Search results for: forest fire detection
3875 Valorization of a Forest Waste, Modified P-Brutia Cones, by Biosorption of Methyl Geen
Authors: Derradji Chebli, Abdallah Bouguettoucha, Abdelbaki Reffas Khalil Guediri, Abdeltif Amrane
Abstract:
The removal of Methyl Green dye (MG) from aqueous solutions using modified P-brutia cones (PBH and PBN), has been investigated work. The physical parameters such as pH, temperature, initial MG concentration, ionic strength are examined in batch experiments on the sorption of the dye. Adsorption removal of MG was conducted at natural pH 4.5 because the dye is only stable in the range of pH 3.8 to 5. It was observed in experiments that the P-brutia cones treated with NaOH (PBN) exhibited high affinity and adsorption capacity compared to the MG P-brutia cones treated with HCl (PBH) and biosorption capacity of modified P-brutia cones (PBN and PBH) was enhanced by increasing the temperature. This is confirmed by the thermodynamic parameters (ΔG° and ΔH°) which show that the adsorption of MG was spontaneous and endothermic in nature. The positive values of ΔS° suggested an irregular increase in the randomness for both adsorbent (PBN and PBH) during the adsorption process. The kinetic model pseudo-first order, pseudo-second order, and intraparticle diffusion coefficient were examined to analyze the sorption process; they showed that the pseudo-second-order model is the one that best describes the adsorption process (MG) on PBN and PBH with a correlation coefficient R²> 0.999. The ionic strength has shown that it has a negative impact on the adsorption of MG on two supports. A reduction of 68.5% of the adsorption capacity for a value Ce=30 mg/L was found for the PBH, while the PBN did not show a significant influence of the ionic strength on adsorption especially in the presence of NaCl. Among the tested isotherm models, the Langmuir isotherm was found to be the most relevant to describe MG sorption onto modified P-brutia cones with a correlation factor R²>0.999. The capacity adsorption of P-brutia cones, was confirmed for the removal of a dye, MG, from aqueous solution. We note also that P-brutia cones is a material very available in the forest and low-cost biomaterialKeywords: adsorption, p-brutia cones, forest wastes, dyes, isotherm
Procedia PDF Downloads 3813874 Temperature-Related Alterations to Mineral Levels and Crystalline Structure in Porcine Long Bone: Intense Heat Vs. Open Flame
Authors: Caighley Logan
Abstract:
The outcome of fire related fatalities, along with other research, has found fires can have a detrimental effect to the mineral and crystalline structures within bone. This study focused on the mineral and crystalline structures within porcine bone samples to analyse the changes caused, with the intent of effectively ‘reverse engineering’ the data collected from burned bone samples to discover what may have happened. Using Fourier Transform Infrared (FT-IR), and X-Ray Fluorescence (XRF), the data collected from a controlled source of intense heat (muffle furnace) and an open fire, based in a living room setting in a standard size shipping container (8.5ft x 8ft) of a similar temperature with a known ignition source, a gasoline lighter. This approach is to analyse the changes to the samples and how the changes differ depending on the heat source. Results have found significant differences in the levels of remaining minerals for each type of heat/burning (p=<0.001), particularly Phosphorus and Calcium, this also includes notable additions of absorbed elements and minerals from the surrounding materials, i.e., Cerium (Ce), Bromine (Br) and Neodymium (Ne). The analysis techniques included provide validated results in conjunction with previous studies.Keywords: forensic anthropology, thermal alterations, porcine bone, FTIR, XRF
Procedia PDF Downloads 873873 Examining the Role of Tree Species in Absorption of Heavy Metals; Case Study: Abidar Forest Park
Authors: Jahede Tekeykhah, Seyed Mohsen Hossini, Gholamali Jalali
Abstract:
Industrial and traffic activities cause large amounts of heavy metals enter into the atmosphere and the use of plant species can be effective in assessing and reducing air pollution by metals. This study aimed to investigate the adsorption level of heavy metals in leaves of Fraxinus rotundifolia, Robinia, Platanus orientalis, Platycladus orientalis and Pinus eldarica trees in Abidar forest park. For this purpose, samples leaves of the trees were prepared from the contaminated and control areas in each region in 3 stations with 3 replicates in mid-August and finally 90 samples were sent to the laboratory. Then, the concentrations of heavy metals were measured by graphite furnace. To do this, factorial experiment based on a completely randomized design with two factors of location on two levels (contaminated area and control area) and the factor of species on five levels (Fraxinus rotundifolia, Robinia, Platanus orientalis, Platycladus orientalis and Pinus eldarica) with three replications was used. The analysis of collected data was performed by SPSS software and Duncan's multiple range test was used to compare the means. The results showed that the accumulation of all metals in the leaves of most species in the infected area with a significant difference at 95% level was higher than the control area. In the contaminated area, with a significant difference at 5% level, the highest accumulations of metals were observed as the following: lead, cadmium, zinc and manganese in Platanus orientalis, nickel in Fraxinus rotundifolia and copper in Platycladus orientalis.Keywords: airborne, tree species, heavy metals, absorption, Abidar Forest Park
Procedia PDF Downloads 3133872 Regression Model Evaluation on Depth Camera Data for Gaze Estimation
Authors: James Purnama, Riri Fitri Sari
Abstract:
We investigate the machine learning algorithm selection problem in the term of a depth image based eye gaze estimation, with respect to its essential difficulty in reducing the number of required training samples and duration time of training. Statistics based prediction accuracy are increasingly used to assess and evaluate prediction or estimation in gaze estimation. This article evaluates Root Mean Squared Error (RMSE) and R-Squared statistical analysis to assess machine learning methods on depth camera data for gaze estimation. There are 4 machines learning methods have been evaluated: Random Forest Regression, Regression Tree, Support Vector Machine (SVM), and Linear Regression. The experiment results show that the Random Forest Regression has the lowest RMSE and the highest R-Squared, which means that it is the best among other methods.Keywords: gaze estimation, gaze tracking, eye tracking, kinect, regression model, orange python
Procedia PDF Downloads 5403871 Real-Time Automated Detection of Violent Content in Animated Cartoons Using YOLOv9
Authors: Omaima Jbara, Mohame Amine Omrani, Mounir Zrigui
Abstract:
The detection of violent content in animated cartoons is anessential step toward safeguarding young audiences and promoting responsible media consumption. This study introduces an automated approach to identify violent scenes in cartoons using advanced object detection models. A custom dataset comprising 1,200 frames was curated from various animated sources, focusing on four key classes: Explosion, Blood, Fight, and Gunshot. Data augmentation techniques, including rotation, scaling, and color adjustments, expanded the dataset to 2,000 frames, enhancing diversity and model generalization. YOLO versions 8, 9, and 10 were trained and evaluated on this dataset. Among these, YOLOv9 achieved the highest performance with a mean Average Precision (mAP) of 94%, demonstrating superior accuracy and robustness. These findings highlight YOLOv9’s potential as a reliable tool for detecting violent content in animated media, contributing to the development of effective content moderation systems.Keywords: cartoon violence detection, YOLO model, computer Vi sion, Real-time content analysis
Procedia PDF Downloads 113870 MAS Capped CdTe/ZnS Core/Shell Quantum Dot Based Sensor for Detection of Hg(II)
Authors: Dilip Saikia, Suparna Bhattacharjee, Nirab Adhikary
Abstract:
In this piece of work, we have presented the synthesis and characterization of CdTe/ZnS core/shell (CS) quantum dots (QD). CS QDs are used as a fluorescence probe to design a simple cost-effective and ultrasensitive sensor for the detection of toxic Hg(II) in an aqueous medium. Mercaptosuccinic acid (MSA) has been used as a capping agent for the synthesis CdTe/ZnS CS QD. Photoluminescence quenching mechanism has been used in the detection experiment of Hg(II). The designed sensing technique shows a remarkably low detection limit of about 1 picomolar (pM). Here, the CS QDs are synthesized by a simple one-pot aqueous method. The synthesized CS QDs are characterized by using advanced diagnostics tools such as UV-vis, Photoluminescence, XRD, FTIR, TEM and Zeta potential analysis. The interaction between CS QDs and the Hg(II) ions results in the quenching of photoluminescence (PL) intensity of QDs, via the mechanism of excited state electron transfer. The proposed mechanism is explained using cyclic voltammetry and zeta potential analysis. The designed sensor is found to be highly selective towards Hg (II) ions. The analysis of the real samples such as drinking water and tap water has been carried out and the CS QDs show remarkably good results. Using this simple sensing method we have designed a prototype low-cost electronic device for the detection of Hg(II) in an aqueous medium. The findings of the experimental results of the designed sensor is crosschecked by using AAS analysis.Keywords: photoluminescence, quantum dots, quenching, sensor
Procedia PDF Downloads 2693869 Enhanced Traffic Light Detection Method Using Geometry Information
Authors: Changhwan Choi, Yongwan Park
Abstract:
In this paper, we propose a method that allows faster and more accurate detection of traffic lights by a vision sensor during driving, DGPS is used to obtain physical location of a traffic light, extract from the image information of the vision sensor only the traffic light area at this location and ascertain if the sign is in operation and determine its form. This method can solve the problem in existing research where low visibility at night or reflection under bright light makes it difficult to recognize the form of traffic light, thus making driving unstable. We compared our success rate of traffic light recognition in day and night road environments. Compared to previous researches, it showed similar performance during the day but 50% improvement at night.Keywords: traffic light, intelligent vehicle, night, detection, DGPS
Procedia PDF Downloads 3263868 Quantum Dot Biosensing for Advancing Precision Cancer Detection
Authors: Sourav Sarkar, Manashjit Gogoi
Abstract:
In the evolving landscape of cancer diagnostics, optical biosensing has emerged as a promising tool due to its sensitivity and specificity. This study explores the potential of CdS/ZnS core-shell quantum dots (QDs) capped with 3-Mercaptopropionic acid (3-MPA), which aids in the linking chemistry of QDs to various cancer antibodies. The QDs, with their unique optical and electronic properties, have been integrated into the biosensor design. Their high quantum yield and size-dependent emission spectra have been exploited to improve the sensor’s detection capabilities. The study presents the design of this QD-enhanced optical biosensor. The use of these QDs can also aid multiplexed detection, enabling simultaneous monitoring of different cancer biomarkers. This innovative approach holds significant potential for advancing cancer diagnostics, contributing to timely and accurate detection. Future work will focus on optimizing the biosensor design for clinical applications and exploring the potential of QDs in other biosensing applications. This study underscores the potential of integrating nanotechnology and biosensing for cancer research, paving the way for next-generation diagnostic tools. It is a step forward in our quest for achieving precision oncology.Keywords: quantum dots, biosensing, cancer, device
Procedia PDF Downloads 593867 A Preliminary Survey on Butterfly Fauna at Rajagala Archaeological Site, Ampara, Sri Lanka
Authors: D. Eranda N. Mandawala, P. A. D. Mokshi V. Perera
Abstract:
The RajagalaArchaeological site (RAS) is located 26 km from Ampara town (7º29'25.22" N, 81º36'59.05" E) accessible through the Ampara-Uhana-MahaOya highway of the Eastern province of Sri Lanka. This site has recently been added to the tentative list of UNESCO world heritage site and is also a forest reserve. This dry zone forest consists of tropical mixed evergreen vegetation and scrublands on a rocky outcrop of elevation of about 350 meters above mean sea level. It is also scattered with several ponds of differing sizes on rocky outcrops, rocky cliffs, and about 50 cave dwellings. No comprehensive biodiversity survey of any sorts has been conducted at the RAS so far. Therefore, a preliminary survey was conducted to determine its butterfly fauna diversity. An opportunistic Visual Encounter Survey method was used to observe various butterfly species during the morning between 8:00am-12:00noon and in the evening between 2:00-6:00pm on 3 site visits in October 2017, February 2018, and November 2019. All encountered species were photographed using a Nikon D750 camera with Sigma 105mm f/2.8 EX DG OS HSM macro lens, and field guide books were used to identify them. Sri Lanka is home to 248 species of butterflies, of which are 26 are endemic. At RAS, we observed a total of 39 species (15%) of butterflies belonging to 5 Lepidoptera families. Out of these, one endemic species(4%) and 9 endemic subspecieswere also identified. The former was Troidesdarsius, also known as the Sri Lanka birdwing which is the national butterfly and the largest butterfly in Sri Lanka, and the latter were Plains cupid (Chiladespandavalanka), Yamfly (Loxuraatymnus arcuate), Common Cerulean (Jamidescelenotissama), Tawny Rajah(Charaxespsaphonpsaphon), Tamil Yeoman(Cirrochroathaislanka), Angled Castor(Ariadne ariadneminorata), GladeyeBushbrown(Mycalesispatnia patina), Common Crow (Euploea core asela)and Blue Mormon (Papiliopolymnestorparinda). The endemic subspecies belonged to 3 Lepidoptera families (3from Lycaenidae, 5 from Nymphalidae, and 1 from Papilionidae family). Anthropogenic activities such as unauthorized cattle farming, forest clearance, and man-made forest fires currently threaten this site. If such trends continue, it may lead to the reduction of butterfly fauna diversity within this area in the future.Keywords: lepidoptera, rajagala, Sri Lanka birdwing, endemic
Procedia PDF Downloads 1653866 Filtering Intrusion Detection Alarms Using Ant Clustering Approach
Authors: Ghodhbani Salah, Jemili Farah
Abstract:
With the growth of cyber attacks, information safety has become an important issue all over the world. Many firms rely on security technologies such as intrusion detection systems (IDSs) to manage information technology security risks. IDSs are considered to be the last line of defense to secure a network and play a very important role in detecting large number of attacks. However the main problem with today’s most popular commercial IDSs is generating high volume of alerts and huge number of false positives. This drawback has become the main motivation for many research papers in IDS area. Hence, in this paper we present a data mining technique to assist network administrators to analyze and reduce false positive alarms that are produced by an IDS and increase detection accuracy. Our data mining technique is unsupervised clustering method based on hybrid ANT algorithm. This algorithm discovers clusters of intruders’ behavior without prior knowledge of a possible number of classes, then we apply K-means algorithm to improve the convergence of the ANT clustering. Experimental results on real dataset show that our proposed approach is efficient with high detection rate and low false alarm rate.Keywords: intrusion detection system, alarm filtering, ANT class, ant clustering, intruders’ behaviors, false alarms
Procedia PDF Downloads 4063865 Anomaly Detection with ANN and SVM for Telemedicine Networks
Authors: Edward Guillén, Jeisson Sánchez, Carlos Omar Ramos
Abstract:
In recent years, a wide variety of applications are developed with Support Vector Machines -SVM- methods and Artificial Neural Networks -ANN-. In general, these methods depend on intrusion knowledge databases such as KDD99, ISCX, and CAIDA among others. New classes of detectors are generated by machine learning techniques, trained and tested over network databases. Thereafter, detectors are employed to detect anomalies in network communication scenarios according to user’s connections behavior. The first detector based on training dataset is deployed in different real-world networks with mobile and non-mobile devices to analyze the performance and accuracy over static detection. The vulnerabilities are based on previous work in telemedicine apps that were developed on the research group. This paper presents the differences on detections results between some network scenarios by applying traditional detectors deployed with artificial neural networks and support vector machines.Keywords: anomaly detection, back-propagation neural networks, network intrusion detection systems, support vector machines
Procedia PDF Downloads 3603864 Enhancement Method of Network Traffic Anomaly Detection Model Based on Adversarial Training With Category Tags
Authors: Zhang Shuqi, Liu Dan
Abstract:
For the problems in intelligent network anomaly traffic detection models, such as low detection accuracy caused by the lack of training samples, poor effect with small sample attack detection, a classification model enhancement method, F-ACGAN(Flow Auxiliary Classifier Generative Adversarial Network) which introduces generative adversarial network and adversarial training, is proposed to solve these problems. Generating adversarial data with category labels could enhance the training effect and improve classification accuracy and model robustness. FACGAN consists of three steps: feature preprocess, which includes data type conversion, dimensionality reduction and normalization, etc.; A generative adversarial network model with feature learning ability is designed, and the sample generation effect of the model is improved through adversarial iterations between generator and discriminator. The adversarial disturbance factor of the gradient direction of the classification model is added to improve the diversity and antagonism of generated data and to promote the model to learn from adversarial classification features. The experiment of constructing a classification model with the UNSW-NB15 dataset shows that with the enhancement of FACGAN on the basic model, the classification accuracy has improved by 8.09%, and the score of F1 has improved by 6.94%.Keywords: data imbalance, GAN, ACGAN, anomaly detection, adversarial training, data augmentation
Procedia PDF Downloads 1103863 Analytical Modeling of Drain Current for DNA Biomolecule Detection in Double-Gate Tunnel Field-Effect Transistor Biosensor
Authors: Ashwani Kumar
Abstract:
Abstract- This study presents an analytical modeling approach for analyzing the drain current behavior in Tunnel Field-Effect Transistor (TFET) biosensors used for the detection of DNA biomolecules. The proposed model focuses on elucidating the relationship between the drain current and the presence of DNA biomolecules, taking into account the impact of various device parameters and biomolecule characteristics. Through comprehensive analysis, the model offers insights into the underlying mechanisms governing the sensing performance of TFET biosensors, aiding in the optimization of device design and operation. A non-local tunneling model is incorporated with other essential models to accurately trace the simulation and modeled data. An experimental validation of the model is provided, demonstrating its efficacy in accurately predicting the drain current response to DNA biomolecule detection. The sensitivity attained from the analytical model is compared and contrasted with the ongoing research work in this area.Keywords: biosensor, double-gate TFET, DNA detection, drain current modeling, sensitivity
Procedia PDF Downloads 603862 Labview-Based System for Fiber Links Events Detection
Authors: Bo Liu, Qingshan Kong, Weiqing Huang
Abstract:
With the rapid development of modern communication, diagnosing the fiber-optic quality and faults in real-time is widely focused. In this paper, a Labview-based system is proposed for fiber-optic faults detection. The wavelet threshold denoising method combined with Empirical Mode Decomposition (EMD) is applied to denoise the optical time domain reflectometer (OTDR) signal. Then the method based on Gabor representation is used to detect events. Experimental measurements show that signal to noise ratio (SNR) of the OTDR signal is improved by 1.34dB on average, compared with using the wavelet threshold denosing method. The proposed system has a high score in event detection capability and accuracy. The maximum detectable fiber length of the proposed Labview-based system can be 65km.Keywords: empirical mode decomposition, events detection, Gabor transform, optical time domain reflectometer, wavelet threshold denoising
Procedia PDF Downloads 1253861 Indicator-Immobilized, Cellulose Based Optical Sensing Membrane for the Detection of Heavy Metal Ions
Authors: Nisha Dhariwal, Anupama Sharma
Abstract:
The synthesis of cellulose nanofibrils quaternized with 3‐chloro‐2‐hydroxypropyltrimethylammonium chloride (CHPTAC) in NaOH/urea aqueous solution has been reported. Xylenol Orange (XO) has been used as an indicator for selective detection of Sn (II) ions, by its immobilization on quaternized cellulose membrane. The effects of pH, reagent concentration and reaction time on the immobilization of XO have also been studied. The linear response, limit of detection, and interference of other metal ions have also been studied and no significant interference has been observed. The optical chemical sensor displayed good durability and short response time with negligible leaching of the reagent.Keywords: cellulose, chemical sensor, heavy metal ions, indicator immobilization
Procedia PDF Downloads 3023860 Mitigation of Lithium-ion Battery Thermal Runaway Propagation Through the Use of Phase Change Materials Containing Expanded Graphite
Authors: Jayson Cheyne, David Butler, Iain Bomphray
Abstract:
In recent years, lithium-ion batteries have been used increasingly for electric vehicles and large energy storage systems due to their high-power density and long lifespan. Despite this, thermal runaway remains a significant safety problem because of its uncontrollable and irreversible nature - which can lead to fires and explosions. In large-scale lithium-ion packs and modules, thermal runaway propagation between cells can escalate fire hazards and cause significant damage. Thus, safety measures are required to mitigate thermal runaway propagation. The current research explores composite phase change materials (PCM) containing expanded graphite (EG) for thermal runaway mitigation. PCMs are an area of significant interest for battery thermal management due to their ability to absorb substantial quantities of heat during phase change. Moreover, the introduction of EG can support heat transfer from the cells to the PCM (owing to its high thermal conductivity) and provide shape stability to the PCM during phase change. During the research, a thermal model was established for an array of 16 cylindrical cells to simulate heat dissipation with and without the composite PCM. Two conditions were modeled, including the behavior during charge/discharge cycles (i.e., throughout regular operation) and thermal runaway. Furthermore, parameters including cell spacing, composite PCM thickness, and EG weight percentage (WT%) were varied to establish the optimal material parameters for enabling thermal runaway mitigation and effective thermal management. Although numerical modeling is still ongoing, initial findings suggest that a 3mm PCM containing 15WT% EG can effectively suppress thermal runaway propagation while maintaining shape stability. The next step in the research is to validate the model through controlled experimental tests. Additionally, with the perceived fire safety concerns relating to PCM materials, fire safety tests, including UL-94 and Limiting Oxygen Index (LOI), shall be conducted to explore the flammability risk.Keywords: battery safety, electric vehicles, phase change materials, thermal management, thermal runaway
Procedia PDF Downloads 1473859 Surface Hole Defect Detection of Rolled Sheets Based on Pixel Classification Approach
Authors: Samira Taleb, Sakina Aoun, Slimane Ziani, Zoheir Mentouri, Adel Boudiaf
Abstract:
Rolling is a pressure treatment technique that modifies the shape of steel ingots or billets between rotating rollers. During this process, defects may form on the surface of the rolled sheets and are likely to affect the performance and quality of the finished product. In our study, we developed a method for detecting surface hole defects using a pixel classification approach. This work includes several steps. First, we performed image preprocessing to delimit areas with and without hole defects on the sheet image. Then, we developed the histograms of each area to generate the gray level membership intervals of the pixels that characterize each area. As we noticed an intersection between the characteristics of the gray level intervals of the images of the two areas, we finally performed a learning step based on a series of detection tests to refine the membership intervals of each area, and to choose the defect detection criterion in order to optimize the recognition of the surface hole.Keywords: classification, defect, surface, detection, hole
Procedia PDF Downloads 263858 Minimizing the Impact of Covariate Detection Limit in Logistic Regression
Authors: Shahadut Hossain, Jacek Wesolowski, Zahirul Hoque
Abstract:
In many epidemiological and environmental studies covariate measurements are subject to the detection limit. In most applications, covariate measurements are usually truncated from below which is known as left-truncation. Because the measuring device, which we use to measure the covariate, fails to detect values falling below the certain threshold. In regression analyses, it causes inflated bias and inaccurate mean squared error (MSE) to the estimators. This paper suggests a response-based regression calibration method to correct the deleterious impact introduced by the covariate detection limit in the estimators of the parameters of simple logistic regression model. Compared to the maximum likelihood method, the proposed method is computationally simpler, and hence easier to implement. It is robust to the violation of distributional assumption about the covariate of interest. In producing correct inference, the performance of the proposed method compared to the other competing methods has been investigated through extensive simulations. A real-life application of the method is also shown using data from a population-based case-control study of non-Hodgkin lymphoma.Keywords: environmental exposure, detection limit, left truncation, bias, ad-hoc substitution
Procedia PDF Downloads 2403857 Hybrid Anomaly Detection Using Decision Tree and Support Vector Machine
Authors: Elham Serkani, Hossein Gharaee Garakani, Naser Mohammadzadeh, Elaheh Vaezpour
Abstract:
Intrusion detection systems (IDS) are the main components of network security. These systems analyze the network events for intrusion detection. The design of an IDS is through the training of normal traffic data or attack. The methods of machine learning are the best ways to design IDSs. In the method presented in this article, the pruning algorithm of C5.0 decision tree is being used to reduce the features of traffic data used and training IDS by the least square vector algorithm (LS-SVM). Then, the remaining features are arranged according to the predictor importance criterion. The least important features are eliminated in the order. The remaining features of this stage, which have created the highest level of accuracy in LS-SVM, are selected as the final features. The features obtained, compared to other similar articles which have examined the selected features in the least squared support vector machine model, are better in the accuracy, true positive rate, and false positive. The results are tested by the UNSW-NB15 dataset.Keywords: decision tree, feature selection, intrusion detection system, support vector machine
Procedia PDF Downloads 2683856 Developing an Accurate AI Algorithm for Histopathologic Cancer Detection
Authors: Leah Ning
Abstract:
This paper discusses the development of a machine learning algorithm that accurately detects metastatic breast cancer (cancer has spread elsewhere from its origin part) in selected images that come from pathology scans of lymph node sections. Being able to develop an accurate artificial intelligence (AI) algorithm would help significantly in breast cancer diagnosis since manual examination of lymph node scans is both tedious and oftentimes highly subjective. The usage of AI in the diagnosis process provides a much more straightforward, reliable, and efficient method for medical professionals and would enable faster diagnosis and, therefore, more immediate treatment. The overall approach used was to train a convolution neural network (CNN) based on a set of pathology scan data and use the trained model to binarily classify if a new scan were benign or malignant, outputting a 0 or a 1, respectively. The final model’s prediction accuracy is very high, with 100% for the train set and over 70% for the test set. Being able to have such high accuracy using an AI model is monumental in regard to medical pathology and cancer detection. Having AI as a new tool capable of quick detection will significantly help medical professionals and patients suffering from cancer.Keywords: breast cancer detection, AI, machine learning, algorithm
Procedia PDF Downloads 933855 Collision Detection Algorithm Based on Data Parallelism
Authors: Zhen Peng, Baifeng Wu
Abstract:
Modern computing technology enters the era of parallel computing with the trend of sustainable and scalable parallelism. Single Instruction Multiple Data (SIMD) is an important way to go along with the trend. It is able to gather more and more computing ability by increasing the number of processor cores without the need of modifying the program. Meanwhile, in the field of scientific computing and engineering design, many computation intensive applications are facing the challenge of increasingly large amount of data. Data parallel computing will be an important way to further improve the performance of these applications. In this paper, we take the accurate collision detection in building information modeling as an example. We demonstrate a model for constructing a data parallel algorithm. According to the model, a complex object is decomposed into the sets of simple objects; collision detection among complex objects is converted into those among simple objects. The resulting algorithm is a typical SIMD algorithm, and its advantages in parallelism and scalability is unparalleled in respect to the traditional algorithms.Keywords: data parallelism, collision detection, single instruction multiple data, building information modeling, continuous scalability
Procedia PDF Downloads 2933854 Root Mean Square-Based Method for Fault Diagnosis and Fault Detection and Isolation of Current Fault Sensor in an Induction Machine
Authors: Ahmad Akrad, Rabia Sehab, Fadi Alyoussef
Abstract:
Nowadays, induction machines are widely used in industry thankful to their advantages comparing to other technologies. Indeed, there is a big demand because of their reliability, robustness and cost. The objective of this paper is to deal with diagnosis, detection and isolation of faults in a three-phase induction machine. Among the faults, Inter-turn short-circuit fault (ITSC), current sensors fault and single-phase open circuit fault are selected to deal with. However, a fault detection method is suggested using residual errors generated by the root mean square (RMS) of phase currents. The application of this method is based on an asymmetric nonlinear model of Induction Machine considering the winding fault of the three axes frame state space. In addition, current sensor redundancy and sensor fault detection and isolation (FDI) are adopted to ensure safety operation of induction machine drive. Finally, a validation is carried out by simulation in healthy and faulty operation modes to show the benefit of the proposed method to detect and to locate with, a high reliability, the three types of faults.Keywords: induction machine, asymmetric nonlinear model, fault diagnosis, inter-turn short-circuit fault, root mean square, current sensor fault, fault detection and isolation
Procedia PDF Downloads 2033853 Optimizing Machine Learning Through Python Based Image Processing Techniques
Authors: Srinidhi. A, Naveed Ahmed, Twinkle Hareendran, Vriksha Prakash
Abstract:
This work reviews some of the advanced image processing techniques for deep learning applications. Object detection by template matching, image denoising, edge detection, and super-resolution modelling are but a few of the tasks. The paper looks in into great detail, given that such tasks are crucial preprocessing steps that increase the quality and usability of image datasets in subsequent deep learning tasks. We review some of the methods for the assessment of image quality, more specifically sharpness, which is crucial to ensure a robust performance of models. Further, we will discuss the development of deep learning models specific to facial emotion detection, age classification, and gender classification, which essentially includes the preprocessing techniques interrelated with model performance. Conclusions from this study pinpoint the best practices in the preparation of image datasets, targeting the best trade-off between computational efficiency and retaining important image features critical for effective training of deep learning models.Keywords: image processing, machine learning applications, template matching, emotion detection
Procedia PDF Downloads 223852 Self-Organizing Maps for Credit Card Fraud Detection
Authors: ChunYi Peng, Wei Hsuan CHeng, Shyh Kuang Ueng
Abstract:
This study focuses on the application of self-organizing maps (SOM) technology in analyzing credit card transaction data, aiming to enhance the accuracy and efficiency of fraud detection. Som, as an artificial neural network, is particularly suited for pattern recognition and data classification, making it highly effective for the complex and variable nature of credit card transaction data. By analyzing transaction characteristics with SOM, the research identifies abnormal transaction patterns that could indicate potentially fraudulent activities. Moreover, this study has developed a specialized visualization tool to intuitively present the relationships between SOM analysis outcomes and transaction data, aiding financial institution personnel in quickly identifying and responding to potential fraud, thereby reducing financial losses. Additionally, the research explores the integration of SOM technology with composite intelligent system technologies (including finite state machines, fuzzy logic, and decision trees) to further improve fraud detection accuracy. This multimodal approach provides a comprehensive perspective for identifying and understanding various types of fraud within credit card transactions. In summary, by integrating SOM technology with visualization tools and composite intelligent system technologies, this research offers a more effective method of fraud detection for the financial industry, not only enhancing detection accuracy but also deepening the overall understanding of fraudulent activities.Keywords: self-organizing map technology, fraud detection, information visualization, data analysis, composite intelligent system technologies, decision support technologies
Procedia PDF Downloads 603851 On the Representation of Actuator Faults Diagnosis and Systems Invertibility
Authors: F. Sallem, B. Dahhou, A. Kamoun
Abstract:
In this work, the main problem considered is the detection and the isolation of the actuator fault. A new formulation of the linear system is generated to obtain the conditions of the actuator fault diagnosis. The proposed method is based on the representation of the actuator as a subsystem connected with the process system in cascade manner. The designed formulation is generated to obtain the conditions of the actuator fault detection and isolation. Detectability conditions are expressed in terms of the invertibility notions. An example and a comparative analysis with the classic formulation illustrate the performances of such approach for simple actuator fault diagnosis by using the linear model of nuclear reactor.Keywords: actuator fault, Fault detection, left invertibility, nuclear reactor, observability, parameter intervals, system inversion
Procedia PDF Downloads 4083850 A Procedure for Post-Earthquake Damage Estimation Based on Detection of High-Frequency Transients
Authors: Aleksandar Zhelyazkov, Daniele Zonta, Helmut Wenzel, Peter Furtner
Abstract:
In the current research structural health monitoring is considered for addressing the critical issue of post-earthquake damage detection. A non-standard approach for damage detection via acoustic emission is presented - acoustic emissions are monitored in the low frequency range (up to 120 Hz). Such emissions are termed high-frequency transients. Further a damage indicator defined as the Time-Ratio Damage Indicator is introduced. The indicator relies on time-instance measurements of damage initiation and deformation peaks. Based on the time-instance measurements a procedure for estimation of the maximum drift ratio is proposed. Monitoring data is used from a shaking-table test of a full-scale reinforced concrete bridge pier. Damage of the experimental column is successfully detected and the proposed damage indicator is calculated.Keywords: acoustic emission, damage detection, shaking table test, structural health monitoring
Procedia PDF Downloads 2343849 Preliminary Study of Medicinal Plants in Phu Langka National Park, Nakhon Phanom Province, Thailand
Authors: W. Chatan, W. Promprom
Abstract:
Phu Langka National Park is located in Nakhon Phanom Province, the Northeast of Thailand. It contains about 50 km2 of one mountain and three types of forest including deciduous dipterocarp, mixed deciduous and dry evergreen forests. It was interesting area because of that there were some local ethnic groups living around the national park and most people use plants in this area for their life. The objective of this research is to preliminary survey of the use of medicinal plants from this area by local ethnic groups living around the national park. Colour photographs of each species were prepared. In addition, ecology, distribution in the study area, utilization and vernacular names were provided. The result showed that sixteen species of medicinal plant species were found and most plants were used for digestive system and wound. The voucher specimens were deposited in the Forest Herbarium, Department of National Parks, Wildlife and Plant Conservation (BKF), Thailand.Keywords: diversity, ethnobotany, ethnophamacology, taxonomy, utilization
Procedia PDF Downloads 2003848 Self-Organizing Maps for Credit Card Fraud Detection and Visualization
Authors: Peng Chun-Yi, Chen Wei-Hsuan, Ueng Shyh-Kuang
Abstract:
This study focuses on the application of self-organizing maps (SOM) technology in analyzing credit card transaction data, aiming to enhance the accuracy and efficiency of fraud detection. Som, as an artificial neural network, is particularly suited for pattern recognition and data classification, making it highly effective for the complex and variable nature of credit card transaction data. By analyzing transaction characteristics with SOM, the research identifies abnormal transaction patterns that could indicate potentially fraudulent activities. Moreover, this study has developed a specialized visualization tool to intuitively present the relationships between SOM analysis outcomes and transaction data, aiding financial institution personnel in quickly identifying and responding to potential fraud, thereby reducing financial losses. Additionally, the research explores the integration of SOM technology with composite intelligent system technologies (including finite state machines, fuzzy logic, and decision trees) to further improve fraud detection accuracy. This multimodal approach provides a comprehensive perspective for identifying and understanding various types of fraud within credit card transactions. In summary, by integrating SOM technology with visualization tools and composite intelligent system technologies, this research offers a more effective method of fraud detection for the financial industry, not only enhancing detection accuracy but also deepening the overall understanding of fraudulent activities.Keywords: self-organizing map technology, fraud detection, information visualization, data analysis, composite intelligent system technologies, decision support technologies
Procedia PDF Downloads 623847 Automatic Thresholding for Data Gap Detection for a Set of Sensors in Instrumented Buildings
Authors: Houda Najeh, Stéphane Ploix, Mahendra Pratap Singh, Karim Chabir, Mohamed Naceur Abdelkrim
Abstract:
Building systems are highly vulnerable to different kinds of faults and failures. In fact, various faults, failures and human behaviors could affect the building performance. This paper tackles the detection of unreliable sensors in buildings. Different literature surveys on diagnosis techniques for sensor grids in buildings have been published but all of them treat only bias and outliers. Occurences of data gaps have also not been given an adequate span of attention in the academia. The proposed methodology comprises the automatic thresholding for data gap detection for a set of heterogeneous sensors in instrumented buildings. Sensor measurements are considered to be regular time series. However, in reality, sensor values are not uniformly sampled. So, the issue to solve is from which delay each sensor become faulty? The use of time series is required for detection of abnormalities on the delays. The efficiency of the method is evaluated on measurements obtained from a real power plant: an office at Grenoble Institute of technology equipped by 30 sensors.Keywords: building system, time series, diagnosis, outliers, delay, data gap
Procedia PDF Downloads 2493846 Modern Information Security Management and Digital Technologies: A Comprehensive Approach to Data Protection
Authors: Mahshid Arabi
Abstract:
With the rapid expansion of digital technologies and the internet, information security has become a critical priority for organizations and individuals. The widespread use of digital tools such as smartphones and internet networks facilitates the storage of vast amounts of data, but simultaneously, vulnerabilities and security threats have significantly increased. The aim of this study is to examine and analyze modern methods of information security management and to develop a comprehensive model to counteract threats and information misuse. This study employs a mixed-methods approach, including both qualitative and quantitative analyses. Initially, a systematic review of previous articles and research in the field of information security was conducted. Then, using the Delphi method, interviews with 30 information security experts were conducted to gather their insights on security challenges and solutions. Based on the results of these interviews, a comprehensive model for information security management was developed. The proposed model includes advanced encryption techniques, machine learning-based intrusion detection systems, and network security protocols. AES and RSA encryption algorithms were used for data protection, and machine learning models such as Random Forest and Neural Networks were utilized for intrusion detection. Statistical analyses were performed using SPSS software. To evaluate the effectiveness of the proposed model, T-Test and ANOVA statistical tests were employed, and results were measured using accuracy, sensitivity, and specificity indicators of the models. Additionally, multiple regression analysis was conducted to examine the impact of various variables on information security. The findings of this study indicate that the comprehensive proposed model reduced cyber-attacks by an average of 85%. Statistical analysis showed that the combined use of encryption techniques and intrusion detection systems significantly improves information security. Based on the obtained results, it is recommended that organizations continuously update their information security systems and use a combination of multiple security methods to protect their data. Additionally, educating employees and raising public awareness about information security can serve as an effective tool in reducing security risks. This research demonstrates that effective and up-to-date information security management requires a comprehensive and coordinated approach, including the development and implementation of advanced techniques and continuous training of human resources.Keywords: data protection, digital technologies, information security, modern management
Procedia PDF Downloads 35