Search results for: alarm
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 116

Search results for: alarm

26 Intrusion Detection in SCADA Systems

Authors: Leandros A. Maglaras, Jianmin Jiang

Abstract:

The protection of the national infrastructures from cyberattacks is one of the main issues for national and international security. The funded European Framework-7 (FP7) research project CockpitCI introduces intelligent intrusion detection, analysis and protection techniques for Critical Infrastructures (CI). The paradox is that CIs massively rely on the newest interconnected and vulnerable Information and Communication Technology (ICT), whilst the control equipment, legacy software/hardware, is typically old. Such a combination of factors may lead to very dangerous situations, exposing systems to a wide variety of attacks. To overcome such threats, the CockpitCI project combines machine learning techniques with ICT technologies to produce advanced intrusion detection, analysis and reaction tools to provide intelligence to field equipment. This will allow the field equipment to perform local decisions in order to self-identify and self-react to abnormal situations introduced by cyberattacks. In this paper, an intrusion detection module capable of detecting malicious network traffic in a Supervisory Control and Data Acquisition (SCADA) system is presented. Malicious data in a SCADA system disrupt its correct functioning and tamper with its normal operation. OCSVM is an intrusion detection mechanism that does not need any labeled data for training or any information about the kind of anomaly is expecting for the detection process. This feature makes it ideal for processing SCADA environment data and automates SCADA performance monitoring. The OCSVM module developed is trained by network traces off line and detects anomalies in the system real time. The module is part of an IDS (intrusion detection system) developed under CockpitCI project and communicates with the other parts of the system by the exchange of IDMEF messages that carry information about the source of the incident, the time and a classification of the alarm.

Keywords: cyber-security, SCADA systems, OCSVM, intrusion detection

Procedia PDF Downloads 511
25 Use of Smartphones in 6th and 7th Grade (Elementary Schools) in Istria: Pilot Study

Authors: Maja Ruzic-Baf, Vedrana Keteles, Andrea Debeljuh

Abstract:

Younger and younger children are now using a smartphone, a device which has become ‘a must have’ and the life of children would be almost ‘unthinkable’ without one. Devices are becoming lighter and lighter but offering an array of options and applications as well as the unavoidable access to the Internet, without which it would be almost unusable. Numerous features such as taking of photographs, listening to music, information search on the Internet, access to social networks, usage of some of the chatting and messaging services, are only some of the numerous features offered by ‘smart’ devices. They have replaced the alarm clock, home phone, camera, tablet and other devices. Their use and possession have become a part of the everyday image of young people. Apart from the positive aspects, the use of smartphones has also some downsides. For instance, free time was usually spent in nature, playing, doing sports or other activities enabling children an adequate psychophysiological growth and development. The greater usage of smartphones during classes to check statuses on social networks, message your friends, play online games, are just some of the possible negative aspects of their application. Considering that the age of the population using smartphones is decreasing and that smartphones are no longer ‘foreign’ to children of pre-school age (smartphones are used at home or in coffee shops or shopping centers while waiting for their parents, playing video games often inappropriate to their age), particular attention must be paid to a very sensitive group, the teenagers who almost never separate from their ‘pets’. This paper is divided into two sections, theoretical and empirical ones. The theoretical section gives an overview of the pros and cons of the usage of smartphones, while the empirical section presents the results of a research conducted in three elementary schools regarding the usage of smartphones and, specifically, their usage during classes, during breaks and to search information on the Internet, check status updates and 'likes’ on the Facebook social network.

Keywords: education, smartphone, social networks, teenagers

Procedia PDF Downloads 427
24 The Red Persian Carpet: Iran as Semi-Periphery in China's Belt and Road Initiative-Bound World-System

Authors: Toufic Sarieddine

Abstract:

As the belt and road Initiative (henceforth, BRI) enters its 9th year, Iran and China are forging stronger ties on economic and military fronts, a development which has not only caused alarm in Washington but also risks staining China’s relationships with the oil-rich Gulf monarchies. World-systems theory has been used to examine the impact of the BRI on the current world order, with scholarship split on the capacity of China to emerge as a hegemon contending with the US or even usurping it. This paper argues the emergence of a new China-centered world-system comprised of states/areas and processes participating in the BRI and overlapping with the global world-system under (shaky) US hegemony. This world-system centers around China as core and hegemon via economic domination, capable new institutions (Shanghai Cooperation Council), legal modi operandi, the common goal of infrastructure development to rally support among developing states, and other indicators of hegemony outlined in world-systems theory. In this regard, while states like Pakistan could become peripheries to China in the BRI-bound world-system via large-scale projects such as the China-Pakistan Economic Corridor, Iran has greater capacities and influence in the Middle East, making it superior to a periphery. This paper thus argues that the increasing proximity between Iran and China sees the former becoming a semi-periphery with respect to China within the BRI-bound world-system, having economic dependence on its new core and hegemon while simultaneously wielding political and military influence on weaker states such as Iraq, Lebanon, Yemen, and Syria. The indicators for peripheralization as well as the characteristics of a semi-periphery outlined in world-systems theory are used to examine the current economic, political, and militaristic dimensions of Iran and China’s growing relationship, as well as the trajectory of these dimensions as part of the BRI-bound world-system.

Keywords: belt and road initiative, China, China-Middle East relations, Iran, world-systems analysis

Procedia PDF Downloads 124
23 D-Epi App: Mobile Application to Control Sodium Valproat Administration in Children with Idiopatic Epilepsy in Indonesia

Authors: Nyimas Annissa Mutiara Andini

Abstract:

There are 325,000 children younger than age 15 in the U.S. have epilepsy. In Indonesia, 40% of 3,5 millions cases of epilepsy happens in children. The most common type of epilepsy, which affects 6 out of 10 people with the disorder, is called idiopathic epilepsy and which has no identifiable cause. One of the most commonly used medications in the treatment of this childhood epilepsy is sodium valproate. Administration of sodium valproat in children has a problem to fail. Nearly 60% of pediatric patients known were mildly, moderately, or severely non-adherent with therapy during the first six months of treatment. Many parents or caregiver took far less medication than prescribed, and the treatment-adherence pattern for the majority of patients was established during the first month of treatment. 42% of the patients were almost always given their medications as prescribed but 13% had very poor adherence even in the early weeks and months of treatment. About 7% of patients initially gave the medication correctly 90% of the time, but adherence dropped to around 20% within six months of starting treatment. Over the six months of observation, the total missing of administration is about four out of 14 doses in any given week. This fail can cause the epilepsy to relapse. Whereas, current reported epilepsy disorder were significantly more likely than those never diagnosed to experience depression (8% vs 2%), anxiety (17% vs 3%), attention-deficit/hyperactivity disorder (23% vs 6%), developmental delay (51% vs 3%), autism/autism spectrum disorder (16% vs 1%), and headaches (14% vs 5%) (all P< 0.05). They had a greater risk of limitation in the ability to do things (relative risk: 9.22; 95% CI: 7.56–11.24), repeating a school grade (relative risk: 2.59; CI: 1.52–4.40), and potentially having unmet medical and mental health needs. In the other side, technology can help to make our life easier. One of the technology, that we can use is a mobile application. A mobile app is a software program we can download and access directly using our phone. Indonesians are highly mobile centric. They use, on average, 6.7 applications over a 30 day period. This paper is aimed to describe an application that could help to control a sodium valproat administration in children; we call it as D-Epi app. D-Epi app is a downloadable application that can help parents or caregiver alert by a timer-related application to warn whether it is the time to administer the sodium valproat. It works not only as a standard alarm, but also inform important information about the drug and emergency stuffs to do to children with epilepsy. This application could help parents and caregiver to take care a child with epilepsy in Indonesia.

Keywords: application, children, D-Epi, epilepsy

Procedia PDF Downloads 254
22 Mitigation of Offshore Piling Noise Effects on Marine Mammals

Authors: Waled A. Dawoud, Abdelazim M. Negm, Nasser M. Saleh

Abstract:

Offshore piling generates underwater sound at level high enough to cause physical damage or hearing impairment to the marine mammals. Several methods can be used to mitigate the effect of underwater noise from offshore pile driving on marine mammals which can be divided into three main approaches. The first approach is to keep the mammal out of the high-risk area by using aversive sound waves produced by acoustic mitigation devices such as playing-back of mammal's natural predator vocalization, alarm or distress sounds, and anthropogenic sound. The second approach is to reduce the amount of underwater noise from pile driving using noise mitigation techniques such as bubble curtains, isolation casing, and hydro-sound dampers. The third approach is to eliminate the overlap of underwater waves by using prolonged construction process. To investigate the effectiveness of different noise mitigation methods; a pile driven with 235 kJ rated energy diesel hammer near Jeddah Coast, Kingdom of Saudi Arabia was used. Using empirical sound exposure model based on Red Sea characteristics and limits of National Oceanic and Atmospheric Administration; it was found that the aversive sound waves should extend to 1.8 km around the pile location. Bubble curtains can reduce the behavioral disturbance area up to 28%; temporary threshold shift up to 36%; permanent threshold shift up to 50%; and physical injury up to 70%. Isolation casing can reduce the behavioral disturbance range up to 12%; temporary threshold shift up to 21%; permanent threshold shift up to 29%; and physical injury up to 46%. Hydro-sound dampers efficiency depends mainly on the used technology and it can reduce the behavioral disturbance range from 10% to 33%; temporary threshold shift from 18% to 25%; permanent threshold shift from 32% to 50%; and physical injury from 46% to 60%. To prolong the construction process, it was found that the single pile construction, use of soft start, and keep time between two successive hammer strikes more than 3 seconds are the most effective techniques.

Keywords: offshore pile driving, sound propagation models, noise effects on marine mammals, Underwater noise mitigation

Procedia PDF Downloads 505
21 Pervasive Computing: Model to Increase Arable Crop Yield through Detection Intrusion System (IDS)

Authors: Idowu Olugbenga Adewumi, Foluke Iyabo Oluwatoyinbo

Abstract:

Presently, there are several discussions on the food security with increase in yield of arable crop throughout the world. This article, briefly present research efforts to create digital interfaces to nature, in particular to area of crop production in agriculture with increase in yield with interest on pervasive computing. The approach goes beyond the use of sensor networks for environmental monitoring but also by emphasizing the development of a system architecture that detect intruder (Intrusion Process) which reduce the yield of the farmer at the end of the planting/harvesting period. The objective of the work is to set a model for setting up the hand held or portable device for increasing the quality and quantity of arable crop. This process incorporates the use of infrared motion image sensor with security alarm system which can send a noise signal to intruder on the farm. This model of the portable image sensing device in monitoring or scaring human, rodent, birds and even pests activities will reduce post harvest loss which will increase the yield on farm. The nano intelligence technology was proposed to combat and minimize intrusion process that usually leads to low quality and quantity of produce from farm. Intranet system will be in place with wireless radio (WLAN), router, server, and client computer system or hand held device e.g PDAs or mobile phone. This approach enables the development of hybrid systems which will be effective as a security measure on farm. Since, precision agriculture has developed with the computerization of agricultural production systems and the networking of computerized control systems. In the intelligent plant production system of controlled greenhouses, information on plant responses, measured by sensors, is used to optimize the system. Further work must be carry out on modeling using pervasive computing environment to solve problems of agriculture, as the use of electronics in agriculture will attracts more youth involvement in the industry.

Keywords: pervasive computing, intrusion detection, precision agriculture, security, arable crop

Procedia PDF Downloads 376
20 Antecedents of Teaching Skill for Students’ Psychological Enhancement in University Lecturers

Authors: Duangduen L. Bhanthumnavin, Duchduen E. Bhanthumnavin

Abstract:

Widening gap between new academic knowledge in all areas and habit of exploring and exploiting this precious information by students causes an alarm and need for urgent prevention. At present, all advanced nations are committed to WHO’s Sustainable Development Goals (SDGs), which require some objective achievements by the year 2030 and further. The responsibility has been enforced on university lecturers, in addition to the higher education learning outcomes (HELO). The two groups of goals (SDGs and HELO) can be realized if most university instructors are capable of inculcating some important psychological characteristics and behavioral change in the new generations. Thus, this study aimed at pinpointing the significant factors for additional teaching skills of instructors regardless of the area of study. University lecturers from various parts of Thailand, with the total of 540 persons, participated in this cross-sectional study. Based on interactionism model of behavior antecedents, it covers psychological situational factors, as well as their interaction. Most measuring instruments were summated rating with 10 or more items, each accompanied by a six-point rating scale. All these measures were constructed with acceptable standards. Most of the respondents were volunteers who gave their written responses in a meeting room or conference hall. By applying Multiple Regression Analysis in the total sample as well as in the subsamples of these university instructors, about 70 to 73 predictive percentages with 4 to 6 significant predictors were found. The major dependent variable was instructor’s teaching behavior for inculcating the psycho-moral strength for academic exploration and knowledge application. By performing ANOVA, the less-active instructors were identified as the ones with lower education (Master’s level or lower), the minimal research producers, and the ones with less in-service trainings. The preventive factors for these three groups of instructors were intention to increase the students’ psychological development as well as moral development in their regular teaching classes. In addition, social support from their supervisors and coworkers was also necessary. Recommendations for further research and training are offered and welcomed.

Keywords: psychological inculcation, at-risk instructors, preventive measures, undergraduate teaching

Procedia PDF Downloads 35
19 A Study of Smartphone Engagement Patterns of Millennial in India

Authors: Divyani Redhu, Manisha Rathaur

Abstract:

India has emerged as a very lucrative market for the smartphones in a very short span of time. The number of smartphone users here is growing massively with each passing day. Also, the expansion of internet services to far corners of the nation has also given a push to the smartphone revolution in India. Millennial, also known as Generation Y or the Net Generation is the generation born between the early 1980s and mid-1990s (some definitions extending further to early 2000s). Spanning roughly over 15 years, different social classes, cultures, and continents; it is irrational to imagine that millennial have a unified identity. But still, it cannot be denied that the growing millennial population is not only young but is highly tech-savvy too. It is not just the appearance of the device that today; we call it ‘smart’. Rather, it is the numerous tasks and functions that it can perform which has led its name to evolve as that of a ‘smartphone’. From usual tasks that were earlier performed by a simple mobile phone like making calls, sending messages, clicking photographs, recording videos etc.; today, the time has come where most of our day – to – day tasks are being taken care of by our all-time companion, i.e. smartphones. From being our alarm clock to being our note-maker, from our watch to our radio, our book-reader to our reminder, smartphones are present everywhere. Smartphone has now become an essential device for particularly the millennial to communicate not only with their friends but also with their family, colleagues, and teachers. The study by the researchers would be quantitative in nature. For the same, a survey would be conducted in particularly the capital of India, i.e. Delhi and the National Capital Region (NCR), which is the metropolitan area covering the entire National Capital Territory of Delhi and urban areas covering states of Haryana, Uttarakhand, Uttar Pradesh and Rajasthan. The tool of the survey would be a questionnaire and the number of respondents would be 200. The results derived from the study would primarily focus on the increasing reach of smartphones in India, smartphones as technological innovation and convergent tools, smartphone usage pattern of millennial in India, most used applications by the millennial, the average time spent by them, the impact of smartphones on the personal interactions of millennial etc. Thus, talking about the smartphone technology and the millennial in India, it would not be wrong to say that the growth, as well as the potential of the smartphones in India, is still immense. Also, very few technologies have made it possible to give a global exposure to the users and smartphone, if not the only one is certainly an immensely effective one that comes to the mind in this case.

Keywords: Delhi – NCR, India, millennial, smartphone

Procedia PDF Downloads 117
18 Classification of Emotions in Emergency Call Center Conversations

Authors: Magdalena Igras, Joanna Grzybowska, Mariusz Ziółko

Abstract:

The study of emotions expressed in emergency phone call is presented, covering both statistical analysis of emotions configurations and an attempt to automatically classify emotions. An emergency call is a situation usually accompanied by intense, authentic emotions. They influence (and may inhibit) the communication between caller and responder. In order to support responders in their responsible and psychically exhaustive work, we studied when and in which combinations emotions appeared in calls. A corpus of 45 hours of conversations (about 3300 calls) from emergency call center was collected. Each recording was manually tagged with labels of emotions valence (positive, negative or neutral), type (sadness, tiredness, anxiety, surprise, stress, anger, fury, calm, relief, compassion, satisfaction, amusement, joy) and arousal (weak, typical, varying, high) on the basis of perceptual judgment of two annotators. As we concluded, basic emotions tend to appear in specific configurations depending on the overall situational context and attitude of speaker. After performing statistical analysis we distinguished four main types of emotional behavior of callers: worry/helplessness (sadness, tiredness, compassion), alarm (anxiety, intense stress), mistake or neutral request for information (calm, surprise, sometimes with amusement) and pretension/insisting (anger, fury). The frequency of profiles was respectively: 51%, 21%, 18% and 8% of recordings. A model of presenting the complex emotional profiles on the two-dimensional (tension-insecurity) plane was introduced. In the stage of acoustic analysis, a set of prosodic parameters, as well as Mel-Frequency Cepstral Coefficients (MFCC) were used. Using these parameters, complex emotional states were modeled with machine learning techniques including Gaussian mixture models, decision trees and discriminant analysis. Results of classification with several methods will be presented and compared with the state of the art results obtained for classification of basic emotions. Future work will include optimization of the algorithm to perform in real time in order to track changes of emotions during a conversation.

Keywords: acoustic analysis, complex emotions, emotion recognition, machine learning

Procedia PDF Downloads 368
17 Six Years Antimicrobial Resistance Trends among Bacterial Isolates in Amhara National Regional State, Ethiopia

Authors: Asrat Agalu Abejew

Abstract:

Background: Antimicrobial resistance (AMR) is a silent tsunami and one of the top global threats to health care and public health. It is one of the common agendas globally and in Ethiopia. Emerging AMR will be a double burden to Ethiopia, which is facing a series of problems from infectious disease morbidity and mortality. In Ethiopia, although there are attempts to document AMR in healthcare institutions, comprehensive and all-inclusive analysis is still lacking. Thus, this study is aimed to determine trends in AMR from 2016-2021. Methods: A retrospective analysis of secondary data recorded in the Amhara Public Health Institute (APHI) from 2016 to 2021 G.C was conducted. Blood, Urine, Stool, Swabs, Discharge, body effusions, and other Microbiological specimens were collected from each study participants, and Bacteria identification and Resistance tests were done using the standard microbiologic procedure. Data was extracted from excel in August 2022, Trends in AMR were analyzed, and the results were described. In addition, the chi-square (X2) test and binary logistic regression were used, and a P. value < 0.05 was used to determine a significant association. Results: During 6 years period, there were 25143 culture and susceptibility tests. Overall, 265 (46.2%) bacteria were resistant to 2-4 antibiotics, 253 (44.2%) to 5-7 antibiotics, and 56 (9.7%) to >=8 antibiotics. The gram-negative bacteria were 166 (43.9%), 155 (41.5%), and 55 (14.6%) resistant to 2-4, 5-7, and ≥8 antibiotics, respectively, whereas 99(50.8%), 96(49.2% and 1 (0.5%) of gram-positive bacteria were resistant to 2-4, 5-7 and ≥8 antibiotics respectively. K. pneumonia 3783 (15.67%) and E. coli 3199 (13.25%) were the most commonly isolated bacteria, and the overall prevalence of AMR was 2605 (59.9%), where K. pneumonia 743 (80.24%), E. cloacae 196 (74.81%), A. baumannii 213 (66.56%) being the most common resistant bacteria for antibiotics tested. Except for a slight decline during 2020 (6469 (25.4%)), the overall trend of AMR is rising from year to year, with a peak in 2019 (8480 (33.7%)) and in 2021 (7508 (29.9%). If left un-intervened, the trend in AMR will increase by 78% of variation from the study period, as explained by the differences in years (R2=0.7799). Ampicillin, Augmentin, ciprofloxacin, cotrimoxazole, tetracycline, and Tobramycin were almost resistant to common bacteria they were tested. Conclusion: AMR is linearly increasing during the last 6 years. If left as it is without appropriate intervention after 15 years (2030 E.C), AMR will increase by 338.7%. A growing number of multi-drug resistant bacteria is an alarm to awake policymakers and those who do have the concern to intervene before it is too late. This calls for a periodic, integrated, and continuous system to determine the prevalence of AMR in commonly used antibiotics.

Keywords: AMR, trend, pattern, MDR

Procedia PDF Downloads 51
16 Occupational Exposure and Contamination to Antineoplastic Drugs of Healthcare Professionals in Mauritania

Authors: Antoine Villa, Moustapha Mohamedou, Florence Pilliere, Catherine Verdun-Esquer, Mathieu Molimard, Mohamed Sidatt Cheikh El Moustaph, Mireille Canal-Raffin

Abstract:

Context: In Mauritania, the activity of the National Center of Oncology (NCO) has steadily risen leading to an increase in the handling of antineoplastic drugs (AD) by healthcare professionals. In this context, the AD contamination of those professionals is a major concern for occupational physicians. It has been evaluated using biological monitoring of occupational exposure (BMOE). Methods: The intervention took place in 2015, in 2 care units, and evaluated nurses preparing and/or infusing AD and agents in charge of hygiene. Participants provided a single urine sample, at the end of the week, at the end of their shift. Five molecules were sought using specific high sensitivity methods (UHPLC-MS/MS) with very low limits of quantification (LOQ) (cyclophosphamide (CP), Ifosfamide (IF), methotrexate (MTX): 2.5ng/L; doxorubicin (Doxo): 10ng/L; α-fluoro-β-alanine (FBAL, 5-FU metabolite): 20ng/L). A healthcare worker was considered as 'contaminated' when an AD was detected at a urine concentration equal to or greater than the LOQ of the analytical method or at trace concentration. Results: Twelve persons participated (6 nurses, 6 agents in charge of hygiene). Twelve urine samples were collected and analyzed. The percentage of contamination was 66.6% for all participants (n=8/12), 100% for nurses (6/6) and 33% for agents in charge of hygiene (2/6). In 62.5% (n=5/8) of the contaminated workers, two to four of the AD were detected in the urine. CP was found in the urine of all contaminated workers. FBAL was found in four, MTX in three and Doxo in one. Only IF was not detected. Urinary concentrations (all drugs combined) ranged from 3 to 844 ng/L for nurses and from 3 to 44 ng/L for agents in charge of hygiene. The median urinary concentrations were 87 ng/L, 15.1 ng/L and 4.4 ng/L for FBAL, CP and MTX, respectively. The Doxo urinary concentration was found 218ng/L. Discussion: There is no current biological exposure index for the interpretation of AD contamination. The contamination of these healthcare professionals is therefore established by the detection of one or more AD in urine. These urinary contaminations are higher than the LOQ of the analytical methods, which must be as low as possible. Given the danger of AD, the implementation of corrective measures is essential for the staff. Biological monitoring of occupational exposure is the most reliable process to identify groups at risk, tracing insufficiently controlled exposures and as an alarm signal. These results show the necessity to educate professionals about the risks of handling AD and/or to care for treated patients.

Keywords: antineoplastic drugs, Mauritania, biological monitoring of occupational exposure, contamination

Procedia PDF Downloads 274
15 Risk Based Maintenance Planning for Loading Equipment in Underground Hard Rock Mine: Case Study

Authors: Sidharth Talan, Devendra Kumar Yadav, Yuvraj Singh Rajput, Subhajit Bhattacharjee

Abstract:

Mining industry is known for its appetite to spend sizeable capital on mine equipment. However, in the current scenario, the mining industry is challenged by daunting factors of non-uniform geological conditions, uneven ore grade, uncontrollable and volatile mineral commodity prices and the ever increasing quest to optimize the capital and operational costs. Thus, the role of equipment reliability and maintenance planning inherits a significant role in augmenting the equipment availability for the operation and in turn boosting the mine productivity. This paper presents the Risk Based Maintenance (RBM) planning conducted on mine loading equipment namely Load Haul Dumpers (LHDs) at Vedanta Resources Ltd subsidiary Hindustan Zinc Limited operated Sindesar Khurd Mines, an underground zinc and lead mine situated in Dariba, Rajasthan, India. The mining equipment at the location is maintained by the Original Equipment Manufacturers (OEMs) namely Sandvik and Atlas Copco, who carry out the maintenance and inspection operations for the equipment. Based on the downtime data extracted for the equipment fleet over the period of 6 months spanning from 1st January 2017 until 30th June 2017, it was revealed that significant contribution of three downtime issues related to namely Engine, Hydraulics, and Transmission to be common among all the loading equipment fleet and substantiated by Pareto Analysis. Further scrutiny through Bubble Matrix Analysis of the given factors revealed the major influence of selective factors namely Overheating, No Load Taken (NTL) issues, Gear Changing issues and Hose Puncture and leakage issues. Utilizing the equipment wise analysis of all the downtime factors obtained, spares consumed, and the alarm logs extracted from the machines, technical design changes in the equipment and pre shift critical alarms checklist were proposed for the equipment maintenance. The given analysis is beneficial to allow OEMs or mine management to focus on the critical issues hampering the reliability of mine equipment and design necessary maintenance strategies to mitigate them.

Keywords: bubble matrix analysis, LHDs, OEMs, Pareto chart analysis, spares consumption matrix, critical alarms checklist

Procedia PDF Downloads 124
14 Influence of CO₂ on the Curing of Permeable Concrete

Authors: A. M. Merino-Lechuga, A. González-Caro, D. Suescum-Morales, E. Fernández-Ledesma, J. R. Jiménez, J. M. Fernández-Rodriguez

Abstract:

Since the mid-19th century, the boom in the economy and industry has grown exponentially. This has led to an increase in pollution due to rising Greenhouse Gas (GHG) emissions and the accumulation of waste, leading to an increasingly imminent future scarcity of raw materials and natural resources. Carbon dioxide (CO₂) is one of the primary greenhouse gases, accounting for up to 55% of Greenhouse Gas (GHG) emissions. The manufacturing of construction materials generates approximately 73% of CO₂ emissions, with Portland cement production contributing to 41% of this figure. Hence, there is scientific and social alarm regarding the carbon footprint of construction materials and their influence on climate change. Carbonation of concrete is a natural process whereby CO₂ from the environment penetrates the material, primarily through pores and microcracks. Once inside, carbon dioxide reacts with calcium hydroxide (Ca(OH)2) and/or CSH, yielding calcium carbonates (CaCO3) and silica gel. Consequently, construction materials act as carbon sinks. This research investigated the effect of accelerated carbonation on the physical, mechanical, and chemical properties of two types of non-structural vibrated concrete pavers (conventional and draining) made from natural aggregates and two types of recycled aggregates from construction and demolition waste (CDW). Natural aggregates were replaced by recycled aggregates using a volumetric substitution method, and the CO₂ capture capacity was calculated. Two curing environments were utilized: a carbonation chamber with 5% CO₂ and a standard climatic chamber with atmospheric CO₂ concentration. Additionally, the effect of curing times of 1, 3, 7, 14, and 28 days on concrete properties was analyzed. Accelerated carbonation in-creased the apparent dry density, reduced water-accessible porosity, improved compressive strength, and decreased setting time to achieve greater mechanical strength. The maximum CO₂ capture ratio was achieved with the use of recycled concrete aggregate (52.52 kg/t) in the draining paver. Accelerated carbonation conditions led to a 525% increase in carbon capture compared to curing under atmospheric conditions. Accelerated carbonation of cement-based products containing recycled aggregates from construction and demolition waste is a promising technology for CO₂ capture and utilization, offering a means to mitigate the effects of climate change and promote the new paradigm of circular economy.

Keywords: accelerated carbonation, CO₂ curing, CO₂ uptake and construction and demolition waste., circular economy

Procedia PDF Downloads 26
13 How to Talk about It without Talking about It: Cognitive Processing Therapy Offers Trauma Symptom Relief without Violating Cultural Norms

Authors: Anne Giles

Abstract:

Humans naturally wish they could forget traumatic experiences. To help prevent future harm, however, the human brain has evolved to retain data about experiences of threat, alarm, or violation. When given compassionate support and assistance with thinking helpfully and realistically about traumatic events, most people can adjust to experiencing hardships, albeit with residual sad, unfortunate memories. Persistent, recurrent, intrusive memories, difficulty sleeping, emotion dysregulation, and avoidance of reminders, however, may be symptoms of Post-traumatic Stress Disorder (PTSD). Brain scans show that PTSD affects brain functioning. We currently have no physical means of restoring the system of brain structures and functions involved with PTSD. Medications may ease some symptoms but not others. However, forms of "talk therapy" with cognitive components have been found by researchers to reduce, even resolve, a broad spectrum of trauma symptoms. Many cultures have taboos against talking about hardships. Individuals may present themselves to mental health care professionals with severe, disabling trauma symptoms but, because of cultural norms, be unable to speak about them. In China, for example, relationship expectations may include the belief, "Bad things happening in the family should stay in the family (jiāchǒu bùkě wàiyán 家丑不可外扬)." The concept of "family (jiā 家)" may include partnerships, close and extended families, communities, companies, and the nation itself. In contrast to many trauma therapies, Cognitive Processing Therapy (CPT) for Post-traumatic Stress Disorder asks its participants to focus not on "what" happened but on "why" they think the trauma(s) occurred. The question "why" activates and exercises cognitive functioning. Brain scans of individuals with PTSD reveal executive functioning portions of the brain inadequately active, with emotion centers overly active. CPT conceptualizes PTSD as a network of cognitive distortions that keep an individual "stuck" in this under-functioning and over-functioning dynamic. Through asking participants forms of the question "why," plus offering a protocol for examining answers and relinquishing unhelpful beliefs, CPT assists individuals in consciously reactivating the cognitive, executive functions of their brains, thus restoring normal functioning and reducing distressing trauma symptoms. The culturally sensitive components of CPT that allow people to "talk about it without talking about it" may offer the possibility for worldwide relief from symptoms of trauma.

Keywords: cognitive processing therapy (CPT), cultural norms, post-traumatic stress disorder (PTSD), trauma recovery

Procedia PDF Downloads 177
12 Modeling Search-And-Rescue Operations by Autonomous Mobile Robots at Sea

Authors: B. Kriheli, E. Levner, T. C. E. Cheng, C. T. Ng

Abstract:

During the last decades, research interest in planning, scheduling, and control of emergency response operations, especially people rescue and evacuation from the dangerous zone of marine accidents, has increased dramatically. Until the survivors (called ‘targets’) are found and saved, it may cause loss or damage whose extent depends on the location of the targets and the search duration. The problem is to efficiently search for and detect/rescue the targets as soon as possible with the help of intelligent mobile robots so as to maximize the number of saved people and/or minimize the search cost under restrictions on the amount of saved people within the allowable response time. We consider a special situation when the autonomous mobile robots (AMR), e.g., unmanned aerial vehicles and remote-controlled robo-ships have no operator on board as they are guided and completely controlled by on-board sensors and computer programs. We construct a mathematical model for the search process in an uncertain environment and provide a new fast algorithm for scheduling the activities of the autonomous robots during the search-and rescue missions after an accident at sea. We presume that in the unknown environments, the AMR’s search-and-rescue activity is subject to two types of error: (i) a 'false-negative' detection error where a target object is not discovered (‘overlooked') by the AMR’s sensors in spite that the AMR is in a close neighborhood of the latter and (ii) a 'false-positive' detection error, also known as ‘a false alarm’, in which a clean place or area is wrongly classified by the AMR’s sensors as a correct target. As the general resource-constrained discrete search problem is NP-hard, we restrict our study to finding local-optimal strategies. A specificity of the considered operational research problem in comparison with the traditional Kadane-De Groot-Stone search models is that in our model the probability of the successful search outcome depends not only on cost/time/probability parameters assigned to each individual location but, as well, on parameters characterizing the entire history of (unsuccessful) search before selecting any next location. We provide a fast approximation algorithm for finding the AMR route adopting a greedy search strategy in which, in each step, the on-board computer computes a current search effectiveness value for each location in the zone and sequentially searches for a location with the highest search effectiveness value. Extensive experiments with random and real-life data provide strong evidence in favor of the suggested operations research model and corresponding algorithm.

Keywords: disaster management, intelligent robots, scheduling algorithm, search-and-rescue at sea

Procedia PDF Downloads 145
11 Impact of Youth Corners and Knowledge about Human Sexuality among Young Adults and Adolescents of Nigerian Population in the Prevention of Sexually Transmitted Diseases

Authors: Gabriel I. Oke, Faremi O. Ayodeji

Abstract:

Background: Access to youth Friendly Health Corners is vital for ensuring sexual reproductive health and total well being of young Adults since human sexuality has been widely misunderstood. Meanwhile, behavior of young people towards it remains at variance with the alarm. This study attempt to access the impact of youth corners also called Adolescent Friendly Health Corners on manifestation of human sexual behavior among Nigerian adolescent and young adults. Description: Hundred young adults and adolescents of both sex between the Age range of 12-25years were randomly selected from 5 secondary schools and 3 prominent universities in Southwestern Nigeria and focal group discussions (FGD) were conducted among them. Fifty secondary and primary health facilities were visited between February and June 2017 to conduct interviews for health workers and to ascertain the presence or absence of youth corners. Results: 95% of the health facilities visited lack Youth Corners section neither are they willing to make provision for it due to lack of workmanship and sponsorship. However, 5% with Youth corners does not have well-trained Counselors or a Health Educator but health professionals from nursing profession. 90% of the respondents of which 16-17 years of Age is the mean age had their first sexual exposure with no use of protection even before been introduced to what Sexuality is all about. Virtually, none of the respondents had ever visited a Youth Corner before or heard the term before. 86% have heard about the term STI before of which 60% are using protection, 10% care less about any information attached to the term STI, 4% have not heard of the term STI before even when translated to their local dialect. 20% are abstaining as at the time the study was conducted and they attribute their sexual decision to religion and parental influence. Of the age group 20-25, 45% claimed they have had symptoms of one STI or the other and 40% claimed they have been tested positive for an STI before of which 12% have positive HIV status. Promiscuous behaviors were found among them before they reach the age 16years with pornography ranking the highest, followed by masturbation. Respondents blame this on peer pressure, the lack of Youth Friendly Centers in their locality and lack of proper Sexual Orientation on time. About half of the respondents make use of contraceptives while others have varying views. We found out that inability to access Youth Friendly Centers amongst the respondents might be one of the singular reasons of their early experimentation of their sex life and lack of healthy sexual lifestyle. (95% CI, P=0.922) Conclusion: The study reveals that a connection between youth Friendly Centers and Prevention of Sexually Transmitted Diseases, therefore more sustainable Friendly Youth Corners with well-trained educators are needed in various Health facilities to checkmate the numerous risks of Young People along the path of adulthood.

Keywords: adolescents, sexually transmitted infections, reproductive health, youth corners

Procedia PDF Downloads 205
10 Sleep Quality as Perceived by Critically Ill Patients at El Manial University Hospitals

Authors: Mohamed Adel Ahmed, Warda Youssef Morsy , Hanaa Ali El Feky

Abstract:

Background: Literature review cited that sleep is absolutely essential for surviving and reclamation of the quality of life. Critically ill patients often have poor sleep quality with prolonged sleep latency, sleep fragmentation, decreased sleep efficiency and frequent arousals. Nurses have a unique role for the early diagnosis of sleep disorders, decreasing stressors levels and providing the necessary environmental regulations to create a therapeutic ambiance. The aim of the study: to assess perceived sleep quality and identify factors affecting sleep quality among adult critically ill patients At El Manial University Hospital. Research Design: A descriptive exploratory design was utilized. Research questions: a) how do adult critically ill patients perceive sleep quality in the Critical Care Department of El Manial University Hospital? b) What are the factors affecting sleep quality among adult critically ill patients at El Manial University Hospital? Setting: selected critical and cardiac care units at El Manial University Hospital. Sample: A samples of convenience consisting of 100 adult male and female patients were included in the study. Tools of data collection: tool 1: Socio-demographic and Medical Data Sheet, tool 2: Modified St Mary's Hospital Sleep Questionnaire tool 3: Factors Affecting Sleep Quality Questionnaire among ICU Patients Results: The current study revealed that 76.0% of the studied sample had lack of sleep disturbance before hospitalization. However, 84 % had sleep disturbances during ICU stay, of these more than two-thirds (67 %) had moderate sleep disturbance. Presence of strange and bad odors, noise, having pain, fear of death and a loud voice produced by the ICU personnel had the most significant negative impact on patients’ sleep in percentage of 52.4, 50, 61.9, 45.2, 52.4, respectively. Conclusion: Sleep disturbances in the ICU are multifactorial, and ICU patients’ perceived degrees of sleep disturbance as a moderate. Recommendations: Based on findings of the present study, the following are recommended to be done by ICU nurses; create a healing ICU environment that should incorporate noise, light and temperature controls; decrease stimuli during night time hours to promote regulation of the circadian rhythm, allow usage of sleeping aids such as relaxing music, eye patches and earplugs into their daily nursing practice; cluster nursing activities and eliminate non-essential treatments during night time hours to allow uninterrupted sleep periods of at least 90 minutes to complete one sleep cycle , and minimize staff conversation, alarm noise and light during the quiet night time hours.

Keywords: sleep quality, critically ill, patients, perception

Procedia PDF Downloads 420
9 Act Local, Think Global: Superior Institute of Engineering of Porto Campaign for a Sustainable Campus

Authors: R. F. Mesquita Brandão

Abstract:

Act Local, Think Global is the name of a campaign implemented at Superior Institute of Engineering of Porto (ISEP), one of schools of Polytechnic of Porto, with the main objective of increase the sustainability of the campus. ISEP has a campus with 52.000 m2 and more than 7.000 students. The campaign started in 2019 and the results are very clear. In 2019 only 16% of the waste created in the campus was correctly separate for recycling and now almost 50% of waste goes to the correct waste container. Actions to reduce the energy consumption were implemented with significantly results. One of the major problems in the campus are the water leaks. To solve this problem was implemented a methodology for water monitoring during the night, a period of time where consumptions are normally low. If water consumption in the period is higher than a determinate value it may mean a water leak and an alarm is created to the maintenance teams. In terms of energy savings, some measurements were implemented to create savings in energy consumption and in equivalent CO₂ produced. In order to reduce the use of plastics in the campus, was implemented the prohibition of selling 33 cl plastic water bottles and in collaboration with the students association all meals served in the restaurants changed the water plastic bottle for a glass that can be refilled with water in the water dispensers. This measures created a reduction of use of more than 75.000 plastic bottles per year. In parallel was implemented the ISEP water glass bottle to be used in all scientific meetings and events. Has a way of involving all community in sustainability issues was developed and implemented a vertical garden in aquaponic system. In 2019, the first vertical garden without soil was installed inside a large campus building. The system occupies the entire exterior façade (3 floors) of the entrance to ISEP's G building. On each of these floors there is a planter with 42 positions available for plants. Lettuces, strawberries, peppers are examples of some vegetable produced that can be collected by the entire community. Associated to the vertical garden was developed a monitoring system were some parameters of the system are monitored. This project is under development because it will work in a stand-alone energy feeding, with the use of photovoltaic panels for production of energy necessities. All the system was, and still is, developed by students and teachers and is used in class projects of some ISEP courses. These and others measures implemented in the campus, will be more developed in the full paper, as well as all the results obtained, allowed ISEP to be the first Portuguese high school to obtain the certification “Coração Verde” (Green Heart), awarded by LIPOR, a Portuguese company with the mission of transform waste into new resources through the implementation of innovative and circular practices, generating and sharing value.

Keywords: aquaponics, energy efficiency, recycling, sustainability, waste separation

Procedia PDF Downloads 68
8 Blunt Abdominal Trauma Management in Adult Patients: An Investigation on Safety of Discharging Patients with Normal Initial Findings

Authors: Rahimi-Movaghar Vafa, Mansouri Pejman, Chardoli Mojtaba, Rezvani Samina

Abstract:

Introduction: Blunt abdominal trauma is one of the leading causes of morbidity and mortality in all age groups, but diagnosis of serious intra-abdominal pathology is difficult and most of the damages are obscure in the initial investigation. There is still controversy about which patients should undergo abdomen/pelvis CT, which patients needs more observation and which patients can be discharged safely The aim of this study was to determine that is it safe to discharge patients with blunt abdominal trauma with normal initial findings. Methods: This non-randomized cross-sectional study was conducted from September 2013 to September 2014 at two levels I trauma centers, Sina hospital and Rasoul-e-Akram hospital (Tehran, Iran). Our inclusion criteria were all patients were admitted for suspicious BAT and our exclusion criteria were patients that have serious head and neck, chest, spine and limb injuries which need surgical intervention, those who have unstable vital signs, pregnant women with a gestational age over 3 months and homeless or without exact home address. 390 patients with blunt trauma abdomen examined and the necessary data, including demographic data, the abdominal examination, FAST result, patients’ lab test results (hematocrit, base deficit, urine analysis) on admission and at 6 and 12 hours after admission were recorded. Patients with normal physical examination, laboratory tests and FAST were discharged from the ED during 12 hours with the explanation of the alarm signs and were followed up after 24 hours and 1 week by a telephone call. Patients with abnormal findings in physical examination, laboratory tests, and FAST underwent abdomino-pelvic CT scan. Results: The study included 390 patients with blunt abdominal trauma between 12 and 80 years of age (mean age, 37.0 ± 13.7 years) and the mean duration of hospitalization in patients was 7.4 ± 4.1 hours. 88.6% of the patients were discharged from hospital before 12 hours. Odds ratio (OR) for having any symptoms for discharge after 6 hours was 0.160 and after 12 hours was 0.117 hours, which is statistically significant. Among the variables age, systolic and diastolic blood pressure, heart rate, respiratory rate, hematocrit and base deficit at admission, 6 hours and 12 hours after admission showed no significant statistical relationship with discharge time. From our 390 patients, 190 patients have normal initial physical examination, lab data and FAST findings that didn’t show any signs or symptoms in their next assessment and in their follow up by the phone call. Conclusion: It is recommended that patients with no symptoms at admission (completely normal physical examination, ultrasound, normal hematocrit and normal base deficit and lack of microscopic hematuria) and good family and social status can be safely discharged from the emergency department.

Keywords: blunt abdominal trauma, patient discharge, emergency department, FAST

Procedia PDF Downloads 345
7 The Role of Social Media in the Rise of Islamic State in India: An Analytical Overview

Authors: Yasmeen Cheema, Parvinder Singh

Abstract:

The evolution of Islamic State (acronym IS) has an ultimate goal of restoring the caliphate. IS threat to the global security is main concern of international community but has also raised a factual concern for India about the regular radicalization of IS ideology among Indian youth. The incident of joining Arif Ejaz Majeed, an Indian as ‘jihadist’ in IS has set strident alarm in law & enforcement agencies. On 07.03.2017, many people were injured in an Improvised Explosive Device (IED) blast on-board of Bhopal Ujjain Express. One perpetrator of this incident was killed in encounter with police. But, the biggest shock is that the conspiracy was pre-planned and the assailants who carried out the blast were influenced by the ideology perpetrated by the Islamic State. This is the first time name of IS has cropped up in a terror attack in India. It is a red indicator of violent presence of IS in India, which is spreading through social media. The IS have the capacity to influence the younger Muslim generation in India through its brutal and aggressive propaganda videos, social media apps and hatred speeches. It is a well known fact that India is on the radar of IS, as well on its ‘Caliphate Map’. IS uses Twitter, Facebook and other social media platforms constantly. Islamic State has used enticing videos, graphics, and articles on social media and try to influence persons from India & globally that their jihad is worthy. According to arrested perpetrator of IS in different cases in India, the most of Indian youths are victims to the daydreams which are fondly shown by IS. The dreams that the Muslim empire as it was before 1920 can come back with all its power and also that the Caliph and its caliphate can be re-established are shown by the IS. Indian Muslim Youth gets attracted towards these euphemistic ideologies. Islamic State has used social media for disseminating its poisonous ideology, recruitment, operational activities and for future direction of attacks. IS through social media inspired its recruits & lone wolfs to continue to rely on local networks to identify targets and access weaponry and explosives. Recently, a pro-IS media group on its Telegram platform shows Taj Mahal as the target and suggested mode of attack as a Vehicle Born Improvised Explosive Attack (VBIED). Islamic State definitely has the potential to destroy the Indian national security & peace, if timely steps are not taken. No doubt, IS has used social media as a critical mechanism for recruitment, planning and executing of terror attacks. This paper will therefore examine the specific characteristics of social media that have made it such a successful weapon for Islamic State. The rise of IS in India should be viewed as a national crisis and handled at the central level with efficient use of modern technology.

Keywords: ideology, India, Islamic State, national security, recruitment, social media, terror attack

Procedia PDF Downloads 201
6 University Building: Discussion about the Effect of Numerical Modelling Assumptions for Occupant Behavior

Authors: Fabrizio Ascione, Martina Borrelli, Rosa Francesca De Masi, Silvia Ruggiero, Giuseppe Peter Vanoli

Abstract:

The refurbishment of public buildings is one of the key factors of energy efficiency policy of European States. Educational buildings account for the largest share of the oldest edifice with interesting potentialities for demonstrating best practice with regards to high performance and low and zero-carbon design and for becoming exemplar cases within the community. In this context, this paper discusses the critical issue of dealing the energy refurbishment of a university building in heating dominated climate of South Italy. More in detail, the importance of using validated models will be examined exhaustively by proposing an analysis on uncertainties due to modelling assumptions mainly referring to the adoption of stochastic schedules for occupant behavior and equipment or lighting usage. Indeed, today, the great part of commercial tools provides to designers a library of possible schedules with which thermal zones can be described. Very often, the users do not pay close attention to diversify thermal zones and to modify or to adapt predefined profiles, and results of designing are affected positively or negatively without any alarm about it. Data such as occupancy schedules, internal loads and the interaction between people and windows or plant systems, represent some of the largest variables during the energy modelling and to understand calibration results. This is mainly due to the adoption of discrete standardized and conventional schedules with important consequences on the prevision of the energy consumptions. The problem is surely difficult to examine and to solve. In this paper, a sensitivity analysis is presented, to understand what is the order of magnitude of error that is committed by varying the deterministic schedules used for occupation, internal load, and lighting system. This could be a typical uncertainty for a case study as the presented one where there is not a regulation system for the HVAC system thus the occupant cannot interact with it. More in detail, starting from adopted schedules, created according to questioner’ s responses and that has allowed a good calibration of energy simulation model, several different scenarios are tested. Two type of analysis are presented: the reference building is compared with these scenarios in term of percentage difference on the projected total electric energy need and natural gas request. Then the different entries of consumption are analyzed and for more interesting cases also the comparison between calibration indexes. Moreover, for the optimal refurbishment solution, the same simulations are done. The variation on the provision of energy saving and global cost reduction is evidenced. This parametric study wants to underline the effect on performance indexes evaluation of the modelling assumptions during the description of thermal zones.

Keywords: energy simulation, modelling calibration, occupant behavior, university building

Procedia PDF Downloads 107
5 Procedure for Monitoring the Process of Behavior of Thermal Cracking in Concrete Gravity Dams: A Case Study

Authors: Adriana de Paula Lacerda Santos, Bruna Godke, Mauro Lacerda Santos Filho

Abstract:

Several dams in the world have already collapsed, causing environmental, social and economic damage. The concern to avoid future disasters has stimulated the creation of a great number of laws and rules in many countries. In Brazil, Law 12.334/2010 was created, which establishes the National Policy on Dam Safety. Overall, this policy requires the dam owners to invest in the maintenance of their structures and to improve its monitoring systems in order to provide faster and straightforward responses in the case of an increase of risks. As monitoring tools, visual inspections has provides comprehensive assessment of the structures performance, while auscultation’s instrumentation has added specific information on operational or behavioral changes, providing an alarm when a performance indicator exceeds the acceptable limits. These limits can be set using statistical methods based on the relationship between instruments measures and other variables, such as reservoir level, time of the year or others instruments measuring. Besides the design parameters (uplift of the foundation, displacements, etc.) the dam instrumentation can also be used to monitor the behavior of defects and damage manifestations. Specifically in concrete gravity dams, one of the main causes for the appearance of cracks, are the concrete volumetric changes generated by the thermal origin phenomena, which are associated with the construction process of these structures. Based on this, the goal of this research is to propose a monitoring process of the thermal cracking behavior in concrete gravity dams, through the instrumentation data analysis and the establishment of control values. Therefore, as a case study was selected the Block B-11 of José Richa Governor Dam Power Plant, that presents a cracking process, which was identified even before filling the reservoir in August’ 1998, and where crack meters and surface thermometers were installed for its monitoring. Although these instruments were installed in May 2004, the research was restricted to study the last 4.5 years (June 2010 to November 2014), when all the instruments were calibrated and producing reliable data. The adopted method is based on simple linear correlations procedures to understand the interactions among the instruments time series, verifying the response times between them. The scatter plots were drafted from the best correlations, which supported the definition of the limit control values. Among the conclusions, it is shown that there is a strong or very strong correlation between ambient temperature and the crack meters and flowmeters measurements. Based on the results of the statistical analysis, it was possible to develop a tool for monitoring the behavior of the case study cracks. Thus it was fulfilled the goal of the research to develop a proposal for a monitoring process of the behavior of thermal cracking in concrete gravity dams.

Keywords: concrete gravity dam, dams safety, instrumentation, simple linear correlation

Procedia PDF Downloads 265
4 Assessment of Environmental Mercury Contamination from an Old Mercury Processing Plant 'Thor Chemicals' in Cato Ridge, KwaZulu-Natal, South Africa

Authors: Yohana Fessehazion

Abstract:

Mercury is a prominent example of a heavy metal contaminant in the environment, and it has been extensively investigated for its potential health risk in humans and other organisms. In South Africa, massive mercury contamination happened in1980s when the England-based mercury reclamation processing plant relocated to Cato Ridge, KwaZulu-Natal Province, and discharged mercury waste into the Mngceweni River. This mercury waste discharge resulted in high mercury concentration that exceeded the acceptable levels in Mngceweni River, Umgeni River, and human hair of the nearby villagers. This environmental issue raised the alarm, and over the years, several environmental assessments were reported the dire environmental crises resulting from the Thor Chemicals (now known as Metallica Chemicals) and urged the immediate removal of the around 3,000 tons of mercury waste stored in the factory storage facility over two decades. Recently theft of some containers with the toxic substance from the Thor Chemicals warehouse and the subsequent fire that ravaged the facility furtherly put the factory on the spot escalating the urgency of left behind deadly mercury waste removal. This project aims to investigate the mercury contamination leaking from an old Thor Chemicals mercury processing plant. The focus will be on sediments, water, terrestrial plants, and aquatic weeds such as the prominent water hyacinth weeds in the nearby water systems of Mngceweni River, Umgeni River, and Inanda Dam as a bio-indicator and phytoremediator for mercury pollution. Samples will be collected in spring around October when the condition is favourable for microbial activity to methylate mercury incorporated in sediments and blooming season for some aquatic weeds, particularly water hyacinth. Samples of soil, sediment, water, terrestrial plant, and aquatic weed will be collected per sample site from the point of source (Thor Chemicals), Mngceweni River, Umgeni River, and the Inanda Dam. One-way analysis of variance (ANOVA) tests will be conducted to determine any significant differences in the Hg concentration among all sampling sites, followed by Least Significant Difference post hoc test to determine if mercury contamination varies with the gradient distance from the source point of pollution. The flow injection atomic spectrometry (FIAS) analysis will also be used to compare the mercury sequestration between the different plant tissues (roots and stems). The principal component analysis is also envisaged for use to determine the relationship between the source of mercury pollution and any of the sampling points (Umgeni and Mngceweni Rivers and the Inanda Dam). All the Hg values will be expressed in µg/L or µg/g in order to compare the result with the previous studies and regulatory standards. Sediments are expected to have relatively higher levels of Hg compared to the soils, and aquatic macrophytes, water hyacinth weeds are expected to accumulate a higher concentration of mercury than terrestrial plants and crops.

Keywords: mercury, phytoremediation, Thor chemicals, water hyacinth

Procedia PDF Downloads 179
3 Early Diagnosis of Myocardial Ischemia Based on Support Vector Machine and Gaussian Mixture Model by Using Features of ECG Recordings

Authors: Merve Begum Terzi, Orhan Arikan, Adnan Abaci, Mustafa Candemir

Abstract:

Acute myocardial infarction is a major cause of death in the world. Therefore, its fast and reliable diagnosis is a major clinical need. ECG is the most important diagnostic methodology which is used to make decisions about the management of the cardiovascular diseases. In patients with acute myocardial ischemia, temporary chest pains together with changes in ST segment and T wave of ECG occur shortly before the start of myocardial infarction. In this study, a technique which detects changes in ST/T sections of ECG is developed for the early diagnosis of acute myocardial ischemia. For this purpose, a database of real ECG recordings that contains a set of records from 75 patients presenting symptoms of chest pain who underwent elective percutaneous coronary intervention (PCI) is constituted. 12-lead ECG’s of the patients were recorded before and during the PCI procedure. Two ECG epochs, which are the pre-inflation ECG which is acquired before any catheter insertion and the occlusion ECG which is acquired during balloon inflation, are analyzed for each patient. By using pre-inflation and occlusion recordings, ECG features that are critical in the detection of acute myocardial ischemia are identified and the most discriminative features for the detection of acute myocardial ischemia are extracted. A classification technique based on support vector machine (SVM) approach operating with linear and radial basis function (RBF) kernels to detect ischemic events by using ST-T derived joint features from non-ischemic and ischemic states of the patients is developed. The dataset is randomly divided into training and testing sets and the training set is used to optimize SVM hyperparameters by using grid-search method and 10fold cross-validation. SVMs are designed specifically for each patient by tuning the kernel parameters in order to obtain the optimal classification performance results. As a result of implementing the developed classification technique to real ECG recordings, it is shown that the proposed technique provides highly reliable detections of the anomalies in ECG signals. Furthermore, to develop a detection technique that can be used in the absence of ECG recording obtained during healthy stage, the detection of acute myocardial ischemia based on ECG recordings of the patients obtained during ischemia is also investigated. For this purpose, a Gaussian mixture model (GMM) is used to represent the joint pdf of the most discriminating ECG features of myocardial ischemia. Then, a Neyman-Pearson type of approach is developed to provide detection of outliers that would correspond to acute myocardial ischemia. Neyman – Pearson decision strategy is used by computing the average log likelihood values of ECG segments and comparing them with a range of different threshold values. For different discrimination threshold values and number of ECG segments, probability of detection and probability of false alarm values are computed, and the corresponding ROC curves are obtained. The results indicate that increasing number of ECG segments provide higher performance for GMM based classification. Moreover, the comparison between the performances of SVM and GMM based classification showed that SVM provides higher classification performance results over ECG recordings of considerable number of patients.

Keywords: ECG classification, Gaussian mixture model, Neyman–Pearson approach, support vector machine

Procedia PDF Downloads 119
2 The Implantable MEMS Blood Pressure Sensor Model With Wireless Powering And Data Transmission

Authors: Vitaliy Petrov, Natalia Shusharina, Vitaliy Kasymov, Maksim Patrushev, Evgeny Bogdanov

Abstract:

The leading worldwide death reasons are ischemic heart disease and other cardiovascular illnesses. Generally, the common symptom is high blood pressure. Long-time blood pressure control is very important for the prophylaxis, correct diagnosis and timely therapy. Non-invasive methods which are based on Korotkoff sounds are impossible to apply often and for a long time. Implantable devices can combine longtime monitoring with high accuracy of measurements. The main purpose of this work is to create a real-time monitoring system for decreasing the death rate from cardiovascular diseases. These days implantable electronic devices began to play an important role in medicine. Usually implantable devices consist of a transmitter, powering which could be wireless with a special made battery and measurement circuit. Common problems in making implantable devices are short lifetime of the battery, big size and biocompatibility. In these work, blood pressure measure will be the focus because it’s one of the main symptoms of cardiovascular diseases. Our device will consist of three parts: the implantable pressure sensor, external transmitter and automated workstation in a hospital. The Implantable part of pressure sensors could be based on piezoresistive or capacitive technologies. Both sensors have some advantages and some limitations. The Developed circuit is based on a small capacitive sensor which is made of the technology of microelectromechanical systems (MEMS). The Capacitive sensor can provide high sensitivity, low power consumption and minimum hysteresis compared to the piezoresistive sensor. For this device, it was selected the oscillator-based circuit where frequency depends from the capacitance of sensor hence from capacitance one can calculate pressure. The external device (transmitter) used for wireless charging and signal transmission. Some implant devices for these applications are passive, the external device sends radio wave signal on internal LC circuit device. The external device gets reflected the signal from the implant and from a change of frequency is possible to calculate changing of capacitance and then blood pressure. However, this method has some disadvantages, such as the patient position dependence and static using. Developed implantable device doesn’t have these disadvantages and sends blood pressure data to the external part in real-time. The external device continuously sends information about blood pressure to hospital cloud service for analysis by a physician. Doctor’s automated workstation at the hospital also acts as a dashboard, which displays actual medical data of patients (which require attention) and stores it in cloud service. Usually, critical heart conditions occur few hours before heart attack but the device is able to send an alarm signal to the hospital for an early action of medical service. The system was tested with wireless charging and data transmission. These results can be used for ASIC design for MEMS pressure sensor.

Keywords: MEMS sensor, RF power, wireless data, oscillator-based circuit

Procedia PDF Downloads 557
1 Secure Texting Used in a Post-Acute Pediatric Skilled Nursing Inpatient Setting: A Multidisciplinary Care Team Driven Communication System with Alarm and Alert Notification Management

Authors: Bency Ann Massinello, Nancy Day, Janet Fellini

Abstract:

Background: The use of an appropriate mode of communication among the multidisciplinary care team members regarding coordination of care is an extremely complicated yet important patient safety initiative. Effective communication among the team members(nursing staff, medical staff, respiratory therapists, rehabilitation therapists, patient-family services team…) become essential to develop a culture of trust and collaboration to deliver the highest quality care to patients are their families. The inpatient post-acute pediatrics, where children and their caregivers come for continuity of care, is no exceptions to the increasing use of text messages as a means to communication among clinicians. One such platform is the Vocera Communications (Vocera Smart Mobile App called Vocera Edge) allows the teams to use the application and share sensitive patient information through an encrypted platform using IOS company provided shared and assigned mobile devices. Objective: This paper discusses the quality initiative of implementing the transition from Vocera Smartbage to Vocera Edge Mobile App, technology advantage, use case expansion, and lessons learned about a secure alternative modality that allows sending and receiving secure text messages in a pediatric post-acute setting using an IOS device. This implementation process included all direct care staff, ancillary teams, and administrative teams on the clinical units. Methods: Our institution launched this transition from voice prompted hands-free Vocera Smartbage to Vocera Edge mobile based app for secure care team texting using a big bang approach during the first PDSA cycle. The pre and post implementation data was gathered using a qualitative survey of about 500 multidisciplinary team members to determine the ease of use of the application and its efficiency in care coordination. The technology was further expanded in its use by implementing clinical alerts and alarms notification using middleware integration with patient monitoring (Masimo) and life safety (Nurse call) systems. Additional use of the smart mobile iPhone use include pushing out apps like Lexicomp and Up to Date to have it readily available for users for evident-based practice in medication and disease management. Results: Successful implementation of the communication system in a shared and assigned model with all of the multidisciplinary teams in our pediatric post-acute setting. In just a 3-monthperiod post implementation, we noticed a 14% increase from 7,993 messages in 6 days in December 2020 to 9,116messages in March 2021. This confirmed that all clinical and non-clinical teams were using this mode of communication for coordinating the care for their patients. System generated data analytics used in addition to the pre and post implementation staff survey for process evaluation. Conclusion: A secure texting option using a mobile device is a safe and efficient mode for care team communication and collaboration using technology in real time. This allows for the settings like post-acute pediatric care areas to be in line with the widespread use of mobile apps and technology in our mainstream healthcare.

Keywords: nursing informatics, mobile secure texting, multidisciplinary communication, pediatrics post acute care

Procedia PDF Downloads 173