Search results for: contextual toxicity detection
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 4646

Search results for: contextual toxicity detection

4616 Intrusion Detection Techniques in NaaS in the Cloud: A Review

Authors: Rashid Mahmood

Abstract:

The network as a service (NaaS) usage has been well-known from the last few years in the many applications, like mission critical applications. In the NaaS, prevention method is not adequate as the security concerned, so the detection method should be added to the security issues in NaaS. The authentication and encryption are considered the first solution of the NaaS problem whereas now these are not sufficient as NaaS use is increasing. In this paper, we are going to present the concept of intrusion detection and then survey some of major intrusion detection techniques in NaaS and aim to compare in some important fields.

Keywords: IDS, cloud, naas, detection

Procedia PDF Downloads 288
4615 A Context Aware Mobile Learning System with a Cognitive Recommendation Engine

Authors: Jalal Maqbool, Gyu Myoung Lee

Abstract:

Using smart devices for context aware mobile learning is becoming increasingly popular. This has led to mobile learning technology becoming an indispensable part of today’s learning environment and platforms. However, some fundamental issues remain - namely, mobile learning still lacks the ability to truly understand human reaction and user behaviour. This is due to the fact that current mobile learning systems are passive and not aware of learners’ changing contextual situations. They rely on static information about mobile learners. In addition, current mobile learning platforms lack the capability to incorporate dynamic contextual situations into learners’ preferences. Thus, this thesis aims to address these issues highlighted by designing a context aware framework which is able to sense learner’s contextual situations, handle data dynamically, and which can use contextual information to suggest bespoke learning content according to a learner’s preferences. This is to be underpinned by a robust recommendation system, which has the capability to perform these functions, thus providing learners with a truly context-aware mobile learning experience, delivering learning contents using smart devices and adapting to learning preferences as and when it is required. In addition, part of designing an algorithm for the recommendation engine has to be based on learner and application needs, personal characteristics and circumstances, as well as being able to comprehend human cognitive processes which would enable the technology to interact effectively and deliver mobile learning content which is relevant, according to the learner’s contextual situations. The concept of this proposed project is to provide a new method of smart learning, based on a capable recommendation engine for providing an intuitive mobile learning model based on learner actions.

Keywords: aware, context, learning, mobile

Procedia PDF Downloads 223
4614 Social Entrepreneurship through an Institutional Perspective: A Case Study of Women Social Entrepreneurs from Peshawar, Pakistan

Authors: Madiha Gohar, Ayesha Abrar

Abstract:

Social entrepreneurship has gained currency in the field of entrepreneurship, however, the theoretical underpinning and the contextual influences on the creation and operations of social enterprises are still in infancy. Contextual influences on entrepreneurial endeavors of women have been researched, and it is assumed that like commercial entrepreneurship, some socio-cultural factors are most suitable for the creation of women social enterprises. This research is an effort to explore the contextual influences on women social enterprises using institutional theory as the main conceptual framework. A case study analysis was used to assess the formal and informal institutional influences on women social entrepreneurs and their enterprises. The personal accounts of women social entrepreneurs reveal the importance of formal and informal institutions; however, they advocate greater consideration of informal institutions for their entrepreneurial endeavors.

Keywords: case study, institutional theory, women social entrepreneurship, Pakistan

Procedia PDF Downloads 159
4613 Determination of Acid Volatile Sulfides–Simultaneously Extracted Metal Relationship and Toxicity in Contaminated Sediment Layer in Mid-Black Sea Coasts

Authors: Arife Simsek, Gulfem Bakan

Abstract:

Sediment refers to the accumulation of varying amounts of sediment material in natural waters and the formation of bottom sludge. Sediments are the most important sources of pollutants as well as important future sources and carriers of pollutants. The accumulation of pollutants in sediments can cause serious environmental problems for the surrounding areas. Heavy metals (such as Cr, Cd, Al, Pb, Cu, Al, Zn) disrupt the water quality, affect the useful use of sediment, affect the ecosystem and have a toxic effect on the life of the sediment layer. This effect, which accumulates in the aquatic organisms, can enter the human body with the food chain and affect health seriously. Potential metal toxicity can be determined by comparing acid volatile sulfides (AVS) – simultaneously extracted metal (SEM) ratio in anoxic sediments to determine the effect of metals. Determination of the concentration of SEM and AVS is useful in screening sediments for potential toxicity due to the high metal concentration. In the case of SEM/AVS < 0 (anoxic sediment); in terms of AVS biomass production, its toxicity can be controlled. No toxic effects may be observed when SEM / AVS < 0. SEM / AVS > 0 (in the case of oxic sediment); metals with sensitive fraction such as Cu, As, Ag, Zn are stored. In this study, AVS and SEM measurements of sediment samples collected from five different points in the district of Tekkeköy in Samsun province were performed. The SEM - AVS ratio was greater than 0 in all samples. Therefore, it is necessary to test the toxicity against the risks that may occur in the ecosystem.

Keywords: AVS-SEM, Black Sea, heavy metal, sediment, toxicity

Procedia PDF Downloads 112
4612 Syndrome of Irreversible Lithium-Effectuated Neurotoxicity: Case Report and Review of Literature

Authors: David J. Thomson, Joshua C. J. Chew

Abstract:

Background: Syndrome of Irreversible Lithium-Effectuated Neurotoxicity (SILENT) is a rare complication of lithium toxicity that typically causes irreversible cerebellar dysfunction. These patients may require hemodialysis and extensive supports in the intensive care. Methods: A review was performed on the available literature of SILENT with a focus on current pathophysiological hypotheses and advances in treatment. Articles were restricted to the English language. Results: Although the exact mechanism is unclear, CNS demyelination, especially in the cerebellum, was seen on the brain biopsies of a proportion of patients. There is no definitive management of SILENT but instead current management is focused on primary and tertiary prevention – detection of those at risk, and rehabilitation post onset of neurological deficits. Conclusions: This review draws conclusions from a limited amount of available literature, most of which are isolated case reports. Greater awareness of SILENT and further investigation into the risk factors and pathogenesis are required so this serious and irreversible syndrome may be avoided.

Keywords: lithium toxicity, pathogenesis, SILENT, syndrome of irreversible lithium-effectuated neurotoxicity

Procedia PDF Downloads 472
4611 Securing Web Servers by the Intrusion Detection System (IDS)

Authors: Yousef Farhaoui

Abstract:

An IDS is a tool which is used to improve the level of security. We present in this paper different architectures of IDS. We will also discuss measures that define the effectiveness of IDS and the very recent works of standardization and homogenization of IDS. At the end, we propose a new model of IDS called BiIDS (IDS Based on the two principles of detection) for securing web servers and applications by the Intrusion Detection System (IDS).

Keywords: intrusion detection, architectures, characteristic, tools, security, web server

Procedia PDF Downloads 392
4610 DNA Methylation 6mA and Histone Methylation Involved in Multi-/Trans-Generational Reproductive Effects in Caenorhabditis elegans Induced by Atrazine

Authors: Jiechen Yin, Xiang Hong, Ran Liu

Abstract:

Atrazine (ATR), a widely used triazine herbicide, is an environmental endocrine disruptor that can cause health problems. However, whether there are multi/trans-generational reproductive impacts of ATR have not been studied to our best knowledge. Therefore, in this study, Caenorhabditis elegans was used as a preferable model organism to identify the multi/trans-generational reproductive toxicity of ATR. L1 larvae were exposed to different concentrations (0.0004–40 mg/L) of ATR for 48 h. Successive generations (F1 to F5) were fed without ATR and consecutive exposure. The results showed that ATR exposure during P0 decreased fecundity, including a reduction in fertilized eggs, oocytes, and ovulation rate, delayed gonadal development, and decreased the relative area of the gonad arm and germ cell number. Furthermore, continuous ATR exposure (P0–F5) causes a significant increase in reproductive toxicity in subsequent generations, although no significant toxicity occurred in the P0 generation after exposure to environmental-related concentrations, suggesting that ATR exposure might have cumulative effects. Likewise, parental exposure to ATR caused transgenerational toxicity impairments. Interestingly, reproductive toxicity not development toxicity was transmitted to several generations (F1–F4), and the F2 generation showed the most notable changes. QRT-PCR results showed that genes related to DNA methylation 6mA (damt-1, nmad-1) and histone H3 methylation (mes-4, met-2, set-25, set-2, and utx-1) can also be passed on to offspring. The function of H3K4 and H3K9 methylation were explored by using loss-of-function mutants for set-2, set-25, and met-2. Transmissible reproductive toxicity was absent in met-2(n4256), set-2(ok952), and set-25(n5021) mutants, which suggests that the histone methyltransferases H3K4 and H3K9 activity are indispensable for the transgenerational effect of ATR. Finally, the downstream genes of DNA methylation and histone H3 methylation were determined. ATR upregulated the expression of ZC317.7, hsp-6, and hsp-60. Mitochondrial stress in parental generation dependent transcription 6mA modifiers may establish these epigenetic marks in progeny.

Keywords: ATR, Caenorhabditis elegans, multi-/trans-generation, reproductive toxicity

Procedia PDF Downloads 42
4609 Comparison between Approaches Used in Two Walk About Projects

Authors: Derek O Reilly, Piotr Milczarski, Shane Dowdall, Artur Hłobaż, Krzysztof Podlaski, Hiram Bollaert

Abstract:

Learning through creation of contextual games is a very promising way/tool for interdisciplinary and international group projects. During 2013 and 2014 we took part and organized two intensive students projects in different conditions. The projects enrolled 68 students and 12 mentors from 5 countries. In the paper we want to share our experience how to strengthen the chances to succeed in short (12-15 days long) student projects. In our case almost all teams prepared working prototype and the results were highly appreciated by external experts.

Keywords: contextual games, mobile games, GGULIVRR, walkabout, Erasmus intensive programme

Procedia PDF Downloads 477
4608 Suggestion for Malware Detection Agent Considering Network Environment

Authors: Ji-Hoon Hong, Dong-Hee Kim, Nam-Uk Kim, Tai-Myoung Chung

Abstract:

Smartphone users are increasing rapidly. Accordingly, many companies are running BYOD (Bring Your Own Device: Policies to bring private-smartphones to the company) policy to increase work efficiency. However, smartphones are always under the threat of malware, thus the company network that is connected smartphone is exposed to serious risks. Most smartphone malware detection techniques are to perform an independent detection (perform the detection of a single target application). In this paper, we analyzed a variety of intrusion detection techniques. Based on the results of analysis propose an agent using the network IDS.

Keywords: android malware detection, software-defined network, interaction environment, android malware detection, software-defined network, interaction environment

Procedia PDF Downloads 407
4607 Improved Skin Detection Using Colour Space and Texture

Authors: Medjram Sofiane, Babahenini Mohamed Chaouki, Mohamed Benali Yamina

Abstract:

Skin detection is an important task for computer vision systems. A good method for skin detection means a good and successful result of the system. The colour is a good descriptor that allows us to detect skin colour in the images, but because of lightings effects and objects that have a similar colour skin, skin detection becomes difficult. In this paper, we proposed a method using the YCbCr colour space for skin detection and lighting effects elimination, then we use the information of texture to eliminate the false regions detected by the YCbCr colour skin model.

Keywords: skin detection, YCbCr, GLCM, texture, human skin

Procedia PDF Downloads 426
4606 Protective Effect of Protocatechuic Acid Alone and in Combination with Ascorbic Acid in Aniline Hydrochloride Induced Spleen Toxicity in Rats

Authors: Aman Upaganlawar, Upasana Khairnar, Chandrashekhar Upasani

Abstract:

The present study was designed to evaluate the protective effects of protocatechuic acid alone and in combination with ascorbic acid in aniline hydrochloride-induced spleen toxicity in rats. Male Wistar rats of either sex (200-250g) were used and divided into different groups. Spleen toxicity was induced by aniline hydrochloride (100 ppm) in drinking water for 28 days. Treatment group received protocatechuic acid (40 mg/kg/day, p.o), ascorbic acid (40 mg/kg/day, p.o), and combination of protocatechuic acid (20 mg/kg/day, p.o) and ascorbic acid (20 mg/kg/day, p.o) followed by aniline hydrochloride. At the end of treatment period, serum and tissue parameters were evaluated. Rats supplemented with aniline hydrochloride showed a significant alteration in body weight, spleen weight, feed consumption, water intake, hematological parameters (Hemoglobin content, Red Blood Cells, White Blood Cells and Total iron content), tissue parameters (Lipid peroxidation, Reduced glutathione, Nitric oxide content) compared to control group. Histopathology of aniline hydrochloride-induced spleen showed significant damage compared to control rats. Treatment with Protocatechuic acid along with ascorbic acid showed better protection as compared to protocatechuic acid or ascorbic acid alone in aniline hydrochloride-induced spleen toxicity. In conclusion Treatment with protocatechuic acid and ascorbic acid in combination showed significant protection in aniline hydrochloride-induced splenic toxicity in rats.

Keywords: aniline, spleen toxicity, protocatechuic acid, ascorbic acid, antioxidants

Procedia PDF Downloads 331
4605 Toxicity Identification and Evaluation for the Effluent from Seawater Desalination Facility in Korea Using D. magna and V. fischeri

Authors: Sung Jong Lee, Hong Joo Ha, Chun Sang Hong

Abstract:

In recent years, the interests on the impacts of industrial wastewater on aquatic ecosystem have increased with concern about ecosystem protection and human health. Whole effluent toxicity tests are used to monitor toxicity by unknown toxic chemicals as well as conventional pollutants from industrial effluent discharges. This study describes the application of TIE (toxicity identification evaluation) procedures to an acutely toxic effluent from a Seawater desalination facility in industrial complex which was toxic to Daphnia magna. In TIE phase I (characterization step), the toxic effects by heavy metals, organic compounds, oxidants, volatile organic compounds, suspended solids and ammonia were screened and revealed that the source of toxicity is far from these toxicants group. Chemical analysis (TIE phase II) on TDS showed that the concentration of chloride ion (24,215 ~ 29,562 mg/L) was substantially higher than that predicted from EC50 for D. magna. In confirmation step (TIE phase III), chloride ion was demonstrated to be main toxicant in this effluent by the spiking approach, species sensitivity approach, and deletion approach. Calcium, potassium, magnesium, sodium, fluorine, sulfate ion concentration was not shown toxicity from D. magna. Finally, we concluded that chloride was the most contributing toxicant in the waste water treatment plant. Further research activities are needed for technical support of toxicity identification and evaluation on the various types of wastewater treatment plant discharge in Korea. Acknowledgement: This research was supported by a grant (16IFIP-B089911-03) from Plant Research Program funded by Ministry of Land, Infrastructure and Transport of Korean government.

Keywords: TIE, D. magna, V. fischeri, seawater desalination facility

Procedia PDF Downloads 235
4604 Real-Time Detection of Space Manipulator Self-Collision

Authors: Zhang Xiaodong, Tang Zixin, Liu Xin

Abstract:

In order to avoid self-collision of space manipulators during operation process, a real-time detection method is proposed in this paper. The manipulator is fitted into a cylinder enveloping surface, and then the detection algorithm of collision between cylinders is analyzed. The collision model of space manipulator self-links can be detected by using this algorithm in real-time detection during the operation process. To ensure security of the operation, a safety threshold is designed. The simulation and experiment results verify the effectiveness of the proposed algorithm for a 7-DOF space manipulator.

Keywords: space manipulator, collision detection, self-collision, the real-time collision detection

Procedia PDF Downloads 436
4603 Iris Detection on RGB Image for Controlling Side Mirror

Authors: Norzalina Othman, Nurul Na’imy Wan, Azliza Mohd Rusli, Wan Noor Syahirah Meor Idris

Abstract:

Iris detection is a process where the position of the eyes is extracted from the face images. It is a current method used for many applications such as for security purpose and drowsiness detection. This paper proposes the use of eyes detection in controlling side mirror of motor vehicles. The eyes detection method aims to make driver easy to adjust the side mirrors automatically. The system will determine the midpoint coordinate of eyes detection on RGB (color) image and the input signal from y-coordinate will send it to controller in order to rotate the angle of side mirror on vehicle. The eye position was cropped and the coordinate of midpoint was successfully detected from the circle of iris detection using Viola Jones detection and circular Hough transform methods on RGB image. The coordinate of midpoint from the experiment are tested using controller to determine the angle of rotation on the side mirrors.

Keywords: iris detection, midpoint coordinates, RGB images, side mirror

Procedia PDF Downloads 399
4602 Antibacterial Activities, Chemical Constitutes and Acute Toxicity of Peganum Harmala L. Essential Oil

Authors: Samy Selim

Abstract:

Natural products are still major sources of innovative therapeutic agents for various conditions, including infectious diseases. Peganum harmala L. oil had wide range uses as traditional medicinal plants. The current study was designed to evaluate the antibacterial activity of P. harmala essential oil. The chemical constitutes and toxicity of these oils was also determined to obtain further information on the correlation between the chemical contents and antibacterial activity. The antibacterial effect of the essential oils of P. harmala oil was studied against some foodborne pathogenic bacteria species. The oil of plant was subjected to gas chromatography-mass spectrometry (GC/MS). The impact of oils administration on the change in rate of weight gain and complete blood picture in hamsters were investigated. P. harmala oil had strong antibacterial effect against bacterial species especially at minimum inhibitory concentration (MIC) less than 75.0 μg/ml. From the oil of P. harmala, forty one compounds were identified, and the major constituent was 1-hexyl-2-nitrocyclohexane (9.07%). Acute toxicity test was performed on hamsters and showed complete survival after 14 days, and there were no toxicity symptoms occurred. This study demonstrated that these essential oils seemed to be destitute of toxic effect which could compromise the medicinal use of these plants in folk medicine.

Keywords: analysis mass spectrometry, antibacterial activities, acute toxicity, chemical constitutes, gas chromatography, weight gain, Peganum harmala

Procedia PDF Downloads 462
4601 Invasion of Pectinatella magnifica in Freshwater Resources of the Czech Republic

Authors: J. Pazourek, K. Šmejkal, P. Kollár, J. Rajchard, J. Šinko, Z. Balounová, E. Vlková, H. Salmonová

Abstract:

Pectinatella magnifica (Leidy, 1851) is an invasive freshwater animal that lives in colonies. A colony of Pectinatella magnifica (a gelatinous blob) can be up to several feet in diameter large and under favorable conditions it exhibits an extreme growth rate. Recently European countries around rivers of Elbe, Oder, Danube, Rhine and Vltava have confirmed invasion of Pectinatella magnifica, including freshwater reservoirs in South Bohemia (Czech Republic). Our project (Czech Science Foundation, GAČR P503/12/0337) is focused onto biology and chemistry of Pectinatella magnifica. We monitor the organism occurrence in selected South Bohemia ponds and sandpits during the last years, collecting information about physical properties of surrounding water, and sampling the colonies for various analyses (classification, maps of secondary metabolites, toxicity tests). Because the gelatinous matrix is during the colony lifetime also a host for algae, bacteria and cyanobacteria (co-habitants), in this contribution, we also applied a high performance liquid chromatography (HPLC) method for determination of potentially present cyanobacterial toxins (microcystin-LR, microcystin-RR, nodularin). Results from the last 3-year monitoring show that these toxins are under limit of detection (LOD), so that they do not represent a danger yet. The final goal of our study is to assess toxicity risks related to fresh water resources invaded by Pectinatella magnifica, and to understand the process of invasion, which can enable to control it.

Keywords: cyanobacteria, fresh water resources, Pectinatella magnifica invasion, toxicity monitoring

Procedia PDF Downloads 216
4600 Automatic Vehicle Detection Using Circular Synthetic Aperture Radar Image

Authors: Leping Chen, Daoxiang An, Xiaotao Huang

Abstract:

Automatic vehicle detection using synthetic aperture radar (SAR) image has been widely researched, as well as using optical remote sensing images. However, most researches treat the detection as an independent problem, failing to make full use of SAR data information. In circular SAR (CSAR), the two long borders of vehicle will shrink if the imaging surface is set higher than the reference one. Based on above variance, an automatic vehicle detection using CSAR image is proposed to enhance detection ability under complex environment, such as vehicles’ closely packing, which confuses the detector. The detection method uses the multiple images generated by different height plane to obtain an energy-concentrated image for detecting and then uses the maximally stable extremal regions method (MSER) to detect vehicles. A result of vehicles’ detection is given to verify the effectiveness and correctness of proposed method.

Keywords: circular SAR, vehicle detection, automatic, imaging

Procedia PDF Downloads 341
4599 Adaptive CFAR Analysis for Non-Gaussian Distribution

Authors: Bouchemha Amel, Chachoui Takieddine, H. Maalem

Abstract:

Automatic detection of targets in a modern communication system RADAR is based primarily on the concept of adaptive CFAR detector. To have an effective detection, we must minimize the influence of disturbances due to the clutter. The detection algorithm adapts the CFAR detection threshold which is proportional to the average power of the clutter, maintaining a constant probability of false alarm. In this article, we analyze the performance of two variants of adaptive algorithms CA-CFAR and OS-CFAR and we compare the thresholds of these detectors in the marine environment (no-Gaussian) with a Weibull distribution.

Keywords: CFAR, threshold, clutter, distribution, Weibull, detection

Procedia PDF Downloads 555
4598 Intrusion Detection Techniques in Mobile Adhoc Networks: A Review

Authors: Rashid Mahmood, Muhammad Junaid Sarwar

Abstract:

Mobile ad hoc networks (MANETs) use has been well-known from the last few years in the many applications, like mission critical applications. In the (MANETS) prevention method is not adequate as the security concerned, so the detection method should be added to the security issues in (MANETs). The authentication and encryption is considered the first solution of the MANETs problem where as now these are not sufficient as MANET use is increasing. In this paper we are going to present the concept of intrusion detection and then survey some of major intrusion detection techniques in MANET and aim to comparing in some important fields.

Keywords: MANET, IDS, intrusions, signature, detection, prevention

Procedia PDF Downloads 349
4597 Fast Approximate Bayesian Contextual Cold Start Learning (FAB-COST)

Authors: Jack R. McKenzie, Peter A. Appleby, Thomas House, Neil Walton

Abstract:

Cold-start is a notoriously difficult problem which can occur in recommendation systems, and arises when there is insufficient information to draw inferences for users or items. To address this challenge, a contextual bandit algorithm – the Fast Approximate Bayesian Contextual Cold Start Learning algorithm (FAB-COST) – is proposed, which is designed to provide improved accuracy compared to the traditionally used Laplace approximation in the logistic contextual bandit, while controlling both algorithmic complexity and computational cost. To this end, FAB-COST uses a combination of two moment projection variational methods: Expectation Propagation (EP), which performs well at the cold start, but becomes slow as the amount of data increases; and Assumed Density Filtering (ADF), which has slower growth of computational cost with data size but requires more data to obtain an acceptable level of accuracy. By switching from EP to ADF when the dataset becomes large, it is able to exploit their complementary strengths. The empirical justification for FAB-COST is presented, and systematically compared to other approaches on simulated data. In a benchmark against the Laplace approximation on real data consisting of over 670, 000 impressions from autotrader.co.uk, FAB-COST demonstrates at one point increase of over 16% in user clicks. On the basis of these results, it is argued that FAB-COST is likely to be an attractive approach to cold-start recommendation systems in a variety of contexts.

Keywords: cold-start learning, expectation propagation, multi-armed bandits, Thompson Sampling, variational inference

Procedia PDF Downloads 90
4596 In silico and Toxicity Study of the Combination of Roselle (Hibiscus sabdariffa L.) and Garlic (Allium sativum L.) as Antihypertensive Herbs

Authors: Doni Dermawan

Abstract:

Hypertension is a disease with a high prevalence in Indonesia. The prevalence of hypertension in Indonesia is based on the Basic Health Research (Riskesdas) in 2013 which amounted to 25.8%. Medicinal plants have been widely used to treat hypertension including roselle (Hibiscus sabdariffa L.) and garlic (Allium sativum L.) by a mechanism as angiotensin converting enzyme (ACE) inhibitor. The purpose of this research is to analyze the in silico (molecular studies) of pharmacological effects and toxicity of roselle (Hibiscus sabdariffa L.) and garlic (Allium sativum L.) as well as a combination of both are used as antihypertensive herbs. The results of study showed that roselle (Hibiscus sabdariffa L.) and garlic (Allium sativum L.) have great potential as antihypertensive herbs based on the affinity and stability of active substances to specific receptor with a much better value than a of antihypertensive drugs (lisinopril). Toxicity values determined by the method of AST, ALT and ALP in which the three values obtained indicate the presence of acute toxic effects that need to be considered in determining the dose of the extract of roselle and garlic as antihypertensives.

Keywords: Allium sativum, antihypertensive, Hibiscus sabdariffa, in silico, toxicity

Procedia PDF Downloads 318
4595 Safety Risks of Gaseous Toxic Compounds Released from Li Batteries

Authors: Jan Karl, Ondrej Suchy, Eliska Fiserova, Milan Ruzicka

Abstract:

The evolving electromobility and all the electronics also bring an increase of danger with used Li-batteries. Li-batteries have been used in many industries, and currently many types of the batteries are available. Batteries have different compositions that affect their behavior. In the field of Li-battery safety, there are some areas of little discussion, such as extinguishing of fires caused by Li-batteries as well as toxicity of gaseous compounds released from Li batteries, transport or storage. Technical Institute of Fire Protection, which is a part of Fire Brigades of the Czech Republic, is dealing with the safety of Li batteries. That is the reason why we are dealing with toxicity of gaseous compounds released under conditions of fire, mechanical damage, overcharging and other emergencies that may occur. This is necessary for protection of intervening of fire brigade units, people in the vicinity and other envirnomental consequences. In this work, different types of batteries (Li-ion, Li-Po, LTO, LFP) with different kind of damage were tested, and the toxicity and total amount of released gases were studied. These values were evaluated according to their environmental hazard. FTIR spectroscopy was used for the evaluation of toxicity. We used a FTIR gas cell for continuous measurement. The total amount of released gases was determined by collecting the total gas phase through the absorbers and then determining the toxicants absorbed into the solutions. Based on the obtained results, it is possible to determine the protective equipment necessary for the event of an emergency with a Li-battery, to define the environmental load and the immediate danger in an emergency.

Keywords: Li-battery, toxicity, gaseous toxic compounds, FTIR spectroscopy

Procedia PDF Downloads 120
4594 Organizational Climate of Silence and Job Performance: Examining the Mediatory and Moderating Role of Work Engagement and Supervisor Support among Frontline Nurses

Authors: Sabina Ampon-Wireko

Abstract:

Purpose: The study explores the influence of the organizational climate of silence on job performance through the mediating effects of work engagement (WE). Further, the degree to which supervisor support (SS) and work engagement moderate job performance are examined. Method: Using a questionnaire, the study collected 565 valid responses from frontline nurses in Ghana. The hierarchical regression technique was employed in estimating the relationship between the variables. Findings: The results showed a significant negative influence of top managers' and supervisors' attitudes to silence on both contextual and task performance. Communication opportunities, however, revealed positive and significant effects on contextual and task performance. Work engagement had no role in mediating top managers' and supervisors’ attitudes toward silence, communication opportunities, and task performance. Supervisor support acted as a moderating factor in the relationship between job engagement and task performance. In contrast, despite the direct positive relationship between supervisor support and contextual performance, it failed to moderate the relationship between work engagement and contextual performance. Practical implications: The study's findings demonstrate the need for health managers and supervisors to become more conscious of silence. The findings offer diverse recommendations for encouraging the sharing of relevant ideas, facts, and opinions within the health sector.

Keywords: organizational climate of silence, job performance, work engagement, supervisor support, frontline nurses

Procedia PDF Downloads 57
4593 Context-Aware Recommender Systems Using User's Emotional State

Authors: Hoyeon Park, Kyoung-jae Kim

Abstract:

The product recommendation is a field of research that has received much attention in the recent information overload phenomenon. The proliferation of the mobile environment and social media cannot help but affect the results of the recommendation depending on how the factors of the user's situation are reflected in the recommendation process. Recently, research has been spreading attention to the context-aware recommender system which is to reflect user's contextual information in the recommendation process. However, until now, most of the context-aware recommender system researches have been limited in that they reflect the passive context of users. It is expected that the user will be able to express his/her contextual information through his/her active behavior and the importance of the context-aware recommender system reflecting this information can be increased. The purpose of this study is to propose a context-aware recommender system that can reflect the user's emotional state as an active context information to recommendation process. The context-aware recommender system is a recommender system that can make more sophisticated recommendations by utilizing the user's contextual information and has an advantage that the user's emotional factor can be considered as compared with the existing recommender systems. In this study, we propose a method to infer the user's emotional state, which is one of the user's context information, by using the user's facial expression data and to reflect it on the recommendation process. This study collects the facial expression data of a user who is looking at a specific product and the user's product preference score. Then, we classify the facial expression data into several categories according to the previous research and construct a model that can predict them. Next, the predicted results are applied to existing collaborative filtering with contextual information. As a result of the study, it was shown that the recommended results of the context-aware recommender system including facial expression information show improved results in terms of recommendation performance. Based on the results of this study, it is expected that future research will be conducted on recommender system reflecting various contextual information.

Keywords: context-aware, emotional state, recommender systems, business analytics

Procedia PDF Downloads 202
4592 A Comparative Study of Virus Detection Techniques

Authors: Sulaiman Al amro, Ali Alkhalifah

Abstract:

The growing number of computer viruses and the detection of zero day malware have been the concern for security researchers for a large period of time. Existing antivirus products (AVs) rely on detecting virus signatures which do not provide a full solution to the problems associated with these viruses. The use of logic formulae to model the behaviour of viruses is one of the most encouraging recent developments in virus research, which provides alternatives to classic virus detection methods. In this paper, we proposed a comparative study about different virus detection techniques. This paper provides the advantages and drawbacks of different detection techniques. Different techniques will be used in this paper to provide a discussion about what technique is more effective to detect computer viruses.

Keywords: computer viruses, virus detection, signature-based, behaviour-based, heuristic-based

Procedia PDF Downloads 449
4591 The Effect of Pixelation on Face Detection: Evidence from Eye Movements

Authors: Kaewmart Pongakkasira

Abstract:

This study investigated how different levels of pixelation affect face detection in natural scenes. Eye movements and reaction times, while observers searched for faces in natural scenes rendered in different ranges of pixels, were recorded. Detection performance for coarse visual detail at lower pixel size (3 x 3) was better than with very blurred detail carried by higher pixel size (9 x 9). The result is consistent with the notion that face detection relies on gross detail information of face-shape template, containing crude shape structure and features. In contrast, detection was impaired when face shape and features are obscured. However, it was considered that the degradation of scenic information might also contribute to the effect. In the next experiment, a more direct measurement of the effect of pixelation on face detection, only the embedded face photographs, but not the scene background, will be filtered.

Keywords: eye movements, face detection, face-shape information, pixelation

Procedia PDF Downloads 293
4590 Performance of Nakagami Fading Channel over Energy Detection Based Spectrum Sensing

Authors: M. Ranjeeth, S. Anuradha

Abstract:

Spectrum sensing is the main feature of cognitive radio technology. Spectrum sensing gives an idea of detecting the presence of the primary users in a licensed spectrum. In this paper we compare the theoretical results of detection probability of different fading environments like Rayleigh, Rician, Nakagami-m fading channels with the simulation results using energy detection based spectrum sensing. The numerical results are plotted as P_f Vs P_d for different SNR values, fading parameters. It is observed that Nakagami fading channel performance is better than other fading channels by using energy detection in spectrum sensing. A MATLAB simulation test bench has been implemented to know the performance of energy detection in different fading channel environment.

Keywords: spectrum sensing, energy detection, fading channels, probability of detection, probability of false alarm

Procedia PDF Downloads 508
4589 Contextual Variables Affecting Frustration Level in Reading: An Integral Inquiry

Authors: Mae C. Pavilario

Abstract:

This study employs a sequential explanatory mixed method. Quantitatively it investigated the profile of grade VII students. Qualitatively, the prevailing contextual variables that affect their frustration-level were sought based on their perspective and that of their parents and teachers. These students were categorized as frustration-level in reading based on the data on word list of the Philippine Informal Reading Inventory (Phil-IRI). The researcher-made reading factor instrument translated to local dialect (Hiligaynon) was subjected to cross-cultural translation to address content, semantic, technical, criterion, or conceptual equivalence, the open-ended questions, and one unstructured interview was utilized. In the profile of the 26 participants, the 12 males are categorized as grade II and grade III frustration-levels. The prevailing contextual variables are personal-“having no interest in reading”, “being ashamed and fear of having to read in front of others” for extremely high frustration level; social environmental-“having no regular reading schedule at home” for very high frustration level and personal- “having no interest in reading” for high frustration level. Kendall Tau inferential statistical tool was used to test the significant relationship in the prevailing contextual variables that affect frustration-level readers when grouped according to perspective. Result showed that significant relationship exists between students-parents perspectives; however, there is no significant relationship between students’ and teachers’, and parents’ and teachers’ perspectives. The themes in the narratives of the participants on frustration-level readers are existence of speech defects, undesirable attitude, insufficient amount of reading materials, lack of close supervision from parents, and losing time and focus on task. Intervention was designed.

Keywords: contextual variables, frustration-level readers, perspective, inquiry

Procedia PDF Downloads 140
4588 Intrusion Detection and Prevention System (IDPS) in Cloud Computing Using Anomaly-Based and Signature-Based Detection Techniques

Authors: John Onyima, Ikechukwu Ezepue

Abstract:

Virtualization and cloud computing are among the fast-growing computing innovations in recent times. Organisations all over the world are moving their computing services towards the cloud this is because of its rapid transformation of the organization’s infrastructure and improvement of efficient resource utilization and cost reduction. However, this technology brings new security threats and challenges about safety, reliability and data confidentiality. Evidently, no single security technique can guarantee security or protection against malicious attacks on a cloud computing network hence an integrated model of intrusion detection and prevention system has been proposed. Anomaly-based and signature-based detection techniques will be integrated to enable the network and its host defend themselves with some level of intelligence. The anomaly-base detection was implemented using the local deviation factor graph-based (LDFGB) algorithm while the signature-based detection was implemented using the snort algorithm. Results from this collaborative intrusion detection and prevention techniques show robust and efficient security architecture for cloud computing networks.

Keywords: anomaly-based detection, cloud computing, intrusion detection, intrusion prevention, signature-based detection

Procedia PDF Downloads 276
4587 Survey on Malware Detection

Authors: Doaa Wael, Naswa Abdelbaky

Abstract:

Malware is malicious software that is built to cause destructive actions and damage information systems and networks. Malware infections increase rapidly, and types of malware have become more sophisticated, which makes the malware detection process more difficult. On the other side, the Internet of Things IoT technology is vulnerable to malware attacks. These IoT devices are always connected to the internet and lack security. This makes them easy for hackers to access. These malware attacks are becoming the go-to attack for hackers. Thus, in order to deal with this challenge, new malware detection techniques are needed. Currently, building a blockchain solution that allows IoT devices to download any file from the internet and to verify/approve whether it is malicious or not is the need of the hour. In recent years, blockchain technology has stood as a solution to everything due to its features like decentralization, persistence, and anonymity. Moreover, using blockchain technology overcomes some difficulties in malware detection and improves the malware detection ratio over-than the techniques that do not utilize blockchain technology. In this paper, we study malware detection models which are based on blockchain technology. Furthermore, we elaborate on the effect of blockchain technology in malware detection, especially in the android environment.

Keywords: malware analysis, blockchain, malware attacks, malware detection approaches

Procedia PDF Downloads 48