Search results for: safety helmet-wearing detection
5986 An Enhanced SAR-Based Tsunami Detection System
Authors: Jean-Pierre Dubois, Jihad S. Daba, H. Karam, J. Abdallah
Abstract:
Tsunami early detection and warning systems have proved to be of ultimate importance, especially after the destructive tsunami that hit Japan in March 2012. Such systems are crucial to inform the authorities of any risk of a tsunami and of the degree of its danger in order to make the right decision and notify the public of the actions they need to take to save their lives. The purpose of this research is to enhance existing tsunami detection and warning systems. We first propose an automated and miniaturized model of an early tsunami detection and warning system. The model for the operation of a tsunami warning system is simulated using the data acquisition toolbox of Matlab and measurements acquired from specified internet pages due to the lack of the required real-life sensors, both seismic and hydrologic, and building a graphical user interface for the system. In the second phase of this work, we implement various satellite image filtering schemes to enhance the acquired synthetic aperture radar images of the tsunami affected region that are masked by speckle noise. This enables us to conduct a post-tsunami damage extent study and calculate the percentage damage. We conclude by proposing improvements to the existing telecommunication infrastructure of existing warning tsunami systems using a migration to IP-based networks and fiber optics links.Keywords: detection, GIS, GSN, GTS, GPS, speckle noise, synthetic aperture radar, tsunami, wiener filter
Procedia PDF Downloads 3935985 Advanced Machine Learning Algorithm for Credit Card Fraud Detection
Authors: Manpreet Kaur
Abstract:
When legitimate credit card users are mistakenly labelled as fraudulent in numerous financial delated applications, there are numerous ethical problems. The innovative machine learning approach we have suggested in this research outperforms the current models and shows how to model a data set for credit card fraud detection while minimizing false positives. As a result, we advise using random forests as the best machine learning method for predicting and identifying credit card transaction fraud. The majority of victims of these fraudulent transactions were discovered to be credit card users over the age of 60, with a higher percentage of fraudulent transactions taking place between the specific hours.Keywords: automated fraud detection, isolation forest method, local outlier factor, ML algorithm, credit card
Procedia PDF Downloads 1155984 A Review of Process Safety Management for Small and Medium Business in Malaysia
Authors: Muhammad Afiq Anaqi Bin Baharudin, Muhammad Izamuddin Bin Mohd Nasir, Syarifuddin Bin Sujuanda, Muhammad Syahmi Rusyaidi Bin Sham Suddin, Danish Hakimi Bin kamaruzaman, Muhammad Haqimi Nazim Bin Hasmanizam, Mohammad Akmal Zakwan Bin Amran, Muhammad Alparizi Bin Latif
Abstract:
In particular, for small and medium enterprises (SMBs) in Malaysia, process safety management (PSM) is a crucial component of industrial safety. Limited resources, a lack of technical know-how, and linguistic and cultural obstacles are just a few of the difficulties SMBs in Malaysia encounter while putting PSM programmes into practice. A number of studies have emphasised the significance of leadership commitment, hazard identification and assessment, and employee involvement in the execution of effective PSM programmes, which are crucial for preventing accidents and incidents. In the literature, there has been a lot of discussion on the creation of specialised PSM frameworks for SMBs in Malaysia. Several studies have proposed implementation frameworks for PSM programmes that are based on recognised worldwide standards. Despite the significance of PSM in ensuring industrial safety, there are still a number of gaps in the literature on PSM in Malaysian SMBs. These gaps include the need for additional research on the efficiency of PSM programmes in reducing accidents and incidents in SMBs as well as the development of more specialised approaches to implementing PSM programmes in SMBs with limited resources and technical expertise. The goal of this review is to give a thorough overview of the body of research on PSM in Malaysian SMBs while highlighting important findings, points of contention, and knowledge gaps that need to be filled in.Keywords: process safety management, occupational safety and health (OSH), small businesses, medium businesses, malaysia
Procedia PDF Downloads 1275983 Bridge Health Monitoring: A Review
Authors: Mohammad Bakhshandeh
Abstract:
Structural Health Monitoring (SHM) is a crucial and necessary practice that plays a vital role in ensuring the safety and integrity of critical structures, and in particular, bridges. The continuous monitoring of bridges for signs of damage or degradation through Bridge Health Monitoring (BHM) enables early detection of potential problems, allowing for prompt corrective action to be taken before significant damage occurs. Although all monitoring techniques aim to provide accurate and decisive information regarding the remaining useful life, safety, integrity, and serviceability of bridges, understanding the development and propagation of damage is vital for maintaining uninterrupted bridge operation. Over the years, extensive research has been conducted on BHM methods, and experts in the field have increasingly adopted new methodologies. In this article, we provide a comprehensive exploration of the various BHM approaches, including sensor-based, non-destructive testing (NDT), model-based, and artificial intelligence (AI)-based methods. We also discuss the challenges associated with BHM, including sensor placement and data acquisition, data analysis and interpretation, cost and complexity, and environmental effects, through an extensive review of relevant literature and research studies. Additionally, we examine potential solutions to these challenges and propose future research ideas to address critical gaps in BHM.Keywords: structural health monitoring (SHM), bridge health monitoring (BHM), sensor-based methods, machine-learning algorithms, and model-based techniques, sensor placement, data acquisition, data analysis
Procedia PDF Downloads 905982 Real-Time Automated Detection of Violent Content in Animated Cartoons Using YOLOv9
Authors: Omaima Jbara, Mohame Amine Omrani, Mounir Zrigui
Abstract:
The detection of violent content in animated cartoons is anessential step toward safeguarding young audiences and promoting responsible media consumption. This study introduces an automated approach to identify violent scenes in cartoons using advanced object detection models. A custom dataset comprising 1,200 frames was curated from various animated sources, focusing on four key classes: Explosion, Blood, Fight, and Gunshot. Data augmentation techniques, including rotation, scaling, and color adjustments, expanded the dataset to 2,000 frames, enhancing diversity and model generalization. YOLO versions 8, 9, and 10 were trained and evaluated on this dataset. Among these, YOLOv9 achieved the highest performance with a mean Average Precision (mAP) of 94%, demonstrating superior accuracy and robustness. These findings highlight YOLOv9’s potential as a reliable tool for detecting violent content in animated media, contributing to the development of effective content moderation systems.Keywords: cartoon violence detection, YOLO model, computer Vi sion, Real-time content analysis
Procedia PDF Downloads 85981 safeRoute: Information Safety System for Professional Road Driving
Authors: Francisco Toledo-Castillo, Pilar Peiró-Torres, María Josefa Sospedra-Baeza, Sergio Hidalgo-Fuentes
Abstract:
The communication presented is about tasks that are been developed in the research project “safeRoute”, “Information safety system for professional road driving” (IPT-2012-110-370000). This R&D project was proposed by the consortium formed by Fagor Electronica la SEU 3 and the University of Valencia to the Ministry of Economy and Competitiveness, which approved it inside the INNPACTO subprogramme grants. Through this type of calls, the Ministry promote the innovative capacity of the Spanish companies and turn on the mechanism for competing internationally. With this kind of calls, private investments for technological and industrial development join their R & D resources with public entities to implement innovative project that could have an international exposure. Thus INNPACTO subprogramme promotes the creation of research projects with public-private partnerships that create exploitable final products. The “safeRoute” Project pretends develop a tool to help to make more safety the travels of commercial transport vehicles of goods and passengers. To achieve its objectives, the project is focused in three main lines of research: vehicle safety, the safety of the roads that they are using, and the safety which drivers do their job, their behaviour while they are driving. To improve safety, the project gives information about these three factors to all people that are involved in the safety of the professional transport. These three factors have influence to the occurrence of traffic accidents, thanks to the information provided and treated about these factors, we can achieve a significant reduction in occupational accidents in the transport sector. SafeRoute provide information about routes, vehicles, and driver behaviours, and in this manner pretends provide to transport companies a tool which could result in a safer driving results and could reduce their costs related to traffic accidents of their vehicles, in that way, this tool could help them to be more competitive, and give a more reliable service. This paper will focus mainly on the information about routes that drivers use to travel in their professional work, and how the researchers of this project have catalogued and evaluated these routes, and finally how that information will be provided to users.Keywords: driver support systems, professional drivers, road safety, safeRoute
Procedia PDF Downloads 4045980 MAS Capped CdTe/ZnS Core/Shell Quantum Dot Based Sensor for Detection of Hg(II)
Authors: Dilip Saikia, Suparna Bhattacharjee, Nirab Adhikary
Abstract:
In this piece of work, we have presented the synthesis and characterization of CdTe/ZnS core/shell (CS) quantum dots (QD). CS QDs are used as a fluorescence probe to design a simple cost-effective and ultrasensitive sensor for the detection of toxic Hg(II) in an aqueous medium. Mercaptosuccinic acid (MSA) has been used as a capping agent for the synthesis CdTe/ZnS CS QD. Photoluminescence quenching mechanism has been used in the detection experiment of Hg(II). The designed sensing technique shows a remarkably low detection limit of about 1 picomolar (pM). Here, the CS QDs are synthesized by a simple one-pot aqueous method. The synthesized CS QDs are characterized by using advanced diagnostics tools such as UV-vis, Photoluminescence, XRD, FTIR, TEM and Zeta potential analysis. The interaction between CS QDs and the Hg(II) ions results in the quenching of photoluminescence (PL) intensity of QDs, via the mechanism of excited state electron transfer. The proposed mechanism is explained using cyclic voltammetry and zeta potential analysis. The designed sensor is found to be highly selective towards Hg (II) ions. The analysis of the real samples such as drinking water and tap water has been carried out and the CS QDs show remarkably good results. Using this simple sensing method we have designed a prototype low-cost electronic device for the detection of Hg(II) in an aqueous medium. The findings of the experimental results of the designed sensor is crosschecked by using AAS analysis.Keywords: photoluminescence, quantum dots, quenching, sensor
Procedia PDF Downloads 2675979 Structural Reliability of Existing Structures: A Case Study
Authors: Z. Sakka, I. Assakkaf, T. Al-Yaqoub, J. Parol
Abstract:
A reliability-based methodology for the analysis assessment and evaluation of reinforced concrete structural elements of concrete structures is presented herein. The results of the reliability analysis and assessment for structural elements are verified by the results obtained from the deterministic methods. The analysis outcomes of reliability-based analysis are compared against the safety limits of the required reliability index β according to international standards and codes. The methodology is based on probabilistic analysis using reliability concepts and statistics of the main random variables that are relevant to the subject matter, and for which they are to be used in the performance-function equation(s) related to the structural elements under study. These methodology techniques can result in reliability index β, which is commonly known as the reliability index or reliability measure value that can be utilized to assess and evaluate the safety, human risk, and functionality of the structural component. Also, these methods can result in revised partial safety factor values for certain target reliability indices that can be used for the purpose of redesigning the reinforced concrete elements of the building and in which they could assist in considering some other remedial actions to improve the safety and functionality of the member.Keywords: structural reliability, concrete structures, FORM, Monte Carlo simulation
Procedia PDF Downloads 5185978 Enhanced Traffic Light Detection Method Using Geometry Information
Authors: Changhwan Choi, Yongwan Park
Abstract:
In this paper, we propose a method that allows faster and more accurate detection of traffic lights by a vision sensor during driving, DGPS is used to obtain physical location of a traffic light, extract from the image information of the vision sensor only the traffic light area at this location and ascertain if the sign is in operation and determine its form. This method can solve the problem in existing research where low visibility at night or reflection under bright light makes it difficult to recognize the form of traffic light, thus making driving unstable. We compared our success rate of traffic light recognition in day and night road environments. Compared to previous researches, it showed similar performance during the day but 50% improvement at night.Keywords: traffic light, intelligent vehicle, night, detection, DGPS
Procedia PDF Downloads 3255977 Quantum Dot Biosensing for Advancing Precision Cancer Detection
Authors: Sourav Sarkar, Manashjit Gogoi
Abstract:
In the evolving landscape of cancer diagnostics, optical biosensing has emerged as a promising tool due to its sensitivity and specificity. This study explores the potential of CdS/ZnS core-shell quantum dots (QDs) capped with 3-Mercaptopropionic acid (3-MPA), which aids in the linking chemistry of QDs to various cancer antibodies. The QDs, with their unique optical and electronic properties, have been integrated into the biosensor design. Their high quantum yield and size-dependent emission spectra have been exploited to improve the sensor’s detection capabilities. The study presents the design of this QD-enhanced optical biosensor. The use of these QDs can also aid multiplexed detection, enabling simultaneous monitoring of different cancer biomarkers. This innovative approach holds significant potential for advancing cancer diagnostics, contributing to timely and accurate detection. Future work will focus on optimizing the biosensor design for clinical applications and exploring the potential of QDs in other biosensing applications. This study underscores the potential of integrating nanotechnology and biosensing for cancer research, paving the way for next-generation diagnostic tools. It is a step forward in our quest for achieving precision oncology.Keywords: quantum dots, biosensing, cancer, device
Procedia PDF Downloads 565976 Lessons from Implementation of a Network-Wide Safety Huddle in Behavioral Health
Authors: Deborah Weidner, Melissa Morgera
Abstract:
The model of care delivery in the Behavioral Health Network (BHN) is integrated across all five regions of Hartford Healthcare and thus spans the entirety of the state of Connecticut, with care provided in seven inpatient settings and over 30 ambulatory outpatient locations. While safety has been a core priority of the BHN in alignment with High Reliability practices, safety initiatives have historically been facilitated locally in each region or within each entity, with interventions implemented locally as opposed to throughout the network. To address this, the BHN introduced a network wide Safety Huddle during 2022. Launched in January, the BHN Safety Huddle brought together internal stakeholders, including medical and administrative leaders, along with executive institute leadership, quality, and risk management. By bringing leaders together and introducing a network-wide safety huddle into the way we work, the benefit has been an increase in awareness of safety events occurring in behavioral health areas as well as increased systemization of countermeasures to prevent future events. One significant discussion topic presented in huddles has pertained to environmental design and patient access to potentially dangerous items, addressing some of the most relevant factors resulting in harm to patients in inpatient and emergency settings for behavioral health patients. The safety huddle has improved visibility of potential environmental safety risks through the generation of over 15 safety alerts cascaded throughout the BHN and also spurred a rapid improvement project focused on standardization of patient belonging searches to reduce patient access to potentially dangerous items on inpatient units. Safety events pertaining to potentially dangerous items decreased by 31% as a result of standardized interventions implemented across the network and as a result of increased awareness. A second positive outcome originating from the BHN Safety Huddle was implementation of a recommendation to increase the emergency Narcan®(naloxone) supply on hand in ambulatory settings of the BHN after incidents involving accidental overdose resulted in higher doses of naloxone administration. By increasing the emergency supply of naloxone on hand in all ambulatory and residential settings, colleagues are better prepared to respond in an emergency situation should a patient experience an overdose while on site. Lastly, discussions in safety huddle spurred a new initiative within the BHN to improve responsiveness to assaultive incidents through a consultation service. This consult service, aligned with one of the network’s improvement priorities to reduce harm events related to assaultive incidents, was borne out of discussion in huddle in which it was identified that additional interventions may be needed in providing clinical care to patients who are experiencing multiple and/ or frequent safety events.Keywords: quality, safety, behavioral health, risk management
Procedia PDF Downloads 835975 Analysis of Human Mental and Behavioral Models for Development of an Electroencephalography-Based Human Performance Management System
Authors: John Gaber, Youssef Ahmed, Hossam A. Gabbar, Jing Ren
Abstract:
Accidents at Nuclear Power Plants (NPPs) occur due to various factors, notable among them being poor safety management and poor safety culture. During abnormal situations, the likelihood of human error is many-fold higher due to the higher cognitive workload. The most common cause of human error and high cognitive workload is mental fatigue. Electroencephalography (EEG) is a method of gathering the electromagnetic waves emitted by a human brain. We propose a safety system by monitoring brainwaves for signs of mental fatigue using an EEG system. This requires an analysis of the mental model of the NPP operator, changes in brain wave power in response to certain stimuli, and the risk factors on mental fatigue and attention that NPP operators face when performing their tasks. We analyzed these factors and developed an EEG-based monitoring system, which aims to alert NPP operators when levels of mental fatigue and attention hinders their ability to maintain safety.Keywords: brain imaging, EEG, power plant operator, psychology
Procedia PDF Downloads 1055974 Analysis of Economic Order Quantity, Safety Stock, Maximum Inventory Control, Lot Size and Reorder Point for Engro Polymers and Chemicals
Authors: Ali Akber Jaffri, Asad Naseem, Javeria Khan, Zubair Hamza, Ishtiaq
Abstract:
The purpose of this study is to determine safety stock, maximum inventory level, reordering point, and reordering quantity by rearranging lot sizes for supplier and customer in MRO (maintenance repair operations) warehouse of Engro Polymers & Chemicals. To achieve the aim, physical analysis method and excel commands were carried out to elicit the customer and supplier data provided by the company. Initially, we rearranged the current lot sizes and MOUs (measure of units) in SAP software. Due to change in lot sizes, we have to determine the new quantities for safety stock, maximum inventory, reordering point and reordering quantity as per company's demand. By proposed system, we saved extra cost in terms of reducing time of receiving from vendor and in issuance to customer, ease of material handling in MRO warehouse and also reduce human efforts.Keywords: maintenance repair operation, maximum inventory, reorder quantity, safety stock
Procedia PDF Downloads 2785973 Anomaly Detection with ANN and SVM for Telemedicine Networks
Authors: Edward Guillén, Jeisson Sánchez, Carlos Omar Ramos
Abstract:
In recent years, a wide variety of applications are developed with Support Vector Machines -SVM- methods and Artificial Neural Networks -ANN-. In general, these methods depend on intrusion knowledge databases such as KDD99, ISCX, and CAIDA among others. New classes of detectors are generated by machine learning techniques, trained and tested over network databases. Thereafter, detectors are employed to detect anomalies in network communication scenarios according to user’s connections behavior. The first detector based on training dataset is deployed in different real-world networks with mobile and non-mobile devices to analyze the performance and accuracy over static detection. The vulnerabilities are based on previous work in telemedicine apps that were developed on the research group. This paper presents the differences on detections results between some network scenarios by applying traditional detectors deployed with artificial neural networks and support vector machines.Keywords: anomaly detection, back-propagation neural networks, network intrusion detection systems, support vector machines
Procedia PDF Downloads 3595972 Facility Layout Improvement: Based on Safety and Health at Work and Standards of Food Production Facility
Authors: Asifa Fitriani, Galih Prakoso
Abstract:
This study aims to improve the design layout of a Micro, Small and Medium Enterprises (SMEs) to minimize material handling and redesigning the layout of production facilities based on the safety and health and standards of food production facilities. Problems layout in the one of chip making industry mushrooms in Indonesia is cross movement between work stations, work accidents, and the standard of facilities that do not conform with the standards of the food industry. Improvement layout design using CORELAP and 5S method to give recommendation and implementation of occupational health and safety standards of food production facilities. From the analysis, improved layout using CORELAP provide a smaller displacement distance is 155.84 meters from the initial displacement distance of 335.9 meters, and providing a shorter processing time than the original 112.726 seconds to 102.831 seconds. 5S method also has recommended the completion of occupational health and safety issues as well as the standard means of food production by changing the working environment better.Keywords: Layout Design, Corelap, 5S
Procedia PDF Downloads 5345971 Enhancement Method of Network Traffic Anomaly Detection Model Based on Adversarial Training With Category Tags
Authors: Zhang Shuqi, Liu Dan
Abstract:
For the problems in intelligent network anomaly traffic detection models, such as low detection accuracy caused by the lack of training samples, poor effect with small sample attack detection, a classification model enhancement method, F-ACGAN(Flow Auxiliary Classifier Generative Adversarial Network) which introduces generative adversarial network and adversarial training, is proposed to solve these problems. Generating adversarial data with category labels could enhance the training effect and improve classification accuracy and model robustness. FACGAN consists of three steps: feature preprocess, which includes data type conversion, dimensionality reduction and normalization, etc.; A generative adversarial network model with feature learning ability is designed, and the sample generation effect of the model is improved through adversarial iterations between generator and discriminator. The adversarial disturbance factor of the gradient direction of the classification model is added to improve the diversity and antagonism of generated data and to promote the model to learn from adversarial classification features. The experiment of constructing a classification model with the UNSW-NB15 dataset shows that with the enhancement of FACGAN on the basic model, the classification accuracy has improved by 8.09%, and the score of F1 has improved by 6.94%.Keywords: data imbalance, GAN, ACGAN, anomaly detection, adversarial training, data augmentation
Procedia PDF Downloads 1055970 A Machine Learning Approach for Detecting and Locating Hardware Trojans
Authors: Kaiwen Zheng, Wanting Zhou, Nan Tang, Lei Li, Yuanhang He
Abstract:
The integrated circuit industry has become a cornerstone of the information society, finding widespread application in areas such as industry, communication, medicine, and aerospace. However, with the increasing complexity of integrated circuits, Hardware Trojans (HTs) implanted by attackers have become a significant threat to their security. In this paper, we proposed a hardware trojan detection method for large-scale circuits. As HTs introduce physical characteristic changes such as structure, area, and power consumption as additional redundant circuits, we proposed a machine-learning-based hardware trojan detection method based on the physical characteristics of gate-level netlists. This method transforms the hardware trojan detection problem into a machine-learning binary classification problem based on physical characteristics, greatly improving detection speed. To address the problem of imbalanced data, where the number of pure circuit samples is far less than that of HTs circuit samples, we used the SMOTETomek algorithm to expand the dataset and further improve the performance of the classifier. We used three machine learning algorithms, K-Nearest Neighbors, Random Forest, and Support Vector Machine, to train and validate benchmark circuits on Trust-Hub, and all achieved good results. In our case studies based on AES encryption circuits provided by trust-hub, the test results showed the effectiveness of the proposed method. To further validate the method’s effectiveness for detecting variant HTs, we designed variant HTs using open-source HTs. The proposed method can guarantee robust detection accuracy in the millisecond level detection time for IC, and FPGA design flows and has good detection performance for library variant HTs.Keywords: hardware trojans, physical properties, machine learning, hardware security
Procedia PDF Downloads 1485969 Analytical Modeling of Drain Current for DNA Biomolecule Detection in Double-Gate Tunnel Field-Effect Transistor Biosensor
Authors: Ashwani Kumar
Abstract:
Abstract- This study presents an analytical modeling approach for analyzing the drain current behavior in Tunnel Field-Effect Transistor (TFET) biosensors used for the detection of DNA biomolecules. The proposed model focuses on elucidating the relationship between the drain current and the presence of DNA biomolecules, taking into account the impact of various device parameters and biomolecule characteristics. Through comprehensive analysis, the model offers insights into the underlying mechanisms governing the sensing performance of TFET biosensors, aiding in the optimization of device design and operation. A non-local tunneling model is incorporated with other essential models to accurately trace the simulation and modeled data. An experimental validation of the model is provided, demonstrating its efficacy in accurately predicting the drain current response to DNA biomolecule detection. The sensitivity attained from the analytical model is compared and contrasted with the ongoing research work in this area.Keywords: biosensor, double-gate TFET, DNA detection, drain current modeling, sensitivity
Procedia PDF Downloads 575968 Labview-Based System for Fiber Links Events Detection
Authors: Bo Liu, Qingshan Kong, Weiqing Huang
Abstract:
With the rapid development of modern communication, diagnosing the fiber-optic quality and faults in real-time is widely focused. In this paper, a Labview-based system is proposed for fiber-optic faults detection. The wavelet threshold denoising method combined with Empirical Mode Decomposition (EMD) is applied to denoise the optical time domain reflectometer (OTDR) signal. Then the method based on Gabor representation is used to detect events. Experimental measurements show that signal to noise ratio (SNR) of the OTDR signal is improved by 1.34dB on average, compared with using the wavelet threshold denosing method. The proposed system has a high score in event detection capability and accuracy. The maximum detectable fiber length of the proposed Labview-based system can be 65km.Keywords: empirical mode decomposition, events detection, Gabor transform, optical time domain reflectometer, wavelet threshold denoising
Procedia PDF Downloads 1235967 Reliability-Based Method for Assessing Liquefaction Potential of Soils
Authors: Mehran Naghizaderokni, Asscar Janalizadechobbasty
Abstract:
This paper explores probabilistic method for assessing the liquefaction potential of sandy soils. The current simplified methods for assessing soil liquefaction potential use a deterministic safety factor in order to determine whether liquefaction will occur or not. However, these methods are unable to determine the liquefaction probability related to a safety factor. A solution to this problem can be found by reliability analysis.This paper presents a reliability analysis method based on the popular certain liquefaction analysis method. The proposed probabilistic method is formulated based on the results of reliability analyses of 190 field records and observations of soil performance against liquefaction. The results of the present study show that confidence coefficient greater and smaller than 1 does not mean safety and/or liquefaction in cadence for liquefaction, and for assuring liquefaction probability, reliability based method analysis should be used. This reliability method uses the empirical acceleration attenuation law in the Chalos area to derive the probability density distribution function and the statistics for the earthquake-induced cyclic shear stress ratio (CSR). The CSR and CRR statistics are used in continuity with the first order and second moment method to calculate the relation between the liquefaction probability, the safety factor and the reliability index. Based on the proposed method, the liquefaction probability related to a safety factor can be easily calculated. The influence of some of the soil parameters on the liquefaction probability can be quantitatively evaluated.Keywords: liquefaction, reliability analysis, chalos area, civil and structural engineering
Procedia PDF Downloads 4705966 Indicator-Immobilized, Cellulose Based Optical Sensing Membrane for the Detection of Heavy Metal Ions
Authors: Nisha Dhariwal, Anupama Sharma
Abstract:
The synthesis of cellulose nanofibrils quaternized with 3‐chloro‐2‐hydroxypropyltrimethylammonium chloride (CHPTAC) in NaOH/urea aqueous solution has been reported. Xylenol Orange (XO) has been used as an indicator for selective detection of Sn (II) ions, by its immobilization on quaternized cellulose membrane. The effects of pH, reagent concentration and reaction time on the immobilization of XO have also been studied. The linear response, limit of detection, and interference of other metal ions have also been studied and no significant interference has been observed. The optical chemical sensor displayed good durability and short response time with negligible leaching of the reagent.Keywords: cellulose, chemical sensor, heavy metal ions, indicator immobilization
Procedia PDF Downloads 3015965 Surface Hole Defect Detection of Rolled Sheets Based on Pixel Classification Approach
Authors: Samira Taleb, Sakina Aoun, Slimane Ziani, Zoheir Mentouri, Adel Boudiaf
Abstract:
Rolling is a pressure treatment technique that modifies the shape of steel ingots or billets between rotating rollers. During this process, defects may form on the surface of the rolled sheets and are likely to affect the performance and quality of the finished product. In our study, we developed a method for detecting surface hole defects using a pixel classification approach. This work includes several steps. First, we performed image preprocessing to delimit areas with and without hole defects on the sheet image. Then, we developed the histograms of each area to generate the gray level membership intervals of the pixels that characterize each area. As we noticed an intersection between the characteristics of the gray level intervals of the images of the two areas, we finally performed a learning step based on a series of detection tests to refine the membership intervals of each area, and to choose the defect detection criterion in order to optimize the recognition of the surface hole.Keywords: classification, defect, surface, detection, hole
Procedia PDF Downloads 235964 Minimizing the Impact of Covariate Detection Limit in Logistic Regression
Authors: Shahadut Hossain, Jacek Wesolowski, Zahirul Hoque
Abstract:
In many epidemiological and environmental studies covariate measurements are subject to the detection limit. In most applications, covariate measurements are usually truncated from below which is known as left-truncation. Because the measuring device, which we use to measure the covariate, fails to detect values falling below the certain threshold. In regression analyses, it causes inflated bias and inaccurate mean squared error (MSE) to the estimators. This paper suggests a response-based regression calibration method to correct the deleterious impact introduced by the covariate detection limit in the estimators of the parameters of simple logistic regression model. Compared to the maximum likelihood method, the proposed method is computationally simpler, and hence easier to implement. It is robust to the violation of distributional assumption about the covariate of interest. In producing correct inference, the performance of the proposed method compared to the other competing methods has been investigated through extensive simulations. A real-life application of the method is also shown using data from a population-based case-control study of non-Hodgkin lymphoma.Keywords: environmental exposure, detection limit, left truncation, bias, ad-hoc substitution
Procedia PDF Downloads 2385963 Hybrid Anomaly Detection Using Decision Tree and Support Vector Machine
Authors: Elham Serkani, Hossein Gharaee Garakani, Naser Mohammadzadeh, Elaheh Vaezpour
Abstract:
Intrusion detection systems (IDS) are the main components of network security. These systems analyze the network events for intrusion detection. The design of an IDS is through the training of normal traffic data or attack. The methods of machine learning are the best ways to design IDSs. In the method presented in this article, the pruning algorithm of C5.0 decision tree is being used to reduce the features of traffic data used and training IDS by the least square vector algorithm (LS-SVM). Then, the remaining features are arranged according to the predictor importance criterion. The least important features are eliminated in the order. The remaining features of this stage, which have created the highest level of accuracy in LS-SVM, are selected as the final features. The features obtained, compared to other similar articles which have examined the selected features in the least squared support vector machine model, are better in the accuracy, true positive rate, and false positive. The results are tested by the UNSW-NB15 dataset.Keywords: decision tree, feature selection, intrusion detection system, support vector machine
Procedia PDF Downloads 2665962 Evaluation of Food Safety and Security Practices in Midday Meal Programmes in Rural Areas of Beed District
Authors: Nuzhat Sultana M. B.
Abstract:
Children are high-risk population in terms of food born illnesses. Food safety and security are the most important aspect of the success of midday meal programmes. Improper holding temperatures, cross-contamination and poor personal hygiene of food handlers are the main causes for the prevalence of pathogenic microbes in the food servicing areas. Two hundred and fifty preschool children in the age of 3 to 6 years from urban and rural anganwadies (pre school center) of Beed district were selected. Nutritional status of preschool children were assessed by anthropometrical and clinical measurement. The study assessed the food safety and security with the help of personal hygiene and other safety measures maintained by the food personnel working for midday meal programme, supplying mid meals to children in govt. anganwadies (pre school center). The hygiene level, sanitary condition and microbial quality of food and water, pathological health examination of food handlers were assessed with the help of checklist. A questionnaire was designed to evaluate knowledge, attitude, and practices of food handlers. Results of the study show that the nutritional and health status of rural and urban preschool children was very poor. Many of the food handlers were not aware of general knowledge and hygiene practices to be followed during food preparation areas. An intervention programme of education and importing training at workplaces has shown a positive impact on the outcome of safety and security practices and safe, hygienic practices of food handlers at workplace.Keywords: food, health, preschool children, safety, security
Procedia PDF Downloads 2035961 Assessment of Microbiological Feed Safety from Serbian Market from 2013 to 2017
Authors: Danijela Vuković, Radovan Čobanović, Milorad Plačkić
Abstract:
The expansion of population imposes increase in usage of animal meat, on whose quality directly affects the quality of the feed that the animals are fed with. The selection of raw materials, hygiene during the technological process, various hydrothermal treatments, methods of mixing etc. have an influence on the quality of feed. Monitoring of the feed is very important to obtain information about the quality of feed and the possible prevention of animal diseases which can lead to different human diseases outbreaks. In this study parameters of feed safety were monitored. According to the mentioned, the goal of this study was to evaluate microbiological safety of feed (feedstuffs and complete mixtures). Total number of analyzed samples was 4399. Analyzed feed samples were collected in various retail shops and feed factories during the period of 44 months (from January 2013 untill September 2017). Samples were analyzed on Salmonella spp. and Clostridium perfringens in quantity of 50g according to Serbian regulation. All microorganisms were tested according to ISO methodology: Salmonella spp. ISO 6579:2002 and Clostridium perfringens ISO 7937:2004. Out of 4399 analyzed feed samples 97,5% were satisfactory and 2,5% unsatisfactory concerning Salmonella spp. As far as Clostridium perfringens is concerned 100% of analyzed samples were satisfactory. The obtained results suggest that technological processing of feed in Serbia is at high level when it comes to safety and hygiene of the products, but there are still possibilities for progress and improvement which only can be reached trough the permanent monitoring of feed.Keywords: microbiology, safety, hygiene, feed
Procedia PDF Downloads 3065960 Developing an Accurate AI Algorithm for Histopathologic Cancer Detection
Authors: Leah Ning
Abstract:
This paper discusses the development of a machine learning algorithm that accurately detects metastatic breast cancer (cancer has spread elsewhere from its origin part) in selected images that come from pathology scans of lymph node sections. Being able to develop an accurate artificial intelligence (AI) algorithm would help significantly in breast cancer diagnosis since manual examination of lymph node scans is both tedious and oftentimes highly subjective. The usage of AI in the diagnosis process provides a much more straightforward, reliable, and efficient method for medical professionals and would enable faster diagnosis and, therefore, more immediate treatment. The overall approach used was to train a convolution neural network (CNN) based on a set of pathology scan data and use the trained model to binarily classify if a new scan were benign or malignant, outputting a 0 or a 1, respectively. The final model’s prediction accuracy is very high, with 100% for the train set and over 70% for the test set. Being able to have such high accuracy using an AI model is monumental in regard to medical pathology and cancer detection. Having AI as a new tool capable of quick detection will significantly help medical professionals and patients suffering from cancer.Keywords: breast cancer detection, AI, machine learning, algorithm
Procedia PDF Downloads 925959 Producer’s Liability for Defective Medical Devices in Light of Council Directive 85/374/EEC
Authors: Vera Lúcia Raposo
Abstract:
Medical devices are products used for medical purposes and aimed to operate in the human body, sometimes even inside the human body. Therefore, they can become particularly risky products, and some of the injuries caused by medical devices can have serious effects on the person’s health or body, even leading to death. Because they fit in the category of 'products' as described in Article 2 of Council Directive 85/374/EEC of 25 July 1985, concerning liability for defective products, the liability of the manufacturer of medical devices follows the rules of strict liability as long as one of the defects covered by the directive is at stake. The directive is not concerned with the product’s efficiency, but instead with the product’s safety, although in what regards medical devices (the same being valid for drugs) the two concepts frequently go together, and a lack of efficiency can result in a lack of safety. In the particular case of medical devices, the most debatable defects are the ones related with erroneous or non-existing information and the so-called development defects. This paper analyses how directive 85/374/EEC applies to medical devices, which defects are covered by its regulation, and which criteria can be used to evaluate the product’s safety. Some issues are still to be clarified, even though the decisions from the European Court of Justice and from national courts are valuable tools to understand the scope of directive 85/374/EEC in what regards medical devices.Keywords: medical devices, producer’s liability, product safety, strict liability
Procedia PDF Downloads 3255958 Enhancing Nursing Students’ Communication Using TeamSTEPPS to Improve Patient Safety
Authors: Stefanie Santorsola, Natasha Frank
Abstract:
Improving healthcare safety necessitates examining current trends and beliefs about safety and devising strategies to improve. Errors in healthcare continue to increase and be experienced by patients, which is preventable and directly correlated to a breakdown in healthcare communication. TeamSTEPPS is an evidence-based process designed to improve the quality and safety of healthcare by improving communication and team processes. Communication is at the core of effective team collaboration and is vital for patient safety. TeamSTEPPS offers insights and strategies for improving communication and teamwork and reducing preventable errors to create a safer healthcare environment for patients. The academic, clinical, and educational environment for nursing students is vital in preparing them for professional practice by providing them with foundational knowledge and abilities. This environment provides them with a prime opportunity to learn about errors and the importance of effective communication to enhance patient safety, as nursing students are often unprepared to deal with errors. Proactively introducing and discussing errors through a supportive culture during the nursing student’s academic beginnings has the potential to carry key concepts into practice to improve and enhance patient safety. TeamSTEPPS has been used globally and has collectively positively impacted improvements in patient safety and teamwork. A workshop study was introduced in winter 2023 of registered practical nurses (RPN) students bridging to the baccalaureate nursing program; the majority of the RPNs in the bridging program were actively employed in a variety of healthcare facilities during the semester. The workshop study did receive academic institution ethics board approval, and participants signed a consent form prior to participating in the study. The premise of the workshop was to introduce TeamSTEPPS and a variety of strategies to these students and have students keep a reflective journal to incorporate the presented communication strategies in their practicum setting and keep a reflective journal on the effect and outcomes of the strategies in the healthcare setting. Findings from the workshop study supported the objective of the project, resulting in students verbalizing notable improvements in team functioning in the healthcare environment resulting from the incorporation of enhanced communication strategies from TeamSTEPPS that they were introduced to in the workshop study. Implication for educational institutions is the potential of further advancing the safety literacy and abilities of nursing students in preparing them for entering the workforce and improving safety for patients.Keywords: teamstepps, education, patient safety, communication
Procedia PDF Downloads 625957 Collision Detection Algorithm Based on Data Parallelism
Authors: Zhen Peng, Baifeng Wu
Abstract:
Modern computing technology enters the era of parallel computing with the trend of sustainable and scalable parallelism. Single Instruction Multiple Data (SIMD) is an important way to go along with the trend. It is able to gather more and more computing ability by increasing the number of processor cores without the need of modifying the program. Meanwhile, in the field of scientific computing and engineering design, many computation intensive applications are facing the challenge of increasingly large amount of data. Data parallel computing will be an important way to further improve the performance of these applications. In this paper, we take the accurate collision detection in building information modeling as an example. We demonstrate a model for constructing a data parallel algorithm. According to the model, a complex object is decomposed into the sets of simple objects; collision detection among complex objects is converted into those among simple objects. The resulting algorithm is a typical SIMD algorithm, and its advantages in parallelism and scalability is unparalleled in respect to the traditional algorithms.Keywords: data parallelism, collision detection, single instruction multiple data, building information modeling, continuous scalability
Procedia PDF Downloads 291