Search results for: intent detection
1741 Device to Alert and Fire Prevention through Temperature Monitoring and Gas Detection
Authors: Dêivisson Alves Anjos, Blenda Fonseca Aires Teles, Queitiane Castro Costa
Abstract:
Fire is one of the biggest dangers for factories, warehouses, mills, among other places, causing unimaginable damage, because besides the material damage also directly affects the lives of workers who are likely to suffer death or very serious consequences. This protection of the lives of these people should be taken seriously, always seeking safety. Thus investment in security and monitoring equipment must be high, so you can prevent or reduce the impacts of a possible fire. Our device, made in PIC micro controller monitors the temperature and the presence of gas in the environment, it sends the data via Bluetooth device to a developed in LabVIEW interface saves these data continuously and alert if the temperature exceeds the allowed or some gas is detected. Currently the device is in operation and can perform several tests, as well as use in different areas for which you need anti-fire protection.Keywords: pic, bluetooth, fire, temperature, gas, LabVIEW
Procedia PDF Downloads 5321740 Identification of Rice Quality Using Gas Sensors and Neural Networks
Authors: Moh Hanif Mubarok, Muhammad Rivai
Abstract:
The public's response to quality rice is very high. So it is necessary to set minimum standards in checking the quality of rice. Most rice quality measurements still use manual methods, which are prone to errors due to limited human vision and the subjectivity of testers. So, a gas detection system can be a solution that has high effectiveness and subjectivity for solving current problems. The use of gas sensors in testing rice quality must pay attention to several parameters. The parameters measured in this research are the percentage of rice water content, gas concentration, output voltage, and measurement time. Therefore, this research was carried out to identify carbon dioxide (CO₂), nitrous oxide (N₂O) and methane (CH₄) gases in rice quality using a series of gas sensors using the Neural Network method.Keywords: carbon dioxide, dinitrogen oxide, methane, semiconductor gas sensor, neural network
Procedia PDF Downloads 481739 Molecular Detection of Staphylococcus aureus in the Pork Chain Supply and the Potential Anti-Staphylococcal Activity of Natural Compounds
Authors: Valeria Velasco, Ana M. Bonilla, José L. Vergara, Alcides Lofa, Jorge Campos, Pedro Rojas-García
Abstract:
Staphylococcus aureus is both commensal bacterium and opportunistic pathogen that can cause different diseases in humans and can rapidly develop antimicrobial resistance. Since this bacterium has the ability to colonize the nares and skin of humans and animals, there is a risk of contamination of food in different steps of the food chain supply. Emerging strains have been detected in food-producing animals and meat, such as methicillin-resistant S. aureus (MRSA). The aim of this study was to determine the prevalence and oxacillin susceptibility of S. aureus in the pork chain supply in Chile and to suggest some natural antimicrobials for control. A total of 487 samples were collected from pigs (n=332), carcasses (n=85), and retail pork meat (n=70). Presumptive S. aureus colonies were isolated by selective enrichment and culture media. The confirmation was carried out by biochemical testing (Api® Staph) and molecular technique PCR (detection of nuc and mecA genes, associated with S. aureus and methicillin resistance, respectively). The oxacillin (β-lactam antibiotic that replaced methicillin) susceptibility was assessed by minimum inhibitory concentration (MIC) using the Epsilometer test (Etest). A preliminary assay was carried out to test thymol, carvacrol, oregano essential oil (Origanum vulgare L.), Maqui or Chilean wineberry extract (Aristotelia chilensis (Mol.) Stuntz) as anti-staphylococcal agents using the disc diffusion method at different concentrations. The overall prevalence of S. aureus in the pork chain supply reached 33.9%. A higher prevalence of S. aureus was determined in carcasses (56.5%) than in pigs (28.3%) and pork meat (32.9%) (P ≤ 0.05). The prevalence of S. aureus in pigs sampled at farms (40.6%) was higher than in pigs sampled at slaughterhouses (23.3%) (P ≤ 0.05). The contamination of no packaged meat with S. aureus (43.1%) was higher than in packaged meat (5.3%) (P ≤ 0.05). The mecA gene was not detected in S. aureus strains isolated in this study. Two S. aureus strains exhibited oxacillin resistance (MIC ≥ 4µg/mL). Anti-staphylococcal activity was detected in solutions of thymol, carvacrol, and oregano essential oil at all concentrations tested. No anti-staphylococcal activity was detected in Maqui extract. Finally, S. aureus is present in the pork chain supply in Chile. Although the mecA gene was not detected, oxacillin resistance was found in S. aureus and could be attributed to another resistance mechanism. Thymol, carvacrol, and oregano essential oil could be used as anti-staphylococcal agents at low concentrations. Research project Fondecyt No. 11140379.Keywords: antimicrobials, mecA gen, nuc gen, oxacillin susceptibility, pork meat
Procedia PDF Downloads 2281738 Interaction of the Circumferential Lamb Wave with Delamination in the Middle of Pipe Wall
Authors: Li Ziming, He Cunfu, Liu Zenghua
Abstract:
With aim for delamination type defects detection in manufacturing process of seamless pipe,this paper studies the interaction of the circumferential lamb wave with delamination in aluminum pipe.The delamination is located in the middle of pipe wall.A numerical study is carried out,the circumferential lamb wave used here is CL0 mode,which is generated with a finite element method code.Wave structures from the simulation are compared with theoretical results to verify the model’s accuracy.Delamination along the circumferential direction is established by demerging nodes of the same coordinates.When CL0 mode is incident at the entrance and exit of a delamination,it generates new mode-CL1,undergoes multiple reverberation and mode conversions between the two ends of the delamination. Signals of different receptions are obtained to provide insight in using CL0 mode for locating the delamination.Keywords: circumferential lamb wave, delamination, FEM, seamless pipe
Procedia PDF Downloads 3121737 Verification of the Supercavitation Phenomena: Investigation of the Cavity Parameters and Drag Coefficients for Different Types of Cavitator
Authors: Sezer Kefeli, Sertaç Arslan
Abstract:
Supercavitation is a pressure dependent process which gives opportunity to eliminate the wetted surface effects on the underwater vehicle due to the differences of viscosity and velocity effects between liquid (freestream) and gas phase. Cavitation process occurs depending on rapid pressure drop or temperature rising in liquid phase. In this paper, pressure based cavitation is investigated due to the fact that is encountered in the underwater world, generally. Basically, this vapor-filled pressure based cavities are unstable and harmful for any underwater vehicle because these cavities (bubbles or voids) lead to intense shock waves while collapsing. On the other hand, supercavitation is a desired and stabilized phenomena than general pressure based cavitation. Supercavitation phenomena offers the idea of minimizing form drag, and thus supercavitating vehicles are revived. When proper circumstances are set up, which are either increasing the operating speed of the underwater vehicle or decreasing the pressure difference between free stream and artificial pressure, the continuity of the supercavitation is obtainable. There are 2 types of supercavitation to obtain stable and continuous supercavitation, and these are called as natural and artificial supercavitation. In order to generate natural supercavitation, various mechanical structures are discovered, which are called as cavitators. In literature, a lot of cavitator types are studied either experimentally or numerically on a CFD platforms with intent to observe natural supercavitation since the 1900s. In this paper, firstly, experimental results are obtained, and trend lines are generated based on supercavitation parameters in terms of cavitation number (), form drag coefficientC_D, dimensionless cavity diameter (d_m/d_c), and length (L_c/d_c). After that, natural cavitation verification studies are carried out for disk and cone shape cavitators. In addition, supercavitation parameters are numerically analyzed at different operating conditions, and CFD results are fitted into trend lines of experimental results. The aims of this paper are to generate one generally accepted drag coefficient equation for disk and cone cavitators at different cavitator half angle and investigation of the supercavitation parameters with respect to cavitation number. Moreover, 165 CFD analysis are performed at different cavitation numbers on FLUENT version 21R2. Five different cavitator types are modeled on SCDM with respect tocavitator’s half angles. After that, CFD database is generated depending on numerical results, and new trend lines are generated based on supercavitation parameters. These trend lines are compared with experimental results. Finally, the generally accepted drag coefficient equation and equations of supercavitation parameters are generated.Keywords: cavity envelope, CFD, high speed underwater vehicles, supercavitation, supercavitating flows, supercavitation parameters, drag reduction, viscous force elimination, natural cavitation verification
Procedia PDF Downloads 1311736 Modeling Search-And-Rescue Operations by Autonomous Mobile Robots at Sea
Authors: B. Kriheli, E. Levner, T. C. E. Cheng, C. T. Ng
Abstract:
During the last decades, research interest in planning, scheduling, and control of emergency response operations, especially people rescue and evacuation from the dangerous zone of marine accidents, has increased dramatically. Until the survivors (called ‘targets’) are found and saved, it may cause loss or damage whose extent depends on the location of the targets and the search duration. The problem is to efficiently search for and detect/rescue the targets as soon as possible with the help of intelligent mobile robots so as to maximize the number of saved people and/or minimize the search cost under restrictions on the amount of saved people within the allowable response time. We consider a special situation when the autonomous mobile robots (AMR), e.g., unmanned aerial vehicles and remote-controlled robo-ships have no operator on board as they are guided and completely controlled by on-board sensors and computer programs. We construct a mathematical model for the search process in an uncertain environment and provide a new fast algorithm for scheduling the activities of the autonomous robots during the search-and rescue missions after an accident at sea. We presume that in the unknown environments, the AMR’s search-and-rescue activity is subject to two types of error: (i) a 'false-negative' detection error where a target object is not discovered (‘overlooked') by the AMR’s sensors in spite that the AMR is in a close neighborhood of the latter and (ii) a 'false-positive' detection error, also known as ‘a false alarm’, in which a clean place or area is wrongly classified by the AMR’s sensors as a correct target. As the general resource-constrained discrete search problem is NP-hard, we restrict our study to finding local-optimal strategies. A specificity of the considered operational research problem in comparison with the traditional Kadane-De Groot-Stone search models is that in our model the probability of the successful search outcome depends not only on cost/time/probability parameters assigned to each individual location but, as well, on parameters characterizing the entire history of (unsuccessful) search before selecting any next location. We provide a fast approximation algorithm for finding the AMR route adopting a greedy search strategy in which, in each step, the on-board computer computes a current search effectiveness value for each location in the zone and sequentially searches for a location with the highest search effectiveness value. Extensive experiments with random and real-life data provide strong evidence in favor of the suggested operations research model and corresponding algorithm.Keywords: disaster management, intelligent robots, scheduling algorithm, search-and-rescue at sea
Procedia PDF Downloads 1721735 Non-Destructive Visual-Statistical Approach to Detect Leaks in Water Mains
Authors: Alaa Al Hawari, Mohammad Khader, Tarek Zayed, Osama Moselhi
Abstract:
In this paper, an effective non-destructive, non-invasive approach for leak detection was proposed. The process relies on analyzing thermal images collected by an IR viewer device that captures thermo-grams. In this study a statistical analysis of the collected thermal images of the ground surface along the expected leak location followed by a visual inspection of the thermo-grams was performed in order to locate the leak. In order to verify the applicability of the proposed approach the predicted leak location from the developed approach was compared with the real leak location. The results showed that the expected leak location was successfully identified with an accuracy of more than 95%.Keywords: thermography, leakage, water pipelines, thermograms
Procedia PDF Downloads 3551734 Numerical Simulation and Laboratory Tests for Rebar Detection in Reinforced Concrete Structures using Ground Penetrating Radar
Authors: Maha Al-Soudani, Gilles Klysz, Jean-Paul Balayssac
Abstract:
The aim of this paper is to use Ground Penetrating Radar (GPR) as a non-destructive testing (NDT) method to increase its accuracy in recognizing the geometric reinforced concrete structures and in particular, the position of steel bars. This definition will help the managers to assess the state of their structures on the one hand vis-a-vis security constraints and secondly to quantify the need for maintenance and repair. Several configurations of acquisition and processing of the simulated signal were tested to propose and develop an appropriate imaging algorithm in the propagation medium to locate accurately the rebar. A subsequent experimental validation was used by testing the imaging algorithm on real reinforced concrete structures. The results indicate that, this algorithm is capable of estimating the reinforcing steel bar position to within (0-1) mm.Keywords: GPR, NDT, Reinforced concrete structures, Rebar location.
Procedia PDF Downloads 5041733 Vision Based People Tracking System
Authors: Boukerch Haroun, Luo Qing Sheng, Li Hua Shi, Boukraa Sebti
Abstract:
In this paper we present the design and the implementation of a target tracking system where the target is set to be a moving person in a video sequence. The system can be applied easily as a vision system for mobile robot. The system is composed of two major parts the first is the detection of the person in the video frame using the SVM learning machine based on the “HOG” descriptors. The second part is the tracking of a moving person it’s done by using a combination of the Kalman filter and a modified version of the Camshift tracking algorithm by adding the target motion feature to the color feature, the experimental results had shown that the new algorithm had overcame the traditional Camshift algorithm in robustness and in case of occlusion.Keywords: camshift algorithm, computer vision, Kalman filter, object tracking
Procedia PDF Downloads 4461732 Monoallelic and Biallelic Deletions of 13q14 in a Group of 36 CLL Patients Investigated by CGH Haematological Cancer and SNP Array (8x60K)
Authors: B. Grygalewicz, R. Woroniecka, J. Rygier, K. Borkowska, A. Labak, B. Nowakowska, B. Pienkowska-Grela
Abstract:
Introduction: Chronic lymphocytic leukemia (CLL) is the most common form of adult leukemia in the Western world. Hemizygous and or homozygous loss at 13q14 occur in more than half of cases and constitute the most frequent chromosomal abnormality in CLL. It is believed that deletions 13q14 play a role in CLL pathogenesis. Two microRNA genes miR-15a and miR- 16-1 are targets of 13q14 deletions and plays a tumor suppressor role by targeting antiapoptotic BCL2 gene. Deletion size, as a single change detected in FISH analysis, has haprognostic significance. Patients with small deletions, without RB1 gene involvement, have the best prognosis and the longest overall survival time (OS 133 months). In patients with bigger deletion region, containing RB1 gene, prognosis drops to intermediate, like in patients with normal karyotype and without changes in FISH with overall survival 111 months. Aim: Precise delineation of 13q14 deletions regions in two groups of CLL patients, with mono- and biallelic deletions and qualifications of their prognostic significance. Methods: Detection of 13q14 deletions was performed by FISH analysis with CLL probe panel (D13S319, LAMP1, TP53, ATM, CEP-12). Accurate deletion size detection was performed by CGH Haematological Cancer and SNP array (8x60K). Results: Our investigated group of CLL patients with the 13q14 deletion, detected by FISH analysis, comprised two groups: 18 patients with monoallelic deletions and 18 patients with biallelic deletions. In FISH analysis, in the monoallelic group the range of cells with deletion, was 43% to 97%, while in biallelic group deletion was detected in 11% to 94% of cells. Microarray analysis revealed precise deletion regions. In the monoallelic group, the range of size was 348,12 Kb to 34,82 Mb, with median deletion size 7,93 Mb. In biallelic group discrepancy of total deletions, size was 135,27 Kb to 33,33 Mb, with median deletion size 2,52 Mb. The median size of smaller deletion regions on one copy chromosome 13 was 1,08 Mb while the average region of bigger deletion on the second chromosome 13 was 4,04 Mb. In the monoallelic group, in 8/18 deletion region covered RB1 gene. In the biallelic group, in 4/18 cases, revealed deletion on one copy of biallelic deletion and in 2/18 showed deletion of RB1 gene on both deleted 13q14 regions. All minimal deleted regions included miR-15a and miR-16-1 genes. Genetic results will be correlated with clinical data. Conclusions: Application of CGH microarrays technique in CLL allows accurately delineate the size of 13q14 deletion regions, what have a prognostic value. All deleted regions included miR15a and miR-16-1, what confirms the essential role of these genes in CLL pathogenesis. In our investigated groups of CLL patients with mono- and biallelic 13q14 deletions, patients with biallelic deletion presented smaller deletion sizes (2,52 Mb vs 7,93 Mb), what is connected with better prognosis.Keywords: CLL, deletion 13q14, CGH microarrays, SNP array
Procedia PDF Downloads 2551731 Primer Design for the Detection of Secondary Metabolite Biosynthetic Pathways in Metagenomic Data
Authors: Jeisson Alejandro Triana, Maria Fernanda Quiceno Vallejo, Patricia del Portillo, Juan Manuel Anzola
Abstract:
Most of the known antimicrobials so far discovered are secondary metabolites. The potential for new natural products of this category increases as new microbial genomes and metagenomes are being sequenced. Despite the advances, there is no systematic way to interrogate metagenomic clones for their potential to contain clusters of genes related to these pathways. Here we analyzed 52 biosynthetic pathways from the AntiSMASH database at the protein domain level in order to identify domains of high specificity and sensitivity with respect to specific biosynthetic pathways. These domains turned out to have various degrees of divergence at the DNA level. We propose PCR assays targetting such domains in-silico and corroborated one by Sanger sequencing.Keywords: bioinformatic, anti smash, antibiotics, secondary metabolites, natural products, protein domains
Procedia PDF Downloads 1791730 If You Can't Teach Yourself, No One Can
Authors: Timna Mayer
Abstract:
This paper explores the vast potential of self-directed learning in violin pedagogy. Based in practice and drawing on concepts from neuropsychology, the author, a violinist and teacher, outlines five learning principles. Self-directed learning is defined as an ongoing process based on problem detection, definition, and resolution. The traditional roles of teacher and student are reimagined within this context. A step-by-step guide to applied self-directed learning suggests a model for both teachers and students that realizes student independence in the classroom, leading to higher-level understanding and more robust performance. While the value of self-directed learning is well-known in general pedagogy, this paper is novel in applying the approach to the study of musical performance, a field which is currently dominated by habit and folklore, rather than informed by science.Keywords: neuropsychology and musical performance, self-directed learning, strategic problem solving, violin pedagogy
Procedia PDF Downloads 1491729 Dueling Burnout: The Dual Role Nurse
Authors: Melissa Dorsey
Abstract:
Moral distress and compassion fatigue plague nurses in the Cardiothoracic Intensive Care Unit (CTICU) and cause an unnecessary level of turnover. Dueling Burnout describes an initiative that was implemented in the CTICU to reduce the level of burnout the nurses endure by encouraging dual roles with collaborating departments. Purpose: Critical care nurses are plagued by burnout, moral distress, and compassion fatigue due to the intensity of care provided. The purpose of the dual role program was to decrease these issues by providing relief from the intensity of the critical care environment while maintaining full-time employment. Relevance/Significance: Burnout, moral distress, and compassion fatigue are leading causes of Cardiothoracic Critical Care (CTCU) turnover. A contributing factor to burnout is the workload related to serving as a preceptor for a constant influx of new nurses (RN). As a result of these factors, the CTICU averages 17% nursing turnover/year. The cost, unit disruption, and, most importantly, distress of the clinical nurses required an innovative approach to create an improved work environment and experience. Strategies/Implementation/Methods: In May 2018, a dual role pilot was initiated for nurses. The dual role constitutes .6 full-time equivalent hours (FTE) worked in CTICU in combination with .3 FTE worked in the Emergency Department (ED). ED nurses who expressed an interest in cross-training to CTICU were also offered the dual role opportunity. The initial hypothesis was that full-time employees would benefit from a change in clinical setting leading to increased engagement and job satisfaction. The dual role also presents an opportunity for professional development through the expansion of clinical skills in another specialty. Success of the pilot led to extending the dual role to areas beyond the ED. Evaluation/Outcomes/Results: The number of dual role clinical nurses has grown to 22. From the dual role cohort, only one has transferred out of CTICU. This is a 5% turnover rate for this group of nurses as compared to the average turnover rate of 17%. A role satisfaction survey conducted with the dual role cohort found that because of working in a dual role, 76.5% decreased their intent to leave, 100% decreased their level of burnout, and 100% reported an increase in overall job satisfaction. Nurses reported the ability to develop skills that are transferable between departments. Respondents emphasized the appreciation gained from working in multiple environments; the dual role served to transform their care. Conclusions/Implications: Dual role is an effective strategy to retain experienced nurses, decrease burnout and turnover, improve collaboration, and provide flexibility to meet staffing needs. The dual role offers RNs an expansion of skills, relief from high acuity and orientee demands, while improving job satisfaction.Keywords: nursing retention, burnout, pandemic, strategic staffing, leadership
Procedia PDF Downloads 1831728 Effects of Reversible Watermarking on Iris Recognition Performance
Authors: Andrew Lock, Alastair Allen
Abstract:
Fragile watermarking has been proposed as a means of adding additional security or functionality to biometric systems, particularly for authentication and tamper detection. In this paper we describe an experimental study on the effect of watermarking iris images with a particular class of fragile algorithm, reversible algorithms, and the ability to correctly perform iris recognition. We investigate two scenarios, matching watermarked images to unmodified images, and matching watermarked images to watermarked images. We show that different watermarking schemes give very different results for a given capacity, highlighting the importance of investigation. At high embedding rates most algorithms cause significant reduction in recognition performance. However, in many cases, for low embedding rates, recognition accuracy is improved by the watermarking process.Keywords: biometrics, iris recognition, reversible watermarking, vision engineering
Procedia PDF Downloads 4571727 A Fast GPS Satellites Signals Detection Algorithm Based on Simplified Fast Fourier Transform
Authors: Beldjilali Bilal, Benadda Belkacem, Kahlouche Salem
Abstract:
Due to the Doppler effect caused by the high velocity of satellite and in some case receivers, the frequency of the Global Positioning System (GPS) signals are transformed into a new ones. Several acquisition algorithms frequency of the Global Positioning System (GPS) signals are transformed can be used to estimate the new frequency and phase shifts values. Numerous algorithms are based on the frequencies domain calculation. Our developed algorithm is a new approach dedicated to the Global Positioning System signal acquisition based on the fast Fourier transform. Our proposed new algorithm is easier to implement and has fast execution time compared with elder ones.Keywords: global positioning system, acquisition, FFT, GPS/L1, software receiver, weak signal
Procedia PDF Downloads 2511726 Graph Similarity: Algebraic Model and Its Application to Nonuniform Signal Processing
Authors: Nileshkumar Vishnav, Aditya Tatu
Abstract:
A recent approach of representing graph signals and graph filters as polynomials is useful for graph signal processing. In this approach, the adjacency matrix plays pivotal role; instead of the more common approach involving graph-Laplacian. In this work, we follow the adjacency matrix based approach and corresponding algebraic signal model. We further expand the theory and introduce the concept of similarity of two graphs. The similarity of graphs is useful in that key properties (such as filter-response, algebra related to graph) get transferred from one graph to another. We demonstrate potential applications of the relation between two similar graphs, such as nonuniform filter design, DTMF detection and signal reconstruction.Keywords: graph signal processing, algebraic signal processing, graph similarity, isospectral graphs, nonuniform signal processing
Procedia PDF Downloads 3521725 Evaluation of the Radiolabelled 68GA-DOTATOC Complex in Adenocarcinoma Breast Cancer
Authors: S. Zolghadri, M. Naderi, H. Yousefnia, B. Alirzapour, A. R. Jalilian, A. Ramazani
Abstract:
Nowadays, 68Ga-DOTATOC has been known as a potential agent for the detection of neuroendocrine tumours and it has indicated higher sensitivity compared with the 111In-Octeroetide. The aim of this study was to evaluate the effectiveness of this new agent in the diagnosis of adenocarcinoma breast cancer. 68Ga-DOTATOC was prepared with the radiochemical purity of higher than 98% and by the specific activity of 39.6 TBq/mmol. 37 MBq of the complex was injected intravenously into the BULB/c mice with adenocarcinoma breast cancer. PET/CT images were acquired after 30, 60 and 90 min post injection demonstrated significant accumulation in the tumour sites. Also, considerable activity was observed in the kidney and bladder as the main routs of excretion. Generally, the results showed that 68Ga-DOTATOC can be considered as a suitable complex for diagnosis of the adenocarcinoma breast cancer using PET procedure.Keywords: adenocarcinoma breast cancer, 68Ga, octreotide, imaging
Procedia PDF Downloads 3411724 Patient-Friendly Hand Gesture Recognition Using AI
Authors: K. Prabhu, K. Dinesh, M. Ranjani, M. Suhitha
Abstract:
During the tough times of covid, those people who were hospitalized found it difficult to always convey what they wanted to or needed to the attendee. Sometimes the attendees might also not be there. In that case, the patients can use simple hand gestures to control electrical appliances (like its set it for a zero watts bulb)and three other gestures for voice note intimation. In this AI-based hand recognition project, NodeMCU is used for the control action of the relay, and it is connected to the firebase for storing the value in the cloud and is interfaced with the python code via raspberry pi. For three hand gestures, a voice clip is added for intimation to the attendee. This is done with the help of Google’s text to speech and the inbuilt audio file option in the raspberry pi 4. All the five gestures will be detected when shown with their hands via the webcam, which is placed for gesture detection. The personal computer is used for displaying the gestures and for running the code in the raspberry pi imager.Keywords: nodeMCU, AI technology, gesture, patient
Procedia PDF Downloads 1671723 Polish Adversarial Trial: Analysing the Fairness of New Model of Appeal Proceedings in the Context of Delivered Research
Authors: Cezary Kulesza, Katarzyna Lapinska
Abstract:
Regarding the nature of the notion of fair trial, one must see the source of the fair trial principle in the following acts of international law: art. 6 of the ECHR of 1950 and art.14 the International Covenant on Civil and Political Rights of 1966, as well as in art. 45 of the Polish Constitution. However, the problem is that the above-mentioned acts essentially apply the principle of a fair trial to the main hearing and not to appeal proceedings. Therefore, the main thesis of the work is to answer the question whether the Polish model of appeal proceedings is fair. The paper presents the problem of fair appeal proceedings in Poland in comparative perspective. Thus, the authors discuss the basic features of English, German and Russian appeal systems. The matter is also analysed in the context of the last reforms of Polish criminal procedure, because since 2013 Polish parliament has significantly changed criminal procedure almost three times: by the Act of 27th September, 2013, the Act of 20th February, 2015 which came into effect on 1st July, 2015 and the Act of 11th March, 2016. The most astonishing is that these three amendments have been varying from each other – changing Polish criminal procedure to more adversarial one and then rejecting all measures just involved in previous acts. Additional intent of the Polish legislator was amending the forms of plea bargaining: conviction of the defendant without trial or voluntary submission to a penalty, which were supposed to become tools allowing accelerating the criminal process and, at the same time, implementing the principle of speedy procedure. The next part of the paper will discuss the matter, how the changes of plea bargaining and the main trial influenced the appellate procedure in Poland. The authors deal with the right to appeal against judgments issued in negotiated case-ending settlements in the light of Art. 2 of Protocol No. 7 to the ECHR and the Polish Constitution. The last part of the presentation will focus on the basic changes in the appeals against judgments issued after the main trial. This part of the paper also presents the results of examination of court files held in the Polish Appeal Courts in Białystok, Łódź and Warsaw. From these considerations it is concluded that the Polish CCP of 1997 in ordinary proceedings basically meets both standards: the standard adopted in Protocol No. 7 of the Convention and the Polish constitutional standard. But the examination of case files shows in particular the following phenomena: low effectiveness of appeals and growing stability of the challenged judgments of district courts, extensive duration of appeal proceedings and narrow scope of evidence proceedings before the appellate courts. On the other hand, limitations of the right to appeal against the judgments issued in consensual modes of criminal proceedings justify the fear that such final judgments may violate the principle of criminal accurate response or the principle of material truth.Keywords: adversarial trial, appeal, ECHR, England, evidence, fair trial, Germany, Polish criminal procedure, reform, Russia
Procedia PDF Downloads 1471722 The Role of Structural Poverty in the Know-How and Moral Economy of Doctors in Africa: An Anthropological Perspective
Authors: Isabelle Gobatto
Abstract:
Based on an anthropological approach, this paper explores the medical profession and the construction of medical practices by considering the multiform articulations between structural poverty and the production of care from a low-resource francophone West African country, Burkina Faso. This country is considered in its exemplary dimension of culturally differentiated countries of the African continent that share the same situation of structural poverty. The objective is to expose the effects of structural poverty on the ways of constructing professional knowledge and thinking about the sense of the medical profession. If doctors are trained to have the same capacities in South and West countries, which are to treat and save lives whatever the cultural contexts of the practice of medicine, the ways of investing their role and of dealing with this context of action fracture the homogenization of the medical profession. In the line of anthropology of biomedicine, this paper outlines the complex effects of structural poverty on health care, care relations, and the moral economy of doctors. The materials analyzed are based on an ethnography including two temporalities located thirty years apart (1990-1994 and 2020-2021), based on long-term observations of care practices conducted in healthcare institutions, interviews coupled with the life histories of physicians. The findings reveal that disabilities faced by doctors to deliver care are interpreted as policy gaps, but they are also considered by physicians as constitutive of the social and cultural characteristics of patients, making their capacities and incapacities in terms of accompanying caregivers in the production of care. These perceptions have effects on know-how, structured around the need to act even when diagnoses are not made so as not to see patients desert health structures if the costs of care are too high for them. But these interpretations of highly individualizing dimensions of these difficulties place part of the blame on patients for the difficulties in using learned knowledge and delivering effective care. These situations challenge the ethics of caregivers but also of ethnologists. Firstly because the interpretations of disabilities prevent caregivers from considering vulnerabilities of care as constituting a common condition shared with their patients in these health systems, affecting them in an identical way although in different places in the production of care. Correlatively, these results underline that these professional conceptions prevent the emergence of a figure of victim, which could be shared between patients and caregivers who, together, undergo working and care conditions at the limit of the acceptable. This dimension directly involves politics. Secondly, structural poverty and its effects on care challenge the ethics of the anthropologist who observes caregivers producing, without intent to arm, experiences of care marked by an ordinary violence, by not giving them the care they need. It is worth asking how anthropologists could get doctors to think in this light in west-African societies.Keywords: Africa, care, ethics, poverty
Procedia PDF Downloads 691721 Defining of the Shape of the Spine Using Moiré Method in Case of Patients with Scheuermann Disease
Authors: Petra Balla, Gabor Manhertz, Akos Antal
Abstract:
Nowadays spinal deformities are very frequent problems among teenagers. Scheuermann disease is a one dimensional deformity of the spine, but it has prevalence over 11% of the children. A traditional technology, the moiré method was used by us for screening and diagnosing this type of spinal deformity. A LabVIEW program has been developed to evaluate the moiré pictures of patients with Scheuermann disease. Two different solutions were tested in this computer program, the extreme and the inflexion point calculation methods. Effects using these methods were compared and according to the results both solutions seemed to be appropriate. Statistical results showed better efficiency in case of the extreme search method where the average difference was only 6,09⁰.Keywords: spinal deformity, picture evaluation, Moiré method, Scheuermann disease, curve detection, Moiré topography
Procedia PDF Downloads 3521720 A Spectrophotometric Method for the Determination of Folic Acid - A Vitamin B9 in Pharmaceutical Dosage Samples
Authors: Chand Pasha, Yasser Turki Alharbi, Krasamira Stancheva
Abstract:
A simple spectrophotometric method for the determination of folic acid in pharmaceutical dosage samples was developed. The method is based on the diazotization reaction of thiourea with sodium nitrite in acidic medium yields diazonium compounds, which is then coupled with folic acid in basic medium yields yellow coloured azo dyes. Beer’s Lamberts law is observed in the range 0.5 – 16.2 μgmL-1 at a maximum wavelength of 416nm. The molar absorbtivity, sandells sensitivity, linear regression equation and detection limit and quantitation limit were found to be 5.695×104 L mol-1cm-1, 7.752×10-3 g cm-2, y= 0.092x - 0.018, 0.687 g mL-1 and 2.083 g mL-1. This method successfully determined Folate in Pharmaceutical formulations.Keywords: folic acid determination, spectrophotometry, diazotization, thiourea, pharmaceutical dosage samples
Procedia PDF Downloads 761719 A Method for Quantifying Arsenolipids in Sea Water by HPLC-High Resolution Mass Spectrometry
Authors: Muslim Khan, Kenneth B. Jensen, Kevin A. Francesconi
Abstract:
Trace amounts (ca 1 µg/L, 13 nM) of arsenic are present in sea water mostly as the oxyanion arsenate. In contrast, arsenic is present in marine biota (animals and algae) at very high levels (up to100,000 µg/kg) a significant portion of which is present as lipid-soluble compounds collectively termed arsenolipids. The complex nature of sea water presents an analytical challenge to detect trace compounds and monitor their environmental path. We developed a simple method using liquid-liquid extraction combined with HPLC-High Resolution Mass Spectrometer capable of detecting trace of arsenolipids (99 % of the sample matrix while recovering > 80 % of the six target arsenolipids with limit of detection of 0.003 µg/L.)Keywords: arsenolipids, sea water, HPLC-high resolution mass spectrometry
Procedia PDF Downloads 3661718 Automatic Threshold Search for Heat Map Based Feature Selection: A Cancer Dataset Analysis
Authors: Carlos Huertas, Reyes Juarez-Ramirez
Abstract:
Public health is one of the most critical issues today; therefore, there is great interest to improve technologies in the area of diseases detection. With machine learning and feature selection, it has been possible to aid the diagnosis of several diseases such as cancer. In this work, we present an extension to the Heat Map Based Feature Selection algorithm, this modification allows automatic threshold parameter selection that helps to improve the generalization performance of high dimensional data such as mass spectrometry. We have performed a comparison analysis using multiple cancer datasets and compare against the well known Recursive Feature Elimination algorithm and our original proposal, the results show improved classification performance that is very competitive against current techniques.Keywords: biomarker discovery, cancer, feature selection, mass spectrometry
Procedia PDF Downloads 3381717 Automated Detection of Related Software Changes by Probabilistic Neural Networks Model
Authors: Yuan Huang, Xiangping Chen, Xiaonan Luo
Abstract:
Current software are continuously updating. The change between two versions usually involves multiple program entities (e.g., packages, classes, methods, attributes) with multiple purposes (e.g., changed requirements, bug fixing). It is hard for developers to understand which changes are made for the same purpose. Whether two changes are related is not decided by the relationship between this two entities in the program. In this paper, we summarized 4 coupling rules(16 instances) and 4 state-combination types at the class, method and attribute levels for software change. Related Change Vector (RCV) are defined based on coupling rules and state-combination types, and applied to classify related software changes by using Probabilistic Neural Network during a software updating.Keywords: PNN, related change, state-combination, logical coupling, software entity
Procedia PDF Downloads 4371716 Analysis of Nonlinear and Non-Stationary Signal to Extract the Features Using Hilbert Huang Transform
Authors: A. N. Paithane, D. S. Bormane, S. D. Shirbahadurkar
Abstract:
It has been seen that emotion recognition is an important research topic in the field of Human and computer interface. A novel technique for Feature Extraction (FE) has been presented here, further a new method has been used for human emotion recognition which is based on HHT method. This method is feasible for analyzing the nonlinear and non-stationary signals. Each signal has been decomposed into the IMF using the EMD. These functions are used to extract the features using fission and fusion process. The decomposition technique which we adopt is a new technique for adaptively decomposing signals. In this perspective, we have reported here potential usefulness of EMD based techniques.We evaluated the algorithm on Augsburg University Database; the manually annotated database.Keywords: intrinsic mode function (IMF), Hilbert-Huang transform (HHT), empirical mode decomposition (EMD), emotion detection, electrocardiogram (ECG)
Procedia PDF Downloads 5801715 Risks beyond Cyber in IoT Infrastructure and Services
Authors: Mattias Bergstrom
Abstract:
Significance of the Study: This research will provide new insights into the risks with digital embedded infrastructure. Through this research, we will analyze each risk and its potential negation strategies, especially for AI and autonomous automation. Moreover, the analysis that is presented in this paper will convey valuable information for future research that can create more stable, secure, and efficient autonomous systems. To learn and understand the risks, a large IoT system was envisioned, and risks with hardware, tampering, and cyberattacks were collected, researched, and evaluated to create a comprehensive understanding of the potential risks. Potential solutions have then been evaluated on an open source IoT hardware setup. This list shows the identified passive and active risks evaluated in the research. Passive Risks: (1) Hardware failures- Critical Systems relying on high rate data and data quality are growing; SCADA systems for infrastructure are good examples of such systems. (2) Hardware delivers erroneous data- Sensors break, and when they do so, they don’t always go silent; they can keep going, just that the data they deliver is garbage, and if that data is not filtered out, it becomes disruptive noise in the system. (3) Bad Hardware injection- Erroneous generated sensor data can be pumped into a system by malicious actors with the intent to create disruptive noise in critical systems. (4) Data gravity- The weight of the data collected will affect Data-Mobility. (5) Cost inhibitors- Running services that need huge centralized computing is cost inhibiting. Large complex AI can be extremely expensive to run. Active Risks: Denial of Service- It is one of the most simple attacks, where an attacker just overloads the system with bogus requests so that valid requests disappear in the noise. Malware- Malware can be anything from simple viruses to complex botnets created with specific goals, where the creator is stealing computer power and bandwidth from you to attack someone else. Ransomware- It is a kind of malware, but it is so different in its implementation that it is worth its own mention. The goal with these pieces of software is to encrypt your system so that it can only be unlocked with a key that is held for ransom. DNS spoofing- By spoofing DNS calls, valid requests and data dumps can be sent to bad destinations, where the data can be extracted for extortion or to corrupt and re-inject into a running system creating a data echo noise loop. After testing multiple potential solutions. We found that the most prominent solution to these risks was to use a Peer 2 Peer consensus algorithm over a blockchain to validate the data and behavior of the devices (sensors, storage, and computing) in the system. By the devices autonomously policing themselves for deviant behavior, all risks listed above can be negated. In conclusion, an Internet middleware that provides these features would be an easy and secure solution to any future autonomous IoT deployments. As it provides separation from the open Internet, at the same time, it is accessible over the blockchain keys.Keywords: IoT, security, infrastructure, SCADA, blockchain, AI
Procedia PDF Downloads 1071714 Simulation of Forest Fire Using Wireless Sensor Network
Authors: Mohammad F. Fauzi, Nurul H. Shahba M. Shahrun, Nurul W. Hamzah, Mohd Noah A. Rahman, Afzaal H. Seyal
Abstract:
In this paper, we proposed a simulation system using Wireless Sensor Network (WSN) that will be distributed around the forest for early forest fire detection and to locate the areas affected. In Brunei Darussalam, approximately 78% of the nation is covered by forest. Since the forest is Brunei’s most precious natural assets, it is very important to protect and conserve our forest. The hot climate in Brunei Darussalam can lead to forest fires which can be a fatal threat to the preservation of our forest. The process consists of getting data from the sensors, analyzing the data and producing an alert. The key factors that we are going to analyze are the surrounding temperature, wind speed and wind direction, humidity of the air and soil.Keywords: forest fire monitor, humidity, wind direction, wireless sensor network
Procedia PDF Downloads 4541713 Radio Based Location Detection
Authors: M. Pallikonda Rajasekaran, J. Joshapath, Abhishek Prasad Shaw
Abstract:
Various techniques has been employed to find location such as GPS, GLONASS, Galileo, and Beidou (compass). This paper currently deals with finding location using the existing FM signals that operates between 88-108 MHz. The location can be determined based on the received signal strength of nearby existing FM stations by mapping the signal strength values using trilateration concept. Thus providing security to users data and maintains eco-friendly environment at zero installation cost as this technology already existing FM stations operating in commercial FM band 88-108 MHZ. Along with the signal strength based trilateration it also finds azimuthal angle of the transmitter by employing directional antenna like Yagi-Uda antenna at the receiver side.Keywords: location, existing FM signals, received signal strength, trilateration, security, eco-friendly, direction, privacy, zero installation cost
Procedia PDF Downloads 5191712 A Proposed Approach for Emotion Lexicon Enrichment
Authors: Amr Mansour Mohsen, Hesham Ahmed Hassan, Amira M. Idrees
Abstract:
Document Analysis is an important research field that aims to gather the information by analyzing the data in documents. As one of the important targets for many fields is to understand what people actually want, sentimental analysis field has been one of the vital fields that are tightly related to the document analysis. This research focuses on analyzing text documents to classify each document according to its opinion. The aim of this research is to detect the emotions from text documents based on enriching the lexicon with adapting their content based on semantic patterns extraction. The proposed approach has been presented, and different experiments are applied by different perspectives to reveal the positive impact of the proposed approach on the classification results.Keywords: document analysis, sentimental analysis, emotion detection, WEKA tool, NRC lexicon
Procedia PDF Downloads 442