Search results for: mutation detection
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 3644

Search results for: mutation detection

3584 Intrusion Detection and Prevention System (IDPS) in Cloud Computing Using Anomaly-Based and Signature-Based Detection Techniques

Authors: John Onyima, Ikechukwu Ezepue

Abstract:

Virtualization and cloud computing are among the fast-growing computing innovations in recent times. Organisations all over the world are moving their computing services towards the cloud this is because of its rapid transformation of the organization’s infrastructure and improvement of efficient resource utilization and cost reduction. However, this technology brings new security threats and challenges about safety, reliability and data confidentiality. Evidently, no single security technique can guarantee security or protection against malicious attacks on a cloud computing network hence an integrated model of intrusion detection and prevention system has been proposed. Anomaly-based and signature-based detection techniques will be integrated to enable the network and its host defend themselves with some level of intelligence. The anomaly-base detection was implemented using the local deviation factor graph-based (LDFGB) algorithm while the signature-based detection was implemented using the snort algorithm. Results from this collaborative intrusion detection and prevention techniques show robust and efficient security architecture for cloud computing networks.

Keywords: anomaly-based detection, cloud computing, intrusion detection, intrusion prevention, signature-based detection

Procedia PDF Downloads 301
3583 Water Use Efficiency of Sunflower Genotypes Under Drip Irrigation

Authors: Adel M. Mahmoud

Abstract:

This Investigation was conducted to determine the productivity and water use efficiency for new sunflower genotypes. Ten sunflower genotypes were evaluated under drip irrigation using two treatments of. Results indicate that decreasing the amount of irrigation water from 1500 to 1130 mm/hectar significantly reduced all studied traits. Mutation (M1-63) surpassed all the other one genotypes in seed yield and WUE. Lines which gave the highest yield of the seed have water use efficiency under drought conditions higher than water use efficiency under normal irrigation. The lowest depression in seed yield due to drought conditions has been registered for Line 20, Line M1-63 and Sakha 53 genotypes (11 , 18 and 16 %, respectively). Genotypes (Line 20 , Line M1-63 and Sakha 53) are more tolerant to drought than others and we can used its in breeding program to develop sunflower hybrids suitable for cultivation under drought condition.

Keywords: sunflower genotypes, water use efficiency, mutation, inbred lines

Procedia PDF Downloads 376
3582 Survey on Malware Detection

Authors: Doaa Wael, Naswa Abdelbaky

Abstract:

Malware is malicious software that is built to cause destructive actions and damage information systems and networks. Malware infections increase rapidly, and types of malware have become more sophisticated, which makes the malware detection process more difficult. On the other side, the Internet of Things IoT technology is vulnerable to malware attacks. These IoT devices are always connected to the internet and lack security. This makes them easy for hackers to access. These malware attacks are becoming the go-to attack for hackers. Thus, in order to deal with this challenge, new malware detection techniques are needed. Currently, building a blockchain solution that allows IoT devices to download any file from the internet and to verify/approve whether it is malicious or not is the need of the hour. In recent years, blockchain technology has stood as a solution to everything due to its features like decentralization, persistence, and anonymity. Moreover, using blockchain technology overcomes some difficulties in malware detection and improves the malware detection ratio over-than the techniques that do not utilize blockchain technology. In this paper, we study malware detection models which are based on blockchain technology. Furthermore, we elaborate on the effect of blockchain technology in malware detection, especially in the android environment.

Keywords: malware analysis, blockchain, malware attacks, malware detection approaches

Procedia PDF Downloads 84
3581 Relationship of Epidermal Growth Factor Receptor Gene Mutations Andserum Levels of Ligands in Non-Small Cell Lung Carcinoma Patients

Authors: Abdolamir Allameh, Seyyed Mortaza Haghgoo, Adnan Khosravi, Esmaeil Mortaz, Mihan Pourabdollah-Toutkaboni, Sharareh Seifi

Abstract:

Non-Small Cell Lung Carcinoma (NSCLC) is associated with a number of gene mutations in epidermal growth factor receptor (EGFR). The prognostic significance of mutations in exons 19 and 21, together with serum levels of EGFR, amphiregulin (AR), and Transforming Growth Factor-alpha (TGF-α) are implicated in diagnosis and treatment. The aim of this study was to examine the relationship of EGFR mutations in selected exons with the expression of relevant ligands in sera samples of NSCLC patients. For this, a group of NSCLC patients (n=98) referred to the hospital for lung surgery with a mean age of 59±10.5 were enrolled (M/F: 75/23). Blood specimen was collected from each patient. Besides, formalin fixed paraffin embedded tissues were processed for DNA extraction. Gene mutations in exons 19 and 21 were detected by direct sequencing, following DNA amplification which was done by PCR (Polymerase Chain Reaction). Also, serum levels of EGFR, AR, and TGF-α were measured by ELISA. The results of our study show that EGFR mutations were present in 37% of Iranian NSCLC patients. The most frequently identified mutations were deletions in exon 19 (72.2%) and substitutions in exon 21 (27.8%). The most frequently identified alteration, which is considered as a rare mutation, was the E872K mutation in exon 21, which was found in 90% (9 out of 10) cases. EGFR mutation detected in exon 21 was significantly (P<0.05) correlated with the levels of its ligands, EGFR and TGF-α in serum samples. Furthermore, it was found that increased serum AR (>3pg/ml) and TGF-α (>10.5 pg/ml) were associated with shorter overall survival (P<0.05). The results clearly showed a close relationship between EGFR mutations and serum EGFR and serum TGF-α. Increased serum EGFR was associated with TGF-α and AR and linked to poor prognosis of NSCLC. These findings are implicated in clinical decision-making related to EGFR-Tyrosine kinase inhibitors (TKIs).

Keywords: lung cancer, Iranian patients, epidermal growth factor, mutation, prognosis

Procedia PDF Downloads 76
3580 Assessing the Correlation between miR-141 Expression, Common K-Ras Gene Mutations, and Their Impact on Prognosis in Colorectal Cancer Tissue of Iranian Patients

Authors: Shima Behzadi

Abstract:

Background: In many human malignant tumors, microRNA expression is aberrant. This study investigates miR-141 as a prognostic marker in colorectal cancer with K-Ras mutation. Materials and methods: In this case-control study, 100 patients, mostly over the age of 50, who were diagnosed with colorectal cancer were selected. The pathology department of the Mostoufi Pathobiology and Genetics Laboratory in Tehran confirmed the presence of colorectal cancer in samples of paraffin-embedded colon tissue. The case group was composed of patients with codon 12 and 13 mutations in exon 2 of the K-Ras gene, while tumor samples of individuals without these mutations in exon 2 of the K-Ras gene were selected as the control group, with patient consent. The changes in the expression of miR-141 were examined in both groups. Results: The study found that 20% of the patients tested positive for codon 12 mutation, and 10% of patients had codon 13 mutation. As a result, in 30 cases, there was a higher level of miR-141 expression. The miR-141 gene expression level in K-Ras positive tumor samples was 1.5 times higher than its expression level in K-Ras negative samples. This increase in expression was statistically significant, with a p-value of less than 0.001, indicating that the observed results are highly statistically significant. Conclusion: The study revealed that the incidence of typical K-Ras gene mutations among the colorectal cancer patients in the sample matches the national average in Iran. Additionally, the expression of miR-141 can serve as a useful biomarker to aid in the prognosis of colorectal cancer.

Keywords: colorectal cancer, K-Ras gene, miR-141 marker, real time PCR, electrophoresis

Procedia PDF Downloads 39
3579 A Study of Effective Stereo Matching Method for Long-Wave Infrared Camera Module

Authors: Hyun-Koo Kim, Yonghun Kim, Yong-Hoon Kim, Ju Hee Lee, Myungho Song

Abstract:

In this paper, we have described an efficient stereo matching method and pedestrian detection method using stereo types LWIR camera. We compared with three types stereo camera algorithm as block matching, ELAS, and SGM. For pedestrian detection using stereo LWIR camera, we used that SGM stereo matching method, free space detection method using u/v-disparity, and HOG feature based pedestrian detection. According to testing result, SGM method has better performance than block matching and ELAS algorithm. Combination of SGM, free space detection, and pedestrian detection using HOG features and SVM classification can detect pedestrian of 30m distance and has a distance error about 30 cm.

Keywords: advanced driver assistance system, pedestrian detection, stereo matching method, stereo long-wave IR camera

Procedia PDF Downloads 410
3578 mKDNAD: A Network Flow Anomaly Detection Method Based On Multi-teacher Knowledge Distillation

Authors: Yang Yang, Dan Liu

Abstract:

Anomaly detection models for network flow based on machine learning have poor detection performance under extremely unbalanced training data conditions and also have slow detection speed and large resource consumption when deploying on network edge devices. Embedding multi-teacher knowledge distillation (mKD) in anomaly detection can transfer knowledge from multiple teacher models to a single model. Inspired by this, we proposed a state-of-the-art model, mKDNAD, to improve detection performance. mKDNAD mine and integrate the knowledge of one-dimensional sequence and two-dimensional image implicit in network flow to improve the detection accuracy of small sample classes. The multi-teacher knowledge distillation method guides the train of the student model, thus speeding up the model's detection speed and reducing the number of model parameters. Experiments in the CICIDS2017 dataset verify the improvements of our method in the detection speed and the detection accuracy in dealing with the small sample classes.

Keywords: network flow anomaly detection (NAD), multi-teacher knowledge distillation, machine learning, deep learning

Procedia PDF Downloads 119
3577 Rapid Detection System of Airborne Pathogens

Authors: Shigenori Togashi, Kei Takenaka

Abstract:

We developed new processes which can collect and detect rapidly airborne pathogens such as the avian flu virus for the pandemic prevention. The fluorescence antibody technique is known as one of high-sensitive detection methods for viruses, but this needs up to a few hours to bind sufficient fluorescence dyes to viruses for detection. In this paper, we developed a mist-labeling can detect substitution viruses in a short time to improve the binding rate of fluorescent dyes and substitution viruses by the micro reaction process. Moreover, we developed the rapid detection system with the above 'mist labeling'. The detection system set with a sampling bag collecting patient’s breath and a cartridge can detect automatically pathogens within 10 minutes.

Keywords: viruses, sampler, mist, detection, fluorescent dyes, microreaction

Procedia PDF Downloads 473
3576 Application of Laser Spectroscopy for Detection of Actinides and Lanthanides in Solutions

Authors: Igor Izosimov

Abstract:

This work is devoted to applications of the Time-resolved laser-induced luminescence (TRLIF) spectroscopy and time-resolved laser-induced chemiluminescence spectroscopy for detection of lanthanides and actinides. Results of the experiments on Eu, Sm, U, and Pu detection in solutions are presented. The limit of uranyl detection (LOD) in urine in our TRLIF experiments was up to 5 pg/ml. In blood plasma LOD was 0.1 ng/ml and after mineralization was up to 8pg/ml – 10pg/ml. In pure solution, the limit of detection of europium was 0.005ng/ml and samarium, 0.07ng/ml. After addition urine, the limit of detection of europium was 0.015 ng/ml and samarium, 0.2 ng/ml. Pu, Np, and some U compounds do not produce direct luminescence in solutions, but when excited by laser radiation, they can induce chemiluminescence of some chemiluminogen (luminol in our experiments). It is shown that multi-photon scheme of chemiluminescence excitation makes chemiluminescence not only a highly sensitive but also a highly selective tool for the detection of lanthanides/actinides in solutions.

Keywords: actinides/lanthanides detection, laser spectroscopy with time resolution, luminescence/chemiluminescence, solutions

Procedia PDF Downloads 331
3575 NprRX Regulation on Surface Spreading Motility in Bacillus cereus

Authors: Yan-Shiang Chiou, Yi-Huang Hsueh

Abstract:

Bacillus cereus is a foodborne pathogen that causes two types of foodborne illness, the emetic and diarrheal syndromes. B. cereus consistently ranks among the top three among bacterial foodborne outbreaks in the ten years of 2001 to 2010 in Taiwan. Foodborne outbreak caused by B. cereus has been increased, and recently it ranks second foodborne pathogen after Vibrio parahaemolyticus. This pathogen is difficult to control due to its ubiquitousness in the environment, the psychrotrophic nature of many strains, and the heat resistance of their spores. Because complete elimination of biofilms is difficult, a better understanding of the molecular mechanisms of biofilm formation by B. cereus will help to develop better strategies to control this pathogen. Surface translocation can be an important factor in biofilm formation. In B. cereus, NprR is a quorum sensor, and its apo NprR is a dimer and changes to a tetramer in the presence of NprX. The small peptide NprX may induce conformational change allowing the apo dimer to switch to an active tetramer specifically recognizing target DNA sequences. Our result showed that mutation of nprRX causes surface spreading deficiency. Mutation of flagella, pili and surfactant genes (flgAB, bcpAB, krsABC), did not abolish spreading motility. Under nprRX mutant, mutation of spo0A restored the spreading deficiency. This suggests that spreading motility is not related surfactant, pili and flagella but other unknown mechanism and Spo0A, a sporulation initiation protein, inhibits spreading motility.

Keywords: Bacillus cereus, nprRX, spo0A, spreading motility

Procedia PDF Downloads 254
3574 Improvements in OpenCV's Viola Jones Algorithm in Face Detection–Skin Detection

Authors: Jyoti Bharti, M. K. Gupta, Astha Jain

Abstract:

This paper proposes a new improved approach for false positives filtering of detected face images on OpenCV’s Viola Jones Algorithm In this approach, for Filtering of False Positives, Skin Detection in two colour spaces i.e. HSV (Hue, Saturation and Value) and YCrCb (Y is luma component and Cr- red difference, Cb- Blue difference) is used. As a result, it is found that false detection has been reduced. Our proposed method reaches the accuracy of about 98.7%. Thus, a better recognition rate is achieved.

Keywords: face detection, Viola Jones, false positives, OpenCV

Procedia PDF Downloads 402
3573 Change Detection Method Based on Scale-Invariant Feature Transformation Keypoints and Segmentation for Synthetic Aperture Radar Image

Authors: Lan Du, Yan Wang, Hui Dai

Abstract:

Synthetic aperture radar (SAR) image change detection has recently become a challenging problem owing to the existence of speckle noises. In this paper, an unsupervised distribution-free change detection for SAR image based on scale-invariant feature transform (SIFT) keypoints and segmentation is proposed. Firstly, the noise-robust SIFT keypoints which reveal the blob-like structures in an image are extracted in the log-ratio image to reduce the detection range. Then, different from the traditional change detection which directly obtains the change-detection map from the difference image, segmentation is made around the extracted keypoints in the two original multitemporal SAR images to obtain accurate changed region. At last, the change-detection map is generated by comparing the two segmentations. Experimental results on the real SAR image dataset demonstrate the effectiveness of the proposed method.

Keywords: change detection, Synthetic Aperture Radar (SAR), Scale-Invariant Feature Transformation (SIFT), segmentation

Procedia PDF Downloads 384
3572 Phenotypic and Molecular Heterogeneity Linked to the Magnesium Transporter CNNM2

Authors: Reham Khalaf-Nazzal, Imad Dweikat, Paula Gimenez, Iker Oyenarte, Alfonso Martinez-Cruz, Domonik Muller

Abstract:

Metal cation transport mediator (CNNM) gene family comprises 4 isoforms that are expressed in various human tissues. Structurally, CNNMs are complex proteins that contain an extracellular N-terminal domain preceding a DUF21 transmembrane domain, a ‘Bateman module’ and a C-terminal cNMP-binding domain. Mutations in CNNM2 cause familial dominant hypomagnesaemia. Growing evidence highlights the role of CNNM2 in neurodevelopment. Mutations in CNNM2 have been implicated in epilepsy, intellectual disability, schizophrenia, and others. In the present study, we aim to elucidate the function of CNNM2 in the developing brain. Thus, we present the genetic origin of symptoms in two family cohorts. In the first family, three siblings of a consanguineous Palestinian family in which parents are first cousins, and consanguinity ran over several generations, presented a varying degree of intellectual disability, cone-rod dystrophy, and autism spectrum disorder. Exome sequencing and segregation analysis revealed the presence of homozygous pathogenic mutation in the CNNM2 gene, the parents were heterozygous for that gene mutation. Magnesium blood levels were normal in the three children and their parents in several measurements. They had no symptoms of hypomagnesemia. The CNNM2 mutation in this family was found to locate in the CBS1 domain of the CNNM2 protein. The crystal structure of the mutated CNNM2 protein was not significantly different from the wild-type protein, and the binding of AMP or MgATP was not dramatically affected. This suggests that the CBS1 domain could be involved in pure neurodevelopmental functions independent of its magnesium-handling role, and this mutation could have affected a protein partner binding or other functions in this protein. In the second family, another autosomal dominant CNNM2 mutation was found to run in a large family with multiple individuals over three generations. All affected family members had hypomagnesemia and hypermagnesuria. Oral supplementation of magnesium did not increase the levels of magnesium in serum significantly. Some affected members of this family have defects in fine motor skills such as dyslexia and dyslalia. The detected mutation is located in the N-terminal part, which contains a signal peptide thought to be involved in the sorting and routing of the protein. In this project, we describe heterogenous clinical phenotypes related to CNNM2 mutations and protein functions. In the first family, and up to the authors’ knowledge, we report for the first time the involvement of CNNM2 in retinal photoreceptor development and function. In addition, we report the presence of a neurophenotype independent of magnesium status related to the CNNM2 protein mutation. Taking into account the different modes of inheritance and the different positions of the mutations within CNNM2 and its different structural and functional domains, it is likely that CNNM2 might be involved in a wide spectrum of neuropsychiatric comorbidities with considerable varying phenotypes.

Keywords: magnesium transport, autosomal recessive, autism, neurodevelopment, CBS domain

Procedia PDF Downloads 149
3571 Optimized Road Lane Detection Through a Combined Canny Edge Detection, Hough Transform, and Scaleable Region Masking Toward Autonomous Driving

Authors: Samane Sharifi Monfared, Lavdie Rada

Abstract:

Nowadays, autonomous vehicles are developing rapidly toward facilitating human car driving. One of the main issues is road lane detection for a suitable guidance direction and car accident prevention. This paper aims to improve and optimize road line detection based on a combination of camera calibration, the Hough transform, and Canny edge detection. The video processing is implemented using the Open CV library with the novelty of having a scale able region masking. The aim of the study is to introduce automatic road lane detection techniques with the user’s minimum manual intervention.

Keywords: hough transform, canny edge detection, optimisation, scaleable masking, camera calibration, improving the quality of image, image processing, video processing

Procedia PDF Downloads 91
3570 A Framework for Review Spam Detection Research

Authors: Mohammadali Tavakoli, Atefeh Heydari, Zuriati Ismail, Naomie Salim

Abstract:

With the increasing number of people reviewing products online in recent years, opinion sharing websites has become the most important source of customers’ opinions. Unfortunately, spammers generate and post fake reviews in order to promote or demote brands and mislead potential customers. These are notably destructive not only for potential customers but also for business holders and manufacturers. However, research in this area is not adequate, and many critical problems related to spam detection have not been solved to date. To provide green researchers in the domain with a great aid, in this paper, we have attempted to create a high-quality framework to make a clear vision on review spam-detection methods. In addition, this report contains a comprehensive collection of detection metrics used in proposed spam-detection approaches. These metrics are extremely applicable for developing novel detection methods.

Keywords: fake reviews, feature collection, opinion spam, spam detection

Procedia PDF Downloads 412
3569 Concealed Objects Detection in Visible, Infrared and Terahertz Ranges

Authors: M. Kowalski, M. Kastek, M. Szustakowski

Abstract:

Multispectral screening systems are becoming more popular because of their very interesting properties and applications. One of the most significant applications of multispectral screening systems is prevention of terrorist attacks. There are many kinds of threats and many methods of detection. Visual detection of objects hidden under clothing of a person is one of the most challenging problems of threats detection. There are various solutions of the problem; however, the most effective utilize multispectral surveillance imagers. The development of imaging devices and exploration of new spectral bands is a chance to introduce new equipment for assuring public safety. We investigate the possibility of long lasting detection of potentially dangerous objects covered with various types of clothing. In the article we present the results of comparative studies of passive imaging in three spectrums – visible, infrared and terahertz

Keywords: terahertz, infrared, object detection, screening camera, image processing

Procedia PDF Downloads 357
3568 Thrombophilic Mutations in Tunisian Patients with Recurrent Pregnancy Loss

Authors: Frikha Rim, Abdelmoula Bouayed Nouha, Rebai Tarek

Abstract:

Pregnancy is a hypercoagulable state which causing a defective maternal haemostatic response and leading to thrombosis of the uteroplacental vasculature, that might cause pregnancy complications as recurrent pregnancy loss (RPL). Since heritable Thrombophilic defects are associated with increased thrombosis, their prevalence was evaluated in patients with special emphasis on combinations of the above pathologies. Especially, Factor V Leiden (FVL) G1691A, methylene tetra hydro folate reductase (MTHFR) C677T, and factor II (FII) G20210A mutations are three important causes of thrombophilia, which might be related to recurrent pregnancy loss (RPL). In this study we evaluated the presence of these three mutations [factor V Leiden (FVL), prothrombin G20210A (PTG) and methylenetetrahydrofolate reductase (MTHFR) C677T] amongst 35 Tunisian women with more than 2 miscarriages, referred to our genetic counseling. DNA was extracted from peripheral blood samples and PCR-RFLP was performed for the molecular diagnosis of each mutation. Factor V Leiden and Prothrombin mutation were detected respectively in 5.7% and 2.9% of women with particular history of early fetal loss and thrombotic events. Despites the luck of strength of this study, we insist that testing for the most inherited thrombophilia (FVL and FII mutation) should be performed in women with RPL in the context of thrombotic events. Multi-centre collaboration is necessary to clarify the real impact of thrombotic molecular defects on the pregnancy outcome, to ascertain the effect of thrombophilia on recurrent pregnancy loss and then to evaluate the appropriate therapeutic approach.

Keywords: thrombophilia, recurrent pregnancy loss, factor V Leiden, prothrombin G20210A, methylene tetra hydro folate reductase

Procedia PDF Downloads 454
3567 Design and Implementation of an Image Based System to Enhance the Security of ATM

Authors: Seyed Nima Tayarani Bathaie

Abstract:

In this paper, an image-receiving system was designed and implemented through optimization of object detection algorithms using Haar features. This optimized algorithm served as face and eye detection separately. Then, cascading them led to a clear image of the user. Utilization of this feature brought about higher security by preventing fraud. This attribute results from the fact that services will be given to the user on condition that a clear image of his face has already been captured which would exclude the inappropriate person. In order to expedite processing and eliminating unnecessary ones, the input image was compressed, a motion detection function was included in the program, and detection window size was confined.

Keywords: face detection algorithm, Haar features, security of ATM

Procedia PDF Downloads 417
3566 The Instablity of TetM Gene Encode Tetracycline Resistance Gene in Lactobacillus casei FNCC 0090

Authors: Sarah Devi Silvian, Hanna Shobrina Iqomatul Haq, Fara Cholidatun Nabila, Agustin Krisna Wardani

Abstract:

Bacteria ability to survive in antibiotic is controlled by the presence of gene that encodes the antibiotic resistance protein. The instability of the antibiotic resistance gene can be observed by exposing the bacteria under the lethal dose of antibiotic. Low concentration of antibiotic can induce mutation, which may take a role in bacterial adaptation through the antibiotic concentration. Lactobacillus casei FNCC 0090 is one of the probiotic bacteria that has an ability to survive in tetracycline by expressing the tetM gene. The aims of this study are to observe the possibilities of mutation happened in L.casei FNCC 0090 by exposing in sub-lethal dose of tetracycline and also observing the instability of the tetM gene by comparing the sequence between the wild type and mutant. L.casei FNCC 0090 has a lethal dose in 60 µg/ml, low concentration is applied to induce the mutation, the range from 10 µg/ml, 15 µg/ml, 30 µg/ml, 45 µg/ml, and 50 µg/ml. L.casei FNCC 0090 is exposed to the low concentration from lowest to the highest concentration to induce the adaptation. Plasmid is isolated from the highest concentration culture which is 50 µg/ml by using modified alkali lysis method with the addition of lysozyme. The tetM gene is isolated by using PCR (Polymerase Chain Reaction) method, then PCR amplicon is purified and sequenced. Sequencing is done on both samples, wild type and mutant. Both sequences are compared and the mutations can be traced in the presence of nucleotides changes. The changing of the nucleotides means that the tetM gene is instable.

Keywords: L. casei FNCC 0090, probiotic, tetM, tetracycline

Procedia PDF Downloads 186
3565 Use of Hierarchical Temporal Memory Algorithm in Heart Attack Detection

Authors: Tesnim Charrad, Kaouther Nouira, Ahmed Ferchichi

Abstract:

In order to reduce the number of deaths due to heart problems, we propose the use of Hierarchical Temporal Memory Algorithm (HTM) which is a real time anomaly detection algorithm. HTM is a cortical learning algorithm based on neocortex used for anomaly detection. In other words, it is based on a conceptual theory of how the human brain can work. It is powerful in predicting unusual patterns, anomaly detection and classification. In this paper, HTM have been implemented and tested on ECG datasets in order to detect cardiac anomalies. Experiments showed good performance in terms of specificity, sensitivity and execution time.

Keywords: cardiac anomalies, ECG, HTM, real time anomaly detection

Procedia PDF Downloads 226
3564 Design of a New Architecture of IDS Called BiIDS (IDS Based on Two Principles of Detection)

Authors: Yousef Farhaoui

Abstract:

An IDS is a tool which is used to improve the level of security.In this paper we present different architectures of IDS. We will also discuss measures that define the effectiveness of IDS and the very recent works of standardization and homogenization of IDS. At the end, we propose a new model of IDS called BiIDS (IDS Based on the two principles of detection).

Keywords: intrusion detection, architectures, characteristic, tools, security

Procedia PDF Downloads 460
3563 Proposed Anticipating Learning Classifier System for Cloud Intrusion Detection (ALCS-CID)

Authors: Wafa' Slaibi Alsharafat

Abstract:

Cloud computing is a modern approach in network environment. According to increased number of network users and online systems, there is a need to help these systems to be away from unauthorized resource access and detect any attempts for privacy contravention. For that purpose, Intrusion Detection System is an effective security mechanism to detect any attempts of attacks for cloud resources and their information. In this paper, Cloud Intrusion Detection System has been proposed in term of reducing or eliminating any attacks. This model concerns about achieving high detection rate after conducting a set of experiments using benchmarks dataset called KDD'99.

Keywords: IDS, cloud computing, anticipating classifier system, intrusion detection

Procedia PDF Downloads 472
3562 Crater Detection Using PCA from Captured CMOS Camera Data

Authors: Tatsuya Takino, Izuru Nomura, Yuji Kageyama, Shin Nagata, Hiroyuki Kamata

Abstract:

We propose a method of detecting the craters from the image of the lunar surface. This proposal assumes that it is applied to SLIM (Smart Lander for Investigating Moon) working group aiming at the pinpoint landing on the lunar surface and investigating scientific research. It is difficult to equip and use high-performance computers for the small space probe. So, it is necessary to use a small computer with an exclusive hardware such as FPGA. We have studied the crater detection using principal component analysis (PCA), In this paper, We implement detection algorithm into the FPGA, and the detection is performed on the data that was captured from the CMOS camera.

Keywords: crater detection, PCA, FPGA, image processing

Procedia PDF Downloads 547
3561 On-Road Text Detection Platform for Driver Assistance Systems

Authors: Guezouli Larbi, Belkacem Soundes

Abstract:

The automation of the text detection process can help the human in his driving task. Its application can be very useful to help drivers to have more information about their environment by facilitating the reading of road signs such as directional signs, events, stores, etc. In this paper, a system consisting of two stages has been proposed. In the first one, we used pseudo-Zernike moments to pinpoint areas of the image that may contain text. The architecture of this part is based on three main steps, region of interest (ROI) detection, text localization, and non-text region filtering. Then, in the second step, we present a convolutional neural network architecture (On-Road Text Detection Network - ORTDN) which is considered a classification phase. The results show that the proposed framework achieved ≈ 35 fps and an mAP of ≈ 90%, thus a low computational time with competitive accuracy.

Keywords: text detection, CNN, PZM, deep learning

Procedia PDF Downloads 81
3560 Prognostic Implication of Nras Gene Mutations in Egyptian Adult Acute Myeloid Leukemia

Authors: Doaa M. Elghannam, Nashwa Khayrat Abousamra, Doaa A. Shahin, Enas F. Goda, Hanan Azzam, Emad Azmy, Manal Salah El-Din

Abstract:

Background: The pathogenesis of acute myeloid leukemia (AML) involves the cooperation of mutations promoting proliferation/survival and those impairing differentiation. Point mutations of the NRAS gene are the most frequent somatic mutations causing aberrant signal-transduction in acute myeloid leukemia (AML). Aim: The present work was conducted to study the frequency and prognostic significance of NRAS gene mutations (NRASmut) in de novo Egyptian adult AML. Material and methods: Bone marrow specimens from 150 patients with de novo acute myeloid leukemia and controls were analyzed by genomic PCR-SSCP at codons 12, 13 (exon 1), and 61 (exon 2) for NRAS mutations. Results: NRAS gene mutations was found in 19/150 (12.7%) AML cases, represented more frequently in the FAB subtype M4eo (P = 0.028), and at codon 12, 13 (14of 19; 73.7%). Patients with NRASmut had a significant lower peripheral marrow blasts (P = 0.004, P=0.03) and non significant improved clinical outcome than patients without the mutation. Complete remission rate was (63.2% vs 56.5%; p=0.46), resistant disease (15.8% vs 23.6%; p=0.51), three years overall survival (44% vs 42%; P = 0.85) and disease free survival (42.1% vs 38.9%, P = 0.74). Multivariate analysis showed that age was the strongest unfavorable factor for overall survival (relative risk [RR], 1.9; P = .002), followed by cytogenetics (P = .004). FAB types, NRAS mutation, and leukocytosis were less important. Conclusions: NRAS gene mutation frequency and spectrum differ between biologically distinct subtypes of AML but do not significantly influence prognosis and clinical outcome.

Keywords: NRAS Gene, egyptian adult, acute myeloid leukemia, cytogenetics

Procedia PDF Downloads 94
3559 MAGE-A3 and PRAME Gene Expression and EGFR Mutation Status in Non-Small-Cell Lung Cancer

Authors: Renata Checiches, Thierry Coche, Nicolas F. Delahaye, Albert Linder, Fernando Ulloa Montoya, Olivier Gruselle, Karen Langfeld, An de Creus, Bart Spiessens, Vincent G. Brichard, Jamila Louahed, Frédéric F. Lehmann

Abstract:

Background: The RNA-expression levels of cancer-testis antigens MAGE A3 and PRAME were determined in resected tissue from patients with primary non-small-cell lung cancer (NSCLC) and related to clinical outcome. EGFR, KRAS and BRAF mutation status was determined in a subset to investigate associations with MAGE A3 and PRAME expression. Methods: We conducted a single-centre, uncontrolled, retrospective study of 1260 tissue-bank samples from stage IA-III resected NSCLC. The prognostic value of antigen expression (qRT-PCR) was determined by hazard-ratio and Kaplan-Meier curves. Results: Thirty-seven percent (314/844) of tumours expressed MAGE-A3, 66% (723/1092) expressed PRAME and 31% (239/839) expressed both. Respective frequencies in squamous-cell tumours and adenocarcinomas were 43%/30% for MAGE A3 and 80%/44% for PRAME. No correlation with stage, tumour size or patient age was found. Overall, no prognostic value was identified for either antigen. A trend to poorer overall survival was associated with MAGE-A3 in stage IIIB and with PRAME in stage IB. EGFR and KRAS mutations were found in 10.1% (28/311) and 33.8% (97/311) of tumours, respectively. EGFR (but not KRAS) mutation status was negatively associated with PRAME expression. Conclusion: No clear prognostic value for either PRAME or MAGE A3 was observed in the overall population, although some observed trends may warrant further investigation.

Keywords: MAGE A3, PRAME, cancer-testis gene, NSCLC, survival, EGFR

Procedia PDF Downloads 380
3558 A Paper Based Sensor for Mercury Ion Detection

Authors: Emine G. Cansu Ergun

Abstract:

Conjugated system based sensors for selective detection of metal ions have been taking attention during last two decades. Fluorescent sensors are the promising candidates for ion detection due to their high selectivity towards metal ions, and rapid response times. Detection of mercury in an environmenet is important since mercury is a toxic element for human. Beyond the maximum allowable limit, mercury may cause serious problems in human health by spreading into the atmosphere, water and the food chain. In this study, a quinoxaline and 3,4-ethylenedioxy thiophene based donor-acceptor-donor type conjugated molecule used as a fluorescent sensor for detecting the mercury ion in aqueous medium. Among other various cations, existence of mercury resulted in a full quenching of the fluorescence signal. Then, a paper based sensor is constructed and used for mercury detection. As a result it is concluded that the offering sensor is a good candidate for selective mercury detection in aqueous media both in solution and paper based forms.

Keywords: Conjugated molecules , fluorescence quenching, metal ion detection , sensors

Procedia PDF Downloads 156
3557 Automated Pothole Detection Using Convolution Neural Networks and 3D Reconstruction Using Stereovision

Authors: Eshta Ranyal, Kamal Jain, Vikrant Ranyal

Abstract:

Potholes are a severe threat to road safety and a major contributing factor towards road distress. In the Indian context, they are a major road hazard. Timely detection of potholes and subsequent repair can prevent the roads from deteriorating. To facilitate the roadway authorities in the timely detection and repair of potholes, we propose a pothole detection methodology using convolutional neural networks. The YOLOv3 model is used as it is fast and accurate in comparison to other state-of-the-art models. You only look once v3 (YOLOv3) is a state-of-the-art, real-time object detection system that features multi-scale detection. A mean average precision(mAP) of 73% was obtained on a training dataset of 200 images. The dataset was then increased to 500 images, resulting in an increase in mAP. We further calculated the depth of the potholes using stereoscopic vision by reconstruction of 3D potholes. This enables calculating pothole volume, its extent, which can then be used to evaluate the pothole severity as low, moderate, high.

Keywords: CNN, pothole detection, pothole severity, YOLO, stereovision

Procedia PDF Downloads 134
3556 Cross Site Scripting (XSS) Attack and Automatic Detection Technology Research

Authors: Tao Feng, Wei-Wei Zhang, Chang-Ming Ding

Abstract:

Cross-site scripting (XSS) is one of the most popular WEB Attacking methods at present, and also one of the most risky web attacks. Because of the population of JavaScript, the scene of the cross site scripting attack is also gradually expanded. However, since the web application developers tend to only focus on functional testing and lack the awareness of the XSS, which has made the on-line web projects exist many XSS vulnerabilities. In this paper, different various techniques of XSS attack are analyzed, and a method automatically to detect it is proposed. It is easy to check the results of vulnerability detection when running it as a plug-in.

Keywords: XSS, no target attack platform, automatic detection,XSS detection

Procedia PDF Downloads 399
3555 Incorporating Multiple Supervised Learning Algorithms for Effective Intrusion Detection

Authors: Umar Albalawi, Sang C. Suh, Jinoh Kim

Abstract:

As internet continues to expand its usage with an enormous number of applications, cyber-threats have significantly increased accordingly. Thus, accurate detection of malicious traffic in a timely manner is a critical concern in today’s Internet for security. One approach for intrusion detection is to use Machine Learning (ML) techniques. Several methods based on ML algorithms have been introduced over the past years, but they are largely limited in terms of detection accuracy and/or time and space complexity to run. In this work, we present a novel method for intrusion detection that incorporates a set of supervised learning algorithms. The proposed technique provides high accuracy and outperforms existing techniques that simply utilizes a single learning method. In addition, our technique relies on partial flow information (rather than full information) for detection, and thus, it is light-weight and desirable for online operations with the property of early identification. With the mid-Atlantic CCDC intrusion dataset publicly available, we show that our proposed technique yields a high degree of detection rate over 99% with a very low false alarm rate (0.4%).

Keywords: intrusion detection, supervised learning, traffic classification, computer networks

Procedia PDF Downloads 347