Search results for: Cloud storage
287 Dynamic Control Modeling and Simulation of a UPFC-SMES Compensator in Power Systems
Authors: K. Saravanan, R. Anita
Abstract:
Flexible AC Transmission Systems (FACTS) is granting a new group of advanced power electronic devices emerging for enhancement of the power system performance. Unified Power Flow Controller (UPFC) is a recent version of FACTS devices for power system applications. The back-up energy supply system incorporated with UPFC is providing a complete control of real and reactive power at the same time and hence is competent to improve the performance of an electrical power system. In this article, backup energy supply unit such as superconducting magnetic energy storage (SMES) is integrated with UPFC. In addition, comparative exploration of UPFC–battery, UPFC–UC and UPFC–SMES performance is evaluated through the vibrant simulation by using MATLAB/Simulink software.
Keywords: Power system, FACTS, UPFC, DC-DC chopper, battery, UC, SMES.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1956286 Dynamic Decompression for Text Files
Authors: Ananth Kamath, Ankit Kant, Aravind Srivatsa, Harisha J.A
Abstract:
Compression algorithms reduce the redundancy in data representation to decrease the storage required for that data. Lossless compression researchers have developed highly sophisticated approaches, such as Huffman encoding, arithmetic encoding, the Lempel-Ziv (LZ) family, Dynamic Markov Compression (DMC), Prediction by Partial Matching (PPM), and Burrows-Wheeler Transform (BWT) based algorithms. Decompression is also required to retrieve the original data by lossless means. A compression scheme for text files coupled with the principle of dynamic decompression, which decompresses only the section of the compressed text file required by the user instead of decompressing the entire text file. Dynamic decompressed files offer better disk space utilization due to higher compression ratios compared to most of the currently available text file formats.Keywords: Compression, Dynamic Decompression, Text file format, Portable Document Format, Compression Ratio.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1763285 Sensory Evaluation of Cooked Sausages with Legumes Additive
Authors: Ilze Gramatina, Jelena Zagorska, Evita Straumite, Svetlana Sarvi
Abstract:
In the meat processing industry the substitution of meat with non-meat ingredients is considered an important strategy for reducing overall production costs. The main purpose of the current research was to evaluate differences in physical-chemical composition of cooked sausage with different legumes additions. Peas (Pisum sativum), beans (Phaseolus vulgaris) and lentil (Lens culinaris) were used in preparation of sausages. The legumes at proportion of 20% of the total weight of meat were added in sausages. The whole ingredients were mixed, filled into casing, compressed, cooked and cooled. After storage the samples were sensory evaluated. The sensory evaluation was carried out using the nine point hedonic scale and line scale. Sausages without legumes flour was used as control sample. The main conclusion of the current research the legumes flour can be successfully used for cooked sausages production.Keywords: Legumes, cooked sausages.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2706284 Evaluation of State of the Art IDS Message Exchange Protocols
Authors: Robert Koch, Mario Golling, Gabi Dreo
Abstract:
During the last couple of years, the degree of dependence on IT systems has reached a dimension nobody imagined to be possible 10 years ago. The increased usage of mobile devices (e.g., smart phones), wireless sensor networks and embedded devices (Internet of Things) are only some examples of the dependency of modern societies on cyber space. At the same time, the complexity of IT applications, e.g., because of the increasing use of cloud computing, is rising continuously. Along with this, the threats to IT security have increased both quantitatively and qualitatively, as recent examples like STUXNET or the supposed cyber attack on Illinois water system are proofing impressively. Once isolated control systems are nowadays often publicly available - a fact that has never been intended by the developers. Threats to IT systems don’t care about areas of responsibility. Especially with regard to Cyber Warfare, IT threats are no longer limited to company or industry boundaries, administrative jurisdictions or state boundaries. One of the important countermeasures is increased cooperation among the participants especially in the field of Cyber Defence. Besides political and legal challenges, there are technical ones as well. A better, at least partially automated exchange of information is essential to (i) enable sophisticated situational awareness and to (ii) counter the attacker in a coordinated way. Therefore, this publication performs an evaluation of state of the art Intrusion Detection Message Exchange protocols in order to guarantee a secure information exchange between different entities.
Keywords: Cyber Defence, Cyber Warfare, Intrusion Detection Information Exchange, Early Warning Systems, Joint Intrusion Detection, Cyber Conflict
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2293283 Performance of an Absorption Refrigerator Using a Solar Thermal Collector
Authors: Abir Hmida, Nihel Chekir, Ammar Ben Brahim
Abstract:
In the present paper, we investigate the feasibility of a thermal solar driven cold room in Gabes, southern region of Tunisia. The cold room of 109 m3 is refrigerated using an ammonia absorption machine. It is destined to preserve dates during the hot months of the year. A detailed study of the cold room leads previously to the estimation of the cooling load of the proposed storage room in the operating conditions of the region. The next step consists of the estimation of the required heat in the generator of the absorption machine to ensure the desired cold temperature. A thermodynamic analysis was accomplished and complete description of the system is determined. We propose, here, to provide the needed heat thermally from the sun by using vacuum tube collectors. We found that at least 21m² of solar collectors are necessary to accomplish the work of the solar cold room.
Keywords: Absorption, ammonia, cold room, solar collector, vacuum tube.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 734282 Characterization of Adhesive Layers in Sandwich Composites by Nondestructive Technique
Authors: E. Barkanov, E. Skukis, M. Wesolowski, A. Chate
Abstract:
New nondestructive technique, namely an inverse technique based on vibration tests, to characterize nonlinear mechanical properties of adhesive layers in sandwich composites is developed. An adhesive layer is described as a viscoelastic isotropic material with storage and loss moduli which are both frequency dependent values in wide frequency range. An optimization based on the planning of experiments and response surface technique to minimize the error functional is applied to decrease considerably the computational expenses. The developed identification technique has been tested on aluminum panels and successfully applied to characterize viscoelastic material properties of 3M damping polymer ISD-112 used as a core material in sandwich panels.
Keywords: Adhesive layer, finite element method, inverse technique, sandwich panel, vibration test, viscoelastic material properties.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2251281 Performance Analysis of Certificateless Signature for IKE Authentication
Authors: Nazrul M. Ahmad, Asrul H. Yaacob, Ridza Fauzi, Alireza Khorram
Abstract:
Elliptic curve-based certificateless signature is slowly gaining attention due to its ability to retain the efficiency of identity-based signature to eliminate the need of certificate management while it does not suffer from inherent private key escrow problem. Generally, cryptosystem based on elliptic curve offers equivalent security strength at smaller key sizes compared to conventional cryptosystem such as RSA which results in faster computations and efficient use of computing power, bandwidth, and storage. This paper proposes to implement certificateless signature based on bilinear pairing to structure the framework of IKE authentication. In this paper, we perform a comparative analysis of certificateless signature scheme with a well-known RSA scheme and also present the experimental results in the context of signing and verification execution times. By generalizing our observations, we discuss the different trade-offs involved in implementing IKE authentication by using certificateless signature.Keywords: Certificateless signature, IPSec, RSA signature, IKE authentication.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1800280 Effects of Some Natural Antioxidants Mixtures on Margarine Stability
Authors: Maryam Azizkhani, Parvin Zandi
Abstract:
Application of synthetic antioxidants such as tertbutylhydroquinon (TBHQ), in spite of their efficiency, is questioned because of their possible carcinogenic effect. The purpose of this study was application of mixtures of natural antioxidants that provide the best oxidative stability for margarine. Antioxidant treatments included 10 various mixtures (F1- F10) containing 100-500ppm tocopherol mixture (Toc), 100-200ppm ascorbyl palmitate (AP), 100- 200ppm rosemary extract (Ros) and 1000ppm lecithin(Lec) along with a control or F0 (with no antioxidant) and F11 with 120ppm TBHQ. The effect of antioxidant mixtures on the stability of margarine samples during oven test (60°C), rancimat test at 110°C and storage at 4°C was evaluated. Final ranking of natural antioxidant mixtures was as follows: F2,F10>F5,F9>F8>F1,F3,F4>F6, F7. Considering the results of this research and ranking criteria, F2(200ppmAp + 200ppmRos) and F10(200ppmRos + 200ppmToc +1000ppmLec) were recommended as substitutes for TBHQ to maintain the quality and increase the shelf-life of margarine.Keywords: Margarine, Natural antioxidant, Oxidative stability, Shelf-life.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3133279 Multi-Temporal Mapping of Built-up Areas Using Daytime and Nighttime Satellite Images Based on Google Earth Engine Platform
Authors: S. Hutasavi, D. Chen
Abstract:
The built-up area is a significant proxy to measure regional economic growth and reflects the Gross Provincial Product (GPP). However, an up-to-date and reliable database of built-up areas is not always available, especially in developing countries. The cloud-based geospatial analysis platform such as Google Earth Engine (GEE) provides an opportunity with accessibility and computational power for those countries to generate the built-up data. Therefore, this study aims to extract the built-up areas in Eastern Economic Corridor (EEC), Thailand using day and nighttime satellite imagery based on GEE facilities. The normalized indices were generated from Landsat 8 surface reflectance dataset, including Normalized Difference Built-up Index (NDBI), Built-up Index (BUI), and Modified Built-up Index (MBUI). These indices were applied to identify built-up areas in EEC. The result shows that MBUI performs better than BUI and NDBI, with the highest accuracy of 0.85 and Kappa of 0.82. Moreover, the overall accuracy of classification was improved from 79% to 90%, and error of total built-up area was decreased from 29% to 0.7%, after night-time light data from the Visible and Infrared Imaging Suite (VIIRS) Day Night Band (DNB). The results suggest that MBUI with night-time light imagery is appropriate for built-up area extraction and be utilize for further study of socioeconomic impacts of regional development policy over the EEC region.
Keywords: Built-up area extraction, Google earth engine, adaptive thresholding method, rapid mapping.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 610278 MONARC: A Case Study on Simulation Analysis for LHC Activities
Authors: Ciprian Dobre
Abstract:
The scale, complexity and worldwide geographical spread of the LHC computing and data analysis problems are unprecedented in scientific research. The complexity of processing and accessing this data is increased substantially by the size and global span of the major experiments, combined with the limited wide area network bandwidth available. We present the latest generation of the MONARC (MOdels of Networked Analysis at Regional Centers) simulation framework, as a design and modeling tool for large scale distributed systems applied to HEP experiments. We present simulation experiments designed to evaluate the capabilities of the current real-world distributed infrastructure to support existing physics analysis processes and the means by which the experiments bands together to meet the technical challenges posed by the storage, access and computing requirements of LHC data analysis within the CMS experiment.Keywords: Modeling and simulation, evaluation, large scale distributed systems, LHC experiments, CMS.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1811277 Post-Compression Consideration in Video Watermarking for Wireless Communication
Authors: Chuen-Ching Wang, Yao-Tang Chang, Yu-Chang Hsu
Abstract:
A simple but effective digital watermarking scheme utilizing a context adaptive variable length coding (CAVLC) method is presented for wireless communication system. In the proposed approach, the watermark bits are embedded in the final non-zero quantized coefficient of each DCT block, thereby yielding a potential reduction in the length of the coded block. As a result, the watermarking scheme not only provides the means to check the authenticity and integrity of the video stream, but also improves the compression ratio and therefore reduces both the transmission time and the storage space requirements of the coded video sequence. The results confirm that the proposed scheme enables the detection of malicious tampering attacks and reduces the size of the coded H.264 file. Therefore, the current study is feasible to apply in the video applications of wireless communication such as 3G systemKeywords: 3G, wireless communication, CAVLC, digitalwatermarking, motion compensation
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1870276 RV-YOLOX: Object Detection on Inland Waterways Based on Optimized YOLOX through Fusion of Vision and 3+1D Millimeter Wave Radar
Authors: Zixian Zhang, Shanliang Yao, Zile Huang, Zhaodong Wu, Xiaohui Zhu, Yong Yue, Jieming Ma
Abstract:
Unmanned Surface Vehicles (USVs) hold significant value for their capacity to undertake hazardous and labor-intensive operations over aquatic environments. Object detection tasks are significant in these applications. Nonetheless, the efficacy of USVs in object detection is impeded by several intrinsic challenges, including the intricate dispersal of obstacles, reflections emanating from coastal structures, and the presence of fog over water surfaces, among others. To address these problems, this paper provides a fusion method for USVs to effectively detect objects in the inland surface environment, utilizing vision sensors and 3+1D Millimeter-wave radar. The MMW radar is a complementary tool to vision sensors, offering reliable environmental data. This approach involves the conversion of the radar’s 3D point cloud into a 2D radar pseudo-image, thereby standardizing the format for radar and vision data by leveraging a point transformer. Furthermore, this paper proposes the development of a multi-source object detection network, named RV-YOLOX, which leverages radar-vision integration specifically tailored for inland waterway environments. The performance is evaluated on our self-recording waterways dataset. Compared with the YOLOX network, our fusion network significantly improves detection accuracy, especially for objects with bad light conditions.
Keywords: Inland waterways, object detection, YOLO, sensor fusion, self-attention, deep learning.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 292275 Omni: Data Science Platform for Evaluate Performance of a LoRaWAN Network
Authors: Emanuele A. Solagna, Ricardo S, Tozetto, Roberto dos S. Rabello
Abstract:
Nowadays, physical processes are becoming digitized by the evolution of communication, sensing and storage technologies which promote the development of smart cities. The evolution of this technology has generated multiple challenges related to the generation of big data and the active participation of electronic devices in society. Thus, devices can send information that is captured and processed over large areas, but there is no guarantee that all the obtained data amount will be effectively stored and correctly persisted. Because, depending on the technology which is used, there are parameters that has huge influence on the full delivery of information. This article aims to characterize the project, currently under development, of a platform that based on data science will perform a performance and effectiveness evaluation of an industrial network that implements LoRaWAN technology considering its main parameters configuration relating these parameters to the information loss.Keywords: Internet of Things, LoRa, LoRaWAN, smart cities.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 713274 New Concept for the Overall use of Renewable Energy
Authors: Chang-Hsien Tai, Uzu-Kuei Hsu, Jr-Ming Miao, Yong-Jhou Lin
Abstract:
The development and application of wind power for renewable energy has attracted growing interest in recent years. Renewable energy sources are attracting much alteration as they can reduce both environmental damage and dependence on fossil fuels. With the growing need for sustainable energy supplies, a case is made for decentralized, stand-alone power supplies (SAPS) as an alternative to power grids. In the era which traditional petroleum energy resource decreasing and the green house affect significant increasing, the development and usage of regenerative resources is inevitable. Due to the contribution of the pioneers, the development of regenerative resources already has a remarkable achievement; however, in the view of economy and quantity, it is still a long road for regenerative energy to replace traditional petroleum energy. In our prospective, in stead of investigate larger regenerative energy equipment, it is much wiser to think about the blind side and breakthrough of the current technique.Keywords: regenerative resources, hybrid system, transfer, storage, phase change
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1661273 Osteogenesis by Dextran Coating on and among Fibers of a Polyvinyl Formal Sponge
Authors: M. Yoshikawa, N. Tsuji, T. Yabuuchi, Y Shimomura, H. Kakigi, H. Hayashi, H. Ohgushi
Abstract:
A scaffold is necessary for tooth regeneration because of its three-dimensional geometry. For restoration of defect, it is necessary for the scaffold to be prepared in the shape of the defect. Sponges made from polyvinyl alcohol with formalin cross-linking (PVF sponge) have been used for scaffolds for bone formation in vivo. To induce osteogenesis within the sponge, methods of growing rat bone marrow cells (rBMCs) among the fiber structures in the sponge might be considered. Storage of rBMCs among the fibers in the sponge coated with dextran (10 kDa) was tried. After seeding of rBMCs to PVF sponge immersed in dextran solution at 2 g/dl concentration, osteogenesis was recognized in subcutaneously implanted PVF sponge as a scaffold in vivo. The level of osteocalcin was 25.28±5.71 ng/scaffold and that of Ca was 129.20±19.69 µg/scaffold. These values were significantly higher than those in sponges without dextran coating (p<0.01). Osteogenesis was induced in many spaces in the inner structure of the sponge with dextran coated fibers.
Keywords: Dextran, Polyvinyl formal sponge, Osteogenesis, Scaffold.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1543272 Investigation of Dynamic Mechanical Properties of Jute/Carbon Reinforced Composites
Authors: H. Sezgin, O. B. Berkalp, R. Mishra, J. Militky
Abstract:
In the last few decades, due to their advanced properties, there has been an increasing interest in hybrid composite materials. In this study, the effect of different stacking sequences of jute and carbon fabric plies on dynamic mechanical properties of composite laminates were investigated. Vacuum bagging system was used to fabricate the composite samples. Each composite laminate was reinforced with two plies of jute fabric and two plies of carbon fabric by varying the position of layers. Dynamic mechanical analyzer (DMA) was used to examine the dynamic mechanical properties of composite laminates with increasing temperature. Results showed that the composite sample, which has carbon fabric at the outer layers, has the highest storage and loss modulus. Besides, it was observed that glass transition temperature (Tg) of samples are close to each other and at about 75 °C.
Keywords: Differential scanning calorimetry dynamic mechanical analysis, textile reinforced composites, thermogravimetric analysis.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1838271 Numerical and Experimental Assessment of a PCM Integrated Solar Chimney
Authors: J. Carlos Frutos Dordelly, M. Coillot, M. El Mankibi, R. Enríquez Miranda, M. José Jimenez, J. Arce Landa
Abstract:
Natural ventilation systems have increasingly been the subject of research due to rising energetic consumption within the building sector and increased environmental awareness. In the last two decades, the mounting concern of greenhouse gas emissions and the need for an efficient passive ventilation system have driven the development of new alternative passive technologies such as ventilated facades, trombe walls or solar chimneys. The objective of the study is the assessment of PCM panels in an in situ solar chimney for the establishment of a numerical model. The PCM integrated solar chimney shows slight performance improvement in terms of mass flow rate and external temperature and outlet temperature difference. An increase of 11.3659 m3/h can be observed during low wind speed periods. Additionally, the surface temperature across the chimney goes beyond 45 °C and allows the activation of PCM panels.
Keywords: Energy storage, passive ventilation, phase changing materials, solar chimney, solar energy.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1154270 Enhanced Dimensional Stability of Rigid PVC Foams Using Glass Fibers
Authors: Nidal H. Abu-Zahra, Murtatha M. Jamel, Parisa Khoshnoud, Subhashini Gunashekar
Abstract:
Two types of glass fibers having different lengths (1/16" and 1/32") were added into rigid PVC foams to enhance the dimensional stability of extruded rigid Polyvinyl Chloride (PVC) foam at different concentrations (0-20 phr) using a single screw profile extruder. PVC foam-glass fiber composites (PVC-GF) were characterized for their dimensional stability, structural, thermal, and mechanical properties. Experimental results show that the dimensional stability, heat resistance, and storage modulus were enhanced without compromising the tensile and flexural strengths of the composites. Overall, foam composites which were prepared with longer glass fibers exhibit better mechanical and thermal properties than those prepared with shorter glass fibers due to higher interlocking between the fibers and the foam cells, which result in better load distribution in the matrix.
Keywords: Polyvinyl Chloride, PVC Foam, PVC Composites, Glass Fiber Composites.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3310269 A New Protocol for Concealed Data Aggregation in Wireless Sensor Networks
Authors: M. Abbasi Dezfouli, S. Mazraeh, M. H. Yektaie
Abstract:
Wireless sensor networks (WSN) consists of many sensor nodes that are placed on unattended environments such as military sites in order to collect important information. Implementing a secure protocol that can prevent forwarding forged data and modifying content of aggregated data and has low delay and overhead of communication, computing and storage is very important. This paper presents a new protocol for concealed data aggregation (CDA). In this protocol, the network is divided to virtual cells, nodes within each cell produce a shared key to send and receive of concealed data with each other. Considering to data aggregation in each cell is locally and implementing a secure authentication mechanism, data aggregation delay is very low and producing false data in the network by malicious nodes is not possible. To evaluate the performance of our proposed protocol, we have presented computational models that show the performance and low overhead in our protocol.Keywords: Wireless Sensor Networks, Security, Concealed Data Aggregation.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1735268 The Content of Acrylamide in Deep-fat Fried, Shallow Fried and Roasted Potatoes
Authors: Irisa Murniece, Daina Karklina, Ruta Galoburda
Abstract:
Potato is one of the main components of warm meals in Latvia. Consumption of fried potatoes in Latvia is the highest comparing to Nordic and other Baltic countries. Therefore acrylamide (AA) intake coming from fried potatoes in population might be high as well. The aim of the research was to determine AA content in traditionally cooked potatoes bred and cultivated in Latvia. Five common Latvian potato varieties were selected: Lenora, Brasla, Imanta, Zile and Madara. A two-year research was conducted during two periods: just after harvesting and after six months of storage. The following cooking methods were used: shallow frying (150 ± 5 °C); deep-fat frying (180 ± 5 °C) and roasting (210 ± 5 °C). Time and temperature was recorded during frying. AA was extracted from potatoes by solid phase extraction and AA content was determined by LC-MS/MS. AA content significantly differs (p<0.05) in potatoes per variety, per each frying method and per time.
Keywords: potato, frying, roasting, variety, acrylamide, Latvia.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1788267 Treatment of Leaden Sludge of Algiers Refinery by Electrooxidation
Authors: K. Ighilahriz, M. Taleb Ahmed, R. Maachi
Abstract:
Oil industries are responsible for most cases of contamination of our ecosystem by oil and heavy metals. They are toxic and considered carcinogenic and dangerous even when they exist in trace amounts. At Algiers refinery, production, transportation, and refining of crude oil generate considerable waste in storage tanks; these residues result from the gravitational settling. The composition of these residues is essentially a mixture of hydrocarbon and lead. We propose in this work the application of electrooxidation treatment for the leachate of the leaden sludge. The effect of pH, current density and the electrolysis time were studied, the effectiveness of the processes is evaluated by measuring the chemical oxygen demand (COD). The dissolution is the best way to mobilize pollutants from leaden mud, so we conducted leaching before starting the electrochemical treatment. The process was carried out in batch mode using graphite anode and a stainless steel cathode. The results clearly demonstrate the compatibility of the technique used with the type of pollution studied. In fact, it allowed COD removal about 80%.Keywords: Electrooxidation, leaching, leaden sludge, the oil industry.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 721266 Poisoning Admission in Children Hospital in Benghazi-Libya, Three Years Review of Medical Record
Authors: Mudafara S Bengleil
Abstract:
Estimation of the magnitude and causes of poisoning was the objective of the current study. A retrospective study of medical records of all poisoning children admitted to Benghazi Children Hospital in Libya from January 2008 up to December 2010. Number of children admitted was 244; the age ranged from less than one to 13 years old. Most of cases were admitted with mild symptom and the majority of them were boys. Only few cases admitted to intensive care unit and there was no mortality recorded through the period of study. Age group 1 to 3 years (50.8%) had the highest frequency of admission and the peak of admission was during summer. The most common cause of admission was due to ingestion of medication (53.69%), House hold product exposure (26.64%) was the second causes of admission while, 19.67% of admissions were due to Food poisoning. Almost all admitted cases were accidental and medicines were the most consumed substances in addition, improper storage of toxic agents were the first risk factor of poisoning. Present results indicated that, children poisoning seems to be a common pediatric care problem which need to control and prevent.
Keywords: Children, hospital, poisoning.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1882265 Throughput Enhancement in AUDTWMN Using Throwboxes – An Overview
Authors: Laveen Sundararaj, Palanisamy Vellaiyan
Abstract:
Delay and Disruption Tolerant Networking is part of the Inter Planetary Internet with primary application being Deep Space Networks. Its Terrestrial form has interesting research applications such as Alagappa University Delay Tolerant Water Monitoring Network which doubles as test beds for improvising its routing scheme. DTNs depend on node mobility to deliver packets using a store-carry-and forward paradigm. Throwboxes are small and inexpensive stationary devices equipped with wireless interfaces and storage. We propose the use of Throwboxes to enhance the contact opportunities of the nodes and hence improve the Throughput. The enhancement is evaluated using Alunivdtnsim, a desktop simulator in C language and the results are graphically presented.Keywords: Alunivdtnsim – Alagappa University Delay TolerantNetwork Simulator, AUDTWMN- Alagappa University DelayTolerant Water Monitoring Network, DTN - Delay and DisruptionTolerant Networking, LTP – Lick Lider Transmission Protocol.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1750264 The New Method of Concealed Data Aggregation in Wireless Sensor: A Case Study
Authors: M. Abbasi Dezfouli, S. Mazraeh, M. H. Yektaie
Abstract:
Wireless sensor networks (WSN) consists of many sensor nodes that are placed on unattended environments such as military sites in order to collect important information. Implementing a secure protocol that can prevent forwarding forged data and modifying content of aggregated data and has low delay and overhead of communication, computing and storage is very important. This paper presents a new protocol for concealed data aggregation (CDA). In this protocol, the network is divided to virtual cells, nodes within each cell produce a shared key to send and receive of concealed data with each other. Considering to data aggregation in each cell is locally and implementing a secure authentication mechanism, data aggregation delay is very low and producing false data in the network by malicious nodes is not possible. To evaluate the performance of our proposed protocol, we have presented computational models that show the performance and low overhead in our protocol.
Keywords: Wireless Sensor Networks, Security, Concealed Data Aggregation.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1768263 Performance Evaluation of Wavelet Based Coders on Brain MRI Volumetric Medical Datasets for Storage and Wireless Transmission
Authors: D. Dhouib, A. Naït-Ali, C. Olivier, M. S. Naceur
Abstract:
In this paper, we evaluate the performance of some wavelet based coding algorithms such as 3D QT-L, 3D SPIHT and JPEG2K. In the first step we achieve an objective comparison between three coders, namely 3D SPIHT, 3D QT-L and JPEG2K. For this purpose, eight MRI head scan test sets of 256 x 256x124 voxels have been used. Results show superior performance of 3D SPIHT algorithm, whereas 3D QT-L outperforms JPEG2K. The second step consists of evaluating the robustness of 3D SPIHT and JPEG2K coding algorithm over wireless transmission. Compressed dataset images are then transmitted over AWGN wireless channel or over Rayleigh wireless channel. Results show the superiority of JPEG2K over these two models. In fact, it has been deduced that JPEG2K is more robust regarding coding errors. Thus we may conclude the necessity of using corrector codes in order to protect the transmitted medical information.
Keywords: Image coding, medical imaging, wavelet basedcoder, wireless transmission.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1942262 Risk Level Evaluation for Power System Facilities in Smart Grid
Authors: Sung-Hun Lee, Yun-Seong Lee, Jin-O Kim
Abstract:
Reliability Centered Maintenance(RCM) is one of most widely used methods in the modern power system to schedule a maintenance cycle and determine the priority of inspection. In order to apply the RCM method to the Smart Grid, a precedence study for the new structure of rearranged system should be performed due to introduction of additional installation such as renewable and sustainable energy resources, energy storage devices and advanced metering infrastructure. This paper proposes a new method to evaluate the priority of maintenance and inspection of the power system facilities in the Smart Grid using the Risk Priority Number. In order to calculate that risk index, it is required that the reliability block diagram should be analyzed for the Smart Grid system. Finally, the feasible technical method is discussed to estimate the risk potential as part of the RCM procedure.Keywords: Expert System, FMECA, Fuzzy Theory, Reliability Centered Maintenance, Risk Priority Number
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1783261 Effect of Different Model Drugs on the Properties of Model Membranes from Fishes
Authors: M. Kumpugdee-Vollrath, T. G. D. Phu, M. Helmis
Abstract:
A suitable model membrane to study the pharmacological effect of pharmaceutical products is human stratum corneum because this layer of human skin is the outermost layer and it is an important barrier to be passed through. Other model membranes which were also used are for example skins from pig, mouse, reptile or fish. We are interested in fish skins in this project. The advantages of the fish skins are, that they can be obtained from the supermarket or fish shop. However, the fish skins should be freshly prepared and used directly without storage. In order to understand the effect of different model drugs e.g. lidocaine HCl, resveratrol, paracetamol, ibuprofen, acetyl salicylic acid on the properties of the model membrane from various types of fishes e.g. trout, salmon, cod, plaice permeation tests were performed and differential scanning calorimetry was applied.
Keywords: Fish skin, model membrane, permeation, DSC, lidocaine HCl, resveratrol, paracetamol, ibuprofen, acetyl salicylic acid.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1136260 Signed Approach for Mining Web Content Outliers
Authors: G. Poonkuzhali, K.Thiagarajan, K.Sarukesi, G.V.Uma
Abstract:
The emergence of the Internet has brewed the revolution of information storage and retrieval. As most of the data in the web is unstructured, and contains a mix of text, video, audio etc, there is a need to mine information to cater to the specific needs of the users without loss of important hidden information. Thus developing user friendly and automated tools for providing relevant information quickly becomes a major challenge in web mining research. Most of the existing web mining algorithms have concentrated on finding frequent patterns while neglecting the less frequent ones that are likely to contain outlying data such as noise, irrelevant and redundant data. This paper mainly focuses on Signed approach and full word matching on the organized domain dictionary for mining web content outliers. This Signed approach gives the relevant web documents as well as outlying web documents. As the dictionary is organized based on the number of characters in a word, searching and retrieval of documents takes less time and less space.Keywords: Outliers, Relevant document, , Signed Approach, Web content mining, Web documents..
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2349259 Frozen Fish: Control of Glazing Operation
Authors: Tânia Manso, Luís Teixeira, Paula M. Reis Correia
Abstract:
Glazing is a process used to reduce undesirable drying or dehydration of fish during frozen or cold storage. To evaluate the effect of the time/ temperature binomial of the cryogenic frozen tunnel in the amount of glazing watera Central Composite Rotatable Design was used, with application of the Response Surface Methodology. The results reveal that the time/ temperature obtained for pink cusk-eel in experimental conditions for glazing water are similar to the industrial process, but for red fish and merluza the industrial process needs some adjustments. Control charts were established and implementedto control the amount of glazing water on sardine and merluza. They show that the freezing process was statistically controlled but there were some tendencies that must be analyzed, since the trend of sample mean values approached either of the limits, mainly in merluza. Thus, appropriate actions must be taken, in order to improve the process.
Keywords: Control charts, frozen fish, glazing, RSM.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 4452258 A Pre-Assessment Questionnaire to Identify Healthcare Professionals’ Perception on Information Technology Implementation
Authors: Y. Atilgan Şengül
Abstract:
Health information technologies promise higher quality, safer care and much more for both patients and professionals. Despite their promise, they are costly to develop and difficult to implement. On the other hand, user acceptance and usage determine the success of implemented information technology in healthcare. This study provides a model to understand health professionals’ perception and expectation of health information technology. Extensive literature review has been conducted to determine the main factors to be measured. A questionnaire has been designed as a measurement model and submitted to the personnel of an in vitro fertilization clinic. The respondents’ degree of agreement according to five-point Likert scale was 72% for convenient access to data and 69.4% for the importance of data security. There was a significant difference in acceptance of electronic data storage for female respondents. Also, other significant differences between professions were obtained.
Keywords: Healthcare, health informatics, medical record system, questionnaire.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1400