Search results for: malware infection propagating malicious code
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 2967

Search results for: malware infection propagating malicious code

2847 A Study on the Prevalence and Microbiological Profile of Nosocomial Infections in the ICU of a Tertiary Care Hospital in Eastern India

Authors: Pampita Chakraborty, Sukumar Mukherjee

Abstract:

This study was done to determine the prevalence of nosocomial infections in the ICU and to identify the common microorganisms causing these infections and their antimicrobial sensitivity pattern. Nosocomial infection or hospital-acquired infection is a localized or a systemic condition resulting from an adverse reaction to the presence of infectious agents. Nosocomial infections are not present or incubating when the patient is admitted to hospital or other health care facility. They are caused by pathogens that easily spread through the body. Many hospitalized patients have compromised immune systems, so they are less able to fight off infections. These infections occur worldwide, both in the developed and developing the world. They are a significant burden to patients and public health. They are a major cause of death and increased morbidity in hospitalized patients, which is a matter of serious concern today. This study was done during the period of one year (2012-2013) in the ICU of the tertiary care hospital in eastern India. Prevalence of nosocomial infection was determined; site of infection and the pattern of microorganisms were identified along with the assessment of antibiotic susceptibility profile. Patients who developed an infection after 48 hours of admission to the ICU were included in the study. A total of 324 ICU patients were analyzed, of these 79 patients were found to have developed a nosocomial infection (24.3% prevalence). Urinary tract infection was found to be more predominant followed by respiratory tract infection and soft tissue infection. The most frequently isolated microorganism was E. coli, Pseudomonas aeruginosa, Klebsiella pneumoniae followed by other organisms respectively. Antibiotic susceptibility test of these isolates was done against commonly used antibiotics. Patients admitted to the ICU are especially susceptible to nosocomial infections. Despite adequate antimicrobial treatment, nosocomial ICU infections can significantly affect ICU stay and can cause an increase in patient’s morbidity and mortality. Adherence to infection protocol, proper monitoring and the judicious use of antibiotics are important in preventing such infections on a regular basis.

Keywords: antibiotic susceptibility, intensive care unit, nosocomial infection, nosocomial pathogen

Procedia PDF Downloads 291
2846 Virtual Reality Based 3D Video Games and Speech-Lip Synchronization Superseding Algebraic Code Excited Linear Prediction

Authors: P. S. Jagadeesh Kumar, S. Meenakshi Sundaram, Wenli Hu, Yang Yung

Abstract:

In 3D video games, the dominance of production is unceasingly growing with a protruding level of affordability in terms of budget. Afterward, the automation of speech-lip synchronization technique is customarily onerous and has advanced a critical research subject in virtual reality based 3D video games. This paper presents one of these automatic tools, precisely riveted on the synchronization of the speech and the lip movement of the game characters. A robust and precise speech recognition segment that systematized with Algebraic Code Excited Linear Prediction method is developed which unconventionally delivers lip sync results. The Algebraic Code Excited Linear Prediction algorithm is constructed on that used in code-excited linear prediction, but Algebraic Code Excited Linear Prediction codebooks have an explicit algebraic structure levied upon them. This affords a quicker substitute to the software enactments of lip sync algorithms and thus advances the superiority of service factors abridged production cost.

Keywords: algebraic code excited linear prediction, speech-lip synchronization, video games, virtual reality

Procedia PDF Downloads 440
2845 Practical Challenges of Tunable Parameters in Matlab/Simulink Code Generation

Authors: Ebrahim Shayesteh, Nikolaos Styliaras, Alin George Raducu, Ozan Sahin, Daniel Pombo VáZquez, Jonas Funkquist, Sotirios Thanopoulos

Abstract:

One of the important requirements in many code generation projects is defining some of the model parameters tunable. This helps to update the model parameters without performing the code generation again. This paper studies the concept of embedded code generation by MATLAB/Simulink coder targeting the TwinCAT Simulink system. The generated runtime modules are then tested and deployed to the TwinCAT 3 engineering environment. However, defining the parameters tunable in MATLAB/Simulink code generation targeting TwinCAT is not very straightforward. This paper focuses on this subject and reviews some of the techniques tested here to make the parameters tunable in generated runtime modules. Three techniques are proposed for this purpose, including normal tunable parameters, callback functions, and mask subsystems. Moreover, some test Simulink models are developed and used to evaluate the results of proposed approaches. A brief summary of the study results is presented in the following. First of all, the parameters defined tunable and used in defining the values of other Simulink elements (e.g., gain value of a gain block) could be changed after the code generation and this value updating will affect the values of all elements defined based on the values of the tunable parameter. For instance, if parameter K=1 is defined as a tunable parameter in the code generation process and this parameter is used to gain a gain block in Simulink, the gain value for the gain block is equal to 1 in the gain block TwinCAT environment after the code generation. But, the value of K can be changed to a new value (e.g., K=2) in TwinCAT (without doing any new code generation in MATLAB). Then, the gain value of the gain block will change to 2. Secondly, adding a callback function in the form of “pre-load function,” “post-load function,” “start function,” and will not help to make the parameters tunable without performing a new code generation. This means that any MATLAB files should be run before performing the code generation. The parameters defined/calculated in this file will be used as fixed values in the generated code. Thus, adding these files as callback functions to the Simulink model will not make these parameters flexible since the MATLAB files will not be attached to the generated code. Therefore, to change the parameters defined/calculated in these files, the code generation should be done again. However, adding these files as callback functions forces MATLAB to run them before the code generation, and there is no need to define the parameters mentioned in these files separately. Finally, using a tunable parameter in defining/calculating the values of other parameters through the mask is an efficient method to change the value of the latter parameters after the code generation. For instance, if tunable parameter K is used in calculating the value of two other parameters K1 and K2 and, after the code generation, the value of K is updated in TwinCAT environment, the value of parameters K1 and K2 will also be updated (without any new code generation).

Keywords: code generation, MATLAB, tunable parameters, TwinCAT

Procedia PDF Downloads 199
2844 Design and Performance Improvement of Three-Dimensional Optical Code Division Multiple Access Networks with NAND Detection Technique

Authors: Satyasen Panda, Urmila Bhanja

Abstract:

In this paper, we have presented and analyzed three-dimensional (3-D) matrices of wavelength/time/space code for optical code division multiple access (OCDMA) networks with NAND subtraction detection technique. The 3-D codes are constructed by integrating a two-dimensional modified quadratic congruence (MQC) code with one-dimensional modified prime (MP) code. The respective encoders and decoders were designed using fiber Bragg gratings and optical delay lines to minimize the bit error rate (BER). The performance analysis of the 3D-OCDMA system is based on measurement of signal to noise ratio (SNR), BER and eye diagram for a different number of simultaneous users. Also, in the analysis, various types of noises and multiple access interference (MAI) effects were considered. The results obtained with NAND detection technique were compared with those obtained with OR and AND subtraction techniques. The comparison results proved that the NAND detection technique with 3-D MQC\MP code can accommodate more number of simultaneous users for longer distances of fiber with minimum BER as compared to OR and AND subtraction techniques. The received optical power is also measured at various levels of BER to analyze the effect of attenuation.

Keywords: Cross Correlation (CC), Three dimensional Optical Code Division Multiple Access (3-D OCDMA), Spectral Amplitude Coding Optical Code Division Multiple Access (SAC-OCDMA), Multiple Access Interference (MAI), Phase Induced Intensity Noise (PIIN), Three Dimensional Modified Quadratic Congruence/Modified Prime (3-D MQC/MP) code

Procedia PDF Downloads 387
2843 New Test Algorithm to Detect Acute and Chronic HIV Infection Using a 4th Generation Combo Test

Authors: Barun K. De

Abstract:

Acquired immunodeficiency syndrome (AIDS) is caused by two types of human immunodeficiency viruses, collectively designated HIV. HIV infection is spreading globally particularly in developing countries. Before an individual is diagnosed with HIV, the disease goes through different phases. First there is an acute early phase that is followed by an established or chronic phase. Subsequently, there is a latency period after which the individual becomes immunodeficient. It is in the acute phase that an individual is highly infectious due to a high viral load. Presently, HIV diagnosis involves use of tests that do not detect the acute phase infection during which both the viral RNA and p24 antigen are expressed. Instead, these less sensitive tests detect antibodies to viral antigens which are typically sero-converted later in the disease process following acute infection. These antibodies are detected in both asymptomatic HIV-infected individuals as well as AIDS patients. Studies indicate that early diagnosis and treatment of HIV infection can reduce medical costs, improve survival, and reduce spreading of infection to new uninfected partners. Newer 4th generation combination antigen/antibody tests are highly sensitive and specific for detection of acute and established HIV infection (HIV1 and HIV2) enabling immediate linkage to care. The CDC (Center of Disease Control, USA) recently recommended an algorithm involving three different tests to screen and diagnose acute and established infections of HIV-1 and HIV-2 in a general population. Initially a 4th generation combo test detects a viral antigen p24 and specific antibodies against HIV -1 and HIV-2 envelope proteins. If the test is positive it is followed by a second test known as a differentiation assay which detects antibodies against specific HIV-1 and HIV-2 envelope proteins confirming established infection of HIV-1 or HIV-2. However if it is negative then another test is performed that measures viral load confirming an acute HIV-1 infection. Screening results of a Phoenix area population detected 0.3% new HIV infections among which 32.4% were acute cases. Studies in the U.S. indicate that this algorithm effectively reduces HIV infection through immediate treatment and education following diagnosis.

Keywords: new algorithm, HIV, diagnosis, infection

Procedia PDF Downloads 377
2842 Taxonomy of Threats and Vulnerabilities in Smart Grid Networks

Authors: Faisal Al Yahmadi, Muhammad R. Ahmed

Abstract:

Electric power is a fundamental necessity in the 21st century. Consequently, any break in electric power is probably going to affect the general activity. To make the power supply smooth and efficient, a smart grid network is introduced which uses communication technology. In any communication network, security is essential. It has been observed from several recent incidents that adversary causes an interruption to the operation of networks. In order to resolve the issues, it is vital to understand the threats and vulnerabilities associated with the smart grid networks. In this paper, we have investigated the threats and vulnerabilities in Smart Grid Networks (SGN) and the few solutions in the literature. Proposed solutions showed developments in electricity theft countermeasures, Denial of services attacks (DoS) and malicious injection attacks detection model, as well as malicious nodes detection using watchdog like techniques and other solutions.

Keywords: smart grid network, security, threats, vulnerabilities

Procedia PDF Downloads 108
2841 Distinguishing Borrowings from Code Mixes: An Analysis of English Lexical Items Used in the Print Media in Sri Lanka

Authors: Chamindi Dilkushi Senaratne

Abstract:

Borrowing is the morphological, syntactic and (usually) phonological integration of lexical items from one language into the structure of another language. Borrowings show complete linguistic integration and due to the frequency of use become fossilized in the recipient language differentiating them from switches and mixes. Code mixes are different to borrowings. Code mixing takes place when speakers use lexical items in casual conversation to serve a variety of functions. This study presents an analysis of lexical items used in English newspapers in Sri Lanka in 2017 which reveal characteristics of borrowing or code mixes. Both phenomena arise due to language contact. The study will also use data from social media websites that comment on newspaper articles available on the web. The study reiterates that borrowings are distinguishable from code mixes and that they are two different phenomena that occur in language contact situations. The study also shows how existing morphological processes are used to create new vocabulary in language use. The study sheds light into how existing morphological processes are used by the bilingual to be creative, innovative and convey a bilingual identity.

Keywords: borrowing, code mixing, morphological processes

Procedia PDF Downloads 196
2840 Determining the Frequency of Pneumonia Emerging in COVID-19 Infection

Authors: Zoirov Amirdin Olimovich, Akbarov Elbek Elmurodovich

Abstract:

Introduction: Pneumonia that occurs during COVID-19 infection is common among patients. This research was conducted to determine the frequency of symptoms occurring during pneumonia according to the purpose. Objective and Task: The goal of our research is to develop clinical concepts of pneumonia that occur during COVID-19 infection. Our main task is to analyze the results of blood tests and understand the progression of the disease. Research Materials and Methods: The research was conducted among patients admitted to the Tashkent Medical Academy multi-profile clinic in the department of infectious diseases undergoing stationary treatment with a diagnosis of COVID-19. The analyzed patients had an average age of 46, with a total of 48 patients, 23 of whom were female and 25 were male. Research Results: The research results showed the development of pneumonia within three days in 27 patients after COVID-19 infection. During the observation period, 24 patients (88.8%) recovered completely. The X-ray revealed no signs of pneumonia in those who fully recovered. The remaining three patients showed a persistent form of pneumonia. Conclusion: The conclusion of the research indicates that pneumonia during COVID-19 infection develops in many patients, and 88.8% of patients recover completely without any lingering symptoms.

Keywords: COVID-19, pneumonia, the X-ray, blood, TTA

Procedia PDF Downloads 28
2839 USBware: A Trusted and Multidisciplinary Framework for Enhanced Detection of USB-Based Attacks

Authors: Nir Nissim, Ran Yahalom, Tomer Lancewiki, Yuval Elovici, Boaz Lerner

Abstract:

Background: Attackers increasingly take advantage of innocent users who tend to use USB devices casually, assuming these devices benign when in fact they may carry an embedded malicious behavior or hidden malware. USB devices have many properties and capabilities that have become the subject of malicious operations. Many of the recent attacks targeting individuals, and especially organizations, utilize popular and widely used USB devices, such as mice, keyboards, flash drives, printers, and smartphones. However, current detection tools, techniques, and solutions generally fail to detect both the known and unknown attacks launched via USB devices. Significance: We propose USBWARE, a project that focuses on the vulnerabilities of USB devices and centers on the development of a comprehensive detection framework that relies upon a crucial attack repository. USBWARE will allow researchers and companies to better understand the vulnerabilities and attacks associated with USB devices as well as providing a comprehensive platform for developing detection solutions. Methodology: The framework of USBWARE is aimed at accurate detection of both known and unknown USB-based attacks by a process that efficiently enhances the framework's detection capabilities over time. The framework will integrate two main security approaches in order to enhance the detection of USB-based attacks associated with a variety of USB devices. The first approach is aimed at the detection of known attacks and their variants, whereas the second approach focuses on the detection of unknown attacks. USBWARE will consist of six independent but complimentary detection modules, each detecting attacks based on a different approach or discipline. These modules include novel ideas and algorithms inspired from or already developed within our team's domains of expertise, including cyber security, electrical and signal processing, machine learning, and computational biology. The establishment and maintenance of the USBWARE’s dynamic and up-to-date attack repository will strengthen the capabilities of the USBWARE detection framework. The attack repository’s infrastructure will enable researchers to record, document, create, and simulate existing and new USB-based attacks. This data will be used to maintain the detection framework’s updatability by incorporating knowledge regarding new attacks. Based on our experience in the cyber security domain, we aim to design the USBWARE framework so that it will have several characteristics that are crucial for this type of cyber-security detection solution. Specifically, the USBWARE framework should be: Novel, Multidisciplinary, Trusted, Lightweight, Extendable, Modular and Updatable and Adaptable. Major Findings: Based on our initial survey, we have already found more than 23 types of USB-based attacks, divided into six major categories. Our preliminary evaluation and proof of concepts showed that our detection modules can be used for efficient detection of several basic known USB attacks. Further research, development, and enhancements are required so that USBWARE will be capable to cover all of the major known USB attacks and to detect unknown attacks. Conclusion: USBWARE is a crucial detection framework that must be further enhanced and developed.

Keywords: USB, device, cyber security, attack, detection

Procedia PDF Downloads 358
2838 Error Detection and Correction for Onboard Satellite Computers Using Hamming Code

Authors: Rafsan Al Mamun, Md. Motaharul Islam, Rabana Tajrin, Nabiha Noor, Shafinaz Qader

Abstract:

In an attempt to enrich the lives of billions of people by providing proper information, security and a way of communicating with others, the need for efficient and improved satellites is constantly growing. Thus, there is an increasing demand for better error detection and correction (EDAC) schemes, which are capable of protecting the data onboard the satellites. The paper is aimed towards detecting and correcting such errors using a special algorithm called the Hamming Code, which uses the concept of parity and parity bits to prevent single-bit errors onboard a satellite in Low Earth Orbit. This paper focuses on the study of Low Earth Orbit satellites and the process of generating the Hamming Code matrix to be used for EDAC using computer programs. The most effective version of Hamming Code generated was the Hamming (16, 11, 4) version using MATLAB, and the paper compares this particular scheme with other EDAC mechanisms, including other versions of Hamming Codes and Cyclic Redundancy Check (CRC), and the limitations of this scheme. This particular version of the Hamming Code guarantees single-bit error corrections as well as double-bit error detections. Furthermore, this version of Hamming Code has proved to be fast with a checking time of 5.669 nanoseconds, that has a relatively higher code rate and lower bit overhead compared to the other versions and can detect a greater percentage of errors per length of code than other EDAC schemes with similar capabilities. In conclusion, with the proper implementation of the system, it is quite possible to ensure a relatively uncorrupted satellite storage system.

Keywords: bit-flips, Hamming code, low earth orbit, parity bits, satellite, single error upset

Procedia PDF Downloads 102
2837 Performance Comparison of Space-Time Block and Trellis Codes under Rayleigh Channels

Authors: Jing Qingfeng, Wu Jiajia

Abstract:

Due to the crowded orbits and shortage of frequency resources, utilizing of MIMO technology to improve spectrum efficiency and increase the capacity has become a necessary trend of broadband satellite communication. We analyze the main influenced factors and compare the BER performance of space-time block code (STBC) scheme and space-time trellis code (STTC) scheme. This paper emphatically studies the bit error rate (BER) performance of STTC and STBC under Rayleigh channel. The main emphasis is placed on the effects of the factors, such as terminal environment and elevation angles, on the BER performance of STBC and STTC schemes. Simulation results indicate that performance of STTC under Rayleigh channel is obviously improved with the increasing of transmitting and receiving antennas numbers, but the encoder state has little impact on the performance. Under Rayleigh channel, performance of Alamouti code is better than that of STTC.

Keywords: MIMO, space time block code (STBC), space time trellis code (STTC), Rayleigh channel

Procedia PDF Downloads 319
2836 Comparison of Maternal and Perinatal Outcomes of Obstetric Population Diagnosed with Covid-19 in Reference to Influenza A/H1N1: A Systematic Review and Meta-Analysis

Authors: Maria Vargas Hernandez, Jose Rojas Suarez, Carmelo Dueñas Castell, Sandra Contreras, Camilo Bello, Diana Borre, Walter Anichiarico, Harold Vasquez, Eduard Perez, Jose Santacruz

Abstract:

In the last two decades, there have been outbreaks of emerging infectious diseases, with an impact on both the general population and the obstetric population. These infections, which affect the general population, pose a high risk for adverse maternal and perinatal outcomes, taking into account that physiological and immunological changes that occur during pregnancy can increase their risk or severity. Among these, the pandemics of viral infections, Influenza A/H1N1 and SARS-CoV-2/COVID-19, stand out. In 2009, Influenza A/H1N1 infection (H1N1 2009pdm) affected approximately 3,110 obstetric patients, with data reported from 29 countries, including 1,625 (52.3%) cases that were hospitalized, 378 (23.3%) admissions to ICU and 130 (8%) deaths; and since the end of 2019, the Severe Acute Respiratory Syndrome - 2 (SARS-CoV-2) has been identified, causing the COVID-19 pandemic, with global mortality that is around 2-4% for the general population, and higher mortality in patients requiring admission to the intensive care unit. Its impact on the obstetric population is still unknown. Objectives: To evaluate the impact on maternal and perinatal outcomes of COVID-19 infection in reference to influenza A/H1N1 infection in the obstetric population. Methodology: Systematic review of the literature and meta-analysis. Results: Mortality from maternal infection with influenza A/H1N1 appears to be higher (8%) than mortality due to maternal infection with COVID-19 (3%). The rates of ICU admission, hospitalization, the requirement for invasive mechanical ventilation, and fetal death also appear to be higher in the maternal population with A/H1N1 infection, in reference to the maternal population with COVID-19 infection. Within perinatal outcomes, the admission to the neonatal ICU appears to be higher in the infants born to mothers with COVID-19 infection (28% vs. 15% for COVID-19 and A/H1N1, respectively). Conclusion: A/H1N1 infection in the obstetric population seems to be associated with a higher proportion of adverse outcomes in relation to COVID-19 infection. The actual impact of maternal influenza A/H1N1 infection on perinatal outcomes is unknown. More COVID-19 studies are needed to understand the impact of maternal infection on perinatal outcomes in this population.

Keywords: A/H1N1, COVID-19, maternal outcomes, perinatal outcomes

Procedia PDF Downloads 189
2835 Factors Influencing Infection Prevention and Control Practices in the Emergency Department of Mbarara Regional Referral Hospital in Mbarara District-Uganda

Authors: Baluku Nathan

Abstract:

Infection prevention and control (IPC) is a practical, evidence-based approach that prevents patients and emergency health workers from being harmed by avoidable infections as a result of antimicrobial resistance; all hospital infection control programs put together various practices which, when used appropriately, restrict the spread of infection. A breach in these control practices facilitates the transmission of infections from patients to health workers, other patients, and attendants. It is, therefore important for all emergency medical technicians (EMTs) and patients to strictly adhere to them. It is also imperative for administrators to ensure the implementation of the infection control programme for their facilities. Purpose: The purpose of this study was to investigate the influencing factors of prevention practices against infection exposure among emergency medical technicians (EMTs) in the emergency department at Mbarara hospital. Methodology: This was a descriptive cross-sectional study that employed a self-reported questionnaire that was filled out by 32 EMTs in the emergency department from 12th February to 3rd march 2022. The questionnaire consisted of items concerning the defensive environment and other factors influencing infection prevention and control practices in the accident and emergency department of Mbarara hospital. Results: From the findings, the majority 16 (50%) always used protective gear when doing clinical work, 14 (43.8%) didn’t use protective gear, citing they were only assisting those performing resuscitations, gumboots were the least used protective gear with only3(9.4%) usage. About disposal techniques of specific products like blood and sharps, results showed 10 (31.3%) said blood is disposed of in red buckets, 5 (15.6%) in yellow buckets, and only 5(15.6%) in black buckets, and 12(37.5%) didn’t respond, however, 28(87.5%) said sharps were disposed of in a sharps container. The majority, 17 (53.1%), were not aware of the infection control guidelines even though they were pinned on walls of the emergency rooms, 15(46.9%) said they have never had quality assurance monitoring events, 14(43.8%) said monitoring was continuous while 15(46.9 %) said it was discrete. Conclusions: The infection control practices at the emergency department were inadequate in view of less than 100% of the EMTs observing the five principles of infection prevention, such as the use of personal protective equipment and proper waste disposal in appropriate color-coded bins. Dysfunctional infection prevention and control committees accompanied by inadequate supervision to ensure infection control remained a big challenge.

Keywords: emergency medical technician, infection prevention, influencing factors, infection control

Procedia PDF Downloads 73
2834 The Implementation of Character Education in Code Riverbanks, Special Region of Yogyakarta, Indonesia

Authors: Ulil Afidah, Muhamad Fathan Mubin, Firdha Aulia

Abstract:

Code riverbanks Yogyakarta is a settlement area with middle to lower social classes. Socio-economic situation is affecting the behavior of society. This research aimed to find and explain the implementation and the assessment of character education which were done in elementary schools in Code riverside, Yogyakarta region of Indonesia. This research is a qualitative research which the subjects were the kids of Code riverbanks, Yogyakarta. The data were collected through interviews and document studies and analyzed qualitatively using the technique of interactive analysis model of Miles and Huberman. The results show that: (1) The learning process of character education was done by integrating all aspects such as democratic and interactive learning session also introducing role model to the students. 2) The assessment of character education was done by teacher based on teaching and learning process and an activity in outside the classroom that was the criterion on three aspects: Cognitive, affective and psychomotor.

Keywords: character, Code riverbanks, education, Yogyakarta

Procedia PDF Downloads 228
2833 JaCoText: A Pretrained Model for Java Code-Text Generation

Authors: Jessica Lopez Espejel, Mahaman Sanoussi Yahaya Alassan, Walid Dahhane, El Hassane Ettifouri

Abstract:

Pretrained transformer-based models have shown high performance in natural language generation tasks. However, a new wave of interest has surged: automatic programming language code generation. This task consists of translating natural language instructions to a source code. Despite the fact that well-known pre-trained models on language generation have achieved good performance in learning programming languages, effort is still needed in automatic code generation. In this paper, we introduce JaCoText, a model based on Transformer neural network. It aims to generate java source code from natural language text. JaCoText leverages the advantages of both natural language and code generation models. More specifically, we study some findings from state of the art and use them to (1) initialize our model from powerful pre-trained models, (2) explore additional pretraining on our java dataset, (3) lead experiments combining the unimodal and bimodal data in training, and (4) scale the input and output length during the fine-tuning of the model. Conducted experiments on CONCODE dataset show that JaCoText achieves new state-of-the-art results.

Keywords: java code generation, natural language processing, sequence-to-sequence models, transformer neural networks

Procedia PDF Downloads 236
2832 A Guide to User-Friendly Bash Prompt: Adding Natural Language Processing Plus Bash Explanation to the Command Interface

Authors: Teh Kean Kheng, Low Soon Yee, Burra Venkata Durga Kumar

Abstract:

In 2022, as the future world becomes increasingly computer-related, more individuals are attempting to study coding for themselves or in school. This is because they have discovered the value of learning code and the benefits it will provide them. But learning coding is difficult for most people. Even senior programmers that have experience for a decade year still need help from the online source while coding. The reason causing this is that coding is not like talking to other people; it has the specific syntax to make the computer understand what we want it to do, so coding will be hard for normal people if they don’t have contact in this field before. Coding is hard. If a user wants to learn bash code with bash prompt, it will be harder because if we look at the bash prompt, we will find that it is just an empty box and waiting for a user to tell the computer what we want to do, if we don’t refer to the internet, we will not know what we can do with the prompt. From here, we can conclude that the bash prompt is not user-friendly for new users who are learning bash code. Our goal in writing this paper is to give an idea to implement a user-friendly Bash prompt in Ubuntu OS using Artificial Intelligent (AI) to lower the threshold of learning in Bash code, to make the user use their own words and concept to write and learn Bash code.

Keywords: user-friendly, bash code, artificial intelligence, threshold, semantic similarity, lexical similarity

Procedia PDF Downloads 90
2831 Indian Bankruptcy Code 2016: Impact On Cross-Border Insolvency, an Analysis

Authors: Astha Sinha, Anjali Kanagali

Abstract:

India has been tackling with less than sophisticated legislations when it comes to recovery of debt and bankruptcy situations for a while now. There were multiple overlapping laws and adjudication forums dealing with financial failures and insolvency of companies/individuals in India without really aiding the timely recover of defaulted assets. It remained dicey for businesses to invest in India since there was a lack of legal and institutional machinery for dealing with debt defaults as per the global standards. After much deliberation, the Indian Draft Insolvency code received the presidential assent on May 28, 2016 bringing the Bankruptcy and Insolvency Code, 2016 into existence. The Code is expected to bring about great progress for the country and specifically has the two standout developments. The first is that it calls for resolution of corporate insolvency within a period of 180 days extendable by 90 days hence bringing about security in the minds of investors. Second is that it calls for the creation of a new class of insolvency professionals whose primary function shall be helping sick companies and banks with their takeovers, provides for setting up an Insolvency and Bankruptcy Board to regulate the same and provides for a two stage process of liquidation. The Code is estimated to help India move up its ranking on the World Bank’s ease of doing business index. It is currently ranked at the 130th position lower than some of the sub-saharan African countries. Besides this, however, there are various areas in which the Code falls short such as lack of provisions for aiding the issue of cross-border insolvency, impact on Medium and Small Enterprises in India etc. This paper aims to analyze the provisions of the new Bankruptcy and Insolvency Code, 2016 and its contribution in making India a more desirable location for doing business. It shall also emphasize on the cross-border insolvency issues, practices followed by other countries to resolve the same and the way forward for India to strengthen its Bankruptcy and Insolvency framework.

Keywords: bankruptcy and insolvency code 2016, cross-border insolvency provisions in the 2016 code, Ease of doing business and bankruptcy code, highlights of the new Indian bankruptcy code 2016

Procedia PDF Downloads 237
2830 Comparison between Separable and Irreducible Goppa Code in McEliece Cryptosystem

Authors: Newroz Nooralddin Abdulrazaq, Thuraya Mahmood Qaradaghi

Abstract:

The McEliece cryptosystem is an asymmetric type of cryptography based on error correction code. The classical McEliece used irreducible binary Goppa code which considered unbreakable until now especially with parameter [1024, 524, and 101], but it is suffering from large public key matrix which leads to be difficult to be used practically. In this work Irreducible and Separable Goppa codes have been introduced. The Irreducible and Separable Goppa codes used are with flexible parameters and dynamic error vectors. A Comparison between Separable and Irreducible Goppa code in McEliece Cryptosystem has been done. For encryption stage, to get better result for comparison, two types of testing have been chosen; in the first one the random message is constant while the parameters of Goppa code have been changed. But for the second test, the parameters of Goppa code are constant (m=8 and t=10) while the random message have been changed. The results show that the time needed to calculate parity check matrix in separable are higher than the one for irreducible McEliece cryptosystem, which is considered expected results due to calculate extra parity check matrix in decryption process for g2(z) in separable type, and the time needed to execute error locator in decryption stage in separable type is better than the time needed to calculate it in irreducible type. The proposed implementation has been done by Visual studio C#.

Keywords: McEliece cryptosystem, Goppa code, separable, irreducible

Procedia PDF Downloads 237
2829 Molecular Epidemiologic Distribution of HDV Genotypes among Different Ethnic Groups in Iran: A Systematic Review

Authors: Khabat Barkhordari

Abstract:

Hepatitis delta virus (HDV) is a RNA virus that needs the function of hepatitis B virus (HBV) for its propagation and assembly. Infection by HDV can occur spontaneously with HBV infection and cause acute hepatitis or develop as secondary infection in HBV suffering patients. Based on genome sequence analysis, HDV has several genotypes which show broad geographic and diverse clinical features. The aim of current study is determine the molecular epidemiology of hepatitis delta virus genotype in patients with positive HBsAg among different ethnic groups of Iran. This systematic review study reviews the results of different studies which examined 2000 Iranian patients with HBV infection from 2010 to 2015. Among 2000 patients in this study, 16.75 % were containing anti-HDV antibody and HDV RNA was found in just 1.75% cases. All of positive cases also have genotype I.

Keywords: HDV, genotype, epidemiology, distribution

Procedia PDF Downloads 249
2828 Size-Reduction Strategies for Iris Codes

Authors: Jutta Hämmerle-Uhl, Georg Penn, Gerhard Pötzelsberger, Andreas Uhl

Abstract:

Iris codes contain bits with different entropy. This work investigates different strategies to reduce the size of iris code templates with the aim of reducing storage requirements and computational demand in the matching process. Besides simple sub-sampling schemes, also a binary multi-resolution representation as used in the JBIG hierarchical coding mode is assessed. We find that iris code template size can be reduced significantly while maintaining recognition accuracy. Besides, we propose a two stage identification approach, using small-sized iris code templates in a pre-selection satge, and full resolution templates for final identification, which shows promising recognition behaviour.

Keywords: iris recognition, compact iris code, fast matching, best bits, pre-selection identification, two-stage identification

Procedia PDF Downloads 414
2827 Prevalence of Gastrointestinal Nematodes of Farm Animals by Copro-Culture

Authors: Mosaab A. Omar, Mohammad Saleh Al-Aboody

Abstract:

In the present study, examination of 442 faecal samples was performed: 171 from cattle, 128 from buffaloes and 143 from sheep. During the period from May, 2014 to April, 2015, fecal examination showed the infection rate with abomasal nematodes was 30% in cattle, 22.6% in buffaloes, and 31.4% in sheep. Fecal culture gave results of 47.5%, 30%, and 50.3% in cattle, buffaloes and sheep respectively. Seasonal infection with abomasal nematodes as shown by faecal culture in cattle, reveals the highest infection rate is in summer (55.9%), followed by spring (54.1%), autumn (50%), and winter (33.3%). Cooperia spp. is the most prevalent larva in both cattle and buffaloes; Strongyloides papillosus is the most predominant one in sheep. Here we introduce the first study of abomasal worms infection in ruminants in Qena, Egypt. The prevalence is found to be so high among the all examined animals, that we recommend that the authorities apply suitable control programs.

Keywords: haemonchus, ostertagia, seasonal dynamics, floatation

Procedia PDF Downloads 420
2826 Seroprevalence of Herpes Simplex Virus and Rubella Confection in Tropical Regions in Bihar, India

Authors: Bhawana, Roshan Kamal Topno, Maneesh Kumar, Major Madhukar, Krishna Pandey, Ganesh Chandra Sahoo, Manas Ranjan Dikhit, Surya Suman, Devendra Prasad Yadav, Rishikesh Kumar, Pradeep Das

Abstract:

Viral co-infection is now very common across taxa and environments that are involved in congenital infections. Herpes simplex virus (HSV) and Rubella are the two serious viral infections, well categorized in TORCH Syndrome. Here we had endeavoured the seroprevalence of co-infection of HSV and Rubella. Systematic tests have been performed to check the virulence pattern of the co-infection. The study was conducted at Department of Virology, Rajendra Memorial Research Institute of Medical Sciences (ICMR), Patna, Bihar, India during January 2018-July 2018. 299 newly cases were attended with the sign and symptoms of HSV and Rubella. After taking written consent forms from all the subjects, blood samples were collected for serological detection. ELISA was performed to detect the presence of IgM antibody level. 12 patients were found to be IgM positive from each HSV and Rubella infection. The findings of our study showed that 6 patients were positive for both HSV and rubella and hence were co-infected. Such co-infection causes severe health problems as it leads to the mortality rate of the patients during viral infectivity. Epidemiologically, proper screening should be needed to check any chance of occurrence of such co-infection in the affected regions in large scale and take suitable preventive approach to decrease the case totality. Concern has to be given to aid proper diagnosis and treatment in order to decrease the spread of HSV and Rubella co-infection.

Keywords: HSV, Rubella, seroprevalence, co-infection, ELISA, viral infectivity

Procedia PDF Downloads 186
2825 Employing QR Code as an Effective Educational Tool for Quick Access to Sources of Kindergarten Concepts

Authors: Ahmed Amin Mousa, M. Abd El-Salam

Abstract:

This study discusses a simple solution for the problem of shortage in learning resources for kindergarten teachers. Occasionally, kindergarten teachers cannot access proper resources by usual search methods as libraries or search engines. Furthermore, these methods require a long time and efforts for preparing. The study is expected to facilitate accessing learning resources. Moreover, it suggests a potential direction for using QR code inside the classroom. The present work proposes that QR code can be used for digitizing kindergarten curriculums and accessing various learning resources. It investigates using QR code for saving information related to the concepts which kindergarten teachers use in the current educational situation. The researchers have established a guide for kindergarten teachers based on the Egyptian official curriculum. The guide provides different learning resources for each scientific and mathematical concept in the curriculum, and each learning resource is represented as a QR code image that contains its URL. Therefore, kindergarten teachers can use smartphone applications for reading QR codes and displaying the related learning resources for students immediately. The guide has been provided to a group of 108 teachers for using inside their classrooms. The results showed that the teachers approved the guide, and gave a good response.

Keywords: kindergarten, child, learning resources, QR code, smart phone, mobile

Procedia PDF Downloads 262
2824 Interpreting Form Based Code in Historic Residential Corridor

Authors: Diljan C. K.

Abstract:

Every location on the planet has a history and culture that give it its own identity and character, making it distinct from others. urbanised world, it is fashionable to remould its original character and impression in a contemporary style. The new character and impression of places show a complete detachment from their roots. The heritage and cultural values of the place are replaced by new impressions, and as a result, they eventually lose their identity and character and never have sustenance. In this situation, form-based coding acts as a tool in the urban design process, helping to come up with solutions that strongly bind individuals to their neighbourhood and are closely related to culture through the physical spaces they are associated with. Form-based code was made by pioneers of new urbanism in 1987 in the United States of America. Since then, it has been used in various projects inside and outside the USA with varied scales, from the design of a single building to the design of a whole community. This research makes an effort to interpret the form-based code in historic corridors to establish the association of physical form and space with the public realm to uphold the context and culture. Many of the historic corridors are undergoing a tremendous transformation in their physical form, avoiding their culture and context. This will lead to it losing its identity in form and function. If the case of Valiyashala in Trivandrum is taken as the case, which is transforming its form and will lead to the loss of its identity, the form-based code will be a suitable tool to strengthen its historical value. The study concludes by analysing the existing code (KMBR) of Valiyashala and form-based code to find the requirements in form-based code for Valiyashala.

Keywords: form based code, urban conservation, heritage, historic corridor

Procedia PDF Downloads 80
2823 Assessment of HIV/Hepatitis B Virus Co-Infection among Patients Living with HIV in Northern and Southern Region of Nigeria

Authors: Folajinmi Oluwasina, Greg Abiaziem, Moses Luke, Mobolaji Kolawole, Nancy Yibowei, Anne Taiwo

Abstract:

Background: Occurrence of HIV infection has an adverse effect on the natural causes of Hepatitis B Viral (HBV) infection, faster progression of hepatic fibrosis demonstrated in patients with co-infection. This study was carried out to determine the incidence of HBV infection among HIV-positive patients, and to retrospectively evaluate laboratory characteristics of patients with HIV/HBV co-infection. Methods: A retrospective analysis of patient files for all HIV-infected cases followed-up and treated at 52 health facilities. Among HIV-infected cases, those with HBsAg positivity and HIV/Hepatitis B co-infection were determined. Socio demographic, alcohol or substance use, ART, CD4, Viral Load levels and treatment durations were retrospectively evaluated. Results: Of the 125 HIV-infected patients evaluated retrospectively, 17 (13.6%) had HBsAg positivity. Of these 17 cases were 11(64.7%) male and 6 (35.3%) female, with a mean age of 48.7 years. No patients had a history of alcohol or substance use. The mean duration of follow up was 28 months. 9 (52.9%) patients had negative HBV DNA at presentation while 8(47%) had positive HBV DNA, with normal ALT levels in all subjects. Among the 9 cases with negative HBV DNA who had no indication for the treatment of chronic hepatitis B. In five cases, treatment was commenced since HBV DNA was elevated in conjunction with low CD4. One patient in whom treatment was not indicated based on HBV DNA and CD4 levels in conjunction with the absence of AIDS defining clinical picture was currently being followed-up without treatment. Of the patients receiving HAART therapy, the average CD4 count at presentation was 278 cells/mm3 vs. 466 cells/mm3 at the end of 12 months. In three subjects with positive HBV DNA, a decrease in HBV DNA was noted after initiation of treatment. In four patients with negative DNA who received treatment, the HBV DNA negative status was found to remain, while one patient who did not receive treatment had elevated HBV DNA and decreased CD4 levels. Conclusion: It was shown that this group of patients with HIV/HBV co-infection, HAART was found to be associated with a decrease in HBV DNA in HBV DNA positive cases, absence of transition to positivity among those with negative HBV DNA, and with increased CD4 in all subjects.

Keywords: Hepatitis B, DNA, anti retroviral therapy, co-infection

Procedia PDF Downloads 240
2822 Discrimination against Women in Workplace: A Case Study on Hotel Dress Code

Authors: A. R. Anwar

Abstract:

The development of discrimination case which is now extended to the issue of female workers dress code in the hotel industry seen as a challenging topic and a solution is needed. Discrimination generally gives a negative impact on the victim and has a direct impact on female workers if it involves the issue of this dress code. Hence it is not appropriate if these genders are subjected to discrimination that prohibits them from wearing a hijab and required to wear a short skirt during working hours. On this basis, this study discusses the major problems pertaining to dress code faced by female workers in the Malaysian hotel industry. An interview with qualified parties from human resource department in each selected hotels has been conducted in which later generated the findings and supported by materials that obtained from libraries, archives and other databases. Through the research findings, several recommendations were introduced to reduce and eliminate the discrimination issue in Malaysian working sector particularly in the hotel industry in order to achieve the equality among men and women in the workplace.

Keywords: discrimination, dress code in the hotel, impact on female workers, equality

Procedia PDF Downloads 165
2821 Modelling the Effect of Distancing and Wearing of Face Masks on Transmission of COVID-19 Infection Dynamics

Authors: Nurudeen Oluwasola Lasisi

Abstract:

The COVID-19 is an infection caused by coronavirus, which has been designated as a pandemic in the world. In this paper, we proposed a model to study the effect of distancing and wearing masks on the transmission of COVID-19 infection dynamics. The invariant region of the model is established. The COVID-19 free equilibrium and the reproduction number of the model were obtained. The local and global stability of the model is determined using the linearization technique method and Lyapunov method. It was found that COVID-19 free equilibrium state is locally asymptotically stable in feasible region Ω if R₀ < 1 and globally asymptomatically stable if R₀ < 1, otherwise unstable if R₀ > 1. More so, numerical analysis and simulations of the dynamics of the COVID-19 infection are presented.

Keywords: distancing, reproduction number, wearing of mask, local and global stability, modelling, transmission

Procedia PDF Downloads 106
2820 Factors Influencing Infection Prevention and Control Practices in the Emergency Department of Mbarara Regional Referral Hospital in Mbarara District- Uganda

Authors: Baluku Nathan

Abstract:

Infection prevention and control (IPC) is a practical, evidence-based approach that prevents patients and emergency health workers from being harmed by avoidable infections as a result of antimicrobial resistance; all hospital infection control programs put together various practices which, when used appropriately, restrict the spread of infection. A breach in these control practices facilitates the transmission of infections from patients to health workers, other patients and attendants. It is, therefore, important for all EMTs and patients to adhere to them strictly. It is also imperative for administrators to ensure the implementation of the infection control program for their facilities. Purpose: The purpose of this study was to investigate the influencing factors of prevention practices against Infection exposure among emergency medical technicians (EMTs) in the emergency department at Mbarara hospital. Methodology: This was a descriptive cross-sectional study that employed a self-reported questionnaire that was filled out by 32 EMTs in the emergency department from 12th February to 3rd march 2022. The questionnaire consisted of items concerning the defensive environment and other Factors influencing Infection prevention and control practices in the accident and emergency department of Mbarara hospital. Results: From the findings, majority16(50%) always used protective gear when doing clinical work,14 (43.8%) didn’t use protective gear, citing they were only assisting those performing resuscitations, gumboots were the least used protective gear with only3(9.4%) usage. Regarding disposal techniques of specific products like blood and sharps, results showed 10 (31.3%) said blood is disposed of in red buckets, 5(15.6%) in yellow buckets and only5(15.6%) in black buckets and 12(37.5%) didn’t respond. However, 28(87.5%) said sharps were disposed of in a sharps container. The majority, 17(53.1%), were not aware of the infection control guidelines even though they were pinned on walls of the emergency rooms,15(46.9%) said they had never had quality assurance monitoring events,14(43.8%) said monitoring was continuous while15(46.9 %) said it was discrete. Conclusions: The infection control practices at the emergency department were inadequate in view of less than 100% of the EMTs observing the five principles of infection prevention, such as the use of personal protective equipment and proper waste disposal in appropriate color-coded bins. Dysfunctional infection prevention and control committees accompanied by inadequate supervision to ensure infection control remained a big challenge.

Keywords: infection prevention, influencing factors, emergency medical technician (EMT), emergency unit

Procedia PDF Downloads 80
2819 Study on the Effect of Coupling Fluid Compressible-Deformable Wall on the Flow of Molten Polymers

Authors: Mohamed Driouich, Kamal Gueraoui, Mohamed Sammouda

Abstract:

The main objective of this work is to establish a numerical code for studying the flow of molten polymers in deformable pipes. Using an iterative numerical method based on finite differences, we determine the profiles of the fluid velocity, the temperature and the apparent viscosity of the fluid. The numerical code presented can also be applied to other industrial applications.

Keywords: numerical code, molten polymers, deformable pipes, finite differences

Procedia PDF Downloads 538
2818 Some Codes for Variants in Graphs

Authors: Sofia Ait Bouazza

Abstract:

We consider the problem of finding a minimum identifying code in a graph. This problem was initially introduced in 1998 and has been since fundamentally connected to a wide range of applications (fault diagnosis, location detection …). Suppose we have a building into which we need to place fire alarms. Suppose each alarm is designed so that it can detect any fire that starts either in the room in which it is located or in any room that shares a doorway with the room. We want to detect any fire that may occur or use the alarms which are sounding to not only to not only detect any fire but be able to tell exactly where the fire is located in the building. For reasons of cost, we want to use as few alarms as necessary. The first problem involves finding a minimum domination set of a graph. If the alarms are three state alarms capable of distinguishing between a fire in the same room as the alarm and a fire in an adjacent room, we are trying to find a minimum locating domination set. If the alarms are two state alarms that can only sound if there is a fire somewhere nearby, we are looking for a differentiating domination set of a graph. These three areas are the subject of much active research; we primarily focus on the third problem. An identifying code of a graph G is a dominating set C such that every vertex x of G is distinguished from other vertices by the set of vertices in C that are at distance at most r≥1 from x. When only vertices out of the code are asked to be identified, we get the related concept of a locating dominating set. The problem of finding an identifying code (resp a locating dominating code) of minimum size is a NP-hard problem, even when the input graph belongs to a number of specific graph classes. Therefore, we study this problem in some restricted classes of undirected graphs like split graph, line graph and path in a directed graph. Then we present some results on the identifying code by giving an exact value of upper total locating domination and a total 2-identifying code in directed and undirected graph. Moreover we determine exact values of locating dominating code and edge identifying code of thin headless spider and locating dominating code of complete suns.

Keywords: identiying codes, locating dominating set, split graphs, thin headless spider

Procedia PDF Downloads 437