Search results for: node.js
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 345

Search results for: node.js

225 Computation and Validation of the Stress Distribution around a Circular Hole in a Slab Undergoing Plastic Deformation

Authors: Sherif D. El Wakil, John Rice

Abstract:

The aim of the current work was to employ the finite element method to model a slab, with a small hole across its width, undergoing plastic plane strain deformation. The computational model had, however, to be validated by comparing its results with those obtained experimentally. Since they were in good agreement, the finite element method can therefore be considered a reliable tool that can help gain better understanding of the mechanism of ductile failure in structural members having stress raisers. The finite element software used was ANSYS, and the PLANE183 element was utilized. It is a higher order 2-D, 8-node or 6-node element with quadratic displacement behavior. A bilinear stress-strain relationship was used to define the material properties, with constants similar to those of the material used in the experimental study. The model was run for several tensile loads in order to observe the progression of the plastic deformation region, and the stress concentration factor was determined in each case. The experimental study involved employing the visioplasticity technique, where a circular mesh (each circle was 0.5 mm in diameter, with 0.05 mm line thickness) was initially printed on the side of an aluminum slab having a small hole across its width. Tensile loading was then applied to produce a small increment of plastic deformation. Circles in the plastic region became ellipses, where the directions of the principal strains and stresses coincided with the major and minor axes of the ellipses. Next, we were able to determine the directions of the maximum and minimum shear stresses at the center of each ellipse, and the slip-line field was then constructed. We were then able to determine the stress at any point in the plastic deformation zone, and hence the stress concentration factor. The experimental results were found to be in good agreement with the analytical ones.

Keywords: finite element method to model a slab, slab undergoing plastic deformation, stress distribution around a circular hole, visioplasticity

Procedia PDF Downloads 298
224 Heart Rate Variability Analysis for Early Stage Prediction of Sudden Cardiac Death

Authors: Reeta Devi, Hitender Kumar Tyagi, Dinesh Kumar

Abstract:

In present scenario, cardiovascular problems are growing challenge for researchers and physiologists. As heart disease have no geographic, gender or socioeconomic specific reasons; detecting cardiac irregularities at early stage followed by quick and correct treatment is very important. Electrocardiogram is the finest tool for continuous monitoring of heart activity. Heart rate variability (HRV) is used to measure naturally occurring oscillations between consecutive cardiac cycles. Analysis of this variability is carried out using time domain, frequency domain and non-linear parameters. This paper presents HRV analysis of the online dataset for normal sinus rhythm (taken as healthy subject) and sudden cardiac death (SCD subject) using all three methods computing values for parameters like standard deviation of node to node intervals (SDNN), square root of mean of the sequences of difference between adjacent RR intervals (RMSSD), mean of R to R intervals (mean RR) in time domain, very low-frequency (VLF), low-frequency (LF), high frequency (HF) and ratio of low to high frequency (LF/HF ratio) in frequency domain and Poincare plot for non linear analysis. To differentiate HRV of healthy subject from subject died with SCD, k –nearest neighbor (k-NN) classifier has been used because of its high accuracy. Results show highly reduced values for all stated parameters for SCD subjects as compared to healthy ones. As the dataset used for SCD patients is recording of their ECG signal one hour prior to their death, it is therefore, verified with an accuracy of 95% that proposed algorithm can identify mortality risk of a patient one hour before its death. The identification of a patient’s mortality risk at such an early stage may prevent him/her meeting sudden death if in-time and right treatment is given by the doctor.

Keywords: early stage prediction, heart rate variability, linear and non-linear analysis, sudden cardiac death

Procedia PDF Downloads 318
223 Comparison of the Indocyanine Green Dye Method versus the Combined Method of Indigo Carmine Blue Dye with Indocyanine Green Fluorescence Imaging for Sentinel Lymph Node Biopsy in Breast Conservative Therapy for Early Breast Cancer

Authors: Nobuyuki Takemoto, Ai Koyanagi, Masanori Yasuda, Hiroshi Yamamoto

Abstract:

Background: Fluorescence imaging (FI) is one of the methods to identify sentinel lymph nodes (SLNs). However, the procedure is technically complicated and requires procedural skills, as SLN biopsy must be conducted in dim light conditions. As an improved version of this method, we introduced a combined method (Combined mixed dye and fluorescence; CMF) consisting of indigo carmine blue dye and FI. The direct visualization of SLNs under shadowless surgical light conditions is facilitated by the addition of the blue dye. We compared the SLN detection rates of CMF with that of the indocyanine green (ICG) dye method (ICG-D). Methods: A total of 202 patients with stage ≤ IIA breast cancer who underwent breast conservative therapy with separate incision from January 2004 to February 2017 were reviewed. Details of the two methods are as follows: (1) ICG-D: 2ml of ICG (10mg) was used and the green-stained SLNs were resected via a 3-4cm axillary incision; (2) CMF: A combination of 1ml of ICG (5mg) and 1-3ml of indigo carmine (4-12mg) was used. Using Photodynamic Eye (PDE), a 1.5-2 cm incision was made near the point of disappearance of the fluorescence and SLNs with intermediate color of blue and green were resected. Results: There were 92 ICG-D and 110 CMF cases. CMF resulted in a significantly higher detection rate than ICG-D (96.4% vs. 83.7%; p=0.003). This difference was particularly notable in those aged ≥ 60 years (98.3% vs. 74.3%) and individuals with BMI ≥ 25kg/m2 (90.3% vs. 58.3%). Conclusion: CMF is an effective method to identify SLNs which is safe, efficient, and cost-effective. Furthermore, radiation exposure can be avoided, and it can be performed in institutes without nuclear medicine facilities. CMF achieves a high SLN identification rate, and most of this procedure is feasible under shadowless surgical light conditions. CMF can reliably perform SLN biopsy even in those aged ≥ 60 years and individuals with BMI ≥ 25 kg/m2.

Keywords: sentinel lymph node biopsy, identification rate, indocyanine green (ICG), indigocarmine, fluorescence

Procedia PDF Downloads 149
222 A Cooperative Signaling Scheme for Global Navigation Satellite Systems

Authors: Keunhong Chae, Seokho Yoon

Abstract:

Recently, the global navigation satellite system (GNSS) such as Galileo and GPS is employing more satellites to provide a higher degree of accuracy for the location service, thus calling for a more efficient signaling scheme among the satellites used in the overall GNSS network. In that the network throughput is improved, the spatial diversity can be one of the efficient signaling schemes; however, it requires multiple antenna that could cause a significant increase in the complexity of the GNSS. Thus, a diversity scheme called the cooperative signaling was proposed, where the virtual multiple-input multiple-output (MIMO) signaling is realized with using only a single antenna in the transmit satellite of interest and with modeling the neighboring satellites as relay nodes. The main drawback of the cooperative signaling is that the relay nodes receive the transmitted signal at different time instants, i.e., they operate in an asynchronous way, and thus, the overall performance of the GNSS network could degrade severely. To tackle the problem, several modified cooperative signaling schemes were proposed; however, all of them are difficult to implement due to a signal decoding at the relay nodes. Although the implementation at the relay nodes could be simpler to some degree by employing the time-reversal and conjugation operations instead of the signal decoding, it would be more efficient if we could implement the operations of the relay nodes at the source node having more resources than the relay nodes. So, in this paper, we propose a novel cooperative signaling scheme, where the data signals are combined in a unique way at the source node, thus obviating the need of the complex operations such as signal decoding, time-reversal and conjugation at the relay nodes. The numerical results confirm that the proposed scheme provides the same performance in the cooperative diversity and the bit error rate (BER) as the conventional scheme, while reducing the complexity at the relay nodes significantly. Acknowledgment: This work was supported by the National GNSS Research Center program of Defense Acquisition Program Administration and Agency for Defense Development.

Keywords: global navigation satellite network, cooperative signaling, data combining, nodes

Procedia PDF Downloads 261
221 Discerning Divergent Nodes in Social Networks

Authors: Mehran Asadi, Afrand Agah

Abstract:

In data mining, partitioning is used as a fundamental tool for classification. With the help of partitioning, we study the structure of data, which allows us to envision decision rules, which can be applied to classification trees. In this research, we used online social network dataset and all of its attributes (e.g., Node features, labels, etc.) to determine what constitutes an above average chance of being a divergent node. We used the R statistical computing language to conduct the analyses in this report. The data were found on the UC Irvine Machine Learning Repository. This research introduces the basic concepts of classification in online social networks. In this work, we utilize overfitting and describe different approaches for evaluation and performance comparison of different classification methods. In classification, the main objective is to categorize different items and assign them into different groups based on their properties and similarities. In data mining, recursive partitioning is being utilized to probe the structure of a data set, which allow us to envision decision rules and apply them to classify data into several groups. Estimating densities is hard, especially in high dimensions, with limited data. Of course, we do not know the densities, but we could estimate them using classical techniques. First, we calculated the correlation matrix of the dataset to see if any predictors are highly correlated with one another. By calculating the correlation coefficients for the predictor variables, we see that density is strongly correlated with transitivity. We initialized a data frame to easily compare the quality of the result classification methods and utilized decision trees (with k-fold cross validation to prune the tree). The method performed on this dataset is decision trees. Decision tree is a non-parametric classification method, which uses a set of rules to predict that each observation belongs to the most commonly occurring class label of the training data. Our method aggregates many decision trees to create an optimized model that is not susceptible to overfitting. When using a decision tree, however, it is important to use cross-validation to prune the tree in order to narrow it down to the most important variables.

Keywords: online social networks, data mining, social cloud computing, interaction and collaboration

Procedia PDF Downloads 116
220 Patterns of Occurrence of Bovine Haemoparasitic Diseases and Its Co-Incidence with Viral Epidemics of Foot and Mouth Disease and Lumpy Skin Disease

Authors: Amir Hamed Abd-Elrahman, Mohamed Bessat

Abstract:

450 fattening cattle and buffaloes aged from 6 to 30 months old were examined clinically to determine patterns of occurrence of hemoparasitic diseases and the efficacy of different anti theilerial drugs. 420 animals examined clinically to determine relation between different outbreak of FMD and LSD in Egypt 2012- 2013 and haemoprotozoal diseases. The clinical pictures of haemoprotozoal diseases are variable, from sever to mild, depending on the endemic situation which governed by frequent previous exposure and tick infestation. B. bigemina is the most common haemoprotozoal diseases in the area of study and the infection rate in a descending manner for B. bigemina, A. marginale and T. annulata were 20%, 9.7% and 6.6% respectively. The species susceptibility of B. bigemina and T. annulata showed a higher incidence in cattle than buffaloes while in A. marginale showed a little difference in cattle and buffaloes susceptibility by 10% and 9.2% respectively. The breed susceptibility of B. bigemina and T. annulata showed a higher incidence in crossbred cattle than native baladi cattle while A. marginale showed a higher incidence in native baladi cattle than crossbred cattle. The maximal infection rates were recorded during summer months. The infection rates of B. bigemina and A. marginale were higher among young animals over 6 months and declined above 2 year old while in T. annulata the infection rates were lower among young animals and increased above 2 year old. The case fatality of T. annulata was higher than A. marginale and B. bigemina. Efficacy of different anti theilerial drugs were studied, cure rate of chlouroquine group and Butalex group were 60% disappearance of schizont in lymph node smear after 9 days and 5 days respectively while cure rate of Oxytetracycline Dihydrate (Alamycine) group 20% with disappearance of schizont in lymph node smear after 14 days. FMD and LSD infection enhancement the occurrence of bovine haemoprotozoal diseases.

Keywords: Babesia bigemina, Anaplasma marginale, Theileria annulata, FMD, LSD, ephemeral fever

Procedia PDF Downloads 293
219 Design and Simulation Interface Circuit for Piezoresistive Accelerometers with Offset Cancellation Ability

Authors: Mohsen Bagheri, Ahmad Afifi

Abstract:

This paper presents a new method for read out of the piezoresistive accelerometer sensors. The circuit works based on instrumentation amplifier and it is useful for reducing offset in Wheatstone bridge. The obtained gain is 645 with 1 μv/°c equivalent drift and 1.58 mw power consumption. A Schmitt trigger and multiplexer circuit control output node. A high speed counter is designed in this work. The proposed circuit is designed and simulated in 0.18 μm CMOS technology with 1.8 v power supply.

Keywords: piezoresistive accelerometer, zero offset, Schmitt trigger, bidirectional reversible counter

Procedia PDF Downloads 266
218 TP53 Mutations in Molecular Subtypes of Breast Cancer in Young Pakistani Patients

Authors: Nadia Naseem, Farwa Batool, Nasir Mehmood, AbdulHannan Nagi

Abstract:

Background: The incidence and mortality of breast cancer vary significantly in geographically distinct populations. In Pakistan, breast cancer has shown an increase in incidence in young females and is characterized by more aggressive behavior. The tumor suppressor TP53 gene is a crucial genetic factor that plays a significant role in breast carcinogenesis. This study investigated the TP53 mutations in molecular subtypes of both nodes negative and positive breast cancer in young Pakistani patients. Material and Methods: p53, Estrogen Receptor (ER), Progesterone Receptor (PR), Her-2 neu and Ki 67 expressions were analyzed immunohistochemically in a series of 75 node negative (A) and 75 node positive (B) young (aged: 19-40 years) breast cancer patients diagnosed between 2014 to 2017 at two leading hospitals of Punjab, Pakistan. Tumor tissue specimens and peripheral blood samples were examined for TP53 mutations by direct sequencing of the gene (exons 4-9). The relation of TP53 mutations to these markers and clinicopathological data was investigated. Results: Mean age of the patients was 32.4 + 9.1 SD. Invasive breast carcinoma was the most frequent histological variant (A=92%, B=94.6%). Grade 3 carcinoma was the commonest grade (A=72%, B=81.3%). Triple negative cases (ER-, PR-, Her-2) formed most of the molecular subtypes (A=44%, B=50.6%). A total of 17.2% (A: 6.6%, B: 10.6%) patients showed TP53 mutations. Mutations were significantly more frequent in triple negative cases (A: 74.8%, B: 62.2%) compared to HER2-positive patients (P < 0.0001). In the multivariate analysis of the whole patient group, the independent prognosticator were triple negative cases (P=0.021), TP53 overexpression by IHC (P=0.001) and advanced-stage disease (P=0.007). No statistically significant correlation between TP53 mutations and clinicopathological parameters was found (P < 0.05). Conclusions: It is concluded that TP53 mutations are infrequently present in breast carcinoma of young Pakistani population and there was no significant correlation between p53 mutation and early onset disease. Immunohistochemically detected TP53 expression in our resource-constrained to set up can be beneficial in predicting mutations at the younger age in our population.

Keywords: immunohistochemistry (IHC), invasive breast carcinoma (IBC), Pakistan, TP53

Procedia PDF Downloads 132
217 Detecting Black Hole Attacks in Body Sensor Networks

Authors: Sara Alshehri, Bayan Alenzi, Atheer Alshehri, Samia Chelloug, Zainab Almry, Hussah Albugmai

Abstract:

This paper concerns body area networks sensor that collect signals around a human body. The black hole attacks are the main security challenging problem because the data traffic can be dropped at any node. The focus of our proposed solution is to efficiently route data packets while detecting black hole nodes.

Keywords: body sensor networks, security, black hole, routing, broadcasting, OMNeT++

Procedia PDF Downloads 613
216 Capacitance Models of AlGaN/GaN High Electron Mobility Transistors

Authors: A. Douara, N. Kermas, B. Djellouli

Abstract:

In this study, we report calculations of gate capacitance of AlGaN/GaN HEMTs with nextnano device simulation software. We have used a physical gate capacitance model for III-V FETs that incorporates quantum capacitance and centroid capacitance in the channel. These simulations explore various device structures with different values of barrier thickness and channel thickness. A detailed understanding of the impact of gate capacitance in HEMTs will allow us to determine their role in future 10 nm physical gate length node.

Keywords: gate capacitance, AlGaN/GaN, HEMTs, quantum capacitance, centroid capacitance

Procedia PDF Downloads 369
215 Synchronization of Semiconductor Laser Networks

Authors: R. M. López-Gutiérrez, L. Cardoza-Avendaño, H. Cervantes-de Ávila, J. A. Michel-Macarty, C. Cruz-Hernández, A. Arellano-Delgado, R. Carmona-Rodríguez

Abstract:

In this paper, synchronization of multiple chaotic semiconductor lasers is achieved by appealing to complex system theory. In particular, we consider dynamical networks composed by semiconductor laser, as interconnected nodes, where the interaction in the networks are defined by coupling the first state of each node. An interesting case is synchronized with master-slave configuration in star topology. Nodes of these networks are modeled for the laser and simulated by Matlab. These results are applicable to private communication.

Keywords: chaotic laser, network, star topology, synchronization

Procedia PDF Downloads 531
214 Securing Mobile Ad-Hoc Network Utilizing OPNET Simulator

Authors: Tariq A. El Shheibia, Halima Mohamed Belhamad

Abstract:

This paper is considered securing data based on multi-path protocol (SDMP) in mobile ad hoc network utilizing OPNET simulator modular 14.5, including the AODV routing protocol at the network as based multi-path algorithm for message security in MANETs. The main idea of this work is to present a way that is able to detect the attacker inside the MANETs. The detection for this attacker will be performed by adding some effective parameters to the network.

Keywords: MANET, AODV, malicious node, OPNET

Procedia PDF Downloads 264
213 Examining Social Connectivity through Email Network Analysis: Study of Librarians' Emailing Groups in Pakistan

Authors: Muhammad Arif Khan, Haroon Idrees, Imran Aziz, Sidra Mushtaq

Abstract:

Social platforms like online discussion and mailing groups are well aligned with academic as well as professional learning spaces. Professional communities are increasingly moving to online forums for sharing and capturing the intellectual abilities. This study investigated dynamics of social connectivity of yahoo mailing groups of Pakistani Library and Information Science (LIS) professionals using Graph Theory technique. Design/Methodology: Social Network Analysis is the increasingly concerned domain for scientists in identifying whether people grow together through online social interaction or, whether they just reflect connectivity. We have conducted a longitudinal study using Network Graph Theory technique to analyze the large data-set of email communication. The data was collected from three yahoo mailing groups using network analysis software over a period of six months i.e. January to June 2016. Findings of the network analysis were reviewed through focus group discussion with LIS experts and selected respondents of the study. Data were analyzed in Microsoft Excel and network diagrams were visualized using NodeXL and ORA-Net Scene package. Findings: Findings demonstrate that professionals and students exhibit intellectual growth the more they get tied within a network by interacting and participating in communication through online forums. The study reports on dynamics of the large network by visualizing the email correspondence among group members in a network consisting vertices (members) and edges (randomized correspondence). The model pair wise relationship between group members was illustrated to show characteristics, reasons, and strength of ties. Connectivity of nodes illustrated the frequency of communication among group members through examining node coupling, diffusion of networks, and node clustering has been demonstrated in-depth. Network analysis was found to be a useful technique in investigating the dynamics of the large network.

Keywords: emailing networks, network graph theory, online social platforms, yahoo mailing groups

Procedia PDF Downloads 208
212 Development of Monitoring Blood Bank Center Based PIC Microcontroller Using CAN Communication

Authors: Kaiwan S. Ismael, Ergun Ercelebi, Majeed Nader

Abstract:

This paper describes the design and implementation of a hardware setup for online monitoring of 24 refrigerators inside blood bank center using the microcontroller and CAN bus for communications between each node. Due to the security of locations in the blood bank hall and difficulty of monitoring of each refrigerator separately, this work proposes a solution to monitor all the blood bank refrigerators in one location. CAN-bus system is used because it has many applications and advantages, especially for this system due to easy in use, low cost, providing a reduction in wiring, fast to repair and easily expanding the project without a problem.

Keywords: control area network (CAN), monitoring blood bank center, PIC microcontroller, MPLAB IDE

Procedia PDF Downloads 443
211 Clinical Value of 18F-FDG-PET Compared with CT Scan in the Detection of Nodal and Distant Metastasis in Urothelial Carcinoma or Bladder Cancer

Authors: Mohammed Al-Zubaidi, Katherine Ong, Pravin Viswambaram, Steve McCombie, Oliver Oey, Jeremy Ong, Richard Gauci, Ronny Low, Dickon Hayne

Abstract:

Objective: Lymph node involvement along with distant metastasis in a patient with invasive bladder cancer determines the disease survival, therefeor, it is an essential determinant of the therapeutic management and outcome. This retrospective study aims to determine the accuracy of FDG PET scan in detecting lymphatic involvement and distant metastatic urothelial cancer compared to conventional CT staging. Method: A retrospective review of 76 patients with UC or BC who underwent surgery or confirmatory biopsy that was staged with both CT and 18F-FDG-PET (up to 8 weeks apart) between 2015 and 2020. Fifty-sevenpatients (75%) had formal pelvic LN dissection or biopsy of suspicious metastasis. 18F-FDG-PET reports for positive sites were qualitative depending on SUV Max. On the other hand, enlarged LN by RECIST criteria 1.1 (>10 mm) and other qualitative findings suggesting metastasis were considered positive in CT scan. Histopathological findings from surgical specimens or image-guided biopsies were considered the gold standard in comparison to imaging reports. 18F-FDG-avid or enlarged pelvic LNs with surgically proven nodal metastasis were considered true positives. Performance characteristics of 18F-FDG-PET and CT, including sensitivity, specificity, positive predictive value (PPV), and negative predictive value (PPV), were calculated. Results: Pelvic LN involvement was confirmed histologically in 10/57 (17.5%) patients. Sensitivity, specificity, PPV and NPV of CT for detecting pelvic LN metastases were 41.17% (95% CI:18-67%), 100% (95% CI:90-100%) 100% (95% CI:59-100%) and 78.26% (95% CI:64-89%) respectively. Sensitivity, specificity, PPV and NPV of 18F-FDG-PET for detecting pelvic LN metastases were 62.5% (95% CI:35-85%), 83.78% (95% CI:68-94%), 62.5% (95% CI:35-85%), and 83.78% (95% CI:68-94%) respectively. Pre-operative staging with 18F-FDG-PET identified the distant metastatic disease in 9/76 (11.8%) patients who were occult on CT. This retrospective study suggested that 18F-FDG-PET may be more sensitive than CT for detecting pelvic LN metastases. 7/76 (9.2%) patients avoided cystectomy due to 18F-FDG-PET diagnosed metastases that were not reported on CT. Conclusion: 18F-FDG-PET is more sensitive than CT for pelvic LN metastases, which can be used as the standard modality of bladder cancer staging, as it may change the treatment by detecting lymph node metastasis that was occult in CT. Further research involving randomised controlled trials comparing the diagnostic yield of 18F-FDG-PET and CT in detecting nodal and distant metastasis in UC or BC is warranted to confirm our findings.

Keywords: FDG PET, CT scan, urothelial cancer, bladder cancer

Procedia PDF Downloads 89
210 Grisotti Flap as Treatment for Central Tumors of the Breast

Authors: R. Pardo, P. Menendez, MA Gil-Olarte, S. Sanchez, E. García, R. Quintana, J. Martín

Abstract:

Introduction : Within oncoplastic breast techniques there is increased interest in immediate partial breast reconstruction. The volume resected is greater than that of conventional conservative techniques. Central tumours of the breast have classically been treated with a mastectomy with regard to oncological safety and cosmetic secondary effects after wide central resection of the nipple and breast tissue beneath. Oncological results for central quadrantectomy have a recurrence level, disease- free period and survival identical to mastectomy. Grissoti flap is an oncoplastic surgical technique that allows the surgeon to perform a safe central quadrantectomy with excellent cosmetic results. Material and methods: The Grissoti flap is a glandular cutaneous advancement rotation flap that can fill the defect in the central portion of the excised breast. If the inferior border is affected by tumour and further surgery is decided upon at the Multidisciplinary Team Meeting, it will be necessary to perform a mastectomy. All patients with a Grisotti flap undergoing surgery since 2009 were reviewed obtaining the following data: age, hystopathological diagnosis, size, operating time, volume of tissue resected, postoperative admission time, re-excisions due to positive margins affected by tumour, wound dehiscence, complications and recurrence. Analysis and results of sentinel node biopsy were also obtained. Results: 12 patients underwent surgery between 2009-2015. The mean age was 54 years (34-67) . All had a preoperative diagnosis of ductal infiltrative carcinoma of less than 2 cm,. Diagnosis was made with Ultrasound, Mamography or both . Magnetic resonance was used in 5 cases. No patients had preoperative positive axilla after ultrasound exploration. Mean operating time was 104 minutes (84-130). Postoperative stay was 24 hours. Mean volume resected was 159 cc (70-286). In one patient the surgical border was affected by tumour and a further procedure with resection of the affected border was performed as ambulatory surgery. The sentinel node biopsy was positive for micrometastasis in only two cases. In one case lymphadenectomy was performed in 2009. In the other, treated in 2015, no lymphadenectomy was performed as the patient had a favourable histopathological prognosis and the multidisciplinary team meeting agreed that lymphadenectomy was not required. No recurrence has been diagnosed in any of the patients who underwent surgery and they are all disease free at present. Conclusions: Conservative surgery for retroareolar central tumours of the breast results in good local control of the disease with free surgical borders, including resection of the nipple areola complex and pectoral major muscle fascia. Reconstructive surgery with the inferior Grissoti flap adequately fills the defect after central quadrantectomy with creation of a new cutaneous disc where a new nipple areola complex is reconstructed with a local flap or micropigmentation. This avoids the need for contralateral symmetrization. Sentinel Node biopsy can be performed without added morbidity. When feasible, the Grissoti flap will avoid skin-sparing mastectomy for central breast tumours that will require the use of an expander, prosthesis or myocutaneous flap, with all the complications of a more complex operation.

Keywords: Grisotti flap, oncoplastic surgery, central tumours, breast

Procedia PDF Downloads 295
209 Using Digitally Reconstructed Radiographs from Magnetic Resonance Images to Localize Pelvic Lymph Nodes on 2D X-Ray Simulator-Based Brachytherapy Treatment Planning

Authors: Mohammad Ali Oghabian, Reza Reiazi, Esmaeel Parsai, Mehdi Aghili, Ramin Jaberi

Abstract:

In this project a new procedure has been introduced for utilizing digitally reconstructed radiograph from MRI images in Brachytherapy treatment planning. This procedure enables us to localize the tumor volume and delineate the extent of critical structures in vicinity of tumor volume. The aim of this project was to improve the accuracy of dose delivered to targets of interest in 2D treatment planning system.

Keywords: brachytherapy, cervix, digitally reconstructed radiographs, lymph node

Procedia PDF Downloads 501
208 Nonlinear Finite Element Analysis of Concrete Filled Steel I-Girder Bridge

Authors: Waheed Ahmad Safi, Shunichi Nakamura

Abstract:

Concrete filled steel I-girder (CFIG) bridge was proposed and the bending and shear strength was confirmed by experiments. The area surrounded by the upper and lower flanges and the web is filled with concrete in CFIG, which is used to the intermediate support of a continuous girder. Three-dimensional finite element models were established to simulate the bending and shear behaviors of CFIG and to clarify the load transfer mechanism. Steel plates and filled concrete were modeled as a three-dimensional 8-node solid element and steel reinforcement bars as a three-dimensional 2-node truss element. The elements were mostly divided into the 50 x 50 mm mesh size. The non-linear stress-strain relation is assumed for concrete in compression including the softening effect after the peak, and the stress increases linearly for concrete in tension until concrete cracking but then decreases due to tension stiffening effect. The stress-strain relation for steel plates was tri-linear and that for reinforcements was bi-linear. The concrete and the steel plates were rigidly connected. The developed FEM model was applied to simulate and analysis the bending behaviors of the CFIG specimens. The vertical displacements and the strains of steel plates and the filled concrete obtained by FEM agreed very well with the test results until the yield load. The specimens collapsed when the upper flange buckled or the concrete spalled off. These phenomena cannot be properly analyzed by FEM, which produces a small discrepancy at the ultimate states. The FEM model was also applied to simulate and analysis the shear tests of the CFIG specimens. The vertical displacements and strains of steel and concrete calculated by FEM model agreed well with the test results. A truss action was confirmed by the FEM and the experiment, clarifying that shear forces were mainly resisted by the tension strut of the steel plate and the compression strut of the filled concrete acting in the diagonal direction. A trail design with the CFIG was carried out for a four-span continuous highway bridge and the design method was established. Construction cost was estimated about 12% lower than that of a conventional steel I-section girder.

Keywords: concrete filled steel I-girder, bending strength, FEM, limit states design, steel I-girder, shear strength

Procedia PDF Downloads 192
207 Cluster-Based Multi-Path Routing Algorithm in Wireless Sensor Networks

Authors: Si-Gwan Kim

Abstract:

Small-size and low-power sensors with sensing, signal processing and wireless communication capabilities is suitable for the wireless sensor networks. Due to the limited resources and battery constraints, complex routing algorithms used for the ad-hoc networks cannot be employed in sensor networks. In this paper, we propose node-disjoint multi-path hexagon-based routing algorithms in wireless sensor networks. We suggest the details of the algorithm and compare it with other works. Simulation results show that the proposed scheme achieves better performance in terms of efficiency and message delivery ratio.

Keywords: clustering, multi-path, routing protocol, sensor network

Procedia PDF Downloads 371
206 Influence of Javascript Programming on the Developement of Web and Mobile Application

Authors: Abdul Basit Kiani

Abstract:

Web technologies are growing rapidly in the current era with the increasing development of the web, various novel web technologies emerged to web applications, compared to HTML. JavaScript is the language that provided a dynamic web site which actively interacts with users. The JavaScript language supports the Model View Controller (MVC) architecture that maintains a readable code and clearly separates parts of the program code. Our research is focused on the comparison of the popular JavaScript frameworks; Angular JS, Django, Node JS, Laravel. These frameworks are rely on MVC. In this paper, we will discuss the merits and demerits of each framework, the influence on the application speed, testing methods, for example, JS applications, and methods to advance code security.

Keywords: java script, react, nodejs, htmlcsss

Procedia PDF Downloads 77
205 CERD: Cost Effective Route Discovery in Mobile Ad Hoc Networks

Authors: Anuradha Banerjee

Abstract:

A mobile ad hoc network is an infrastructure less network, where nodes are free to move independently in any direction. The nodes have limited battery power; hence, we require energy efficient route discovery technique to enhance their lifetime and network performance. In this paper, we propose an energy-efficient route discovery technique CERD that greatly reduces the number of route requests flooded into the network and also gives priority to the route request packets sent from the routers that has communicated with the destination very recently, in single or multi-hop paths. This does not only enhance the lifetime of nodes but also decreases the delay in tracking the destination.

Keywords: ad hoc network, energy efficiency, flooding, node lifetime, route discovery

Procedia PDF Downloads 317
204 Study of the Thermomechanical Behavior of a Concrete Element

Authors: Douhi Reda Bouabdellah, Khalafi Hamid, Belamri Samir

Abstract:

The desire to improve the safety of nuclear reactor containment has revealed the need for data on the thermo mechanical behavior of concrete in case of accident during which the concrete is exposed to high temperatures. The aim of the present work is to study the influence of high temperature on the behavior of ordinary concrete specimens loaded by an effort of compression. A thermal model is developed by discretization volume elements (CASTEM). The results of different simulations, combined with other findings help to bring a physical phenomenon explanation Thermo mechanical concrete structures, which allowed to obtain the variation of the stresses anywhere in point or node and each subsequent temperature different directions X, Y and Z.

Keywords: concrete, thermic-gradient, fire resistant, simulation by CASTEM, mechanical strength

Procedia PDF Downloads 279
203 SFO-ECRSEP: Sensor Field Optimızation Based Ecrsep For Heterogeneous WSNS

Authors: Gagandeep Singh

Abstract:

The sensor field optimization is a serious issue in WSNs and has been ignored by many researchers. As in numerous real-time sensing fields the sensor nodes on the corners i.e. on the segment boundaries will become lifeless early because no extraordinary safety is presented for them. Accordingly, in this research work the central objective is on the segment based optimization by separating the sensor field between advance and normal segments. The inspiration at the back this sensor field optimization is to extend the time spam when the first sensor node dies. For the reason that in normal sensor nodes which were exist on the borders may become lifeless early because the space among them and the base station is more so they consume more power so at last will become lifeless soon.

Keywords: WSNs, ECRSEP, SEP, field optimization, energy

Procedia PDF Downloads 267
202 Tumor Size and Lymph Node Metastasis Detection in Colon Cancer Patients Using MR Images

Authors: Mohammadreza Hedyehzadeh, Mahdi Yousefi

Abstract:

Colon cancer is one of the most common cancer, which predicted to increase its prevalence due to the bad eating habits of peoples. Nowadays, due to the busyness of people, the use of fast foods is increasing, and therefore, diagnosis of this disease and its treatment are of particular importance. To determine the best treatment approach for each specific colon cancer patients, the oncologist should be known the stage of the tumor. The most common method to determine the tumor stage is TNM staging system. In this system, M indicates the presence of metastasis, N indicates the extent of spread to the lymph nodes, and T indicates the size of the tumor. It is clear that in order to determine all three of these parameters, an imaging method must be used, and the gold standard imaging protocols for this purpose are CT and PET/CT. In CT imaging, due to the use of X-rays, the risk of cancer and the absorbed dose of the patient is high, while in the PET/CT method, there is a lack of access to the device due to its high cost. Therefore, in this study, we aimed to estimate the tumor size and the extent of its spread to the lymph nodes using MR images. More than 1300 MR images collected from the TCIA portal, and in the first step (pre-processing), histogram equalization to improve image qualities and resizing to get the same image size was done. Two expert radiologists, which work more than 21 years on colon cancer cases, segmented the images and extracted the tumor region from the images. The next step is feature extraction from segmented images and then classify the data into three classes: T0N0، T3N1 و T3N2. In this article, the VGG-16 convolutional neural network has been used to perform both of the above-mentioned tasks, i.e., feature extraction and classification. This network has 13 convolution layers for feature extraction and three fully connected layers with the softmax activation function for classification. In order to validate the proposed method, the 10-fold cross validation method used in such a way that the data was randomly divided into three parts: training (70% of data), validation (10% of data) and the rest for testing. It is repeated 10 times, each time, the accuracy, sensitivity and specificity of the model are calculated and the average of ten repetitions is reported as the result. The accuracy, specificity and sensitivity of the proposed method for testing dataset was 89/09%, 95/8% and 96/4%. Compared to previous studies, using a safe imaging technique (MRI) and non-use of predefined hand-crafted imaging features to determine the stage of colon cancer patients are some of the study advantages.

Keywords: colon cancer, VGG-16, magnetic resonance imaging, tumor size, lymph node metastasis

Procedia PDF Downloads 35
201 Multi Objective Near-Optimal Trajectory Planning of Mobile Robot

Authors: Amar Khoukhi, Mohamed Shahab

Abstract:

This paper presents the optimal control problem of mobile robot motion as a nonlinear programming problem (NLP) and solved using a direct method of numerical optimal control. The NLP is initialized with a B-Spline for which node locations are optimized using a genetic search. The system acceleration inputs and sampling periods are considered as optimization variables. Different scenarios with different objectives weights are implemented and investigated. Interesting results are found in terms of complying with the expected behavior of a mobile robot system and time-energy minimization.

Keywords: multi-objective control, non-holonomic systems, mobile robots, nonlinear programming, motion planning, B-spline, genetic algorithm

Procedia PDF Downloads 342
200 An Application of Graph Theory to The Electrical Circuit Using Matrix Method

Authors: Samai'la Abdullahi

Abstract:

A graph is a pair of two set and so that a graph is a pictorial representation of a system using two basic element nodes and edges. A node is represented by a circle (either hallo shade) and edge is represented by a line segment connecting two nodes together. In this paper, we present a circuit network in the concept of graph theory application and also circuit models of graph are represented in logical connection method were we formulate matrix method of adjacency and incidence of matrix and application of truth table.

Keywords: euler circuit and path, graph representation of circuit networks, representation of graph models, representation of circuit network using logical truth table

Procedia PDF Downloads 524
199 Evaluation of Collect Tree Protocol for Structural Health Monitoring System Using Wireless Sensor Networks

Authors: Amira Zrelli, Tahar Ezzedine

Abstract:

Routing protocol may enhance the lifetime of sensor network, it has a highly importance, especially in wireless sensor network (WSN). Therefore, routing protocol has a big effect in these networks, thus the choice of routing protocol must be studied before setting up our network. In this work, we implement the routing protocol collect tree protocol (CTP) which is one of the hierarchic protocols used in structural health monitoring (SHM). Therefore, to evaluate the performance of this protocol, we choice to work with Contiki system and Cooja simulator. By throughput and RSSI evaluation of each node, we will deduce about the utility of CTP in structural monitoring system.

Keywords: CTP, WSN, SHM, routing protocol

Procedia PDF Downloads 256
198 Secure Content Centric Network

Authors: Syed Umair Aziz, Muhammad Faheem, Sameer Hussain, Faraz Idris

Abstract:

Content centric network is the network based on the mechanism of sending and receiving the data based on the interest and data request to the specified node (which has cached data). In this network, the security is bind with the content not with the host hence making it host independent and secure. In this network security is applied by taking content’s MAC (message authentication code) and encrypting it with the public key of the receiver. On the receiver end, the message is first verified and after verification message is saved and decrypted using the receiver's private key.

Keywords: content centric network, client-server, host security threats, message authentication code, named data network, network caching, peer-to-peer

Procedia PDF Downloads 613
197 Misleading Node Detection and Response Mechanism in Mobile Ad-Hoc Network

Authors: Earleen Jane Fuentes, Regeene Melarese Lim, Franklin Benjamin Tapia, Alexis Pantola

Abstract:

Mobile Ad-hoc Network (MANET) is an infrastructure-less network of mobile devices, also known as nodes. These nodes heavily rely on each other’s resources such as memory, computing power, and energy. Thus, some nodes may become selective in forwarding packets so as to conserve their resources. These nodes are called misleading nodes. Several reputation-based techniques (e.g. CORE, CONFIDANT, LARS, SORI, OCEAN) and acknowledgment-based techniques (e.g. TWOACK, S-TWOACK, EAACK) have been proposed to detect such nodes. These techniques do not appropriately punish misleading nodes. Hence, this paper addresses the limitations of these techniques using a system called MINDRA.

Keywords: acknowledgment-based techniques, mobile ad-hoc network, selfish nodes, reputation-based techniques

Procedia PDF Downloads 350
196 Modified Active (MA) Algorithm to Generate Semantic Web Related Clustered Hierarchy for Keyword Search

Authors: G. Leena Giri, Archana Mathur, S. H. Manjula, K. R. Venugopal, L. M. Patnaik

Abstract:

Keyword search in XML documents is based on the notion of lowest common ancestors in the labelled trees model of XML documents and has recently gained a lot of research interest in the database community. In this paper, we propose the Modified Active (MA) algorithm which is an improvement over the active clustering algorithm by taking into consideration the entity aspect of the nodes to find the level of the node pertaining to a particular keyword input by the user. A portion of the bibliography database is used to experimentally evaluate the modified active algorithm and results show that it performs better than the active algorithm. Our modification improves the response time of the system and thereby increases the efficiency of the system.

Keywords: keyword matching patterns, MA algorithm, semantic search, knowledge management

Procedia PDF Downloads 377