Search results for: network intrusion prevention
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 6289

Search results for: network intrusion prevention

3919 Tourism as Economic Resource for Protecting the Landscape: Introducing Touristic Initiatives in Coastal Protected Areas of Albania

Authors: Enrico Porfido

Abstract:

The paper aims to investigate the relation between landscape and tourism, with a special focus on coastal protected areas of Albania. The relationship between tourism and landscape is bijective: There is no tourism without landscape attractive features and on the other side landscape needs economic resources to be conserved and protected. The survival of each component is strictly related to the other one. Today, the Albanian protected areas appear as isolated islands, too far away from each other to build an efficient network and to avoid waste in terms of energy, economy and working force. This study wants to stress out the importance of cooperation in terms of common strategies and the necessity of introducing a touristic sustainable model in Albania. Comparing the protection system laws of the neighbor countries of the Adriatic-Ionian region and through a desk review on the best practices of protected areas that benefit from touristic activities, the study proposes the creation of the Albanian Riviera Landscape Park. This action will impact positively the whole southern Albania territory, introducing a sustainable tourism network that aims to valorize the local heritage and to stop the coastal exploitation processes. The main output is the definition of future development scenarios in Albania with the establishment of new protected areas and the introduction of touristic initiatives.

Keywords: Adriatic-Ionian region, protected areas, tourism for landscape, sustainable tourism

Procedia PDF Downloads 274
3918 Dynamic Risk Model for Offshore Decommissioning Using Bayesian Belief Network

Authors: Ahmed O. Babaleye, Rafet E. Kurt

Abstract:

The global oil and gas industry is beginning to witness an increase in the number of installations moving towards decommissioning. Decommissioning of offshore installations is a complex, costly and hazardous activity, making safety one of the major concerns. Among existing removal options, complete and partial removal options pose the highest risks. Therefore, a dynamic risk model of the accidents from the two options is important to assess the risks on an overall basis. In this study, a risk-based safety model is developed to conduct quantitative risk analysis (QRA) for jacket structure systems failure. Firstly, bow-tie (BT) technique is utilised to model the causal relationship between the system failure and potential accident scenarios. Subsequently, to relax the shortcomings of BT, Bayesian Belief Networks (BBNs) were established to dynamically assess associated uncertainties and conditional dependencies. The BBN is developed through a similitude mapping of the developed bow-tie. The BBN is used to update the failure probabilities of the contributing elements through diagnostic analysis, thus, providing a case-specific and realistic safety analysis method when compared to a bow-tie. This paper presents the application of dynamic safety analysis to guide the allocation of risk control measures and consequently, drive down the avoidable cost of remediation.

Keywords: Bayesian belief network, offshore decommissioning, dynamic safety model, quantitative risk analysis

Procedia PDF Downloads 276
3917 A Delphi Study to Build Consensus for Tuberculosis Control Guideline to Achieve Who End Tb 2035 Strategy

Authors: Pui Hong Chung, Cyrus Leung, Jun Li, Kin On Kwok, Ek Yeoh

Abstract:

Introduction: Studies for TB control in intermediate tuberculosis burden countries (IBCs) comprise a relatively small proportion in TB control literature, as compared to the effort put in high and low burden counterparts. It currently lacks of consensus in the optimal weapons and strategies we can use to combat TB in IBCs; guidelines of TB control are inadequate and thus posing a great obstacle in eliminating TB in these countries. To fill-in the research and services gap, we need to summarize the findings of the effort in this regard and to seek consensus in terms of policy making for TB control, we have devised a series of scoping and Delphi studies for these purposes. Method: The scoping and Delphi studies are conducted in parallel to feed information for each other. Before the Delphi iterations, we have invited three local experts in TB control in Hong Kong to participate in the pre-assessment round of the Delphi study to comments on the validity, relevance, and clarity of the Delphi questionnaire. Result: Two scoping studies, regarding LTBI control in health care workers in IBCs and TB control in elderly of IBCs respectively, have been conducted. The result of these two studies is used as the foundation for developing the Delphi questionnaire, which tapped on seven areas of question, namely: characteristics of IBCs, adequacy of research and services in LTBI control in IBCs, importance and feasibility of interventions for TB control and prevention in hospital, screening and treatment of LTBI in community, reasons of refusal to/ default from LTBI treatment, medical adherence of LTBI treatment, and importance and feasibility of interventions for TB control and prevention in elderly in IBCs. The local experts also commented on the two scoping studies conducted, thus act as the sixth phase of expert consultation in Arksey and O’Malley framework of scoping studies, to either nourish the scope and strategies used in these studies or to supplement ideas for further scoping or systematic review studies. In the subsequent stage, an international expert panel, comprised of 15 to 20 experts from IBCs in Western Pacific Region, will be recruited to join the two-round anonymous Delphi iterations. Four categories of TB control experts, namely clinicians, policy makers, microbiologists/ laboratory personnel, and public health clinicians will be our target groups. A consensus level of 80% is used to determine the achievement of consensus on particular issues. Key messages: 1. Scoping review and Delphi method are useful to identify gaps and then achieve consensus in research. 2. Lots of resources are put in the high burden countries now. However, the usually neglected intermediate-burden countries with TB is an indispensable part for achieving the ambitious WHO End TB 2035 target.

Keywords: dephi questionnaire, tuberculosis, WHO, latent TB infection

Procedia PDF Downloads 292
3916 Offset Dependent Uniform Delay Mathematical Optimization Model for Signalized Traffic Network Using Differential Evolution Algorithm

Authors: Tahseen Saad, Halim Ceylan, Jonathan Weaver, Osman Nuri Çelik, Onur Gungor Sahin

Abstract:

A new concept of uniform delay offset dependent mathematical optimization problem is derived as the main objective for this study using a differential evolution algorithm. To control the coordination problem, which depends on offset selection and to estimate uniform delay based on the offset choice in a traffic signal network. The assumption is the periodic sinusoidal function for arrival and departure patterns. The cycle time is optimized at the entry links and the optimized value is used in the non-entry links as a common cycle time. The offset optimization algorithm is used to calculate the uniform delay at each link. The results are illustrated by using a case study and are compared with the canonical uniform delay model derived by Webster and the highway capacity manual’s model. The findings show new model minimizes the total uniform delay to almost half compared to conventional models. The mathematical objective function is robust. The algorithm convergence time is fast.

Keywords: area traffic control, traffic flow, differential evolution, sinusoidal periodic function, uniform delay, offset variable

Procedia PDF Downloads 271
3915 Competitive Adsorption of Al, Ga and In by Gamma Irradiation Induced Pectin-Acrylamide-(Vinyl Phosphonic Acid) Hydrogel

Authors: Md Murshed Bhuyan, Hirotaka Okabe, Yoshiki Hidaka, Kazuhiro Hara

Abstract:

Pectin-Acrylamide- (Vinyl Phosphonic Acid) Hydrogels were prepared from their blend by using gamma radiation of various doses. It was found that the gel fraction of hydrogel increases with increasing the radiation dose reaches a maximum and then started decreasing with increasing the dose. The optimum radiation dose and the composition of raw materials were determined on the basis of equilibrium swelling which resulted in 20 kGy absorbed dose and 1:2:4 (Pectin:AAm:VPA) composition. Differential scanning calorimetry reveals the gel strength for using them as the adsorbent. The FTIR-spectrum confirmed the grafting/ crosslinking of the monomer on the backbone of pectin chain. The hydrogels were applied in adsorption of Al, Ga, and In from multielement solution where the adsorption capacity order for those three elements was found as – In>Ga>Al. SEM images of hydrogels and metal adsorbed hydrogels indicate the gel network and adherence of the metal ions in the interpenetrating network of the hydrogel which were supported by EDS spectra. The adsorption isotherm models were studied and found that the Langmuir adsorption isotherm model was well fitted with the data. Adsorption data were also fitted to different adsorption kinetic and diffusion models. Desorption of metal adsorbed hydrogels was performed in 5% nitric acid where desorption efficiency was found around 90%.

Keywords: hydrogel, gamma radiation, vinyl phosphonic acid, metal adsorption

Procedia PDF Downloads 149
3914 Elimination of Mother to Child Transmission of HIV/AIDS: A Study of the Knowledge, Attitudes and Perceptions of Healthcare Workers in Abuja Nigeria

Authors: Ezinne K. Okoro, Takahiko Katoh, Yoko Kawamura, Stanley C. Meribe

Abstract:

HIV infection in children is largely as a result of vertical transmission (mother to child transmission [MTCT]). Thus, elimination of mother to child transmission of HIV/AIDS is critical in eliminating HIV infection in children. In Nigeria, drawbacks such as; limited pediatric screening, limited human capital, insufficient advocacy and poor understanding of ART guidelines, have impacted efforts at combating the disease, even as treatment services are free. Prevention of Mother to Child Transmission (PMTCT) program relies on health workers who not only counsel pregnant women on first contact but can competently provide HIV-positive pregnant women with accurate information about the PMTCT program such as feeding techniques and drug adherence. In developing regions like Nigeria where health care delivery faces a lot of drawbacks, it becomes paramount to address these issues of poor PMTCT coverage by conducting a baseline assessment of the knowledge, practices and perceptions related to HIV prevention amongst healthcare workers in Nigeria. A descriptive cross-sectional study was conducted amongst 250 health workers currently employed in health facilities in Abuja, Nigeria where PMTCT services were offered with the capacity to carry out early infant diagnosis testing (EID). Data was collected using a self-administered, pretested, structured questionnaire. This study showed that the knowledge of PMTCT of HIV was poor (30%) among healthcare workers who offer this service day-to-day to pregnant women. When PMTCT practices were analyzed in keeping with National PMTCT guidelines, over 61% of the respondents reported observing standard practices and the majority (58%) had good attitudes towards caring for patients with HIV/AIDS. Although 61% of the respondents reported being satisfied with the quality of service being rendered, 63% reported not being satisfied with their level of knowledge. Predictors of good knowledge were job designation and level of educational attainment. Health workers who were more satisfied with their working conditions and those who had worked for a longer time in the PMTCT service were more likely to observe standard PMTCT practices. With over 62% of the healthcare workers suggesting that more training would improve the quality of service being rendered, this is a strong pointer to stakeholders to consider a ‘healthcare worker-oriented approach’ when planning and conducting PMTCT training for healthcare workers. This in turn will increase pediatric ARV coverage, the knowledge and effectiveness of the healthcare workers in carrying out appropriate PMTCT interventions and culminating in the reduction/elimination of HIV transmission to newborns.

Keywords: attitudes, HIV/AIDS, healthcare workers, knowledge, mother to child transmission, Nigeria, perceptions

Procedia PDF Downloads 199
3913 Reactive Transport Modeling in Carbonate Rocks: A Single Pore Model

Authors: Priyanka Agrawal, Janou Koskamp, Amir Raoof, Mariette Wolthers

Abstract:

Calcite is the main mineral found in carbonate rocks, which form significant hydrocarbon reservoirs and subsurface repositories for CO2 sequestration. The injected CO2 mixes with the reservoir fluid and disturbs the geochemical equilibrium, triggering calcite dissolution. Different combinations of fluid chemistry and injection rate may therefore result in different evolution of porosity, permeability and dissolution patterns. To model the changes in porosity and permeability Kozeny-Carman equation K∝〖(∅)〗^n is used, where K is permeability and ∅ is porosity. The value of n is mostly based on experimental data or pore network models. In pore network models, this derivation is based on accuracy of relation used for conductivity and pore volume change. In fact, at a single pore scale, this relationship is the result of the pore shape development due to dissolution. We have prepared a new reactive transport model for a single pore which simulates the complex chemical reaction of carbonic-acid induced calcite dissolution and subsequent pore-geometry evolution at a single pore scale. We use COMSOL Multiphysics package 5.3 for the simulation. COMSOL utilizes the arbitary-Lagrangian Eulerian (ALE) method for the free-moving domain boundary. We examined the effect of flow rate on the evolution of single pore shape profiles due to calcite dissolution. We used three flow rates to cover diffusion dominated and advection-dominated transport regimes. The fluid in diffusion dominated flow (Pe number 0.037 and 0.37) becomes less reactive along the pore length and thus produced non-uniform pore shapes. However, for the advection-dominated flow (Pe number 3.75), the fast velocity of the fluid keeps the fluid relatively more reactive towards the end of the pore length, thus yielding uniform pore shape. Different pore shapes in terms of inlet opening vs overall pore opening will have an impact on the relation between changing volumes and conductivity. We have related the shape of pore with the Pe number which controls the transport regimes. For every Pe number, we have derived the relation between conductivity and porosity. These relations will be used in the pore network model to get the porosity and permeability variation.

Keywords: single pore, reactive transport, calcite system, moving boundary

Procedia PDF Downloads 367
3912 Level of Awareness of Genetic Counselling in Benue State Nigeria: Its Advocacy on the Inheritance of Sickle Cell Disease

Authors: Agi Sunday

Abstract:

A descriptive analysis of reported cases of sickle cell disease and the level of awareness about genetic counselling in 30 hospitals were carried out. Additionally, 150 individuals between ages 16-45 were randomly selected for evaluation of genetic counselling awareness. The main tools for this study were questionnaires which were taken to hospitals, and individuals completed the others. The numbers of reported cases of sickle cell disease recorded in private, public and teaching hospitals were 14 and 57; 143 and 89; 272 and 57 for the periods of 1995-2000 and 2001-2005, respectively. A general informal genetic counselling took place mostly in the hospitals visited. 122 (86%) individuals had the knowledge of genetic disease and only 43 (30.3%) individuals have been exposed to genetic counselling. 64% of individuals agreed that genetic counselling would help in the prevention of genetic disease.

Keywords: sickle disease, genetic counseling, genetic testing, advocacy

Procedia PDF Downloads 383
3911 Design an Algorithm for Software Development in CBSE Envrionment Using Feed Forward Neural Network

Authors: Amit Verma, Pardeep Kaur

Abstract:

In software development organizations, Component based Software engineering (CBSE) is emerging paradigm for software development and gained wide acceptance as it often results in increase quality of software product within development time and budget. In component reusability, main challenges are the right component identification from large repositories at right time. The major objective of this work is to provide efficient algorithm for storage and effective retrieval of components using neural network and parameters based on user choice through clustering. This research paper aims to propose an algorithm that provides error free and automatic process (for retrieval of the components) while reuse of the component. In this algorithm, keywords (or components) are extracted from software document, after by applying k mean clustering algorithm. Then weights assigned to those keywords based on their frequency and after assigning weights, ANN predicts whether correct weight is assigned to keywords (or components) or not, otherwise it back propagates in to initial step (re-assign the weights). In last, store those all keywords into repositories for effective retrieval. Proposed algorithm is very effective in the error correction and detection with user base choice while choice of component for reusability for efficient retrieval is there.

Keywords: component based development, clustering, back propagation algorithm, keyword based retrieval

Procedia PDF Downloads 375
3910 An Automatic Speech Recognition of Conversational Telephone Speech in Malay Language

Authors: M. Draman, S. Z. Muhamad Yassin, M. S. Alias, Z. Lambak, M. I. Zulkifli, S. N. Padhi, K. N. Baharim, F. Maskuriy, A. I. A. Rahim

Abstract:

The performance of Malay automatic speech recognition (ASR) system for the call centre environment is presented. The system utilizes Kaldi toolkit as the platform to the entire library and algorithm used in performing the ASR task. The acoustic model implemented in this system uses a deep neural network (DNN) method to model the acoustic signal and the standard (n-gram) model for language modelling. With 80 hours of training data from the call centre recordings, the ASR system can achieve 72% of accuracy that corresponds to 28% of word error rate (WER). The testing was done using 20 hours of audio data. Despite the implementation of DNN, the system shows a low accuracy owing to the varieties of noises, accent and dialect that typically occurs in Malaysian call centre environment. This significant variation of speakers is reflected by the large standard deviation of the average word error rate (WERav) (i.e., ~ 10%). It is observed that the lowest WER (13.8%) was obtained from recording sample with a standard Malay dialect (central Malaysia) of native speaker as compared to 49% of the sample with the highest WER that contains conversation of the speaker that uses non-standard Malay dialect.

Keywords: conversational speech recognition, deep neural network, Malay language, speech recognition

Procedia PDF Downloads 318
3909 Polish Police in the Fight against Terrorism and Cyberterrorism

Authors: Izabela Nowicka, Jacek Dworzecki

Abstract:

The paper will be presented to selected legal and organizational solutions for the prevention and combating of terrorism by the police in Poland. Development will include information on the organization and functioning of the police anti-terrorist sub-units, whose officers are on the front line of the fight against terrorism. They will be presented to the conditions and cases of use of firearms by police officers in the course of special operations aimed against organizations and terrorist groups, and the perpetrators of criminal acts of terrorism as well as the legal foundation for the Polish police to take immediate counterterrorism operations. Article will be prepared in the context of an international research project entitled. Understand the Dimensions of Organised Crime and Terrorist Networks for Developing Effective and Efficient Security Solutions for First-line-practitioners and Professionals [Project: H2020-FCT-2015, No: 700688].

Keywords: the fight against terrorism, police, Poland, takedown

Procedia PDF Downloads 328
3908 An Energy Holes Avoidance Routing Protocol for Underwater Wireless Sensor Networks

Authors: A. Khan, H. Mahmood

Abstract:

In Underwater Wireless Sensor Networks (UWSNs), sensor nodes close to water surface (final destination) are often preferred for selection as forwarders. However, their frequent selection makes them depleted of their limited battery power. In consequence, these nodes die during early stage of network operation and create energy holes where forwarders are not available for packets forwarding. These holes severely affect network throughput. As a result, system performance significantly degrades. In this paper, a routing protocol is proposed to avoid energy holes during packets forwarding. The proposed protocol does not require the conventional position information (localization) of holes to avoid them. Localization is cumbersome; energy is inefficient and difficult to achieve in underwater environment where sensor nodes change their positions with water currents. Forwarders with the lowest water pressure level and the maximum number of neighbors are preferred to forward packets. These two parameters together minimize packet drop by following the paths where maximum forwarders are available. To avoid interference along the paths with the maximum forwarders, a packet holding time is defined for each forwarder. Simulation results reveal superior performance of the proposed scheme than the counterpart technique.

Keywords: energy holes, interference, routing, underwater

Procedia PDF Downloads 404
3907 Malware Beaconing Detection by Mining Large-scale DNS Logs for Targeted Attack Identification

Authors: Andrii Shalaginov, Katrin Franke, Xiongwei Huang

Abstract:

One of the leading problems in Cyber Security today is the emergence of targeted attacks conducted by adversaries with access to sophisticated tools. These attacks usually steal senior level employee system privileges, in order to gain unauthorized access to confidential knowledge and valuable intellectual property. Malware used for initial compromise of the systems are sophisticated and may target zero-day vulnerabilities. In this work we utilize common behaviour of malware called ”beacon”, which implies that infected hosts communicate to Command and Control servers at regular intervals that have relatively small time variations. By analysing such beacon activity through passive network monitoring, it is possible to detect potential malware infections. So, we focus on time gaps as indicators of possible C2 activity in targeted enterprise networks. We represent DNS log files as a graph, whose vertices are destination domains and edges are timestamps. Then by using four periodicity detection algorithms for each pair of internal-external communications, we check timestamp sequences to identify the beacon activities. Finally, based on the graph structure, we infer the existence of other infected hosts and malicious domains enrolled in the attack activities.

Keywords: malware detection, network security, targeted attack, computational intelligence

Procedia PDF Downloads 258
3906 Impact of Youth Corners and Knowledge about Human Sexuality among Young Adults and Adolescents of Nigerian Population in the Prevention of Sexually Transmitted Diseases

Authors: Gabriel I. Oke, Faremi O. Ayodeji

Abstract:

Background: Access to youth Friendly Health Corners is vital for ensuring sexual reproductive health and total well being of young Adults since human sexuality has been widely misunderstood. Meanwhile, behavior of young people towards it remains at variance with the alarm. This study attempt to access the impact of youth corners also called Adolescent Friendly Health Corners on manifestation of human sexual behavior among Nigerian adolescent and young adults. Description: Hundred young adults and adolescents of both sex between the Age range of 12-25years were randomly selected from 5 secondary schools and 3 prominent universities in Southwestern Nigeria and focal group discussions (FGD) were conducted among them. Fifty secondary and primary health facilities were visited between February and June 2017 to conduct interviews for health workers and to ascertain the presence or absence of youth corners. Results: 95% of the health facilities visited lack Youth Corners section neither are they willing to make provision for it due to lack of workmanship and sponsorship. However, 5% with Youth corners does not have well-trained Counselors or a Health Educator but health professionals from nursing profession. 90% of the respondents of which 16-17 years of Age is the mean age had their first sexual exposure with no use of protection even before been introduced to what Sexuality is all about. Virtually, none of the respondents had ever visited a Youth Corner before or heard the term before. 86% have heard about the term STI before of which 60% are using protection, 10% care less about any information attached to the term STI, 4% have not heard of the term STI before even when translated to their local dialect. 20% are abstaining as at the time the study was conducted and they attribute their sexual decision to religion and parental influence. Of the age group 20-25, 45% claimed they have had symptoms of one STI or the other and 40% claimed they have been tested positive for an STI before of which 12% have positive HIV status. Promiscuous behaviors were found among them before they reach the age 16years with pornography ranking the highest, followed by masturbation. Respondents blame this on peer pressure, the lack of Youth Friendly Centers in their locality and lack of proper Sexual Orientation on time. About half of the respondents make use of contraceptives while others have varying views. We found out that inability to access Youth Friendly Centers amongst the respondents might be one of the singular reasons of their early experimentation of their sex life and lack of healthy sexual lifestyle. (95% CI, P=0.922) Conclusion: The study reveals that a connection between youth Friendly Centers and Prevention of Sexually Transmitted Diseases, therefore more sustainable Friendly Youth Corners with well-trained educators are needed in various Health facilities to checkmate the numerous risks of Young People along the path of adulthood.

Keywords: adolescents, sexually transmitted infections, reproductive health, youth corners

Procedia PDF Downloads 222
3905 Exergy Analyses of Wind Turbine

Authors: Muhammad Abid

Abstract:

Utilization of renewable energy resources for energy conservation, pollution prevention, resource efficiency and systems integration is very important for sustainable development. In this study, we perform energy and exergy analyses of a wind turbine, located on the roof of Mechanical Engineering Department, King Saud University, and Riyadh, Saudi Arabia. The turbine is part of a hybrid photovoltaic (PV)-wind system with hydrogen storage. The power output from this turbine varies between 1.5 and 5.5 kW with a rated wind speed of 12 m/s and a cut-in wind speed of 2.4 m/s. We utilize a wide range of experimental data in the analysis and assessment. We determine energy and exergy efficiencies. The energy efficiency changes between 0% to 45% while the exergy efficiency varies between 0% and 31.3%. We also determined some of the exergoeconomic parameters that are the ratios of energy and exergy loss rates to the capital cost (R en and R ex), respectively. (R en) changes between 0.96% and 59.03% for different values of velocity while R ex has a maximum value of 53.62% for the highest wind speed.

Keywords: exergy, efficiency, performance evaluation, wind energy

Procedia PDF Downloads 361
3904 Laundering vs. Blanqueo: Translating Financial Crime Metaphors From English to Spanish

Authors: Stephen Gerome

Abstract:

This study examines the translation and use of metaphors in the realm of public safety discourse and intends to shed light on a continuing problem in cross-cultural communication. Metaphors can cause problems not only within languages but also in interlingual communication. The use and misuse of metaphors may hinder the ability to adequately communicate prevention efforts and, in some cases, facilitate and allow financial crime to go undetected. The use of lexicalized metaphors in communications by political entities, journalists, and legal agents in communications regarding law, policy making, compliance monitoring and enforcement as well as in adjudication can have negative consequences if misconstrued. This study provides examples of metaphor usage in published documents in a corpus linguistic study that compares the use of lexicalized metaphors in this discourse to shed light on possible unexpected consequences as well as counterproductive ones.

Keywords: translation, legal, corpus linguistics, financial

Procedia PDF Downloads 109
3903 Intelligent Transport System: Classification of Traffic Signs Using Deep Neural Networks in Real Time

Authors: Anukriti Kumar, Tanmay Singh, Dinesh Kumar Vishwakarma

Abstract:

Traffic control has been one of the most common and irritating problems since the time automobiles have hit the roads. Problems like traffic congestion have led to a significant time burden around the world and one significant solution to these problems can be the proper implementation of the Intelligent Transport System (ITS). It involves the integration of various tools like smart sensors, artificial intelligence, position technologies and mobile data services to manage traffic flow, reduce congestion and enhance driver's ability to avoid accidents during adverse weather. Road and traffic signs’ recognition is an emerging field of research in ITS. Classification problem of traffic signs needs to be solved as it is a major step in our journey towards building semi-autonomous/autonomous driving systems. The purpose of this work focuses on implementing an approach to solve the problem of traffic sign classification by developing a Convolutional Neural Network (CNN) classifier using the GTSRB (German Traffic Sign Recognition Benchmark) dataset. Rather than using hand-crafted features, our model addresses the concern of exploding huge parameters and data method augmentations. Our model achieved an accuracy of around 97.6% which is comparable to various state-of-the-art architectures.

Keywords: multiclass classification, convolution neural network, OpenCV

Procedia PDF Downloads 166
3902 The Awareness of Cardiovascular Diseases among General Population in Western Regions of Saudi Arabia

Authors: Ali Saeed Alghamdi, Basel Mazen Alsolami, Basel Saeed Alghamdi, Muhanad Saleh Alzahrani Alamri, Salman Anwar Thabet, Abdulhalim J. Kinsara

Abstract:

Objectives: This study measures the knowledge of the cardiovascular disease among the general population in western regions of Saudi Arabia, and it aimed to increase the level of awareness about cardiovascular diseases among the general population by providing an awareness lecture that included information about the risk factors, major symptoms, and prevention of cardiovascular diseases. The lecture has been attached at the end of the questionnaire. Setting: This study was conducted through an online questionnaire that included our aim and main objectives that targeted the general population in the Western regions of Saudi Arabia (Makkah and Madinah regions). Participants: This study participants were 460 collected through an online questionnaire. Methods: All Saudi citizens and residents who live in the western region of Saudi Arabia aged 18 years and above will be invited to participate voluntarily. A pre-structured questionnaire was designed to collect data on age, gender, marital status, education level, occupation, lifestyle habits, and history of heart diseases, with cardiac symptoms and risk factors sections. Results: The majority of respondents were females (74.8%) and Saudis. The knowledge about cardiovascular disease risk factors was weak. Only (18.5%) scores an excellent response regarding risk factors awareness. Lack of exercise, stress, and obesity were the most known risk factors. Regarding cardiovascular disease symptoms, chest pain scores the highest symptom (87.6%) among other symptoms like dyspnea, syncope, and excessive sweating. Participants revealed a poor awareness regarding cardiovascular disease symptoms also (0.9%). However, preventable factors for cardiovascular diseases were more knowledgeable than others categories in this study (60% fall into excellent knowledge). Smoking cessation, normal cholesterol level, and normal blood pressure score the highest preventable methods (92.2%), (88.6%), and (78.7%) respectively. 83.7% of the participant have attended the awareness lecture, and 99 of the attendees reported that the lecture increased their knowledge about cardiovascular disease. Conclusion: This study discussed the level of community awareness of cardiovascular disease in terms of symptoms, risk factors, and protective factors. We found a huge lack of the participant's level of knowledge about the disease and how to prevent it. Moreover, we measure the prevalence of the comorbidities among our participants (diabetes, hypertension, hypercholesterolemia/ hypertriglyceridemia) and their extent of adherence to their medication. In conclusion, this study not only demonstrates awareness of cardiovascular disease risk factors, symptoms, management, and the association between each domain but also provides educational material. Further educational material and campaigns are required to increase awareness and knowledge about cardiovascular diseases.

Keywords: awareness, cardiovascular diseases, education, prevention, risk factors

Procedia PDF Downloads 123
3901 The Effects of Grape Waste Bioactive Compounds on the Immune Response and Oxidative Stress in Pig Kidney

Authors: Mihai Palade, Gina Cecilia Pistol, Mariana Stancu, Veronica Chedea, Ionelia Taranu

Abstract:

Nutrition is an important determinant of general health status, with especially focus on prevention and/or attenuation of the inflammatory-associated pathologies. People with chronic kidney disease can experience chronic inflammation that can lead to cardiovascular disease and even an increased rate of death. There are important links between chronic kidney diseases, inflammation and nutritional strategies that may prevent or protect against undesirable inflammation and oxidative stress. The grape by-products either seeds or pomace are rich in polyphenols which may be beneficial in prevention of inflammatory, antioxidant and antimicrobial processes. As a model for studying the impact of grape seeds on renal inflammation and oxidative stress, we used in this study weaned piglets. After a feeding trial of 30 days with a control diet and an experimental diet containing 5% grape seed (GS), kidney samples were collected. In renal tissues were determined the expression and activity of important markers of immune respose and oxidative stress: pro-inflammatory cytokines (TNF-alpha, IL-1 beta, IL-6, IL-8, IFN-gamma), anti-inflammatory cytokines (IL-4, IL-10), anti-oxidant enzymes (catalase CAT, superoxide dismutase SOD, glutathione peroxidise GPx) and important mediators belonging to nuclear receptors (NF-kB1, Nrf-2 and PPAR-gamma). Gene expression was evaluated by qPCR, whereas protein concentration was determined using proteomic techniques (ELISA). The activity of anti-oxidant enzymes was determined using specific kits. Our results showed that GS enriched in polyphenols does not have effect on TNF-alpha, IL-6 and IL-1 beta gene expression and protein concentration in kidney. By contrast, the gene expression and protein level of IL-8 and IFN-gamma were decreased in GS kidney. Anti-inflammatory cytokines IL-4 and IL-10 gene levels were increased in kidneys collected from GS piglets in comparison with controls, with no modification of protein levels between the two groups. The activities of anti-oxidant enzymes CAT and GPx were increased in kidney by GS, whereas SOD activity was unmodified in comparison with control samples. Also, the GS diet was associated with no modulation of mRNAs for nuclear receptors NF-kB1, Nrf-2 and PPAR-gamma gene expressions in kidneys. In conclusion, our results demonstrated that GS enriched in bioactive compounds such polyphenols could modulate inflammation and oxidative stress markers in kidney tissues. Further studies are necessary to elucidate the mechanism of action of GS compounds in case kidney inflammation associated with oxidative stress, and signalling molecules involved in these mechanisms.

Keywords: animal model, kidney inflammation, oxidative stress, grape seed

Procedia PDF Downloads 289
3900 SCNet: A Vehicle Color Classification Network Based on Spatial Cluster Loss and Channel Attention Mechanism

Authors: Fei Gao, Xinyang Dong, Yisu Ge, Shufang Lu, Libo Weng

Abstract:

Vehicle color recognition plays an important role in traffic accident investigation. However, due to the influence of illumination, weather, and noise, vehicle color recognition still faces challenges. In this paper, a vehicle color classification network based on spatial cluster loss and channel attention mechanism (SCNet) is proposed for vehicle color recognition. A channel attention module is applied to extract the features of vehicle color representative regions and reduce the weight of nonrepresentative color regions in the channel. The proposed loss function, called spatial clustering loss (SC-loss), consists of two channel-specific components, such as a concentration component and a diversity component. The concentration component forces all feature channels belonging to the same class to be concentrated through the channel cluster. The diversity components impose additional constraints on the channels through the mean distance coefficient, making them mutually exclusive in spatial dimensions. In the comparison experiments, the proposed method can achieve state-of-the-art performance on the public datasets, VCD, and VeRi, which are 96.1% and 96.2%, respectively. In addition, the ablation experiment further proves that SC-loss can effectively improve the accuracy of vehicle color recognition.

Keywords: feature extraction, convolutional neural networks, intelligent transportation, vehicle color recognition

Procedia PDF Downloads 170
3899 Control of an Outbreak of Vancomycin-Resistant Enterococci in a Tunisian Teaching Hospital

Authors: Hela Ghali, Sihem Ben Fredj, Mohamed Ben Rejeb, Sawssen Layouni, Salwa Khefacha, Lamine Dhidah, Houyem Said Laatiri

Abstract:

Background: Antimicrobial resistance is a growing threat to public health and motivates to improve prevention and control programs both at international (WHO) and national levels. Despite their low pathogenicity, vancomycin-resistant enterococci (VRE) are common nosocomial pathogens in several countries. The high potential for transmission of VRE between patients and the threat to send its resistance genes to other bacteria such as staphylococcus aureus already resistant to meticilin, justify strict control measures. Indeed, in Europe, the proportion of Enterococcus faecium responsible for invasive infections, varies from 1% to 35% in 2011 and less than 5% were resistant to vancomycin. In addition, it represents the second cause of urinary tract and wound infections and the third cause of nosocomial bacteremia in the United States. The nosocomial outbreaks of VRE have been mainly described in intensive care services, hematology-oncology and haemodialysis. An epidemic of VRE has affected our hospital and the objective of this work is to describe the measures put in place. Materials/Methods: Following the alert given by the service of plastic surgery concerning a patient carrier of VRE, a team of the prevention and healthcare security service (doctor + technician) made an investigation. A review of files was conducted to draw the synoptic table and the table of cases. Results: By contacting the microbiology laboratory, we have identified four other cases of VRE and who were hospitalized in Medical resuscitation department (2 cases, one of them was transferred to the Physical rehabilitation department), and Nephrology department (2 cases). The visit has allowed to detect several malfunctions in professional practice. A crisis cell has allowed to validate, coordinate and implement control measures following the recommendations of the Technical Center of nosocomial infections. In fact, the process was to technically isolate cases in their sector of hospitalization, to restrict the use of antibiotics, to strength measures of basic hygiene, and to make a screening by rectal swab for both cases and contacts (other patients and health staff). These measures have helped to control the situation and no other case has been reported for a month. 2 new cases have been detected in the intensive care unit after a month. However, these are short-term strategies, and other measures in the medium and long term should be taken into account in order to face similar outbreaks. Conclusion: The efforts to control the outbreak were not efficient since 2 new cases have been reported after a month. Therefore, a continuous monitoring in order to detect new cases earlier is crucial to minimize the dissemination of VRE.

Keywords: hospitals, nosocomial infection, outbreak, vancomycin-resistant enterococci

Procedia PDF Downloads 293
3898 Elucidation of the Sequential Transcriptional Activity in Escherichia coli Using Time-Series RNA-Seq Data

Authors: Pui Shan Wong, Kosuke Tashiro, Satoru Kuhara, Sachiyo Aburatani

Abstract:

Functional genomics and gene regulation inference has readily expanded our knowledge and understanding of gene interactions with regards to expression regulation. With the advancement of transcriptome sequencing in time-series comes the ability to study the sequential changes of the transcriptome. This method presented here works to augment existing regulation networks accumulated in literature with transcriptome data gathered from time-series experiments to construct a sequential representation of transcription factor activity. This method is applied on a time-series RNA-Seq data set from Escherichia coli as it transitions from growth to stationary phase over five hours. Investigations are conducted on the various metabolic activities in gene regulation processes by taking advantage of the correlation between regulatory gene pairs to examine their activity on a dynamic network. Especially, the changes in metabolic activity during phase transition are analyzed with focus on the pagP gene as well as other associated transcription factors. The visualization of the sequential transcriptional activity is used to describe the change in metabolic pathway activity originating from the pagP transcription factor, phoP. The results show a shift from amino acid and nucleic acid metabolism, to energy metabolism during the transition to stationary phase in E. coli.

Keywords: Escherichia coli, gene regulation, network, time-series

Procedia PDF Downloads 366
3897 Wireless Sensor Network for Forest Fire Detection and Localization

Authors: Tarek Dandashi

Abstract:

WSNs may provide a fast and reliable solution for the early detection of environment events like forest fires. This is crucial for alerting and calling for fire brigade intervention. Sensor nodes communicate sensor data to a host station, which enables a global analysis and the generation of a reliable decision on a potential fire and its location. A WSN with TinyOS and nesC for the capturing and transmission of a variety of sensor information with controlled source, data rates, duration, and the records/displaying activity traces is presented. We propose a similarity distance (SD) between the distribution of currently sensed data and that of a reference. At any given time, a fire causes diverging opinions in the reported data, which alters the usual data distribution. Basically, SD consists of a metric on the Cumulative Distribution Function (CDF). SD is designed to be invariant versus day-to-day changes of temperature, changes due to the surrounding environment, and normal changes in weather, which preserve the data locality. Evaluation shows that SD sensitivity is quadratic versus an increase in sensor node temperature for a group of sensors of different sizes and neighborhood. Simulation of fire spreading when ignition is placed at random locations with some wind speed shows that SD takes a few minutes to reliably detect fires and locate them. We also discuss the case of false negative and false positive and their impact on the decision reliability.

Keywords: forest fire, WSN, wireless sensor network, algortihm

Procedia PDF Downloads 258
3896 Remote Assessment and Change Detection of GreenLAI of Cotton Crop Using Different Vegetation Indices

Authors: Ganesh B. Shinde, Vijaya B. Musande

Abstract:

Cotton crop identification based on the timely information has significant advantage to the different implications of food, economic and environment. Due to the significant advantages, the accurate detection of cotton crop regions using supervised learning procedure is challenging problem in remote sensing. Here, classifiers on the direct image are played a major role but the results are not much satisfactorily. In order to further improve the effectiveness, variety of vegetation indices are proposed in the literature. But, recently, the major challenge is to find the better vegetation indices for the cotton crop identification through the proposed methodology. Accordingly, fuzzy c-means clustering is combined with neural network algorithm, trained by Levenberg-Marquardt for cotton crop classification. To experiment the proposed method, five LISS-III satellite images was taken and the experimentation was done with six vegetation indices such as Simple Ratio, Normalized Difference Vegetation Index, Enhanced Vegetation Index, Green Atmospherically Resistant Vegetation Index, Wide-Dynamic Range Vegetation Index, Green Chlorophyll Index. Along with these indices, Green Leaf Area Index is also considered for investigation. From the research outcome, Green Atmospherically Resistant Vegetation Index outperformed with all other indices by reaching the average accuracy value of 95.21%.

Keywords: Fuzzy C-Means clustering (FCM), neural network, Levenberg-Marquardt (LM) algorithm, vegetation indices

Procedia PDF Downloads 310
3895 The Importance of Electronic Medical Record Systems in Health Care Economics

Authors: Mutaz Shurahabeel Ahmed Ombada

Abstract:

This paper investigates potential health and financial settlement of health information technology, this paper evaluates health care with the use of IT and other associated industries. It assesses prospective savings and costs of extensive acceptance of Electronic Medical Record Systems (EMRS), models significant to health as well as safety remuneration, and conclude that efficient EMRS execution and networking could ultimately save more than US $55 billion annually through recuperating health care effectiveness and that Health Information Technology -enabled prevention and administration of chronic disease could eventually double those savings while rising health and other social remuneration. On the contrary, this is improbable to be realized without related to significant modifications to the health care system.

Keywords: electronic medical record systems, health care economics, EMRS

Procedia PDF Downloads 556
3894 Optimal Placement of the Unified Power Controller to Improve the Power System Restoration

Authors: Mohammad Reza Esmaili

Abstract:

One of the most important parts of the restoration process of a power network is the synchronizing of its subsystems. In this situation, the biggest concern of the system operators will be the reduction of the standing phase angle (SPA) between the endpoints of the two islands. In this regard, the system operators perform various actions and maneuvers so that the synchronization operation of the subsystems is successfully carried out and the system finally reaches acceptable stability. The most common of these actions include load control, generation control and, in some cases, changing the network topology. Although these maneuvers are simple and common, due to the weak network and extreme load changes, the restoration will be associated with low speed. One of the best ways to control the SPA is to use FACTS devices. By applying a soft control signal, these tools can reduce the SPA between two subsystems with more speed and accuracy, and the synchronization process can be done in less time. Meanwhile, the unified power controller (UPFC), a series-parallel compensator device with the change of transmission line power and proper adjustment of the phase angle, will be the proposed option in order to realize the subject of this research. Therefore, with the optimal placement of UPFC in a power system, in addition to improving the normal conditions of the system, it is expected to be effective in reducing the SPA during power system restoration. Therefore, the presented paper provides an optimal structure to coordinate the three problems of improving the division of subsystems, reducing the SPA and optimal power flow with the aim of determining the optimal location of UPFC and optimal subsystems. The proposed objective functions in this paper include maximizing the quality of the subsystems, reducing the SPA at the endpoints of the subsystems, and reducing the losses of the power system. Since there will be a possibility of creating contradictions in the simultaneous optimization of the proposed objective functions, the structure of the proposed optimization problem is introduced as a non-linear multi-objective problem, and the Pareto optimization method is used to solve it. The innovative technique proposed to implement the optimization process of the mentioned problem is an optimization algorithm called the water cycle (WCA). To evaluate the proposed method, the IEEE 39 bus power system will be used.

Keywords: UPFC, SPA, water cycle algorithm, multi-objective problem, pareto

Procedia PDF Downloads 58
3893 Bitcoin, Blockchain and Smart Contract: Attacks and Mitigations

Authors: Mohamed Rasslan, Doaa Abdelrahman, Mahmoud M. Nasreldin, Ghada Farouk, Heba K. Aslan

Abstract:

Blockchain is a distributed database that endorses transparency while bitcoin is a decentralized cryptocurrency (electronic cash) that endorses anonymity and is powered by blockchain technology. Smart contracts are programs that are stored on a blockchain. Smart contracts are executed when predetermined conditions are fulfilled. Smart contracts automate the agreement execution in order to make sure that all participants immediate-synchronism of the outcome-certainty, without any intermediary's involvement or time loss. Currently, the Bitcoin market worth billions of dollars. Bitcoin could be transferred from one purchaser to another without the need for an intermediary bank. Network nodes through cryptography verify bitcoin transactions, which are registered in a public-book called “blockchain”. Bitcoin could be replaced by other coins, merchandise, and services. Rapid growing of the bitcoin market-value, encourages its counterparts to make use of its weaknesses and exploit vulnerabilities for profit. Moreover, it motivates scientists to define known vulnerabilities, offer countermeasures, and predict future threats. In his paper, we study blockchain technology and bitcoin from the attacker’s point of view. Furthermore, mitigations for the attacks are suggested, and contemporary security solutions are discussed. Finally, research methods that achieve strict security and privacy protocol are elaborated.

Keywords: Cryptocurrencies, Blockchain, Bitcoin, Smart Contracts, Peer-to-Peer Network, Security Issues, Privacy Techniques

Procedia PDF Downloads 75
3892 Concealed Objects Detection in Visible, Infrared and Terahertz Ranges

Authors: M. Kowalski, M. Kastek, M. Szustakowski

Abstract:

Multispectral screening systems are becoming more popular because of their very interesting properties and applications. One of the most significant applications of multispectral screening systems is prevention of terrorist attacks. There are many kinds of threats and many methods of detection. Visual detection of objects hidden under clothing of a person is one of the most challenging problems of threats detection. There are various solutions of the problem; however, the most effective utilize multispectral surveillance imagers. The development of imaging devices and exploration of new spectral bands is a chance to introduce new equipment for assuring public safety. We investigate the possibility of long lasting detection of potentially dangerous objects covered with various types of clothing. In the article we present the results of comparative studies of passive imaging in three spectrums – visible, infrared and terahertz

Keywords: terahertz, infrared, object detection, screening camera, image processing

Procedia PDF Downloads 351
3891 Electric Arc Furnaces as a Source of Voltage Fluctuations in the Power System

Authors: Zbigniew Olczykowski

Abstract:

The paper presents the impact of work on the electric arc furnace power grid. The arc furnace operating will be modeled at different power conditions of steelworks. The paper will describe how to determine the increase in voltage fluctuations caused by working in parallel arc furnaces. The analysis of indicators characterizing the quality of electricity recorded during several cycles of measurement made at the same time at three points grid, with different power and different short-circuit rated voltage, will be carried out. The measurements analysis presented in this paper were conducted in the mains of one of the Polish steel. The indicators characterizing the quality of electricity was recorded during several cycles of measurement while making measurements at three points of different power network short-circuit power and various voltage ratings. Measurements of power quality indices included the one-week measurement cycles in accordance with the EN-50160. Data analysis will include the results obtained during the simultaneous measurement of three-point grid. This will determine the actual propagation of interference generated by the device. Based on the model studies and measurements of quality indices of electricity we will establish the effect of a specific arc on the mains. The short-circuit power network’s minimum value will also be estimated, this is necessary to limit the voltage fluctuations generated by arc furnaces.

Keywords: arc furnaces, long-term flicker, measurement and modeling of power quality, voltage fluctuations

Procedia PDF Downloads 282
3890 Getting It Right Before Implementation: Using Simulation to Optimize Recommendations and Interventions After Adverse Event Review

Authors: Melissa Langevin, Natalie Ward, Colleen Fitzgibbons, Christa Ramsey, Melanie Hogue, Anna Theresa Lobos

Abstract:

Description: Root Cause Analysis (RCA) is used by health care teams to examine adverse events (AEs) to identify causes which then leads to recommendations for prevention Despite widespread use, RCA has limitations. Best practices have not been established for implementing recommendations or tracking the impact of interventions after AEs. During phase 1 of this study, we used simulation to analyze two fictionalized AEs that occurred in hospitalized paediatric patients to identify and understand how the errors occurred and generated recommendations to mitigate and prevent recurrences. Scenario A involved an error of commission (inpatient drug error), and Scenario B involved detecting an error that already occurred (critical care drug infusion error). Recommendations generated were: improved drug labeling, specialized drug kids, alert signs and clinical checklists. Aim: Use simulation to optimize interventions recommended post critical event analysis prior to implementation in the clinical environment. Methods: Suggested interventions from Phase 1 were designed and tested through scenario simulation in the clinical environment (medicine ward or pediatric intensive care unit). Each scenario was simulated 8 times. Recommendations were tested using different, voluntary teams and each scenario was debriefed to understand why the error was repeated despite interventions and how interventions could be improved. Interventions were modified with subsequent simulations until recommendations were felt to have an optimal effect and data saturation was achieved. Along with concrete suggestions for design and process change, qualitative data pertaining to employee communication and hospital standard work was collected and analyzed. Results: Each scenario had a total of three interventions to test. In, scenario 1, the error was reproduced in the initial two iterations and mitigated following key intervention changes. In scenario 2, the error was identified immediately in all cases where the intervention checklist was utilized properly. Independently of intervention changes and improvements, the simulation was beneficial to identify which of these should be prioritized for implementation and highlighted that even the potential solutions most frequently suggested by participants did not always translate into error prevention in the clinical environment. Conclusion: We conclude that interventions that help to change process (epinephrine kit or mandatory checklist) were more successful at preventing errors than passive interventions (signage, change in memory aids). Given that even the most successful interventions needed modifications and subsequent re-testing, simulation is key to optimizing suggested changes. Simulation is a safe, practice changing modality for institutions to use prior to implementing recommendations from RCA following AE reviews.

Keywords: adverse events, patient safety, pediatrics, root cause analysis, simulation

Procedia PDF Downloads 143