Search results for: protecting variant
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 723

Search results for: protecting variant

633 Artificial Intelligence Protecting Birds against Collisions with Wind Turbines

Authors: Aleksandra Szurlej-Kielanska, Lucyna Pilacka, Dariusz Górecki

Abstract:

The dynamic development of wind energy requires the simultaneous implementation of effective systems minimizing the risk of collisions between birds and wind turbines. Wind turbines are installed in more and more challenging locations, often close to the natural environment of birds. More and more countries and organizations are defining guidelines for the necessary functionality of such systems. The minimum bird detection distance, trajectory tracking, and shutdown time are key factors in eliminating collisions. Since 2020, we have continued the survey on the validation of the subsequent version of the BPS detection and reaction system. Bird protection system (BPS) is a fully automatic camera system which allows one to estimate the distance of the bird to the turbine, classify its size and autonomously undertake various actions depending on the bird's distance and flight path. The BPS was installed and tested in a real environment at a wind turbine in northern Poland and Central Spain. The performed validation showed that at a distance of up to 300 m, the BPS performs at least as well as a skilled ornithologist, and large bird species are successfully detected from over 600 m. In addition, data collected by BPS systems installed in Spain showed that 60% of the detections of all birds of prey were from individuals approaching the turbine, and these detections meet the turbine shutdown criteria. Less than 40% of the detections of birds of prey took place at wind speeds below 2 m/s while the turbines were not working. As shown by the analysis of the data collected by the system over 12 months, the system classified the improved size of birds with a wingspan of more than 1.1 m in 90% and the size of birds with a wingspan of 0.7 - 1 m in 80% of cases. The collected data also allow the conclusion that some species keep a certain distance from the turbines at a wind speed of over 8 m/s (Aquila sp., Buteo sp., Gyps sp.), but Gyps sp. and Milvus sp. remained active at this wind speed on the tested area. The data collected so far indicate that BPS is effective in detecting and stopping wind turbines in response to the presence of birds of prey with a wingspan of more than 1 m.

Keywords: protecting birds, birds monitoring, wind farms, green energy, sustainable development

Procedia PDF Downloads 50
632 Clinicopathological Characteristics in Male Breast Cancer: A Case Series and Literature Review

Authors: Mohamed Shafi Mahboob Ali

Abstract:

Male breast cancer (MBC) is a rare entity with overall cases reported less than 1%. However, the incidence of MBC is regularly rising every year. Due to the lack of data on MBC, diagnosis and treatment are tailored to female breast cancer. MBC risk increases with age and is usually diagnosed ten years late as the disease progression is slow compared to female breast cancer (FBC). The most common feature of MBC is an intra-ductal variant, and often, upon diagnosis, the stage of the disease is already advanced. The Prognosis of MBC is often flawed, but new treatment modalities are emerging with the current knowledge and advancement. We presented a series of male breast cancer in our center, highlighting the clinicopathological, radiological and treatment options.

Keywords: male, breast, cancer, clinicopathology, ultrasound, CT scan

Procedia PDF Downloads 73
631 Descent Algorithms for Optimization Algorithms Using q-Derivative

Authors: Geetanjali Panda, Suvrakanti Chakraborty

Abstract:

In this paper, Newton-like descent methods are proposed for unconstrained optimization problems, which use q-derivatives of the gradient of an objective function. First, a local scheme is developed with alternative sufficient optimality condition, and then the method is extended to a global scheme. Moreover, a variant of practical Newton scheme is also developed introducing a real sequence. Global convergence of these schemes is proved under some mild conditions. Numerical experiments and graphical illustrations are provided. Finally, the performance profiles on a test set show that the proposed schemes are competitive to the existing first-order schemes for optimization problems.

Keywords: Descent algorithm, line search method, q calculus, Quasi Newton method

Procedia PDF Downloads 376
630 Lexico-Semantic and Contextual Analysis of the Concept of Joy in Modern English Fiction

Authors: Zarine Avetisyan

Abstract:

Concepts are part and parcel of everyday text and talk. Their ubiquity predetermines the topicality of the given research which aims at the semantic decomposition of concepts in general and the concept of joy in particular, as well as the study of lexico-semantic variants as means of realization of a certain concept in different “semantic settings”, namely in a certain context. To achieve the stated aim, the given research departs from the methods of componential and contextual analysis, studying lexico-semantic variants /LSVs/ of the concept of joy and the semantic signs embedded in those LSVs, such as the semantic sign of intensity, supporting emotions, etc. in the context of Modern English fiction.

Keywords: concept, context, lexico-semantic variant, semantic sign

Procedia PDF Downloads 333
629 Efficacy of Coconut Shell Pyrolytic Oil Distillate in Protecting Wood Against Bio-Deterioration

Authors: K. S. Shiny, R. Sundararaj

Abstract:

Coconut trees (Cocos nucifera L.) are grown in many parts of India and world because of its multiple utilities. During pyrolysis, coconut shells yield oil, which is a dark thick liquid. Upon simple distillation it produces a more or less colourless liquid, termed coconut shell pyrolytic oil distillate (CSPOD). This manuscript reports and discusses the use of coconut shell pyrolytic oil distillate as a potential wood protectant against bio-deterioration. Since botanical products as ecofriendly wood protectant is being tested worldwide, the utilization of CPSOD as wood protectant is of great importance. The efficacy of CSPOD as wood protectant was evaluated as per Bureau of Indian Standards (BIS) in terms of its antifungal, antiborer, and termiticidal activities. Specimens of Rubber wood (Hevea brasiliensis) in six replicate each for two treatment methods namely spraying and dipping (48hrs) were employed. CSPOD was found to impart total protection against termites for six months compared to control under field conditions. For assessing the efficacy of CSPOD against fungi, the treated blocks were subjected to the attack of two white rot fungi Tyromyces versicolor (L.) Fr. and Polyporus sanguineus (L.) G. Mey and two brown rot fungi, Polyporus meliae (Undrew.) Murrill. and Oligoporus placenta (Fr.) Gilb. & Ryvarden. Results indicated that treatment with CSPOD significantly protected wood from the damage caused by the decay fungi. Efficacy of CSPOD against wood borer Lyctus africanus Lesne was carried out using six pairs of male and female beetles and it gave promising results in protecting the treated wood blocks when compared to control blocks. As far as the treatment methods were concerned, dip treatment was found to be more effective when compared to spraying. The results of the present investigation indicated that CSPOD is a promising botanical compound which has the potential to replace synthetic wood protectants. As coconut shell, pyrolytic oil is a waste byproduct of coconut shell charcoal industry, its utilization as a wood preservative will expand the economic returns from such industries.

Keywords: coconut shell pyrolytic oil distillate, eco-friendly wood protection, termites, wood borers, wood decay fungi

Procedia PDF Downloads 349
628 Association of Nuclear – Mitochondrial Epistasis with BMI in Type 1 Diabetes Mellitus Patients

Authors: Agnieszka H. Ludwig-Slomczynska, Michal T. Seweryn, Przemyslaw Kapusta, Ewelina Pitera, Katarzyna Cyganek, Urszula Mantaj, Lucja Dobrucka, Ewa Wender-Ozegowska, Maciej T. Malecki, Pawel Wolkow

Abstract:

Obesity results from an imbalance between energy intake and its expenditure. Genome-Wide Association Study (GWAS) analyses have led to discovery of only about 100 variants influencing body mass index (BMI), which explain only a small portion of genetic variability. Analysis of gene epistasis gives a chance to discover another part. Since it was shown that interaction and communication between nuclear and mitochondrial genome are indispensable for normal cell function, we have looked for epistatic interactions between the two genomes to find their correlation with BMI. Methods: The analysis was performed on 366 T1DM patients using Illumina Infinium OmniExpressExome-8 chip and followed by imputation on Michigan Imputation Server. Only genes which influence mitochondrial functioning (listed in Human MitoCarta 2.0) were included in the analysis – variants of nuclear origin (MAF > 5%) in 1140 genes and 42 mitochondrial variants (MAF > 1%). Gene expression analysis was performed on GTex data. Association analysis between genetic variants and BMI was performed with the use of Linear Mixed Models as implemented in the package 'GENESIS' in R. Analysis of association between mRNA expression and BMI was performed with the use of linear models and standard significance tests in R. Results: Among variants involved in epistasis between mitochondria and nucleus we have identified one in mitochondrial transcription factor, TFB2M (rs6701836). It interacted with mitochondrial variants localized to MT-RNR1 (p=0.0004, MAF=15%), MT-ND2 (p=0.07, MAF=5%) and MT-ND4 (p=0.01, MAF=1.1%). Analysis of the interaction between nuclear variant rs6701836 (nuc) and rs3021088 localized to MT-ND2 mitochondrial gene (mito) has shown that the combination of the two led to BMI decrease (p=0.024). Each of the variants on its own does not correlate with higher BMI [p(nuc)=0.856, p(mito)=0.116)]. Although rs6701836 is intronic, it influences gene expression in the thyroid (p=0.000037). rs3021088 is a missense variant that leads to alanine to threonine substitution in the MT-ND2 gene which belongs to complex I of the electron transport chain. The analysis of the influence of genetic variants on gene expression has confirmed the trend explained above – the interaction of the two genes leads to BMI decrease (p=0.0308). Each of the mRNAs on its own is associated with higher BMI (p(mito)=0.0244 and p(nuc)=0.0269). Conclusıons: Our results show that nuclear-mitochondrial epistasis can influence BMI in T1DM patients. The correlation between transcription factor expression and mitochondrial genetic variants will be subject to further analysis.

Keywords: body mass index, epistasis, mitochondria, type 1 diabetes

Procedia PDF Downloads 151
627 A Rare Case Report of Wandering Spleen Torsion

Authors: Steven Robinson, Adriana Dager, Param Patel

Abstract:

Wandering spleen is a rare variant where there is abnormal development of the ligamentous peritoneal attachments of the spleen which normally anchor it in the left upper quadrant of the abdomen. Ligamentous abnormalities can be congenital, or acquired through pregnancy, injury, or iatrogenic causes. Absence or laxity of these ligaments allows migration of the spleen into ectopic portions of the abdomen, which is also associated with an elongated vascular pedicle. Incidence of wandering spleen is reported at less than 0.25% with a female to male ratio of approximately 6:1. The most common complication of a wandering spleen is torsion around its vascular pedicle which can lead to thrombosis and infarction. Torsion of a wandering spleen is a rare but important cause of an acute abdomen. Imaging, and specifically CT or ultrasound, is crucial in the diagnosis. We present a case of a torsed wandering spleen which was treated with splenectomy.

Keywords: Wandering Spleen, Torsion, Splenic Torsion, Spleen

Procedia PDF Downloads 54
626 An Optimization Algorithm Based on Dynamic Schema with Dissimilarities and Similarities of Chromosomes

Authors: Radhwan Yousif Sedik Al-Jawadi

Abstract:

Optimization is necessary for finding appropriate solutions to a range of real-life problems. In particular, genetic (or more generally, evolutionary) algorithms have proved very useful in solving many problems for which analytical solutions are not available. In this paper, we present an optimization algorithm called Dynamic Schema with Dissimilarity and Similarity of Chromosomes (DSDSC) which is a variant of the classical genetic algorithm. This approach constructs new chromosomes from a schema and pairs of existing ones by exploring their dissimilarities and similarities. To show the effectiveness of the algorithm, it is tested and compared with the classical GA, on 15 two-dimensional optimization problems taken from literature. We have found that, in most cases, our method is better than the classical genetic algorithm.

Keywords: chromosome injection, dynamic schema, genetic algorithm, similarity and dissimilarity

Procedia PDF Downloads 320
625 Investigations on the Influence of Optimized Charge Air Cooling for a Diesel Passenger Car

Authors: Christian Doppler, Gernot Hirschl, Gerhard Zsiga

Abstract:

Starting from 2020, an EU-wide CO2-limitation of 95g/km is scheduled for the average of an OEMs passenger car fleet. Considering that, further measures of optimization on the diesel cycle will be necessary in order to reduce fuel consumption and emissions while keeping performance values adequate at the least. The present article deals with charge air cooling (CAC) on the basis of a diesel passenger car model in a 0D/1D-working process calculation environment. The considered engine is a 2.4 litre EURO VI diesel engine with variable geometry turbocharger (VGT) and low-pressure exhaust gas recirculation (LP EGR). The object of study was the impact of charge air cooling on the engine working process at constant boundary conditions which could have been conducted with an available and validated engine model in AVL BOOST. Part load was realized with constant power and NOx-emissions, whereas full load was accomplished with a lambda control in order to obtain maximum engine performance. The informative results were used to implement a simulation model in Matlab/Simulink which is further integrated into a full vehicle simulation environment via coupling with ICOS (Independent Co-Simulation Platform). Next, the dynamic engine behavior was validated and modified with load steps taken from the engine test bed. Due to the modular setup in the Co-Simulation, different CAC-models have been simulated quickly with their different influences on the working process. In doing so, a new cooler variation isn’t needed to be reproduced and implemented into the primary simulation model environment, but is implemented quickly and easily as an independent component into the simulation entity. By means of the association of the engine model, longitudinal dynamics vehicle model and different CAC models (air/air & water/air variants) in both steady state and transient operational modes, statements are gained regarding fuel consumption, NOx-emissions and power behavior. The fact that there is no more need of a complex engine model is very advantageous for the overall simulation volume. Beside of the simulation with the mentioned demonstrator engine, there have also been conducted several experimental investigations on the engine test bench. Here the comparison of a standard CAC with an intake-manifold-integrated CAC was executed in particular. Simulative as well as experimental tests showed benefits for the water/air CAC variant (on test bed especially the intake manifold integrated variant). The benefits are illustrated by a reduced pressure loss and a gain in air efficiency and CAC efficiency, those who all lead to minimized emission and fuel consumption for stationary and transient operation.

Keywords: air/water-charge air cooler, co-simulation, diesel working process, EURO VI fuel consumption

Procedia PDF Downloads 247
624 Democracy and Human Rights in Nigeria's Fourth Republic: An Assessment

Authors: Kayode Julius Oni

Abstract:

Without mincing words, democracy is by far the most popular form of government in the world today. No matter how we look at it, and regardless of the variant, most leaders in the world today wish to be seen or labeled as Democrats. Perhaps, its attractions in terms of freedom of allocation, accountability, smooth successions of leadership and a lot more, account for its appeal to the ordinary people. The governance style in Nigeria since 1999 cannot be said to be different from the military. Elections are manipulated, judicial processes abused, and the ordinary people do not have access to the dividends of democracy. The paper seeks to address the existing failures experienced under democratic rule in Nigeria which have to transcend into violation of human rights in the conduct of government business. The paper employs the primary and secondary sources of data collection, and it is highly descriptive and critical.

Keywords: democracy, human rights, Nigeria, politics, republic

Procedia PDF Downloads 236
623 Digital Immunity System for Healthcare Data Security

Authors: Nihar Bheda

Abstract:

Protecting digital assets such as networks, systems, and data from advanced cyber threats is the aim of Digital Immunity Systems (DIS), which are a subset of cybersecurity. With features like continuous monitoring, coordinated reactions, and long-term adaptation, DIS seeks to mimic biological immunity. This minimizes downtime by automatically identifying and eliminating threats. Traditional security measures, such as firewalls and antivirus software, are insufficient for enterprises, such as healthcare providers, given the rapid evolution of cyber threats. The number of medical record breaches that have occurred in recent years is proof that attackers are finding healthcare data to be an increasingly valuable target. However, obstacles to enhancing security include outdated systems, financial limitations, and a lack of knowledge. DIS is an advancement in cyber defenses designed specifically for healthcare settings. Protection akin to an "immune system" is produced by core capabilities such as anomaly detection, access controls, and policy enforcement. Coordination of responses across IT infrastructure to contain attacks is made possible by automation and orchestration. Massive amounts of data are analyzed by AI and machine learning to find new threats. After an incident, self-healing enables services to resume quickly. The implementation of DIS is consistent with the healthcare industry's urgent requirement for resilient data security in light of evolving risks and strict guidelines. With resilient systems, it can help organizations lower business risk, minimize the effects of breaches, and preserve patient care continuity. DIS will be essential for protecting a variety of environments, including cloud computing and the Internet of medical devices, as healthcare providers quickly adopt new technologies. DIS lowers traditional security overhead for IT departments and offers automated protection, even though it requires an initial investment. In the near future, DIS may prove to be essential for small clinics, blood banks, imaging centers, large hospitals, and other healthcare organizations. Cyber resilience can become attainable for the whole healthcare ecosystem with customized DIS implementations.

Keywords: digital immunity system, cybersecurity, healthcare data, emerging technology

Procedia PDF Downloads 38
622 The Iranian Law and Refugee Survivors of Sexual and Gender-Based Violence

Authors: Aminreza Koohestani

Abstract:

This paper intends to explore the existing safeguards available within the Iranian law in protecting refugees affected by Sexual and Gender-Based Violence (SGBV). The Iranian law afforded protection for women and girls against SGBV is scattered across various bodies of law. Moreover, the degree of protection provided by the law varies greatly from one type of SGBV to another. The paper discusses the scope of applicability of Iranian laws to refugees affected by SGBV as well as substantive and procedural laws afforded protection for survivors of SGBV.

Keywords: Iran, law, violence, women

Procedia PDF Downloads 201
621 Cultural Landscape Planning – A Case of Chettinad Village Clusters

Authors: Adhithy Menon E., Biju C. A.

Abstract:

In the 1960s, the concept of preserving heritage monuments was first introduced. During the 1990s, the concept of cultural landscapes gained importance, highlighting the importance of culture and heritage. Throughout this paper, we examine the second category of the cultural landscape, which is an organically evolving landscape as it represents a web of tangible, intangible, and ecological heritage and the ways in which they can be rejuvenated. Cultural landscapes in various regions, such as the Chettinad Village clusters, are in serious decline, which is identified through the Heritage Passport program of this area (2007). For this reason, it is necessary to conduct a detailed analysis of the factors that contribute to this degradation to ensure its protection in the future. An analysis of the cultural landscape of the Chettinad Village clusters and its impact on the community is presented in this paper. The paper follows the first objective, which is to understand cultural landscapes and their different criteria and categories. It is preceded by the study of various methods for protecting cultural landscapes. To identify a core area of intervention based on the parameters of Cultural Landscapes and Community Based Tourism, a study and analysis of the regional context of Chettinad village clusters considering tourism development must first be conducted. Lastly, planning interventions for integrating community-based tourism in Chettinad villages for the purpose of rejuvenating the cultural landscapes of the villages as well as their communities. The major findings include the importance of the local community in protecting cultural landscapes. The parameters identified to have an impact on Chettinad Village clusters are a community (community well-being, local maintenance, and enhancement, demand, alternative income for community, public participation, awareness), tourism (location and physical access, journey time, tourist attractions), integrity (natural factors, natural disasters, demolition of structures, deterioration of materials) authenticity (sense of place, living elements, building techniques, artistic expression, religious context) disaster management (natural disasters) and environmental impact (pollution). This area can be restored to its former glory and preserved as part of the cultural landscape for future generations by focusing on and addressing these parameters within the identified core area of the Chettinad Villages cluster (Kanadukathan TP, Kothamangalam, Kottaiyur, Athangudi, Karikudi, and Palathur).

Keywords: Chettinad village clusters, community, cultural landscapes, organically evolved.

Procedia PDF Downloads 51
620 Modeling the Current and Future Distribution of Anthus Pratensis under Climate Change

Authors: Zahira Belkacemi

Abstract:

One of the most important tools in conservation biology is information on the geographic distribution of species and the variables determining those patterns. In this study, we used maximum-entropy niche modeling (Maxent) to predict the current and future distribution of Anthus pratensis using climatic variables. The results showed that the species would not be highly affected by the climate change in shifting its distribution; however, the results of this study should be improved by taking into account other predictors, and that the NATURA 2000 protected sites will be efficient at 42% in protecting the species.

Keywords: anthus pratensis, climate change, Europe, species distribution model

Procedia PDF Downloads 111
619 Evaluation of Australian Open Banking Regulation: Balancing Customer Data Privacy and Innovation

Authors: Suman Podder

Abstract:

As Australian ‘Open Banking’ allows customers to share their financial data with accredited Third-Party Providers (‘TPPs’), it is necessary to evaluate whether the regulators have achieved the balance between protecting customer data privacy and promoting data-related innovation. Recognising the need to increase customers’ influence on their own data, and the benefits of data-related innovation, the Australian Government introduced ‘Consumer Data Right’ (‘CDR’) to the banking sector through Open Banking regulation. Under Open Banking, TPPs can access customers’ banking data that allows the TPPs to tailor their products and services to meet customer needs at a more competitive price. This facilitated access and use of customer data will promote innovation by providing opportunities for new products and business models to emerge and grow. However, the success of Open Banking depends on the willingness of the customers to share their data, so the regulators have augmented the protection of data by introducing new privacy safeguards to instill confidence and trust in the system. The dilemma in policymaking is that, on the one hand, lenient data privacy laws will help the flow of information, but at the risk of individuals’ loss of privacy, on the other hand, stringent laws that adequately protect privacy may dissuade innovation. Using theoretical and doctrinal methods, this paper examines whether the privacy safeguards under Open Banking will add to the compliance burden of the participating financial institutions, resulting in the undesirable effect of stifling other policy objectives such as innovation. The contribution of this research is three-fold. In the emerging field of customer data sharing, this research is one of the few academic studies on the objectives and impact of Open Banking in the Australian context. Additionally, Open Banking is still in the early stages of implementation, so this research traces the evolution of Open Banking through policy debates regarding the desirability of customer data-sharing. Finally, the research focuses not only on the customers’ data privacy and juxtaposes it with another important objective of promoting innovation, but it also highlights the critical issues facing the data-sharing regime. This paper argues that while it is challenging to develop a regulatory framework for protecting data privacy without impeding innovation and jeopardising yet unknown opportunities, data privacy and innovation promote different aspects of customer welfare. This paper concludes that if a regulation is appropriately designed and implemented, the benefits of data-sharing will outweigh the cost of compliance with the CDR.

Keywords: consumer data right, innovation, open banking, privacy safeguards

Procedia PDF Downloads 116
618 Fractal-Wavelet Based Techniques for Improving the Artificial Neural Network Models

Authors: Reza Bazargan lari, Mohammad H. Fattahi

Abstract:

Natural resources management including water resources requires reliable estimations of time variant environmental parameters. Small improvements in the estimation of environmental parameters would result in grate effects on managing decisions. Noise reduction using wavelet techniques is an effective approach for pre-processing of practical data sets. Predictability enhancement of the river flow time series are assessed using fractal approaches before and after applying wavelet based pre-processing. Time series correlation and persistency, the minimum sufficient length for training the predicting model and the maximum valid length of predictions were also investigated through a fractal assessment.

Keywords: wavelet, de-noising, predictability, time series fractal analysis, valid length, ANN

Procedia PDF Downloads 345
617 Multi-Objective Optimization of an Aerodynamic Feeding System Using Genetic Algorithm

Authors: Jan Busch, Peter Nyhuis

Abstract:

Considering the challenges of short product life cycles and growing variant diversity, cost minimization and manufacturing flexibility increasingly gain importance to maintain a competitive edge in today’s global and dynamic markets. In this context, an aerodynamic part feeding system for high-speed industrial assembly applications has been developed at the Institute of Production Systems and Logistics (IFA), Leibniz Universitaet Hannover. The aerodynamic part feeding system outperforms conventional systems with respect to its process safety, reliability, and operating speed. In this paper, a multi-objective optimisation of the aerodynamic feeding system regarding the orientation rate, the feeding velocity and the required nozzle pressure is presented.

Keywords: aerodynamic feeding system, genetic algorithm, multi-objective optimization, workpiece orientation

Procedia PDF Downloads 554
616 Practice of Mutual Squiggle Story Making as a Variant of Squiggle Method

Authors: Toshiki Ito

Abstract:

Mutual squiggle story making (MSSM ) is the development of Winnicott’s squiggle method in Japan. In the MSSM Method, a therapist has the client freely divide a piece of drawing paper into six spaces, and both the therapist and client do squiggle in each space. All six pictures finished, the therapist then asks the client to create a story using all the pictures. Making a story has the effect of reintegrating what is projected by consciousness. In this paper, the author presented a case with a junior high school girl using MSSM. And it is considered that the advantage of this technique is that (1) it enables non-verbal communication with children and adults who cannot express their feelings verbally. (2) Through this communication, the psychological content of the client and the characteristics of the client's mind can be understood, and (3) It can be said that mutual rapport is deepened by the supportive reaction of the therapist.

Keywords: MSSM, squiggle, Winnicott, drawing method

Procedia PDF Downloads 166
615 Implementation of Invisible Digital Watermarking

Authors: V. Monisha, D. Sindhuja, M. Sowmiya

Abstract:

Over the decade, the applications about multimedia have been developed rapidly. The advancement in the communication field at the faster pace, it is necessary to protect the data during transmission. Thus, security of multimedia contents becomes a vital issue, and it is a need for protecting the digital content against malfunctions. Digital watermarking becomes the solution for the copyright protection and authentication of data in the network. In multimedia applications, embedded watermarks should be robust, and imperceptible. For improving robustness, the discrete wavelet transform is used. Both encoding and extraction algorithm can be done using MATLAB R2012a. In this Discrete wavelet transform (DWT) domain of digital image, watermarking algorithm is used, and hardware implementation can be done on Xilinx based FPGA.

Keywords: digital watermarking, DWT, robustness, FPGA

Procedia PDF Downloads 391
614 Applying Intelligent Material in Food Packaging

Authors: Kasra Ghaemi, Syeda Tasnim, Shohel Mahmud

Abstract:

One of the main issues affecting the quality and shelf life of food products is temperature fluctuation during transportation and storage. Packaging plays an important role in protecting food from environmental conditions, especially thermal variations. In this study, the performance of using microencapsulated Phase Change Material (PCM) as a promising thermal buffer layer in smart food packaging is investigated. The considered insulation layer is evaluated for different thicknesses and the absorbed heat from the environment. The results are presented in terms of the melting time of PCM or provided thermal protection period.

Keywords: food packaging, phase change material, thermal buffer, protection time

Procedia PDF Downloads 63
613 Temperature Calculation for an Atmospheric Pressure Plasma Jet by Optical Emission Spectroscopy

Authors: H. Lee, Jr., L. Bo-ot, R. Tumlos, H. Ramos

Abstract:

The objective of the study is to be able to calculate excitation and vibrational temperatures of a 2.45 GHz microwave-induced atmospheric pressure plasma jet. The plasma jet utilizes Argon gas as a primary working gas, while Nitrogen is utilized as a shroud gas for protecting the quartz tube from the plasma discharge. Through Optical Emission Spectroscopy (OES), various emission spectra were acquired from the plasma discharge. Selected lines from Ar I and N2 I emissions were used for the Boltzmann plot technique. The Boltzmann plots yielded values for the excitation and vibrational temperatures. The various values for the temperatures were plotted against varying parameters such as the gas flow rates.

Keywords: plasma jet, OES, Boltzmann plots, vibrational temperatures

Procedia PDF Downloads 686
612 Parallel Hybrid Honeypot and IDS Architecture to Detect Network Attacks

Authors: Hafiz Gulfam Ahmad, Chuangdong Li, Zeeshan Ahmad

Abstract:

In this paper, we proposed a parallel IDS and honeypot based approach to detect and analyze the unknown and known attack taxonomy for improving the IDS performance and protecting the network from intruders. The main theme of our approach is to record and analyze the intruder activities by using both the low and high interaction honeypots. Our architecture aims to achieve the required goals by combing signature based IDS, honeypots and generate the new signatures. The paper describes the basic component, design and implementation of this approach and also demonstrates the effectiveness of this approach reducing the probability of network attacks.

Keywords: network security, intrusion detection, honeypot, snort, nmap

Procedia PDF Downloads 531
611 Exploring Factors That May Contribute to the Underdiagnosis of Hereditary Transthyretin Amyloidosis in African American Patients

Authors: Kelsi Hagerty, Ami Rosen, Aaliyah Heyward, Nadia Ali, Emily Brown, Erin Demo, Yue Guan, Modele Ogunniyi, Brianna McDaniels, Alanna Morris, Kunal Bhatt

Abstract:

Hereditary transthyretin amyloidosis (hATTR) is a progressive, multi-systemic, and life-threatening disease caused by a disruption in the TTR protein that delivers thyroxine and retinol to the liver. This disruption causes the protein to misfold into amyloid fibrils, leading to the accumulation of the amyloid fibrils in the heart, nerves, and GI tract. Over 130 variants in the TTR gene are known to cause hATTR. The Val122Ile variant is the most common in the United States and is seen almost exclusively in people of African descent. TTR variants are inherited in an autosomal dominant fashion and have incomplete penetrance and variable expressivity. Individuals with hATTR may exhibit symptoms from as early as 30 years to as late as 80 years of age. hATTR is characterized by a wide range of clinical symptoms such as cardiomyopathy, neuropathy, carpal tunnel syndrome, and GI complications. Without treatment, hATTR leads to progressive disease and can ultimately lead to heart failure. hATTR disproportionately affects individuals of African descent; the estimated prevalence of hATTR among Black individuals in the US is 3.4%. Unfortunately, hATTR is often underdiagnosed and misdiagnosed because many symptoms of the disease overlap with other cardiac conditions. Due to the progressive nature of the disease, multi-systemic manifestations that can lead to a shortened lifespan, and the availability of free genetic testing and promising FDA-approved therapies that enhance treatability, early identification of individuals with a pathogenic hATTR variant is important, as this can significantly impact medical management for patients and their relatives. Furthermore, recent literature suggests that TTR genetic testing should be performed in all patients with suspicion of TTR-related cardiomyopathy, regardless of age, and that follow-up with genetic counseling services is recommended. Relatives of patients with hATTR benefit from genetic testing because testing can identify carriers early and allow relatives to receive regular screening and management. Despite the striking prevalence of hATTR among Black individuals, hATTR remains underdiagnosed in this patient population, and germline genetic testing for hATTR in Black individuals seems to be underrepresented, though the reasons for this have not yet been brought to light. Historically, Black patients experience a number of barriers to seeking healthcare that has been hypothesized to perpetuate the underdiagnosis of hATTR, such as lack of access and mistrust of healthcare professionals. Prior research has described a myriad of factors that shape an individual’s decision about whether to pursue presymptomatic genetic testing for a familial pathogenic variant, such as family closeness and communication, family dynamics, and a desire to inform other family members about potential health risks. This study explores these factors through 10 in-depth interviews with patients with hATTR about what factors may be contributing to the underdiagnosis of hATTR in the Black population. Participants were selected from the Emory University Amyloidosis clinic based on having a molecular diagnosis of hATTR. Interviews were recorded and transcribed verbatim, then coded using MAXQDA software. Thematic analysis was completed to draw commonalities between participants. Upon preliminary analysis, several themes have emerged. Barriers identified include i) Misdiagnosis and a prolonged diagnostic odyssey, ii) Family communication and dynamics surrounding health issues, iii) Perceptions of healthcare and one’s own health risks, and iv) The need for more intimate provider-patient relationships and communication. Overall, this study gleaned valuable insight from members of the Black community about possible factors contributing to the underdiagnosis of hATTR, as well as potential solutions to go about resolving this issue.

Keywords: cardiac amyloidosis, heart failure, TTR, genetic testing

Procedia PDF Downloads 77
610 Arithmetic Operations in Deterministic P Systems Based on the Weak Rule Priority

Authors: Chinedu Peter, Dashrath Singh

Abstract:

Membrane computing is a computability model which abstracts its structures and functions from the biological cell. The main ingredient of membrane computing is the notion of a membrane structure, which consists of several cell-like membranes recurrently placed inside a unique skin membrane. The emergence of several variants of membrane computing gives rise to the notion of a P system. The paper presents a variant of P systems for arithmetic operations on non-negative integers based on the weak priorities for rule application. Consequently, we obtain deterministic P systems. Two membranes suffice. There are at most four objects for multiplication and five objects for division throughout the computation processes. The model is simple and has a potential for possible extension to non-negative integers and real numbers in general.

Keywords: P system, binary operation, determinism, weak rule priority

Procedia PDF Downloads 428
609 Electrification Strategy of Hybrid Electric Vehicle as a Solution to Decrease CO2 Emission in Cities

Authors: M. Mourad, K. Mahmoud

Abstract:

Recently hybrid vehicles have become a major concern as one alternative vehicles. This type of hybrid vehicle contributes greatly to reducing pollution. Therefore, this work studies the influence of electrification phase of hybrid electric vehicle on emission of vehicle at different road conditions. To accomplish this investigation, a simulation model was used to evaluate the external characteristics of the hybrid electric vehicle according to variant conditions of road resistances. Therefore, this paper reports a methodology to decrease the vehicle emission especially greenhouse gas emission inside cities. The results show the effect of electrification on vehicle performance characteristics. The results show that CO2 emission of vehicle decreases up to 50.6% according to an urban driving cycle due to applying the electrification strategy for hybrid electric vehicle.

Keywords: electrification strategy, hybrid electric vehicle, driving cycle, CO2 emission

Procedia PDF Downloads 413
608 Protective Role of Curcumin against Ionising Radiation of Gamma Ray

Authors: Turban Kar, Maitree Bhattacharyya

Abstract:

Curcumin, a dietary antioxidant has been identified as a wonder molecule to possess therapeutic properties protecting the cellular macromolecules from oxidative damage. In our experimental study, we have explored the effectiveness of curcumin in protecting the structural paradigm of Human Serum Albumin (HSA) when exposed to gamma irradiation. HSA, being an important transport protein of the circulatory system, is involved in binding of variety of metabolites, drugs, dyes and fatty acids due to the presence of hydrophobic pockets inside the structure. HSA is also actively involved in the transportation of drugs and metabolites to their targets, because of its long half-life and regulation of osmotic blood pressure. Gamma rays, in its increasing concentration, results in structural alteration of the protein and superoxide radical generation. Curcumin, on the other hand, mitigates the damage, which has been evidenced in the following experiments. Our study explores the possibility for protection by curcumin during the molecular and conformational changes of HSA when exposed to gamma irradiation. We used a combination of spectroscopic methods to probe the conformational ensemble of the irradiated HSA and finally evaluated the extent of restoration by curcumin. SDS - PAGE indicated the formation of cross linked aggregates as a consequence of increasing exposure of gamma radiation. CD and FTIR spectroscopy inferred significant decrease in alpha helix content of HSA from 57% to 15% with increasing radiation doses. Steady state and time resolved fluorescence studies complemented the spectroscopic measurements when lifetime decay was significantly reduced from 6.35 ns to 0.37 ns. Hydrophobic and bityrosine study showed the effectiveness of curcumin for protection against radiation induced free radical generation. Moreover, bityrosine and hydrophobic profiling of gamma irradiated HSA in presence and absence of curcumin provided light on the formation of ROS species generation and the protective (magical) role of curcumin. The molecular mechanism of curcumin protection to HSA from gamma irradiation is yet unknown, though a possible explanation has been proposed in this work using Thioflavin T assay. It was elucidated, that when HSA is irradiated at low dose of gamma radiation in presence of curcumin, it is capable of retaining the native characteristic properties to a greater extent indicating stabilization of molecular structure. Thus, curcumin may be utilized as a therapeutic strategy to protect cellular proteins.

Keywords: Bityrosine content, conformational change, curcumin, gamma radiation, human serum albumin

Procedia PDF Downloads 130
607 CPPI Method with Conditional Floor: The Discrete Time Case

Authors: Hachmi Ben Ameur, Jean Luc Prigent

Abstract:

We propose an extension of the CPPI method, which is based on conditional floors. In this framework, we examine in particular the TIPP and margin based strategies. These methods allow keeping part of the past gains and protecting the portfolio value against future high drawdowns of the financial market. However, as for the standard CPPI method, the investor can benefit from potential market rises. To control the risk of such strategies, we introduce both Value-at-Risk (VaR) and Expected Shortfall (ES) risk measures. For each of these criteria, we show that the conditional floor must be higher than a lower bound. We illustrate these results, for a quite general ARCH type model, including the EGARCH (1,1) as a special case.

Keywords: CPPI, conditional floor, ARCH, VaR, expected ehortfall

Procedia PDF Downloads 284
606 The Use of Ontology Framework for Automation Digital Forensics Investigation

Authors: Ahmad Luthfi

Abstract:

One of the main goals of a computer forensic analyst is to determine the cause and effect of the acquisition of a digital evidence in order to obtain relevant information on the case is being handled. In order to get fast and accurate results, this paper will discuss the approach known as ontology framework. This model uses a structured hierarchy of layers that create connectivity between the variant and searching investigation of activity that a computer forensic analysis activities can be carried out automatically. There are two main layers are used, namely analysis tools and operating system. By using the concept of ontology, the second layer is automatically designed to help investigator to perform the acquisition of digital evidence. The methodology of automation approach of this research is by utilizing forward chaining where the system will perform a search against investigative steps and atomically structured in accordance with the rules of the ontology.

Keywords: ontology, framework, automation, forensics

Procedia PDF Downloads 309
605 Foundation of the Information Model for Connected-Cars

Authors: Hae-Won Seo, Yong-Gu Lee

Abstract:

Recent progress in the next generation of automobile technology is geared towards incorporating information technology into cars. Collectively called smart cars are bringing intelligence to cars that provides comfort, convenience and safety. A branch of smart cars is connected-car system. The key concept in connected-cars is the sharing of driving information among cars through decentralized manner enabling collective intelligence. This paper proposes a foundation of the information model that is necessary to define the driving information for smart-cars. Road conditions are modeled through a unique data structure that unambiguously represent the time variant traffics in the streets. Additionally, the modeled data structure is exemplified in a navigational scenario and usage using UML. Optimal driving route searching is also discussed using the proposed data structure in a dynamically changing road conditions.

Keywords: connected-car, data modeling, route planning, navigation system

Procedia PDF Downloads 349
604 Ensuring Cyber Security Using Kippo Honeypots

Authors: S. Vivekananda Pandian

Abstract:

A major challenging task in this current scenario is protecting your computer and other electronic gadgets against Cyber-attacks. In this current era Cyber warfare becomes a major threat to the entire world which targets a particular organization or a country spreading the Malwares, Breaching the securities, causing major loss to the organization. Several sectors both public and private are computerized such as Energy sectors, Oil refinery sectors, Defense sectors and Aviation sectors are prone to attacks. Several attacks are unknown while accessing the internet. To study the characteristics and Intention of the Attacker Kippo Honeypots are used. Honeypots are the trap set by us which enables them to monitor the malicious activities and detailed study about attackers which leads to strengthening of the security.

Keywords: attackers, security, Kippo Honeypots, virtual machine

Procedia PDF Downloads 403