Search results for: data driven diagnosis
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 26852

Search results for: data driven diagnosis

25202 Big Data Analytics and Data Security in the Cloud via Fully Homomorphic Encyption Scheme

Authors: Victor Onomza Waziri, John K. Alhassan, Idris Ismaila, Noel Dogonyara

Abstract:

This paper describes the problem of building secure computational services for encrypted information in the Cloud. Computing without decrypting the encrypted data; therefore, it meets the yearning of computational encryption algorithmic aspiration model that could enhance the security of big data for privacy or confidentiality, availability and integrity of the data and user’s security. The cryptographic model applied for the computational process of the encrypted data is the Fully Homomorphic Encryption Scheme. We contribute a theoretical presentations in a high-level computational processes that are based on number theory that is derivable from abstract algebra which can easily be integrated and leveraged in the Cloud computing interface with detail theoretic mathematical concepts to the fully homomorphic encryption models. This contribution enhances the full implementation of big data analytics based on cryptographic security algorithm.

Keywords: big data analytics, security, privacy, bootstrapping, Fully Homomorphic Encryption Scheme

Procedia PDF Downloads 472
25201 Efficacy and User Satisfaction on the Rama-Chest Cryo Arm Innovation for Bronchoscopic Cryotherapy

Authors: Chariya Laohavich

Abstract:

At the current, the trends in the lung disease at a university hospital are the treat and diagnosis by bronchoscopy. Bronchoscopic cryotherapy is a long time procedure 1-4 hours. The cryo probe is sensitive and easy to be damaged and expensive. We have this study management for protection the cryo probe, user satisfaction and qualities work. This study conducted in 4 stages: stage 1 for a survey of problems and assessment of user’s needs; stage 2 for designing and developing the Rama-chest cryo arm for a bronchoscopy process; stage 3 for test-implementing the Rama-chest cryo arm in real situations, studying its problems and obstacles, and evaluating the user satisfaction; and stage 4 for an overall assessment and improvement. The sample used in this study consisted of a total of 15 Ramathipbodi Hospital’s Bronchoscopist and bronchoscopist’s nurse who had used the Rama-chest cryo arm for bronchoscopic cryotherapy from January to June 2016. Objective: To study efficacy and user satisfaction on the Rama-chest cryo arm innovation for bronchoscopic cryotherapy. Data were collected using a Rama-chest cryo arm satisfaction assessment form and analysed based on mean and standard deviation. Result is the Rama-chest cryo arm was an innovation that accommodated during bronchoscopic cryotherapy. The subjects rated this the cryo arm as being most satisfactory (M = 4.86 ± , SD 0.48. Therefore we have developed a cryo arm that uses local material, practical and economic. Our innovation is not only flexible and sustainable development but also lean and seamless. This produced device can be used as effectively as the imported one, and thus can be eventually substituted.

Keywords: efficacy, satisfaction, Rama-chest cryo arm, innovation, bronchoscopic cryotherapy

Procedia PDF Downloads 237
25200 Improving the Management of Delirium of Surgical Inpatients

Authors: Shammael Selorfia

Abstract:

The Quality improvement project aimed to improve junior doctors and nurses’ knowledge and confidence in diagnosing and managing delirium on inpatient surgical wards in a tertiary hospital. The study aimed to develop a standardised assessment and management checklist for all staff working with patients who were presenting with signs of delirium. The aim of the study was to increase confidence of staff at dealing with delirium and improve the quality of referrals that were being sent to the Mental Health Liaison team over a 6-month period. A significant proportion of time was being spent by the Mental Health Liaison triage nurses on referrals for delirium. Data showed 28% of all delirium referrals from surgical teams were being closed at triage reflecting a poor standard of quality of those referrals. A qualitative survey of junior doctors in 6 surgical specialties in a UK tertiary hospital was conducted. These specialties include general surgery, vascular, plastic, urology, neurosurgery, and orthopaedics. The standardised checklist was distributed to all surgical wards. A comparison was made between the Mental health team caseload of delirium before intervention was compared and after. A Qualitative survey at end of 3-month cycle and compare overall caseload on Mental Health Liaison team to pre-QIP data with aim to improve quality of referrals and reduce workload on Mental Health Liaison team. At the end of the project cycle, we demonstrated an improvement in the quality of referrals with a decrease in the percentage of referrals being closed at triage by 8%. Our surveys also indicated an increase in the knowledge of official trust delirium guidelines and confidence at managing the patients. This project highlights that a new approach to delirium using multi-component interventions is needed, where the diagnosis of delirium is shared amongst medical and nursing staff, and everyone plays role in management. The key is improving awareness of delirium and encouraging the use of recognized diagnostic tools and official guidelines. Recommendations were made to the trust on how to implement a long-lasting change.

Keywords: delirium, surgery, quality, improvement

Procedia PDF Downloads 72
25199 Hidden Markov Model for Financial Limit Order Book and Its Application to Algorithmic Trading Strategy

Authors: Sriram Kashyap Prasad, Ionut Florescu

Abstract:

This study models the intraday asset prices as driven by Markov process. This work identifies the latent states of the Hidden Markov model, using limit order book data (trades and quotes) to continuously estimate the states throughout the day. This work builds a trading strategy using estimated states to generate signals. The strategy utilizes current state to recalibrate buy/ sell levels and the transition between states to trigger stop-loss when adverse price movements occur. The proposed trading strategy is tested on the Stevens High Frequency Trading (SHIFT) platform. SHIFT is a highly realistic market simulator with functionalities for creating an artificial market simulation by deploying agents, trading strategies, distributing initial wealth, etc. In the implementation several assets on the NASDAQ exchange are used for testing. In comparison to a strategy with static buy/ sell levels, this study shows that the number of limit orders that get matched and executed can be increased. Executing limit orders earns rebates on NASDAQ. The system can capture jumps in the limit order book prices, provide dynamic buy/sell levels and trigger stop loss signals to improve the PnL (Profit and Loss) performance of the strategy.

Keywords: algorithmic trading, Hidden Markov model, high frequency trading, limit order book learning

Procedia PDF Downloads 145
25198 An Approximation of Daily Rainfall by Using a Pixel Value Data Approach

Authors: Sarisa Pinkham, Kanyarat Bussaban

Abstract:

The research aims to approximate the amount of daily rainfall by using a pixel value data approach. The daily rainfall maps from the Thailand Meteorological Department in period of time from January to December 2013 were the data used in this study. The results showed that this approach can approximate the amount of daily rainfall with RMSE=3.343.

Keywords: daily rainfall, image processing, approximation, pixel value data

Procedia PDF Downloads 383
25197 The Effect of Measurement Distribution on System Identification and Detection of Behavior of Nonlinearities of Data

Authors: Mohammad Javad Mollakazemi, Farhad Asadi, Aref Ghafouri

Abstract:

In this paper, we considered and applied parametric modeling for some experimental data of dynamical system. In this study, we investigated the different distribution of output measurement from some dynamical systems. Also, with variance processing in experimental data we obtained the region of nonlinearity in experimental data and then identification of output section is applied in different situation and data distribution. Finally, the effect of the spanning the measurement such as variance to identification and limitation of this approach is explained.

Keywords: Gaussian process, nonlinearity distribution, particle filter, system identification

Procedia PDF Downloads 503
25196 Building a Scalable Telemetry Based Multiclass Predictive Maintenance Model in R

Authors: Jaya Mathew

Abstract:

Many organizations are faced with the challenge of how to analyze and build Machine Learning models using their sensitive telemetry data. In this paper, we discuss how users can leverage the power of R without having to move their big data around as well as a cloud based solution for organizations willing to host their data in the cloud. By using ScaleR technology to benefit from parallelization and remote computing or R Services on premise or in the cloud, users can leverage the power of R at scale without having to move their data around.

Keywords: predictive maintenance, machine learning, big data, cloud based, on premise solution, R

Procedia PDF Downloads 370
25195 Trusting the Big Data Analytics Process from the Perspective of Different Stakeholders

Authors: Sven Gehrke, Johannes Ruhland

Abstract:

Data is the oil of our time, without them progress would come to a hold [1]. On the other hand, the mistrust of data mining is increasing [2]. The paper at hand shows different aspects of the concept of trust and describes the information asymmetry of the typical stakeholders of a data mining project using the CRISP-DM phase model. Based on the identified influencing factors in relation to trust, problematic aspects of the current approach are verified using various interviews with the stakeholders. The results of the interviews confirm the theoretically identified weak points of the phase model with regard to trust and show potential research areas.

Keywords: trust, data mining, CRISP DM, stakeholder management

Procedia PDF Downloads 90
25194 Wireless Transmission of Big Data Using Novel Secure Algorithm

Authors: K. Thiagarajan, K. Saranya, A. Veeraiah, B. Sudha

Abstract:

This paper presents a novel algorithm for secure, reliable and flexible transmission of big data in two hop wireless networks using cooperative jamming scheme. Two hop wireless networks consist of source, relay and destination nodes. Big data has to transmit from source to relay and from relay to destination by deploying security in physical layer. Cooperative jamming scheme determines transmission of big data in more secure manner by protecting it from eavesdroppers and malicious nodes of unknown location. The novel algorithm that ensures secure and energy balance transmission of big data, includes selection of data transmitting region, segmenting the selected region, determining probability ratio for each node (capture node, non-capture and eavesdropper node) in every segment, evaluating the probability using binary based evaluation. If it is secure transmission resume with the two- hop transmission of big data, otherwise prevent the attackers by cooperative jamming scheme and transmit the data in two-hop transmission.

Keywords: big data, two-hop transmission, physical layer wireless security, cooperative jamming, energy balance

Procedia PDF Downloads 481
25193 Weak Solutions Of Stochastic Fractional Differential Equations

Authors: Lev Idels, Arcady Ponosov

Abstract:

Stochastic fractional differential equations have recently attracted considerable attention, as they have been used to model real-world processes, which are subject to natural memory effects and measurement uncertainties. Compared to conventional hereditary differential equations, one of the advantages of fractional differential equations is related to more realistic geometric properties of their trajectories that do not intersect in the phase space. In this report, a Peano-like existence theorem for nonlinear stochastic fractional differential equations is proven under very general hypotheses. Several specific classes of equations are checked to satisfy these hypotheses, including delay equations driven by the fractional Brownian motion, stochastic fractional neutral equations and many others.

Keywords: delay equations, operator methods, stochastic noise, weak solutions

Procedia PDF Downloads 197
25192 Internet Economy: Enhancing Information Communication Technology Adaptation, Service Delivery, Content and Digital Skills for Small Holder Farmers in Uganda

Authors: Baker Ssekitto, Ambrose Mbogo

Abstract:

The study reveals that indeed agriculture employs over 70% of Uganda’s population, of which majority are youth and women. The study further reveals that over 70% of the farmers are smallholder farmers based in rural areas, whose operations are greatly affected by; climate change, weak digital skills, limited access to productivity knowledge along value chains, limited access to quality farm inputs, weak logistics systems, limited access to quality extension services, weak business intelligence, limited access to quality markets among others. It finds that the emerging 4th industrial revolution powered by artificial intelligence, 5G and data science will provide possibilities of addressing some of these challenges. Furthermore, the study finds that despite rapid development of ICT4Agric Innovation, their uptake is constrained by a number of factors including; limited awareness of these innovations, low internet and smart phone penetration especially in rural areas, lack of appropriate digital skills, inappropriate programmes implementation models which are project and donor driven, limited articulation of value addition to various stakeholders among others. Majority of farmers and other value chain actors lacked knowledge and skills to harness the power of ICTs, especially their application of ICTs in monitoring and evaluation on quality of service in the extension system and farm level processes.

Keywords: artificial intelligence, productivity, ICT4agriculture, value chain, logistics

Procedia PDF Downloads 74
25191 Hunger and Health: The Acceptability and Development of Health Coaching in the Food Pantry Environment

Authors: Kelsey Fortin, Susan Harvey

Abstract:

The intersection between hunger and health outcomes is beginning to gain traction among the research community. With new interventions focusing on collaborations between the medical and social service sectors, this study aimed to understand the acceptability and approach of a health coaching intervention within a county-wide Midwest food pantry. Through formative research, the study used mixed methods to review secondary data and conduct surveys and semi-structured interviews with food pantry clients (n=30), staff (n=7), and volunteers (n=10). Supplemental secondary data collected and provided by pantry staff were reviewed to understand the broader pantry context of clientele health and health behaviors, annual food donations, and current pantry programming. Results from secondary data showed that the broader pantry client population reported high rates of chronic disease, low consumption of fruits and vegetables, and poor self-reported health, while annual donation data showed increases in produce availability on pantry shelves. This disconnect between produce availability, client health status, and behaviors was supported in the current study, with pantry staff and volunteers reporting lack of knowledge in produce selection and preparation being amongst the most common client inquiries and barriers to healthy food selection. Additional supports to secondary data came from pantry clients in the current study through self-reported high rates of both individual (60%, n=18) and household (43%, n=13 ) disease diagnosis, low consumption of fruits and vegetables averaging zero to one servings of vegetables (67%, n=20) and fruits (47%, n=14) per day, and low levels of physical activity averaging zero to 120 minutes per week (67%, n=20). Further, pantry clients provided health coaching programmatic recommendations through interviews with feedback such as non-judgmental coaching, accountability measures, and providing participant incentives as considerations for future program design and approach. Volunteers and staff reported the need for client education in food preparation, basic nutrition and physical activity, and the need for additional health expertise to educate and respond to diet related nutrition recommendations. All three stakeholder groups supported hosting a health coach within the pantry to focused on nutrition, physical activity, and health programming, with one client stating, 'I am hoping it really works out [the health coaching program]. I think it would be great for something like this to be offered for someone that isn’t knowledgeable like me.' In conclusion, high rates of chronic disease, partnered with low food, nutrition, and physical activity literacy among pantry clients, demonstrates the need to address health behaviors. With all three stakeholder groups showing acceptability of a health coaching program, partnered with existing literature showing health coaching success as a behavior change intervention, further research should be conducted to pilot the design and implementation of such a program in the pantry setting.

Keywords: food insecurity, formative research, food pantries, health coaching, hunger and health

Procedia PDF Downloads 127
25190 One Step Further: Pull-Process-Push Data Processing

Authors: Romeo Botes, Imelda Smit

Abstract:

In today’s modern age of technology vast amounts of data needs to be processed in real-time to keep users satisfied. This data comes from various sources and in many formats, including electronic and mobile devices such as GPRS modems and GPS devices. They make use of different protocols including TCP, UDP, and HTTP/s for data communication to web servers and eventually to users. The data obtained from these devices may provide valuable information to users, but are mostly in an unreadable format which needs to be processed to provide information and business intelligence. This data is not always current, it is mostly historical data. The data is not subject to implementation of consistency and redundancy measures as most other data usually is. Most important to the users is that the data are to be pre-processed in a readable format when it is entered into the database. To accomplish this, programmers build processing programs and scripts to decode and process the information stored in databases. Programmers make use of various techniques in such programs to accomplish this, but sometimes neglect the effect some of these techniques may have on database performance. One of the techniques generally used,is to pull data from the database server, process it and push it back to the database server in one single step. Since the processing of the data usually takes some time, it keeps the database busy and locked for the period of time that the processing takes place. Because of this, it decreases the overall performance of the database server and therefore the system’s performance. This paper follows on a paper discussing the performance increase that may be achieved by utilizing array lists along with a pull-process-push data processing technique split in three steps. The purpose of this paper is to expand the number of clients when comparing the two techniques to establish the impact it may have on performance of the CPU storage and processing time.

Keywords: performance measures, algorithm techniques, data processing, push data, process data, array list

Procedia PDF Downloads 237
25189 Extreme Temperature Forecast in Mbonge, Cameroon Through Return Level Analysis of the Generalized Extreme Value (GEV) Distribution

Authors: Nkongho Ayuketang Arreyndip, Ebobenow Joseph

Abstract:

In this paper, temperature extremes are forecast by employing the block maxima method of the generalized extreme value (GEV) distribution to analyse temperature data from the Cameroon Development Corporation (CDC). By considering two sets of data (raw data and simulated data) and two (stationary and non-stationary) models of the GEV distribution, return levels analysis is carried out and it was found that in the stationary model, the return values are constant over time with the raw data, while in the simulated data the return values show an increasing trend with an upper bound. In the non-stationary model, the return levels of both the raw data and simulated data show an increasing trend with an upper bound. This clearly shows that although temperatures in the tropics show a sign of increase in the future, there is a maximum temperature at which there is no exceedance. The results of this paper are very vital in agricultural and environmental research.

Keywords: forecasting, generalized extreme value (GEV), meteorology, return level

Procedia PDF Downloads 468
25188 Numerical Modelling and Experiment of a Composite Single-Lap Joint Reinforced by Multifunctional Thermoplastic Composite Fastener

Authors: Wenhao Li, Shijun Guo

Abstract:

Carbon fibre reinforced composites are progressively replacing metal structures in modern civil aircraft. This is because composite materials have large potential of weight saving compared with metal. However, the achievement to date of weight saving in composite structure is far less than the theoretical potential due to many uncertainties in structural integrity and safety concern. Unlike the conventional metallic structure, composite components are bonded together along the joints where structural integrity is a major concern. To ensure the safety, metal fasteners are used to reinforce the composite bonded joints. One of the solutions for a significant weight saving of composite structure is to develop an effective technology of on-board Structural Health Monitoring (SHM) System. By monitoring the real-life stress status of composite structures during service, the safety margin set in the structure design can be reduced with confidence. It provides a means of safeguard to minimize the need for programmed inspections and allow for maintenance to be need-driven, rather than usage-driven. The aim of this paper is to develop smart composite joint. The key technology is a multifunctional thermoplastic composite fastener (MTCF). The MTCF will replace some of the existing metallic fasteners in the most concerned locations distributed over the aircraft composite structures to reinforce the joints and form an on-board SHM network system. Each of the MTCFs will work as a unit of the AU and AE technology. The proposed MTCF technology has been patented and developed by Prof. Guo in Cranfield University, UK in the past a few years. The manufactured MTCF has been successfully employed in the composite SLJ (Single-Lap Joint). In terms of the structure integrity, the hybrid SLJ reinforced by MTCF achieves 19.1% improvement in the ultimate failure strength in comparison to the bonded SLJ. By increasing the diameter or rearranging the lay-up sequence of MTCF, the hybrid SLJ reinforced by MTCF is able to achieve the equivalent ultimate strength as that reinforced by titanium fastener. The predicted ultimate strength in simulation is in good agreement with the test results. In terms of the structural health monitoring, a signal from the MTCF was measured well before the load of mechanical failure. This signal provides a warning of initial crack in the joint which could not be detected by the strain gauge until the final failure.

Keywords: composite single-lap joint, crack propagation, multifunctional composite fastener, structural health monitoring

Procedia PDF Downloads 158
25187 Epigastric Pain in Emergency Room: Median Arcuate Ligament Syndrome

Authors: Demet Devrimsel Dogan, Ecem Deniz Kirkpantur, Muharrem Dogan, Ahmet Aykut, Ebru Unal Akoglu, Ozge Ecmel Onur

Abstract:

Introduction: Median Arcuate Ligament Syndrome (MALS) is a rare cause of chronic abdominal pain due to external compression of the celiac trunk by a fibrous arch that unites diaphragmatic crura on each side of the aortic hiatus. While 10-24% of the population may suffer from compression of celiac trunk, it rarely causes patients to develop symptoms. The typical clinical triad of symptoms includes postprandial epigastric pain, weight loss and vomiting. The diagnosis can be made using thin section multi-detector computed tomography (CT) scans which delineate the ligament and the compressed vessel. The treatment of MALS is aimed at relieving the compression of the celiac artery to restore adequate blood flow through the vessel and neurolysis to address chronic pain. Case: A 68-year-old male presented to our clinic with acute postprandial epigastric pain. This was patients’ first attack, and the pain was the worst pain of his life. The patient did not have any other symptoms like nausea, vomiting, chest pain or dyspnea. In his medical history, the patient has had an ischemic cerebrovascular stroke 5 years ago which he recovered with no sequel, and he was using 75 mg clopidogrel and 100 mg acetylsalicylic acid. He was not using any other medication and did not have a story of cardiovascular disease. His vital signs were stable (BP:113/72 mmHg, Spo2:97, temperature:36.3°C, HR:90/bpm). In his electrocardiogram, there was ST depression in leads II, III and AVF. In his physical examination, there was only epigastric tenderness, other system examinations were normal. Physical examination through his upper gastrointestinal system showed no bleeding. His laboratory results were as follows: creatinine:1.26 mg/dL, AST:42 U/L, ALT:17 U/L, amylase:78 U/L, lipase:26 U/L, troponin:10.3 pg/ml, WBC:28.9 K/uL, Hgb:12.7 gr/dL, Plt:335 K/uL. His serial high-sensitive troponin levels were also within normal limits, his echocardiography showed no segmental wall motion abnormalities, an acute myocardial infarction was excluded. In his abdominal ultrasound, no pathology was founded. Contrast-enhanced abdominal CT and CT angiography reported ‘thickened diaphragmatic cruras are compressing and stenosing truncus celiacus superior, this is likely compatible with MALS’. The patient was consulted to general surgery, and they admitted the patient for laparoscopic ligament release. Results: MALS is a syndrome that causes postprandial pain, nausea and vomiting as its most common symptoms. Affected patients are normally young, slim women between the ages of 30 and 50 who have undergone extensive examinations to find the source of their symptoms. To diagnose MALS, other underlying pathologies should initially be excluded. The gold standard is aortic angiography. Although diagnosis and treatment of MALS are unclear, symptom resolution has been achieved with multiple surgical modalities, including open, laparoscopic or robotic ligament release as well as celiac ganglionectomy, which often requires celiac artery revascularisation.

Keywords: differential diagnosis, epigastric pain, median arcuate ligament syndrome, celiac trunk

Procedia PDF Downloads 250
25186 Impact of Stack Caches: Locality Awareness and Cost Effectiveness

Authors: Abdulrahman K. Alshegaifi, Chun-Hsi Huang

Abstract:

Treating data based on its location in memory has received much attention in recent years due to its different properties, which offer important aspects for cache utilization. Stack data and non-stack data may interfere with each other’s locality in the data cache. One of the important aspects of stack data is that it has high spatial and temporal locality. In this work, we simulate non-unified cache design that split data cache into stack and non-stack caches in order to maintain stack data and non-stack data separate in different caches. We observe that the overall hit rate of non-unified cache design is sensitive to the size of non-stack cache. Then, we investigate the appropriate size and associativity for stack cache to achieve high hit ratio especially when over 99% of accesses are directed to stack cache. The result shows that on average more than 99% of stack cache accuracy is achieved by using 2KB of capacity and 1-way associativity. Further, we analyze the improvement in hit rate when adding small, fixed, size of stack cache at level1 to unified cache architecture. The result shows that the overall hit rate of unified cache design with adding 1KB of stack cache is improved by approximately, on average, 3.9% for Rijndael benchmark. The stack cache is simulated by using SimpleScalar toolset.

Keywords: hit rate, locality of program, stack cache, stack data

Procedia PDF Downloads 296
25185 Whitnall’s Sling Will Be an Alternative Method for the Surgical Correction of Poor Function Ptosis

Authors: Titap Yazicioglu

Abstract:

To examine the results of two different surgery in patients with severe ptosis and poor levator function. The records of 10 bilateral congenital ptosis patients, who underwent Whitnall’s sling surgery on one eyelid and frontalis sling surgery on the other were analyzed retrospectively. All patients had severe congenital ptosis(>4mm) and poor levator function (LF<4mm). Data regarding eyelid position, cosmetic outcomes, and postoperative complications were evaluated. All patients were assessed for a minimum of one year with regard to the amount of correction, residual ptosis and lagophthalmos. The study consisted of 10 patients, with an average age of 9.2±2.4 years. Preoperative diagnosis for all patients was noted as, the average LF was 3.4±0.51mm, vertical lid height was 3.5±0.52 mm and margin reflex distance-1 (MRD-1) was 0.4±0.51mm. The mean vertical lid height was measured as 7.1±0.73 mm in the frontalis sling group and 7.2±0.63 mm in the Whitnall’s sling group at the postoperative 1st month control. However, in patients with Whitnall’s sling, revision was performed with frontalis sling surgery due to failure in vertical lid height in the late postoperative period, and an average of 7.5±0.52 mm was achieved. Satisfactory results were obtained in all patients. Although postoperative lagophthalmitis developed in the frontalis sling group, none of them developed exposure keratitis. Granuloma was observed as sling infection in 2(20%) of the patients. Although Whitnall’s sling technique provides a natural look appearance without interfering with the functional result, we did not find it as successful as frontalis sling surgery in severe ptosis.

Keywords: congenital ptosis, frontalis suspension, Whitnall ligament, complications

Procedia PDF Downloads 100
25184 An Insight into Early Stage Detection of Malignant Tumor by Microwave Imaging

Authors: Muhammad Hassan Khalil, Xu Jiadong

Abstract:

Detection of malignant tumor inside the breast of women is a challenging field for the researchers. MWI (Microwave imaging) for breast cancer diagnosis has been of interest for last two decades, newly it suggested for finding cancerous tissues of women breast. A simple and basic idea of the mathematical modeling is used throughout this paper for imaging of malignant tumor. In this paper, the authors explained inverse scattering method in the microwave imaging and also present some simulation results.

Keywords: breast cancer detection, microwave imaging, tomography, tumor

Procedia PDF Downloads 404
25183 A Retrospective Review of HIV-Infected Pregnant Females with Respect to Gestational Age and Mode of Delivery: Trends over a Decade

Authors: Qurat-ul-Ain, Humaira Mehmood

Abstract:

Background: HIV infection (a global pandemic) in pregnant women has turn out to be an emerging aspect of public health because of its role in the spread of HIV infection, predominantly among children. Aim: The aim was to analyze the trends of diagnosis with respect to gestational age and an overview of the mode of delivery over ten years. Methods: A retrospective data collection from clinical records of diagnosed HIV infected pregnant females attended at HIV antenatal clinic (special clinic), at Pakistan Institute of Medical Sciences, Islamabad, for various complaints during the period of 10 years from February 2007 to December 2016 was done. Results: A total of 113 pregnancies were reported with HIV infection in 10 years. Cases diagnosed at the 1st trimester (1-12 weeks) of pregnancy were (50.4%, 57/113), at the 2nd trimester (13-26 weeks) were (24.8%, 28/113), at the 3rd trimester (27-40+ weeks) were (24.7%, 28/113). Most deliveries were by caesarean section (53.1%, 60/113), elective caesarean sections were (58.3%, 35/60) and emergency caesarean sections were (41.6%,25/60). Vaginal deliveries were (26.5%, 30/113). Reported miscarriages were (17.7%, 20/113). Conclusion: At 1st trimester, 50% of the females were diagnosed with HIV infection, and 50% remained undiagnosed at their 1st trimester. Routine antenatal HIV testing throughout the country is vastly needed for timely diagnoses and prompt treatment(antiretroviral therapy), to suppress the virus, to reduce the risk of spread of HIV infection, to plan elective caesarean section delivery and to prevent mother-to-child transmission.

Keywords: gestational age, HIV infection, mode of delivery, pregnancy

Procedia PDF Downloads 115
25182 Rare Diagnosis in Emergency Room: Moyamoya Disease

Authors: Ecem Deniz Kırkpantur, Ozge Ecmel Onur, Tuba Cimilli Ozturk, Ebru Unal Akoglu

Abstract:

Moyamoya disease is a unique chronic progressive cerebrovascular disease characterized by bilateral stenosis or occlusion of the arteries around the circle of Willis with prominent arterial collateral circulation. The occurrence of Moyamoya disease is related to immune, genetic and other factors. There is no curative treatment for Moyamoya disease. Secondary prevention for patients with symptomatic Moyamoya disease is largely centered on surgical revascularization techniques. We present here a 62-year old male presented with headache and vision loss for 2 days. He was previously diagnosed with hypertension and glaucoma. On physical examination, left eye movements were restricted medially, both eyes were hyperemic and their movements were painful. Other neurological and physical examination were normal. His vital signs and laboratory results were within normal limits. Computed tomography (CT) showed dilated vascular structures around both lateral ventricles and atherosclerotic changes inside the walls of internal carotid artery (ICA). Magnetic resonance imaging (MRI) and angiography (MRA) revealed dilated venous vascular structures around lateral ventricles and hyper-intense gliosis in periventricular white matter. Ischemic gliosis around the lateral ventricles were present in the Digital Subtracted Angiography (DSA). After the neurology, ophthalmology and neurosurgery consultation, the patient was diagnosed with Moyamoya disease, pulse steroid therapy was started for vision loss, and super-selective DSA was planned for further investigation. Moyamoya disease is a rare condition, but it can be an important cause of stroke in both children and adults. It generally affects anterior circulation, but posterior cerebral circulation may also be affected, as well. In the differential diagnosis of acute vision loss, occipital stroke related to Moyamoya disease should be considered. Direct and indirect surgical revascularization surgeries may be used to effectively revascularize affected brain areas, and have been shown to reduce risk of stroke.

Keywords: headache, Moyamoya disease, stroke, visual loss

Procedia PDF Downloads 262
25181 Autonomic Threat Avoidance and Self-Healing in Database Management System

Authors: Wajahat Munir, Muhammad Haseeb, Adeel Anjum, Basit Raza, Ahmad Kamran Malik

Abstract:

Databases are the key components of the software systems. Due to the exponential growth of data, it is the concern that the data should be accurate and available. The data in databases is vulnerable to internal and external threats, especially when it contains sensitive data like medical or military applications. Whenever the data is changed by malicious intent, data analysis result may lead to disastrous decisions. Autonomic self-healing is molded toward computer system after inspiring from the autonomic system of human body. In order to guarantee the accuracy and availability of data, we propose a technique which on a priority basis, tries to avoid any malicious transaction from execution and in case a malicious transaction affects the system, it heals the system in an isolated mode in such a way that the availability of system would not be compromised. Using this autonomic system, the management cost and time of DBAs can be minimized. In the end, we test our model and present the findings.

Keywords: autonomic computing, self-healing, threat avoidance, security

Procedia PDF Downloads 498
25180 Information Extraction Based on Search Engine Results

Authors: Mohammed R. Elkobaisi, Abdelsalam Maatuk

Abstract:

The search engines are the large scale information retrieval tools from the Web that are currently freely available to all. This paper explains how to convert the raw resulted number of search engines into useful information. This represents a new method for data gathering comparing with traditional methods. When a query is submitted for a multiple numbers of keywords, this take a long time and effort, hence we develop a user interface program to automatic search by taking multi-keywords at the same time and leave this program to collect wanted data automatically. The collected raw data is processed using mathematical and statistical theories to eliminate unwanted data and converting it to usable data.

Keywords: search engines, information extraction, agent system

Procedia PDF Downloads 420
25179 Prognosis, Clinical Outcomes and Short Term Survival Analyses of Patients with Cutaneous Melanomas

Authors: Osama Shakeel

Abstract:

The objective of the paper is to study the clinic-pathological factors, survival analyses, recurrence rate, metastatic rate, risk factors and the management of cutaneous malignant melanoma at Shaukat Khanum Memorial Cancer Hospital and Research Center. Methodology: From 2014 to 2017, all patients with a diagnosis of cutaneous malignant melanoma (CMM) were included in the study. Demographic variables were collected. Short and long term oncological outcomes were recorded. All data were entered and analyzed in SPSS version 21. Results: A total of 28 patients were included in the study. Median age was 46.5 +/-15.9 years. There were 16 male and 12 female patients. The family history of melanoma was present in 7.1% (n=2) of the patients. All patients had a mean survival of 13.43+/- 9.09 months. Lower limb was the commonest site among all which constitutes 46.4%(n=13). On histopathological analyses, ulceration was seen in 53.6% (n=15) patients. Unclassified tumor type was present in 75%(n=21) of the patients followed by nodular 21.4% (n=6) and superficial spreading 3.5%(n=1). Clark level IV was the commonest presentation constituting 46.4%(n=13). Metastases were seen in 50%(n=14) of the patients. Local recurrence was observed in 60.7%(n=17). 64.3%(n=18) lived after one year of treatment. Conclusion: CMM is a fatal disease. Although its disease of fair skin individuals, however, the incidence of CMM is also rising in this part of the world. Management includes early diagnoses and prompt management. However, mortality associated with this disease is still not favorable.

Keywords: malignant cancer of skin, cutaneous malignant melanoma, skin cancer, survival analyses

Procedia PDF Downloads 162
25178 Monte Carlo and Biophysics Analysis in a Criminal Trial

Authors: Luca Indovina, Carmela Coppola, Carlo Altucci, Riccardo Barberi, Rocco Romano

Abstract:

In this paper a real court case, held in Italy at the Court of Nola, in which a correct physical description, conducted with both a Monte Carlo and biophysical analysis, would have been sufficient to arrive at conclusions confirmed by documentary evidence, is considered. This will be an example of how forensic physics can be useful in confirming documentary evidence in order to reach hardly questionable conclusions. This was a libel trial in which the defendant, Mr. DS (Defendant for Slander), had falsely accused one of his neighbors, Mr. OP (Offended Person), of having caused him some damages. The damages would have been caused by an external plaster piece that would have detached from the neighbor’s property and would have hit Mr DS while he was in his garden, much more than a meter far away from the facade of the building from which the plaster piece would have detached. In the trial, Mr. DS claimed to have suffered a scratch on his forehead, but he never showed the plaster that had hit him, nor was able to tell from where the plaster would have arrived. Furthermore, Mr. DS presented a medical certificate with a diagnosis of contusion of the cerebral cortex. On the contrary, the images of Mr. OP’s security cameras do not show any movement in the garden of Mr. DS in a long interval of time (about 2 hours) around the time of the alleged accident, nor do they show any people entering or coming out from the house of Mr. DS in the same interval of time. Biophysical analysis shows that both the diagnosis of the medical certificate and the wound declared by the defendant, already in conflict with each other, are not compatible with the fall of external plaster pieces too small to be found. The wind was at a level 1 of the Beaufort scale, that is, unable to raise even dust (level 4 of the Beaufort scale). Therefore, the motion of the plaster pieces can be described as a projectile motion, whereas collisions with the building cornice can be treated using Newtons law of coefficients of restitution. Numerous numerical Monte Carlo simulations show that the pieces of plaster would not have been able to reach even the garden of Mr. DS, let alone a distance over 1.30 meters. Results agree with the documentary evidence (images of Mr. OP’s security cameras) that Mr. DS could not have been hit by plaster pieces coming from Mr. OP’s property.

Keywords: biophysics analysis, Monte Carlo simulations, Newton’s law of restitution, projectile motion

Procedia PDF Downloads 123
25177 Implementation and Performance Analysis of Data Encryption Standard and RSA Algorithm with Image Steganography and Audio Steganography

Authors: S. C. Sharma, Ankit Gambhir, Rajeev Arya

Abstract:

In today’s era data security is an important concern and most demanding issues because it is essential for people using online banking, e-shopping, reservations etc. The two major techniques that are used for secure communication are Cryptography and Steganography. Cryptographic algorithms scramble the data so that intruder will not able to retrieve it; however steganography covers that data in some cover file so that presence of communication is hidden. This paper presents the implementation of Ron Rivest, Adi Shamir, and Leonard Adleman (RSA) Algorithm with Image and Audio Steganography and Data Encryption Standard (DES) Algorithm with Image and Audio Steganography. The coding for both the algorithms have been done using MATLAB and its observed that these techniques performed better than individual techniques. The risk of unauthorized access is alleviated up to a certain extent by using these techniques. These techniques could be used in Banks, RAW agencies etc, where highly confidential data is transferred. Finally, the comparisons of such two techniques are also given in tabular forms.

Keywords: audio steganography, data security, DES, image steganography, intruder, RSA, steganography

Procedia PDF Downloads 282
25176 Data Monetisation by E-commerce Companies: A Need for a Regulatory Framework in India

Authors: Anushtha Saxena

Abstract:

This paper examines the process of data monetisation bye-commerce companies operating in India. Data monetisation is collecting, storing, and analysing consumers’ data to use further the data that is generated for profits, revenue, etc. Data monetisation enables e-commerce companies to get better businesses opportunities, innovative products and services, a competitive edge over others to the consumers, and generate millions of revenues. This paper analyses the issues and challenges that are faced due to the process of data monetisation. Some of the issues highlighted in the paper pertain to the right to privacy, protection of data of e-commerce consumers. At the same time, data monetisation cannot be prohibited, but it can be regulated and monitored by stringent laws and regulations. The right to privacy isa fundamental right guaranteed to the citizens of India through Article 21 of The Constitution of India. The Supreme Court of India recognized the Right to Privacy as a fundamental right in the landmark judgment of Justice K.S. Puttaswamy (Retd) and Another v. Union of India . This paper highlights the legal issue of how e-commerce businesses violate individuals’ right to privacy by using the data collected, stored by them for economic gains and monetisation and protection of data. The researcher has mainly focused on e-commerce companies like online shopping websitesto analyse the legal issue of data monetisation. In the Internet of Things and the digital age, people have shifted to online shopping as it is convenient, easy, flexible, comfortable, time-consuming, etc. But at the same time, the e-commerce companies store the data of their consumers and use it by selling to the third party or generating more data from the data stored with them. This violatesindividuals’ right to privacy because the consumers do not know anything while giving their data online. Many times, data is collected without the consent of individuals also. Data can be structured, unstructured, etc., that is used by analytics to monetise. The Indian legislation like The Information Technology Act, 2000, etc., does not effectively protect the e-consumers concerning their data and how it is used by e-commerce businesses to monetise and generate revenues from that data. The paper also examines the draft Data Protection Bill, 2021, pending in the Parliament of India, and how this Bill can make a huge impact on data monetisation. This paper also aims to study the European Union General Data Protection Regulation and how this legislation can be helpful in the Indian scenarioconcerning e-commerce businesses with respect to data monetisation.

Keywords: data monetization, e-commerce companies, regulatory framework, GDPR

Procedia PDF Downloads 110
25175 Transcriptomics Analysis on Comparing Non-Small Cell Lung Cancer versus Normal Lung, and Early Stage Compared versus Late-Stages of Non-Small Cell Lung Cancer

Authors: Achitphol Chookaew, Paramee Thongsukhsai, Patamarerk Engsontia, Narongwit Nakwan, Pritsana Raugrut

Abstract:

Lung cancer is one of the most common malignancies and primary cause of death due to cancer worldwide. Non-small cell lung cancer (NSCLC) is the main subtype in which majority of patients present with advanced-stage disease. Herein, we analyzed differentially expressed genes to find potential biomarkers for lung cancer diagnosis as well as prognostic markers. We used transcriptome data from our 2 NSCLC patients and public data (GSE81089) composing of 8 NSCLC and 10 normal lung tissues. Differentially expressed genes (DEGs) between NSCLC and normal tissue and between early-stage and late-stage NSCLC were analyzed by the DESeq2. Pairwise correlation was used to find the DEGs with false discovery rate (FDR) adjusted p-value £ 0.05 and |log2 fold change| ³ 4 for NSCLC versus normal and FDR adjusted p-value £ 0.05 with |log2 fold change| ³ 2 for early versus late-stage NSCLC. Bioinformatic tools were used for functional and pathway analysis. Moreover, the top ten genes in each comparison group were verified the expression and survival analysis via GEPIA. We found 150 up-regulated and 45 down-regulated genes in NSCLC compared to normal tissues. Many immnunoglobulin-related genes e.g., IGHV4-4, IGHV5-10-1, IGHV4-31, IGHV4-61, and IGHV1-69D were significantly up-regulated. 22 genes were up-regulated, and five genes were down-regulated in late-stage compared to early-stage NSCLC. The top five DEGs genes were KRT6B, SPRR1A, KRT13, KRT6A and KRT5. Keratin 6B (KRT6B) was the most significantly increased gene in the late-stage NSCLC. From GEPIA analysis, we concluded that IGHV4-31 and IGKV1-9 might be used as diagnostic biomarkers, while KRT6B and KRT6A might be used as prognostic biomarkers. However, further clinical validation is needed.

Keywords: differentially expressed genes, early and late-stages, gene ontology, non-small cell lung cancer transcriptomics

Procedia PDF Downloads 110
25174 Using Life Cycle Assessment in Potable Water Treatment Plant: A Colombian Case Study

Authors: Oscar Orlando Ortiz Rodriguez, Raquel A. Villamizar-G, Alexander Araque

Abstract:

There is a total of 1027 municipal development plants in Colombia, 70% of municipalities had Potable Water Treatment Plants (PWTPs) in urban areas and 20% in rural areas. These PWTPs are typically supplied by surface waters (mainly rivers) and resort to gravity, pumping and/or mixed systems to get the water from the catchment point, where the first stage of the potable water process takes place. Subsequently, a series of conventional methods are applied, consisting in a more or less standardized sequence of physicochemical and, sometimes, biological treatment processes which vary depending on the quality of the water that enters the plant. These processes require energy and chemical supplies in order to guarantee an adequate product for human consumption. Therefore, in this paper, we applied the environmental methodology of Life Cycle Assessment (LCA) to evaluate the environmental loads of a potable water treatment plant (PWTP) located in northeastern Colombia following international guidelines of ISO 14040. The different stages of the potable water process, from the catchment point through pumping to the distribution network, were thoroughly assessed. The functional unit was defined as 1 m³ of water treated. The data were analyzed through the database Ecoinvent v.3.01, and modeled and processed in the software LCA-Data Manager. The results allowed determining that in the plant, the largest impact was caused by Clarifloc (82%), followed by Chlorine gas (13%) and power consumption (4%). In this context, the company involved in the sustainability of the potable water service should ideally reduce these environmental loads during the potable water process. A strategy could be the use of Clarifloc can be reduced by applying coadjuvants or other coagulant agents. Also, the preservation of the hydric source that supplies the treatment plant constitutes an important factor, since its deterioration confers unfavorable features to the water that is to be treated. By concluding, treatment processes and techniques, bioclimatic conditions and culturally driven consumption behavior vary from region to region. Furthermore, changes in treatment processes and techniques are likely to affect the environment during all stages of a plant’s operation cycle.

Keywords: climate change, environmental impact, life cycle assessment, treated water

Procedia PDF Downloads 222
25173 Experiments on Weakly-Supervised Learning on Imperfect Data

Authors: Yan Cheng, Yijun Shao, James Rudolph, Charlene R. Weir, Beth Sahlmann, Qing Zeng-Treitler

Abstract:

Supervised predictive models require labeled data for training purposes. Complete and accurate labeled data, i.e., a ‘gold standard’, is not always available, and imperfectly labeled data may need to serve as an alternative. An important question is if the accuracy of the labeled data creates a performance ceiling for the trained model. In this study, we trained several models to recognize the presence of delirium in clinical documents using data with annotations that are not completely accurate (i.e., weakly-supervised learning). In the external evaluation, the support vector machine model with a linear kernel performed best, achieving an area under the curve of 89.3% and accuracy of 88%, surpassing the 80% accuracy of the training sample. We then generated a set of simulated data and carried out a series of experiments which demonstrated that models trained on imperfect data can (but do not always) outperform the accuracy of the training data, e.g., the area under the curve for some models is higher than 80% when trained on the data with an error rate of 40%. Our experiments also showed that the error resistance of linear modeling is associated with larger sample size, error type, and linearity of the data (all p-values < 0.001). In conclusion, this study sheds light on the usefulness of imperfect data in clinical research via weakly-supervised learning.

Keywords: weakly-supervised learning, support vector machine, prediction, delirium, simulation

Procedia PDF Downloads 190