Search results for: detect and avoid
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 2966

Search results for: detect and avoid

1436 Power-Sharing Politics: A Panacea to Conflict Resolution and Stability in Africa

Authors: Emmanuel Dangana Monday

Abstract:

Africa as a continent has been ravaged and bedeviled by series of political conflicts associated with politics and power-sharing maneuvering. As a result it has become the most unstable continent in the world in terms of power distribution and stable political culture. This paper examines the efficacy of conscious and deliberate power-sharing strategies to settle or resolve political conflicts in Africa in the arrangements of creation of states, revenue and resources allocation, and office distribution systems. The study is concerned with the spatial impact of conflicts generated in some renowned African countries in which power-sharing would have been a solution. Ethno-regional elite groups are identified as the major actors in the struggles for the distribution of territorial, economic and political powers in Africa. The struggle for power has become so intense that it has degenerated to conflicts and wars of inter and intra-political classes and parties respectively. Secondary data and deductive techniques were used in data collection and analysis. It is discovered that power-sharing has become an indispensable tool to curb the incessant political and power crisis in Africa. It is one of the finest tolerable modality of mediating elite’ competition, since it reflects the interests of both the dominant and the perceived marginalized groups. The study recommends that countries and regions of political, ethnic and religious differences in Africa should employed power-sharing strategy in order to avoid unnecessary political tension and resultant crisis. Interest groups should always come to the negotiation table to reach a realistic, durable and expected compromise to secure a peacefully resolute Africa.

Keywords: Africa, power-sharing, conflicts, politics and political stability

Procedia PDF Downloads 311
1435 PathoPy2.0: Application of Fractal Geometry for Early Detection and Histopathological Analysis of Lung Cancer

Authors: Rhea Kapoor

Abstract:

Fractal dimension provides a way to characterize non-geometric shapes like those found in nature. The purpose of this research is to estimate Minkowski fractal dimension of human lung images for early detection of lung cancer. Lung cancer is the leading cause of death among all types of cancer and an early histopathological analysis will help reduce deaths primarily due to late diagnosis. A Python application program, PathoPy2.0, was developed for analyzing medical images in pixelated format and estimating Minkowski fractal dimension using a new box-counting algorithm that allows windowing of images for more accurate calculation in the suspected areas of cancerous growth. Benchmark geometric fractals were used to validate the accuracy of the program and changes in fractal dimension of lung images to indicate the presence of issues in the lung. The accuracy of the program for the benchmark examples was between 93-99% of known values of the fractal dimensions. Fractal dimension values were then calculated for lung images, from National Cancer Institute, taken over time to correctly detect the presence of cancerous growth. For example, as the fractal dimension for a given lung increased from 1.19 to 1.27 due to cancerous growth, it represents a significant change in fractal dimension which lies between 1 and 2 for 2-D images. Based on the results obtained on many lung test cases, it was concluded that fractal dimension of human lungs can be used to diagnose lung cancer early. The ideas behind PathoPy2.0 can also be applied to study patterns in the electrical activity of the human brain and DNA matching.

Keywords: fractals, histopathological analysis, image processing, lung cancer, Minkowski dimension

Procedia PDF Downloads 156
1434 Modeling and Simulation of Ship Structures Using Finite Element Method

Authors: Javid Iqbal, Zhu Shifan

Abstract:

The development in the construction of unconventional ships and the implementation of lightweight materials have shown a large impulse towards finite element (FE) method, making it a general tool for ship design. This paper briefly presents the modeling and analysis techniques of ship structures using FE method for complex boundary conditions which are difficult to analyze by existing Ship Classification Societies rules. During operation, all ships experience complex loading conditions. These loads are general categories into thermal loads, linear static, dynamic and non-linear loads. General strength of the ship structure is analyzed using static FE analysis. FE method is also suitable to consider the local loads generated by ballast tanks and cargo in addition to hydrostatic and hydrodynamic loads. Vibration analysis of a ship structure and its components can be performed using FE method which helps in obtaining the dynamic stability of the ship. FE method has developed better techniques for calculation of natural frequencies and different mode shapes of ship structure to avoid resonance both globally and locally. There is a lot of development towards the ideal design in ship industry over the past few years for solving complex engineering problems by employing the data stored in the FE model. This paper provides an overview of ship modeling methodology for FE analysis and its general application. Historical background, the basic concept of FE, advantages, and disadvantages of FE analysis are also reported along with examples related to hull strength and structural components.

Keywords: dynamic analysis, finite element methods, ship structure, vibration analysis

Procedia PDF Downloads 122
1433 An AI-Based Dynamical Resource Allocation Calculation Algorithm for Unmanned Aerial Vehicle

Authors: Zhou Luchen, Wu Yubing, Burra Venkata Durga Kumar

Abstract:

As the scale of the network becomes larger and more complex than before, the density of user devices is also increasing. The development of Unmanned Aerial Vehicle (UAV) networks is able to collect and transform data in an efficient way by using software-defined networks (SDN) technology. This paper proposed a three-layer distributed and dynamic cluster architecture to manage UAVs by using an AI-based resource allocation calculation algorithm to address the overloading network problem. Through separating services of each UAV, the UAV hierarchical cluster system performs the main function of reducing the network load and transferring user requests, with three sub-tasks including data collection, communication channel organization, and data relaying. In this cluster, a head node and a vice head node UAV are selected considering the Central Processing Unit (CPU), operational (RAM), and permanent (ROM) memory of devices, battery charge, and capacity. The vice head node acts as a backup that stores all the data in the head node. The k-means clustering algorithm is used in order to detect high load regions and form the UAV layered clusters. The whole process of detecting high load areas, forming and selecting UAV clusters, and moving the selected UAV cluster to that area is proposed as offloading traffic algorithm.

Keywords: k-means, resource allocation, SDN, UAV network, unmanned aerial vehicles

Procedia PDF Downloads 91
1432 Project Design Deliverables Sequence (PDD)

Authors: Nahed Al-Hajeri

Abstract:

There are several reasons which lead to a delay in project completion, out of all, one main reason is the delay in deliverable processing, i.e. submission and review of documents. Most of the project cycles start with a list of deliverables but without a sequence of submission of the same, means without a direction to move, leading to overlapping of activities and more interdependencies. Hence Project Design Deliverables (PDD) is developed as a solution to Organize Transmittals (Documents/Drawings) received from contractors/consultants during different phases of an EPC (Engineering, Procurement, and Construction) projects, which gives proper direction to the stakeholders from the beginning, to reduce inter-discipline dependency, avoid overlapping of activities, provide a list of deliverables, sequence of activities, etc. PDD attempts to provide a list and sequencing of the engineering documents/drawings required during different phases of a Project which will benefit both client and Contractor in performing planned activities through timely submission and review of deliverables. This helps in ensuring improved quality and completion of Project in time. The successful implementation begins with a detailed understanding the specific challenges and requirements of the project. PDD will help to learn about vendor document submissions including general workflow, sequence and monitor the submission and review of the deliverables from the early stages of Project. This will provide an overview for the Submission of deliverables by the concerned during the projects in proper sequence. The goal of PDD is also to hold responsible and accountability of all stakeholders during complete project cycle. We believe that successful implementation of PDD with a detailed list of documents and their sequence will help organizations to achieve the project target.

Keywords: EPC (Engineering, Procurement, and Construction), project design deliverables (PDD), econometrics sciences, management sciences

Procedia PDF Downloads 383
1431 Biomphalaria alexandrina Snail as a Bio-Indicator of Pollution With Manganese Metal and Its Effect on Physiological, Immunological, Histopathological Parameters and Larvicidal Potencies

Authors: Amina M. Ibrahim, Ahmed A. Abdel-Haleem, Rania G. Taha

Abstract:

Metal pollution results in many dangerous consequences to the environment and human health due to the bioaccumulation in their tissues. The present study aims to measure the bioaccumulation factor of the Manganese (Mn) heavy metal in Biomphlaria alexandrina snails' tissues and water samples. The present results showed the concentration of Mn heavy metal in water (87.5 mg/l) and its bioaccumulation factor in Helisoma duryi tissue was higher than that in tissues of Physa acuta and B. alexandrina snails. Results showed that 87.5 mg/l Mn concentration had miracidial and cercaricidal activities. Also, this concentration decreased the mean total number of the hemocytes after exposure for 24h or 48h, while increased both the mean mortality and phagocytic indices of the hemocytes of exposed snails. It caused alterations in the cytomorphology of the hemocytes of exposed snails after 24 or 48h, where, the granulocytes had irregular cell membrane, and forming pseudopodia. Besides, both levels of Testosterone (T) and Estradiol (E) were increased after exposure to 87.5mg/l Mn metal compared to the control group. Also, it increased MDA (Malonaldehyde) and TAC (Total antioxidant capacity) contents, while, decreased SOD (superoxide dismutase). Besides, it caused great histopathological damages in both hermaphrodite and digestive glands, represented in the degeneration of the gonadal, digestive, secretory cells and the connective tissues. Therefore, B. alexandrina might be used as sensitive bio-indicator of pollution with Mn heavy metal to avoid ethics rules; beside they are easily available and large in number.

Keywords: manganese metal, B. alexandrina, hormonal alterations, histopathology

Procedia PDF Downloads 41
1430 Investigating Interference Errors Made by Azzawia University 1st year Students of English in Learning English Prepositions

Authors: Aimen Mohamed Almaloul

Abstract:

The main focus of this study is investigating the interference of Arabic in the use of English prepositions by Libyan university students. Prepositions in the tests used in the study were categorized, according to their relation to Arabic, into similar Arabic and English prepositions (SAEP), dissimilar Arabic and English prepositions (DAEP), Arabic prepositions with no English counterparts (APEC), and English prepositions with no Arabic counterparts (EPAC). The subjects of the study were the first year university students of the English department, Sabrata Faculty of Arts, Azzawia University; both males and females, and they were 100 students. The basic tool for data collection was a test of English prepositions; students are instructed to fill in the blanks with the correct prepositions and to put a zero (0) if no preposition was needed. The test was then handed to the subjects of the study. The test was then scored and quantitative as well as qualitative results were obtained. Quantitative results indicated the number, percentages and rank order of errors in each of the categories and qualitative results indicated the nature and significance of those errors and their possible sources. Based on the obtained results the researcher could detect that students made more errors in the EPAC category than the other three categories and these errors could be attributed to the lack of knowledge of the different meanings of English prepositions. This lack of knowledge forced the students to adopt what is called the strategy of transfer.

Keywords: foreign language acquisition, foreign language learning, interference system, interlanguage system, mother tongue interference

Procedia PDF Downloads 363
1429 The Investigation on the Role of Colonial Judges in Protecting the Rights of Muslim Women to Dower and Divorce in British India: From the Period between 1800-1939

Authors: Sunil Tirkey

Abstract:

The colonial court records between 1800 to 1939 in India show the existence of excessive dower, which were usually paid at the dissolution of marriage to discourage divorce. Supporting this view of excessive dower as a useful device, Mitra Sharafi (legal historian of modern South Asia) argues that inflated dower and divorce law protected Muslim women against instant divorce, making it too expensive for husbands to use it. Further, according to her, British judges enhanced women’s rights to dower and divorce by pronouncing rulings in favour of a high amount of dower to protect the women against the one-sided authority of men to divorce. Contrary to the view of Sharafi, this paper will argue that inflated dower did not protect the rights of women against instant divorce and undesirable marriage, and British judges did not really work to better the lives of Muslim women. To prove so, we shall firstly argue from the court cases that it was challenging for women to prove divorce on the husbands’ denial of divorce in order to avoid the payment of dower. Secondly, it was almost impossible for women to get rid of their undesirable marriage, as divorce was impartially dependent on their husbands. Thirdly, Muslim women were often deprived of their unpaid prompt dower due to the rigorous application of colonial law of limitation by British judges. Furthermore, the abolition of the office of Muslim legal experts from the colonial courts in 1864 deprived Muslim women not only to avail the interpretation of Islamic law but to benefit from the diversity and flexibility of Islamic law in obtaining their right to dower and divorce.

Keywords: courts, divorce, inflated dower, Islamic law, women’s rights

Procedia PDF Downloads 109
1428 Stakeholders Perceptions of the Linkage between Reproductive Rights and Environmental Sustainability: Environmental Mainstreaming, Injustice and Population Reductionism

Authors: Celine Delacroix

Abstract:

Analyses of global emission scenarios demonstrate that slowing population growth could lead to substantial emissions reductions and play an important role to avoid dangerous climate change. For this reason, the advancement of individual reproductive rights might represent a valid climate change mitigation and adaptation option. With this focus, we reflected on population ethics and the ethical dilemmas associated with environmental degradation and climate change. We conducted a mixed-methods qualitative data study consisting of an online survey followed by in-depth interviews with stakeholders of the reproductive health and rights and environmental sustainability movements to capture the ways in which the linkages between family planning, population growth, and environmental sustainability are perceived by these actors. We found that the multi-layered marginalization of this issue resulted in two processes, the polarization of opinions and its eschewal from the public fora through population reductionism. Our results indicate that stakeholders of the reproductive rights and environmental sustainability movements find that population size and family planning influence environmental sustainability and overwhelmingly find that the reproductive health and rights ideological framework should be integrated in a wider sustainability frame reflecting environmental considerations. This position, whilst majoritarily shared by all participants, was more likely to be adopted by stakeholders of the environmental sustainability sector than those from the reproductive health and rights sector. We conclude that these processes, taken in the context of a context of a climate emergency, threaten to weaken the reproductive health and rights movement.

Keywords: environmental sustainability, family planning, population growth, population ethics, reproductive rights

Procedia PDF Downloads 140
1427 Enhancing Email Security: A Multi-Layered Defense Strategy Approach and an AI-Powered Model for Identifying and Mitigating Phishing Attacks

Authors: Anastasios Papathanasiou, George Liontos, Athanasios Katsouras, Vasiliki Liagkou, Euripides Glavas

Abstract:

Email remains a crucial communication tool due to its efficiency, accessibility and cost-effectiveness, enabling rapid information exchange across global networks. However, the global adoption of email has also made it a prime target for cyber threats, including phishing, malware and Business Email Compromise (BEC) attacks, which exploit its integral role in personal and professional realms in order to perform fraud and data breaches. To combat these threats, this research advocates for a multi-layered defense strategy incorporating advanced technological tools such as anti-spam and anti-malware software, machine learning algorithms and authentication protocols. Moreover, we developed an artificial intelligence model specifically designed to analyze email headers and assess their security status. This AI-driven model examines various components of email headers, such as "From" addresses, ‘Received’ paths and the integrity of SPF, DKIM and DMARC records. Upon analysis, it generates comprehensive reports that indicate whether an email is likely to be malicious or benign. This capability empowers users to identify potentially dangerous emails promptly, enhancing their ability to avoid phishing attacks, malware infections and other cyber threats.

Keywords: email security, artificial intelligence, header analysis, threat detection, phishing, DMARC, DKIM, SPF, ai model

Procedia PDF Downloads 27
1426 Soft Computing Employment to Optimize Safety Stock Levels in Supply Chain Dairy Product under Supply and Demand Uncertainty

Authors: Riyadh Jamegh, Alla Eldin Kassam, Sawsan Sabih

Abstract:

In order to overcome uncertainty conditions and inability to meet customers' requests due to these conditions, organizations tend to reserve a certain safety stock level (SSL). This level must be chosen carefully in order to avoid the increase in holding cost due to excess in SSL or shortage cost due to too low SSL. This paper used soft computing fuzzy logic to identify optimal SSL; this fuzzy model uses the dynamic concept to cope with high complexity environment status. The proposed model can deal with three input variables, i.e., demand stability level, raw material availability level, and on hand inventory level by using dynamic fuzzy logic to obtain the best SSL as an output. In this model, demand stability, raw material, and on hand inventory levels are described linguistically and then treated by inference rules of the fuzzy model to extract the best level of safety stock. The aim of this research is to provide dynamic approach which is used to identify safety stock level, and it can be implanted in different industries. Numerical case study in the dairy industry with Yogurt 200 gm cup product is explained to approve the validity of the proposed model. The obtained results are compared with the current level of safety stock which is calculated by using the traditional approach. The importance of the proposed model has been demonstrated by the significant reduction in safety stock level.

Keywords: inventory optimization, soft computing, safety stock optimization, dairy industries inventory optimization

Procedia PDF Downloads 111
1425 Power Recovery in Egyptian Natural Gas Pressure Reduction Stations Using Turboexpander Systems

Authors: Kamel A. Elshorbagy, Mohamed A. Hussein, Rola S. Afify

Abstract:

Natural gas pressure reduction is typically achieved using pressure reducing valves, where isenthalpic expansion takes place with considerable amount of wasted energy in an irreversible throttling process of the gas. Replacing gas-throttling process by an expansion process in a turbo expander (TE) converts the pressure of natural gas into mechanical energy transmitted to a loading device (i.e. an electric generator). This paper investigates the performance of a turboexpander system for power recovery at natural gas pressure reduction stations. There is a considerable temperature drop associated with the turboexpander process. Essential preheating is required, using gas fired boilers, to avoid undesirable effects of a low outlet temperature. Various system configurations were simulated by the general flow sheet simulator HYSYS and factors affecting the overall performance of the systems were investigated. Power outputs and fuel requirements were found using typical gas flow variation data. The simulation was performed for two case studies in which real input data are used. These case studies involve a domestic (commercial) and an industrial natural gas pressure reduction stations in Egypt. Economic studies of using the turboexpander system in both of the two natural gas pressure reduction stations are conducted using precise data obtained through communication with several companies working in this field. The results of economic analysis, for the two case studies, prove that using turboexpander systems in Egyptian natural gas reduction stations can be a successful project for energy conservation.

Keywords: natural gas, power recovery, reduction stations, turboexpander systems

Procedia PDF Downloads 302
1424 INRAM-3DCNN: Multi-Scale Convolutional Neural Network Based on Residual and Attention Module Combined with Multilayer Perceptron for Hyperspectral Image Classification

Authors: Jianhong Xiang, Rui Sun, Linyu Wang

Abstract:

In recent years, due to the continuous improvement of deep learning theory, Convolutional Neural Network (CNN) has played a great superior performance in the research of Hyperspectral Image (HSI) classification. Since HSI has rich spatial-spectral information, only utilizing a single dimensional or single size convolutional kernel will limit the detailed feature information received by CNN, which limits the classification accuracy of HSI. In this paper, we design a multi-scale CNN with MLP based on residual and attention modules (INRAM-3DCNN) for the HSI classification task. We propose to use multiple 3D convolutional kernels to extract the packet feature information and fully learn the spatial-spectral features of HSI while designing residual 3D convolutional branches to avoid the decline of classification accuracy due to network degradation. Secondly, we also design the 2D Inception module with a joint channel attention mechanism to quickly extract key spatial feature information at different scales of HSI and reduce the complexity of the 3D model. Due to the high parallel processing capability and nonlinear global action of the Multilayer Perceptron (MLP), we use it in combination with the previous CNN structure for the final classification process. The experimental results on two HSI datasets show that the proposed INRAM-3DCNN method has superior classification performance and can perform the classification task excellently.

Keywords: INRAM-3DCNN, residual, channel attention, hyperspectral image classification

Procedia PDF Downloads 59
1423 Analysis of Road Accidents in India 2016 to 2021

Authors: Ajin Frank J., Shridevi Jeevan Kamble

Abstract:

The primary objective of this research paper is to identify significant patterns and insights in road accident data in India spanning from 2016 to 2021. The study reveals that the frequency of accidents, injuries, and fatalities varies depending on numerous factors such as the type of vehicle, time of accidents, age of the vehicle, age and gender of the driver, among others. Notably, the COVID-19 pandemic and subsequent lockdown measures have significantly impacted these figures. One of the key findings of the analysis is the rise in the number of accidents and deaths involving two-wheeler vehicles, particularly among younger individuals, in major states across India. This trend is of concern, and there is a need for increased awareness and precautions to prevent these types of accidents. Additionally, with the imminent rise of electric vehicles in the coming years, ensuring their safety on the road is a critical matter. Another significant factor contributing to road accidents is the age of vehicles. As vehicles age, their handling becomes more challenging compared to new ones, increasing the risk of accidents. Thus, it is imperative for the government to impose stringent regulations and laws to reduce these accident-causing factors and raise awareness among individuals about taking necessary precautions to avoid accidents. This study highlights the importance of understanding the underlying patterns and factors contributing to road accidents in India. Through this knowledge, policymakers and stakeholders can develop effective strategies to address these challenges and promote road safety, ultimately reducing the number of accidents, injuries, and fatalities on Indian roads.

Keywords: road accidents, India, road safety, accident deaths

Procedia PDF Downloads 71
1422 Construction and Performance of Nanocomposite-Based Electrochemical Biosensor

Authors: Jianfang Wang, Xianzhe Chen, Zhuoliang Liu, Cheng-An Tao, Yujiao Li

Abstract:

Organophosphorus (OPs) pesticide used as insecticides are widely used in agricultural pest control, household and storage deworming. The detection of pesticides needs more simple and efficient methods. One of the best ways is to make electrochemical biosensors. In this paper, an electrochemical enzyme biosensor based on acetylcholine esterase (AChE) was constructed, and its sensing properties and sensing mechanisms were studied. Reduced graphene oxide-polydopamine complexes (RGO-PDA), gold nanoparticles (AuNPs) and silver nanoparticles (AgNPs) were prepared firstly and composited with AChE and chitosan (CS), then fixed on the glassy carbon electrode (GCE) surface to construct the biosensor GCE/RGO-PDA-AuNPs-AgNPs-AChE-CS by one-pot method. The results show that graphene oxide (GO) can be reduced by dopamine (DA) and dispersed well in RGO-PDA complexes. And the composites have a synergistic catalysis effect and can improve the surface resistance of GCE. The biosensor selectively can detect acetylcholine (ACh) and OPs pesticide with good linear range and high sensitivity. The performance of the biosensor is affected by the ratio and adding ways of AChE and the adding of AuNPs and AChE. And the biosensor can achieve a detection limit of 2.4 ng/L for methyl parathion and a wide linear detection range of 0.02 ng/L ~ 80 ng/L, and has excellent stability, good anti-interference ability, and excellent preservation performance, indicating that the sensor has practical value.

Keywords: acetylcholine esterase, electrochemical biosensor, nanoparticles, organophosphates, reduced graphene oxide

Procedia PDF Downloads 96
1421 Comet Assay: A Promising Tool for the Risk Assessment and Clinical Management of Head and Neck Tumors

Authors: Sarim Ahmad

Abstract:

The Single Cell Gel Electrophoresis Assay (SCGE, known as comet assay) is a potential, uncomplicated, sensitive and state-of-the-art technique for quantitating DNA damage at individual cell level and repair from in vivo and in vitro samples of eukaryotic cells and some prokaryotic cells, being popular in its widespread use in various areas including human biomonitoring, genotoxicology, ecological monitoring and as a tool for research into DNA damage or repair in different cell types in response to a range of DNA damaging agents, cancer risk and therapy. The method involves the encapsulation of cells in a low-melting-point agarose suspension, lysis of the cells in neutral or alkaline (pH > 13) conditions, and electrophoresis of the suspended lysed cells, resulting in structures resembling comets as observed by fluorescence microscopy; the intensity of the comet tail relative to the head reflects the number of DNA breaks. The likely basis for this is that loops containing a break lose their supercoiling and become free to extend towards the anode. This is followed by visual analysis with staining of DNA and calculating fluorescence to determine the extent of DNA damage. This can be performed by manual scoring or automatically by imaging software. The assay can, therefore, predict an individual’s tumor sensitivity to radiation and various chemotherapeutic drugs and further assess the oxidative stress within tumors and to detect the extent of DNA damage in various cancerous and precancerous lesions of oral cavity.

Keywords: comet assay, single cell gel electrophoresis, DNA damage, early detection test

Procedia PDF Downloads 279
1420 Investigation of Rifampicin and Isoniazid Resistance Mutated Genes in Mycobacterium Tuberculosis Isolated From Patients

Authors: Seyyed Mohammad Amin Mousavi Sagharchi, Alireza Mahmoudi Nasab, Tim Bakker

Abstract:

Introduction: Mycobacterium tuberculosis (MTB) is the most intelligent bacterium that existed in the world to our best knowledge. This bacterium can cause tuberculosis (TB) which is responsible for its spread speed and murder of millions of people around the world. MTB has the practical function to escape from anti-tuberculosis drugs (AT), for this purpose, it handles some mutations in the main genes and creates new patterns for inhibited genes. Method and materials: Researchers have their best tries to safely isolate MTB from the sputum specimens of 35 patients in some hospitals in the Tehran province and detect MTB by culture on Löwenstein-Jensen (LJ) medium and microscopic examination. DNA was extracted from the established bacterial colony by enzymatic extraction method. It was amplified by the polymerase chain reaction (PCR) method, reverse hybridization, and evaluation for detection of resistance genes; generally, researchers apply GenoType MTBDRplus assay. Results: Investigations of results declare us that 21 of the isolated specimens (about 60%) have mutation in rpoB gene, which resisted to rifampicin (most prevalence), and 8 of them (about 22.8%) have mutation in katG or inhA genes which resisted to isoniazid. Also, 4 of them (about 11.4%) don't have any mutation, and 2 of them (about 5.7%) have mutation in every three genes, which makes them resistant to the two drugs mentioned above. Conclusion: Rifampicin and isoniazid are two essential AT that using in the first line of treatment. Resistance in rpoB, and katG, and inhA genes related to mentioned drugs lead to ineffective treatment.

Keywords: mycobacterium tuberculosis, tuberculosis, drug resistance, isoniazid, rifampicin

Procedia PDF Downloads 77
1419 Cimifugin Inhibited Th2-Type Allergic Contact Dermatitis

Authors: Xiaoyan Jiang, Huizhu Wang, Lili Gui, Dandan Shen, Xiao Wei, Xi Yu, Hailiang Liu, Min Hong

Abstract:

Objective: Applicate FITC to establish Th2-type allergic contact dermatitis model, and study the effect and mechanism of Cimifugin on Th2-type allergic contact dermatitis. Methods: The Balb/c mice were sensitized with painting 80 ul of 1.5% FITC onto the shaved abdomen skin at DAY1 and DAY2. The animals were challenged on their right ears with 20 ul of 0.6% FITC, and the left ears were painted with solvent alone at day 6, mice were administered cimifugin for 7 days. 24h later, ear swelling was noted, and the infiltration of eosinophils was investigated by hematoxylin and eosin (H&E) staining. while part of the ear tissue homogenates prepared for detecting interleukin-4 levels by ELISA .Mice were administered cimifugin In the initial stage of the above model for 5 days(-1DAY—DAY3), ear tissue were homogenized to detect IL-33 levels by ELISA. Results: Cimifugin 25mg/kg, 50mg/kg inhibited mouse ear swelling, ear histopathology showed that mice given Cimifugin has significantly reduced levels of local tissue fluid exudation, congestion, infiltration of lymphocytes, and other inflammatory conditions compared with the model group. At the same time, it has significantly reduce of Th2 cytokines IL-4 in the mouse ear tissue homogenate. Data of the initial stage shows that 12.5mg/kg, 50mg/kg Cimifugin significantly inhibited IL-33 levels. Conclusion: Cimifugin inhibit FITC-induced Th2-type allergic contact dermatitis, and its mechanism may be related to inhibition of IL-33.

Keywords: cimifugin, allergic contact dermatitis, Th1/Th2, IL-33

Procedia PDF Downloads 460
1418 Introduce a New Model of Anomaly Detection in Computer Networks Using Artificial Immune Systems

Authors: Mehrshad Khosraviani, Faramarz Abbaspour Leyl Abadi

Abstract:

The fundamental component of the computer network of modern information society will be considered. These networks are connected to the network of the internet generally. Due to the fact that the primary purpose of the Internet is not designed for, in recent decades, none of these networks in many of the attacks has been very important. Today, for the provision of security, different security tools and systems, including intrusion detection systems are used in the network. A common diagnosis system based on artificial immunity, the designer, the Adhasaz Foundation has been evaluated. The idea of using artificial safety methods in the diagnosis of abnormalities in computer networks it has been stimulated in the direction of their specificity, there are safety systems are similar to the common needs of m, that is non-diagnostic. For example, such methods can be used to detect any abnormalities, a variety of attacks, being memory, learning ability, and Khodtnzimi method of artificial immune algorithm pointed out. Diagnosis of the common system of education offered in this paper using only the normal samples is required for network and any additional data about the type of attacks is not. In the proposed system of positive selection and negative selection processes, selection of samples to create a distinction between the colony of normal attack is used. Copa real data collection on the evaluation of ij indicates the proposed system in the false alarm rate is often low compared to other ir methods and the detection rate is in the variations.

Keywords: artificial immune system, abnormality detection, intrusion detection, computer networks

Procedia PDF Downloads 340
1417 Magnetic Resonance Imaging in Children with Brain Tumors

Authors: J. R. Ashrapov, G. A. Alihodzhaeva, D. E. Abdullaev, N. R. Kadirbekov

Abstract:

Diagnosis of brain tumors is one of the challenges, as several central nervous system diseases run the same symptoms. Modern diagnostic techniques such as CT, MRI helps to significantly improve the surgery in the operating period, after surgery, after allowing time to identify postoperative complications in neurosurgery. Purpose: To study the MRI characteristics and localization of brain tumors in children and to detect the postoperative complications in the postoperative period. Materials and methods: A retrospective study of treatment of 62 children with brain tumors in age from 2 to 5 years was performed. Results of the review: MRI scan of the brain of the 62 patients 52 (83.8%) case revealed a brain tumor. Distribution on MRI of brain tumors found in 15 (24.1%) - glioblastomas, 21 (33.8%) - astrocytomas, 7 (11.2%) - medulloblastomas, 9 (14.5%) - a tumor origin (craniopharyngiomas, chordoma of the skull base). MRI revealed the following characteristic features: an additional sign of the heterogeneous MRI signal of hyper and hypointensive T1 and T2 modes with a different perifocal swelling degree with involvement in the process of brain vessels. The main objectives of postoperative MRI study are the identification of early or late postoperative complications, evaluation of radical surgery, the identification of the extended-growing tumor that (in terms of 3-4 weeks). MRI performed in the following cases: 1. Suspicion of a hematoma (3 days or more) 2. Suspicion continued tumor growth (in terms of 3-4 weeks). Conclusions: Magnetic resonance tomography is a highly informative method of diagnostics of brain tumors in children. MRI also helps to determine the effectiveness and tactics of treatment and the follow up in the postoperative period.

Keywords: brain tumors, children, MRI, treatment

Procedia PDF Downloads 127
1416 Statistical Design of Synthetic VP X-bar Control Chat Using Markov Chain Approach

Authors: Ali Akbar Heydari

Abstract:

Control charts are an important tool of statistical quality control. Thesecharts are used to detect and eliminate unwanted special causes of variation that occurred during aperiod of time. The design and operation of control charts require the determination of three design parameters: the sample size (n), the sampling interval (h), and the width coefficient of control limits (k). Thevariable parameters (VP) x-bar controlchart is the x-barchart in which all the design parameters vary between twovalues. These values are a function of the most recent process information. In fact, in the VP x-bar chart, the position of each sample point on the chart establishes the size of the next sample and the timeof its sampling. The synthetic x-barcontrol chartwhich integrates the x-bar chart and the conforming run length (CRL) chart, provides significant improvement in terms of detection power over the basic x-bar chart for all levels of mean shifts. In this paper, we introduce the syntheticVP x-bar control chart for monitoring changes in the process mean. To determine the design parameters, we used a statistical design based on the minimum out of control average run length (ARL) criteria. The optimal chart parameters of the proposed chart are obtained using the Markov chain approach. A numerical example is also done to show the performance of the proposed chart and comparing it with the other control charts. The results show that our proposed syntheticVP x-bar controlchart perform better than the synthetic x-bar controlchart for all shift parameter values. Also, the syntheticVP x-bar controlchart perform better than the VP x-bar control chart for the moderate or large shift parameter values.

Keywords: control chart, markov chain approach, statistical design, synthetic, variable parameter

Procedia PDF Downloads 142
1415 A Spatio-Temporal Analysis and Change Detection of Wetlands in Diamond Harbour, West Bengal, India Using Normalized Difference Water Index

Authors: Lopita Pal, Suresh V. Madha

Abstract:

Wetlands are areas of marsh, fen, peat land or water, whether natural or artificial, permanent or temporary, with water that is static or flowing, fresh, brackish or salt, including areas of marine water the depth of which at low tide does not exceed six metres. The rapidly expanding human population, large scale changes in land use/land cover, burgeoning development projects and improper use of watersheds all has caused a substantial decline of wetland resources in the world. Major degradations have been impacted from agricultural, industrial and urban developments leading to various types of pollutions and hydrological perturbations. Regular fishing activities and unsustainable grazing of animals are degrading the wetlands in a slow pace. The paper focuses on the spatio-temporal change detection of the area of the water body and the main cause of this depletion. The total area under study (22°19’87’’ N, 88°20’23’’ E) is a wetland region in West Bengal of 213 sq.km. The procedure used is the Normalized Difference Water Index (NDWI) from multi-spectral imagery and Landsat to detect the presence of surface water, and the datasets have been compared of the years 2016, 2006 and 1996. The result shows a sharp decline in the area of water body due to a rapid increase in the agricultural practices and the growing urbanization.

Keywords: spatio-temporal change, NDWI, urbanization, wetland

Procedia PDF Downloads 266
1414 Quantitative Structure-Activity Relationship Analysis of Binding Affinity of a Series of Anti-Prion Compounds to Human Prion Protein

Authors: Strahinja Kovačević, Sanja Podunavac-Kuzmanović, Lidija Jevrić, Milica Karadžić

Abstract:

The present study is based on the quantitative structure-activity relationship (QSAR) analysis of eighteen compounds with anti-prion activity. The structures and anti-prion activities (expressed in response units, RU%) of the analyzed compounds are taken from CHEMBL database. In the first step of analysis 85 molecular descriptors were calculated and based on them the hierarchical cluster analysis (HCA) and principal component analysis (PCA) were carried out in order to detect potential significant similarities or dissimilarities among the studied compounds. The calculated molecular descriptors were physicochemical, lipophilicity and ADMET (absorption, distribution, metabolism, excretion and toxicity) descriptors. The first stage of the QSAR analysis was simple linear regression modeling. It resulted in one acceptable model that correlates Henry's law constant with RU% units. The obtained 2D-QSAR model was validated by cross-validation as an internal validation method. The validation procedure confirmed the model’s quality and therefore it can be used for prediction of anti-prion activity. The next stage of the analysis of anti-prion activity will include 3D-QSAR and molecular docking approaches in order to select the most promising compounds in treatment of prion diseases. These results are the part of the project No. 114-451-268/2016-02 financially supported by the Provincial Secretariat for Science and Technological Development of AP Vojvodina.

Keywords: anti-prion activity, chemometrics, molecular modeling, QSAR

Procedia PDF Downloads 282
1413 A Practical and Theoretical Study on the Electromotor Bearing Defect Detection in a Wet Mill Using the Vibration Analysis Method and Defect Length Calculation in the Bearing

Authors: Mostafa Firoozabadi, Alireza Foroughi Nematollahi

Abstract:

Wet mills are one of the most important equipment in the mining industries and any defect occurrence in them can stop the production line and it can make some irrecoverable damages to the system. Electromotors are the significant parts of a mill and their monitoring is a necessary process to prevent unwanted defects. The purpose of this study is to investigate the Electromotor bearing defects, theoretically and practically, using the vibration analysis method. When a defect happens in a bearing, it can be transferred to the other parts of the equipment like inner ring, outer ring, balls, and the bearing cage. The electromotor defects source can be electrical or mechanical. Sometimes, the electrical and mechanical defect frequencies are modulated and the bearing defect detection becomes difficult. In this paper, to detect the electromotor bearing defects, the electrical and mechanical defect frequencies are extracted firstly. Then, by calculating the bearing defect frequencies, and the spectrum and time signal analysis, the bearing defects are detected. In addition, the obtained frequency determines that the bearing level in which the defect has happened and by comparing this level to the standards it determines the bearing remaining lifetime. Finally, the defect length is calculated by theoretical equations to demonstrate that there is no need to replace the bearing. The results of the proposed method, which has been implemented on the wet mills in the Golgohar mining and industrial company in Iran, show that this method is capable of detecting the electromotor bearing defects accurately and on time.

Keywords: bearing defect length, defect frequency, electromotor defects, vibration analysis

Procedia PDF Downloads 484
1412 A Pipeline for Detecting Copy Number Variation from Whole Exome Sequencing Using Comprehensive Tools

Authors: Cheng-Yang Lee, Petrus Tang, Tzu-Hao Chang

Abstract:

Copy number variations (CNVs) have played an important role in many kinds of human diseases, such as Autism, Schizophrenia and a number of cancers. Many diseases are found in genome coding regions and whole exome sequencing (WES) is a cost-effective and powerful technology in detecting variants that are enriched in exons and have potential applications in clinical setting. Although several algorithms have been developed to detect CNVs using WES and compared with other algorithms for finding the most suitable methods using their own samples, there were not consistent datasets across most of algorithms to evaluate the ability of CNV detection. On the other hand, most of algorithms is using command line interface that may greatly limit the analysis capability of many laboratories. We create a series of simulated WES datasets from UCSC hg19 chromosome 22, and then evaluate the CNV detective ability of 19 algorithms from OMICtools database using our simulated WES datasets. We compute the sensitivity, specificity and accuracy in each algorithm for validation of the exome-derived CNVs. After comparison of 19 algorithms from OMICtools database, we construct a platform to install all of the algorithms in a virtual machine like VirtualBox which can be established conveniently in local computers, and then create a simple script that can be easily to use for detecting CNVs using algorithms selected by users. We also build a table to elaborate on many kinds of events, such as input requirement, CNV detective ability, for all of the algorithms that can provide users a specification to choose optimum algorithms.

Keywords: whole exome sequencing, copy number variations, omictools, pipeline

Procedia PDF Downloads 297
1411 Calcined Tertiaries Hydrotalcites as Supports of Cobalt-Molybdenum Based Catalysts for the Hydrodesulfurization Reaction of Dibenzothiophene

Authors: Edwin Oviedo, Carlos Linares, Philippe Ayrault, Sylvette Brunet

Abstract:

Nowadays, light conventional crude oils are going down. Therefore, the exploitation of heavy crude oils has been increasing. Hence, a major quantity of refractory sulfur compounds such as dibenzothiophene (DBT) should be removed. Many efforts have been carried out to modify hydrotreatment typical supports in order to increase hydrodesulfurization (HDS) reactions. The present work shows the synthesis of tertiaries MgFeAl(0.16), MgFeAl(0.32), CoFeAl, ZnFeAl hydrotalcites, as supports of CoMo based catalysts, where 0.16 and 0.32 are the Fe3+/Al3+ molar ratio. Solids were characterized by different techniques (XRD, CO2-TPD, H2-TPR, FT-IR, BET, Chemical Analysis and HRTEM) and tested in the DBT HDS reaction. The reactions conditions were: Temp=325°C, P=40 Bar, H2/feed=475. Results show that the catalysts CoMo/MgFeAl(0.16) and CoMo/MgFeAl(0.32), which were the most basics, reduced the sulfur content from 500ppm to less than 1 ppm, increasing the cyclohexylbenzene content, i.e. presented a higher selective toward the HYD pathway than reference catalyst CoMo/γ- Al2O3. This is suitable for improving the fuel quality due to the increase of the cetane number. These catalysts were also more active to the HDS reaction increasing the direct desulfurization (DDS) way and presented a good stability. It is advantageous when the gas oil centane number should be improved. Cobalt, iron or zinc species inside support could avoid the Co and Mo dispersion or form spinel species which could be less active to hydrodesulfuration reactions, while hydrotalcites containing Mg increases the HDS activity probably due to improved Co/Mo ratio.

Keywords: catalyst, cetane number, dibenzothiophene, diesel, hydrodesulfurization, hydrotreatment, MoS2

Procedia PDF Downloads 143
1410 Systematic Literature Review of Therapeutic Use of Autonomous Sensory Meridian Response (ASMR) and Short-Term ASMR Auditory Training Trial

Authors: Christine H. Cubelo

Abstract:

This study consists of 2-parts: a systematic review of current publications on the therapeutic use of autonomous sensory meridian response (ASMR) and a within-subjects auditory training trial using ASMR videos. The main intent is to explore ASMR as potentially therapeutically beneficial for those with atypical sensory processing. Many hearing-related disorders and mood or anxiety symptoms overlap with symptoms of sensory processing issues. For this reason, inclusion and exclusion criteria of the systematic review were generated in an effort to produce optimal search outcomes and avoid overly confined criteria that would limit yielded results. Criteria for inclusion in the review for Part 1 are (1) adult participants diagnosed with hearing loss or atypical sensory processing, (2) inclusion of measures related to ASMR as a treatment method, and (3) published between 2000 and 2022. A total of 1,088 publications were found in the preliminary search, and a total of 13 articles met the inclusion criteria. A total of 14 participants completed the trial and post-trial questionnaire. Of all responses, 64.29% agreed that the duration of auditory training sessions was reasonable. In addition, 71.43% agreed that the training improved their perception of music. Lastly, 64.29% agreed that the training improved their perception of a primary talker when there are other talkers or background noises present.

Keywords: autonomous sensory meridian response, auditory training, atypical sensory processing, hearing loss, hearing aids

Procedia PDF Downloads 45
1409 Application of Finite Volume Method for Numerical Simulation of Contaminant Transfer in a Two-Dimensional Reservoir

Authors: Atousa Ataieyan, Salvador A. Gomez-Lopera, Gennaro Sepede

Abstract:

Today, due to the growing urban population and consequently, the increasing water demand in cities, the amount of contaminants entering the water resources is increasing. This can impose harmful effects on the quality of the downstream water. Therefore, predicting the concentration of discharged pollutants at different times and distances of the interested area is of high importance in order to carry out preventative and controlling measures, as well as to avoid consuming the contaminated water. In this paper, the concentration distribution of an injected conservative pollutant in a square reservoir containing four symmetric blocks and three sources using Finite Volume Method (FVM) is simulated. For this purpose, after estimating the flow velocity, classical Advection-Diffusion Equation (ADE) has been discretized over the studying domain by Backward Time- Backward Space (BTBS) scheme. Then, the discretized equations for each node have been derived according to the initial condition, boundary conditions and point contaminant sources. Finally, taking into account the appropriate time step and space step, a computational code was set up in MATLAB. Contaminant concentration was then obtained at different times and distances. Simulation results show how using BTBS differentiating scheme and FVM as a numerical method for solving the partial differential equation of transport is an appropriate approach in the case of two-dimensional contaminant transfer in an advective-diffusive flow.

Keywords: BTBS differentiating scheme, contaminant concentration, finite volume, mass transfer, water pollution

Procedia PDF Downloads 121
1408 Open Source Knowledge Management Approach to Manage and Disseminate Distributed Content in a Global Enterprise

Authors: Rahul Thakur, Onkar Chandel

Abstract:

Red Hat is the world leader in providing open source software and solutions. A global enterprise, like Red Hat, has unique issues of connecting employees with content because of distributed offices, multiple teams spread across geographies, multiple languages, and different cultures. Employees, of a global company, create content that is distributed across departments, teams, regions, and countries. This makes finding the best content difficult since owners keep iterating on the existing content. When employees are unable to find the content, they end up creating it once again and in the process duplicating existing material and effort. Also, employees may not find the relevant content and spend time reviewing obsolete duplicate, or irrelevant content. On an average, a person spends 15 minutes/day in failed searches that might result in missed business opportunities, employee frustration, and substandard deliverables. Red Hat Knowledge Management Office (KMO) applied 'open source strategy' to solve the above problems. Under the Open Source Strategy, decisions are taken collectively. The strategy aims at accomplishing common goals with the help of communities. The objectives of this initiative were to save employees' time, get them authentic content, improve their content search experience, avoid duplicate content creation, provide context based search, improve analytics, improve content management workflows, automate content classification, and automate content upload. This session will describe open source strategy, its applicability in content management, challenges, recommended solutions, and outcome.

Keywords: content classification, content management, knowledge management, open source

Procedia PDF Downloads 195
1407 Real-Time Pedestrian Detection Method Based on Improved YOLOv3

Authors: Jingting Luo, Yong Wang, Ying Wang

Abstract:

Pedestrian detection in image or video data is a very important and challenging task in security surveillance. The difficulty of this task is to locate and detect pedestrians of different scales in complex scenes accurately. To solve these problems, a deep neural network (RT-YOLOv3) is proposed to realize real-time pedestrian detection at different scales in security monitoring. RT-YOLOv3 improves the traditional YOLOv3 algorithm. Firstly, the deep residual network is added to extract vehicle features. Then six convolutional neural networks with different scales are designed and fused with the corresponding scale feature maps in the residual network to form the final feature pyramid to perform pedestrian detection tasks. This method can better characterize pedestrians. In order to further improve the accuracy and generalization ability of the model, a hybrid pedestrian data set training method is used to extract pedestrian data from the VOC data set and train with the INRIA pedestrian data set. Experiments show that the proposed RT-YOLOv3 method achieves 93.57% accuracy of mAP (mean average precision) and 46.52f/s (number of frames per second). In terms of accuracy, RT-YOLOv3 performs better than Fast R-CNN, Faster R-CNN, YOLO, SSD, YOLOv2, and YOLOv3. This method reduces the missed detection rate and false detection rate, improves the positioning accuracy, and meets the requirements of real-time detection of pedestrian objects.

Keywords: pedestrian detection, feature detection, convolutional neural network, real-time detection, YOLOv3

Procedia PDF Downloads 124