Search results for: intrusion detection/prevention system
21081 Advanced Driver Assistance System: Veibra
Authors: C. Fernanda da S. Sampaio, M. Gabriela Sadith Perez Paredes, V. Antonio de O. Martins
Abstract:
Today the transport sector is undergoing a revolution, with the rise of Advanced Driver Assistance Systems (ADAS), industry and society itself will undergo a major transformation. However, the technological development of these applications is a challenge that requires new techniques and great machine learning and artificial intelligence. The study proposes to develop a vehicular perception system called Veibra, which consists of two front cameras for day/night viewing and an embedded device capable of working with Yolov2 image processing algorithms with low computational cost. The strategic version for the market is to assist the driver on the road with the detection of day/night objects, such as road signs, pedestrians, and animals that will be viewed through the screen of the phone or tablet through an application. The system has the ability to perform real-time driver detection and recognition to identify muscle movements and pupils to determine if the driver is tired or inattentive, analyzing the student's characteristic change and following the subtle movements of the whole face and issuing alerts through beta waves to ensure the concentration and attention of the driver. The system will also be able to perform tracking and monitoring through GSM (Global System for Mobile Communications) technology and the cameras installed in the vehicle.Keywords: advanced driver assistance systems, tracking, traffic signal detection, vehicle perception system
Procedia PDF Downloads 15521080 AI-Based Technologies for Improving Patient Safety and Quality of Care
Authors: Tewelde Gebreslassie Gebreanenia, Frie Ayalew Yimam, Seada Hussen Adem
Abstract:
Patient safety and quality of care are essential goals of health care delivery, but they are often compromised by human errors, system failures, or resource constraints. In a variety of healthcare contexts, artificial intelligence (AI), a quickly developing field, can provide fresh approaches to enhancing patient safety and treatment quality. Artificial Intelligence (AI) has the potential to decrease errors and enhance patient outcomes by carrying out tasks that would typically require human intelligence. These tasks include the detection and prevention of adverse events, monitoring and warning patients and clinicians about changes in vital signs, symptoms, or risks, offering individualized and evidence-based recommendations for diagnosis, treatment, or prevention, and assessing and enhancing the effectiveness of health care systems and services. This study examines the state-of-the-art and potential future applications of AI-based technologies for enhancing patient safety and care quality, as well as the opportunities and problems they present for patients, policymakers, researchers, and healthcare providers. In order to ensure the safe, efficient, and responsible application of AI in healthcare, the paper also addresses the ethical, legal, social, and technical challenges that must be addressed and regulated.Keywords: artificial intelligence, health care, human intelligence, patient safty, quality of care
Procedia PDF Downloads 7921079 Integrating Concepts in Positive Psychology with Suicide Prevention in Children and Adolescents
Authors: S. Wietrzychowski
Abstract:
This systematic review incorporates concepts used in the field of positive psychology in order to integrate important elements into suicide prevention programs for children and adolescents. The goal of this review is to help students and professionals gain insight to available prevention programs for suicide and to incorporate aspects of positive psychology into these programs. Evidence-based interventions such as Positive Youth Development will be discussed in detail in its relation to prevention and positive psychology. Concepts such as hope, optimism, coping, and resilience will be related to these interventions in order to improve these interventions. The review will also explain how these programs can help prevent suicidal thoughts and/or behaviors. Research on mentorship programs and early intervention programs will be included and related to the aforementioned positive psychology concepts. Since children and adolescents are such a vulnerable population, the review will highlight specific considerations for working with children in order to prevent risk factors for suicide and to build protective factors. This review will discuss the effectiveness of school-based programs that are integrated with positive psychology. Elements of these programs that have been shown to be most effective in preventing suicide in schools will also be identified. As a result of this presentation, participants will be able to 1) List at least 2 evidence-based suicide prevention programs, 2) Understand the connection between specific positive psychology concepts and suicide prevention, 3) Identify at least 3 factors which protect against suicide, 4) Describe at least 3 risk factors for suicide, and 5) Think critically about the positive elements of suicide prevention programs.Keywords: children, adolescents, suicide, positive
Procedia PDF Downloads 38821078 A Comparative Study of Virus Detection Techniques
Authors: Sulaiman Al amro, Ali Alkhalifah
Abstract:
The growing number of computer viruses and the detection of zero day malware have been the concern for security researchers for a large period of time. Existing antivirus products (AVs) rely on detecting virus signatures which do not provide a full solution to the problems associated with these viruses. The use of logic formulae to model the behaviour of viruses is one of the most encouraging recent developments in virus research, which provides alternatives to classic virus detection methods. In this paper, we proposed a comparative study about different virus detection techniques. This paper provides the advantages and drawbacks of different detection techniques. Different techniques will be used in this paper to provide a discussion about what technique is more effective to detect computer viruses.Keywords: computer viruses, virus detection, signature-based, behaviour-based, heuristic-based
Procedia PDF Downloads 48621077 Real Time Detection, Prediction and Reconstitution of Rain Drops
Authors: R. Burahee, B. Chassinat, T. de Laclos, A. Dépée, A. Sastim
Abstract:
The purpose of this paper is to propose a solution to detect, predict and reconstitute rain drops in real time – during the night – using an embedded material with an infrared camera. To prevent the system from needing too high hardware resources, simple models are considered in a powerful image treatment algorithm reducing considerably calculation time in OpenCV software. Using a smart model – drops will be matched thanks to a process running through two consecutive pictures for implementing a sophisticated tracking system. With this system drops computed trajectory gives information for predicting their future location. Thanks to this technique, treatment part can be reduced. The hardware system composed by a Raspberry Pi is optimized to host efficiently this code for real time execution.Keywords: reconstitution, prediction, detection, rain drop, real time, raspberry, infrared
Procedia PDF Downloads 42021076 Hydro-Climatological, Geological, Hydrogeological and Geochemical Study of the Coastal Aquifer System of Chiba Watershed (Cape Bon Peninsula)
Authors: Khawla Askri, Mohamed Haythem Msaddek, AbdelAziz Sebei
Abstract:
Climate change combined with the increase in anthropogenic activities will affect coastal groundwater systems around the world and, more particularly, the Cap Bon region in the North East of Tunisia. This study aims to study the impact of climate change and human stress on the salinization and quantification of groundwater in the Wadi Chiba watershed. In this regard, a hydro-climatological study and a hydrogeological study were carried out based on the characterization of the aquifer system of the eastern coast at the level of the watershed of Wadi Chiba in order to seek to identify, first of all, the degradation of the state of the aquifer on the quantitative level by the study of the piezometric and its evolution over time. Secondly, we sought to identify the degradation of the state of the aquifer qualitatively by using the geochemical method, in particular the major elements, to assess the mineralization of the aquifer water and understand its hydrogeochemical functioning. The study of the Na + / Cl- and Ca2 + / Mg2 + chemical relationships confirmed the presence of a marine intrusion downstream of the Wadi Chiba watershed northeast of Cap-Bon accompanied by a piezometric depression. For this purpose, we proceeded to: 1) Mapping of both piezometric data and salinity. 2) The interpretation of the mapping results. 3)Identification of the origin of the localized deterioration in the quality of the aquifer water. Finally, the analysis of the results showed that the scarcity of water is already forcing human actions in the Chiba watershed due to the irrigation of agricultural lands and the overexploitation of the water table in the study area.Keywords: climate change, human activities, water table, Wadi Chiba watershed, piezometric depression, marine intrusion
Procedia PDF Downloads 9221075 The Effect of Pixelation on Face Detection: Evidence from Eye Movements
Authors: Kaewmart Pongakkasira
Abstract:
This study investigated how different levels of pixelation affect face detection in natural scenes. Eye movements and reaction times, while observers searched for faces in natural scenes rendered in different ranges of pixels, were recorded. Detection performance for coarse visual detail at lower pixel size (3 x 3) was better than with very blurred detail carried by higher pixel size (9 x 9). The result is consistent with the notion that face detection relies on gross detail information of face-shape template, containing crude shape structure and features. In contrast, detection was impaired when face shape and features are obscured. However, it was considered that the degradation of scenic information might also contribute to the effect. In the next experiment, a more direct measurement of the effect of pixelation on face detection, only the embedded face photographs, but not the scene background, will be filtered.Keywords: eye movements, face detection, face-shape information, pixelation
Procedia PDF Downloads 31721074 Performance of Nakagami Fading Channel over Energy Detection Based Spectrum Sensing
Authors: M. Ranjeeth, S. Anuradha
Abstract:
Spectrum sensing is the main feature of cognitive radio technology. Spectrum sensing gives an idea of detecting the presence of the primary users in a licensed spectrum. In this paper we compare the theoretical results of detection probability of different fading environments like Rayleigh, Rician, Nakagami-m fading channels with the simulation results using energy detection based spectrum sensing. The numerical results are plotted as P_f Vs P_d for different SNR values, fading parameters. It is observed that Nakagami fading channel performance is better than other fading channels by using energy detection in spectrum sensing. A MATLAB simulation test bench has been implemented to know the performance of energy detection in different fading channel environment.Keywords: spectrum sensing, energy detection, fading channels, probability of detection, probability of false alarm
Procedia PDF Downloads 53221073 Enhancing Security and Privacy Protocols in Telehealth: A Comprehensive Approach across IoT/Fog/Cloud Environments
Authors: Yunyong Guo, Man Wang, Bryan Guo, Nathan Guo
Abstract:
This paper introduces an advanced security and privacy model tailored for Telehealth systems, emphasizing end-to-end protection across IoT, Fog, and Cloud components. The proposed model integrates encryption, key management, intrusion detection, and privacy-preserving measures to safeguard patient data. A comprehensive simulation study evaluates the model's effectiveness in scenarios such as unauthorized access, physical breaches, and insider threats. Results indicate notable success in detecting and mitigating threats yet underscore areas for refinement. The study contributes insights into the intricate balance between security and usability in Telehealth environments, setting the stage for continued advancements.Keywords: cloud, enhancing security, fog, IoT, telehealth
Procedia PDF Downloads 7921072 FMCW Doppler Radar Measurements with Microstrip Tx-Rx Antennas
Authors: Yusuf Ulaş Kabukçu, Si̇nan Çeli̇k, Onur Salan, Mai̇de Altuntaş, Mert Can Dalkiran, Gökseni̇n Bozdağ, Metehan Bulut, Fati̇h Yaman
Abstract:
This study presents a more compact implementation of the 2.4GHz MIT Coffee Can Doppler Radar for 2.6GHz operating frequency. The main difference of our prototype depends on the use of microstrip antennas which makes it possible to transport with a small robotic vehicle. We have designed our radar system with two different channels: Tx and Rx. The system mainly consists of Voltage Controlled Oscillator (VCO) source, low noise amplifiers, microstrip antennas, splitter, mixer, low pass filter, and necessary RF connectors with cables. The two microstrip antennas, one is element for transmitter and the other one is array for receiver channel, was designed, fabricated and verified by experiments. The system has two operation modes: speed detection and range detection. If the switch of the operation mode is ‘Off’, only CW signal transmitted for speed measurement. When the switch is ‘On’, CW is frequency-modulated and range detection is possible. In speed detection mode, high frequency (2.6 GHz) is generated by a VCO, and then amplified to reach a reasonable level of transmit power. Before transmitting the amplified signal through a microstrip patch antenna, a splitter used in order to compare the frequencies of transmitted and received signals. Half of amplified signal (LO) is forwarded to a mixer, which helps us to compare the frequencies of transmitted and received (RF) and has the IF output, or in other words information of Doppler frequency. Then, IF output is filtered and amplified to process the signal digitally. Filtered and amplified signal showing Doppler frequency is used as an input of audio input of a computer. After getting this data Doppler frequency is shown as a speed change on a figure via Matlab script. According to experimental field measurements the accuracy of speed measurement is approximately %90. In range detection mode, a chirp signal is used to form a FM chirp. This FM chirp helps to determine the range of the target since only Doppler frequency measured with CW is not enough for range detection. Such a FMCW Doppler radar may be used in border security of the countries since it is capable of both speed and range detection.Keywords: doppler radar, FMCW, range detection, speed detection
Procedia PDF Downloads 39821071 Artificial Intelligence Based Abnormality Detection System and Real Valuᵀᴹ Product Design
Authors: Junbeom Lee, Jaehyuck Cho, Wookyeong Jeong, Jonghan Won, Jungmin Hwang, Youngseok Song, Taikyeong Jeong
Abstract:
This paper investigates and analyzes meta-learning technologies that use multiple-cameras to monitor and check abnormal behavior in people in real-time in the area of healthcare fields. Advances in artificial intelligence and computer vision technologies have confirmed that cameras can be useful for individual health monitoring and abnormal behavior detection. Through this, it is possible to establish a system that can respond early by automatically detecting abnormal behavior of the elderly, such as patients and the elderly. In this paper, we use a technique called meta-learning to analyze image data collected from cameras and develop a commercial product to determine abnormal behavior. Meta-learning applies machine learning algorithms to help systems learn and adapt quickly to new real data. Through this, the accuracy and reliability of the abnormal behavior discrimination system can be improved. In addition, this study proposes a meta-learning-based abnormal behavior detection system that includes steps such as data collection and preprocessing, feature extraction and selection, and classification model development. Various healthcare scenarios and experiments analyze the performance of the proposed system and demonstrate excellence compared to other existing methods. Through this study, we present the possibility that camera-based meta-learning technology can be useful for monitoring and testing abnormal behavior in the healthcare area.Keywords: artificial intelligence, abnormal behavior, early detection, health monitoring
Procedia PDF Downloads 8921070 Comparative Analysis of Edge Detection Techniques for Extracting Characters
Authors: Rana Gill, Chandandeep Kaur
Abstract:
Segmentation of images can be implemented using different fundamental algorithms like edge detection (discontinuity based segmentation), region growing (similarity based segmentation), iterative thresholding method. A comprehensive literature review relevant to the study gives description of different techniques for vehicle number plate detection and edge detection techniques widely used on different types of images. This research work is based on edge detection techniques and calculating threshold on the basis of five edge operators. Five operators used are Prewitt, Roberts, Sobel, LoG and Canny. Segmentation of characters present in different type of images like vehicle number plate, name plate of house and characters on different sign boards are selected as a case study in this work. The proposed methodology has seven stages. The proposed system has been implemented using MATLAB R2010a. Comparison of all the five operators has been done on the basis of their performance. From the results it is found that Canny operators produce best results among the used operators and performance of different edge operators in decreasing order is: Canny>Log>Sobel>Prewitt>Roberts.Keywords: segmentation, edge detection, text, extracting characters
Procedia PDF Downloads 42621069 School Emergency Drills Evaluation through E-PreS Monitoring System
Authors: A. Kourou, A. Ioakeimidou, V. Avramea
Abstract:
Planning for natural disasters and emergencies is something every school or educational institution must consider, regardless of its size or location. Preparedness is the key to save lives if a disaster strikes. School disaster management mirrors individual and family disaster prevention, and wider community disaster prevention efforts. This paper presents the usage of E-PreS System as a helpful, managerial tool during the school earthquake drill, in order to support schools in developing effective disaster and emergency plans specific to their local needs. The project comes up with a holistic methodology using real-time evaluation involving different categories of actors, districts, steps and metrics. The main outcomes of E-PreS project are the development of E-PreS web platform that host the needed data of school emergency planning; the development of E-PreS System; the implementation of disaster drills using E-PreS System in educational premises and local schools; and the evaluation of E-PreS System. Taking into consideration that every disaster drill aims to test and valid school plan and procedures; clarify and train personnel in roles and responsibilities; improve interagency coordination; identify gaps in resources; improve individual performance; and identify opportunities for improvement, E-PreS Project was submitted and approved by the European Commission (EC).Keywords: disaster drills, earthquake preparedness, E-PreS System, school emergency plans
Procedia PDF Downloads 22821068 Cyber-Med: Practical Detection Methodology of Cyber-Attacks Aimed at Medical Devices Eco-Systems
Authors: Nir Nissim, Erez Shalom, Tomer Lancewiki, Yuval Elovici, Yuval Shahar
Abstract:
Background: A Medical Device (MD) is an instrument, machine, implant, or similar device that includes a component intended for the purpose of the diagnosis, cure, treatment, or prevention of disease in humans or animals. Medical devices play increasingly important roles in health services eco-systems, including: (1) Patient Diagnostics and Monitoring; Medical Treatment and Surgery; and Patient Life Support Devices and Stabilizers. MDs are part of the medical device eco-system and are connected to the network, sending vital information to the internal medical information systems of medical centers that manage this data. Wireless components (e.g. Wi-Fi) are often embedded within medical devices, enabling doctors and technicians to control and configure them remotely. All these functionalities, roles, and uses of MDs make them attractive targets of cyber-attacks launched for many malicious goals; this trend is likely to significantly increase over the next several years, with increased awareness regarding MD vulnerabilities, the enhancement of potential attackers’ skills, and expanded use of medical devices. Significance: We propose to develop and implement Cyber-Med, a unique collaborative project of Ben-Gurion University of the Negev and the Clalit Health Services Health Maintenance Organization. Cyber-Med focuses on the development of a comprehensive detection framework that relies on a critical attack repository that we aim to create. Cyber-Med will allow researchers and companies to better understand the vulnerabilities and attacks associated with medical devices as well as providing a comprehensive platform for developing detection solutions. Methodology: The Cyber-Med detection framework will consist of two independent, but complementary detection approaches: one for known attacks, and the other for unknown attacks. These modules incorporate novel ideas and algorithms inspired by our team's domains of expertise, including cyber security, biomedical informatics, and advanced machine learning, and temporal data mining techniques. The establishment and maintenance of Cyber-Med’s up-to-date attack repository will strengthen the capabilities of Cyber-Med’s detection framework. Major Findings: Based on our initial survey, we have already found more than 15 types of vulnerabilities and possible attacks aimed at MDs and their eco-system. Many of these attacks target individual patients who use devices such pacemakers and insulin pumps. In addition, such attacks are also aimed at MDs that are widely used by medical centers such as MRIs, CTs, and dialysis engines; the information systems that store patient information; protocols such as DICOM; standards such as HL7; and medical information systems such as PACS. However, current detection tools, techniques, and solutions generally fail to detect both the known and unknown attacks launched against MDs. Very little research has been conducted in order to protect these devices from cyber-attacks, since most of the development and engineering efforts are aimed at the devices’ core medical functionality, the contribution to patients’ healthcare, and the business aspects associated with the medical device.Keywords: medical device, cyber security, attack, detection, machine learning
Procedia PDF Downloads 35721067 Survey on Malware Detection
Authors: Doaa Wael, Naswa Abdelbaky
Abstract:
Malware is malicious software that is built to cause destructive actions and damage information systems and networks. Malware infections increase rapidly, and types of malware have become more sophisticated, which makes the malware detection process more difficult. On the other side, the Internet of Things IoT technology is vulnerable to malware attacks. These IoT devices are always connected to the internet and lack security. This makes them easy for hackers to access. These malware attacks are becoming the go-to attack for hackers. Thus, in order to deal with this challenge, new malware detection techniques are needed. Currently, building a blockchain solution that allows IoT devices to download any file from the internet and to verify/approve whether it is malicious or not is the need of the hour. In recent years, blockchain technology has stood as a solution to everything due to its features like decentralization, persistence, and anonymity. Moreover, using blockchain technology overcomes some difficulties in malware detection and improves the malware detection ratio over-than the techniques that do not utilize blockchain technology. In this paper, we study malware detection models which are based on blockchain technology. Furthermore, we elaborate on the effect of blockchain technology in malware detection, especially in the android environment.Keywords: malware analysis, blockchain, malware attacks, malware detection approaches
Procedia PDF Downloads 8821066 Alternative Approach to the Machine Vision System Operating for Solving Industrial Control Issue
Authors: M. S. Nikitenko, S. A. Kizilov, D. Y. Khudonogov
Abstract:
The paper considers an approach to a machine vision operating system combined with using a grid of light markers. This approach is used to solve several scientific and technical problems, such as measuring the capability of an apron feeder delivering coal from a lining return port to a conveyor in the technology of mining high coal releasing to a conveyor and prototyping an autonomous vehicle obstacle detection system. Primary verification of a method of calculating bulk material volume using three-dimensional modeling and validation in laboratory conditions with relative errors calculation were carried out. A method of calculating the capability of an apron feeder based on a machine vision system and a simplifying technology of a three-dimensional modelled examined measuring area with machine vision was offered. The proposed method allows measuring the volume of rock mass moved by an apron feeder using machine vision. This approach solves the volume control issue of coal produced by a feeder while working off high coal by lava complexes with release to a conveyor with accuracy applied for practical application. The developed mathematical apparatus for measuring feeder productivity in kg/s uses only basic mathematical functions such as addition, subtraction, multiplication, and division. Thus, this fact simplifies software development, and this fact expands the variety of microcontrollers and microcomputers suitable for performing tasks of calculating feeder capability. A feature of an obstacle detection issue is to correct distortions of the laser grid, which simplifies their detection. The paper presents algorithms for video camera image processing and autonomous vehicle model control based on obstacle detection machine vision systems. A sample fragment of obstacle detection at the moment of distortion with the laser grid is demonstrated.Keywords: machine vision, machine vision operating system, light markers, measuring capability, obstacle detection system, autonomous transport
Procedia PDF Downloads 11521065 Realistic Testing Procedure of Power Swing Blocking Function in Distance Relay
Authors: Farzad Razavi, Behrooz Taheri, Mohammad Parpaei, Mehdi Mohammadi Ghalesefidi, Siamak Zarei
Abstract:
As one of the major problems in protecting large-dimension power systems, power swing and its effect on distance have caused a lot of damages to energy transfer systems in many parts of the world. Therefore, power swing has gained attentions of many researchers, which has led to invention of different methods for power swing detection. Power swing detection algorithm is highly important in distance relay, but protection relays should have general requirements such as correct fault detection, response rate, and minimization of disturbances in a power system. To ensure meeting the requirements, protection relays need different tests during development, setup, maintenance, configuration, and troubleshooting steps. This paper covers power swing scheme of the modern numerical relay protection, 7sa522 to address the effect of the different fault types on the function of the power swing blocking. In this study, it was shown that the different fault types during power swing cause different time for unblocking distance relay.Keywords: power swing, distance relay, power system protection, relay test, transient in power system
Procedia PDF Downloads 38621064 Same-Day Detection Method of Salmonella Spp., Shigella Spp. and Listeria Monocytogenes with Fluorescence-Based Triplex Real-Time PCR
Authors: Ergun Sakalar, Kubra Bilgic
Abstract:
Faster detection and characterization of pathogens are the basis of the evoid from foodborne pathogens. Salmonella spp., Shigella spp. and Listeria monocytogenes are common foodborne bacteria that are among the most life-threatining. It is important to rapid and accurate detection of these pathogens to prevent food poisoning and outbreaks or to manage food chains. The present work promise to develop a sensitive, species specific and reliable PCR based detection system for simultaneous detection of Salmonella spp., Shigella spp. and Listeria monocytogenes. For this purpose, three genes were picked out, ompC for Salmonella spp., ipaH for Shigella spp. and hlyA for L. monocytogenes. After short pre-enrichment of milk was passed through a vacuum filter and bacterial DNA was exracted using commercially available kit GIDAGEN®(Turkey, İstanbul). Detection of amplicons was verified by examination of the melting temperature (Tm) that are 72° C, 78° C, 82° C for Salmonella spp., Shigella spp. and L. monocytogenes, respectively. The method specificity was checked against a group of bacteria strains, and also carried out sensitivity test resulting in under 10² CFU mL⁻¹ of milk for each bacteria strain. Our results show that the flourescence based triplex qPCR method can be used routinely to detect Salmonella spp., Shigella spp. and L. monocytogenes during the milk processing procedures in order to reduce cost, time of analysis and the risk of foodborne disease outbreaks.Keywords: evagreen, food-born bacteria, pathogen detection, real-time pcr
Procedia PDF Downloads 24421063 Short-Path Near-Infrared Laser Detection of Environmental Gases by Wavelength-Modulation Spectroscopy
Authors: Isao Tomita
Abstract:
The detection of environmental gases, 12CO_2, 13CO_2, and CH_4, using near-infrared semiconductor lasers with a short laser path length is studied by means of wavelength-modulation spectroscopy. The developed system is compact and has high sensitivity enough to detect the absorption peaks of isotopic 13CO_2 of a 3-% CO_2 gas at 2 um with a path length of 2.4 m, where its peak size is two orders of magnitude smaller than that of the ordinary 12CO_2 peaks. In addition, the detection of 12CO_2 peaks of a 385-ppm (0.0385-%) CO_2 gas in the air is made at 2 um with a path length of 1.4 m. Furthermore, in pursuing the detection of an ancient environmental CH_4 gas confined to a bubble in ice at the polar regions, measurements of the absorption spectrum for a trace gas of CH_4 in a small area are attempted. For a 100-% CH_4 gas trapped in a 1 mm^3 glass container, the absorption peaks of CH_4 are obtained at 1.65 um with a path length of 3 mm, and also the gas pressure is extrapolated from the measured data.Keywords: environmental gases, Near-Infrared Laser Detection, Wavelength-Modulation Spectroscopy, gas pressure
Procedia PDF Downloads 42321062 mKDNAD: A Network Flow Anomaly Detection Method Based On Multi-teacher Knowledge Distillation
Abstract:
Anomaly detection models for network flow based on machine learning have poor detection performance under extremely unbalanced training data conditions and also have slow detection speed and large resource consumption when deploying on network edge devices. Embedding multi-teacher knowledge distillation (mKD) in anomaly detection can transfer knowledge from multiple teacher models to a single model. Inspired by this, we proposed a state-of-the-art model, mKDNAD, to improve detection performance. mKDNAD mine and integrate the knowledge of one-dimensional sequence and two-dimensional image implicit in network flow to improve the detection accuracy of small sample classes. The multi-teacher knowledge distillation method guides the train of the student model, thus speeding up the model's detection speed and reducing the number of model parameters. Experiments in the CICIDS2017 dataset verify the improvements of our method in the detection speed and the detection accuracy in dealing with the small sample classes.Keywords: network flow anomaly detection (NAD), multi-teacher knowledge distillation, machine learning, deep learning
Procedia PDF Downloads 12421061 Localization of Radioactive Sources with a Mobile Radiation Detection System using Profit Functions
Authors: Luís Miguel Cabeça Marques, Alberto Manuel Martinho Vale, José Pedro Miragaia Trancoso Vaz, Ana Sofia Baptista Fernandes, Rui Alexandre de Barros Coito, Tiago Miguel Prates da Costa
Abstract:
The detection and localization of hidden radioactive sources are of significant importance in countering the illicit traffic of Special Nuclear Materials and other radioactive sources and materials. Radiation portal monitors are commonly used at airports, seaports, and international land borders for inspecting cargo and vehicles. However, these equipment can be expensive and are not available at all checkpoints. Consequently, the localization of SNM and other radioactive sources often relies on handheld equipment, which can be time-consuming. The current study presents the advantages of real-time analysis of gamma-ray count rate data from a mobile radiation detection system based on simulated data and field tests. The incorporation of profit functions and decision criteria to optimize the detection system's path significantly enhances the radiation field information and reduces survey time during cargo inspection. For source position estimation, a maximum likelihood estimation algorithm is employed, and confidence intervals are derived using the Fisher information. The study also explores the impact of uncertainties, baselines, and thresholds on the performance of the profit function. The proposed detection system, utilizing a plastic scintillator with silicon photomultiplier sensors, boasts several benefits, including cost-effectiveness, high geometric efficiency, compactness, and lightweight design. This versatility allows for seamless integration into any mobile platform, be it air, land, maritime, or hybrid, and it can also serve as a handheld device. Furthermore, integration of the detection system into drones, particularly multirotors, and its affordability enable the automation of source search and substantial reduction in survey time, particularly when deploying a fleet of drones. While the primary focus is on inspecting maritime container cargo, the methodologies explored in this research can be applied to the inspection of other infrastructures, such as nuclear facilities or vehicles.Keywords: plastic scintillators, profit functions, path planning, gamma-ray detection, source localization, mobile radiation detection system, security scenario
Procedia PDF Downloads 11821060 Law Relating to Health and Health Care: A Systematic Mechanism and Critical Study with Reference to Bangladesh
Authors: MD. Kamruzzaman
Abstract:
As a developing country, Bangladesh has seen an increase in total GDP in recent years. But it can be further improved by developing “Health-Care” (HC) services because it has enormous infrastructure problems all over the country. Bangladesh's HC system is now clearly poised to undergo reform at any process level, including prevention, diagnosis, and treatment. Although the Bangladeshi government is trying to develop the HC sector, due to health corruption in this sector, the improvement has not accelerated yet. For this reason, lots of Bangladeshi people are facing acute diseases. Regarding the prevention, diagnosis, and treatment of disease, this research will illustrate the law relating to health and HC to ensure excellent health and well-being. Firstly, this paper investigates health under Bangladeshi law from different perspectives related to the HC system. A massive gap has been investigated in this research after comparing Bangladeshi and international health law (HL). Secondly, a practical scenario is investigated and compared with international HC law. It is evident that the Bangladeshi HC system did not achieve a satisfactory standard level concerning international law. A staggering 70% of Bangladesh's population lives in rural areas, with no restrictions on access to hospitals and clinics. However, it is clear that proper HC infrastructure and some new medical practices are urgently needed to ensure HC quality. Finally, this research provides suggestions for developing a HC system to ensure the health of all Bangladeshi people that needs to be immediately implemented by the Bangladeshi government. This research has practical implications in the HC system for any developing country to maintain their citizen's safety.Keywords: HC system, law relating, bangladeshi HL, international HL, human HC suggestions
Procedia PDF Downloads 7421059 iCount: An Automated Swine Detection and Production Monitoring System Based on Sobel Filter and Ellipse Fitting Model
Authors: Jocelyn B. Barbosa, Angeli L. Magbaril, Mariel T. Sabanal, John Paul T. Galario, Mikka P. Baldovino
Abstract:
The use of technology has become ubiquitous in different areas of business today. With the advent of digital imaging and database technology, business owners have been motivated to integrate technology to their business operation ranging from small, medium to large enterprises. Technology has been found to have brought many benefits that can make a business grow. Hog or swine raising, for example, is a very popular enterprise in the Philippines, whose challenges in production monitoring can be addressed through technology integration. Swine production monitoring can become a tedious task as the enterprise goes larger. Specifically, problems like delayed and inconsistent reports are most likely to happen if counting of swine per pen of which building is done manually. In this study, we present iCount, which aims to ensure efficient swine detection and counting that hastens the swine production monitoring task. We develop a system that automatically detects and counts swine based on Sobel filter and ellipse fitting model, given the still photos of the group of swine captured in a pen. We improve the Sobel filter detection result through 8-neigbhorhood rule implementation. Ellipse fitting technique is then employed for proper swine detection. Furthermore, the system can generate periodic production reports and can identify the specific consumables to be served to the swine according to schedules. Experiments reveal that our algorithm provides an efficient way for detecting swine, thereby providing a significant amount of accuracy in production monitoring.Keywords: automatic swine counting, swine detection, swine production monitoring, ellipse fitting model, sobel filter
Procedia PDF Downloads 31321058 Application of Laser Spectroscopy for Detection of Actinides and Lanthanides in Solutions
Authors: Igor Izosimov
Abstract:
This work is devoted to applications of the Time-resolved laser-induced luminescence (TRLIF) spectroscopy and time-resolved laser-induced chemiluminescence spectroscopy for detection of lanthanides and actinides. Results of the experiments on Eu, Sm, U, and Pu detection in solutions are presented. The limit of uranyl detection (LOD) in urine in our TRLIF experiments was up to 5 pg/ml. In blood plasma LOD was 0.1 ng/ml and after mineralization was up to 8pg/ml – 10pg/ml. In pure solution, the limit of detection of europium was 0.005ng/ml and samarium, 0.07ng/ml. After addition urine, the limit of detection of europium was 0.015 ng/ml and samarium, 0.2 ng/ml. Pu, Np, and some U compounds do not produce direct luminescence in solutions, but when excited by laser radiation, they can induce chemiluminescence of some chemiluminogen (luminol in our experiments). It is shown that multi-photon scheme of chemiluminescence excitation makes chemiluminescence not only a highly sensitive but also a highly selective tool for the detection of lanthanides/actinides in solutions.Keywords: actinides/lanthanides detection, laser spectroscopy with time resolution, luminescence/chemiluminescence, solutions
Procedia PDF Downloads 33621057 Integrated HIV Prevention and Sexual and Reproductive Health Services Among Adolescent Girls and Young Women in Rwanda: Knowledge, Attitudes, and Practices Survey.
Authors: Nsenga Bakinahe
Abstract:
Background: Adolescent girls and young women (AGYW) globally and, particularly in Rwanda, face significant challenges related to HIV prevention and sexual and reproductive health (SRH). Rwanda has a young population, with 65.3% below 30 years of age, demonstrating a need for SRH promotion and HIV prevention for this population. We aimed to determine the knowledge, attitudes, and practices (KAP) of integrated HIV prevention and SRH services among AGYW in Rwanda. Methodology: We conducted a cross-sectional survey among 384 AGYW aged 15-24 years who had ever been pregnant and currently reside in Nyagatare district, Eastern Rwanda from January to April 2023. A questionnaire was developed to collect data, participants were randomly selected and data were collected by one-on-one interviews and were analyzed using SPSS V21. The statistical relationship between variables was significant at P-Value of 0.05 and 95% confidence interval. Results: The majority (97.9%) of respondents demonstrated a good level of knowledge, (52.2%) of the respondents had positive attitudes towards integrated HIV prevention and SRH services. Looking at the practice of integrated HIV prevention and SRH services use, 51.4% of respondents have a low level of practice. The practice of integrated HIV prevention and SRH services was significantly associated with school drop-out and family status (P>0.05). Conclusion: The findings from these studies collectively emphasize the need for comprehensive education, targeted interventions, and community-based support to achieve better health outcomes regarding HIV prevention and overall sexual and reproductive health among adolescent girls and young women. Empowering adolescent girls and young women with accurate information and comprehensive support will enable them to make informed decisions, protect their health effectively, and contribute to reducing the burden of HIV and improving sexual and reproductive health outcomes.Keywords: integrated HIV prevention, sexual and reproductive health services, among adolescentes girls, and young women
Procedia PDF Downloads 5521056 System Identification in Presence of Outliers
Authors: Chao Yu, Qing-Guo Wang, Dan Zhang
Abstract:
The outlier detection problem for dynamic systems is formulated as a matrix decomposition problem with low-rank, sparse matrices and further recast as a semidefinite programming (SDP) problem. A fast algorithm is presented to solve the resulting problem while keeping the solution matrix structure and it can greatly reduce the computational cost over the standard interior-point method. The computational burden is further reduced by proper construction of subsets of the raw data without violating low rank property of the involved matrix. The proposed method can make exact detection of outliers in case of no or little noise in output observations. In case of significant noise, a novel approach based on under-sampling with averaging is developed to denoise while retaining the saliency of outliers and so-filtered data enables successful outlier detection with the proposed method while the existing filtering methods fail. Use of recovered “clean” data from the proposed method can give much better parameter estimation compared with that based on the raw data.Keywords: outlier detection, system identification, matrix decomposition, low-rank matrix, sparsity, semidefinite programming, interior-point methods, denoising
Procedia PDF Downloads 30821055 A New Method for Fault Detection
Authors: Mehmet Hakan Karaata, Ali Hamdan, Omer Yusuf Adam Mohamed
Abstract:
Consider a distributed system that delivers messages from a process to another. Such a system is often required to deliver each message to its destination regardless of whether or not the system components experience arbitrary forms of faults. In addition, each message received by the destination must be a message sent by a system process. In this paper, we first identify the necessary and sufficient conditions to detect some restricted form of Byzantine faults referred to as modifying Byzantine faults. An observable form of a Byzantine fault whose effect is limited to the modification of a message metadata or content, timing and omission faults, and message replay is referred to as a modifying Byzantine fault. We then present a distributed protocol to detect modifying Byzantine faults using optimal number of messages over node-disjoint paths.Keywords: Byzantine faults, distributed systems, fault detection, network protocols, node-disjoint paths
Procedia PDF Downloads 44821054 Practical Limitations of the Fraud Triangle Framework in Fraud Prevention
Authors: Alexander Glebovskiy
Abstract:
Practitioners charged with fraud prevention and investigation strongly rely on the Fraud Triangle framework developed by Joseph T. Wells in 1997 while analyzing the causes of fraud at business organizations. The Fraud Triangle model explains fraud by elements such as pressure, opportunity, and rationalization. This view is not fully suitable for effective fraud prevention as the Fraud Triangle model provides limited insight into the causation of fraud. Fraud is a multifaceted phenomenon, the contextual factors of which may not fit into any framework. Employee criminal behavior in business organizations is influenced by environmental, individual, and organizational aspects. Therefore, further criminogenic factors and processes facilitating fraud in organizational settings need to be considered in the root-cause analysis: organizational culture, leadership style, groupthink effect, isomorphic behavior, crime of obedience, displacement of responsibility, lack of critical thinking and unquestioning conformity and loyalty.Keywords: criminogenesis, fraud triangle, fraud prevention, organizational culture
Procedia PDF Downloads 30221053 Improvements in OpenCV's Viola Jones Algorithm in Face Detection–Skin Detection
Authors: Jyoti Bharti, M. K. Gupta, Astha Jain
Abstract:
This paper proposes a new improved approach for false positives filtering of detected face images on OpenCV’s Viola Jones Algorithm In this approach, for Filtering of False Positives, Skin Detection in two colour spaces i.e. HSV (Hue, Saturation and Value) and YCrCb (Y is luma component and Cr- red difference, Cb- Blue difference) is used. As a result, it is found that false detection has been reduced. Our proposed method reaches the accuracy of about 98.7%. Thus, a better recognition rate is achieved.Keywords: face detection, Viola Jones, false positives, OpenCV
Procedia PDF Downloads 40721052 Plagiarism Detection for Flowchart and Figures in Texts
Authors: Ahmadu Maidorawa, Idrissa Djibo, Muhammad Tella
Abstract:
This paper presents a method for detecting flow chart and figure plagiarism based on shape of image processing and multimedia retrieval. The method managed to retrieve flowcharts with ranked similarity according to different matching sets. Plagiarism detection is well known phenomenon in the academic arena. Copying other people is considered as serious offense that needs to be checked. There are many plagiarism detection systems such as turn-it-in that has been developed to provide these checks. Most, if not all, discard the figures and charts before checking for plagiarism. Discarding the figures and charts result in look holes that people can take advantage. That means people can plagiarize figures and charts easily without the current plagiarism systems detecting it. There are very few papers which talks about flowcharts plagiarism detection. Therefore, there is a need to develop a system that will detect plagiarism in figures and charts.Keywords: flowchart, multimedia retrieval, figures similarity, image comparison, figure retrieval
Procedia PDF Downloads 467