Search results for: contextual toxicity detection
4696 A Framework for Review Spam Detection Research
Authors: Mohammadali Tavakoli, Atefeh Heydari, Zuriati Ismail, Naomie Salim
Abstract:
With the increasing number of people reviewing products online in recent years, opinion sharing websites has become the most important source of customers’ opinions. Unfortunately, spammers generate and post fake reviews in order to promote or demote brands and mislead potential customers. These are notably destructive not only for potential customers but also for business holders and manufacturers. However, research in this area is not adequate, and many critical problems related to spam detection have not been solved to date. To provide green researchers in the domain with a great aid, in this paper, we have attempted to create a high-quality framework to make a clear vision on review spam-detection methods. In addition, this report contains a comprehensive collection of detection metrics used in proposed spam-detection approaches. These metrics are extremely applicable for developing novel detection methods.Keywords: fake reviews, feature collection, opinion spam, spam detection
Procedia PDF Downloads 4134695 Response of Lepidium Sativum to Ionic Toxicity
Authors: M. F. El-Barghathi, R. El-Tajouri
Abstract:
The effect of different concentrations of cadmium sulfate "CdSO4" (0.0, 10, 50, 100, 500 ppm) was tested on seed germination, seedling elongation and growth of Lepidium sativum (garden cress) plants. Results indicated that seed germination and seedling elongation were not inhibited by different concentrations of CdSO4. This could suggest that, Lepidium sativum may be used as a phyto remediation tool of soils contaminated with cadmium.Keywords: Lepidium sativum, heavy metals, ionic toxicity, phytoremediation
Procedia PDF Downloads 5554694 Contextual Sentiment Analysis with Untrained Annotators
Authors: Lucas A. Silva, Carla R. Aguiar
Abstract:
This work presents a proposal to perform contextual sentiment analysis using a supervised learning algorithm and disregarding the extensive training of annotators. To achieve this goal, a web platform was developed to perform the entire procedure outlined in this paper. The main contribution of the pipeline described in this article is to simplify and automate the annotation process through a system of analysis of congruence between the notes. This ensured satisfactory results even without using specialized annotators in the context of the research, avoiding the generation of biased training data for the classifiers. For this, a case study was conducted in a blog of entrepreneurship. The experimental results were consistent with the literature related annotation using formalized process with experts.Keywords: sentiment analysis, untrained annotators, naive bayes, entrepreneurship, contextualized classifier
Procedia PDF Downloads 3964693 Copper Related Toxicity of 1-Hydroxy-2-Thiopyridines
Authors: Elena G. Salina, Vadim A. Makarov
Abstract:
With the emergence of primary resistance to the current drugs and wide distribution of latent tuberculosis infection, a need for new compounds with a novel mode of action is growing steadily. Copper-mediated innate immunity and antibacterial toxicity propose novel strategies in TB drug discovery and development. Transcriptome of M. tuberculosis was obtained by RNA-seq, intracellular copper content was measured by ISP MS and complexes of 1-hydroxy-2-thiopyridines with copper were detected by HPLC.1-hydroxy-2-thiopyridine derivatives were found to be highly active in vitro against both actively growing and dormant non-culturable M. tuberculosis. Transcriptome response to 1-hydroxy-2-thiopyridines revealed signs of copper toxicity in M. tuberculosis bacilli. Indeed, Cu was found to accumulate inside cells treated with 1-hydroxy-2-thiopyridines. These compounds were found to form stable charged lipophylic complexes with Cu²⁺ ions which transport into mycobacterial cell. Subsequent metabolic destruction of the complex led to transformation of 1-hydroxy-2-thiopyridines into 2-methylmercapto-2-ethoxycarbonylpyridines, which did not possess antitubercular activity and releasing of free Cu²⁺ in the cytoplasm. 1-hydroxy-2-thiopyridines are a potent class of Cu-dependent inhibitors of M. tuberculosis which may control M. tuberculosis infection by impairment of copper homeostasis. Acknowledgment: This work was financially supported by the Ministry of Education and Science of the RussianFederation (Agreement No 14.616.21.0065; unique identifier RFMEFI61616X0065).Keywords: copper toxicity, drug discovery, M. tuberculosis inhibitors, 2-thiopyridines
Procedia PDF Downloads 1694692 Concealed Objects Detection in Visible, Infrared and Terahertz Ranges
Authors: M. Kowalski, M. Kastek, M. Szustakowski
Abstract:
Multispectral screening systems are becoming more popular because of their very interesting properties and applications. One of the most significant applications of multispectral screening systems is prevention of terrorist attacks. There are many kinds of threats and many methods of detection. Visual detection of objects hidden under clothing of a person is one of the most challenging problems of threats detection. There are various solutions of the problem; however, the most effective utilize multispectral surveillance imagers. The development of imaging devices and exploration of new spectral bands is a chance to introduce new equipment for assuring public safety. We investigate the possibility of long lasting detection of potentially dangerous objects covered with various types of clothing. In the article we present the results of comparative studies of passive imaging in three spectrums – visible, infrared and terahertzKeywords: terahertz, infrared, object detection, screening camera, image processing
Procedia PDF Downloads 3574691 Design and Implementation of an Image Based System to Enhance the Security of ATM
Authors: Seyed Nima Tayarani Bathaie
Abstract:
In this paper, an image-receiving system was designed and implemented through optimization of object detection algorithms using Haar features. This optimized algorithm served as face and eye detection separately. Then, cascading them led to a clear image of the user. Utilization of this feature brought about higher security by preventing fraud. This attribute results from the fact that services will be given to the user on condition that a clear image of his face has already been captured which would exclude the inappropriate person. In order to expedite processing and eliminating unnecessary ones, the input image was compressed, a motion detection function was included in the program, and detection window size was confined.Keywords: face detection algorithm, Haar features, security of ATM
Procedia PDF Downloads 4194690 Analysis of Human Toxicity Potential of Major Building Material Production Stage Using Life Cycle Assessment
Authors: Rakhyun Kim, Sungho Tae
Abstract:
Global environmental issues such as abnormal weathers due to global warming, resource depletion, and ecosystem distortions have been escalating due to rapid increase of population growth, and expansion of industrial and economic development. Accordingly, initiatives have been implemented by many countries to protect the environment through indirect regulation methods such as Environmental Product Declaration (EPD), in addition to direct regulations such as various emission standards. Following this trend, life cycle assessment (LCA) techniques that provide quantitative environmental information, such as Human Toxicity Potential (HTP), for buildings are being developed in the construction industry. However, at present, the studies on the environmental database of building materials are not sufficient to provide this support adequately. The purpose of this study is to analysis human toxicity potential of major building material production stage using life cycle assessment. For this purpose, the theoretical consideration of the life cycle assessment and environmental impact category was performed and the direction of the study was set up. That is, the major material in the global warming potential view was drawn against the building and life cycle inventory database was selected. The classification was performed about 17 kinds of substance and impact index, such as human toxicity potential, that it specifies in CML2001. The environmental impact of analysis human toxicity potential for the building material production stage was calculated through the characterization. Meanwhile, the environmental impact of building material in the same category was analyze based on the characterization impact which was calculated in this study. In this study, establishment of environmental impact coefficients of major building material by complying with ISO 14040. Through this, it is believed to effectively support the decisions of stakeholders to improve the environmental performance of buildings and provide a basis for voluntary participation of architects in environment consideration activities.Keywords: human toxicity potential, major building material, life cycle assessment, production stage
Procedia PDF Downloads 1394689 Establishing a Drug Discovery Platform to Progress Compounds into the Clinic
Authors: Sheraz Gul
Abstract:
The requirements for progressing a compound to clinical trials is well established and relies on the results from in-vitro and in-vivo animal tests to indicate that it is likely to be safe and efficacious when testing in humans. The typical data package required will include demonstrating compound safety, toxicity, bioavailability, pharmacodynamics (potential effects of the compound on body systems) and pharmacokinetics (how the compound is potentially absorbed, distributed, metabolised and eliminated after dosing in humans). If the desired criteria are met and the compound meets the clinical Candidate criteria and is deemed worthy of further development, a submission to regulatory bodies such as the US Food & Drug Administration for an exploratory Investigational New Drug Study can be made. The purpose of this study is to collect data to establish that the compound will not expose humans to unreasonable risks when used in limited, early-stage clinical studies in patients or normal volunteer subjects (Phase I). These studies are also designed to determine the metabolism and pharmacologic actions of the drug in humans, the side effects associated with increasing doses, and, if possible, to gain early evidence on their effectiveness. In order to reach the above goals, we have developed a pre-clinical high throughput Absorption, Distribution, Metabolism and Excretion–Toxicity (ADME–Toxicity) panel of assays to identify compounds that are likely to meet the Lead and Candidate compound acceptance criteria. This panel includes solubility studies in a range of biological fluids, cell viability studies in cancer and primary cell-lines, mitochondrial toxicity, off-target effects (across the kinase, protease, histone deacetylase, phosphodiesterase and GPCR protein families), CYP450 inhibition (5 different CYP450 enzymes), CYP450 induction, cardio-toxicity (hERG) and gene-toxicity. This panel of assays has been applied to multiple compound series developed in a number of projects delivering Lead and clinical Candidates and examples from these will be presented.Keywords: absorption, distribution, metabolism and excretion–toxicity , drug discovery, food and drug administration , pharmacodynamics
Procedia PDF Downloads 1734688 Use of Hierarchical Temporal Memory Algorithm in Heart Attack Detection
Authors: Tesnim Charrad, Kaouther Nouira, Ahmed Ferchichi
Abstract:
In order to reduce the number of deaths due to heart problems, we propose the use of Hierarchical Temporal Memory Algorithm (HTM) which is a real time anomaly detection algorithm. HTM is a cortical learning algorithm based on neocortex used for anomaly detection. In other words, it is based on a conceptual theory of how the human brain can work. It is powerful in predicting unusual patterns, anomaly detection and classification. In this paper, HTM have been implemented and tested on ECG datasets in order to detect cardiac anomalies. Experiments showed good performance in terms of specificity, sensitivity and execution time.Keywords: cardiac anomalies, ECG, HTM, real time anomaly detection
Procedia PDF Downloads 2284687 Design of a New Architecture of IDS Called BiIDS (IDS Based on Two Principles of Detection)
Authors: Yousef Farhaoui
Abstract:
An IDS is a tool which is used to improve the level of security.In this paper we present different architectures of IDS. We will also discuss measures that define the effectiveness of IDS and the very recent works of standardization and homogenization of IDS. At the end, we propose a new model of IDS called BiIDS (IDS Based on the two principles of detection).Keywords: intrusion detection, architectures, characteristic, tools, security
Procedia PDF Downloads 4624686 Proposed Anticipating Learning Classifier System for Cloud Intrusion Detection (ALCS-CID)
Authors: Wafa' Slaibi Alsharafat
Abstract:
Cloud computing is a modern approach in network environment. According to increased number of network users and online systems, there is a need to help these systems to be away from unauthorized resource access and detect any attempts for privacy contravention. For that purpose, Intrusion Detection System is an effective security mechanism to detect any attempts of attacks for cloud resources and their information. In this paper, Cloud Intrusion Detection System has been proposed in term of reducing or eliminating any attacks. This model concerns about achieving high detection rate after conducting a set of experiments using benchmarks dataset called KDD'99.Keywords: IDS, cloud computing, anticipating classifier system, intrusion detection
Procedia PDF Downloads 4744685 Cultural Policies, Globalisation of Arts, and Impact on Cultural Heritage: A Contextual Analysis of France
Authors: Nasser AlShawaaf
Abstract:
While previous researchers have attempted to explain art museums commercialisation with reference to cultural policies, they have overlooked the phenomenon of globalisation. This study examines the causes and effects of globalisation of art museums in France. Building on arts literature, we show that the cultural policies of the French government since 1980s of cultural democratisation, cultural decentralisation, and implementing market principles on the cultural sector are leading to arts globalisation. Although globalisation is producing economic benefits and enhancing cultural reach, however, the damages include artistic values and creativity, cultural heritage and representation, and the museum itself. Art museums and host cities could overcome negative consequences through a hybrid collection display and develop local collections gradually.Keywords: cultural policy, cultural decentralisation, cultural globalisation, art museums, contextual analysis, France
Procedia PDF Downloads 1044684 Crater Detection Using PCA from Captured CMOS Camera Data
Authors: Tatsuya Takino, Izuru Nomura, Yuji Kageyama, Shin Nagata, Hiroyuki Kamata
Abstract:
We propose a method of detecting the craters from the image of the lunar surface. This proposal assumes that it is applied to SLIM (Smart Lander for Investigating Moon) working group aiming at the pinpoint landing on the lunar surface and investigating scientific research. It is difficult to equip and use high-performance computers for the small space probe. So, it is necessary to use a small computer with an exclusive hardware such as FPGA. We have studied the crater detection using principal component analysis (PCA), In this paper, We implement detection algorithm into the FPGA, and the detection is performed on the data that was captured from the CMOS camera.Keywords: crater detection, PCA, FPGA, image processing
Procedia PDF Downloads 5484683 Ecotoxicological Safety of Wastewater Treated with Lignocellulosic Adsorbents
Authors: Luísa P. Cruz-Lopes, Artur Figueirinha, Isabel Brás, Bruno Esteves
Abstract:
Portugal is an important wine and olive oil producer, activities which generate a high quantity of residues commonly called grape stalks and olive cake, respectively. In this work grape stalks and olive cake were used as lignocellulosic adsorbents for wastewater containing lead treatment. To attain a better knowledge of the factors that could influence the quality of the treated wastewater, a chemical characterization of the materials used in the treatment was done. To access the ecotoxicological safety of the treated wastewater, several tests were performed. The results of the toxicity test show that the samples leachate has a mild effect on the living models tested. The tests performed in lemna and bacteria were the most sensible to toxicity effects of the samples. The results obtained in this work evidenced the importance of use of simple and fast toxicity tests to predict impacts in the environment.Keywords: chemical composition, lignocellulosic residues, ecotoxicological safety, wastewater
Procedia PDF Downloads 2824682 On-Road Text Detection Platform for Driver Assistance Systems
Authors: Guezouli Larbi, Belkacem Soundes
Abstract:
The automation of the text detection process can help the human in his driving task. Its application can be very useful to help drivers to have more information about their environment by facilitating the reading of road signs such as directional signs, events, stores, etc. In this paper, a system consisting of two stages has been proposed. In the first one, we used pseudo-Zernike moments to pinpoint areas of the image that may contain text. The architecture of this part is based on three main steps, region of interest (ROI) detection, text localization, and non-text region filtering. Then, in the second step, we present a convolutional neural network architecture (On-Road Text Detection Network - ORTDN) which is considered a classification phase. The results show that the proposed framework achieved ≈ 35 fps and an mAP of ≈ 90%, thus a low computational time with competitive accuracy.Keywords: text detection, CNN, PZM, deep learning
Procedia PDF Downloads 834681 The Toxicity of Doxorubicin Connected with Nanotransporters
Authors: Iva Blazkova, Amitava Moulick, Vedran Milosavljevic, Pavel Kopel, Marketa Vaculovicova, Vojtech Adam, Rene Kizek
Abstract:
Doxorubicin is one of the most commonly used and the most effective chemotherapeutic drugs. This antracycline drug isolated from the bacteria Streptomyces peuceticus var. caesius is sold under the trade name Adriamycin (hydroxydaunomycin, hydroxydaunorubicin). Doxorubicin is used in single therapy to treat hematological malignancies (blood cancers, leukaemia, lymphoma), many types of carcinoma (solid tumors) and soft tissue sarcomas. It has many serious side effects like nausea and vomiting, hair lost, myelosupression, oral mucositis, skin reactions and redness, but the most serious one is the cardiotoxicity. Because of the risk of heart attack and congestive heart failure, the total dose administered to patients has to be accurately monitored. With the aim to lower the side effects and to targeted delivery of doxorubicin into the tumor tissue, the different nanoparticles are studied. The drug can be bound on a surface of nanoparticle, encapsulated in the inner cavity, or incorporated into the structure of nanoparticle. Among others, carbon nanoparticles (graphene, carbon nanotubes, fullerenes) are highly studied. Besides the number of inorganic nanoparticles, a great potential exhibit also organic ones mainly lipid-based and polymeric nanoparticle. The aim of this work was to perform a toxicity study of free doxorubicin compared to doxorubicin conjugated with various nanotransporters. The effect of liposomes, fullerenes, graphene, and carbon nanotubes on the toxicity was analyzed. As a first step, the binding efficacy of between doxorubicin and the nanotransporter was determined. The highest efficacy was detected in case of liposomes (85% of applied drug was encapsulated) followed by graphene, carbon nanotubes and fullerenes. For the toxicological studies, the chicken embryos incubated under controlled conditions (37.5 °C, 45% rH, rotation every 2 hours) were used. In 7th developmental day of chicken embryos doxorubicin or doxorubicin-nanotransporter complex was applied on the chorioallantoic membrane of the eggs and the viability was analyzed every day till the 17th developmental day. Then the embryos were extracted from the shell and the distribution of doxorubicin in the body was analyzed by measurement of organs extracts using laser induce fluorescence detection. The chicken embryo mortality caused by free doxorubicin (30%) was significantly lowered by using the conjugation with nanomaterials. The highest accumulation of doxorubicin and doxorubicin nanotransporter complexes was observed in the liver tissueKeywords: doxorubicin, chicken embryos, nanotransporters, toxicity
Procedia PDF Downloads 4494680 A Paper Based Sensor for Mercury Ion Detection
Authors: Emine G. Cansu Ergun
Abstract:
Conjugated system based sensors for selective detection of metal ions have been taking attention during last two decades. Fluorescent sensors are the promising candidates for ion detection due to their high selectivity towards metal ions, and rapid response times. Detection of mercury in an environmenet is important since mercury is a toxic element for human. Beyond the maximum allowable limit, mercury may cause serious problems in human health by spreading into the atmosphere, water and the food chain. In this study, a quinoxaline and 3,4-ethylenedioxy thiophene based donor-acceptor-donor type conjugated molecule used as a fluorescent sensor for detecting the mercury ion in aqueous medium. Among other various cations, existence of mercury resulted in a full quenching of the fluorescence signal. Then, a paper based sensor is constructed and used for mercury detection. As a result it is concluded that the offering sensor is a good candidate for selective mercury detection in aqueous media both in solution and paper based forms.Keywords: Conjugated molecules , fluorescence quenching, metal ion detection , sensors
Procedia PDF Downloads 1584679 Population Stereotype Production, User Factors, and Icon Design for Underserved Communities of Rural India
Authors: Avijit Sengupta, Klarissa Ting Ting Cheng, Maffee Peng-Hui Wan
Abstract:
This study investigates the influence of user factors and referent characteristics on representation types generated using the stereotype production method for designing icons. Sixty-eight participants of farming communities were asked to draw images based on sixteen feature referents. Significant statistical differences were found between the types of representations generated for contextual and context-independent referents. Strong correlations were observed between years of formal education and total number of abstract representations produced for both contextual and context-independent referents. However, representation characteristics were not influenced by other user factors such as participants’ experience with mobile phone and years of farming experience. A statistically significant tendency of making concrete representations was observed for both contextual and context-independent referents. These findings provide insights on community members’ involvement in icon design and suggest a consolidated icon design strategy based on population stereotype, particularly for under-served rural communities of India.Keywords: abstract representation, concrete representation, participatory design, population stereotype
Procedia PDF Downloads 3754678 Automated Pothole Detection Using Convolution Neural Networks and 3D Reconstruction Using Stereovision
Authors: Eshta Ranyal, Kamal Jain, Vikrant Ranyal
Abstract:
Potholes are a severe threat to road safety and a major contributing factor towards road distress. In the Indian context, they are a major road hazard. Timely detection of potholes and subsequent repair can prevent the roads from deteriorating. To facilitate the roadway authorities in the timely detection and repair of potholes, we propose a pothole detection methodology using convolutional neural networks. The YOLOv3 model is used as it is fast and accurate in comparison to other state-of-the-art models. You only look once v3 (YOLOv3) is a state-of-the-art, real-time object detection system that features multi-scale detection. A mean average precision(mAP) of 73% was obtained on a training dataset of 200 images. The dataset was then increased to 500 images, resulting in an increase in mAP. We further calculated the depth of the potholes using stereoscopic vision by reconstruction of 3D potholes. This enables calculating pothole volume, its extent, which can then be used to evaluate the pothole severity as low, moderate, high.Keywords: CNN, pothole detection, pothole severity, YOLO, stereovision
Procedia PDF Downloads 1364677 Cross Site Scripting (XSS) Attack and Automatic Detection Technology Research
Authors: Tao Feng, Wei-Wei Zhang, Chang-Ming Ding
Abstract:
Cross-site scripting (XSS) is one of the most popular WEB Attacking methods at present, and also one of the most risky web attacks. Because of the population of JavaScript, the scene of the cross site scripting attack is also gradually expanded. However, since the web application developers tend to only focus on functional testing and lack the awareness of the XSS, which has made the on-line web projects exist many XSS vulnerabilities. In this paper, different various techniques of XSS attack are analyzed, and a method automatically to detect it is proposed. It is easy to check the results of vulnerability detection when running it as a plug-in.Keywords: XSS, no target attack platform, automatic detection,XSS detection
Procedia PDF Downloads 4034676 Incorporating Multiple Supervised Learning Algorithms for Effective Intrusion Detection
Authors: Umar Albalawi, Sang C. Suh, Jinoh Kim
Abstract:
As internet continues to expand its usage with an enormous number of applications, cyber-threats have significantly increased accordingly. Thus, accurate detection of malicious traffic in a timely manner is a critical concern in today’s Internet for security. One approach for intrusion detection is to use Machine Learning (ML) techniques. Several methods based on ML algorithms have been introduced over the past years, but they are largely limited in terms of detection accuracy and/or time and space complexity to run. In this work, we present a novel method for intrusion detection that incorporates a set of supervised learning algorithms. The proposed technique provides high accuracy and outperforms existing techniques that simply utilizes a single learning method. In addition, our technique relies on partial flow information (rather than full information) for detection, and thus, it is light-weight and desirable for online operations with the property of early identification. With the mid-Atlantic CCDC intrusion dataset publicly available, we show that our proposed technique yields a high degree of detection rate over 99% with a very low false alarm rate (0.4%).Keywords: intrusion detection, supervised learning, traffic classification, computer networks
Procedia PDF Downloads 3494675 Music Note Detection and Dictionary Generation from Music Sheet Using Image Processing Techniques
Authors: Muhammad Ammar, Talha Ali, Abdul Basit, Bakhtawar Rajput, Zobia Sohail
Abstract:
Music note detection is an area of study for the past few years and has its own influence in music file generation from sheet music. We proposed a method to detect music notes on sheet music using basic thresholding and blob detection. Subsequently, we created a notes dictionary using a semi-supervised learning approach. After notes detection, for each test image, the new symbols are added to the dictionary. This makes the notes detection semi-automatic. The experiments are done on images from a dataset and also on the captured images. The developed approach showed almost 100% accuracy on the dataset images, whereas varying results have been seen on captured images.Keywords: music note, sheet music, optical music recognition, blob detection, thresholding, dictionary generation
Procedia PDF Downloads 1814674 Efficient Iterative V-BLAST Detection Technique in Wireless Communication System
Authors: Hwan-Jun Choi, Sung-Bok Choi, Hyoung-Kyu Song
Abstract:
Recently, among the MIMO-OFDM detection techniques, a lot of papers suggested V-BLAST scheme which can achieve high data rate. Therefore, the signal detection of MIMOOFDM system is important issue. In this paper, efficient iterative VBLAST detection technique is proposed in wireless communication system. The proposed scheme adjusts the number of candidate symbol and iterative scheme based on channel state. According to the simulation result, the proposed scheme has better BER performance than conventional schemes and similar BER performance of the QRD-M with iterative scheme. Moreover complexity of proposed scheme has 50.6 % less than complexity of QRD-M detection with iterative scheme. Therefore the proposed detection scheme can be efficiently used in wireless communication.Keywords: MIMO-OFDM, V-BLAST, QR-decomposition, QRDM, DFE, iterative scheme, channel condition
Procedia PDF Downloads 5304673 Combination between Intrusion Systems and Honeypots
Authors: Majed Sanan, Mohammad Rammal, Wassim Rammal
Abstract:
Today, security is a major concern. Intrusion Detection, Prevention Systems and Honeypot can be used to moderate attacks. Many researchers have proposed to use many IDSs ((Intrusion Detection System) time to time. Some of these IDS’s combine their features of two or more IDSs which are called Hybrid Intrusion Detection Systems. Most of the researchers combine the features of Signature based detection methodology and Anomaly based detection methodology. For a signature based IDS, if an attacker attacks slowly and in organized way, the attack may go undetected through the IDS, as signatures include factors based on duration of the events but the actions of attacker do not match. Sometimes, for an unknown attack there is no signature updated or an attacker attack in the mean time when the database is updating. Thus, signature-based IDS fail to detect unknown attacks. Anomaly based IDS suffer from many false-positive readings. So there is a need to hybridize those IDS which can overcome the shortcomings of each other. In this paper we propose a new approach to IDS (Intrusion Detection System) which is more efficient than the traditional IDS (Intrusion Detection System). The IDS is based on Honeypot Technology and Anomaly based Detection Methodology. We have designed Architecture for the IDS in a packet tracer and then implemented it in real time. We have discussed experimental results performed: both the Honeypot and Anomaly based IDS have some shortcomings but if we hybridized these two technologies, the newly proposed Hybrid Intrusion Detection System (HIDS) is capable enough to overcome these shortcomings with much enhanced performance. In this paper, we present a modified Hybrid Intrusion Detection System (HIDS) that combines the positive features of two different detection methodologies - Honeypot methodology and anomaly based intrusion detection methodology. In the experiment, we ran both the Intrusion Detection System individually first and then together and recorded the data from time to time. From the data we can conclude that the resulting IDS are much better in detecting intrusions from the existing IDSs.Keywords: security, intrusion detection, intrusion prevention, honeypot, anomaly-based detection, signature-based detection, cloud computing, kfsensor
Procedia PDF Downloads 3824672 Camel Thorn Has Hepatoprotective Activity Against Carbon Tetrachloride or Acetaminophen-Induced Hepatotoxicity but Enhances the Cardiac Toxicity of Adriamycin in Rodents
Authors: Awad G. Abdellatif, Huda M. Gargoum, Abdelkader A. Debani, Mudafara Bengleil, Salmin Alshalmani, N. El Zuki, Omran El Fitouri
Abstract:
In this study, the administration of 660 mg/kg of the ethanolic extract of the Alhgigraecorum (camel thorn) to mice, showed a significant decrease in the level of transaminases in animals treated with a combination of CTE plus carbon tetrachloride (CCl4) or acetaminophen as compared to animals receiving CCl4 or acetaminophen alone. The histopathological investigation also confirmed that camel thorn extract protects the liver against damage-induced either by carbon tetrachloride or acetaminophen. On the other hand, the cardiac toxicity produced by adriamycin was significantly increased in the presence of the ethanolic extract of camel thorn. Our study suggested that camel thorn can protect the liver against the injury produced by carbon tetrachloride or acetaminophen, with an unexpected increase in the cardiac toxicity–induced by adriamycin in rodents.Keywords: ethanolic, alhgigraecorum, tetrachloride, acetaminophen
Procedia PDF Downloads 5024671 Flammability and Smoke Toxicity of Rainscreen Façades
Authors: Gabrielle Peck, Ryan Hayes
Abstract:
Four façade systems were tested using a reduced height BS 8414-2 (5 m) test rig. An L-shaped masonry test wall was clad with three types of insulation and an aluminum composite panel with a non-combustible filling (meeting Euroclass A2). A large (3 MW) wooden crib was ignited in a recess at the base of the L, and the fire was allowed to burn for 30 minutes. Air velocity measurements and gas samples were taken from the main ventilation duct and also a small additional ventilation duct, like those in an apartment bathroom or kitchen. This provided a direct route of travel for smoke from the building façade to a theoretical room using a similar design to many high-rise buildings where the vent is connected to (approximately) 30 m³ rooms. The times to incapacitation and lethality of the effluent were calculated for both the main exhaust vent and for a vent connected to a theoretical 30 m³ room. The rainscreen façade systems tested were the common combinations seen in many tower blocks across the UK. Three tests using ACM A2 with Stonewool, Phenolic foam, and Polyisocyanurate (PIR) foam. A fourth test was conducted with PIR and ACM-PE (polyethylene core). Measurements in the main exhaust duct were representative of the effluent from the burning wood crib. FEDs showed incapacitation could occur up to 30 times quicker with combustible insulation than non-combustible insulation, with lethal gas concentrations accumulating up to 2.7 times faster than other combinations. The PE-cored ACM/PIR combination produced a ferocious fire, resulting in the termination of the test after 13.5 minutes for safety reasons. Occupants of the theoretical room in the PIR/ACM A2 test reached a FED of 1 after 22 minutes; for PF/ACM A2, this took 25 minutes, and for stone wool, a lethal dose measurement of 0.6 was reached at the end of the 30-minute test. In conclusion, when measuring smoke toxicity in the exhaust duct, there is little difference between smoke toxicity measurements between façade systems. Toxicity measured in the main exhaust is largely a result of the wood crib used to ignite the façade system. The addition of a vent allowed smoke toxicity to be quantified in the cavity of the façade, providing a realistic way of measuring the toxicity of smoke that could enter an apartment from a façade fire.Keywords: smoke toxicity, large-scale testing, BS8414, FED
Procedia PDF Downloads 604670 Mosaic Augmentation: Insights and Limitations
Authors: Olivia A. Kjorlien, Maryam Asghari, Farshid Alizadeh-Shabdiz
Abstract:
The goal of this paper is to investigate the impact of mosaic augmentation on the performance of object detection solutions. To carry out the study, YOLOv4 and YOLOv4-Tiny models have been selected, which are popular, advanced object detection models. These models are also representatives of two classes of complex and simple models. The study also has been carried out on two categories of objects, simple and complex. For this study, YOLOv4 and YOLOv4 Tiny are trained with and without mosaic augmentation for two sets of objects. While mosaic augmentation improves the performance of simple object detection, it deteriorates the performance of complex object detection, specifically having the largest negative impact on the false positive rate in a complex object detection case.Keywords: accuracy, false positives, mosaic augmentation, object detection, YOLOV4, YOLOV4-Tiny
Procedia PDF Downloads 1274669 Preparation and Evaluation of Citrus hystrix Nanoemulsion Formulation against Rice Weevil, Sitophilus oryzae
Authors: Elsayed Elmiligy, Dzolkhifili Omar, Norhayu Asib
Abstract:
Sitophilus oryzae is a primary destructive insect pest. A study on nanoemulsion formulation of C. hystrix peel oil and evaluation of its insecticidal effect on the adults of S. oryzae was held in toxicology laboratory at Faculty of Agriculture, Universiti Putra Malaysia (UPM). Three nanoemulsion formulations (F1, F2, and F3) were prepared using C. hystrix peel oil (a.i), Tween 80 (surfactant), AMD 810 (carrier) and deionized water. The selected formulations have undergone stability tests, surface tension, zeta potential and particle size measurements. The formulations were tested for their contact and fumigant activity against the adults of S. oryzae. LC₅₀ values were obtained from Probit regressions using the Polo-PC program. All the formulations showed stability under storage temperature and centrifugation. They were characterized as nanoemulsions as they remained in the range of nanoscale 200 nm. The formulations revealed lower surface tension in the range of 29.5 to 30.4 mN/m. They showed stable of zeta potential values. The formulations showed the highest toxicity against the adults of S. oryzae. The order of decreasing toxicity was F1 > F2 > F3 with LC₅₀ values of 52.1, 58.5, and 61.7 µl/l for contact toxicity, and 71, 75.5, and 76.7 µl/l air for fumigant bioassay after 72 hours. Formulation of C. hystrix peel oil in a nanoemulsion enhance its effectiveness and reduce the amount of applied essential oil.Keywords: Citrus hystrix peel oil, Sitophilus oryzae, nanoemulsion, contact toxicity, Fumigant bioassay
Procedia PDF Downloads 1404668 Synergistic Effects of Hydrogen Sulfide and Melatonin in Alleviating Vanadium Toxicity in Solanum lycopersicum L. Plants
Authors: Abazar Ghorbani, W. M. Wishwajith W. Kandegama, Seyed Mehdi Razavi, Moxian Chen
Abstract:
The roles of hydrogen sulfide (H₂S) and melatonin (MT) as gasotransmitters in plants are widely recognised. Nevertheless, the precise nature of their involvement in defensive reactions remains uncertain. This study investigates the impact of the ML-H2S interaction on tomato plants exposed to vanadium (V) toxicity, focusing on synthesising secondary metabolites and V metal sequestration. The treatments applied in this study included a control (T1), V stress (T2), MT+V (T3), MT+H2S+V (T4), MT+hypotaurine (HT)+V (T5), and MT+H2S+HT+V (T6). These treatments were administered: MT (150 µM) as a foliar spray pre-treatment (3X), HT treatment (0.1 mM, an H2S scavenger) as root immersion for 12 hours as pre-treatments, and H2S (NaHS, 0.2 mM) and V (40 mg/L) treatments added to the Hoagland solution for 2 weeks. Results demonstrate that ML and H2S+ML treatments alleviate V toxicity by promoting the transcription of key genes (ANS, F3H, CHS, DFR, PAL, and CHI) involved in phenolic and anthocyanin biosynthesis. Moreover, they decreased V uptake and accumulation and enhanced the transcription of genes involved in glutathione and phytochelatin synthesis (GSH1, PCS, and ABC1), leading to V sequestration in roots and protection against V-induced damage. Additionally, ML and H2S+ML treatments optimize chlorophyll metabolism, and increase internal H2S levels, thereby promoting tomato growth under V stress. The combined treatment of ML+H2S shows superior effects compared to ML alone, suggesting synergistic/interactive effects between these two substances. Furthermore, inhibition of the beneficial impact of ML+H2S and ML treatments by HT, an H2S scavenger, underscores the significant involvement of H₂S in the signaling pathway activated by ML during V toxicity. Overall, these findings suggest that ML requires the presence of endogenous H₂S to mitigate V-induced adverse effects on tomato seedlings.Keywords: vanadium toxicity, secondary metabolites, vanadium sequestration, h2s-melatonin crosstalk
Procedia PDF Downloads 454667 Real Time Video Based Smoke Detection Using Double Optical Flow Estimation
Authors: Anton Stadler, Thorsten Ike
Abstract:
In this paper, we present a video based smoke detection algorithm based on TVL1 optical flow estimation. The main part of the algorithm is an accumulating system for motion angles and upward motion speed of the flow field. We optimized the usage of TVL1 flow estimation for the detection of smoke with very low smoke density. Therefore, we use adapted flow parameters and estimate the flow field on difference images. We show in theory and in evaluation that this improves the performance of smoke detection significantly. We evaluate the smoke algorithm using videos with different smoke densities and different backgrounds. We show that smoke detection is very reliable in varying scenarios. Further we verify that our algorithm is very robust towards crowded scenes disturbance videos.Keywords: low density, optical flow, upward smoke motion, video based smoke detection
Procedia PDF Downloads 354