Search results for: malignant tumor detection
3721 Intrusion Detection In MANET Using Game Theory
Authors: S. B. Kumbalavati, J. D. Mallapur, K. Y. Bendigeri
Abstract:
A mobile Ad-hoc network (MANET) is a multihop wireless network where nodes communicate each other without any pre-deployed infrastructure. There is no central administrating unit. Hence, MANET is generally prone to many of the attacks. These attacks may alter, release or deny data. These attacks are nothing but intrusions. Intrusion is a set of actions that attempts to compromise integrity, confidentiality and availability of resources. A major issue in the design and operation of ad-hoc network is sharing the common spectrum or common channel bandwidth among all the nodes. We are performing intrusion detection using game theory approach. Game theory is a mathematical tool for analysing problems of competition and negotiation among the players in any field like marketing, e-commerce and networking. In this paper mathematical model is developed using game theory approach and intruders are detected and removed. Bandwidth utilization is estimated and comparison is made between bandwidth utilization with intrusion detection technique and without intrusion detection technique. Percentage of intruders and efficiency of the network is analysed.Keywords: ad-hoc network, IDS, game theory, sensor networks
Procedia PDF Downloads 3873720 Genetic Association and Functional Significance of Matrix Metalloproteinase-14 Promoter Variants rs1004030 and rs1003349 in Gallbladder Cancer Pathogenesis
Authors: J. Vinay , Kusumbati Besra, Niharika Pattnaik, Shivaram Prasad Singh, Manjusha Dixit
Abstract:
Gallbladder cancer (GBC) is rare but highly malignant cancer; its prevalence is more in certain geographical regions and ethnic groups, which include the Northern and Eastern states of India. Previous studies in India have reported genetic predisposition as one of the risk factors in GBC pathogenesis. Although the matrix metalloproteinase-14 (MMP14) is a well-known modulator of the tumor microenvironment and tumorigenesis and TCGA data also suggests its upregulation yet, its role in the genetic predisposition for GBC is completely unknown. We elucidated the role of MMP14 promoter variants as genetic risk factors and their implications in expression modulation. We screened MMP14 promoter variants association with GBC using Sanger’s sequencing in approximately 300 GBC and 300 control subjects and 26 GBC tissue samples of Indian ethnicity. The immunohistochemistry was used to check the MMP14 protein expression in GBC tissue samples. The role of promoter variants on expression levels was elucidated using a luciferase reporter assay. The variants rs1004030 (p-value = 0.0001) and rs1003349 (p-value = 0.0008) were significantly associated with gallbladder cancer. The luciferase assay in two different cell lines, HEK-293 (p = 0.0006) and TGBC1TKB (p = 0.0036) showed a significant increase in relative luciferase activity in the presence of risk alleles for both the single nucleotide polymorphisms (SNPs). Similarly, genotype-phenotype correlation in patients samples confirmed that the presence of risk alleles at rs1004030 and rs1003349 increased MMP14 expression. Overall, this study unravels the genetic association of MMP14 promoter variants with gallbladder cancer, which may contribute to pathogenesis by increasing its expression.Keywords: gallbladder cancer, matrix metalloproteinase-14, single nucleotide polymorphism, case control study, genetic association study
Procedia PDF Downloads 1793719 Common Causes of Eye Removal Surgery in Turkish Patients: A Review of 226 Cases
Authors: Titap Yazicioglu
Abstract:
Purpose: To determine the etiological factors responsible for the eye removal surgery and to evaluate our surgical results. Material and Methods: Medical records of 226 patients, who underwent eye removal surgery, were analyzed retrospectively. Demographic information, clinical history, surgical procedure, and histopathological data were all collected. Evisceration surgery was performed under general anesthesia in all patients except tumor cases and one patient with rhino-orbital mucormycosis. The patients were followed for an average of 16.46±10.78 months and checked for the possible complications, cosmesis, and functional results.Results: 144 men, and 82 women,with a mean age of 41.78±22.6 years, were underwent enucleation (n=15) or evisceration (n=211) due to traumatic (n=169) and non-traumatic (n=57) causes. In the traumatic group, 79.8% of 169 patients were injured by penetrating and 14.2% by blunt trauma.3.6% of the patients were injured in a traffic accident, and 2.4% of them were injured by explosives. In the non-traumatic group, 40% of 25 patients had post-traumatic endophthalmitis, 32% had endophthalmitis due to corneal ulceration and melting, and 24% had endophthalmitis after cataract surgery. One patient had panophthalmitis due to rhino-orbital mucormycosis. Another cause in the non-traumatic group was glaucoma, of which 92.3% had neovascular glaucoma, and 8.7% had congenital glaucoma. Of the 14 patients who were enucleated for tumor, 35.7% had retinoblastoma, 14.3% had medulloepithelioma, 42.9% had uveal melanoma, and 7.1% had metastatic tumor from paranasal sinuses.The most common complaint in the follow-up period was discharging, seen in all prosthesis-wearing patients. 13.3% of the patients had itching due to ocular prosthesis. 4.4% of the patients were complaining about deep superior sulcus. 4.4% had pyogenic granuloma, and 17.8% had implant exposure. Conclusion: Etiological factors should be carefully evaluated, and precautions should be taken in order to reduce the devastating effect of the physical loss of the eye.Keywords: enucleation, evisceration, ocular injury, etiology, frequency
Procedia PDF Downloads 1113718 An Embedded System for Early Detection of Gas Leakage in Hospitals and Industries
Authors: Sehreen Moorat, Hiba, Maham Mahnoor, Faryal Soomro
Abstract:
Leakage of gases in a system makes infrastructures and users vulnerable; it can occur due to its environmental conditions or old groundwork. In hospitals and industries, it is very important to detect any small level of gas leakage because of their sensitivity. In this research, a portable detection system for the small leakage of gases has been developed, gas sensor (MQ-2) is used to find leakage when it’s at its initial phase. The sensor and transmitting module senses the change in level of gas by using a sensing circuit. When a concentration of gas reach at a specified threshold level, it will activate an alarm and send the alarming situation notification to receiver through GSM module. The proposed system works well in hospitals, home, and industries.Keywords: gases, detection, Arduino, MQ-2, alarm
Procedia PDF Downloads 2053717 On Enabling Miner Self-Rescue with In-Mine Robots using Real-Time Object Detection with Thermal Images
Authors: Cyrus Addy, Venkata Sriram Siddhardh Nadendla, Kwame Awuah-Offei
Abstract:
Surface robots in modern underground mine rescue operations suffer from several limitations in enabling a prompt self-rescue. Therefore, the possibility of designing and deploying in-mine robots to expedite miner self-rescue can have a transformative impact on miner safety. These in-mine robots for miner self-rescue can be envisioned to carry out diverse tasks such as object detection, autonomous navigation, and payload delivery. Specifically, this paper investigates the challenges in the design of object detection algorithms for in-mine robots using thermal images, especially to detect people in real-time. A total of 125 thermal images were collected in the Missouri S&T Experimental Mine with the help of student volunteers using the FLIR TG 297 infrared camera, which were pre-processed into training and validation datasets with 100 and 25 images, respectively. Three state-of-the-art, pre-trained real-time object detection models, namely YOLOv5, YOLO-FIRI, and YOLOv8, were considered and re-trained using transfer learning techniques on the training dataset. On the validation dataset, the re-trained YOLOv8 outperforms the re-trained versions of both YOLOv5, and YOLO-FIRI.Keywords: miner self-rescue, object detection, underground mine, YOLO
Procedia PDF Downloads 813716 Computational Investigation of V599 Mutations of BRAF Protein and Its Control over the Therapeutic Outcome under the Malignant Condition
Authors: Mayank, Navneet Kaur, Narinder Singh
Abstract:
The V599 mutations in the BRAF protein are extremely oncogenic, responsible for countless of malignant conditions. Along with wild type, V599E, V599D, and V599R are the important mutated variants of the BRAF proteins. The BRAF inhibitory anticancer agents are continuously developing, and sorafenib is a BRAF inhibitor that is under clinical use. The crystal structure of sorafenib bounded to wild type, and V599 is known, showing a similar interaction pattern in both the case. The mutated 599th residue, in both the case, is also found not interacting directly with the co-crystallized sorafenib molecule. However, the IC50 value of sorafenib was found extremely different in both the case, i.e., 22 nmol/L for wild and 38 nmol/L for V599E protein. Molecular docking study and MMGBSA binding energy results also revealed a significant difference in the binding pattern of sorafenib in both the case. Therefore, to explore the role of distinctively situated 599th residue, we have further conducted comprehensive computational studies. The molecular dynamics simulation, residue interaction network (RIN) analysis, and residue correlation study results revealed the importance of the 599th residue on the therapeutic outcome and overall dynamic of the BRAF protein. Therefore, although the position of 599th residue is very much distinctive from the ligand-binding cavity of BRAF, still it has exceptional control over the overall functional outcome of the protein. The insight obtained here may seem extremely important and guide us while designing ideal BRAF inhibitory anticancer molecules.Keywords: BRAF, oncogenic, sorafenib, computational studies
Procedia PDF Downloads 1153715 Detection of Cyberattacks on the Metaverse Based on First-Order Logic
Authors: Sulaiman Al Amro
Abstract:
There are currently considerable challenges concerning data security and privacy, particularly in relation to modern technologies. This includes the virtual world known as the Metaverse, which consists of a virtual space that integrates various technologies and is therefore susceptible to cyber threats such as malware, phishing, and identity theft. This has led recent studies to propose the development of Metaverse forensic frameworks and the integration of advanced technologies, including machine learning for intrusion detection and security. In this context, the application of first-order logic offers a formal and systematic approach to defining the conditions of cyberattacks, thereby contributing to the development of effective detection mechanisms. In addition, formalizing the rules and patterns of cyber threats has the potential to enhance the overall security posture of the Metaverse and, thus, the integrity and safety of this virtual environment. The current paper focuses on the primary actions employed by avatars for potential attacks, including Interval Temporal Logic (ITL) and behavior-based detection to detect an avatar’s abnormal activities within the Metaverse. The research established that the proposed framework attained an accuracy of 92.307%, resulting in the experimental results demonstrating the efficacy of ITL, including its superior performance in addressing the threats posed by avatars within the Metaverse domain.Keywords: security, privacy, metaverse, cyberattacks, detection, first-order logic
Procedia PDF Downloads 403714 Plasmonic Nanoshells Based Metabolite Detection for in-vitro Metabolic Diagnostics and Therapeutic Evaluation
Authors: Deepanjali Gurav, Kun Qian
Abstract:
In-vitro metabolic diagnosis relies on designed materials-based analytical platforms for detection of selected metabolites in biological samples, which has a key role in disease detection and therapeutic evaluation in clinics. However, the basic challenge deals with developing a simple approach for metabolic analysis in bio-samples with high sample complexity and low molecular abundance. In this work, we report a designer plasmonic nanoshells based platform for direct detection of small metabolites in clinical samples for in-vitro metabolic diagnostics. We first synthesized a series of plasmonic core-shell particles with tunable nanoshell structures. The optimized plasmonic nanoshells as new matrices allowed fast, multiplex, sensitive, and selective LDI MS (Laser desorption/ionization mass spectrometry) detection of small metabolites in 0.5 μL of bio-fluids without enrichment or purification. Furthermore, coupling with isotopic quantification of selected metabolites, we demonstrated the use of these plasmonic nanoshells for disease detection and therapeutic evaluation in clinics. For disease detection, we identified patients with postoperative brain infection through glucose quantitation and daily monitoring by cerebrospinal fluid (CSF) analysis. For therapeutic evaluation, we investigated drug distribution in blood and CSF systems and validated the function and permeability of blood-brain/CSF-barriers, during therapeutic treatment of patients with cerebral edema for pharmacokinetic study. Our work sheds light on the design of materials for high-performance metabolic analysis and precision diagnostics in real cases.Keywords: plasmonic nanoparticles, metabolites, fingerprinting, mass spectrometry, in-vitro diagnostics
Procedia PDF Downloads 1383713 Detection of JC Virus DNA and T-Ag Expression in a Subpopulation of Tunisian Colorectal Carcinomas
Authors: Wafa Toumi, Alessandro Ripalti, Luigi Ricciardiello, Dalila Gargouri, Jamel Kharrat, Abderraouf Cherif, Ahmed Bouhafa, Slim Jarboui, Mohamed Zili, Ridha Khelifa
Abstract:
Background & aims: Colorectal cancer (CRC) is one of the most common malignancies throughout the world. Several risk factors, both genetic and environmental, including viral infections, have been linked to colorectal carcinogenesis. A few studies report the detection of human polyomavirus JC (JCV) DNA and transformation antigen (T-Ag) in a fraction of the colorectal tumors studied and suggest an association of this virus with CRC. In order to investigate whether such an association of JCV with CRC will hold in a different epidemiological setting, we looked for the presence of JCV DNA and T-Ag expression in a group of Tunisian CRC patients. Methods: Fresh colorectal mucosa biopsies were obtained from 17 healthy volunteers and from both colorectal tumors and adjacent normal tissues of 47 CRC patients. DNA was extracted from fresh biopsies or from formalin-fixed, paraffin-embedded tissue sections using the Invitrogen Purelink Genomic DNA mini Kit. A simple PCR and a nested PCR were used to amplify a region of the T-Ag gene. The obtained PCR products revealed a 154 bp and a 98 bp bands, respectively. Specificity was confirmed by sequencing of the PCR products. T-Ag expression was determined by immunohistochemical staining using a mouse monoclonal antibody (clone PAb416) directed against SV40 T-Ag that cross reacts with JCV T-Ag. Results: JCV DNA was found in 12 (25%) and 22 (46%) of the CRC tumors by simple PCR and by nested PCR, respectively. All paired adjacent normal mucosa biopsies were negative for viral DNA. Sequencing of the DNA amplicons obtained confirmed the authenticity of T-Ag sequences. Immunohistochemical staining showed nuclear T-Ag expression in all 22 JCV DNA- positive samples and in 3 additional tumor samples which appeared DNA-negative by PCR. Conclusions: These results suggest an association of JCV with a subpopulation of Tunisian colorectal tumors.Keywords: colorectal cancer, immunohistochemistry, Polyomavirus JC, PCR
Procedia PDF Downloads 3633712 Prognostic Significance of Nuclear factor kappa B (p65) among Breast Cancer Patients in Cape Coast Teaching Hospital
Authors: Precious Barnes, Abraham Mensah, Leonard Derkyi-Kwarteng, Benjamin Amoani, George Adjei, Ernest Adankwah, Faustina Pappoe, Kwabena Dankwah, Daniel Amoako-Sakyi, Samuel Victor Nuvor, Dorcas Obiri-Yeboah, Ewura Seidu Yahaya, Patrick Kafui Akakpo, Roland Osei Saahene
Abstract:
Context: Breast cancer is a prevalent and aggressive type of cancer among African women, with high mortality rates in Ghana. Nuclear factor kappa B (NF-kB) is a transcription factor that has been associated with tumor progression in breast cancer. However, there is a lack of published data on NF-kB in breast cancer patients in Ghana or other African countries. Research Aim: The aim of this study was to assess the prognostic significance of NF-kB (p65) expression and its association with various clinicopathological features in breast cancer patients at the Cape Coast Teaching Hospital in Ghana. Methodology: A total of 90 formalin-fixed breast cancer tissues and 15 normal breast tissues were used in this study. The expression level of NF-kB (p65) was examined using immunohistochemical techniques. Correlation analysis between NF-kB (p65) expression and clinicopathological features was performed using SPSS version 25. Findings: The study found that NF-kB (p65) was expressed in 86.7% of breast cancer tissues. There was a significant relationship between NF-kB (p65) expression and tumor grade, proliferation index (Ki67), and molecular subtype. High-level expression of NF-kB (p65) was more common in tumor grade 3 compared to grade 1, and Ki67 > 20 had higher expression of NF-kB (p65) compared to Ki67 ≤ 20. Triple-negative breast cancer patients had the highest overexpression of NF-kB (p65) compared to other molecular subtypes. There was no significant association between NF-kB (p65) expression and other clinicopathological parameters. Theoretical Importance: This study provides important insights into the expression of NF-kB (p65) in breast cancer patients in Ghana, particularly in relation to tumor grade and proliferation index. The findings suggest that NF-kB (p65) could serve as a potential biological marker for cancer stage, progression, prognosis and as a therapeutic target. Data Collection and Analysis Procedures: Formalin-fixed breast cancer tissues and normal breast tissues were collected and analyzed using immunohistochemical techniques. Correlation analysis between NF-kB (p65) expression and clinicopathological features was performed using SPSS version 25. Question Addressed: This study addressed the question of the prognostic significance of NF-kB (p65) expression and its association with clinicopathological features in breast cancer patients in Ghana. Conclusion: This study, the first of its kind in Ghana, demonstrates that NF-kB (p65) is highly expressed among breast cancer patients at the Cape Coast Teaching Hospital, especially in triple-negative breast cancer patients. The expression of NF-kB (p65) is associated with tumor grade and proliferation index. NF-kB (p65) could potentially serve as a biological marker for cancer stage, progression, prognosis, and as a therapeutic target.Keywords: breast cancer, Ki67, NF-kB (p65), tumor grade
Procedia PDF Downloads 723711 Detection of Resistive Faults in Medium Voltage Overhead Feeders
Authors: Mubarak Suliman, Mohamed Hassan
Abstract:
Detection of downed conductors occurring with high fault resistance (reaching kilo-ohms) has always been a challenge, especially in countries like Saudi Arabia, on which earth resistivity is very high in general (reaching more than 1000 Ω-meter). The new approaches for the detection of resistive and high impedance faults are based on the analysis of the fault current waveform. These methods are still under research and development, and they are currently lacking security and dependability. The other approach is communication-based solutions which depends on voltage measurement at the end of overhead line branches and communicate the measured signals to substation feeder relay or a central control center. However, such a detection method is costly and depends on the availability of communication medium and infrastructure. The main objective of this research is to utilize the available standard protection schemes to increase the probability of detection of downed conductors occurring with a low magnitude of fault currents and at the same time avoiding unwanted tripping in healthy conditions and feeders. By specifying the operating region of the faulty feeder, use of tripping curve for discrimination between faulty and healthy feeders, and with proper selection of core balance current transformer (CBCT) and voltage transformers with fewer measurement errors, it is possible to set the pick-up of sensitive earth fault current to minimum values of few amps (i.e., Pick-up Settings = 3 A or 4 A, …) for the detection of earth faults with fault resistance more than (1 - 2 kΩ) for 13.8kV overhead network and more than (3-4) kΩ fault resistance in 33kV overhead network. By implementation of the outcomes of this study, the probability of detection of downed conductors is increased by the utilization of existing schemes (i.e., Directional Sensitive Earth Fault Protection).Keywords: sensitive earth fault, zero sequence current, grounded system, resistive fault detection, healthy feeder
Procedia PDF Downloads 1153710 Efficient Credit Card Fraud Detection Based on Multiple ML Algorithms
Authors: Neha Ahirwar
Abstract:
In the contemporary digital era, the rise of credit card fraud poses a significant threat to both financial institutions and consumers. As fraudulent activities become more sophisticated, there is an escalating demand for robust and effective fraud detection mechanisms. Advanced machine learning algorithms have become crucial tools in addressing this challenge. This paper conducts a thorough examination of the design and evaluation of a credit card fraud detection system, utilizing four prominent machine learning algorithms: random forest, logistic regression, decision tree, and XGBoost. The surge in digital transactions has opened avenues for fraudsters to exploit vulnerabilities within payment systems. Consequently, there is an urgent need for proactive and adaptable fraud detection systems. This study addresses this imperative by exploring the efficacy of machine learning algorithms in identifying fraudulent credit card transactions. The selection of random forest, logistic regression, decision tree, and XGBoost for scrutiny in this study is based on their documented effectiveness in diverse domains, particularly in credit card fraud detection. These algorithms are renowned for their capability to model intricate patterns and provide accurate predictions. Each algorithm is implemented and evaluated for its performance in a controlled environment, utilizing a diverse dataset comprising both genuine and fraudulent credit card transactions.Keywords: efficient credit card fraud detection, random forest, logistic regression, XGBoost, decision tree
Procedia PDF Downloads 663709 Dosimetric Analysis of Intensity Modulated Radiotherapy versus 3D Conformal Radiotherapy in Adult Primary Brain Tumors: Regional Cancer Centre, India
Authors: Ravi Kiran Pothamsetty, Radha Rani Ghosh, Baby Paul Thaliath
Abstract:
Radiation therapy has undergone many advancements and evloved from 2D to 3D. Recently, with rapid pace of drug discoveries, cutting edge technology, and clinical trials has made innovative advancements in computer technology and treatment planning and upgraded to intensity modulated radiotherapy (IMRT) which delivers in homogenous dose to tumor and normal tissues. The present study was a hospital-based experience comparing two different conformal radiotherapy techniques for brain tumors. This analytical study design has been conducted at Regional Cancer Centre, India from January 2014 to January 2015. Ten patients have been selected after inclusion and exclusion criteria. All the patients were treated on Artiste Siemens Linac Accelerator. The tolerance level for maximum dose was 6.0 Gyfor lenses and 54.0 Gy for brain stem, optic chiasm and optical nerves as per RTOG criteria. Mean and standard deviation values of PTV98%, PTV 95% and PTV 2% in IMRT were 93.16±2.9, 95.01±3.4 and 103.1±1.1 respectively; for 3DCRT were 91.4±4.7, 94.17±2.6 and 102.7±0.39 respectively. PTV max dose (%) in IMRT and 3D-CRT were 104.7±0.96 and 103.9±1.0 respectively. Maximum dose to the tumor can be delivered with IMRT with acceptable toxicity limits. Variables such as expertise, location of tumor, patient condition, and TPS influence the outcome of the treatment.Keywords: brain tumors, intensity modulated radiotherapy (IMRT), three dimensional conformal radiotherapy (3D-CRT), radiation therapy oncology group (RTOG)
Procedia PDF Downloads 2393708 A Dihydropyridine Derivative as a Highly Selective Fluorometric Probe for Quantification of Au3+ Residue in Gold Nanoparticle Solution
Authors: Waroton Paisuwan, Mongkol Sukwattanasinitt, Mamoru Tobisu, Anawat Ajavakom
Abstract:
Novel dihydroquinoline derivatives (DHP and DHP-OH) were synthesized in one pot via a tandem trimerization-cyclization of methylpropiolate. DHP and DHP-OH possess strong blue fluorescence with high quantum efficiencies over 0.70 in aqueous media. DHP-OH displays a remarkable fluorescence quenching selectively to the presence of Au3+ through the oxidation of dihydropyridine to pyridinium ion as confirmed by NMR and HRMS. DHP-OH was used to demonstrate the quantitative analysis of Au3+ in water samples with the limit of detection of 33 ppb and excellent recovery (>95%). This fluorescent probe was also applied for the determination of Au3+ residue in the gold nanoparticle solution and a paper-based sensing strip for the on-site detection of Au3+.Keywords: Gold(III) ion detection, Fluorescent sensor, Fluorescence quenching, Dihydropyridine, Gold nanoparticles (AuNPs)
Procedia PDF Downloads 853707 Comparison of Sensitivity and Specificity of Pap Smear and Polymerase Chain Reaction Methods for Detection of Human Papillomavirus: A Review of Literature
Authors: M. Malekian, M. E. Heydari, M. Irani Estyar
Abstract:
Human papillomavirus (HPV) is one of the most common sexually transmitted infection, which may lead to cervical cancer as the main cause of it. With early diagnosis and treatment in health care services, cervical cancer and its complications are considered to be preventable. This study was aimed to compare the efficiency, sensitivity, and specificity of Pap smear and polymerase chain reaction (PCR) in detecting HPV. A literature search was performed in Google Scholar, PubMed and SID databases using the keywords 'human papillomavirus', 'pap smear' and 'polymerase change reaction' to identify studies comparing Pap smear and PCR methods for the detection. No restrictions were considered.10 studies were included in this review. All samples that were positive by pop smear were also positive by PCR. However, there were positive samples detected by PCR which was negative by pop smear and in all studies, many positive samples were missed by pop smear technique. Although The Pap smear had high specificity, PCR based HPV detection was more sensitive method and had the highest sensitivity. In order to promote the quality of detection and high achievement of the maximum results, PCR diagnostic methods in addition to the Pap smear are needed and Pap smear method should be combined with PCR techniques according to the high error rate of Pap smear in detection.Keywords: human papillomavirus, cervical cancer, pap smear, polymerase chain reaction
Procedia PDF Downloads 1313706 Medical Image Augmentation Using Spatial Transformations for Convolutional Neural Network
Authors: Trupti Chavan, Ramachandra Guda, Kameshwar Rao
Abstract:
The lack of data is a pain problem in medical image analysis using a convolutional neural network (CNN). This work uses various spatial transformation techniques to address the medical image augmentation issue for knee detection and localization using an enhanced single shot detector (SSD) network. The spatial transforms like a negative, histogram equalization, power law, sharpening, averaging, gaussian blurring, etc. help to generate more samples, serve as pre-processing methods, and highlight the features of interest. The experimentation is done on the OpenKnee dataset which is a collection of knee images from the openly available online sources. The CNN called enhanced single shot detector (SSD) is utilized for the detection and localization of the knee joint from a given X-ray image. It is an enhanced version of the famous SSD network and is modified in such a way that it will reduce the number of prediction boxes at the output side. It consists of a classification network (VGGNET) and an auxiliary detection network. The performance is measured in mean average precision (mAP), and 99.96% mAP is achieved using the proposed enhanced SSD with spatial transformations. It is also seen that the localization boundary is comparatively more refined and closer to the ground truth in spatial augmentation and gives better detection and localization of knee joints.Keywords: data augmentation, enhanced SSD, knee detection and localization, medical image analysis, openKnee, Spatial transformations
Procedia PDF Downloads 1543705 Detection and Classification of Myocardial Infarction Using New Extracted Features from Standard 12-Lead ECG Signals
Authors: Naser Safdarian, Nader Jafarnia Dabanloo
Abstract:
In this paper we used four features i.e. Q-wave integral, QRS complex integral, T-wave integral and total integral as extracted feature from normal and patient ECG signals to detection and localization of myocardial infarction (MI) in left ventricle of heart. In our research we focused on detection and localization of MI in standard ECG. We use the Q-wave integral and T-wave integral because this feature is important impression in detection of MI. We used some pattern recognition method such as Artificial Neural Network (ANN) to detect and localize the MI. Because these methods have good accuracy for classification of normal and abnormal signals. We used one type of Radial Basis Function (RBF) that called Probabilistic Neural Network (PNN) because of its nonlinearity property, and used other classifier such as k-Nearest Neighbors (KNN), Multilayer Perceptron (MLP) and Naive Bayes Classification. We used PhysioNet database as our training and test data. We reached over 80% for accuracy in test data for localization and over 95% for detection of MI. Main advantages of our method are simplicity and its good accuracy. Also we can improve accuracy of classification by adding more features in this method. A simple method based on using only four features which extracted from standard ECG is presented which has good accuracy in MI localization.Keywords: ECG signal processing, myocardial infarction, features extraction, pattern recognition
Procedia PDF Downloads 4553704 Colorimetric Detection of Melamine in Milk Sample by Using In-Situ Formed Silver Nanoparticles by Tannic Acid
Authors: Md Fazle Alam, Amaj Ahmed Laskar, Hina Younus
Abstract:
Melamine toxicity which causes renal failure and death of humans and animals have recently attracted worldwide attention. Developing an easy, fast and sensitive method for the routine melamine detection is the need of the hour. Herein, we have developed a rapid, sensitive, one step and selective colorimetric method for the detection of melamine in milk samples based upon in-situ formation of silver nanoparticles (AgNPs) via tannic acid at room temperature. These AgNPs thus formed were characterized by UV-VIS spectrophotometer, transmission electron microscope (TEM), zetasizer and dynamic light scattering (DLS). Under optimal conditions, melamine could be selectively detected within the concentration range of 0.05-1.4 µM with a limit of detection (LOD) of 10.1 nM, which is lower than the strictest melamine safety requirement of 1 ppm. This assay does not utilize organic cosolvents, enzymatic reactions, light sensitive dye molecules and sophisticated instrumentation, thereby overcoming some of the limitations of conventional methods.Keywords: milk adulteration, melamine, silver nanoparticles, tannic acid
Procedia PDF Downloads 2463703 Violence Detection and Tracking on Moving Surveillance Video Using Machine Learning Approach
Authors: Abe Degale D., Cheng Jian
Abstract:
When creating automated video surveillance systems, violent action recognition is crucial. In recent years, hand-crafted feature detectors have been the primary method for achieving violence detection, such as the recognition of fighting activity. Researchers have also looked into learning-based representational models. On benchmark datasets created especially for the detection of violent sequences in sports and movies, these methods produced good accuracy results. The Hockey dataset's videos with surveillance camera motion present challenges for these algorithms for learning discriminating features. Image recognition and human activity detection challenges have shown success with deep representation-based methods. For the purpose of detecting violent images and identifying aggressive human behaviours, this research suggested a deep representation-based model using the transfer learning idea. The results show that the suggested approach outperforms state-of-the-art accuracy levels by learning the most discriminating features, attaining 99.34% and 99.98% accuracy levels on the Hockey and Movies datasets, respectively.Keywords: violence detection, faster RCNN, transfer learning and, surveillance video
Procedia PDF Downloads 1063702 Modern Spectrum Sensing Techniques for Cognitive Radio Networks: Practical Implementation and Performance Evaluation
Authors: Antoni Ivanov, Nikolay Dandanov, Nicole Christoff, Vladimir Poulkov
Abstract:
Spectrum underutilization has made cognitive radio a promising technology both for current and future telecommunications. This is due to the ability to exploit the unused spectrum in the bands dedicated to other wireless communication systems, and thus, increase their occupancy. The essential function, which allows the cognitive radio device to perceive the occupancy of the spectrum, is spectrum sensing. In this paper, the performance of modern adaptations of the four most widely used spectrum sensing techniques namely, energy detection (ED), cyclostationary feature detection (CSFD), matched filter (MF) and eigenvalues-based detection (EBD) is compared. The implementation has been accomplished through the PlutoSDR hardware platform and the GNU Radio software package in very low Signal-to-Noise Ratio (SNR) conditions. The optimal detection performance of the examined methods in a realistic implementation-oriented model is found for the common relevant parameters (number of observed samples, sensing time and required probability of false alarm).Keywords: cognitive radio, dynamic spectrum access, GNU Radio, spectrum sensing
Procedia PDF Downloads 2453701 Cracks Detection and Measurement Using VLP-16 LiDAR and Intel Depth Camera D435 in Real-Time
Authors: Xinwen Zhu, Xingguang Li, Sun Yi
Abstract:
Crack is one of the most common damages in buildings, bridges, roads and so on, which may pose safety hazards. However, cracks frequently happen in structures of various materials. Traditional methods of manual detection and measurement, which are known as subjective, time-consuming, and labor-intensive, are gradually unable to meet the needs of modern development. In addition, crack detection and measurement need be safe considering space limitations and danger. Intelligent crack detection has become necessary research. In this paper, an efficient method for crack detection and quantification using a 3D sensor, LiDAR, and depth camera is proposed. This method works even in a dark environment, which is usual in real-world applications. The LiDAR rapidly spins to scan the surrounding environment and discover cracks through lasers thousands of times per second, providing a rich, 3D point cloud in real-time. The LiDAR provides quite accurate depth information. The precision of the distance of each point can be determined within around ±3 cm accuracy, and not only it is good for getting a precise distance, but it also allows us to see far of over 100m going with the top range models. But the accuracy is still large for some high precision structures of material. To make the depth of crack is much more accurate, the depth camera is in need. The cracks are scanned by the depth camera at the same time. Finally, all data from LiDAR and Depth cameras are analyzed, and the size of the cracks can be quantified successfully. The comparison shows that the minimum and mean absolute percentage error between measured and calculated width are about 2.22% and 6.27%, respectively. The experiments and results are presented in this paper.Keywords: LiDAR, depth camera, real-time, detection and measurement
Procedia PDF Downloads 2243700 RGB Color Based Real Time Traffic Sign Detection and Feature Extraction System
Authors: Kay Thinzar Phu, Lwin Lwin Oo
Abstract:
In an intelligent transport system and advanced driver assistance system, the developing of real-time traffic sign detection and recognition (TSDR) system plays an important part in recent research field. There are many challenges for developing real-time TSDR system due to motion artifacts, variable lighting and weather conditions and situations of traffic signs. Researchers have already proposed various methods to minimize the challenges problem. The aim of the proposed research is to develop an efficient and effective TSDR in real time. This system proposes an adaptive thresholding method based on RGB color for traffic signs detection and new features for traffic signs recognition. In this system, the RGB color thresholding is used to detect the blue and yellow color traffic signs regions. The system performs the shape identify to decide whether the output candidate region is traffic sign or not. Lastly, new features such as termination points, bifurcation points, and 90’ angles are extracted from validated image. This system uses Myanmar Traffic Sign dataset.Keywords: adaptive thresholding based on RGB color, blue color detection, feature extraction, yellow color detection
Procedia PDF Downloads 3133699 Hydrogen, a Novel Therapeutic Molecule, in Osteosarcoma Disease
Authors: Priyanka Sharma, Rajeshwar Nath Srivastava
Abstract:
Hydrogen has a high level of efficacy in suppressing tumour growth. The role of hydrogen in cancer treatment is unclear. This groundbreaking research will focus on the most effective therapeutic approach for osteosarcoma. Recent data reveals that hydrogen, a naturally occurring gaseous chemical, can protect cells from death. However, little is known about the signalling pathways that regulate cardiac cell death and individual apoptosis signalling by H2 and its downstream targets. According to certain research, the anti-tumor effect of H2 released by magnesium-based biomaterials is mediated by the P53-mediated lysosome-mitochondria apoptosis signalling pathway, bolstering the biomaterial's therapeutic potential as a localised anti-tumor treatment. The role of the H2 molecule in the signalling of apoptotic, autophagic, necroptotic, and pyroptotic cell death in Osteosarcoma is discussed in this paper. Potential Hydrogen-based therapy techniques will broaden the treatment horizon for Osteosarcoma.Keywords: osteosarcoma, metastasis, hhydrogen, therapeutic
Procedia PDF Downloads 1393698 Generation of Automated Alarms for Plantwide Process Monitoring
Authors: Hyun-Woo Cho
Abstract:
Earlier detection of incipient abnormal operations in terms of plant-wide process management is quite necessary in order to improve product quality and process safety. And generating warning signals or alarms for operating personnel plays an important role in process automation and intelligent plant health monitoring. Various methodologies have been developed and utilized in this area such as expert systems, mathematical model-based approaches, multivariate statistical approaches, and so on. This work presents a nonlinear empirical monitoring methodology based on the real-time analysis of massive process data. Unfortunately, the big data includes measurement noises and unwanted variations unrelated to true process behavior. Thus the elimination of such unnecessary patterns of the data is executed in data processing step to enhance detection speed and accuracy. The performance of the methodology was demonstrated using simulated process data. The case study showed that the detection speed and performance was improved significantly irrespective of the size and the location of abnormal events.Keywords: detection, monitoring, process data, noise
Procedia PDF Downloads 2523697 Traffic Light Detection Using Image Segmentation
Authors: Vaishnavi Shivde, Shrishti Sinha, Trapti Mishra
Abstract:
Traffic light detection from a moving vehicle is an important technology both for driver safety assistance functions as well as for autonomous driving in the city. This paper proposed a deep-learning-based traffic light recognition method that consists of a pixel-wise image segmentation technique and a fully convolutional network i.e., UNET architecture. This paper has used a method for detecting the position and recognizing the state of the traffic lights in video sequences is presented and evaluated using Traffic Light Dataset which contains masked traffic light image data. The first stage is the detection, which is accomplished through image processing (image segmentation) techniques such as image cropping, color transformation, segmentation of possible traffic lights. The second stage is the recognition, which means identifying the color of the traffic light or knowing the state of traffic light which is achieved by using a Convolutional Neural Network (UNET architecture).Keywords: traffic light detection, image segmentation, machine learning, classification, convolutional neural networks
Procedia PDF Downloads 1733696 Feature Based Unsupervised Intrusion Detection
Authors: Deeman Yousif Mahmood, Mohammed Abdullah Hussein
Abstract:
The goal of a network-based intrusion detection system is to classify activities of network traffics into two major categories: normal and attack (intrusive) activities. Nowadays, data mining and machine learning plays an important role in many sciences; including intrusion detection system (IDS) using both supervised and unsupervised techniques. However, one of the essential steps of data mining is feature selection that helps in improving the efficiency, performance and prediction rate of proposed approach. This paper applies unsupervised K-means clustering algorithm with information gain (IG) for feature selection and reduction to build a network intrusion detection system. For our experimental analysis, we have used the new NSL-KDD dataset, which is a modified dataset for KDDCup 1999 intrusion detection benchmark dataset. With a split of 60.0% for the training set and the remainder for the testing set, a 2 class classifications have been implemented (Normal, Attack). Weka framework which is a java based open source software consists of a collection of machine learning algorithms for data mining tasks has been used in the testing process. The experimental results show that the proposed approach is very accurate with low false positive rate and high true positive rate and it takes less learning time in comparison with using the full features of the dataset with the same algorithm.Keywords: information gain (IG), intrusion detection system (IDS), k-means clustering, Weka
Procedia PDF Downloads 2963695 lncRNA Gene Expression Profiling Analysis by TCGA RNA-Seq Data of Breast Cancer
Authors: Xiaoping Su, Gabriel G. Malouf
Abstract:
Introduction: Breast cancer is a heterogeneous disease that can be classified in 4 subgroups using transcriptional profiling. The role of lncRNA expression in human breast cancer biology, prognosis, and molecular classification remains unknown. Methods and results: Using an integrative comprehensive analysis of lncRNA, mRNA and DNA methylation in 900 breast cancer patients from The Cancer Genome Atlas (TCGA) project, we unraveled the molecular portraits of 1,700 expressed lncRNA. Some of those lncRNAs (i.e, HOTAIR) are previously reported and others are novel (i.e, HOTAIRM1, MAPT-AS1). The lncRNA classification correlated well with the PAM50 classification for basal-like, Her-2 enriched and luminal B subgroups, in contrast to the luminal A subgroup which behaved differently. Importantly, estrogen receptor (ESR1) expression was associated with distinct lncRNA networks in lncRNA clusters III and IV. Gene set enrichment analysis for cis- and trans-acting lncRNA showed enrichment for breast cancer signatures driven by breast cancer master regulators. Almost two third of those lncRNA were marked by enhancer chromatin modifications (i.e., H3K27ac), suggesting that lncRNA expression may result in increased activity of neighboring genes. Differential analysis of gene expression profiling data showed that lncRNA HOTAIRM1 was significantly down-regulated in basal-like subtype, and DNA methylation profiling data showed that lncRNA HOTAIRM1 was highly methylated in basal-like subtype. Thus, our integrative analysis of gene expression and DNA methylation strongly suggested that lncRNA HOTAIRM1 should be a tumor suppressor in basal-like subtype. Conclusion and significance: Our study depicts the first lncRNA molecular portrait of breast cancer and shows that lncRNA HOTAIRM1 might be a novel tumor suppressor.Keywords: lncRNA profiling, breast cancer, HOTAIRM1, tumor suppressor
Procedia PDF Downloads 1053694 Multi-Modality Imaging of Aggressive Hoof Wall Neoplasia in Two Horses
Authors: Hannah Nagel, Hayley Lang, Albert Sole Guitart, Natasha Lean, Rachel Allavena, Cleide Sprohnie-Barrera, Alex Young
Abstract:
Aggressive neoplasia of the hoof is a rare occurrence in horses and has been only sporadically described in the literature. In the few cases reported intra-hoof wall, aggressive neoplasia has been documented radiographically and has been described with variable imaging characteristics. These include a well-defined osteolytic area, a smoothly outlined semi-circular defect, an extensive draining tract beneath the hoof wall, as well as an additional large area of osteolysis or an extensive central lytic region. A 20-year-old Quarterhorse gelding and a 10-year-old Thoroughbred gelding were both presented for chronic reoccurring lameness in the left forelimb and left hindlimb, respectively. Both of the cases displayed radiographic lesions that have been previously described but also displayed osteoproliferative expansile regions of additional bone formation. Changes associated with hoof neoplasia are often non-specific due to the nature and capacity of bone to react to pathological insult, which is either to proliferate or be absorbed. Both cases depict and describe imaging findings seen on radiography, contrast radiography, computed tomography, and magnetic resonance imaging before reaching a histological diagnosis of malignant melanoma and squamous cell carcinoma. Although aggressive hoof wall neoplasia is rare, there are some imaging features which may raise our index of suspicion for an aggressive hoof wall lesion. This case report documents two horses with similar imaging findings who underwent multiple assessments, surgical interventions, and imaging modalities with a final diagnosis of malignant neoplasia.Keywords: horse, hoof, imaging, radiography, neoplasia
Procedia PDF Downloads 1313693 Anomaly Detection Based on System Log Data
Authors: M. Kamel, A. Hoayek, M. Batton-Hubert
Abstract:
With the increase of network virtualization and the disparity of vendors, the continuous monitoring and detection of anomalies cannot rely on static rules. An advanced analytical methodology is needed to discriminate between ordinary events and unusual anomalies. In this paper, we focus on log data (textual data), which is a crucial source of information for network performance. Then, we introduce an algorithm used as a pipeline to help with the pretreatment of such data, group it into patterns, and dynamically label each pattern as an anomaly or not. Such tools will provide users and experts with continuous real-time logs monitoring capability to detect anomalies and failures in the underlying system that can affect performance. An application of real-world data illustrates the algorithm.Keywords: logs, anomaly detection, ML, scoring, NLP
Procedia PDF Downloads 943692 Human TP53 Three Dimentional (3D) Core Domain Hot Spot Mutations at Codon, 36, 72 and 240 are Associated with Oral Squamous Cell Carcinoma
Authors: Saima Saleem, Zubair Abbasi, Abdul Hameed, Mansoor Ahmed Khan, Navid Rashid Qureshi, Abid Azhar
Abstract:
Oral Squamous Cell Carcinoma (OSCC) is the leading cause of death in the developing countries like Pakistan. This problem aggravates because of the excessive use of available chewing products. In spite of widespread information on their use and purported legislations against their use the Pakistani markets are classical examples of selling chewable carcinogenic mutagens. Reported studies indicated that these products are rich in reactive oxygen species (ROS) and polyphenols. TP53 gene is involved in the suppression of tumor. It has been reported that somatic mutations caused by TP53 gene are the foundation of the cancer. This study aims to find the loss of TP53 functions due to mutation/polymorphism caused by genomic alteration and interaction with tobacco and its related ingredients. Total 260 tissues and blood specimens were collected from OSCC patients and compared with age and sex matched controls. Mutations in exons 2-11 of TP53 were examined by PCR-SSCP. Samples showing mobility shift were directly sequenced. Two mutations were found in exon 4 at nucleotide position 108 and 215 and one in exon 7 at nucleotide position 719 of the coding sequences in patient’s tumor samples. These results show that substitution of proline with arginine at codon 72 and serine with threonine at codon 240 of p53 protein. These polymorphic changes, found in tumor samples of OSCC, could be involved in loss of heterozygocity and apoptotic activity in the binding domain of TP53. The model of the mutated TP53 gene elaborated a nonfunctional unfolded p53 protein, suggesting an important role of these mutations in p53 protein inactivation and malfunction. This nonfunctional 3D model also indicates that exogenous tobacco related carcinogens may act as DNA-damaging agents affecting the structure of DNA. The interpretations could be helpful in establishing the pathways responsible for tumor formation in OSCC patients.Keywords: TP53 mutation/polymorphism, OSCC, PCR-SSCP, direct DNA sequencing, 3D structure
Procedia PDF Downloads 366