Search results for: Abnormal IP address
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 691

Search results for: Abnormal IP address

571 Obstacles as Switches between Different Cardiac Arrhythmias

Authors: Daniel Olmos-Liceaga

Abstract:

Ventricular fibrillation is a very important health problem as is the cause of most of the sudden deaths in the world. Waves of electrical activity are sent by the SA node, propagate through the cardiac tissue and activate the mechanisms of cell contraction, and therefore are responsible to pump blood to the body harmonically. A spiral wave is an abnormal auto sustainable wave that is responsible of certain types of arrhythmias. When these waves break up, give rise to the fibrillation regime, in which there is a complete loss in the coordination of the contraction of the heart muscle. Interaction of spiral waves and obstacles is also of great importance as it is believed that the attachment of a spiral wave to an obstacle can provide with a transition of two different arrhythmias. An obstacle can be partially excitable or non excitable. In this talk, we present a numerical study of the interaction of meandering spiral waves with partially and non excitable obstacles and focus on the problem where the obstacle plays a fundamental role in the switch between different spiral regimes, which represent different arrhythmic regimes. Particularly, we study the phenomenon of destabilization of spiral waves due to the presence of obstacles, a phenomenon not completely understood (This work will appear as a Chapter in a Book named Cardiac Arrhytmias by INTECH under the name "Spiral Waves, Obstacles and Cardiac Arrhythmias", ISBN 979-953-307-050-5.).

Keywords: Arrhythmias, Cardiac tissue, Obstacles, Spiral waves

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1629
570 Investigating the Role of Emergency Nurses and Disaster Preparedness during Mass Gathering in Saudi Arabia

Authors: Fuad Alzahrani, Yiannis Kyratsis

Abstract:

Although emergency nurses, being the frontline workers in mass-gatherings, are essential for providing an effective public health response, little is known about the skills that emergency nurses have, or require, in order to respond effectively to a disaster event. This paper is designed to address this gap in the literature by conducting an empirical study on emergency nurses’ preparedness at the mass-gathering event of Hajj in Mecca city. To achieve this aim, this study conducted a cross-sectional survey among 106 emergency department nurses in all the public hospitals in Mecca in 2014. The results revealed that although emergency nurses’ role understanding is high; they have limited knowledge and awareness of how to respond appropriately to mass-gathering disaster events. To address this knowledge gap, the top three most beneficial types of education and training courses suggested are: hospital education sessions, the Emergency Management Saudi Course and workshop; and short courses in disaster management. Finally, recommendations and constructive strategies are developed to provide the best practice in enhancing disaster preparedness. This paper adds to the body of knowledge regarding emergency nurses and mass gathering disasters. This paper measures the level of disaster knowledge, previous disaster response experience and disaster education and training amongst emergency nurses in Mecca, Saudi Arabia. It is anticipated that this study will provide a foundation for future studies aimed at better preparing emergency nurses for disaster response. This paper employs new strategies to improve the emergency nurses’ response during mass gatherings for the Hajj. Increasing the emergency nurses’ knowledge will develop their effective responses in mass-gathering disasters.

Keywords: Emergency nurses, mass-gatherings, disaster preparedness, perceived role.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2396
569 Universal Metadata Definition

Authors: Mohib ur Rehman, Mohammad Haseeb Anwer, Nadeem Iftikhar

Abstract:

The need to have standards has always been a priority of all the disciplines in the world. Today, standards such as XML and USB are trying to create a universal interface for their respective areas. The information regarding every family in the discipline addressed, must have a lot in common, known as Metadata. A lot of work has been done in specific domains such as IEEE LOM and MPEG-7 but they do not appeal to the universality of creating Metadata for all entities, where we take an entity (object) as, not restricted to Software Terms. This paper tries to address this problem of universal Metadata Definition which may lead to increase in precision of search.

Keywords: Metadata, Standard, Universal, XML.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1714
568 Context, Challenges, Constraints and Strategies of Non-Profit Organisations in Responding to the Needs of Asylum Seekers and Refugees in Cape Town, South Africa

Authors: C. O’Brien, Chloe Reiss

Abstract:

While South Africa has been the chosen host country for over 1,2 million asylum seekers/refugees it has at the same time, been struggling to address the needs of its own people who are still trapped in poverty with little prospects of employment. This limited exploratory, qualitative study was undertaken in Cape Town with a purposive sample of 21 key personnel from various NPOs providing a service to asylum seekers/refugees. Individual in-depth face to face interviews were carried out and the main findings were: Some of the officials at the Department of Home Affairs, health personnel, landlords, school principals, employers, bank officials and police officers were prejudicial in their practices towards asylum seekers/ refugees. The major constraints experienced by NPOs in this study were linked to a lack of funding and minimal government support, strained relationship with the Department of Home Affairs and difficulties in accessing refugees. And finally, the strategies adopted by these NPOs included networking with other service providers, engaging in advocacy, raising community awareness and liaising with government. Thus, more focused intervention strategies are needed to build social cohesion, address prejudices which fuels xenophobic attacks and raise awareness/educate various sectors about refugee rights. Given this burgeoning global problem, social work education and training should include curriculum content on migrant issues. Furthermore, larger studies using mixed methodology approaches would yield more nuanced data and provide for more strategic interventions.

Keywords: Refugees and asylum seekers, non-profit organisations, refugee challenges, constraints of service delivery.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1057
567 Semantic Web Technologies in e - Government

Authors: Stamatios A. Theocharis, George A. Tsihrintzis

Abstract:

e-Government is already in its second decade. Prerequisite for further development and adaptation to new realities is the optimal management of administrative information and knowledge production by those involved, i.e. the public sector, citizens and businesses. Nowadays, the amount of information displayed or distributed on the Internet has reached enormous dimensions, resulting in serious difficulties when extracting and managing knowledge. The semantic web is expected to play an important role in solving this problem and the technologies that support it. In this article, we address some relevant issues.

Keywords: e-Government, semantic web, ontologies

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2165
566 Analyzing Current Transformers Saturation Characteristics for Different Connected Burden Using LabVIEW Data Acquisition Tool

Authors: D. Subedi, S. Pradhan

Abstract:

Current transformers are an integral part of power system because it provides a proportional safe amount of current for protection and measurement applications. However, when the power system experiences an abnormal situation leading to huge current flow, then this huge current is proportionally injected to the protection and metering circuit. Since the protection and metering equipment’s are designed to withstand only certain amount of current with respect to time, these high currents pose a risk to man and equipment. Therefore, during such instances, the CT saturation characteristics have a huge influence on the safety of both man and equipment and on the reliability of the protection and metering system. This paper shows the effect of burden on the Accuracy Limiting factor/ Instrument security factor of current transformers and the change in saturation characteristics of the CT’s. The response of the CT to varying levels of overcurrent at different connected burden will be captured using the data acquisition software LabVIEW. Analysis is done on the real time data gathered using LabVIEW. Variation of current transformer saturation characteristics with changes in burden will be discussed.

Keywords: Accuracy limiting factor, burden, current transformer, instrument security factor, saturation characteristics.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3568
565 Study of Sickle Cell Syndromes in the Population of the Region of Batna

Authors: K .Belhadi, H. Bousselsela, M. Yahia, A. Zidani, S. Benbia

Abstract:

Sickle cell anemia is a recessive genetic disease caused by the presence in the red blood cell, of abnormal hemoglobin called hemoglobin S. It results from the replacement in the beta chain of the acid glutamic acid by valin at position 6. Topics may be homozygous (SS) or heterozygous (AS) most often asymptomatic. Other mutations result in compound heterozygous: - Synthesis of hemoglobin C mutation in the sixth leucin codon (heterozygous SC); - ß-thalassemia (heterozygous S-ß thalassemia). SS homozygous, heterozygous SC and S- ß -thalassemia are grouped under the major sickle cell syndromes. To make a laboratory diagnosis of hemoglobinopathies in a portion of the population in region of Batna, our study was conducted on 115 patients with suspected sickle cell anemia, all cases have benefited from hematological tests as blood count (count RBC, calculated erythrocyte indices, MCV and MCHC, measuring the hemoglobin concentration) and a biochemical test in this case electrophoresis CAPILLARYS HEMOGLOBIN (E). The results showed: 27 cases of sickle cell anemia were found on 115 suspected cases, 73,03% homozygous sickle cell disease and 59,25% sickle cell trait. Finally, the double heterozygous S/C, represent the incidence rate of 3, 70%.

Keywords: Hemoglobin, sickle cell syndromes, laboratory diagnosis

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1533
564 Performance of Compound Enhancement Algorithms on Dental Radiograph Images

Authors: S.A.Ahmad, M.N.Taib, N.E.A.Khalid, R.Ahmad, H.Taib

Abstract:

The purpose of this research is to compare the original intra-oral digital dental radiograph images with images that are enhanced using a combination of image processing algorithms. Intraoral digital dental radiograph images are often noisy, blur edges and low in contrast. A combination of sharpening and enhancement method are used to overcome these problems. Three types of proposed compound algorithms used are Sharp Adaptive Histogram Equalization (SAHE), Sharp Median Adaptive Histogram Equalization (SMAHE) and Sharp Contrast adaptive histogram equalization (SCLAHE). This paper presents an initial study of the perception of six dentists on the details of abnormal pathologies and improvement of image quality in ten intra-oral radiographs. The research focus on the detection of only three types of pathology which is periapical radiolucency, widen periodontal ligament space and loss of lamina dura. The overall result shows that SCLAHE-s slightly improve the appearance of dental abnormalities- over the original image and also outperform the other two proposed compound algorithms.

Keywords: intra-oral dental radiograph, histogram equalization, sharpening, CLAHE.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1769
563 Causes and Implications of Obesity in Urban School Going Children

Authors: Mohammad Amjad, Muhammad Iqbal Zafar, Ashfaq Ahmed Maan, Muhammad Tayyab Kashif

Abstract:

Obesity is an abnormal physical condition where an increased and undesirable fat accumulates in the human body. Obesity is an international phenomenon. In the present study, 12 schools were randomly selected from each district considering the areas i.e. Elite Private Schools in the private sector, Government schools in urban areas and Government schools in rural areas. Interviews were conducted with male students studying in grade 5 to grade 9 in each school. The sample size was 600 students; 300 from Faisalabad district and 300 from Rawalpindi district in Pakistan. A well-structured and pre-tested questionnaire was used for data collection. The calibrated scales were used to attain the heights and weights of the respondents. Obesity of school-going children depends on family types, family size, family history, junk food consumption, mother’s education, weekly time spent in walking, and sports facility at school levels. Academic performance, physical health and psychological health of school going children are affected with obesity. Concrete steps and policies could minimize the incidence of obesity in children in Pakistan.

Keywords: BMI, cardiovascular disease, fast food, morbidity and overweight.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 914
562 The Use of Software and Internet Search Engines to Develop the Encoding and Decoding Skills of a Dyslexic Learner: A Case Study

Authors: Rabih Joseph Nabhan

Abstract:

This case study explores the impact of two major computer software programs Learn to Speak English and Learn English Spelling and Pronunciation, and some Internet search engines such as Google on mending the decoding and spelling deficiency of Simon X, a dyslexic student. The improvement in decoding and spelling may result in better reading comprehension and composition writing. Some computer programs and Internet materials can help regain the missing awareness and consequently restore his self-confidence and self-esteem. In addition, this study provides a systematic plan comprising a set of activities (four computer programs and Internet materials) which address the problem from the lowest to the highest levels of phoneme and phonological awareness. Four methods of data collection (accounts, observations, published tests, and interviews) create the triangulation to validly and reliably collect data before the plan, during the plan, and after the plan. The data collected are analyzed quantitatively and qualitatively. Sometimes the analysis is either quantitative or qualitative, and some other times a combination of both. Tables and figures are utilized to provide a clear and uncomplicated illustration of some data. The improvement in the decoding, spelling, reading comprehension, and composition writing skills that occurred is proved through the use of authentic materials performed by the student under study. Such materials are a comparison between two sample passages written by the learner before and after the plan, a genuine computer chat conversation, and the scores of the academic year that followed the execution of the plan. Based on these results, the researcher recommends further studies on other Lebanese dyslexic learners using the computer to mend their language problem in order to design and make a most reliable software program that can address this disability more efficiently and successfully.

Keywords: Analysis, awareness, dyslexic, software.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 628
561 The Contribution of Diet and Lifestyle Factors in the Prevalence of Irritable Bowel Syndrome

Authors: Alexander Dao, Oscar Wambuguh

Abstract:

Irritable Bowel Syndrome (IBS) is a heterogeneous functional bowel disease that is characterized by chronic visceral abdominal pain and abnormal bowel function and habits. Its multifactorial pathophysiology and mechanisms are still largely a mystery to the contemporary biomedical community, although there are many hypotheses to try to explain IBS’s presumed physiological, psychosocial, genetic, and environmental etiologies. IBS’s symptomatic presentation is varied and divided into four major subtypes: IBS-C, IBS-D, IBS-M, and IBS-U. Given its diverse presentation and unclear mechanisms, diagnosis is done through a combination of positive identification utilizing the “Rome IV Irritable Bowel Syndrome Criteria'' (Rome IV) diagnostic criteria while also excluding other potential conditions with similar symptoms. Treatment of IBS is focused on the management of symptoms using an assortment of pharmaceuticals, lifestyle changes, and dietary changes, with future potential in microbial treatment and psychotherapy as other therapy methods. Its chronic, heterogeneous nature and disruptive gastrointestinal (GI) symptoms are negatively impactful on patients’ daily lives, health systems, and society. However, with a better understanding of the gaps in knowledge and technological advances in IBS’s pathophysiology, management, and treatment options, there is optimism for the millions of people worldwide who are suffering from the debilitating effects of IBS.

Keywords: Irritable bowel syndrome, lifestyle, diet, functional gastrointestinal disorder.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 174
560 Detection of Cyberattacks on the Metaverse Based on First-Order Logic

Authors: Sulaiman Al Amro

Abstract:

There are currently considerable challenges concerning data security and privacy, particularly in relation to modern technologies. This includes the virtual world known as the Metaverse, which consists of a virtual space that integrates various technologies, and therefore susceptible to cyber threats such as malware, phishing, and identity theft. This has led recent studies to propose the development of Metaverse forensic frameworks and the integration of advanced technologies, including machine learning for intrusion detection and security. In this context, the application of first-order logic offers a formal and systematic approach to defining the conditions of cyberattacks, thereby contributing to the development of effective detection mechanisms. In addition, formalizing the rules and patterns of cyber threats has the potential to enhance the overall security posture of the Metaverse and thus the integrity and safety of this virtual environment. The current paper focuses on the primary actions employed by avatars for potential attacks, including Interval Temporal Logic (ITL) and behavior-based detection to detect an avatar’s abnormal activities within the Metaverse. The research established that the proposed framework attained an accuracy of 92.307%, resulting in the experimental results demonstrating the efficacy of ITL, including its superior performance in addressing the threats posed by avatars within the Metaverse domain.

Keywords: Cyberattacks, detection, first-order logic, Metaverse, privacy, security.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 11
559 Predicting Application Layer DDoS Attacks Using Machine Learning Algorithms

Authors: S. Umarani, D. Sharmila

Abstract:

A Distributed Denial of Service (DDoS) attack is a major threat to cyber security. It originates from the network layer or the application layer of compromised/attacker systems which are connected to the network. The impact of this attack ranges from the simple inconvenience to use a particular service to causing major failures at the targeted server. When there is heavy traffic flow to a target server, it is necessary to classify the legitimate access and attacks. In this paper, a novel method is proposed to detect DDoS attacks from the traces of traffic flow. An access matrix is created from the traces. As the access matrix is multi dimensional, Principle Component Analysis (PCA) is used to reduce the attributes used for detection. Two classifiers Naive Bayes and K-Nearest neighborhood are used to classify the traffic as normal or abnormal. The performance of the classifier with PCA selected attributes and actual attributes of access matrix is compared by the detection rate and False Positive Rate (FPR).

Keywords: Distributed Denial of Service (DDoS) attack, Application layer DDoS, DDoS Detection, K- Nearest neighborhood classifier, Naive Bayes Classifier, Principle Component Analysis.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 5260
558 In Search of an SVD and QRcp Based Optimization Technique of ANN for Automatic Classification of Abnormal Heart Sounds

Authors: Samit Ari, Goutam Saha

Abstract:

Artificial Neural Network (ANN) has been extensively used for classification of heart sounds for its discriminative training ability and easy implementation. However, it suffers from overparameterization if the number of nodes is not chosen properly. In such cases, when the dataset has redundancy within it, ANN is trained along with this redundant information that results in poor validation. Also a larger network means more computational expense resulting more hardware and time related cost. Therefore, an optimum design of neural network is needed towards real-time detection of pathological patterns, if any from heart sound signal. The aims of this work are to (i) select a set of input features that are effective for identification of heart sound signals and (ii) make certain optimum selection of nodes in the hidden layer for a more effective ANN structure. Here, we present an optimization technique that involves Singular Value Decomposition (SVD) and QR factorization with column pivoting (QRcp) methodology to optimize empirically chosen over-parameterized ANN structure. Input nodes present in ANN structure is optimized by SVD followed by QRcp while only SVD is required to prune undesirable hidden nodes. The result is presented for classifying 12 common pathological cases and normal heart sound.

Keywords: ANN, Classification of heart diseases, murmurs, optimization, Phonocardiogram, QRcp, SVD.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2054
557 Image Clustering Framework for BAVM Segmentation in 3DRA Images: Performance Analysis

Authors: FH. Sarieddeen, R. El Berbari, S. Imad, J. Abdel Baki, M. Hamad, R. Blanc, A. Nakib, Y.Chenoune

Abstract:

Brain ArterioVenous Malformation (BAVM) is an abnormal tangle of brain blood vessels where arteries shunt directly into veins with no intervening capillary bed which causes high pressure and hemorrhage risk. The success of treatment by embolization in interventional neuroradiology is highly dependent on the accuracy of the vessels visualization. In this paper the performance of clustering techniques on vessel segmentation from 3- D rotational angiography (3DRA) images is investigated and a new technique of segmentation is proposed. This method consists in: preprocessing step of image enhancement, then K-Means (KM), Fuzzy C-Means (FCM) and Expectation Maximization (EM) clustering are used to separate vessel pixels from background and artery pixels from vein pixels when possible. A post processing step of removing false-alarm components is applied before constructing a three-dimensional volume of the vessels. The proposed method was tested on six datasets along with a medical assessment of an expert. Obtained results showed encouraging segmentations.

Keywords: Brain arteriovenous malformation (BAVM), 3-D rotational angiography (3DRA), K-Means (KM) clustering, Fuzzy CMeans (FCM) clustering, Expectation Maximization (EM) clustering, volume rendering.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1890
556 Sidecooler Flow Field Investigation

Authors: L. Manoch, J. Matěcha, J. Novotný

Abstract:

One of the aims of the paper is to make a comparison of experimental results with numerical simulation for a side cooler. Specifically, it was the amount of air to be delivered by the side cooler with fans running at 100%. This integral value was measured and evaluated within the plane parallel to the front side of the side cooler at a distance of 20mm from the front side. The flow field extending from the side cooler to the space was also evaluated. Another objective was to address the contribution of evaluated values to the increase of data center energy consumption.

Keywords: CFD, Sidecooler, Stereo PIV.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1736
555 State of Freelancing in IT and Future Trends

Authors: Mihai Gheorghe

Abstract:

Freelancing in IT has seen an increased popularity during the last years mainly because of the fast Internet adoption in the countries with emerging economies, correlated with the continuous seek for reduced development costs as well with the rise of online platforms which address planning, coordination and various development tasks. This paper conducts an overview of the most relevant Freelance Marketplaces available and studies the market structure, distribution of the workforce and trends in IT freelancing.

Keywords: Freelancing in IT, Freelance Marketplaces, Freelance Market Structure, Globalization, Online Staffing, Trends in Freelancing.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3697
554 Analytical and Numerical Approaches in Coagulation of Particles

Authors: Bilal Barakeh

Abstract:

In this paper we discuss the effect of unbounded particle interaction operator on particle growth and we study how this can address the choice of appropriate time steps of the numerical simulation. We provide also rigorous mathematical proofs showing that large particles become dominating with increasing time while small particles contribute negligibly. Second, we discuss the efficiency of the algorithm by performing numerical simulations tests and by comparing the simulated solutions with some known analytic solutions to the Smoluchowski equation.

Keywords: Stochastic processes, coagulation of particles, numerical scheme.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1487
553 The Internet, its Social and Ethical Problem to the Young and How Curriculum Can Address the Issue

Authors: R. Ramli

Abstract:

The impact of the information revolution is double edged. While it is applauded for its versatility and performance robustness and acclaimed for making life smooth and easy, on the other hand people are concerned about its dark side especially to younger generations. The education system should extend its educating role beyond the school to home. Parents should be included in forming the policies of Internet use as well as in the curriculum delivery. This paper discusses how curriculum can be instrumental in addressing social and ethical issues resulted from the Internet.

Keywords: Curriculum, Ethics, Internet Addiction, Social Issues

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 4582
552 Sufficiency Economy: A Contribution to Economic Development

Authors: Prasopchoke Mongsawad

Abstract:

The Philosophy of Sufficiency Economy, bestowed by His Majesty the King Bhumibol Adulyadej to the people of Thailand, highlights a balanced way of living. Three principles of moderation reasonableness, and immunity, along with the conditions for morality and knowledge, can be applied to any level of the society–from an individual to the nation. The Philosophy of Sufficiency Economy helps address the current development challenges, which are issues on institutions, environmental sustainability, human well-being, and the role of the government.

Keywords: Sufficiency Economy, Development Theory, Sustainable Development, Environmental Sustainability, Social Capital, Human Well-Being,

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2572
551 A Novel Security Framework for the Web System

Authors: J. P. Dubois, P. G. Jreije

Abstract:

In this paper, a framework is presented trying to make the most secure web system out of the available generic and web security technology which can be used as a guideline for organizations building their web sites. The framework is designed to provide necessary security services, to address the known security threats, and to provide some cover to other security problems especially unknown threats. The requirements for the design are discussed which guided us to the design of secure web system. The designed security framework is then simulated and various quality of service (QoS) metrics are calculated to measure the performance of this system.

Keywords: Web Security, Internet Voting, Firewall, QoS, Latency, Utilization, Throughput.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1327
550 A Brief Review on Recent Trends in Alternative Sources of Energy

Authors: Divya S., Jibin Joseph

Abstract:

Alternative energy is any energy source that is an alternative to fossil fuel. These alternatives are intended to address concerns about such fossil fuels. Today, because of the variety of energy choices and differing goals of their advocates, defining some energy types as "alternative" is highly controversial. Most of the recent and existing alternative sources of energy are discussed below

Keywords: Athra Quinone Disulphonic Acid (AQDS), Renewable Methanol (RM), Solid Oxide Fuel Cell (SOFC), Maximum Power Point Tracking (MPPT).

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2542
549 Hepatoprotective Effect of Oleuropein against Cisplatin-Induced Liver Damage in Rat

Authors: Salim Cerig, Fatime Geyikoglu, Murat Bakir, Suat Colak, Merve Sonmez, Kubra Koc

Abstract:

Cisplatin (CIS) is one of the most effective an anticancer drug and also toxic to cells by activating oxidative stress. Oleuropein (OLE) has key role against oxidative stress in mammalian cells, but the role of this antioxidant in the toxicity of CIS remains unknown. The aim of the present study was to investigate the efficacy of OLE on CIS-induced liver damages in male rats. With this aim, male Sprague Dawley rats were randomly assigned to one of eight groups: Control group; the group treated with 7 mg/kg/day CIS; the groups treated with 50, 100 and 200 mg/kg/day OLE (i.p.); and the groups treated with OLE for three days starting at 24 h following CIS injection. After 4 days of injections, serum was provided to assess the blood AST, ALT and LDH values. The liver tissues were removed for histological, biochemical (TAC, TOS and MDA) and genotoxic evaluations. In the CIS treated group, the whole liver tissue showed significant histological changes. Also, CIS significantly increased both the incidence of oxidative stress and the induction of 8-hydroxy-deoxyguanosine (8-OH-dG). Moreover, the rats taking CIS have abnormal results on liver function tests. However, these parameters reached to the normal range after administration of OLE for 3 days. Finally, OLE demonstrated an acceptable high potential and was effective in attenuating CIS-induced liver injury. In this trial, the 200 mg/kg dose of OLE firstly appeared to induce the most optimal protective response.

Keywords: Antioxidant response, cisplatin, histology, liver, oleuropein, 8-OhdG.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2236
548 Anomaly Detection in a Data Center with a Reconstruction Method Using a Multi-Autoencoders Model

Authors: Victor Breux, Jérôme Boutet, Alain Goret, Viviane Cattin

Abstract:

Early detection of anomalies in data centers is important to reduce downtimes and the costs of periodic maintenance. However, there is little research on this topic and even fewer on the fusion of sensor data for the detection of abnormal events. The goal of this paper is to propose a method for anomaly detection in data centers by combining sensor data (temperature, humidity, power) and deep learning models. The model described in the paper uses one autoencoder per sensor to reconstruct the inputs. The auto-encoders contain Long-Short Term Memory (LSTM) layers and are trained using the normal samples of the relevant sensors selected by correlation analysis. The difference signal between the input and its reconstruction is then used to classify the samples using feature extraction and a random forest classifier. The data measured by the sensors of a data center between January 2019 and May 2020 are used to train the model, while the data between June 2020 and May 2021 are used to assess it. Performances of the model are assessed a posteriori through F1-score by comparing detected anomalies with the data center’s history. The proposed model outperforms the state-of-the-art reconstruction method, which uses only one autoencoder taking multivariate sequences and detects an anomaly with a threshold on the reconstruction error, with an F1-score of 83.60% compared to 24.16%.

Keywords: Anomaly detection, autoencoder, data centers, deep learning.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 711
547 Graph Cuts Segmentation Approach Using a Patch-Based Similarity Measure Applied for Interactive CT Lung Image Segmentation

Authors: Aicha Majda, Abdelhamid El Hassani

Abstract:

Lung CT image segmentation is a prerequisite in lung CT image analysis. Most of the conventional methods need a post-processing to deal with the abnormal lung CT scans such as lung nodules or other lesions. The simplest similarity measure in the standard Graph Cuts Algorithm consists of directly comparing the pixel values of the two neighboring regions, which is not accurate because this kind of metrics is extremely sensitive to minor transformations such as noise or other artifacts problems. In this work, we propose an improved version of the standard graph cuts algorithm based on the Patch-Based similarity metric. The boundary penalty term in the graph cut algorithm is defined Based on Patch-Based similarity measurement instead of the simple intensity measurement in the standard method. The weights between each pixel and its neighboring pixels are Based on the obtained new term. The graph is then created using theses weights between its nodes. Finally, the segmentation is completed with the minimum cut/Max-Flow algorithm. Experimental results show that the proposed method is very accurate and efficient, and can directly provide explicit lung regions without any post-processing operations compared to the standard method.

Keywords: Graph cuts, lung CT scan, lung parenchyma segmentation, patch based similarity metric.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 725
546 Combination of Information Security Standards to Cover National Requirements

Authors: Sh. Ladan, A. Yari, H. Khodabandeh

Abstract:

The need for Information Security in organizations, regardless of their type and size, is being addressed by emerging standards and recommended best practices. The various standards and practices which evolved in recent years and are still being developed and constantly revised, address the issue of Information Security from different angles. This paper attempts to provide an overview of Information Security Standards and Practices by briefly discussing some of the most popular ones. Through a comparative study of their similarities and differences, some insight can be obtained on how their combination may lead to an increased level of Information Security.

Keywords: Information security management, information security standard, BS7799, ISO 17799, COBIT.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1539
545 In Search of a Suitable Neural Network Capable of Fast Monitoring of Congestion Level in Electric Power Systems

Authors: Pradyumna Kumar Sahoo, Prasanta Kumar Satpathy

Abstract:

This paper aims at finding a suitable neural network for monitoring congestion level in electrical power systems. In this paper, the input data has been framed properly to meet the target objective through supervised learning mechanism by defining normal and abnormal operating conditions for the system under study. The congestion level, expressed as line congestion index (LCI), is evaluated for each operating condition and is presented to the NN along with the bus voltages to represent the input and target data. Once, the training goes successful, the NN learns how to deal with a set of newly presented data through validation and testing mechanism. The crux of the results presented in this paper rests on performance comparison of a multi-layered feed forward neural network with eleven types of back propagation techniques so as to evolve the best training criteria. The proposed methodology has been tested on the standard IEEE-14 bus test system with the support of MATLAB based NN toolbox. The results presented in this paper signify that the Levenberg-Marquardt backpropagation algorithm gives best training performance of all the eleven cases considered in this paper, thus validating the proposed methodology.

Keywords: Line congestion index, critical bus, contingency, neural network.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1774
544 Automatic Detection of Defects in Ornamental Limestone Using Wavelets

Authors: Maria C. Proença, Marco Aniceto, Pedro N. Santos, José C. Freitas

Abstract:

A methodology based on wavelets is proposed for the automatic location and delimitation of defects in limestone plates. Natural defects include dark colored spots, crystal zones trapped in the stone, areas of abnormal contrast colors, cracks or fracture lines, and fossil patterns. Although some of these may or may not be considered as defects according to the intended use of the plate, the goal is to pair each stone with a map of defects that can be overlaid on a computer display. These layers of defects constitute a database that will allow the preliminary selection of matching tiles of a particular variety, with specific dimensions, for a requirement of N square meters, to be done on a desktop computer rather than by a two-hour search in the storage park, with human operators manipulating stone plates as large as 3 m x 2 m, weighing about one ton. Accident risks and work times are reduced, with a consequent increase in productivity. The base for the algorithm is wavelet decomposition executed in two instances of the original image, to detect both hypotheses – dark and clear defects. The existence and/or size of these defects are the gauge to classify the quality grade of the stone products. The tuning of parameters that are possible in the framework of the wavelets corresponds to different levels of accuracy in the drawing of the contours and selection of the defects size, which allows for the use of the map of defects to cut a selected stone into tiles with minimum waste, according the dimension of defects allowed.

Keywords: Automatic detection, wavelets, defects, fracture lines.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1155
543 Comparative Analysis of Mobility Support in Mobile IP and SIP

Authors: Hasanul Ferdaus, Sazzadur Rahman, Kamrul Islam

Abstract:

With the rapid usage of portable devices mobility in IP networks becomes more important issue in the recent years. IETF standardized Mobile IP that works in Network Layer, which involves tunneling of IP packets from HA to Foreign Agent. Mobile IP suffers many problems of Triangular Routing, conflict with private addressing scheme, increase in load in HA, need of permanent home IP address, tunneling itself, and so on. In this paper, we proposed mobility management in Application Layer protocol SIP and show some comparative analysis between Mobile IP and SIP in context of mobility.

Keywords: Mobility, mobile IP, SIP, tunneling.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1886
542 Sound Teaching Practices in Conducting a Physical Education Program for Persons with an Intellectual Disability

Authors: J. Young, A. Brown, L. Konjarski

Abstract:

This paper presents key challenges reported by a group of Australian undergraduate Physical Education students in conducting a program for persons with an intellectual disability. Strategies adopted to address these challenges are presented together with representative feedback given by the Physical Education students at the completion of the program. The significance of the program’s findings is summarized.

Keywords: Adapted teaching, persons with an intellectual disability.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1514