Search results for: data comparison
27581 Assessing Musculoskeletal Disorder Prevalence and Heat-Related Symptoms: A Cross-sectional Comparison in Indian Farmers
Authors: Makkhan Lal Meena, R. C. Bairwa, G. S. Dangayach, Rahul Jain
Abstract:
The current study looked at the frequency of chronic illness conditions, accidents, health complaints, and ergonomic issues among 100 conventional and 100 greenhouse farmers. Data related to the health symptoms and ergonomic problems were collected through questionnaires by conducting direct interviews of farmers. According to the findings, symptoms of heat exposure (skin rashes, headache, dizziness, and lack of appetite) were substantially higher among conventional farmers than greenhouse farmers. The greenhouse farmers reported much more pain, numbness, or weakness in wrists/hands, fingers, upper back, hips, and ankles/feet than conventional farmers. The findings of the study suggest that suitable ergonomic knowledge and awareness campaign programs concentrating on safety at work, particularly low back pain, should be implemented in workplaces to allow for earlier detection of symptoms among the greenhouse farmers.Keywords: accident, conventional farmer, ergonomics, health symptoms, greenhouse farmers, pesticide
Procedia PDF Downloads 27127580 A Neural Network Based Clustering Approach for Imputing Multivariate Values in Big Data
Authors: S. Nickolas, Shobha K.
Abstract:
The treatment of incomplete data is an important step in the data pre-processing. Missing values creates a noisy environment in all applications and it is an unavoidable problem in big data management and analysis. Numerous techniques likes discarding rows with missing values, mean imputation, expectation maximization, neural networks with evolutionary algorithms or optimized techniques and hot deck imputation have been introduced by researchers for handling missing data. Among these, imputation techniques plays a positive role in filling missing values when it is necessary to use all records in the data and not to discard records with missing values. In this paper we propose a novel artificial neural network based clustering algorithm, Adaptive Resonance Theory-2(ART2) for imputation of missing values in mixed attribute data sets. The process of ART2 can recognize learned models fast and be adapted to new objects rapidly. It carries out model-based clustering by using competitive learning and self-steady mechanism in dynamic environment without supervision. The proposed approach not only imputes the missing values but also provides information about handling the outliers.Keywords: ART2, data imputation, clustering, missing data, neural network, pre-processing
Procedia PDF Downloads 27427579 Resistance Training and Ginger Consumption on Cytokines Levels
Authors: Alireza Barari, Ahmad Abdi
Abstract:
Regular body trainings cause adaption in various system in body. One of the important effect of body training is its effect on immune system. It seems that cytokines usually release after long period exercises or some exercises which cause skeletal muscular damages. If some of the cytokines which cause responses such as inflammation of cells in skeletal muscles, with manipulating of training program, it can be avoided or limited from those exercises which induct cytokines release. Ginger plant is a kind of medicinal plants which is known as a anti inflammation plant. This plant is as most precedence medicinal plants in medicine science especially in inflammation cure. The aim of the present study was the effect of selected resistance training and consumption of ginger extract on IL-1α and TNFα untrained young women. The population includes young women interested in participating in the study with the average of 30±2 years old from Abbas Abad city among which 32 participants were chosen randomly and divided into 4 four groups, resistance training (R), resistance training and ginger consumption(RG), Ginger consumption(G)and Control group(C). The training groups performed circuit resistance training at the intensity of 65-75% one repeat maximum, 3 days a week for 6 weeks. Besides resistance training, subjects were given either ginseng (5 mg/kg per day) or placebo. Prior to and 48 hours after interventions body composition was measured and blood samples were taken in order to assess serum levels of IL-1α and TNFα. Plasma levels of cytokines were measured with commercially available ELISA Kits.IL-1α kit and TNFα kit were used in this research. To demonstrate the effectiveness of the independent variable and the comparison between groups, t-test and ANOVA were used. To determine differences between the groups, the Scheffe test was used that showed significant changes in any of the variables. we observed that circuit resistance training in R and RG groups can significant decreased in weight and body mass index in untrained females (p<0.05). The results showed a significant decreased in the mean level of IL-1α levels before and after the training period in G group (p=0.046) and RG group (p=0.022). Comparison between groups also showed there was significant difference between groups R-RG and RG-C. Intergroup comparison results showed that the mean levels of TNFα before and after the training in group G (p=0.044) and RG (p=0.037), significantly decreased. Comparison between groups also showed there was significant difference between groups R–RG , R-G ,RG-C and G-C. The research shows that circuit resistance training with reducing overload method results in systemic inflammation had significant effect on IL-1α levels and TNFα. Of course, Ginger can counteract the negative effects of resistance training exercise on immune function and stability of the mast cell membrane. Considerable evidence supported the anti-inflammatory properties of ginger for several constituents, especially gingerols, shogaols, paradols, and zingerones, through decreased cytokine gene TNF α and IL-1Α expression and inhibition of cyclooxygenase 1 and 2. These established biological actions suggest that ingested ginger could block the increase in IL-1α.Keywords: resistance training, ginger, IL-1α , TNFα
Procedia PDF Downloads 42827578 The Effect That the Data Assimilation of Qinghai-Tibet Plateau Has on a Precipitation Forecast
Authors: Ruixia Liu
Abstract:
Qinghai-Tibet Plateau has an important influence on the precipitation of its lower reaches. Data from remote sensing has itself advantage and numerical prediction model which assimilates RS data will be better than other. We got the assimilation data of MHS and terrestrial and sounding from GSI, and introduced the result into WRF, then got the result of RH and precipitation forecast. We found that assimilating MHS and terrestrial and sounding made the forecast on precipitation, area and the center of the precipitation more accurate by comparing the result of 1h,6h,12h, and 24h. Analyzing the difference of the initial field, we knew that the data assimilating about Qinghai-Tibet Plateau influence its lower reaches forecast by affecting on initial temperature and RH.Keywords: Qinghai-Tibet Plateau, precipitation, data assimilation, GSI
Procedia PDF Downloads 23427577 Electrical Decomposition of Time Series of Power Consumption
Authors: Noura Al Akkari, Aurélie Foucquier, Sylvain Lespinats
Abstract:
Load monitoring is a management process for energy consumption towards energy savings and energy efficiency. Non Intrusive Load Monitoring (NILM) is one method of load monitoring used for disaggregation purposes. NILM is a technique for identifying individual appliances based on the analysis of the whole residence data retrieved from the main power meter of the house. Our NILM framework starts with data acquisition, followed by data preprocessing, then event detection, feature extraction, then general appliance modeling and identification at the final stage. The event detection stage is a core component of NILM process since event detection techniques lead to the extraction of appliance features. Appliance features are required for the accurate identification of the household devices. In this research work, we aim at developing a new event detection methodology with accurate load disaggregation to extract appliance features. Time-domain features extracted are used for tuning general appliance models for appliance identification and classification steps. We use unsupervised algorithms such as Dynamic Time Warping (DTW). The proposed method relies on detecting areas of operation of each residential appliance based on the power demand. Then, detecting the time at which each selected appliance changes its states. In order to fit with practical existing smart meters capabilities, we work on low sampling data with a frequency of (1/60) Hz. The data is simulated on Load Profile Generator software (LPG), which was not previously taken into consideration for NILM purposes in the literature. LPG is a numerical software that uses behaviour simulation of people inside the house to generate residential energy consumption data. The proposed event detection method targets low consumption loads that are difficult to detect. Also, it facilitates the extraction of specific features used for general appliance modeling. In addition to this, the identification process includes unsupervised techniques such as DTW. To our best knowledge, there exist few unsupervised techniques employed with low sampling data in comparison to the many supervised techniques used for such cases. We extract a power interval at which falls the operation of the selected appliance along with a time vector for the values delimiting the state transitions of the appliance. After this, appliance signatures are formed from extracted power, geometrical and statistical features. Afterwards, those formed signatures are used to tune general model types for appliances identification using unsupervised algorithms. This method is evaluated using both simulated data on LPG and real-time Reference Energy Disaggregation Dataset (REDD). For that, we compute performance metrics using confusion matrix based metrics, considering accuracy, precision, recall and error-rate. The performance analysis of our methodology is then compared with other detection techniques previously used in the literature review, such as detection techniques based on statistical variations and abrupt changes (Variance Sliding Window and Cumulative Sum).Keywords: electrical disaggregation, DTW, general appliance modeling, event detection
Procedia PDF Downloads 7827576 Efficacy of Transcranial Magnetic Therapy on Balance in Patients with Stroke
Authors: Nawal A. Abu-Shady, Ibrahim M. I. Hamoda, Ahmed R. Z. Baghdadi, Mohammed K. Mohamed
Abstract:
Background: The aim of this work was to investigate the efficacy of Transcranial Magnetic Therapy (TMT) on balance in hemiparetic stroke patients. It was conducted in outpatient clinic and in BIODEX balance system lab in Faculty of Physical Therapy, Cairo University. Subjects and Methods: Thirty hemiparetic stroke patients from both sexes represent the sample of this study. The patients' ages ranged from 45 to 55 years. They were assigned randomly into two equal groups; the study group (GA) and the control group (GB). control group treated by selected therapeutic physical therapy program. GA treated by the same program of treatment as the GB in addition to TMT. The duration of treatment was six weeks, three times weekly.day after day. The different aspects of dynamic balance (overall stability, anteroposterior stability and mediolateral stability indices) were assessed pre and post treatment objectively by Biodex balance system and clinically by Short Form of Berg Balance Scale (SFBBS) in both groups. Results: Comparison of each variable pre and post treatment in each group revealed a significant improvement in all different parameters in both groups ( p < 0.01), however comparison between post results revealed that the GA showed a high significant improvement higher than the GB in all different variables.Keywords: stroke, TMT, SFBBS, biodex balance system
Procedia PDF Downloads 35627575 Positive Affect, Negative Affect, Organizational and Motivational Factor on the Acceptance of Big Data Technologies
Authors: Sook Ching Yee, Angela Siew Hoong Lee
Abstract:
Big data technologies have become a trend to exploit business opportunities and provide valuable business insights through the analysis of big data. However, there are still many organizations that have yet to adopt big data technologies especially small and medium organizations (SME). This study uses the technology acceptance model (TAM) to look into several constructs in the TAM and other additional constructs which are positive affect, negative affect, organizational factor and motivational factor. The conceptual model proposed in the study will be tested on the relationship and influence of positive affect, negative affect, organizational factor and motivational factor towards the intention to use big data technologies to produce an outcome. Empirical research is used in this study by conducting a survey to collect data.Keywords: big data technologies, motivational factor, negative affect, organizational factor, positive affect, technology acceptance model (TAM)
Procedia PDF Downloads 36227574 Big Data Analysis with Rhipe
Authors: Byung Ho Jung, Ji Eun Shin, Dong Hoon Lim
Abstract:
Rhipe that integrates R and Hadoop environment made it possible to process and analyze massive amounts of data using a distributed processing environment. In this paper, we implemented multiple regression analysis using Rhipe with various data sizes of actual data. Experimental results for comparing the performance of our Rhipe with stats and biglm packages available on bigmemory, showed that our Rhipe was more fast than other packages owing to paralleling processing with increasing the number of map tasks as the size of data increases. We also compared the computing speeds of pseudo-distributed and fully-distributed modes for configuring Hadoop cluster. The results showed that fully-distributed mode was faster than pseudo-distributed mode, and computing speeds of fully-distributed mode were faster as the number of data nodes increases.Keywords: big data, Hadoop, Parallel regression analysis, R, Rhipe
Procedia PDF Downloads 49727573 Security in Resource Constraints Network Light Weight Encryption for Z-MAC
Authors: Mona Almansoori, Ahmed Mustafa, Ahmad Elshamy
Abstract:
Wireless sensor network was formed by a combination of nodes, systematically it transmitting the data to their base stations, this transmission data can be easily compromised if the limited processing power and the data consistency from these nodes are kept in mind; there is always a discussion to address the secure data transfer or transmission in actual time. This will present a mechanism to securely transmit the data over a chain of sensor nodes without compromising the throughput of the network by utilizing available battery resources available in the sensor node. Our methodology takes many different advantages of Z-MAC protocol for its efficiency, and it provides a unique key by sharing the mechanism using neighbor node MAC address. We present a light weighted data integrity layer which is embedded in the Z-MAC protocol to prove that our protocol performs well than Z-MAC when we introduce the different attack scenarios.Keywords: hybrid MAC protocol, data integrity, lightweight encryption, neighbor based key sharing, sensor node dataprocessing, Z-MAC
Procedia PDF Downloads 14427572 Computer Aided Shoulder Prosthesis Design and Manufacturing
Authors: Didem Venus Yildiz, Murat Hocaoglu, Murat Dursun, Taner Akkan
Abstract:
The shoulder joint is a more complex structure than the hip or knee joints. In addition to the overall complexity of the shoulder joint, two different factors influence the insufficient outcome of shoulder replacement: the shoulder prosthesis design is far from fully developed and it is difficult to place these shoulder prosthesis due to shoulder anatomy. The glenohumeral joint is the most complex joint of the human shoulder. There are various treatments for shoulder failures such as total shoulder arthroplasty, reverse total shoulder arthroplasty. Due to its reverse design than normal shoulder anatomy, reverse total shoulder arthroplasty has different physiological and biomechanical properties. Post-operative achievement of this arthroplasty is depend on improved design of reverse total shoulder prosthesis. Designation achievement can be increased by several biomechanical and computational analysis. In this study, data of human both shoulders with right side fracture was collected by 3D Computer Tomography (CT) machine in dicom format. This data transferred to 3D medical image processing software (Mimics Materilise, Leuven, Belgium) to reconstruct patient’s left and right shoulders’ bones geometry. Provided 3D geometry model of the fractured shoulder was used to constitute of reverse total shoulder prosthesis by 3-matic software. Finite element (FE) analysis was conducted for comparison of intact shoulder and prosthetic shoulder in terms of stress distribution and displacements. Body weight physiological reaction force of 800 N loads was applied. Resultant values of FE analysis was compared for both shoulders. The analysis of the performance of the reverse shoulder prosthesis could enhance the knowledge of the prosthetic design.Keywords: reverse shoulder prosthesis, biomechanics, finite element analysis, 3D printing
Procedia PDF Downloads 15627571 Survival Data with Incomplete Missing Categorical Covariates
Authors: Madaki Umar Yusuf, Mohd Rizam B. Abubakar
Abstract:
The survival censored data with incomplete covariate data is a common occurrence in many studies in which the outcome is survival time. With model when the missing covariates are categorical, a useful technique for obtaining parameter estimates is the EM by the method of weights. The survival outcome for the class of generalized linear model is applied and this method requires the estimation of the parameters of the distribution of the covariates. In this paper, we propose some clinical trials with ve covariates, four of which have some missing values which clearly show that they were fully censored data.Keywords: EM algorithm, incomplete categorical covariates, ignorable missing data, missing at random (MAR), Weibull Distribution
Procedia PDF Downloads 40627570 Seasonal Variation of Polycyclic Aromatic Hydrocarbons Associated with PM10 in Győr, Hungary
Authors: Andrea Szabó Nagy, János Szabó, Zsófia Csanádi, József Erdős
Abstract:
The main objective of this study was to assess the seasonal variation of atmospheric polycyclic aromatic hydrocarbon (PAH) concentrations associated with PM10 in an urban site of Győr, Hungary. A total of 112 PM10 aerosol samples were collected in the years of 2012 and 2013 and analyzed for PAHs by gas chromatography method. The total PAH concentrations (sum of the concentrations of 19 individual PAH compounds) ranged from 0.19 to 70.16 ng/m3 with the mean value of 12.29 ng/m3. Higher concentrations of both total PAHs and benzo[a]pyrene (BaP) were detected in samples collected in the heating seasons. Using BaP-equivalent potency index on the carcinogenic PAH concentration data, the local population appears to be exposed to significantly higher cancer risk in the heating seasons. However, the comparison of the BaP and total PAH concentrations observed for Győr with other cities it was found that the PAH levels in Győr generally corresponded to the EU average.Keywords: air quality, benzo[a]pyrene, PAHs, polycyclic aromatic hydrocarbons
Procedia PDF Downloads 48027569 A Study of Blockchain Oracles
Authors: Abdeljalil Beniiche
Abstract:
The limitation with smart contracts is that they cannot access external data that might be required to control the execution of business logic. Oracles can be used to provide external data to smart contracts. An oracle is an interface that delivers data from external data outside the blockchain to a smart contract to consume. Oracle can deliver different types of data depending on the industry and requirements. In this paper, we study and describe the widely used blockchain oracles. Then, we elaborate on his potential role, technical architecture, and design patterns. Finally, we discuss the human oracle and its key role in solving the truth problem by reaching a consensus about a certain inquiry and tasks.Keywords: blockchain, oracles, oracles design, human oracles
Procedia PDF Downloads 13627568 Improvement of Autism Diagnostic Observation Schedule Scores after Comprehensive Intensive Early Interventions in a Clinical Setting
Authors: Nils Haglund, Svenolof Dahlgren, Maria Rastam, Peik Gustafsson, Karin Kalien
Abstract:
In Sweden, like in most developed countries, there is a substantial increase of children diagnosed with autism and other conditions within the autism spectrum (ASD). The rapid increase of ASD rates stresses the importance of developing care programs to provide support and comprehensive interventions for affected families. The current observational study was conducted in order to evaluate an ongoing Comprehensive Intensive Early Intervention (CIEI) program for children with autism in southern Sweden. The change in autism symptoms among children participating in CIEI (intervention group, n=67) was compared with children who received traditional habilitation services only (comparison group, n=27). Children of parents who accepted the offered CIEI-program, constituted the intervention group, whereas children, whose parents (for some reason) were not interested in the offered CIEI-program, constituted the comparison group. The CIEI-program was individualized to each child by experienced applied behavior analysis (ABA) specialists with different backgrounds as psychologists, speech pathologists or special education teachers, in cooperation with parents and preschool staff. Due to the individualization, the intervention could vary in intensity and techniques. The intensity was calculated to 15-25 hours each week at home and the preschool altogether. Each child was assigned one 'trainer', who was often employed as a preschool teacher but could have another educational background. An agreement between supervisor- parents and preschool staff was reached to confirm the intensity and content of the CIEI- program over an approximately two-year intervention period. Symptom changes were measured as evaluation-ADOS-2-scores, total- and severity-scores, minus the corresponding baseline-scores, divided by the time between baseline and evaluation. The difference between the study-groups regarding change of ADOS-2-scores was estimated using ANCOVA. In the current study, children in the CIEI-group improved their ADOS-2-total scores between baseline and evaluation (-0.8 scores per year; 95%CI: -1.2 to -0.4), whereas no such improvement was detected in the comparison group (+0.1 scores per year; 95%CI: -0.7 to +0.9). The change difference (change in the CIEI-group vs. change in the comparison group) was statistically significant, both crude and after adjusting for possible confounders (-1.1; 95%CI -1.9 to -0.4). Children in the CIEI-group also significantly improved their ADOS-calibrated severity scores, but not significantly differently so from the comparison group. The results from the current study indicate that the CIEI program significantly improves social and communicative skills among children with autism and that children with developmental delay could benefit to a similar degree as other children. The results support earlier studies reporting on the improvement of autism symptoms after early intensive interventions. The results from observational studies are difficult to interpret, but it is nevertheless of uttermost importance to evaluate costly autism intervention programs. Such results may be of immediate importance to healthcare organizations when allocating the already strained resources to different patient groups. Albeit the obvious limitation of the current naturalistic study, the results support previous positive studies and indicate that children with autism benefit from participating in early comprehensive, intensive programs and that investments in these programs may be highly justifiable.Keywords: autism symptoms, ADOS-scores, evaluation, intervention program
Procedia PDF Downloads 14527567 IoT and Deep Learning approach for Growth Stage Segregation and Harvest Time Prediction of Aquaponic and Vermiponic Swiss Chards
Authors: Praveen Chandramenon, Andrew Gascoyne, Fideline Tchuenbou-Magaia
Abstract:
Aquaponics offers a simple conclusive solution to the food and environmental crisis of the world. This approach combines the idea of Aquaculture (growing fish) to Hydroponics (growing vegetables and plants in a soilless method). Smart Aquaponics explores the use of smart technology including artificial intelligence and IoT, to assist farmers with better decision making and online monitoring and control of the system. Identification of different growth stages of Swiss Chard plants and predicting its harvest time is found to be important in Aquaponic yield management. This paper brings out the comparative analysis of a standard Aquaponics with a Vermiponics (Aquaponics with worms), which was grown in the controlled environment, by implementing IoT and deep learning-based growth stage segregation and harvest time prediction of Swiss Chards before and after applying an optimal freshwater replenishment. Data collection, Growth stage classification and Harvest Time prediction has been performed with and without water replenishment. The paper discusses the experimental design, IoT and sensor communication with architecture, data collection process, image segmentation, various regression and classification models and error estimation used in the project. The paper concludes with the results comparison, including best models that performs growth stage segregation and harvest time prediction of the Aquaponic and Vermiponic testbed with and without freshwater replenishment.Keywords: aquaponics, deep learning, internet of things, vermiponics
Procedia PDF Downloads 7227566 Synthesis and Characterization of Some New Diamines and Their Thermally Stable Polyimides
Authors: Zill-E-Huma, Humaira Siddiqi
Abstract:
This paper comprises of synthesis of thermally stable, mechanically strong polyimides. The polyimides were considered as most diverse class of polymers having unlimited applications. They were widely used as optical wave guides, in aerospace, for gas separation, as biomaterials and in electronics. Here the focus was to increase thermal stability and mechanical strength of polyimides. For this purpose two monomers were synthesized and were further polymerized via anhydrides to polyimides. The monomer diamines were synthesized by nucleophilic attack of aniline/2-fluoro aniline on hydroxy benzaldehydes. The two diamines synthesized were 3-(bis(4-aminophenyl) methyl) phenol (3OHDA) and 4-(bis(4-amino-3-fluorophenyl) methyl) phenol (2F4OHDA). These diamines were then reacted with dianhydrides to get polyimides. Two neat polyimides of both diamines with pyromellitic dianhydride (PMDA) and one neat polyimide of 4'-(Hexafluoroisopropylidene) diphthalic dianhydride (6FDA) with 3OHDA were synthesized. To compare the properties of synthesized polyimides like thermal stability, rigidity, flexibility, toughness etc. a commercial diamine oxydianiline (ODA) was used. Polyimides from oxydianiline were basically rigid. Nine different polyimide blends were synthesized from 3OHDA and commercial diamines ODA to have a better comparison of properties. TGA and mechanical testing results showed that with the increase in the percentage of 3OHDA in comparison to ODA the flexibility, toughness, strength of polyimide, thermal stability goes on increasing. So, synthesized diamines were responsible for improvement of properties of polyimides.Keywords: diamines, dianhydrides, oxydianiline, polyimides
Procedia PDF Downloads 30327565 Observational Versus Angioembolisation in Blunt Splenic Trauma: A Systematic Review
Authors: E. Gopi, E. Devaindran
Abstract:
Objective: Non-operative management of blunt splenic trauma have started to overtake the traditional splenectomy in recent years across the grade of splenic injury. The two main non-operative methods are observation and angioembolisation. However, the post management convalescence in these groups are still being investigated. The study attempts to quantify the clinical indicators among the two in particular complications, mortalities, conversions to operative management and duration of inpatient stay. Methodology: A systematic search was done via PUBMED, MEDLINE, and EMBASE. A total of 639 articles identified and subsequently 68 articles were identified post duplicates, full text, and inclusion and exclusion criteria. Main exclusions were non-English articles without English translation, pure observational or angioembolisation articles of which no comparison data could be identified and articles looking into pure hemodynamically unstable patients. Results: 24 non randomized controlled trial, 5 clinical control trial and 39 retrospective studies analyzing a total of 23700 patients with blunt splenic trauma. Discrepancies in data were noted in the group who had observational management versus angioembolisation in particular as data was compared among the classes of splenic rupture, the protocol of management in different centers, availability of angiogram suite, and the study design. Further variability was also noted in the angioembolisation arm as the preference for treatment differs between distal versus proximal splenic artery involvement. Overall the cumulative mortality in both observational and angioembolisation group were similar, 2.78% and 5.97% respectively. The cause of death however is not directly attributed to the management itself but rather patient comorbidities, other associated injuries and conversions to splenectomy leading to post splenectomy complications. The cumulative morbidity among each group appears to be same approximately 12% in observational versus 15% in angioembolisation. However, the type of complications varies with the observational group having higher rates of inpatient stay and intrabdominal hematoma infection and angioembolisation group developing more splenic infarcts and bleeds. There were significant disparity in reporting the actual data on duration of inpatient stay and complications to allow a statistically significant quantitative analysis to be done, 15 articles however are currently being considered. Conclusions: Observational management appears to be much effective in managing lower grade splenic trauma (grade 1 and 2) where else angioembolisation appears to play a bigger role in intermediate grades (grade 3-4) in ensuring splenic function preservation. Care has to be taken however in the angioembolisation group in view of distal splenic infarct group compromising splenic function. The cumulated data of 15 articles are now being considered for a meta-analysis.Keywords: blunt splenic trauma, conservative, non-operative, angioembolisation
Procedia PDF Downloads 26727564 Multi Data Management Systems in a Cluster Randomized Trial in Poor Resource Setting: The Pneumococcal Vaccine Schedules Trial
Authors: Abdoullah Nyassi, Golam Sarwar, Sarra Baldeh, Mamadou S. K. Jallow, Bai Lamin Dondeh, Isaac Osei, Grant A. Mackenzie
Abstract:
A randomized controlled trial is the "gold standard" for evaluating the efficacy of an intervention. Large-scale, cluster-randomized trials are expensive and difficult to conduct, though. To guarantee the validity and generalizability of findings, high-quality, dependable, and accurate data management systems are necessary. Robust data management systems are crucial for optimizing and validating the quality, accuracy, and dependability of trial data. Regarding the difficulties of data gathering in clinical trials in low-resource areas, there is a scarcity of literature on this subject, which may raise concerns. Effective data management systems and implementation goals should be part of trial procedures. Publicizing the creative clinical data management techniques used in clinical trials should boost public confidence in the study's conclusions and encourage further replication. In the ongoing pneumococcal vaccine schedule study in rural Gambia, this report details the development and deployment of multi-data management systems and methodologies. We implemented six different data management, synchronization, and reporting systems using Microsoft Access, RedCap, SQL, Visual Basic, Ruby, and ASP.NET. Additionally, data synchronization tools were developed to integrate data from these systems into the central server for reporting systems. Clinician, lab, and field data validation systems and methodologies are the main topics of this report. Our process development efforts across all domains were driven by the complexity of research project data collected in real-time data, online reporting, data synchronization, and ways for cleaning and verifying data. Consequently, we effectively used multi-data management systems, demonstrating the value of creative approaches in enhancing the consistency, accuracy, and reporting of trial data in a poor resource setting.Keywords: data management, data collection, data cleaning, cluster-randomized trial
Procedia PDF Downloads 2727563 Equivalent Circuit Model for the Eddy Current Damping with Frequency-Dependence
Authors: Zhiguo Shi, Cheng Ning Loong, Jiazeng Shan, Weichao Wu
Abstract:
This study proposes an equivalent circuit model to simulate the eddy current damping force with shaking table tests and finite element modeling. The model is firstly proposed and applied to a simple eddy current damper, which is modelled in ANSYS, indicating that the proposed model can simulate the eddy current damping force under different types of excitations. Then, a non-contact and friction-free eddy current damper is designed and tested, and the proposed model can reproduce the experimental observations. The excellent agreement between the simulated results and the experimental data validates the accuracy and reliability of the equivalent circuit model. Furthermore, a more complicated model is performed in ANSYS to verify the feasibility of the equivalent circuit model in complex eddy current damper, and the higher-order fractional model and viscous model are adopted for comparison.Keywords: equivalent circuit model, eddy current damping, finite element model, shake table test
Procedia PDF Downloads 19127562 Finding Bicluster on Gene Expression Data of Lymphoma Based on Singular Value Decomposition and Hierarchical Clustering
Authors: Alhadi Bustaman, Soeganda Formalidin, Titin Siswantining
Abstract:
DNA microarray technology is used to analyze thousand gene expression data simultaneously and a very important task for drug development and test, function annotation, and cancer diagnosis. Various clustering methods have been used for analyzing gene expression data. However, when analyzing very large and heterogeneous collections of gene expression data, conventional clustering methods often cannot produce a satisfactory solution. Biclustering algorithm has been used as an alternative approach to identifying structures from gene expression data. In this paper, we introduce a transform technique based on singular value decomposition to identify normalized matrix of gene expression data followed by Mixed-Clustering algorithm and the Lift algorithm, inspired in the node-deletion and node-addition phases proposed by Cheng and Church based on Agglomerative Hierarchical Clustering (AHC). Experimental study on standard datasets demonstrated the effectiveness of the algorithm in gene expression data.Keywords: agglomerative hierarchical clustering (AHC), biclustering, gene expression data, lymphoma, singular value decomposition (SVD)
Procedia PDF Downloads 27827561 An Efficient Traceability Mechanism in the Audited Cloud Data Storage
Authors: Ramya P, Lino Abraham Varghese, S. Bose
Abstract:
By cloud storage services, the data can be stored in the cloud, and can be shared across multiple users. Due to the unexpected hardware/software failures and human errors, which make the data stored in the cloud be lost or corrupted easily it affected the integrity of data in cloud. Some mechanisms have been designed to allow both data owners and public verifiers to efficiently audit cloud data integrity without retrieving the entire data from the cloud server. But public auditing on the integrity of shared data with the existing mechanisms will unavoidably reveal confidential information such as identity of the person, to public verifiers. Here a privacy-preserving mechanism is proposed to support public auditing on shared data stored in the cloud. It uses group signatures to compute verification metadata needed to audit the correctness of shared data. The identity of the signer on each block in shared data is kept confidential from public verifiers, who are easily verifying shared data integrity without retrieving the entire file. But on demand, the signer of the each block is reveal to the owner alone. Group private key is generated once by the owner in the static group, where as in the dynamic group, the group private key is change when the users revoke from the group. When the users leave from the group the already signed blocks are resigned by cloud service provider instead of owner is efficiently handled by efficient proxy re-signature scheme.Keywords: data integrity, dynamic group, group signature, public auditing
Procedia PDF Downloads 39227560 Cyber Bullying, Online Risks and Parental Mediation: A Comparison between Adolescent Reports and Parent Perceptions in South Africa
Authors: Masa Popovac, Philip Fine
Abstract:
Information and Communication Technologies (ICTs) have altered our social environments, and young people in particular have immersed themselves in the digital age. Despite countless benefits, younger ICT users are being exposed to various online risks such as contact with strangers, viewing of risky content, sending or receiving sexually themed images or comments (i.e. ‘sexting’) as well as cyber bullying. Parents may not be fully aware of the online spaces their children inhabit and often struggle to implement effective mediation strategies. This quantitative study explored (i) three types of online risks (contact risks, content risks and conduct risks), (ii) cyber bullying victimization and perpetration, and (iii) parental mediation among a sample of 689 South African adolescents aged between 12-17 years. Survey data was also collected for 227 of their parents relating to their perceptions of their child’s online experiences. A comparison between adolescent behaviors and parental perceptions was examined on the three variables in the study. Findings reveal various online risk taking behaviors. In terms of contact risks, 56% of adolescents reported having contact with at least one online stranger, with many meeting these strangers in person. Content risks included exposure to harmful information such as websites promoting extreme diets or self-harm as well as inappropriate content: 84% of adolescents had seen violent content and 75% had seen sexual content online. Almost 60% of adolescents engaged in conduct risks such as sexting. Eight online victimization behaviors were examined in the study and 79% of adolescents had at least one of these negative experiences, with a third (34%) defining this experience as cyber bullying. A strong connection between victimization and perpetration was found, with 63% of adolescents being both a victim and perpetrator. Very little parental mediation of ICT use was reported. Inferential statistics revealed that parents consistently underestimated their child’s online risk taking behaviors as well as their cyber bullying victimization and perpetration. Parents also overestimated mediation strategies in the home. The generational gap in the knowledge and use of ICTs is a barrier to effective parental mediation and online safety, since many negative online experiences by adolescents go undetected and can continue for extended periods of time thereby exacerbating the potential psychological and emotional distress. The study highlights the importance of including parents in online safety efforts.Keywords: cyber bullying, online risk behaviors, parental mediation, South Africa
Procedia PDF Downloads 48327559 Comparison of EMG Normalization Techniques Recommended for Back Muscles Used in Ergonomics Research
Authors: Saif Al-Qaisi, Alif Saba
Abstract:
Normalization of electromyography (EMG) data in ergonomics research is a prerequisite for interpreting the data. Normalizing accounts for variability in the data due to differences in participants’ physical characteristics, electrode placement protocols, time of day, and other nuisance factors. Typically, normalized data is reported as a percentage of the muscle’s isometric maximum voluntary contraction (%MVC). Various MVC techniques have been recommended in the literature for normalizing EMG activity of back muscles. This research tests and compares the recommended MVC techniques in the literature for three back muscles commonly used in ergonomics research, which are the lumbar erector spinae (LES), latissimus dorsi (LD), and thoracic erector spinae (TES). Six healthy males from a university population participated in this research. Five different MVC exercises were compared for each muscle using the Tringo wireless EMG system (Delsys Inc.). Since the LES and TES share similar functions in controlling trunk movements, their MVC exercises were the same, which included trunk extension at -60°, trunk extension at 0°, trunk extension while standing, hip extension, and the arch test. The MVC exercises identified in the literature for the LD were chest-supported shoulder extension, prone shoulder extension, lat-pull down, internal shoulder rotation, and abducted shoulder flexion. The maximum EMG signal was recorded during each MVC trial, and then the averages were computed across participants. A one-way analysis of variance (ANOVA) was utilized to determine the effect of MVC technique on muscle activity. Post-hoc analyses were performed using the Tukey test. The MVC technique effect was statistically significant for each of the muscles (p < 0.05); however, a larger sample of participants was needed to detect significant differences in the Tukey tests. The arch test was associated with the highest EMG average at the LES, and also it resulted in the maximum EMG activity more often than the other techniques (three out of six participants). For the TES, trunk extension at 0° was associated with the largest EMG average, and it resulted in the maximum EMG activity the most often (three out of six participants). For the LD, participants obtained their maximum EMG either from chest-supported shoulder extension (three out of six participants) or prone shoulder extension (three out of six participants). Chest-supported shoulder extension, however, had a larger average than prone shoulder extension (0.263 and 0.240, respectively). Although all the aforementioned techniques were superior in their averages, they did not always result in the maximum EMG activity. If an accurate estimate of the true MVC is desired, more than one technique may have to be performed. This research provides additional MVC techniques for each muscle that may elicit the maximum EMG activity.Keywords: electromyography, maximum voluntary contraction, normalization, physical ergonomics
Procedia PDF Downloads 19327558 Securing Health Monitoring in Internet of Things with Blockchain-Based Proxy Re-Encryption
Authors: Jerlin George, R. Chitra
Abstract:
The devices with sensors that can monitor your temperature, heart rate, and other vital signs and link to the internet, known as the Internet of Things (IoT), have completely transformed the way we control health. Providing real-time health data, these sensors improve diagnostics and treatment outcomes. Security and privacy matters when IoT comes into play in healthcare. Cyberattacks on centralized database systems are also a problem. To solve these challenges, the study uses blockchain technology coupled with proxy re-encryption to secure health data. ThingSpeak IoT cloud analyzes the collected data and turns them into blockchain transactions which are safely kept on the DriveHQ cloud. Transparency and data integrity are ensured by blockchain, and secure data sharing among authorized users is made possible by proxy re-encryption. This results in a health monitoring system that preserves the accuracy and confidentiality of data while reducing the safety risks of IoT-driven healthcare applications.Keywords: internet of things, healthcare, sensors, electronic health records, blockchain, proxy re-encryption, data privacy, data security
Procedia PDF Downloads 1827557 Rodriguez Diego, Del Valle Martin, Hargreaves Matias, Riveros Jose Luis
Authors: Nathainail Bashir, Neil Anderson
Abstract:
The objective of this study site was to investigate the current state of the practice with regards to karst detection methods and recommend the best method and pattern of arrays to acquire the desire results. Proper site investigation in karst prone regions is extremely valuable in determining the location of possible voids. Two geophysical techniques were employed: multichannel analysis of surface waves (MASW) and electric resistivity tomography (ERT).The MASW data was acquired at each test location using different array lengths and different array orientations (to increase the probability of getting interpretable data in karst terrain). The ERT data were acquired using a dipole-dipole array consisting of 168 electrodes. The MASW data was interpreted (re: estimated depth to physical top of rock) and used to constrain and verify the interpretation of the ERT data. The ERT data indicates poorer quality MASW data were acquired in areas where there was significant local variation in the depth to top of rock.Keywords: dipole-dipole, ERT, Karst terrains, MASW
Procedia PDF Downloads 31527556 Data Science in Military Decision-Making: A Semi-Systematic Literature Review
Authors: H. W. Meerveld, R. H. A. Lindelauf
Abstract:
In contemporary warfare, data science is crucial for the military in achieving information superiority. Yet, to the authors’ knowledge, no extensive literature survey on data science in military decision-making has been conducted so far. In this study, 156 peer-reviewed articles were analysed through an integrative, semi-systematic literature review to gain an overview of the topic. The study examined to what extent literature is focussed on the opportunities or risks of data science in military decision-making, differentiated per level of war (i.e. strategic, operational, and tactical level). A relatively large focus on the risks of data science was observed in social science literature, implying that political and military policymakers are disproportionally influenced by a pessimistic view on the application of data science in the military domain. The perceived risks of data science are, however, hardly addressed in formal science literature. This means that the concerns on the military application of data science are not addressed to the audience that can actually develop and enhance data science models and algorithms. Cross-disciplinary research on both the opportunities and risks of military data science can address the observed research gaps. Considering the levels of war, relatively low attention for the operational level compared to the other two levels was observed, suggesting a research gap with reference to military operational data science. Opportunities for military data science mostly arise at the tactical level. On the contrary, studies examining strategic issues mostly emphasise the risks of military data science. Consequently, domain-specific requirements for military strategic data science applications are hardly expressed. Lacking such applications may ultimately lead to a suboptimal strategic decision in today’s warfare.Keywords: data science, decision-making, information superiority, literature review, military
Procedia PDF Downloads 16727555 Numerical Simulation of the Coal Spontaneous Combustion Dangerous Area in Composite Long-Wall Gobs
Authors: Changshan Zhang, Zhijin Yu, Shixing Fan
Abstract:
A comprehensive hazard evaluation for coal self-heating in composite long-wall gobs is heavily dependent on computational simulation. In this study, the spatial distributions of cracks which caused significant air leakage were simulated by universal distinct element code (UDEC) simulation. Based on the main routes of air leakage and characteristics of coal self-heating, a computational fluid dynamics (CFD) modeling was conducted to model the coal spontaneous combustion dangerous area in composite long-wall gobs. The results included the oxygen concentration distributions and temperature profiles showed that the numerical approach is validated by comparison with the test data. Furthermore, under the conditions of specific engineering, the major locations where some techniques for extinguishing and preventing long-wall gob fires need to be put into practice were also examined.Keywords: computational simulation, UDEC simulation, coal self-heating, CFD modeling, long-wall gobs
Procedia PDF Downloads 31327554 Comparison of Two Theories for the Critical Laser Radius in Thermal Quantum Plasma
Authors: Somaye Zare
Abstract:
The critical beam radius is a significant factor that predicts the behavior of the laser beam in the plasma, so if the laser beam radius is adequately greater in comparison to it, the beam will experience stable focusing on the plasma; otherwise, the beam will diverge after entering into the plasma. In this work, considering the paraxial approximation and moment theories, the localization of a relativistic laser beam in thermal quantum plasma is investigated. Using the dielectric function obtained in the quantum hydrodynamic model, the mathematical equation for the laser beam width parameter is attained and solved numerically by the fourth-order Runge-Kutta method. The results demonstrate that the stouter focusing effect is occurred in the moment theory compared to the paraxial approximation. Besides, similar to the two theories, with increasing Fermi temperature, plasma density, and laser intensity, the oscillation rate of the beam width parameter growths and focusing length reduces which means improving the focusing effect. Furthermore, it is understood that behaviors of the critical laser radius are different in the two theories, in the paraxial approximation, the critical radius after a minimum value is enhanced with increasing laser intensity, but in the moment theory, with increasing laser intensity, the critical radius decreases until it becomes independent of the laser intensity.Keywords: laser localization, quantum plasma, paraxial approximation, moment theory, quantum hydrodynamic model
Procedia PDF Downloads 7327553 Legal Regulation of Personal Information Data Transmission Risk Assessment: A Case Study of the EU’s DPIA
Authors: Cai Qianyi
Abstract:
In the midst of global digital revolution, the flow of data poses security threats that call China's existing legislative framework for protecting personal information into question. As a preliminary procedure for risk analysis and prevention, the risk assessment of personal data transmission lacks detailed guidelines for support. Existing provisions reveal unclear responsibilities for network operators and weakened rights for data subjects. Furthermore, the regulatory system's weak operability and a lack of industry self-regulation heighten data transmission hazards. This paper aims to compare the regulatory pathways for data information transmission risks between China and Europe from a legal framework and content perspective. It draws on the “Data Protection Impact Assessment Guidelines” to empower multiple stakeholders, including data processors, controllers, and subjects, while also defining obligations. In conclusion, this paper intends to solve China's digital security shortcomings by developing a more mature regulatory framework and industry self-regulation mechanisms, resulting in a win-win situation for personal data protection and the development of the digital economy.Keywords: personal information data transmission, risk assessment, DPIA, internet service provider, personal information data transimission, risk assessment
Procedia PDF Downloads 6127552 Wavelets Contribution on Textual Data Analysis
Authors: Habiba Ben Abdessalem
Abstract:
The emergence of giant set of textual data was the push that has encouraged researchers to invest in this field. The purpose of textual data analysis methods is to facilitate access to such type of data by providing various graphic visualizations. Applying these methods requires a corpus pretreatment step, whose standards are set according to the objective of the problem studied. This step determines the forms list contained in contingency table by keeping only those information carriers. This step may, however, lead to noisy contingency tables, so the use of wavelet denoising function. The validity of the proposed approach is tested on a text database that offers economic and political events in Tunisia for a well definite period.Keywords: textual data, wavelet, denoising, contingency table
Procedia PDF Downloads 277