Search results for: transient ischemic attack
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1207

Search results for: transient ischemic attack

427 Detection of Defects in CFRP by Ultrasonic IR Thermographic Method

Authors: W. Swiderski

Abstract:

In the paper introduced the diagnostic technique making possible the research of internal structures in composite materials reinforced fibres using in different applications. The main reason of damages in structures of these materials is the changing distribution of load in constructions in the lifetime. Appearing defect is largely complicated because of the appearance of disturbing of continuity of reinforced fibres, binder cracks and loss of fibres adhesiveness from binders. Defect in composite materials is usually more complicated than in metals. At present, infrared thermography is the most effective method in non-destructive testing composite. One of IR thermography methods used in non-destructive evaluation is vibrothermography. The vibrothermography is not a new non-destructive method, but the new solution in this test is use ultrasonic waves to thermal stimulation of materials. In this paper, both modelling and experimental results which illustrate the advantages and limitations of ultrasonic IR thermography in inspecting composite materials will be presented. The ThermoSon computer program for computing 3D dynamic temperature distribuions in anisotropic layered solids with subsurface defects subject to ulrasonic stimulation was used to optimise heating parameters in the detection of subsurface defects in composite materials. The program allows for the analysis of transient heat conduction and ultrasonic wave propagation phenomena in solids. The experiments at MIAT were fulfilled by means of FLIR SC 7600 IR camera. Ultrasonic stimulation was performed with the frequency from 15 kHz to 30 kHz with maximum power up to 2 kW.

Keywords: composite material, ultrasonic, infrared thermography, non-destructive testing

Procedia PDF Downloads 279
426 Developing a Secure Iris Recognition System by Using Advance Convolutional Neural Network

Authors: Kamyar Fakhr, Roozbeh Salmani

Abstract:

Alphonse Bertillon developed the first biometric security system in the 1800s. Today, many governments and giant companies are considering or have procured biometrically enabled security schemes. Iris is a kaleidoscope of patterns and colors. Each individual holds a set of irises more unique than their thumbprint. Every single day, giant companies like Google and Apple are experimenting with reliable biometric systems. Now, after almost 200 years of improvements, face ID does not work with masks, it gives access to fake 3D images, and there is no global usage of biometric recognition systems as national identity (ID) card. The goal of this paper is to demonstrate the advantages of iris recognition overall biometric recognition systems. It make two extensions: first, we illustrate how a very large amount of internet fraud and cyber abuse is happening due to bugs in face recognition systems and in a very large dataset of 3.4M people; second, we discuss how establishing a secure global network of iris recognition devices connected to authoritative convolutional neural networks could be the safest solution to this dilemma. Another aim of this study is to provide a system that will prevent system infiltration caused by cyber-attacks and will block all wireframes to the data until the main user ceases the procedure.

Keywords: biometric system, convolutional neural network, cyber-attack, secure

Procedia PDF Downloads 192
425 Analysis of Brain Signals Using Neural Networks Optimized by Co-Evolution Algorithms

Authors: Zahra Abdolkarimi, Naser Zourikalatehsamad,

Abstract:

Up to 40 years ago, after recognition of epilepsy, it was generally believed that these attacks occurred randomly and suddenly. However, thanks to the advance of mathematics and engineering, such attacks can be predicted within a few minutes or hours. In this way, various algorithms for long-term prediction of the time and frequency of the first attack are presented. In this paper, by considering the nonlinear nature of brain signals and dynamic recorded brain signals, ANFIS model is presented to predict the brain signals, since according to physiologic structure of the onset of attacks, more complex neural structures can better model the signal during attacks. Contribution of this work is the co-evolution algorithm for optimization of ANFIS network parameters. Our objective is to predict brain signals based on time series obtained from brain signals of the people suffering from epilepsy using ANFIS. Results reveal that compared to other methods, this method has less sensitivity to uncertainties such as presence of noise and interruption in recorded signals of the brain as well as more accuracy. Long-term prediction capacity of the model illustrates the usage of planted systems for warning medication and preventing brain signals.

Keywords: co-evolution algorithms, brain signals, time series, neural networks, ANFIS model, physiologic structure, time prediction, epilepsy suffering, illustrates model

Procedia PDF Downloads 251
424 Virtual Reality in COVID-19 Stroke Rehabilitation: Preliminary Outcomes

Authors: Kasra Afsahi, Maryam Soheilifar, S. Hossein Hosseini

Abstract:

Background: There is growing evidence that Cerebral Vascular Accident (CVA) can be a consequence of Covid-19 infection. Understanding novel treatment approaches are important in optimizing patient outcomes. Case: This case explores the use of Virtual Reality (VR) in the treatment of a 23-year-old COVID-positive female presenting with left hemiparesis in August 2020. Imaging showed right globus pallidus, thalamus, and internal capsule ischemic stroke. Conventional rehabilitation was started two weeks later, with virtual reality (VR) included. This game-based virtual reality (VR) technology developed for stroke patients was based on upper extremity exercises and functions for stroke. Physical examination showed left hemiparesis with muscle strength 3/5 in the upper extremity and 4/5 in the lower extremity. The range of motion of the shoulder was 90-100 degrees. The speech exam showed a mild decrease in fluency. Mild lower lip dynamic asymmetry was seen. Babinski was positive on the left. Gait speed was decreased (75 steps per minute). Intervention: Our game-based VR system was developed based on upper extremity physiotherapy exercises for post-stroke patients to increase the active, voluntary movement of the upper extremity joints and improve the function. The conventional program was initiated with active exercises, shoulder sanding for joint ROMs, walking shoulder, shoulder wheel, and combination movements of the shoulder, elbow, and wrist joints, alternative flexion-extension, pronation-supination movements, Pegboard and Purdo pegboard exercises. Also, fine movements included smart gloves, biofeedback, finger ladder, and writing. The difficulty of the game increased at each stage of the practice with progress in patient performances. Outcome: After 6 weeks of treatment, gait and speech were normal and upper extremity strength was improved to near normal status. No adverse effects were noted. Conclusion: This case suggests that VR is a useful tool in the treatment of a patient with covid-19 related CVA. The safety of newly developed instruments for such cases provides new approaches to improve the therapeutic outcomes and prognosis as well as increased satisfaction rate among patients.

Keywords: covid-19, stroke, virtual reality, rehabilitation

Procedia PDF Downloads 125
423 Stack Overflow Detection and Prevention on Operating Systems Using Machine Learning and Control-Flow Enforcement Technology

Authors: Cao Jiayu, Lan Ximing, Huang Jingjia, Burra Venkata Durga Kumar

Abstract:

The first virus to attack personal computers was born in early 1986, called C-Brain, written by a pair of Pakistani brothers. In those days, people still used dos systems, manipulating computers with the most basic command lines. In the 21st century today, computer performance has grown geometrically. But computer viruses are also evolving and escalating. We never stop fighting against security problems. Stack overflow is one of the most common security vulnerabilities in operating systems. It may result in serious security issues for an operating system if a program in it has a vulnerability with administrator privileges. Certain viruses change the value of specific memory through a stack overflow, allowing computers to run harmful programs. This study developed a mechanism to detect and respond to time whenever a stack overflow occurs. We demonstrate the effectiveness of standard machine learning algorithms and control flow enforcement techniques in predicting computer OS security using generating suspicious vulnerability functions (SVFS) and associated suspect areas (SAS). The method can minimize the possibility of stack overflow attacks occurring.

Keywords: operating system, security, stack overflow, buffer overflow, machine learning, control-flow enforcement technology

Procedia PDF Downloads 98
422 Frequency of Surgical Complications in Diabetic Patients after Kidney Transplantation

Authors: Hakan Duger, Alparslan Ersoy, Canan Ersoy

Abstract:

The improvement of surgical techniques in recent years has reduced the frequency of postoperative complications in kidney transplant recipients. Novel immunosuppressive agents have reduced rates of graft loss due to acute rejection to less than 1%. However, surgical complications may still lead graft loss and morbidity in recipients. Because of potent immunosuppression, impaired wound healing and complications are frequent after transplantation. We compared the frequency of post-operative surgical complications in diabetic and non-diabetic patients after kidney transplantation. Materials and Methods: This retrospective study conducted in consecutive patients (213 females, 285 males, median age 39 years) who underwent kidney transplant surgery at our center between December 2005 and October 2015. The patients were divided into two groups: diabetics (46 ± 10 year, 26 males, 16 females) and non-diabetics (39 ± 12 year, 259 males, 197 females). Characteristics of both groups were obtained from medical records. Results: We performed 225 living and 273 deceased donor transplantations. Renal replacement type was hemodialysis in 60.8%, peritoneal dialysis in 17.3% and preemptive in 12%. The mean body mass indexes of the recipients were 24 ± 4.6 kg/m², donor age was 48.6 ± 14.3 years, cold ischemic time was 11.3 ± 6.1 hours, surgery time was 4.9 ± 1.2 hours, and recovery time was 54±31 min. The mean hospitalization duration was 19.1 ± 13.5 days. The frequency of postoperative surgical complications was 43.8%. There was no significant difference between the ratios of post-operative surgical complications in non-diabetic (43.5%) and diabetic (47.4%) groups (p=0.648). Post-operative surgical complications were lymphocele (24.6% vs. 23.7%), delayed wound healing (13.2% vs. 7.6%), hematoma (7.8% vs.15.8 %), urinary leak (4.6% vs. 5.3%), hemorrhage (5.1% vs. 0%), hydronephrosis (2.2% vs. 0%), renal artery thrombosis (1.5% vs. 0%), renal vein thrombosis (1% vs. 2.6%), urinoma (0.7% vs. 0%), urinary obstruction (0.5% vs. 0%), ureteral stenosis (0.5% vs. 0%) and ureteral reflux (0.2% vs. 0%) in non-diabetic and diabetic groups, respectively (p > 0.05). Mean serum creatinine levels in non-diabetics and diabetics were 1.43 ± 0.81 and 1.61 ± 0.96 mg/dL at 1st month (p=0.198). At the 6th month, the mean graft and patient survival times in patients with post-operative surgical complications were significantly lower than in those who did not (162.9 ± 3.4 vs. 175.6 ± 1.5 days, p=0.008, and 171 ± 2.9 vs. 176.1 ± 1.6 days, p=0.047, respectively). However, patient survival durations of non-diabetic (173 ± 27) and diabetic (177 ± 13 day) groups were comparable (p=0.396). Conclusion: As a result, we concluded that surgical complications such as lymphocele and delayed wound healing were common and that frequency of these complications in diabetic recipients did not differ from non-diabetic one. All persons involved in the postoperative care of kidney transplant recipients be aware of the potential surgical complications for rapid diagnosis and treatment.

Keywords: kidney transplantation, diabetes mellitus, surgery, complication

Procedia PDF Downloads 161
421 Development of Biodegradable Plastic as Mango Fruit Bag

Authors: Andres M. Tuates Jr., Ofero A. Caparino

Abstract:

Plastics have achieved a dominant position in agriculture because of their transparency, lightness in weight, impermeability to water and their resistance to microbial attack. However, this generates a higher quantity of wastes that are difficult to dispose of by farmers. To address these problems, the project aim to develop and evaluate the biodegradable film for mango fruit bag during development. The PBS and starch were melt-blended in a twin-screw extruder and then blown into film extrusion machine. The physic-chemical-mechanical properties of biodegradable fruit bag were done following standard methods of test. Field testing of fruit bag was also conducted to evaluate its durability and efficiency field condition. The PHilMech-FiC fruit bag is made of biodegradable material measuring 6 x 8 inches with a thickness of 150 microns. The tensile strength is within the range of LDPE while the elongation is within the range of HDPE. It is projected that after thirty-six (36) weeks, the film will be totally degraded. Results of field testing show that the quality of harvested fruits using PHilMech-FiC biodegradable fruit bag in terms of percent marketable, non-marketable and export, peel color at the ripe stage, flesh color, TSS, oBrix, percent edible portion is comparable with the existing bagging materials such as Chinese brown paper bag and old newspaper.

Keywords: cassava starch, PBS, biodegradable, chemical, mechanical properties

Procedia PDF Downloads 258
420 Simulation of Laser Structuring by Three Dimensional Heat Transfer Model

Authors: Bassim Shaheen Bachy, Jörg Franke

Abstract:

In this study, a three dimensional numerical heat transfer model has been used to simulate the laser structuring of polymer substrate material in the Three-Dimensional Molded Interconnect Device (3D MID) which is used in the advanced multi-functional applications. A finite element method (FEM) transient thermal analysis is performed using APDL (ANSYS Parametric Design Language) provided by ANSYS. In this model, the effect of surface heat source was modeled with Gaussian distribution, also the effect of the mixed boundary conditions which consist of convection and radiation heat transfers have been considered in this analysis. The model provides a full description of the temperature distribution, as well as calculates the depth and the width of the groove upon material removal at different set of laser parameters such as laser power and laser speed. This study also includes the experimental procedure to study the effect of laser parameters on the depth and width of the removal groove metal as verification to the modeled results. Good agreement between the experimental and the model results is achieved for a wide range of laser powers. It is found that the quality of the laser structure process is affected by the laser scan speed and laser power. For a high laser structured quality, it is suggested to use laser with high speed and moderate to high laser power.

Keywords: laser structuring, simulation, finite element analysis, thermal modeling

Procedia PDF Downloads 328
419 Quantifying the Protein-Protein Interaction between the Ion-Channel-Forming Colicin A and the Tol Proteins by Potassium Efflux in E. coli Cells

Authors: Fadilah Aleanizy

Abstract:

Colicins are a family of bacterial toxins that kill Escherichia coli and other closely related species. The mode of action of colicins involves binding to an outer membrane receptor and translocation across the cell envelope, leading to cytotoxicity through specific targets. The mechanism of colicin cytotoxicity includes a non-specific endonuclease activity or depolarization of the cytoplasmic membrane by pore-forming activity. For Group A colicins, translocation requires an interaction between the N-terminal domain of the colicin and a series of membrane- bound and periplasmic proteins known as the Tol system (TolB, TolR, TolA, TolQ, and Pal and the active domain must be translocated through the outer membranes. Protein-protein interactions are intrinsic to virtually every cellular process. The transient protein-protein interactions of the colicin include the interaction with much more complicated assemblies during colicin translocation across the cellular membrane to its target. The potassium release assay detects variation in the K+ content of bacterial cells (K+in). This assays is used to measure the effect of pore-forming colicins such as ColA on an indicator organism by measuring the changes of the K+ concentration in the external medium (K+out ) that are caused by cell killing with a K+ selective electrode. One of the goals of this work is to employ a quantifiable in-vivo method to spot which Tol protein are more implicated in the interaction with colicin A as it is translocated to its target.

Keywords: K+ efflux, Colicin A, Tol-proteins, E. coli

Procedia PDF Downloads 385
418 Towards the Management of Cybersecurity Threats in Organisations

Authors: O. A. Ajigini, E. N. Mwim

Abstract:

Cybersecurity is the protection of computers, programs, networks, and data from attack, damage, unauthorised, unintended access, change, or destruction. Organisations collect, process and store their confidential and sensitive information on computers and transmit this data across networks to other computers. Moreover, the advent of internet technologies has led to various cyberattacks resulting in dangerous consequences for organisations. Therefore, with the increase in the volume and sophistication of cyberattacks, there is a need to develop models and make recommendations for the management of cybersecurity threats in organisations. This paper reports on various threats that cause malicious damage to organisations in cyberspace and provides measures on how these threats can be eliminated or reduced. The paper explores various aspects of protection measures against cybersecurity threats such as handling of sensitive data, network security, protection of information assets and cybersecurity awareness. The paper posits a model and recommendations on how to manage cybersecurity threats in organisations effectively. The model and the recommendations can then be utilised by organisations to manage the threats affecting their cyberspace. The paper provides valuable information to assist organisations in managing their cybersecurity threats and hence protect their computers, programs, networks and data in cyberspace. The paper aims to assist organisations to protect their information assets and data from cyberthreats as part of the contributions toward community engagement.

Keywords: confidential information, cyberattacks, cybersecurity, cyberspace, sensitive information

Procedia PDF Downloads 233
417 Detection of Elephant Endotheliotropic Herpes Virus in a Wild Asian Elephant Calf in Thailand by Using Real-Time PCR

Authors: Bopit Puyati, Anchittha Kaewchana, Nuntita Ruksachat

Abstract:

In January 2018, a male wild elephant, approximately 2 years old, was found dead in Phu Luang Wildlife Sanctuary, Loei province. The elephant was likely to die around 2 weeks earlier. The carcass was decayed without any signs of attack or bullet. No organs were removed. A deadly viral disease was suspected. Different organs including lung, liver, intestine and tongue were collected and submitted to the veterinary research and development center, Surin province for viral detection. The samples were then examined with real-time PCR for detecting U41 Major DNA binding protein (MDBP) gene and with conventional PCR for the presence of specific polymerase gene. We used tumor necrosis factor (TNF) gene as the internal control. In our real-time PCR, elephant endotheliotropic herpesvirus (EEHV) was recovered from lung, liver, and tongue whereas only tongue provided a positive result in the conventional PCR. All samples were positive with TNF gene detection. To our knowledge, this is the first report of EEHV detection in wild elephant in Thailand. EEHV surveillance in this wild population is strongly suggested. Linkage between EEHV in wild and domestic elephants should be further explored.

Keywords: elephant endotheliotropic herpes virus, PCR, Thailand, wild Asian elephant

Procedia PDF Downloads 122
416 Hydrogeophysical Investigations of Groundwater Resources and Demarcation of Saltwater-Freshwater Interface in Kilwa Kisiwani Island, Se Tanzania

Authors: Simon R. Melchioly, Ibrahimu C. Mjemah, Isaac M. Marobhe

Abstract:

The main objective of this research was to identify new potential sources of groundwater resources using geophysical methods and also to demarcate the saltwater - freshwater interface. Kilwa Kisiwani Island geologically is covered mostly by Quaternary alluvial sediments, sand, and gravel. The geophysical techniques employed during the research include Vertical Electrical Sounding (VES), Earth Resistivity Tomography (ERT), and Transient Electromagnetics (TEM). Two-dimensional interpolated geophysical results show that there exist freshwater lenses formations that are potential aquifers on the Island with resistivity values ranging from 11.68 Ωm to 46.71 Ωm. These freshwater lenses are underlain by formation with brackish water in which the resistivity values are varying between 3.89 Ωm and 1.6 Ωm. Saltwater with resistivity less than 1 Ωm is found at the bottom being overlaid by brackish saturated formation. VES resistivity results show that 89% (16 out of 18) of the VES sites are potential for groundwater resources drilling while TEM results indicate that 75% (12 out of 16) of TEM sites are potential for groundwater borehole drilling. The recommended drilling depths for potential sites in Kilwa Kisiwani Island show that the maximum depth is 25 m and the minimum being 10 m below ground surface. The aquifer structure in Kilwa Kisiwani Island is a shallow, unconfined freshwater lenses floating above the seawater and the maximum thickness of the aquifer is 25 m for few selected VES and TEM sites while the minimum thickness being 10 m.

Keywords: groundwater, hydrogeophysical, Kilwa Kisiwani, freshwater, saltwater, resistivity

Procedia PDF Downloads 176
415 Context Aware Anomaly Behavior Analysis for Smart Home Systems

Authors: Zhiwen Pan, Jesus Pacheco, Salim Hariri, Yiqiang Chen, Bozhi Liu

Abstract:

The Internet of Things (IoT) will lead to the development of advanced Smart Home services that are pervasive, cost-effective, and can be accessed by home occupants from anywhere and at any time. However, advanced smart home applications will introduce grand security challenges due to the increase in the attack surface. Current approaches do not handle cybersecurity from a holistic point of view; hence, a systematic cybersecurity mechanism needs to be adopted when designing smart home applications. In this paper, we present a generic intrusion detection methodology to detect and mitigate the anomaly behaviors happened in Smart Home Systems (SHS). By utilizing our Smart Home Context Data Structure, the heterogeneous information and services acquired from SHS are mapped in context attributes which can describe the context of smart home operation precisely and accurately. Runtime models for describing usage patterns of home assets are developed based on characterization functions. A threat-aware action management methodology, used to efficiently mitigate anomaly behaviors, is proposed at the end. Our preliminary experimental results show that our methodology can be used to detect and mitigate known and unknown threats, as well as to protect SHS premises and services.

Keywords: Internet of Things, network security, context awareness, intrusion detection

Procedia PDF Downloads 165
414 Dynamic Analysis of the Heat Transfer in the Magnetically Assisted Reactor

Authors: Tomasz Borowski, Dawid Sołoducha, Rafał Rakoczy, Marian Kordas

Abstract:

The application of magnetic field is essential for a wide range of technologies or processes (i.e., magnetic hyperthermia, bioprocessing). From the practical point of view, bioprocess control is often limited to the regulation of temperature at constant values favourable to microbial growth. The main aim of this study is to determine the effect of various types of electromagnetic fields (i.e., static or alternating) on the heat transfer in a self-designed magnetically assisted reactor. The experimental set-up is equipped with a measuring instrument which controlled the temperature of the liquid inside the container and supervised the real-time acquisition of all the experimental data coming from the sensors. Temperature signals are also sampled from generator of magnetic field. The obtained temperature profiles were mathematically described and analyzed. The parameters characterizing the response to a step input of a first-order dynamic system were obtained and discussed. For example, the higher values of the time constant means slow signal (in this case, temperature) increase. After the period equal to about five-time constants, the sample temperature nearly reached the asymptotic value. This dynamical analysis allowed us to understand the heating effect under the action of various types of electromagnetic fields. Moreover, the proposed mathematical description can be used to compare the influence of different types of magnetic fields on heat transfer operations.

Keywords: heat transfer, magnetically assisted reactor, dynamical analysis, transient function

Procedia PDF Downloads 153
413 The Evaluation of Children Who Had Chest Pain on Pediatric Emergency Department

Authors: Sabiha Sahin

Abstract:

Background: Chest pain is a common complaint in children visiting the emergency department (ED). True organic problems like cardiac disease are rare. We assess the etiology of chest pain among children visiting a Pediatric ED in Eskisehir Osmangazi University. Method: We prospectively evaluated of children with chest pain who visited our Pediatric ED between 1 January 2013 and 31 December 2014. Any case of trauma-associated chest pain was excluded from this study. Results: A total of 100 patients (54 boys, 46 girls), mean age: 11,86±3,51 (age range, 6–17 years) were enrolled into this study; 100 patients had chest radiograms (100 %). Pneumonia was identified in 15 patients. All patients had electrocardiogram study (100 %) and 16 of them showed abnormalities. Additional diagnostic tests were performed on all patients including complete blood count analysis, cardiac markers (CK-MB, Troponin I) and lactate (blood gas analysis). Echocardiograms were performed on all patients and 16 of them showed abnormality (five of majör abnormality). Panendoscopy was done in 20 patients, and gastroesophageal reflux was found in 12 (%12). Overall, idiopathic chest pain and myalgia was the most common diagnosis (32 %). Other associated disorders were asthma (12 %), panic attack (13 %). Conclusion: The most common cause of chest pain prompting a child to visit the ED is idiopathic chest pain. Careful physical examination can reveal important clues and save many unnecessary examinations.

Keywords: child, chest pain, pediatric emergency department, evaluation

Procedia PDF Downloads 234
412 The Application of Insects in Forensic Investigations

Authors: Shirin Jalili, Hadi Shirzad, Samaneh Nabavi, Somayeh Khanjani

Abstract:

Forensic entomology is the science of study and analysis of insects evidences to aid in criminal investigation. Being aware of the distribution, biology, ecology and behavior of insects, which are founded at crime scene can provide information about when, where and how the crime has been committed. It has many application in criminal investigations. Its main use is estimation of the minimum time after death in suspicious death. The close association between insects and corpses and the use of insects in criminal investigations is the subject of forensic entomology. Because insects attack to the decomposing corpse and spawning on it from the initial stages. Forensic scientists can estimate the postmortem index by studying the insects population and the developing larval stages.In addition, toxicological and molecular studies of these insects can reveal the cause of death or even the identity of a victim. It also be used to detect drugs and poisons, and determination of incident location. Gathering robust entomological evidences is made possible for experts by recent Techniques. They can provide vital information about death, corpse movement or burial, submersion interval, time of decapitation, identification of specific sites of trauma, post-mortem artefacts on the body, use of drugs, linking a suspect to the scene of a crime, sexual molestations and the identification of suspects.

Keywords: Forensic entomology, post mortem interval, insects, larvae

Procedia PDF Downloads 484
411 Contribution of Crime Scene and Autopsy Investigation to the Solving of the Case in the Case of Death as a Result of Self-Harm

Authors: Murat Mert, Yusuf Ozer, Fatih Kolay

Abstract:

Behaviour of giving harm to the body in literature has been named as “self-injury”, “self-mutilation” ve “self-harm”. “Self-injury”, or “self-mutilation” is generally used for the same meaning and mentioned as an action which is committed to the body itself directly. As is seen that alcohol and drug users have injured their bodies because of deprivation, whereas behaviour of self-injury in some societies is accepted as religious and cultural, it has nevertheless been diagnosed in people who have a borderline personality disorder, histrionic personality disorder, psychotic personality disorder and mood disorder. There has not been any direct self-murder tendency in people having self-harmed. However, death cases can be seen together with loss of consciousness depending on loss of blood by exceeding the limit in the course of injury action. 34- year old – male person who was alcohol addicted, having had a psycological treatment beforehand, had mutilated his small intestine together with fatty tissue by cutting his body with a razor-blade at the thought of insects strolling around the body (delirium tremens) due to deprivation attack and had died in the result of various cuts. In this study, crime scene investigation and death mechanism of the person having had self-harmed in a result of abstinence syndrome will be explained. Relevant criteria which differentiate this case from homicide will be examined.

Keywords: self-injury, autopsy, abstinence syndrome, CSI

Procedia PDF Downloads 70
410 A Novel PfkB Gene Cloning and Characterization for Expression in Potato Plants

Authors: Arfan Ali, Idrees Ahmad Nasir

Abstract:

Potato (Solanum tuberosum) is an important cash crop and popular vegetable in Pakistan and throughout the world. Cold storage of potatoes accelerates the conversion of starch into reduced sugars (glucose and fructose). This process causes dry mass and bitter taste in the potatoes that are not acceptable to end consumers. In the current study, the phosphofructokinase B gene was cloned into the pET-30 vector for protein expression and the pCambia-1301 vector for plant expression. Amplification of a 930bp product from an E. coli strain determined the successful isolation of the phosphofructokinase B gene. Restriction digestion using NcoI and BglII along with the amplification of the 930bp product using gene specific primers confirmed the successful cloning of the PfkB gene in both vectors. The protein was expressed as a His-PfkB fusion protein. Western blot analysis confirmed the presence of the 35 Kda PfkB protein when hybridized with anti-His antibodies. The construct Fani-01 was evaluated transiently using a histochemical gus assay. The appearance of blue color in the agroinfiltrated area of potato leaves confirmed the successful expression of construct Fani-01. Further, the area displaying gus expression was evaluated for PfkB expression using ELISA. Moreover, PfkB gene expression evaluated through transient expression determined successful gene expression and highlighted its potential utilization for stable expression in potato to reduce sweetening due to long-term storage.

Keywords: potato, Solanum tuberosum, transformation, PfkB, anti-sweetening

Procedia PDF Downloads 445
409 Analysis of the Effects of Vibrations on Tractor Drivers by Measurements With Wearable Sensors

Authors: Gubiani Rino, Nicola Zucchiatti, Da Broi Ugo, Bietresato Marco

Abstract:

The problem of vibrations in agriculture is very important due to the different types of machinery used for the different types of soil in which work is carried out. One of the most commonly used machines is the tractor, where the phenomenon has been studied for a long time by measuring the whole body and placing the sensor on the seat. However, this measurement system does not take into account the characteristics of the drivers, such as their body index (BMI), their gender (male, female) or the muscle fatigue they are subjected to, which is highly dependent on their age for example. The aim of the research was therefore to place sensors not only on the seat but along the spinal column to check the transmission of vibration on drivers with different BMI on different tractors and at different travel speeds and of different genders. The test was also done using wearable sensors such as a dynamometer applied to the muscles, the data of which was correlated with the vibrations produced by the tractor. Initial data show that even on new tractors with pneumatic seats, the vibrations attenuate little and are still correlated with the roughness of the track travelled and the forward speed. Another important piece of data are the root-mean square values referred to 8 hours (A(8)x,y,z) and the maximum transient vibration values (MTVVx,y,z) and, the latter, the MTVVz values were problematic (limiting factor in most cases) and always aggravated by the speed. The MTVVx values can be lowered by having a tyre-pressure adjustment system, able to properly adjust the tire pressure according to the specific situation (ground, speed) in which a tractor is operating.

Keywords: fatigue, effect vibration on health, tractor driver vibrations, vibration, muscle skeleton disorders

Procedia PDF Downloads 46
408 Investigation of the Inhibition Effect of 2,3-Diaminopyridine on Mild Steel Corrosion in Solution Simulating Water of Pores Concrete in Absence and Presence of Chloride Ions

Authors: Fatiha Benghanem, Mokhtar Berarma, Saida Keraghel, Ali Ourari

Abstract:

Corrosion is the result of the reaction between a material and its environment. Steel in concrete is protected from corrosion by a passive film promoted by concrete alkalinity. For the initiation of corrosion, this protective film must be destroyed and this can be mainly done in two ways: by the attack of chlorides on the steel or by carbonation of the cover concrete due the reaction with carbon dioxide, which causes reduction in the alkalinity of concrete. The literature reports several ways to decrease or to prevent reinforcement corrosion. Among them, the use of corrosion inhibitors has been an envisaged solution. Two approaches are generally used to evaluate the efficiency of inhibitors for concrete application; one uses simulated pore solution testing , and the other uses actual concrete or mortar specimens. Both methods are some times used in conjunction. The aim of this study is to investigate the use of 2,3-diaminopyridine as a corrosion inhibitors of steel in alkaline media which simulate the electrolyte in the concrete pores. The effectiveness of this compound as corrosion inhibitor was investigated by measuring the corrosion potentials, the polarization curves and the corrosion current densities of steel with and without chlorides. The study of corrosion inhibition by this compound led to the conclusion that he has low rates of inhibition in the absence of aggressive ions and high rates in their presence. This type of organic compounds are promoting for the protection of armatures in concrete.

Keywords: corrosion, inhibitors, mild steel, conjunction

Procedia PDF Downloads 418
407 Surface Pressure Distribution of a Flapped-Airfoil for Different Momentum Injection at the Leading Edge

Authors: Mohammad Mashud, S. M. Nahid Hasan

Abstract:

The aim of the research work is to modify the NACA 4215 airfoil with flap and rotary cylinder at the leading edge of the airfoil and experimentally study the static pressure distribution over the airfoil completed with flap and leading-edge vortex generator. In this research, NACA 4215 wing model has been constructed by generating the profile geometry using the standard equations and design software such as AutoCAD and SolidWorks. To perform the experiment, three wooden models are prepared and tested in subsonic wind tunnel. The experiments were carried out in various angles of attack. Flap angle and momentum injection rate are changed to observe the characteristics of pressure distribution. In this research, a new concept of flow separation control mechanism has been introduced to improve the aerodynamic characteristics of airfoil. Control of flow separation over airfoil which experiences a vortex generator (rotating cylinder) at the leading edge of airfoil is experimentally simulated under the effects of momentum injection. The experimental results show that the flow separation control is possible by the proposed mechanism, and benefits can be achieved by momentum injection technique. The wing performance is significantly improved due to control of flow separation by momentum injection method.

Keywords: airfoil, momentum injection, flap, pressure distribution

Procedia PDF Downloads 121
406 Soret and Dufour's Effects on Mixed Convection Unsteady MHD Boundary Layer Flow over a Stretching Sheet Embedded in a Porous Medium with Chemically Reactive Spices

Authors: Deva Kanta Phukan

Abstract:

An investigation is made to carry out to study the thermal-diffusion and diffusion thermo-effects in hydro-magnetic unsteady flow by a mixed convection boundary layer past an impermeable vertical stretching sheet embedded in a conducting fluid-saturated porous medium in the presence of a chemical reaction effect. The velocity of stretching surface, the surface temperature and the concentration are assumed to vary linearly with the distance along the surface. The governing partial differential equations are transformed in to self similar unsteady equations using similarity transformations and solved numerically by the Runge kutta fourth order scheme in association with the shooting method for the whole transient domain from the initial state to the final steady state flow. Numerical results for the velocity, temperature, the concentration, the skin friction , and the Nusselt and Sherwood numbers are shown graphically for various flow parameters. The results reveal that there is a smooth transition of flow from unsteady state to the final steady state. A special case of our results is in good agreement with an earlier published work.

Keywords: heat and mass transfer, boundary layer flow, porous media, magnetic field, Soret number, Dufour’s number

Procedia PDF Downloads 423
405 A Functional Analysis of the 2016 United States Presidential Debates through the Application of the Functional Theory of Political Campaign Discourse

Authors: Maryam Vaezi

Abstract:

In this study, the Functional Theory of Political Campaign Discourse has been applied in order to investigate the 2016 Clinton-Trump presidential debates. All three kinds of utterances (acclaims, attacks, and defenses) were produced by the candidates supporting the usefulness of the Functional Theory of Political Campaign Discourse for the analysis of the presidential debates as a type of political discourse. Attacks comprised 45% of the candidates’ utterances, followed by acclaims at 33%; defenses were the least common function at 22%. The candidate from the Democratic Party, Hillary Clinton, acclaimed more, whereas the Republican Party presidential candidate, Donald Trump, attacked more. Simple denial was the most common form of defense used by the candidates. Both candidates directed more of their utterances to policy (past deeds, future plans, and general goals) than character (personal qualities, leadership abilities, and ideals). Analyzing debates in terms of the functions performed by the candidates to increase their desirability and chance of winning the election, can lead to a better understanding of these significant political events as well as other forms of political discourse.

Keywords: acclaim, attack, defend, character, Democratic Party, Donald Trump, Hillary Clinton, policy, presidential debates, Republican Party

Procedia PDF Downloads 310
404 Two-Stage Launch Vehicle Trajectory Modeling for Low Earth Orbit Applications

Authors: Assem M. F. Sallam, Ah. El-S. Makled

Abstract:

This paper presents a study on the trajectory of a two stage launch vehicle. The study includes dynamic responses of motion parameters as well as the variation of angles affecting the orientation of the launch vehicle (LV). LV dynamic characteristics including state vector variation with corresponding altitude and velocity for the different LV stages separation, as well as the angle of attack and flight path angles are also discussed. A flight trajectory study for the drop zone of first stage and the jettisoning of fairing are introduced in the mathematical modeling to study their effect. To increase the accuracy of the LV model, atmospheric model is used taking into consideration geographical location and the values of solar flux related to the date and time of launch, accurate atmospheric model leads to enhancement of the calculation of Mach number, which affects the drag force over the LV. The mathematical model is implemented on MATLAB based software (Simulink). The real available experimental data are compared with results obtained from the theoretical computation model. The comparison shows good agreement, which proves the validity of the developed simulation model; the maximum error noticed was generally less than 10%, which is a result that can lead to future works and enhancement to decrease this level of error.

Keywords: launch vehicle modeling, launch vehicle trajectory, mathematical modeling, Matlab- Simulink

Procedia PDF Downloads 259
403 Performance Analysis of Traffic Classification with Machine Learning

Authors: Htay Htay Yi, Zin May Aye

Abstract:

Network security is role of the ICT environment because malicious users are continually growing that realm of education, business, and then related with ICT. The network security contravention is typically described and examined centrally based on a security event management system. The firewalls, Intrusion Detection System (IDS), and Intrusion Prevention System are becoming essential to monitor or prevent of potential violations, incidents attack, and imminent threats. In this system, the firewall rules are set only for where the system policies are needed. Dataset deployed in this system are derived from the testbed environment. The traffic as in DoS and PortScan traffics are applied in the testbed with firewall and IDS implementation. The network traffics are classified as normal or attacks in the existing testbed environment based on six machine learning classification methods applied in the system. It is required to be tested to get datasets and applied for DoS and PortScan. The dataset is based on CICIDS2017 and some features have been added. This system tested 26 features from the applied dataset. The system is to reduce false positive rates and to improve accuracy in the implemented testbed design. The system also proves good performance by selecting important features and comparing existing a dataset by machine learning classifiers.

Keywords: false negative rate, intrusion detection system, machine learning methods, performance

Procedia PDF Downloads 103
402 Computational Fluid Dynamics Simulation of Reservoir for Dwell Time Prediction

Authors: Nitin Dewangan, Nitin Kattula, Megha Anawat

Abstract:

Hydraulic reservoir is the key component in the mobile construction vehicles; most of the off-road earth moving construction machinery requires bigger side hydraulic reservoirs. Their reservoir construction is very much non-uniform and designers used such design to utilize the space available under the vehicle. There is no way to find out the space utilization of the reservoir by oil and validity of design except virtual simulation. Computational fluid dynamics (CFD) helps to predict the reservoir space utilization by vortex mapping, path line plots and dwell time prediction to make sure the design is valid and efficient for the vehicle. The dwell time acceptance criteria for effective reservoir design is 15 seconds. The paper will describe the hydraulic reservoir simulation which is carried out using CFD tool acuSolve using automated mesh strategy. The free surface flow and moving reference mesh is used to define the oil flow level inside the reservoir. The first baseline design is not able to meet the acceptance criteria, i.e., dwell time below 15 seconds because the oil entry and exit ports were very close. CFD is used to redefine the port locations for the reservoir so that oil dwell time increases in the reservoir. CFD also proposed baffle design the effective space utilization. The final design proposed through CFD analysis is used for physical validation on the machine.

Keywords: reservoir, turbulence model, transient model, level set, free-surface flow, moving frame of reference

Procedia PDF Downloads 131
401 Artificial Intelligence in Penetration Testing of a Connected and Autonomous Vehicle Network

Authors: Phillip Garrad, Saritha Unnikrishnan

Abstract:

The recent popularity of connected and autonomous vehicles (CAV) corresponds with an increase in the risk of cyber-attacks. These cyber-attacks have been instigated by both researchers or white-coat hackers and cyber-criminals. As Connected Vehicles move towards full autonomy, the impact of these cyber-attacks also grows. The current research details challenges faced in cybersecurity testing of CAV, including access and cost of the representative test setup. Other challenges faced are lack of experts in the field. Possible solutions to how these challenges can be overcome are reviewed and discussed. From these findings, a software simulated CAV network is established as a cost-effective representative testbed. Penetration tests are then performed on this simulation, demonstrating a cyber-attack in CAV. Studies have shown Artificial Intelligence (AI) to improve runtime, increase efficiency and comprehensively cover all the typical test aspects in penetration testing in other industries. There is an attempt to introduce similar AI models to the software simulation. The expectation from this implementation is to see similar improvements in runtime and efficiency for the CAV model. If proven to be an effective means of penetration test for CAV, this methodology may be used on a full CAV test network.

Keywords: cybersecurity, connected vehicles, software simulation, artificial intelligence, penetration testing

Procedia PDF Downloads 84
400 Numerical Simulation of Lifeboat Launching Using Overset Meshing

Authors: Alok Khaware, Vinay Kumar Gupta, Jean Noel Pederzani

Abstract:

Lifeboat launching from marine vessel or offshore platform is one of the important areas of research in offshore applications. With the advancement of computational fluid dynamic simulation (CFD) technology to solve fluid induced motions coupled with Six Degree of Freedom (6DOF), rigid body dynamics solver, it is now possible to predict the motion of the lifeboat precisely in different challenging conditions. Traditionally dynamic remeshing approach is used to solve this kind of problems, but remeshing approach has some bottlenecks to control good quality mesh in transient moving mesh cases. In the present study, an overset method with higher-order interpolation is used to simulate a lifeboat launched from an offshore platform into calm water, and volume of fluid (VOF) method is used to track free surface. Overset mesh consists of a set of overlapping component meshes, which allows complex geometries to be meshed with lesser effort. Good quality mesh with local refinement is generated at the beginning of the simulation and stay unchanged throughout the simulation. Overset mesh accuracy depends on the precise interpolation technique; the present study includes a robust and accurate least square interpolation method and results obtained with overset mesh shows good agreement with experiment.

Keywords: computational fluid dynamics, free surface flow, lifeboat launching, overset mesh, volume of fluid

Procedia PDF Downloads 252
399 Behavioral Responses of Coccinella septempunctata and Diaeretiella rapae toward Semiochemicals and Plant Extract

Authors: Muhammad Tariq, Bushra Siddique, Muhammad Naeem, Asim Gulzar

Abstract:

The chemical ecology of natural enemies can play a pivotal role in any Integrated Pest Management (IPM) program. Different chemical cues help to correspond in the diversity of associations between prey and host plant species. Coccinellaseptempunctata and Diaeretiellarapae have the abilities to explore several chemical cues released by plants under herbivore attack that may enhance their efficiency of foraging. In this study, the behavioral responses of Coccinellaseptempunctata and Diaeretiellarapae were examined under the application of two semiochemicals and a plant extract and their combinations using four-arm olfactometer. The bioassay was consists of a pairwise treatment comparison. Data pertaining to the preference of C. septempunctata and D. rapae after treatment application were recorded and analyzed statistically. The mean number of entries and time spent of Coccinellaseptempunctata and D. rapaewere greater in arms treated with E-β-Farnesene. However, the efficacy of E-β-Farnesene was enhanced when combined with β-pinene. Thus, the mean number of entries and time spent of C. septempunctata and D. rapaewere highest in arms treated with the combination of E-β-Farnesene x β-pinene as compared with other treatments. The current work has demonstrated that the insect-derived semiochemicals may enhance the efficacy of natural enemies when applied in combination.

Keywords: olfectometer, parasitoid, predator, preference

Procedia PDF Downloads 115
398 On the Use of Machine Learning for Tamper Detection

Authors: Basel Halak, Christian Hall, Syed Abdul Father, Nelson Chow Wai Kit, Ruwaydah Widaad Raymode

Abstract:

The attack surface on computing devices is becoming very sophisticated, driven by the sheer increase of interconnected devices, reaching 50B in 2025, which makes it easier for adversaries to have direct access and perform well-known physical attacks. The impact of increased security vulnerability of electronic systems is exacerbated for devices that are part of the critical infrastructure or those used in military applications, where the likelihood of being targeted is very high. This continuously evolving landscape of security threats calls for a new generation of defense methods that are equally effective and adaptive. This paper proposes an intelligent defense mechanism to protect from physical tampering, it consists of a tamper detection system enhanced with machine learning capabilities, which allows it to recognize normal operating conditions, classify known physical attacks and identify new types of malicious behaviors. A prototype of the proposed system has been implemented, and its functionality has been successfully verified for two types of normal operating conditions and further four forms of physical attacks. In addition, a systematic threat modeling analysis and security validation was carried out, which indicated the proposed solution provides better protection against including information leakage, loss of data, and disruption of operation.

Keywords: anti-tamper, hardware, machine learning, physical security, embedded devices, ioT

Procedia PDF Downloads 132