC) present a contemporary approach to addressing this challenge. The significance of hot carriers in photovoltaics is not fully understood. Although their excessive energy is thought to indirectly impact a cell's performance through thermalization loss — where the excess energy heats the lattice, leading to efficiency loss — evidence suggests the presence of hot carriers in solar cells. Despite their exceptionally brief lifespan, tangible benefits arise from their existence. The study highlights direct experimental evidence of hot carrier effect induced by both below- and above-bandgap radiation in a singlejunction solar cell. Photocurrent flowing across silicon and GaAs p-n junctions is analyzed. The photoresponse consists, on the whole, of three components caused by electron-hole pair generation, hot carriers, and lattice heating. The last two components counteract the conventional electron-hole generation-caused current required for successful solar cell operation. Also, a model of the temperature coefficient of the voltage change of the current–voltage characteristic is used to obtain the hot carrier temperature. The distribution of cold and hot carriers is analyzed with regard to the potential barrier height of the p-n junction. These discoveries contribute to a better understanding of hot carrier phenomena in photovoltaic devices and are likely to prompt a reevaluation of intrinsic losses in solar cells.

Keywords: solar cell, hot carriers, intrinsic losses, efficiency, photocurrent

Procedia PDF Downloads 43
3970 Impact of Massive Weight Loss Body Contouring Surgery in the Patient’s Quality of Life

Authors: Maria Albuquerque, Miguel Matias, Ângelo Sá, Juliana Sousa, Maria Manuel Mouzinho

Abstract:

Obesity is a frequent disease in Portugal. The surgical treatment is very effective and has an indication when there is a failure of the medical treatment. Although massive weight loss is associated with considerable health gains, these patients are characterized by a variable degree of dermolipodistrophy. In some cases, there is even the development of physical symptoms such as intertriginous, and some degree of psychological distress is present. In almost all cases, a desire for a better body contour, which inhibits some aspects of social life, is a fact. A prospective study was made to access the impact of body contouring surgery in the quality of life of patients who underwent a massive weight lost correction surgical procedure at Centro Hospitalar de Lisboa Central between January 2020 and December 2021. The patients were submitted to the Body Q subjective questionnaire adapted for the Portuguese language and accessed for the following categories: Anguish with Appearance, Contempt with Body Image, Satisfaction with the Abdomen, and Overall Satisfaction with the Body. The questionnaire was repeated at the 6 months mark. A total of 80 patients were sampled. The sex distribution was 79 female and 1 male. The median BMI index before surgery was inferior to 28%. The pre operatory questionnaire showed high scores for Anguish with Appearance and low scores for the body image self-evaluation. Overall, there was an improvement of at least 50% in all the evaluated scores. Additionally, a correlation was found between abdominoplasty and the contempt with body image and satisfaction with the abdomen (p-value <0.05). Massive weight loss is associated with important body deformities that have a significant impact on the patient’s personal and social life. Body contouring surgery is then vital for these patients as it implicates major aesthetic and functional benefits.

Keywords: abdominoplasty, cruroplasty, obesity, massive weight loss

Procedia PDF Downloads 133
3969 The Asymmetric Proximal Support Vector Machine Based on Multitask Learning for Classification

Authors: Qing Wu, Fei-Yan Li, Heng-Chang Zhang

Abstract:

Multitask learning support vector machines (SVMs) have recently attracted increasing research attention. Given several related tasks, the single-task learning methods trains each task separately and ignore the inner cross-relationship among tasks. However, multitask learning can capture the correlation information among tasks and achieve better performance by training all tasks simultaneously. In addition, the asymmetric squared loss function can better improve the generalization ability of the models on the most asymmetric distributed data. In this paper, we first make two assumptions on the relatedness among tasks and propose two multitask learning proximal support vector machine algorithms, named MTL-a-PSVM and EMTL-a-PSVM, respectively. MTL-a-PSVM seeks a trade-off between the maximum expectile distance for each task model and the closeness of each task model to the general model. As an extension of the MTL-a-PSVM, EMTL-a-PSVM can select appropriate kernel functions for shared information and private information. Besides, two corresponding special cases named MTL-PSVM and EMTLPSVM are proposed by analyzing the asymmetric squared loss function, which can be easily implemented by solving linear systems. Experimental analysis of three classification datasets demonstrates the effectiveness and superiority of our proposed multitask learning algorithms.

Keywords: multitask learning, asymmetric squared loss, EMTL-a-PSVM, classification

Procedia PDF Downloads 91
3968 Effect of DG Installation in Distribution System for Voltage Monitoring Scheme

Authors: S. R. A. Rahim, I. Musirin, M. M. Othman, M. H. Hussain

Abstract:

Loss minimization is a long progressing issue mainly in distribution system. Nevertheless, its effect led to temperature rise due to significant voltage drop through the distribution line. Thus, compensation scheme should be proper scheduled in the attempt to alleviate the voltage drop phenomenon. Distributed generation has been profoundly known for voltage profile improvement provided that over-compensation or under-compensation phenomena are avoided. This paper addresses the issue of voltage improvement through different type DG installation. In ensuring optimal sizing and location of the DGs, predeveloped EMEFA technique was made to be used for this purpose. Incremental loading condition subjected to the system is the concern such that it is beneficial to the power system operator.

Keywords: distributed generation, EMEFA, power loss, voltage profile

Procedia PDF Downloads 343
3967 Mental Health Difficulties and Abnormal Feeding Regulation during a Crisis: A Mixed-Methods Approach

Authors: Leja Salciute

Abstract:

Mental health difficulties are one of the reasons for abnormal feeding behaviour. This is especially evident in a crisis situation. Abnormal feeding behaviour occurs when individuals use food as a method to provide relief for these negative emotions. The study aimed to discover an association between emotional regulation, mental health difficulties and disruption in feeding behaviours in the UK in times of crisis. A mixed-methods design was used. Abnormal feeding behaviour was measured using the Binge Eating Disorder Screener-7, SCOFF scale, Crisis impact scale, Difficulties in Emotion Regulation Scale and demographics. The sample comprised 342 participants with a history of excessive overeating. The participants (male= 198, female= 141 and other= 3) came from the general population and they were aged 16 and over. Participants ranged in age from 16 to 89. Findings from the survey concluded that difficulties with emotion regulation were found to be associated with abnormal feeding behaviours. Mental health difficulties correlated significantly with changes in individuals’ lives, such as work or routines. Individuals differed in their abnormal feeding behaviour in terms of their age, that is, younger individuals showed less struggle with their eating patterns while older individuals faced greater struggles with their abnormal feeding behaviour. Emotion regulation significantly influenced abnormal feeding behaviour. Results from qualitative data suggest four common themes that were identified: demonstration of gratitude, negative emotions, disruptions to social life, and financial loss. For example, participants developed and gained an awareness of being grateful for the simple things in life even when participants experienced hardships. The results also suggested that emotional eating acted like a sedative that allowed the participant to run away from their painful reality. Crisis situation negatively affected relationships among participants and induced negativity related to social interaction. Finally, the respondents highlighted that the presence of uncertainty made it hard to plan ahead and look forward to the future. Although respondents experienced negative emotions and financial losses, some of them still managed to allocate time for themselves and enjoy their time off during crisis. However, majority of respondents referred to their inability to control their external circumstances and turned to and relied upon food overconsumption instead. This had a negative effect on their mental health and presented disruptions in feeding behaviour. It was recommended for individuals in times of crisis to seek psychological support in the form of Cognitive Behavioural Therapy (CBT).

Keywords: binge eating, maladaptive eating behaviours, mental health, negative emotions in crisis

Procedia PDF Downloads 51
3966 Impact of Marketing towards Behavior Intention

Authors: Sathyamangalam Rangasamy Guru Prasath

Abstract:

Due to the increasing homogeneity in product offerings, the attendant services provided are emerging as a key differentiator in the mind of the consumers. Services marketing are a sub field of marketing which covers the marketing of both goods and services. Service marketing differs from product marketing due to the face that services are intangible and typically require personal interaction with the customer. Relationships are a key factor when it comes to the marketing of services. The role of interpersonal relationships distinguishes service and product marketing in strategic vision and organizational considerations. This paper explores some of the trends in service marketing as they relate to strategic vision, operational and organizational changes, and marketing tactics. The presence of the customer in the service facility means that capacity management becomes an important driver of the firm’s profitability service marketing is a process from the organization’s point of view, but an experience from the customer’s perspective. The quality of the experience is a function of the careful design of customer service processes, adoption of standardized procedures, rigorous management of service quality, high standards of training and automation. Services marketing helps to ensure that these processes are designed from the customer’s perspective. Services marketing includes customer loyalty, managing relationships, complaint handling, improving service quality and productivity of service operations, and how to become a service leader in your industry.

Keywords: customer perspective, product marketing, service marketing, rigorous management

Procedia PDF Downloads 348