Search results for: Means of securing graves
4480 Ageing, the Reality, and Its Gender Dimension
Authors: Forhana Rahman Noor, Shafia Jannat Khanam
Abstract:
The image of old age in Bangladesh is associated with graying of hair, wrinkling of skin, with poor physical health, and decreased ability to work. The common expression “bura hoechi”, to be aged, means to be limited in terms of performing economically productive activities, known as ‘work’. For ‘old-old’ age, there is a saying, “uthan akhon onek dure”, which literally means “even the courtyard is like a very distant place (for an old person).” Traditionally, Bengali society had a structure caring the life of older people. It was common in the joint families of Bangladeshi culture. The situation has been changing. Complexities of the societies with growing rapid urbanization are influencing the traditional respects and caring structure of the elderly persons and facing social challenges. Bangladesh is projected to have 10 percent of its population of age 60 years and above in the year 2025. The ageing process is expected to accelerate in the next century, mainly because the large cohorts born in 1950s and 1960s respectively will be joining the ranks of 60 years and over during this period. The decline in mortality, particularly at young ages, also means that a higher proportion of the large cohorts will survive to old age. The country does not have enough policy or strategy to face this upcoming challenge for the aged persons which needs immediate attention.Keywords: ageing, gender, dimension, elderly population, Bangladesh
Procedia PDF Downloads 2374479 Design and Implementation of Machine Learning Model for Short-Term Energy Forecasting in Smart Home Management System
Authors: R. Ramesh, K. K. Shivaraman
Abstract:
The main aim of this paper is to handle the energy requirement in an efficient manner by merging the advanced digital communication and control technologies for smart grid applications. In order to reduce user home load during peak load hours, utility applies several incentives such as real-time pricing, time of use, demand response for residential customer through smart meter. However, this method provides inconvenience in the sense that user needs to respond manually to prices that vary in real time. To overcome these inconvenience, this paper proposes a convolutional neural network (CNN) with k-means clustering machine learning model which have ability to forecast energy requirement in short term, i.e., hour of the day or day of the week. By integrating our proposed technique with home energy management based on Bluetooth low energy provides predicted value to user for scheduling appliance in advanced. This paper describes detail about CNN configuration and k-means clustering algorithm for short-term energy forecasting.Keywords: convolutional neural network, fuzzy logic, k-means clustering approach, smart home energy management
Procedia PDF Downloads 3054478 Thermal Securing of Electrical Contacts inside Oil Power Transformers
Authors: Ioan Rusu
Abstract:
In the operation of power transformers of 110 kV/MV from substations, these are traveled by fault current resulting from MV line damage. Defect electrical contacts are heated when they are travelled from fault currents. In the case of high temperatures when 135 °C is reached, the electrical insulating oil in the vicinity of the electrical faults comes into contact with these contacts releases gases, and activates the electrical protection. To avoid auto-flammability of electro-insulating oil, we designed a security system thermal of electrical contact defects by pouring fire-resistant polyurethane foam, mastic or mortar fire inside a cardboard electro-insulating cylinder. From practical experience, in the exploitation of power transformers of 110 kV/MT in oil electro-insulating were recorded some passing disconnecting commanded by the gas protection at internal defects. In normal operation and in the optimal load, nominal currents do not require thermal secure contacts inside electrical transformers, contacts are made at the fabrication according to the projects or to repair by solder. In the case of external short circuits close to the substation, the contacts inside electrical transformers, even if they are well made in sizes of Rcontact = 10‑6 Ω, are subjected to short-circuit currents of the order of 10 kA-20 kA which lead to the dissipation of some significant second-order electric powers, 100 W-400 W, on contact. At some internal or external factors which action on electrical contacts, including electrodynamic efforts at short-circuits, these factors could be degraded over time to values in the range of 10-4 Ω to 10-5 Ω and if the action time of protection is great, on the order of seconds, power dissipation on electrical contacts achieve high values of 1,0 kW to 40,0 kW. This power leads to strong local heating, hundreds of degrees Celsius and can initiate self-ignition and burning oil in the vicinity of electro-insulating contacts with action the gas relay. Degradation of electrical contacts inside power transformers may not be limited for the duration of their operation. In order to avoid oil burn with gas release near electrical contacts, at short-circuit currents 10 kA-20 kA, we have outlined the following solutions: covering electrical contacts in fireproof materials that would avoid direct burn oil at short circuit and transmission of heat from electrical contact along the conductors with heat dissipation gradually over time, in a large volume of cooling. Flame retardant materials are: polyurethane foam, mastic, cement (concrete). In the normal condition of operation of transformer, insulating of conductors coils is with paper and insulating oil. Ignition points of its two components respectively are approximated: 135 °C heat for oil and 200 0C for paper. In the case of a faulty electrical contact, about 10-3 Ω, at short-circuit; the temperature can reach for a short time, a value of 300 °C-400 °C, which ignite the paper and also the oil. By burning oil, there are local gases that disconnect the power transformer. Securing thermal electrical contacts inside the transformer, in cardboard tube with polyurethane foams, mastik or cement, ensures avoiding gas release and also gas protection working.Keywords: power transformer, oil insulatation, electric contacts, Bucholtz relay
Procedia PDF Downloads 1584477 Optical Flow Direction Determination for Railway Crossing Occupancy Monitoring
Authors: Zdenek Silar, Martin Dobrovolny
Abstract:
This article deals with the obstacle detection on a railway crossing (clearance detection). Detection is based on the optical flow estimation and classification of the flow vectors by K-means clustering algorithm. For classification of passing vehicles is used optical flow direction determination. The optical flow estimation is based on a modified Lucas-Kanade method.Keywords: background estimation, direction of optical flow, K-means clustering, objects detection, railway crossing monitoring, velocity vectors
Procedia PDF Downloads 5184476 A Technique for Image Segmentation Using K-Means Clustering Classification
Authors: Sadia Basar, Naila Habib, Awais Adnan
Abstract:
The paper presents the Technique for Image Segmentation Using K-Means Clustering Classification. The presented algorithms were specific, however, missed the neighboring information and required high-speed computerized machines to run the segmentation algorithms. Clustering is the process of partitioning a group of data points into a small number of clusters. The proposed method is content-aware and feature extraction method which is able to run on low-end computerized machines, simple algorithm, required low-quality streaming, efficient and used for security purpose. It has the capability to highlight the boundary and the object. At first, the user enters the data in the representation of the input. Then in the next step, the digital image is converted into groups clusters. Clusters are divided into many regions. The same categories with same features of clusters are assembled within a group and different clusters are placed in other groups. Finally, the clusters are combined with respect to similar features and then represented in the form of segments. The clustered image depicts the clear representation of the digital image in order to highlight the regions and boundaries of the image. At last, the final image is presented in the form of segments. All colors of the image are separated in clusters.Keywords: clustering, image segmentation, K-means function, local and global minimum, region
Procedia PDF Downloads 3764475 Nonparametric Copula Approximations
Authors: Serge Provost, Yishan Zang
Abstract:
Copulas are currently utilized in finance, reliability theory, machine learning, signal processing, geodesy, hydrology and biostatistics, among several other fields of scientific investigation. It follows from Sklar's theorem that the joint distribution function of a multidimensional random vector can be expressed in terms of its associated copula and marginals. Since marginal distributions can easily be determined by making use of a variety of techniques, we address the problem of securing the distribution of the copula. This will be done by using several approaches. For example, we will obtain bivariate least-squares approximations of the empirical copulas, modify the kernel density estimation technique and propose a criterion for selecting appropriate bandwidths, differentiate linearized empirical copulas, secure Bernstein polynomial approximations of suitable degrees, and apply a corollary to Sklar's result. Illustrative examples involving actual observations will be presented. The proposed methodologies will as well be applied to a sample generated from a known copula distribution in order to validate their effectiveness.Keywords: copulas, Bernstein polynomial approximation, least-squares polynomial approximation, kernel density estimation, density approximation
Procedia PDF Downloads 734474 Risk Tolerance and Individual Worthiness Based on Simultaneous Analysis of the Cognitive Performance and Emotional Response to a Multivariate Situational Risk Assessment
Authors: Frederic Jumelle, Kelvin So, Didan Deng
Abstract:
A method and system for neuropsychological performance test, comprising a mobile terminal, used to interact with a cloud server which stores user information and is logged into by the user through the terminal device; the user information is directly accessed through the terminal device and is processed by artificial neural network, and the user information comprises user facial emotions information, performance test answers information and user chronometrics. This assessment is used to evaluate the cognitive performance and emotional response of the subject to a series of dichotomous questions describing various situations of daily life and challenging the users' knowledge, values, ethics, and principles. In industrial applications, the timing of this assessment will depend on the users' need to obtain a service from a provider, such as opening a bank account, getting a mortgage or an insurance policy, authenticating clearance at work, or securing online payments.Keywords: artificial intelligence, neurofinance, neuropsychology, risk management
Procedia PDF Downloads 1384473 The Development and Testing of Greenhouse Comprehensive Environment Control System
Authors: Mohammed Alrefaie, Yaser Miaji
Abstract:
Greenhouses provide a convenient means to grow plants in the best environment. They achieve this by trapping heat from the sunlight and using artificial means to enhance the environment of the greenhouse. This includes controlling factors such as air flow, light intensity and amount of water among others that can have a big impact on plant growth. The aim of the greenhouse is to give maximum yield from plants possible. This report details the development and testing of greenhouse environment control system that can regulate light intensity, airflow and power supply inside the greenhouse. The details of the module development to control these three factors along with results of testing are presented.Keywords: greenhouse, control system, light intensity, comprehensive environment
Procedia PDF Downloads 4824472 Hermite–Hadamard Type Integral Inequalities Involving k–Riemann–Liouville Fractional Integrals and Their Applications
Authors: Artion Kashuri, Rozana Liko
Abstract:
In this paper, some generalization integral inequalities of Hermite–Hadamard type for functions whose derivatives are s–convex in modulus are given by using k–fractional integrals. Some applications to special means are obtained as well. Some known versions are recovered as special cases from our results. We note that our inequalities can be viewed as new refinements of the previous results. Finally, our results have a deep connection with various fractional integral operators and interested readers can find new interesting results using our idea and technique as well.Keywords: Hermite-Hadamard's inequalities, Hölder's inequality, k-Riemann-Liouville fractional integral, special means
Procedia PDF Downloads 1274471 Select-Low and Select-High Methods for the Wheeled Robot Dynamic States Control
Authors: Bogusław Schreyer
Abstract:
The paper enquires on the two methods of the wheeled robot braking torque control. Those two methods are applied when the adhesion coefficient under left side wheels is different from the adhesion coefficient under the right side wheels. In case of the select-low (SL) method the braking torque on both wheels is controlled by the signals originating from the wheels on the side of the lower adhesion. In the select-high (SH) method the torque is controlled by the signals originating from the wheels on the side of the higher adhesion. The SL method is securing stable and secure robot behaviors during the braking process. However, the efficiency of this method is relatively low. The SH method is more efficient in terms of time and braking distance but in some situations may cause wheels blocking. It is important to monitor the velocity of all wheels and then take a decision about the braking torque distribution accordingly. In case of the SH method the braking torque slope may require significant decrease in order to avoid wheel blocking.Keywords: select-high, select-low, torque distribution, wheeled robots
Procedia PDF Downloads 1194470 Securing Health Monitoring in Internet of Things with Blockchain-Based Proxy Re-Encryption
Authors: Jerlin George, R. Chitra
Abstract:
The devices with sensors that can monitor your temperature, heart rate, and other vital signs and link to the internet, known as the Internet of Things (IoT), have completely transformed the way we control health. Providing real-time health data, these sensors improve diagnostics and treatment outcomes. Security and privacy matters when IoT comes into play in healthcare. Cyberattacks on centralized database systems are also a problem. To solve these challenges, the study uses blockchain technology coupled with proxy re-encryption to secure health data. ThingSpeak IoT cloud analyzes the collected data and turns them into blockchain transactions which are safely kept on the DriveHQ cloud. Transparency and data integrity are ensured by blockchain, and secure data sharing among authorized users is made possible by proxy re-encryption. This results in a health monitoring system that preserves the accuracy and confidentiality of data while reducing the safety risks of IoT-driven healthcare applications.Keywords: internet of things, healthcare, sensors, electronic health records, blockchain, proxy re-encryption, data privacy, data security
Procedia PDF Downloads 154469 A Hybrid Model for Secure Protocol Independent Multicast Sparse Mode and Dense Mode Protocols in a Group Network
Authors: M. S. Jimah, A. C. Achuenu, M. Momodu
Abstract:
Group communications over public infrastructure are prone to a lot of security issues. Existing network protocols like Protocol Independent Multicast Sparse Mode (PIM SM) and Protocol Independent Multicast Dense Mode (PIM DM) do not have inbuilt security features. Therefore, any user or node can easily access the group communication as long as the user can send join message to the source nodes, the source node then adds the user to the network group. In this research, a hybrid method of salting and hashing to encrypt information in the source and stub node was designed, and when stub nodes need to connect, they must have the appropriate key to join the group network. Object oriented analysis design (OOAD) was the methodology used, and the result shows that no extra controlled bandwidth overhead cost was added by encrypting and the hybrid model was more securing than the existing PIM SM, PIM DM and Zhang secure PIM SM.Keywords: group communications, multicast, PIM SM, PIM DM, encryption
Procedia PDF Downloads 1624468 Hemodynamic Effects of Magnesium Sulphate Therapy in Critically Ill Infants and Children with Wheezy Chest
Authors: Yasmin Sayed, Hala Hamdy, Hafez Bazaraa, Hanaa Rady, Sherif Elanwary
Abstract:
Intravenous and inhaled magnesium sulfate (MgSO₄) had been recently used as an adjuvant therapy in cases suffering from the wheezy chest. Objective: We aimed to determine the possible change in the hemodynamic state in cases received intravenous or inhaled MgSO₄ in comparison to cases received standard treatment in critically ill infants and children with the wheezy chest. Methods: A randomized controlled trial comprised 81 patients suffering from wheezy chest divided into 3 groups. In addition to bronchodilators and systemic steroids, MgSO₄ was given by inhalation in group A, intravenously in group B, and group C didn't receive MgSO₄. The hemodynamic state was determined by assessment of blood pressure, heart rate, capillary refill time and the need for shock therapy or inotropic support just before and 24 hours after receiving treatment in 3 groups. Results: There was no significant difference in the hemodynamic state of the studied groups before and after treatment. Means of blood pressure were 102.2/63.2, 105.1/64.8 before and after inhaled MgSO₄; respectively. Means of blood pressure were 105.5/64.2, 104.1/64.9 before and after intravenous MgSO₄; respectively. Means of blood pressure were 107.4/62.8, 104.4/62.1 before and after standard treatment, respectively. There was a statistically insignificant reduction of the means of the heart rate in group A and group B after treatment rather than group C. There was no associated prolongation in capillary refill time and/or the need for inotropic support or shock therapy after treatment in the studied groups. Conclusion: MgSO₄ is a safe adjuvant therapy and not associated with significant alteration in the hemodynamic state in critically ill infants and children with the wheezy chest.Keywords: critically ill infants and children, inhaled MgSO₄, intravenous MgSO₄, wheezy chest
Procedia PDF Downloads 1484467 Securing Internet of Things Devices in Healthcare industry: An Investigation into Efficient and Effective Authorization Procedures
Authors: Maruf Farhan, Abdul Salih, Sikandar Ali Tahir
Abstract:
Protecting patient information's confidentiality is paramount considering the widespread use of Internet of Things (IoT) gadgets in medical settings. This study's subjects are decentralized identifiers (DIDs) and verifiable credentials (VCs) in conjunction with an OAuth-based authorization framework, as they are the key to protecting IoT healthcare devices. DIDs enable autonomous authentication and trust formation between IoT devices and other entities. To authorize users and enforce access controls based on verified claims, VCs offer a secure and adaptable solution. Through the proposed method, medical facilities can improve the privacy and security of their IoT devices while streamlining access control administration. A Smart pill dispenser in a hospital setting is used to illustrate the advantages of this method. The findings demonstrate the value of DIDs, VCs, and OAuth-based delegation in protecting the IoT devices. Improved processes for authorizing and controlling access to IoT devices are possible thanks to the research findings, which also help ensure patient confidentiality in the healthcare sector.Keywords: Iot, DID, authorization, verifiable credentials
Procedia PDF Downloads 764466 Selective Adsorption of Anionic Textile Dyes with Sustainable Composite Materials Based on Physically Activated Carbon and Basic Polyelectrolytes
Authors: Mari Carmen Reyes Angeles, Dalia Michel Reyes Villeda, Ana María Herrera González
Abstract:
This work reports the design and synthesis of two composite materials based on physically activated carbon and basic polyelectrolytes useful in the adsorption of textile dyes present in aqueous solutions and wastewater. The synthesis of basic polyelectrolytes poly(2-vinylpyridine) (P2VP) and poly(4-vinylpyridine) (P4VP) was made by means of free radical polymerization. The carbon made from prickly pear peel (CarTunaF) was thermally activated in the presence of combustion gases. Composite materials CarTunaF2VP and CarTunaF4VP were obtained from CarTunaF and polybasic polyelectrolytes P2VP and P4VP with a ratio of 67:33 wt. The structure of each polyelectrolyte, P2VP, and P4VP, was elucidated by means of the FTIR and 1H NMR spectrophotometric techniques. Their thermal stability was evaluated using TGA. The characterization of CarTunaF and composite materials CarTunaF2VP and CarTunaF4VP was made by means of FTIR, TGA, SEM, and N2 adsorption. The adsorptive capacities of the polyelectrolytes and the composite materials were evaluated by adsorption of direct dyes present in aqueous solutions. The polyelectrolytes removed between 90 and 100% of the dyes, and the composite materials removed between 68 and 93% of the dyes. Using the four adsorbents P2VP, P4VP, CarTuna2VP, and CarTuna4VP, it was observed that the dyes studied, Direct Blue 80, Direct Turquoise 86, and Direct Orange 26, were adsorbed in the range between 46.1 and 188.7mg∙g-1 by means of electrostatic interactions between the anionic groups in the dyes with the cationic groups in the adsorbents. By using adsorbent materials in the treatment of wastewater from the textile industry, an improvement in the quality of the water was observed by decreasing its pH, COD, conductivity, and color considerablyKeywords: adsorption, anionic dyes, composite, polyelectrolytes
Procedia PDF Downloads 994465 Type–2 Fuzzy Programming for Optimizing the Heat Rate of an Industrial Gas Turbine via Absorption Chiller Technology
Authors: T. Ganesan, M. S. Aris, I. Elamvazuthi, Momen Kamal Tageldeen
Abstract:
Terms set in power purchase agreements (PPA) challenge power utility companies in balancing between the returns (from maximizing power production) and securing long term supply contracts at capped production. The production limitation set in the PPA has driven efforts to maximize profits through efficient and economic power production. In this paper, a combined industrial-scale gas turbine (GT) - absorption chiller (AC) system is considered to cool the GT air intake for reducing the plant’s heat rate (HR). This GT-AC system is optimized while considering power output limitations imposed by the PPA. In addition, the proposed formulation accounts for uncertainties in the ambient temperature using Type-2 fuzzy programming. Using the enhanced chaotic differential evolution (CEDE), the Pareto frontier was constructed and the optimization results are analyzed in detail.Keywords: absorption chillers (AC), turbine inlet air cooling (TIC), power purchase agreement (PPA), multiobjective optimization, type-2 fuzzy programming, chaotic differential evolution (CDDE)
Procedia PDF Downloads 3104464 Analysis of Factors Affecting Public Awareness in Paying Zakat
Authors: Roikhan Mochamad Aziz
Abstract:
This study aims to analze the interdependence of several variables simultaneously in order to simplify the form of the relationship between some of the variables studied a number of factors less than the variable studied which means it can also describe the data structure of a research. Based 100 respondents from the public, such as the people of South Tangerang, this study used factor analysis tool. The results of this study indicate that the studied variables being formed into nine factors, namely faith factors, community factors, factors of social care, confidence factor, factor income, educational factors, self-satisfaction factors, factors work, and knowledge factor. Total variance of the 9 factors is 67,30% means that all nine of these factors are factors that can contribute too paying zakat of muzakki consciousness of 67,30% while the remaining 32,70% is supported by other factors outside the 9 factors.Keywords: zakat, analysis factor, faith, education, knowledge
Procedia PDF Downloads 2804463 Perception of Aerospace Engineering Students in Saudi Arabia on Aviation Sustainability
Authors: Badr A. Al-Harbi, Fahd T. Abdullah, Mazen T. Wali, Mohammed W. Al-Obaidi, Reda M. Bakhdlg
Abstract:
Over the past few years, the aviation society had demonstrated a huge concern for securing the sustainability of commercial aviation. Future aerospace engineers in Saudi Arabia are expected to play a major role in dealing with these aspects, taking into consideration the expected growth in both traffic, passenger mileage, and fleet expansions in the region. In the present work, the authors investigate the perception of engineering students in the two undergraduate aerospace engineering programs in the Kingdom. A questionnaire was distributed using google forms and targeted approximately 300 students in both programs on several WhatsApp groups. Data collection was stopped after one week when a response rate above 35% was reached. The questionnaire aimed at assessing the students’ awareness of sustainable aviation and associated obstacles. The results obtained from the study indicate the necessity of introducing curricular modifications to address the subject with more targeted extracurricular activities and better use of social media, which is becoming a main source of students’ awareness.Keywords: aviation, engineering education, students’ perception, sustainable aviation
Procedia PDF Downloads 1574462 A Nonlocal Means Algorithm for Poisson Denoising Based on Information Geometry
Authors: Dongxu Chen, Yipeng Li
Abstract:
This paper presents an information geometry NonlocalMeans(NLM) algorithm for Poisson denoising. NLM estimates a noise-free pixel as a weighted average of image pixels, where each pixel is weighted according to the similarity between image patches in Euclidean space. In this work, every pixel is a Poisson distribution locally estimated by Maximum Likelihood (ML), all distributions consist of a statistical manifold. A NLM denoising algorithm is conducted on the statistical manifold where Fisher information matrix can be used for computing distribution geodesics referenced as the similarity between patches. This approach was demonstrated to be competitive with related state-of-the-art methods.Keywords: image denoising, Poisson noise, information geometry, nonlocal-means
Procedia PDF Downloads 2854461 A Study of the Tactile Codification on the Philippine Banknote: Redesigning for the Blind
Authors: Ace Mari S. Simbajon, Rhaella J. Ybañez, Mae G. Nadela, Cherry E. Sagun, Nera Mae A. Puyo
Abstract:
This study determined the usability of the Philippine banknotes. An experimental design was used in the study involving twenty (n=20) randomly selected blind participants. The three aspects of usability were measured: effectiveness, efficiency, and satisfaction. It was found out that the effectiveness rate of the current Philippine Banknotes ranges from 20 percent to 35 percent which means it is not effective basing from Cauro’s threshold of average effectiveness rate which is 78 percent. Its efficiency rate is ranging from 18.06 to 26.22 seconds per denomination. The average satisfaction rate is 1.45 which means the blind are very dissatisfied. These results were used as a guide in making the proposed tactile codification using embossed dots or embossed lines. A round of simulation was conducted with the blind to assess the usability of the two proposals. Results were then statistically treated using t-test. Results show statistically significant difference between the usability of the current banknotes versus the proposed designs. Moreover, it was found out that the use of embossed dots is more effective, more efficient, and more satisfying than the embossed lines with an effectiveness rate ranging from 90 percent to 100 percent, efficiency rate ranging from 6.73 seconds to 12.99 seconds, and satisfaction rate of 3.4 which means the blind are very satisfied.Keywords: blind, Philippine banknotes, tactile codification, usability
Procedia PDF Downloads 2884460 A Decision Support System to Detect the Lumbar Disc Disease on the Basis of Clinical MRI
Authors: Yavuz Unal, Kemal Polat, H. Erdinc Kocer
Abstract:
In this study, a decision support system comprising three stages has been proposed to detect the disc abnormalities of the lumbar region. In the first stage named the feature extraction, T2-weighted sagittal and axial Magnetic Resonance Images (MRI) were taken from 55 people and then 27 appearance and shape features were acquired from both sagittal and transverse images. In the second stage named the feature weighting process, k-means clustering based feature weighting (KMCBFW) proposed by Gunes et al. Finally, in the third stage named the classification process, the classifier algorithms including multi-layer perceptron (MLP- neural network), support vector machine (SVM), Naïve Bayes, and decision tree have been used to classify whether the subject has lumbar disc or not. In order to test the performance of the proposed method, the classification accuracy (%), sensitivity, specificity, precision, recall, f-measure, kappa value, and computation times have been used. The best hybrid model is the combination of k-means clustering based feature weighting and decision tree in the detecting of lumbar disc disease based on both sagittal and axial MR images.Keywords: lumbar disc abnormality, lumbar MRI, lumbar spine, hybrid models, hybrid features, k-means clustering based feature weighting
Procedia PDF Downloads 5204459 Securing Healthcare IoT Devices and Enabling SIEM Integration: Addressing
Authors: Mubarak Saadu Nabunkari, Abdullahi Abdu Ibrahim, Muhammad Ilyas
Abstract:
This study looks at how Internet of Things (IoT) devices are used in healthcare to monitor and treat patients better. However, using these devices in healthcare comes with security problems. The research explores using Security Information and Event Management (SIEM) systems with healthcare IoT devices to solve these security challenges. Reviewing existing literature shows the current state of IoT security and emphasizes the need for better protection. The main worry is that healthcare IoT devices can be easily hacked, putting patient data and device functionality at risk. To address this, the research suggests a detailed security framework designed for these devices. This framework, based on literature and best practices, includes important security measures like authentication, data encryption, access controls, and anomaly detection. Adding SIEM systems to this framework helps detect threats in real time and respond quickly to incidents, making healthcare IoT devices more secure. The study highlights the importance of this integration and offers guidance for implementing healthcare IoT securely, efficiently, and effectively.Keywords: cyber security, threat intelligence, forensics, heath care
Procedia PDF Downloads 664458 Approximation of Periodic Functions Belonging to Lipschitz Classes by Product Matrix Means of Fourier Series
Authors: Smita Sonker, Uaday Singh
Abstract:
Various investigators have determined the degree of approximation of functions belonging to the classes W(L r , ξ(t)), Lip(ξ(t), r), Lip(α, r), and Lipα using different summability methods with monotonocity conditions. Recently, Lal has determined the degree of approximation of the functions belonging to Lipα and W(L r , ξ(t)) classes by using Ces`aro-N¨orlund (C 1 .Np)- summability with non-increasing weights {pn}. In this paper, we shall determine the degree of approximation of 2π - periodic functions f belonging to the function classes Lipα and W(L r , ξ(t)) by C 1 .T - means of Fourier series of f. Our theorems generalize the results of Lal and we also improve these results in the light off. From our results, we also derive some corollaries.Keywords: Lipschitz classes, product matrix operator, signals, trigonometric Fourier approximation
Procedia PDF Downloads 4774457 Vibrations of Springboards: Mode Shape and Time Domain Analysis
Authors: Stefano Frassinelli, Alessandro Niccolai, Riccardo E. Zich
Abstract:
Diving is an important Olympic sport. In this sport, the effective performance of the athlete is related to his capability to interact correctly with the springboard. In fact, the elevation of the jump and the correctness of the dive are influenced by the vibrations of the board. In this paper, the vibrations of the springboard will be analyzed by means of typical tools for vibration analysis: Firstly, a modal analysis will be done on two different models of the springboard, then, these two model and another one will be analyzed with a time analysis, done integrating the equations of motion od deformable bodies. All these analyses will be compared with experimental data measured on a real springboard by means of a 6-axis accelerometer; these measurements are aimed to assess the models proposed. The acquired data will be analyzed both in frequency domain and in time domain.Keywords: springboard analysis, modal analysis, time domain analysis, vibrations
Procedia PDF Downloads 4604456 Identification of the Main Transition Velocities in a Bubble Column Based on a Modified Shannon Entropy
Authors: Stoyan Nedeltchev, Markus Schubert
Abstract:
The gas holdup fluctuations in a bubble column (0.15 m in ID) have been recorded by means of a conductivity wire-mesh sensor in order to extract information about the main transition velocities. These parameters are very important for bubble column design, operation and scale-up. For this purpose, the classical definition of the Shannon entropy was modified and used to identify both the onset (at UG=0.034 m/s) of the transition flow regime and the beginning (at UG=0.089 m/s) of the churn-turbulent flow regime. The results were compared with the Kolmogorov entropy (KE) results. A slight discrepancy was found, namely the transition velocities identified by means of the KE were shifted to somewhat higher (0.045 and 0.101 m/s) superficial gas velocities UG.Keywords: bubble column, gas holdup fluctuations, modified Shannon entropy, Kolmogorov entropy
Procedia PDF Downloads 3284455 [Keynote]: No-Trust-Zone Architecture for Securing Supervisory Control and Data Acquisition
Authors: Michael Okeke, Andrew Blyth
Abstract:
Supervisory Control And Data Acquisition (SCADA) as the state of the art Industrial Control Systems (ICS) are used in many different critical infrastructures, from smart home to energy systems and from locomotives train system to planes. Security of SCADA systems is vital since many lives depend on it for daily activities and deviation from normal operation could be disastrous to the environment as well as lives. This paper describes how No-Trust-Zone (NTZ) architecture could be incorporated into SCADA Systems in order to reduce the chances of malicious intent. The architecture is made up of two distinctive parts which are; the field devices such as; sensors, PLCs pumps, and actuators. The second part of the architecture is designed following lambda architecture, which is made up of a detection algorithm based on Particle Swarm Optimization (PSO) and Hadoop framework for data processing and storage. Apache Spark will be a part of the lambda architecture for real-time analysis of packets for anomalies detection.Keywords: industrial control system (ics, no-trust-zone (ntz), particle swarm optimisation (pso), supervisory control and data acquisition (scada), swarm intelligence (SI)
Procedia PDF Downloads 3454454 Crack Width Evaluation for Flexural RC Members with Axial Tension
Authors: Sukrit Ghorai
Abstract:
Proof of controlling crack width is a basic condition for securing suitable performance in serviceability limit state. The cracking in concrete can occur at any time from the casting of time to the years after the concrete has been set in place. Most codes struggle with offering procedure for crack width calculation. There is lack in availability of design charts for designers to compute crack width with ease. The focus of the study is to utilize design charts and parametric equations in calculating crack width with minimum error. The paper contains a simplified procedure to calculate crack width for reinforced concrete (RC) sections subjected to bending with axial tensile force following the guidelines of Euro code [DS EN-1992-1-1 & DS EN-1992-1-2]. Numerical examples demonstrate the application of the suggested procedure. Comparison with parallel analytical tools support the validity of result and show the percentage deviation of crack width in both the procedures. The technique is simple, user-friendly and ready to evolve for a greater spectrum of section sizes and materials.Keywords: concrete structures, crack width calculation, serviceability limit state, structural design, bridge engineering
Procedia PDF Downloads 3834453 Astronomical Panels of Measuring and Dividing Time in Ancient Egypt
Authors: Mohamed Saeed Ahmed Salman
Abstract:
The ancient Egyptians used the stars to measure time or, in a more precise sense, as one of the astronomical means of measuring time. These methods differed throughout the historical ages. They began with simple observations of observing astronomical phenomena and watching them, such as observing the movements of the stars in the sky. The year, to know the days, nights, and other means used to help set the time when the sky overcast, and so the researcher tries through archaeological evidence to demonstrate the knowledge of the ancient Egyptian stars of heaven, and movements through the first pre-history. It is not believed that the astronomical information possessed by the Egyptian was limited, and simple, it was reaching a level of almost optimal in terms of importance, and the goal he wanted to reach the ancient Egyptian, and also help him to know the time, and the passage of time; which ended in finally trying to find a system of timing and calculation of time. It was noted that there were signs that the stellar creed was known, and prosperous, especially since the pre-family ages, and this is evident on the inscriptions that come back to that period. The Egyptian realized that some of the stars remain visible at night, The ancient Egyptian was familiar with the daily journey of the stars. This is what was adopted in many paragraphs of the texts of the pyramids and its references to the rise of the deceased king of the heavenly world between the stars of the eternal sky. It was noted that the ancient Egyptian link between the doctrine of the star, we find that the public The lunar was known to the ancient Egyptians, and sang it for two years, and the stellar solar; but it was based on the appearance of the star Sirius, and this is the first means used to measure time and know the calendar stars.Keywords: ancient Egyptian, astronomical panels, Egyptian, astronomical
Procedia PDF Downloads 214452 Machine Learning for Targeting of Conditional Cash Transfers: Improving the Effectiveness of Proxy Means Tests to Identify Future School Dropouts and the Poor
Authors: Cristian Crespo
Abstract:
Conditional cash transfers (CCTs) have been targeted towards the poor. Thus, their targeting assessments check whether these schemes have been allocated to low-income households or individuals. However, CCTs have more than one goal and target group. An additional goal of CCTs is to increase school enrolment. Hence, students at risk of dropping out of school also are a target group. This paper analyses whether one of the most common targeting mechanisms of CCTs, a proxy means test (PMT), is suitable to identify the poor and future school dropouts. The PMT is compared with alternative approaches that use the outputs of a predictive model of school dropout. This model was built using machine learning algorithms and rich administrative datasets from Chile. The paper shows that using machine learning outputs in conjunction with the PMT increases targeting effectiveness by identifying more students who are either poor or future dropouts. This joint targeting approach increases effectiveness in different scenarios except when the social valuation of the two target groups largely differs. In these cases, the most likely optimal approach is to solely adopt the targeting mechanism designed to find the highly valued group.Keywords: conditional cash transfers, machine learning, poverty, proxy means tests, school dropout prediction, targeting
Procedia PDF Downloads 2044451 Development of 111In-DOTMP as a New Bone Imaging Agent
Authors: H. Yousefnia, S. Zolghadri, AR. Jalilian, A. Mirzaei, A. Bahrami-Samani, M. Erfani
Abstract:
The objective of this study is the preparation of 111In-DOTMP as a new bone imaging agent. 111In was produced at the Agricultural, Medical and Industrial Research School (AMIRS) by means of 30 MeV cyclotron via natCd(p,x)111In reaction. Complexion of In‐111 with DOTMP was carried out by adding 0.1 ml of the stock solution (50 mg/ml in 2 N NaoH) to the vial containing 1 mCi of 111In. pH of the mixture was adjusted to 7-8 by means of phosphate buffer. The radiochemical purity of the complex at the optimized condition was higher than 98% (by using whatman No.1 paper in NH4OH:MeOH: H2O (0.2:2:4)). Both the biodistribution studies and SPECT imaging indicated high bone uptake. The ratio of bone to other soft tissue accumulation was significantly high which permit to observe high quality images. The results show that 111In-DOTMP can be used as a suitable tracer for diagnosis of bone metastases by SPECT imaging.Keywords: biodistribution, DOTMP, 111In, SPECT
Procedia PDF Downloads 534