Search results for: SQL injection attack classification
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 3610

Search results for: SQL injection attack classification

1990 Numerical Investigation of Oxy-Fuel Combustion in Gasoline Engine for Carbon Capture and Storage

Authors: Zhijun Peng, Xiang Li, Dayou Li, Raouf Mobasheri, Abdel Aitouche

Abstract:

To implement carbon capture and storage (CCS) for eliminating carbon dioxide (CO₂) emissions, this paper describes a study on oxy-fuel combustion (OFC) with an ethanol-gasoline dual-fuel spark ignition (DFSI) engine under economical oxygen consumption at low and mid-high loads which was performed by 1D simulation. It is demonstrated that under OFC mode without other optimisation, brake mean effective pressure (BMEP) can meet the requirement at mid-high load, but it has a considerable decline at low load compared to conventional air combustion (CAC) mode. Moreover, there is a considerable deterioration in brake specific fuel consumption (BSFC) compared to that of CAC mode. A practical method is proposed to optimise the DFSI engine performance under OFC mode by changing intake charge components and utilising appropriate water injection (WI) strategies.

Keywords: oxy-fuel combustion, dual-fuel spark ignition engine, ethanol, gasoline, computer simulation

Procedia PDF Downloads 89
1989 Study and Analysis of the Factors Affecting Road Safety Using Decision Tree Algorithms

Authors: Naina Mahajan, Bikram Pal Kaur

Abstract:

The purpose of traffic accident analysis is to find the possible causes of an accident. Road accidents cannot be totally prevented but by suitable traffic engineering and management the accident rate can be reduced to a certain extent. This paper discusses the classification techniques C4.5 and ID3 using the WEKA Data mining tool. These techniques use on the NH (National highway) dataset. With the C4.5 and ID3 technique it gives best results and high accuracy with less computation time and error rate.

Keywords: C4.5, ID3, NH(National highway), WEKA data mining tool

Procedia PDF Downloads 333
1988 Fault-Tolerant Control Study and Classification: Case Study of a Hydraulic-Press Model Simulated in Real-Time

Authors: Jorge Rodriguez-Guerra, Carlos Calleja, Aron Pujana, Iker Elorza, Ana Maria Macarulla

Abstract:

Society demands more reliable manufacturing processes capable of producing high quality products in shorter production cycles. New control algorithms have been studied to satisfy this paradigm, in which Fault-Tolerant Control (FTC) plays a significant role. It is suitable to detect, isolate and adapt a system when a harmful or faulty situation appears. In this paper, a general overview about FTC characteristics are exposed; highlighting the properties a system must ensure to be considered faultless. In addition, a research to identify which are the main FTC techniques and a classification based on their characteristics is presented in two main groups: Active Fault-Tolerant Controllers (AFTCs) and Passive Fault-Tolerant Controllers (PFTCs). AFTC encompasses the techniques capable of re-configuring the process control algorithm after the fault has been detected, while PFTC comprehends the algorithms robust enough to bypass the fault without further modifications. The mentioned re-configuration requires two stages, one focused on detection, isolation and identification of the fault source and the other one in charge of re-designing the control algorithm by two approaches: fault accommodation and control re-design. From the algorithms studied, one has been selected and applied to a case study based on an industrial hydraulic-press. The developed model has been embedded under a real-time validation platform, which allows testing the FTC algorithms and analyse how the system will respond when a fault arises in similar conditions as a machine will have on factory. One AFTC approach has been picked up as the methodology the system will follow in the fault recovery process. In a first instance, the fault will be detected, isolated and identified by means of a neural network. In a second instance, the control algorithm will be re-configured to overcome the fault and continue working without human interaction.

Keywords: fault-tolerant control, electro-hydraulic actuator, fault detection and isolation, control re-design, real-time

Procedia PDF Downloads 170
1987 The Role of Regional Economic Communities in Fighting Terrorism in Africa: The Case of Inter-Governmental Authority on Development (IGAD)

Authors: Memar Ayalew Demeke, Solomon Gebreyohans Gebru

Abstract:

In Africa, Regional Economic Communities (RECs) were initially established to tackle the economic challenges of the continent. However, overtime, they expanded their mandate to deal with the security threats of the continent such as terrorism. In fact, the fight against terrorism has been internationalized following the September 9/11 terrorist attack in the U.S.A. Since then, RECs have been giving considerable attention to preventing and combating terrorism in their respective regions. Similarly, IGAD has been involved in preventing and combating terrorism. So far, however, little has been done with regard to what IGAD has performed in fighting terrorism. Therefore, this study was intended to describe and analyze the legal and practical activities carried out by IGAD in its fight against terrorism in the region general and in Somalia in particular. Both descriptive and analytical methods were employed and data were analyzed through qualitative approach. Finally, based on the findings, the study argues that, instead of over-reliance on hard power as a means of fighting terrorism, IGAD should invest more on the political and socio-economic problems of its member states so as to address the root causes.

Keywords: regional economic communities, IGAD, terrorism, treaties, conventions

Procedia PDF Downloads 419
1986 Unsteady Simulation of Burning Off Carbon Deposition in a Coke Oven

Authors: Uzu-Kuei Hsu, Keh-Chin Chang, Joo-Guan Hang, Chang-Hsien Tai

Abstract:

Carbon Deposits are often occurred inside the industrial coke oven during the coking process. Accumulation of carbon deposits may cause a big issue, which seriously influences the coking operation. The carbon is burning off by injecting fresh air through pipes into coke oven which is an efficient way practically operated in industries. The burning off carbon deposition in coke oven performed by Computational Fluid Dynamics (CFD) method has provided an evaluation of the feasibility study. A three-dimensional, transient, turbulent reacting flow simulation has performed with three different injecting air flow rate and another kind of injecting configuration. The result shows that injection higher air flow rate would effectively reduce the carbon deposits. In the meantime, the opened charging holes would suck extra oxygen from the atmosphere to participate in reactions. In term of coke oven operating limits, the wall temperatures are monitored to prevent over-heating of the adiabatic walls during the burn-off process.

Keywords: coke oven, burning off, carbon deposits, carbon combustion, CFD

Procedia PDF Downloads 686
1985 Mondoc: Informal Lightweight Ontology for Faceted Semantic Classification of Hypernymy

Authors: M. Regina Carreira-Lopez

Abstract:

Lightweight ontologies seek to concrete union relationships between a parent node, and a secondary node, also called "child node". This logic relation (L) can be formally defined as a triple ontological relation (LO) equivalent to LO in ⟨LN, LE, LC⟩, and where LN represents a finite set of nodes (N); LE is a set of entities (E), each of which represents a relationship between nodes to form a rooted tree of ⟨LN, LE⟩; and LC is a finite set of concepts (C), encoded in a formal language (FL). Mondoc enables more refined searches on semantic and classified facets for retrieving specialized knowledge about Atlantic migrations, from the Declaration of Independence of the United States of America (1776) and to the end of the Spanish Civil War (1939). The model looks forward to increasing documentary relevance by applying an inverse frequency of co-ocurrent hypernymy phenomena for a concrete dataset of textual corpora, with RMySQL package. Mondoc profiles archival utilities implementing SQL programming code, and allows data export to XML schemas, for achieving semantic and faceted analysis of speech by analyzing keywords in context (KWIC). The methodology applies random and unrestricted sampling techniques with RMySQL to verify the resonance phenomena of inverse documentary relevance between the number of co-occurrences of the same term (t) in more than two documents of a set of texts (D). Secondly, the research also evidences co-associations between (t) and their corresponding synonyms and antonyms (synsets) are also inverse. The results from grouping facets or polysemic words with synsets in more than two textual corpora within their syntagmatic context (nouns, verbs, adjectives, etc.) state how to proceed with semantic indexing of hypernymy phenomena for subject-heading lists and for authority lists for documentary and archival purposes. Mondoc contributes to the development of web directories and seems to achieve a proper and more selective search of e-documents (classification ontology). It can also foster on-line catalogs production for semantic authorities, or concepts, through XML schemas, because its applications could be used for implementing data models, by a prior adaptation of the based-ontology to structured meta-languages, such as OWL, RDF (descriptive ontology). Mondoc serves to the classification of concepts and applies a semantic indexing approach of facets. It enables information retrieval, as well as quantitative and qualitative data interpretation. The model reproduces a triple tuple ⟨LN, LE, LT, LCF L, BKF⟩ where LN is a set of entities that connect with other nodes to concrete a rooted tree in ⟨LN, LE⟩. LT specifies a set of terms, and LCF acts as a finite set of concepts, encoded in a formal language, L. Mondoc only resolves partial problems of linguistic ambiguity (in case of synonymy and antonymy), but neither the pragmatic dimension of natural language nor the cognitive perspective is addressed. To achieve this goal, forthcoming programming developments should target at oriented meta-languages with structured documents in XML.

Keywords: hypernymy, information retrieval, lightweight ontology, resonance

Procedia PDF Downloads 123
1984 Dimethyl fumarate Alleviates Valproic Acid-Induced Autism in Wistar Rats via Activating NRF-2 and Inhibiting NF-κB Pathways

Authors: Sandy Elsayed, Aya Mohamed, Noha Nassar

Abstract:

Introduction: Autism spectrum disorder (ASD) is a neurodevelopmental disorder characterized by social deficits and repetitive behavior. Multiple studies suggest that oxidative stress and neuroinflammation are key factors in the etiology of ASD and often associated with worsening of ASD-related behaviors. Nuclear factor erythroid 2-related factor 2 (NRF-2) is a transcription factor that promotes expression of antioxidant response element genes in oxidative stress. In ASD subjects, decreased expression of NRF-2 in frontal cortex shifted the redox homeostasis towards oxidative stress, and resulted in inflammation evidenced by elevation of nuclear factor kappa B (NF-κB) transcriptional activity. Dimethyl fumarate (DMF) is a NRF-2 activator that is used in the treatment of psoriasis and multiple sclerosis. It participates in the transcriptional control of inflammatory factors via inhibition of NF-κB and its downstream targets. This study aimed to investigate the role of DMF in alleviating the cognitive impairments and behavior deficits associated with ASD through mitigation of oxidative stress and inflammation in prenatal valproic acid (VPA) rat model of autism. Methods: Pregnant female Wistar rats received a single intraperitoneal injection of VPA (600 mg/kg) to induce autistic-like-behavioral and neurobiological alterations in their offspring. Chronic oral gavage of DMF (150mg/kg/day) started from postnatal day (PND) 24 till PND62 (39 days). Prenatal VPA exposure elicited autistic behaviors including decreased social interaction and stereotyped behavior. Social interaction was evaluated using three-chamber sociability test and calculation of sociability index (SI), while stereotyped repetitive behavior and anxiety associated with ASD were assessed using marble burying test (MBT). Biochemical analyses were done on prefrontal cortex homogenates including NRF-2, and NF-κB expression. Moreover, inducible nitric oxide synthase (iNOS) gene expression and tumor necrosis factor (TNF-) protein expression were evaluated as markers of inflammation. Results: Prenatal VPA elicited decreased social interaction shown by decreased SI compared to control group (p < 0.001) and DMF enhanced SI (p < 0.05). In MBT, prenatal injection of VPA manifested stereotyped behavior and enhanced number of buried marbles compared to control (p < 0.05) and DMF reduced the anxiety-related behavior in rats exhibiting ASD-like behaviors (p < 0.05). In prefrontal cortex, NRF-2 expression was downregulated in prenatal VPA model (p < 0.0001) and DMF reversed this effect (p < 0.0001). The inflammatory transcription factor NF-κB was elevated in prenatal VPA model (p < 0.0001) and reduced (p < 0.0001) upon NRF-2 activation by DMF. Prenatal VPA expressed higher levels of proinflammatory cytokine TNF- compared to control group (p < 0.0001) and DMF reduced it (p < 0.0001). Finally, the gene expression of iNOS was downregulated upon NRF-2 activation by DMF (p < 0.01). Conclusion: This study proposes that DMF is a potential agent that can be used to ameliorate autistic-like-changes through NRF-2 activation along with NF-κB downregulation and therefore, it is a promising novel therapy for ASD.

Keywords: autism spectrum disorders, dimethyl fumarate, neuroinflammation, NRF-2

Procedia PDF Downloads 37
1983 The Effects of Lithofacies on Oil Enrichment in Lucaogou Formation Fine-Grained Sedimentary Rocks in Santanghu Basin, China

Authors: Guoheng Liu, Zhilong Huang

Abstract:

For more than the past ten years, oil and gas production from marine shale such as the Barnett shale. In addition, in recent years, major breakthroughs have also been made in lacustrine shale gas exploration, such as the Yanchang Formation of the Ordos Basin in China. Lucaogou Formation shale, which is also lacustrine shale, has also yielded a high production in recent years, for wells such as M1, M6, and ML2, yielding a daily oil production of 5.6 tons, 37.4 tons and 13.56 tons, respectively. Lithologic identification and classification of reservoirs are the base and keys to oil and gas exploration. Lithology and lithofacies obviously control the distribution of oil and gas in lithological reservoirs, so it is of great significance to describe characteristics of lithology and lithofacies of reservoirs finely. Lithofacies is an intrinsic property of rock formed under certain conditions of sedimentation. Fine-grained sedimentary rocks such as shale formed under different sedimentary conditions display great particularity and distinctiveness. Hence, to our best knowledge, no constant and unified criteria and methods exist for fine-grained sedimentary rocks regarding lithofacies definition and classification. Consequently, multi-parameters and multi-disciplines are necessary. A series of qualitative descriptions and quantitative analysis were used to figure out the lithofacies characteristics and its effect on oil accumulation of Lucaogou formation fine-grained sedimentary rocks in Santanghu basin. The qualitative description includes core description, petrographic thin section observation, fluorescent thin-section observation, cathode luminescence observation and scanning electron microscope observation. The quantitative analyses include X-ray diffraction, total organic content analysis, ROCK-EVAL.II Methodology, soxhlet extraction, porosity and permeability analysis and oil saturation analysis. Three types of lithofacies were mainly well-developed in this study area, which is organic-rich massive shale lithofacies, organic-rich laminated and cloddy hybrid sedimentary lithofacies and organic-lean massive carbonate lithofacies. Organic-rich massive shale lithofacies mainly include massive shale and tuffaceous shale, of which quartz and clay minerals are the major components. Organic-rich laminated and cloddy hybrid sedimentary lithofacies contain lamina and cloddy structure. Rocks from this lithofacies chiefly consist of dolomite and quartz. Organic-lean massive carbonate lithofacies mainly contains massive bedding fine-grained carbonate rocks, of which fine-grained dolomite accounts for the main part. Organic-rich massive shale lithofacies contain the highest content of free hydrocarbon and solid organic matter. Moreover, more pores were developed in organic-rich massive shale lithofacies. Organic-lean massive carbonate lithofacies contain the lowest content solid organic matter and develop the least amount of pores. Organic-rich laminated and cloddy hybrid sedimentary lithofacies develop the largest number of cracks and fractures. To sum up, organic-rich massive shale lithofacies is the most favorable type of lithofacies. Organic-lean massive carbonate lithofacies is impossible for large scale oil accumulation.

Keywords: lithofacies classification, tuffaceous shale, oil enrichment, Lucaogou formation

Procedia PDF Downloads 213
1982 Nano Fat Injection for Scar Treatment and Skin Rejuvenation

Authors: Sokol Isaraj, Lorela Bendo

Abstract:

Scars resulting from surgery, injury, or burns have a physical and psychological impact on the affected patient. Although a number of treatments are available, nano fat grafting is an effective treatment for scars. Nano fat is a liquid suspension rich in stem cells obtained by mechanical emulsification. Nano fat grafting was performed in 10 cases to correct rhytides, surgical scars, and post-burn scars between January 2022 and April 2022. Fat was aspirated from the lower abdomen or trochanteric region. After emulsification and filtration protocol, the resulting nano fat liquid was injected intradermally and subdermally. All patients filled out a questionnaire at three months post-treatment, which consisted of questions regarding the grade of improvement of skin and recommendation of the procedure. The clinical results were apparent between 2 and 3 weeks after the treatment. All patients confirmed an improvement in skin texture and quality. The most significant improvement was seen in pigmentation and pliability. No complications were reported. Nano fat seems to be a safe and effective treatment in scar treatment and skin rejuvenation.

Keywords: fat grafting, fat transfer, micro fat, nano fat

Procedia PDF Downloads 80
1981 Reconnaissance Investigation of Thermal Springs in the Middle Benue Trough, Nigeria by Remote Sensing

Authors: N. Tochukwu, M. Mukhopadhyay, A. Mohamed

Abstract:

It is no new that Nigeria faces a continual power shortage problem due to its vast population power demand and heavy reliance on nonrenewable forms of energy such as thermal power or fossil fuel. Many researchers have recommended using geothermal energy as an alternative; however, Past studies focus on the geophysical & geochemical investigation of this energy in the sedimentary and basement complex; only a few studies incorporated the remote sensing methods. Therefore, in this study, the preliminary examination of geothermal resources in the Middle Benue was carried out using satellite imagery in ArcMap. Landsat 8 scene (TIR, NIR, Red spectral bands) was used to estimate the Land Surface Temperature (LST). The Maximum Likelihood Classification (MLC) technique was used to classify sites with very low, low, moderate, and high LST. The intermediate and high classification happens to be possible geothermal zones, and they occupy 49% of the study area (38077km2). Riverline were superimposed on the LST layer, and the identification tool was used to locate high temperate sites. Streams that overlap on the selected sites were regarded as geothermal springs as. Surprisingly, the LST results show lower temperatures (<36°C) at the famous thermal springs (Awe & Wukari) than some unknown rivers/streams found in Kwande (38°C), Ussa, (38°C), Gwer East (37°C), Yola Cross & Ogoja (36°C). Studies have revealed that temperature increases with depth. However, this result shows excellent geothermal resources potential as it is expected to exceed the minimum geothermal gradient of 25.47 with an increase in depth. Therefore, further investigation is required to estimate the depth of the causative body, geothermal gradients, and the sustainability of the reservoirs by geophysical and field exploration. This method has proven to be cost-effective in locating geothermal resources in the study area. Consequently, the same procedure is recommended to be applied in other regions of the Precambrian basement complex and the sedimentary basins in Nigeria to save a preliminary field survey cost.

Keywords: ArcMap, geothermal resources, Landsat 8, LST, thermal springs, MLC

Procedia PDF Downloads 180
1980 Contraction and Membrane Potential of C2C12 with GTXs

Authors: Bayan Almofty, Yuto Yamaki, Tadamasa Terai, Sadahito Uto

Abstract:

Culture techniques of skeletal muscle cells are advanced in the field of regenerative medicine and applied research of cultured muscle. As applied research of cultured muscle, myopathy (muscles disease) treatment is expected and development bio of actuator is also expected in biomedical engineering. Grayanotoxins (GTXs) is known as neurotoxins that enhance the permeability of cell membrane for Na ions. Grayanotoxins are extracted from a famous Pieris japonica and Ericaceae as well as a phytotoxin. In this study, we investigated the effect of GTXs on muscle cells (C2C12) contraction and membrane potential. Contraction of myotubes is induced by applied external electrical stimulation. Contraction and membrane potential change of skeletal muscle cells are induced by injection of current. We, therefore, concluded that effect of Grayanotoxins on contraction and membrane potential of C2C12 relate to acute toxicity of GTXs.

Keywords: skeletal muscle cells C2C12, grayanotoxins, contraction, membrane potential, acute toxicity, pytotoxin, motubes

Procedia PDF Downloads 502
1979 Constructing a Semi-Supervised Model for Network Intrusion Detection

Authors: Tigabu Dagne Akal

Abstract:

While advances in computer and communications technology have made the network ubiquitous, they have also rendered networked systems vulnerable to malicious attacks devised from a distance. These attacks or intrusions start with attackers infiltrating a network through a vulnerable host and then launching further attacks on the local network or Intranet. Nowadays, system administrators and network professionals can attempt to prevent such attacks by developing intrusion detection tools and systems using data mining technology. In this study, the experiments were conducted following the Knowledge Discovery in Database Process Model. The Knowledge Discovery in Database Process Model starts from selection of the datasets. The dataset used in this study has been taken from Massachusetts Institute of Technology Lincoln Laboratory. After taking the data, it has been pre-processed. The major pre-processing activities include fill in missed values, remove outliers; resolve inconsistencies, integration of data that contains both labelled and unlabelled datasets, dimensionality reduction, size reduction and data transformation activity like discretization tasks were done for this study. A total of 21,533 intrusion records are used for training the models. For validating the performance of the selected model a separate 3,397 records are used as a testing set. For building a predictive model for intrusion detection J48 decision tree and the Naïve Bayes algorithms have been tested as a classification approach for both with and without feature selection approaches. The model that was created using 10-fold cross validation using the J48 decision tree algorithm with the default parameter values showed the best classification accuracy. The model has a prediction accuracy of 96.11% on the training datasets and 93.2% on the test dataset to classify the new instances as normal, DOS, U2R, R2L and probe classes. The findings of this study have shown that the data mining methods generates interesting rules that are crucial for intrusion detection and prevention in the networking industry. Future research directions are forwarded to come up an applicable system in the area of the study.

Keywords: intrusion detection, data mining, computer science, data mining

Procedia PDF Downloads 293
1978 Nano Fat Injection for Scar Treatment and Skin Rejuvenation

Authors: Sokol Isaraj, Lorela Bendo

Abstract:

Scars resulting from surgery, injury, or burns have a physical and psychological impact on the affected patient. Although a number of treatments are available, nano fat grafting is an effective treatment for scars. Nano fat is a liquid suspension rich in stem cells obtained by mechanical emulsification. Nano fat grafting was performed in 10 cases to correct rhytides, surgical scars and post-burn scars between January 2022 and April 2022. Fat was aspirated from the lower abdomen or trochanteric region. After emulsification and filtration protocol, the resulting nano fat liquid was injected intradermally and subdermally. All patients filled out a questionnaire at 3 months post-treatment which consisted of questions regarding the grade of improvement of skin and recommendation of the procedure. The clinical results were apparent between 2 and 3 weeks after the treatment. All patients confirmed an improvement in skin texture and quality. The most significant improvement was seen in pigmentation and pliability. No complications were reported. Nano fat seems to be a safe and effective treatment for scar treatment and skin rejuvenation.

Keywords: fat grafting, fat transfer, microfat, nanofat

Procedia PDF Downloads 78
1977 Fundamental Research Dissension between Hot and Cold Chamber High Pressure Die Casting

Authors: Sahil Kumar, Surinder Pal, Rahul Kapoor

Abstract:

This paper is focused on to define the basic difference between hot and cold chamber high pressure die casting process which is not fully defined in a research before paper which we have studied. The pressure die casting is basically defined into two types (1) Hot chamber Die Casting (2) Cold chamber Die Casting. Cold chamber die casting is used for casting alloys that require high pressure and have a high melting temperature, such as brass, aluminum, magnesium, copper based alloys and other high melting point nonferrous alloys. Hot chamber die casting is suitable for casting zinc, tin, lead, and low melting point alloys. In hot chamber die casting machine, the molten metal is an integral pan of the machine. It mainly consists of hot chamber and gooseneck type metal container made of cast iron. This machine is mainly used for low melting alloys and alloys of metals like zinc, lead etc. Metals and alloys having a high melting point and those which are having an affinity for iron cannot be cast by this machine, which could otherwise attack the shot sleeve and damage the machine.

Keywords: hot chamber die casting, cold chamber die casting, metals and alloys, casting technology

Procedia PDF Downloads 615
1976 Optimization of Multi-Zone Unconventional (Shale) Gas Reservoir Using Hydraulic Fracturing Technique

Authors: F. C. Amadi, G. C. Enyi, G. G. Nasr

Abstract:

Hydraulic fracturing is one of the most important stimulation techniques available to the petroleum engineer to extract hydrocarbons in tight gas sandstones. It allows more oil and gas production in tight reservoirs as compared to conventional means. The main aim of the study is to optimize the hydraulic fracturing as technique and for this purpose three multi-zones layer formation is considered and fractured contemporaneously. The three zones are named as Zone1 (upper zone), Zone2 (middle zone) and Zone3 (lower zone) respectively and they all occur in shale rock. Simulation was performed with Mfrac integrated software which gives a variety of 3D fracture options. This simulation process yielded an average fracture efficiency of 93.8%for the three respective zones and an increase of the average permeability of the rock system. An average fracture length of 909 ft with net height (propped height) of 210 ft (average) was achieved. Optimum fracturing results was also achieved with maximum fracture width of 0.379 inches at an injection rate of 13.01 bpm with 17995 Mscf of gas production.

Keywords: hydraulic fracturing, optimisation, shale, tight reservoir

Procedia PDF Downloads 424
1975 Performance Investigation of Unmanned Aerial Vehicles Attitude Control Based on Modified PI-D and Nonlinear Dynamic Inversion

Authors: Ebrahim H. Kapeel, Ahmed M. Kamel, Hossam Hendy, Yehia Z. Elhalwagy

Abstract:

Interest in autopilot design has been raised intensely as a result of recent advancements in Unmanned Aerial vehicles (UAVs). Due to the enormous number of applications that UAVs can achieve, the number of applied control theories used for them has increased in recent years. These small fixed-wing UAVs are suffering high non-linearity, sensitivity to disturbances, and coupling effects between their channels. In this work, the nonlinear dynamic inversion (NDI) control law is designed for a nonlinear small fixed-wing UAV model. The NDI is preferable for varied operating conditions, there is no need for a scheduling controller. Moreover, it’s applicable for high angles of attack. For the designed flight controller validation, a nonlinear Modified PI-D controller is performed with our model. A comparative study between both controllers is achieved to evaluate the NDI performance. Simulation results and analysis are proposed to illustrate the effectiveness of the designed controller based on NDI.

Keywords: attitude control, nonlinear PID, dynamic inversion

Procedia PDF Downloads 105
1974 Recurrent Neural Networks for Classifying Outliers in Electronic Health Record Clinical Text

Authors: Duncan Wallace, M-Tahar Kechadi

Abstract:

In recent years, Machine Learning (ML) approaches have been successfully applied to an analysis of patient symptom data in the context of disease diagnosis, at least where such data is well codified. However, much of the data present in Electronic Health Records (EHR) are unlikely to prove suitable for classic ML approaches. Furthermore, as scores of data are widely spread across both hospitals and individuals, a decentralized, computationally scalable methodology is a priority. The focus of this paper is to develop a method to predict outliers in an out-of-hours healthcare provision center (OOHC). In particular, our research is based upon the early identification of patients who have underlying conditions which will cause them to repeatedly require medical attention. OOHC act as an ad-hoc delivery of triage and treatment, where interactions occur without recourse to a full medical history of the patient in question. Medical histories, relating to patients contacting an OOHC, may reside in several distinct EHR systems in multiple hospitals or surgeries, which are unavailable to the OOHC in question. As such, although a local solution is optimal for this problem, it follows that the data under investigation is incomplete, heterogeneous, and comprised mostly of noisy textual notes compiled during routine OOHC activities. Through the use of Deep Learning methodologies, the aim of this paper is to provide the means to identify patient cases, upon initial contact, which are likely to relate to such outliers. To this end, we compare the performance of Long Short-Term Memory, Gated Recurrent Units, and combinations of both with Convolutional Neural Networks. A further aim of this paper is to elucidate the discovery of such outliers by examining the exact terms which provide a strong indication of positive and negative case entries. While free-text is the principal data extracted from EHRs for classification, EHRs also contain normalized features. Although the specific demographical features treated within our corpus are relatively limited in scope, we examine whether it is beneficial to include such features among the inputs to our neural network, or whether these features are more successfully exploited in conjunction with a different form of a classifier. In this section, we compare the performance of randomly generated regression trees and support vector machines and determine the extent to which our classification program can be improved upon by using either of these machine learning approaches in conjunction with the output of our Recurrent Neural Network application. The output of our neural network is also used to help determine the most significant lexemes present within the corpus for determining high-risk patients. By combining the confidence of our classification program in relation to lexemes within true positive and true negative cases, with an inverse document frequency of the lexemes related to these cases, we can determine what features act as the primary indicators of frequent-attender and non-frequent-attender cases, providing a human interpretable appreciation of how our program classifies cases.

Keywords: artificial neural networks, data-mining, machine learning, medical informatics

Procedia PDF Downloads 127
1973 A Kruskal Based Heuxistic for the Application of Spanning Tree

Authors: Anjan Naidu

Abstract:

In this paper we first discuss the minimum spanning tree, then we use the Kruskal algorithm to obtain minimum spanning tree. Based on Kruskal algorithm we propose Kruskal algorithm to apply an application to find minimum cost applying the concept of spanning tree.

Keywords: Minimum Spanning tree, algorithm, Heuxistic, application, classification of Sub 97K90

Procedia PDF Downloads 439
1972 Reproducibility of Dopamine Transporter Density Measured with I-123-N-ω-Fluoropropyl-2β-Carbomethoxy-3β-(4-Iodophenyl)Nortropane SPECT in Phantom Studies and Parkinson’s Disease Patients

Authors: Yasuyuki Takahashi, Genta Hoshi, Kyoko Saito

Abstract:

Objectives: The objective of this study was to evaluate the reproducibility of I-123-N-ω-fluoropropyl-2β-carbomethoxy-3β-(4- iodophenyl) nortropane (I-123 FP-CIT) SPECT by using specific binding ratio (SBR) in phantom studies and Parkinson’s Disease (PD) patients. Methods: We made striatum phantom originally and confirmed reproducibility. The phantom studies changed head position and accumulation of FP-CIT, each. And image processing confirms influence on SBR by 30 cases. 30 PD received a SPECT for 3 hours post injection of I-123 FP-CIT 167MBq. Results: SBR decreased in rotatory direction by the patient position by the phantom studies. And, SBR improved the influence after the attenuation and the scatter correction in the cases (y=0.99x+0.57 r2=0.83). However, Stage II recognized dispersion in SBR by low accumulation. Conclusion: Than the phantom studies that assumed the normal cases, the SPECT image after the attenuation and scatter correction had better reproducibility.

Keywords: 123I-FP-CIT, specific binding ratio, Parkinson’s disease

Procedia PDF Downloads 426
1971 Towards Learning Query Expansion

Authors: Ahlem Bouziri, Chiraz Latiri, Eric Gaussier

Abstract:

The steady growth in the size of textual document collections is a key progress-driver for modern information retrieval techniques whose effectiveness and efficiency are constantly challenged. Given a user query, the number of retrieved documents can be overwhelmingly large, hampering their efficient exploitation by the user. In addition, retaining only relevant documents in a query answer is of paramount importance for an effective meeting of the user needs. In this situation, the query expansion technique offers an interesting solution for obtaining a complete answer while preserving the quality of retained documents. This mainly relies on an accurate choice of the added terms to an initial query. Interestingly enough, query expansion takes advantage of large text volumes by extracting statistical information about index terms co-occurrences and using it to make user queries better fit the real information needs. In this respect, a promising track consists in the application of data mining methods to extract dependencies between terms, namely a generic basis of association rules between terms. The key feature of our approach is a better trade off between the size of the mining result and the conveyed knowledge. Thus, face to the huge number of derived association rules and in order to select the optimal combination of query terms from the generic basis, we propose to model the problem as a classification problem and solve it using a supervised learning algorithm such as SVM or k-means. For this purpose, we first generate a training set using a genetic algorithm based approach that explores the association rules space in order to find an optimal set of expansion terms, improving the MAP of the search results. The experiments were performed on SDA 95 collection, a data collection for information retrieval. It was found that the results were better in both terms of MAP and NDCG. The main observation is that the hybridization of text mining techniques and query expansion in an intelligent way allows us to incorporate the good features of all of them. As this is a preliminary attempt in this direction, there is a large scope for enhancing the proposed method.

Keywords: supervised leaning, classification, query expansion, association rules

Procedia PDF Downloads 319
1970 A Hybrid Digital Watermarking Scheme

Authors: Nazish Saleem Abbas, Muhammad Haris Jamil, Hamid Sharif

Abstract:

Digital watermarking is a technique that allows an individual to add and hide secret information, copyright notice, or other verification message inside a digital audio, video, or image. Today, with the advancement of technology, modern healthcare systems manage patients’ diagnostic information in a digital way in many countries. When transmitted between hospitals through the internet, the medical data becomes vulnerable to attacks and requires security and confidentiality. Digital watermarking techniques are used in order to ensure the authenticity, security and management of medical images and related information. This paper proposes a watermarking technique that embeds a watermark in medical images imperceptibly and securely. In this work, digital watermarking on medical images is carried out using the Least Significant Bit (LSB) with the Discrete Cosine Transform (DCT). The proposed methods of embedding and extraction of a watermark in a watermarked image are performed in the frequency domain using LSB by XOR operation. The quality of the watermarked medical image is measured by the Peak signal-to-noise ratio (PSNR). It was observed that the watermarked medical image obtained performing XOR operation between DCT and LSB survived compression attack having a PSNR up to 38.98.

Keywords: watermarking, image processing, DCT, LSB, PSNR

Procedia PDF Downloads 44
1969 Human Gait Recognition Using Moment with Fuzzy

Authors: Jyoti Bharti, Navneet Manjhi, M. K.Gupta, Bimi Jain

Abstract:

A reliable gait features are required to extract the gait sequences from an images. In this paper suggested a simple method for gait identification which is based on moments. Moment values are extracted on different number of frames of gray scale and silhouette images of CASIA database. These moment values are considered as feature values. Fuzzy logic and nearest neighbour classifier are used for classification. Both achieved higher recognition.

Keywords: gait, fuzzy logic, nearest neighbour, recognition rate, moments

Procedia PDF Downloads 754
1968 Failure Analysis of a Hydrocarbon Carrying/Piping System

Authors: Esteban Morales Murillo, Ephraim Mokgothu

Abstract:

This paper presents the findings of a study conducted to investigate the wall thinning in a piping system carrying a mix of hydrocarbons in a petrochemical plant. A detailed investigation including optical inspection and several characterisation techniques such as optical microscopy, SEM/EDX, and XRF/C-S analyses was conducted. The examinations revealed that the wall thinning in the piping system was a result of high-temperature H2/H2S corrosion caused by a susceptible material for this mechanism and operating parameters and effluent concentrations beyond the prescribed limits. The sulfide layers found to testify to the large amounts of H2S that led to material degradation. Deposit analysis revealed that it consisted primarily of carbon, oxygen, iron, chromium and sulfur. Metallographic examinations revealed that the attack initiated from the internal surface and that spheroidization of carbides did occur. The article discusses in detail the contribution failure factors on the Couper-Gorman H2/H2S curves to draw conclusions. Recommendations based on the above findings are also discussed.

Keywords: corrosion, Couper-Gorman, high-temperature corrosion, sulfidation, wall thinning, piping system

Procedia PDF Downloads 381
1967 A Blockchain-Based Protection Strategy against Social Network Phishing

Authors: Francesco Buccafurri, Celeste Romolo

Abstract:

Nowadays phishing is the most frequent starting point of cyber-attack vectors. Phishing is implemented both via email and social network messages. While a wide scientific literature exists which addresses the problem of contrasting email spam-phishing, no specific countermeasure has been so far proposed for phishing included into private messages of social network platforms. Unfortunately, the problem is severe. This paper proposes an approach against social network phishing, based on a non invasive collaborative information-sharing approach which leverages blockchain. The detection method works by filtering candidate messages, by distilling them by means of a distance-preserving hash function, and by publishing hashes over a public blockchain through a trusted smart contract (thus avoiding denial of service attacks). Phishing detection exploits social information embedded into social network profiles to identify similar messages belonging to disjoint contexts. The main contribution of the paper is to introduce a new approach to contrasting the problem of social network phishing, which, despite its severity, received little attention by both research and industry.

Keywords: phishing, social networks, information sharing, blockchain

Procedia PDF Downloads 325
1966 Implementation of Synthesis and Quality Control Procedures of ¹⁸F-Fluoromisonidazole Radiopharmaceutical

Authors: Natalia C. E. S. Nascimento, Mercia L. Oliveira, Fernando R. A. Lima, Leonardo T. C. do Nascimento, Marina B. Silveira, Brigida G. A. Schirmer, Andrea V. Ferreira, Carlos Malamut, Juliana B. da Silva

Abstract:

Tissue hypoxia is a common characteristic of solid tumors leading to decreased sensitivity to radiotherapy and chemotherapy. In the clinical context, tumor hypoxia assessment employing the positron emission tomography (PET) tracer ¹⁸F-fluoromisonidazole ([¹⁸F]FMISO) is helpful for physicians for planning and therapy adjusting. The aim of this work was to implement the synthesis of 18F-FMISO in a TRACERlab® MXFDG module and also to establish the quality control procedure. [¹⁸F]FMISO was synthesized at Centro de Desenvolvimento da Tecnologia Nuclear (CDTN/CNEN/Brazil) using an automated synthesizer (TRACERlab® MXFDG, GE) adapted for the production of [¹⁸F]FMISO. The FMISO chemical standard was purchased from ABX. 18O- enriched water was acquired from Center of Molecular Research. Reagent kits containing eluent solution, acetonitrile, ethanol, 2.0 M HCl solution, buffer solution, water for injections and [¹⁸F]FMISO precursor (dissolved in 2 ml acetonitrile) were purchased from ABX. The [¹⁸F]FMISO samples were purified by Solid Phase Extraction method. The quality requirements of [¹⁸F]FMISO are established in the European Pharmacopeia. According to that reference, quality control of [¹⁸F]FMISO should include appearance, pH, radionuclidic identity and purity, radiochemical identity and purity, chemical purity, residual solvents, bacterial endotoxins, and sterility. The duration of the synthesis process was 53 min, with radiochemical yield of (37.00 ± 0.01) % and the specific activity was more than 70 GBq/µmol. The syntheses were reproducible and showed satisfactory results. In relation to the quality control analysis, the samples were clear and colorless at pH 6.0. The spectrum emission, measured by using a High-Purity Germanium Detector (HPGe), presented a single peak at 511 keV and the half-life, determined by the decay method in an activimeter, was (111.0 ± 0.5) min, indicating no presence of radioactive contaminants, besides the desirable radionuclide (¹⁸F). The samples showed concentration of tetrabutylammonium (TBA) < 50μg/mL, assessed by visual comparison to TBA standard applied in the same thin layer chromatographic plate. Radiochemical purity was determined by high performance liquid chromatography (HPLC) and the results were 100%. Regarding the residual solvents tested, ethanol and acetonitrile presented concentration lower than 10% and 0.04%, respectively. Healthy female mice were injected via lateral tail vein with [¹⁸F]FMISO, microPET imaging studies (15 min) were performed after 2 h post injection (p.i), and the biodistribution was analyzed in five-time points (30, 60, 90, 120 and 180 min) after injection. Subsequently, organs/tissues were assayed for radioactivity with a gamma counter. All parameters of quality control test were in agreement to quality criteria confirming that [¹⁸F]FMISO was suitable for use in non-clinical and clinical trials, following the legal requirements for the production of new radiopharmaceuticals in Brazil.

Keywords: automatic radiosynthesis, hypoxic tumors, pharmacopeia, positron emitters, quality requirements

Procedia PDF Downloads 191
1965 Hybrid Anomaly Detection Using Decision Tree and Support Vector Machine

Authors: Elham Serkani, Hossein Gharaee Garakani, Naser Mohammadzadeh, Elaheh Vaezpour

Abstract:

Intrusion detection systems (IDS) are the main components of network security. These systems analyze the network events for intrusion detection. The design of an IDS is through the training of normal traffic data or attack. The methods of machine learning are the best ways to design IDSs. In the method presented in this article, the pruning algorithm of C5.0 decision tree is being used to reduce the features of traffic data used and training IDS by the least square vector algorithm (LS-SVM). Then, the remaining features are arranged according to the predictor importance criterion. The least important features are eliminated in the order. The remaining features of this stage, which have created the highest level of accuracy in LS-SVM, are selected as the final features. The features obtained, compared to other similar articles which have examined the selected features in the least squared support vector machine model, are better in the accuracy, true positive rate, and false positive. The results are tested by the UNSW-NB15 dataset.

Keywords: decision tree, feature selection, intrusion detection system, support vector machine

Procedia PDF Downloads 259
1964 Adolescent-Parent Relationship as the Most Important Factor in Preventing Mood Disorders in Adolescents: An Application of Artificial Intelligence to Social Studies

Authors: Elżbieta Turska

Abstract:

Introduction: One of the most difficult times in a person’s life is adolescence. The experiences in this period may shape the future life of this person to a large extent. This is the reason why many young people experience sadness, dejection, hopelessness, sense of worthlessness, as well as losing interest in various activities and social relationships, all of which are often classified as mood disorders. As many as 15-40% adolescents experience depressed moods and for most of them they resolve and are not carried into adulthood. However, (5-6%) of those affected by mood disorders develop the depressive syndrome and as many as (1-3%) develop full-blown clinical depression. Materials: A large questionnaire was given to 2508 students, aged 13–16 years old, and one of its parts was the Burns checklist, i.e. the standard test for identifying depressed mood. The questionnaire asked about many aspects of the student’s life, it included a total of 53 questions, most of which had subquestions. It is important to note that the data suffered from many problems, the most important of which were missing data and collinearity. Aim: In order to identify the correlates of mood disorders we built predictive models which were then trained and validated. Our aim was not to be able to predict which students suffer from mood disorders but rather to explore the factors influencing mood disorders. Methods: The problems with data described above practically excluded using all classical statistical methods. For this reason, we attempted to use the following Artificial Intelligence (AI) methods: classification trees with surrogate variables, random forests and xgboost. All analyses were carried out with the use of the mlr package for the R programming language. Resuts: The predictive model built by classification trees algorithm outperformed the other algorithms by a large margin. As a result, we were able to rank the variables (questions and subquestions from the questionnaire) from the most to least influential as far as protection against mood disorder is concerned. Thirteen out of twenty most important variables reflect the relationships with parents. This seems to be a really significant result both from the cognitive point of view and also from the practical point of view, i.e. as far as interventions to correct mood disorders are concerned.

Keywords: mood disorders, adolescents, family, artificial intelligence

Procedia PDF Downloads 99
1963 Normally Closed Thermoplastic Microfluidic Valves with Microstructured Valve Seats: A Strategy to Avoid Permanently Bonded Valves during Channel Sealing

Authors: Kebin Li, Keith Morton, Matthew Shiu, Karine Turcotte, Luke Lukic, Teodor Veres

Abstract:

We present a normally closed thermoplastic microfluidic valve design that uses microstructured valve seats to locally prevent the membrane from bonding to the valve seat during microfluidic channel sealing. The microstructured valve seat reduces the adhesion force between the contact surfaces of the valve seat and the membrane locally, allowing valve open and close operations while simultaneously providing a permanent and robust bond elsewhere to cover and seal the microfluidic channel network. Dynamic valve operation including opening and closing times can be tuned by changing the valve seat diameter as well as the density of the microstructures on the valve seats. The influence of the microstructured valve seat on the general flow behavior through the microfluidic devices was also studied. A design window for the fabrication of valve structure is identified and discussed to minimize the fabrication complexity.

Keywords: hot-embossing, injection molding, microfabrication, microfluidics, microvalves, thermoplastic elastomer

Procedia PDF Downloads 289
1962 Improvement of Thermal Stability in Ethylene Methyl Acrylate Composites for Gasket Application

Authors: Pemika Ketsuwan, Pitt Supaphol, Manit Nithitanakul

Abstract:

A typical used of ethylene methyl acrylate (EMA) gasket is in the manufacture of optical lens, and often, they are deteriorated rapidly due to high temperature during the process. The objective of this project is to improve the thermal stability of the EMA copolymer gasket by preparing EMA with cellulose and silica composites. Hydroxy propyl methyl cellulose (HPMC) and Carboxy methyl cellulose (CMC) were used in preparing of EMA/cellulose composites and fumed silica (SiO2) was used in preparing EMA/silica composites with different amounts of filler (3, 5, 7, 10, 15 wt.%), using a twin screw extruder at 160 °C and the test specimens were prepared by the injection molding machine. The morphology and dispersion of fillers in the EMA matrix were investigated by field emission scanning electron microscopy (FESEM). The thermal stability of the composite was determined by thermal gravimetric analysis (TGA), and differential scanning calorimeter (DSC). Mechanical properties were evaluated by tensile testing. The developed composites were found to enhance thermal and mechanical properties when compared to that of the EMA copolymer alone.

Keywords: ethylene methyl acrylate, HPMC, Silica, Thermal stability

Procedia PDF Downloads 117
1961 Detecting Covid-19 Fake News Using Deep Learning Technique

Authors: AnjalI A. Prasad

Abstract:

Nowadays, social media played an important role in spreading misinformation or fake news. This study analyzes the fake news related to the COVID-19 pandemic spread in social media. This paper aims at evaluating and comparing different approaches that are used to mitigate this issue, including popular deep learning approaches, such as CNN, RNN, LSTM, and BERT algorithm for classification. To evaluate models’ performance, we used accuracy, precision, recall, and F1-score as the evaluation metrics. And finally, compare which algorithm shows better result among the four algorithms.

Keywords: BERT, CNN, LSTM, RNN

Procedia PDF Downloads 201