CINXE.COM

Search results for: alarms

<!DOCTYPE html> <html lang="en" dir="ltr"> <head> <!-- Google tag (gtag.js) --> <script async src="https://www.googletagmanager.com/gtag/js?id=G-P63WKM1TM1"></script> <script> window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'G-P63WKM1TM1'); </script> <!-- Yandex.Metrika counter --> <script type="text/javascript" > (function(m,e,t,r,i,k,a){m[i]=m[i]||function(){(m[i].a=m[i].a||[]).push(arguments)}; m[i].l=1*new Date(); for (var j = 0; j < document.scripts.length; j++) {if (document.scripts[j].src === r) { return; }} k=e.createElement(t),a=e.getElementsByTagName(t)[0],k.async=1,k.src=r,a.parentNode.insertBefore(k,a)}) (window, document, "script", "https://mc.yandex.ru/metrika/tag.js", "ym"); ym(55165297, "init", { clickmap:false, trackLinks:true, accurateTrackBounce:true, webvisor:false }); </script> <noscript><div><img src="https://mc.yandex.ru/watch/55165297" style="position:absolute; left:-9999px;" alt="" /></div></noscript> <!-- /Yandex.Metrika counter --> <!-- Matomo --> <!-- End Matomo Code --> <title>Search results for: alarms</title> <meta name="description" content="Search results for: alarms"> <meta name="keywords" content="alarms"> <meta name="viewport" content="width=device-width, initial-scale=1, minimum-scale=1, maximum-scale=1, user-scalable=no"> <meta charset="utf-8"> <link href="https://cdn.waset.org/favicon.ico" type="image/x-icon" rel="shortcut icon"> <link href="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/css/bootstrap.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/plugins/fontawesome/css/all.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/css/site.css?v=150220211555" rel="stylesheet"> </head> <body> <header> <div class="container"> <nav class="navbar navbar-expand-lg navbar-light"> <a class="navbar-brand" href="https://waset.org"> <img src="https://cdn.waset.org/static/images/wasetc.png" alt="Open Science Research Excellence" title="Open Science Research Excellence" /> </a> <button class="d-block d-lg-none navbar-toggler ml-auto" type="button" data-toggle="collapse" data-target="#navbarMenu" aria-controls="navbarMenu" aria-expanded="false" aria-label="Toggle navigation"> <span class="navbar-toggler-icon"></span> </button> <div class="w-100"> <div class="d-none d-lg-flex flex-row-reverse"> <form method="get" action="https://waset.org/search" class="form-inline my-2 my-lg-0"> <input class="form-control mr-sm-2" type="search" placeholder="Search Conferences" value="alarms" name="q" aria-label="Search"> <button class="btn btn-light my-2 my-sm-0" type="submit"><i class="fas fa-search"></i></button> </form> </div> <div class="collapse navbar-collapse mt-1" id="navbarMenu"> <ul class="navbar-nav ml-auto align-items-center" id="mainNavMenu"> <li class="nav-item"> <a class="nav-link" href="https://waset.org/conferences" title="Conferences in 2024/2025/2026">Conferences</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/disciplines" title="Disciplines">Disciplines</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/committees" rel="nofollow">Committees</a> </li> <li class="nav-item dropdown"> <a class="nav-link dropdown-toggle" href="#" id="navbarDropdownPublications" role="button" data-toggle="dropdown" aria-haspopup="true" aria-expanded="false"> Publications </a> <div class="dropdown-menu" aria-labelledby="navbarDropdownPublications"> <a class="dropdown-item" href="https://publications.waset.org/abstracts">Abstracts</a> <a class="dropdown-item" href="https://publications.waset.org">Periodicals</a> <a class="dropdown-item" href="https://publications.waset.org/archive">Archive</a> </div> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/page/support" title="Support">Support</a> </li> </ul> </div> </div> </nav> </div> </header> <main> <div class="container mt-4"> <div class="row"> <div class="col-md-9 mx-auto"> <form method="get" action="https://publications.waset.org/abstracts/search"> <div id="custom-search-input"> <div class="input-group"> <i class="fas fa-search"></i> <input type="text" class="search-query" name="q" placeholder="Author, Title, Abstract, Keywords" value="alarms"> <input type="submit" class="btn_search" value="Search"> </div> </div> </form> </div> </div> <div class="row mt-3"> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Commenced</strong> in January 2007</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Frequency:</strong> Monthly</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Edition:</strong> International</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Paper Count:</strong> 49</div> </div> </div> </div> <h1 class="mt-3 mb-3 text-center" style="font-size:1.6rem;">Search results for: alarms</h1> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">49</span> Optimizing SCADA/RTU Control System Alarms for Gas Wells</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Mohammed%20Ali%20Faqeeh">Mohammed Ali Faqeeh</a> </p> <p class="card-text"><strong>Abstract:</strong></p> SCADA System Alarms Optimization Process has been introduced recently and applied accordingly in different implemented stages. First, MODBUS communication protocols between RTU/SCADA were improved at the level of I/O points scanning intervals. Then, some of the technical issues related to manufacturing limitations were resolved. Afterward, another approach was followed to take a decision on the configured alarms database. So, a couple of meetings and workshops were held among all system stakeholders, which resulted in an agreement of disabling unnecessary (Diagnostic) alarms. Moreover, a leap forward step was taken to segregate the SCADA Operator Graphics in a way to show only process-related alarms while some other graphics will ensure the availability of field alarms related to maintenance and engineering purposes. This overall system management and optimization have resulted in a huge effective impact on all operations, maintenance, and engineering. It has reduced unneeded open tickets for maintenance crews which led to reduce the driven mileages accordingly. Also, this practice has shown a good impression on the operation reactions and response to the emergency situations as the SCADA operators can be staying much vigilant on the real alarms rather than gets distracted by noisy ones. SCADA System Alarms Optimization process has been executed utilizing all applicable in-house resources among engineering, maintenance, and operations crews. The methodology of the entire enhanced scopes is performed through various stages. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=SCADA" title="SCADA">SCADA</a>, <a href="https://publications.waset.org/abstracts/search?q=RTU%20Communication" title=" RTU Communication"> RTU Communication</a>, <a href="https://publications.waset.org/abstracts/search?q=alarm%20management%20system" title=" alarm management system"> alarm management system</a>, <a href="https://publications.waset.org/abstracts/search?q=SCADA%20alarms" title=" SCADA alarms"> SCADA alarms</a>, <a href="https://publications.waset.org/abstracts/search?q=Modbus" title=" Modbus"> Modbus</a>, <a href="https://publications.waset.org/abstracts/search?q=DNP%20protocol" title=" DNP protocol"> DNP protocol</a> </p> <a href="https://publications.waset.org/abstracts/142519/optimizing-scadartu-control-system-alarms-for-gas-wells" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/142519.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">166</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">48</span> Some Codes for Variants in Graphs</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Sofia%20Ait%20Bouazza">Sofia Ait Bouazza</a> </p> <p class="card-text"><strong>Abstract:</strong></p> We consider the problem of finding a minimum identifying code in a graph. This problem was initially introduced in 1998 and has been since fundamentally connected to a wide range of applications (fault diagnosis, location detection …). Suppose we have a building into which we need to place fire alarms. Suppose each alarm is designed so that it can detect any fire that starts either in the room in which it is located or in any room that shares a doorway with the room. We want to detect any fire that may occur or use the alarms which are sounding to not only to not only detect any fire but be able to tell exactly where the fire is located in the building. For reasons of cost, we want to use as few alarms as necessary. The first problem involves finding a minimum domination set of a graph. If the alarms are three state alarms capable of distinguishing between a fire in the same room as the alarm and a fire in an adjacent room, we are trying to find a minimum locating domination set. If the alarms are two state alarms that can only sound if there is a fire somewhere nearby, we are looking for a differentiating domination set of a graph. These three areas are the subject of much active research; we primarily focus on the third problem. An identifying code of a graph G is a dominating set C such that every vertex x of G is distinguished from other vertices by the set of vertices in C that are at distance at most r≥1 from x. When only vertices out of the code are asked to be identified, we get the related concept of a locating dominating set. The problem of finding an identifying code (resp a locating dominating code) of minimum size is a NP-hard problem, even when the input graph belongs to a number of specific graph classes. Therefore, we study this problem in some restricted classes of undirected graphs like split graph, line graph and path in a directed graph. Then we present some results on the identifying code by giving an exact value of upper total locating domination and a total 2-identifying code in directed and undirected graph. Moreover we determine exact values of locating dominating code and edge identifying code of thin headless spider and locating dominating code of complete suns. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=identiying%20codes" title="identiying codes">identiying codes</a>, <a href="https://publications.waset.org/abstracts/search?q=locating%20dominating%20set" title=" locating dominating set"> locating dominating set</a>, <a href="https://publications.waset.org/abstracts/search?q=split%20graphs" title=" split graphs"> split graphs</a>, <a href="https://publications.waset.org/abstracts/search?q=thin%20headless%20spider" title=" thin headless spider"> thin headless spider</a> </p> <a href="https://publications.waset.org/abstracts/26380/some-codes-for-variants-in-graphs" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/26380.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">478</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">47</span> Psychological Alarm among Individuals Suffering from Irritable Bowel Syndrome</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Selim%20A.">Selim A.</a>, <a href="https://publications.waset.org/abstracts/search?q=Albasher%20N."> Albasher N.</a>, <a href="https://publications.waset.org/abstracts/search?q=Bakrmom%20G."> Bakrmom G.</a>, <a href="https://publications.waset.org/abstracts/search?q=Alanzi%20S."> Alanzi S.</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Irritable bowel syndrome (IBS) is a chronic functional bowel disorder characterized by abdominal discomfort or pain and associated with alteration in frequency and/or form of bowel habit among other symptoms. This diagnosis is associated with increased levels of psychological distress, maladaptive coping, genetic risk factors, abnormal small and colonic intestine transit, change in stool frequency or form and abdominal discomfort or pain. Aim: The aim of the study was to assess psychological alarm among individuals suffering from Irritable Bowel Syndrome (IBS). Methods: A cross-sectional correlational research design was used to conduct the current study. A convenience sample of 504 participants was included in the present study. Data were collected using a self-report questionnaire. The questionnaire included socio-demographic data, ROME III to identify Irritable Bowel Syndrome (IBS) and Psychological Alarm Questionnaire. Results: Out of 504 participants who reported abdominal discomfort, 297 (58.9 %) participants met the diagnostic criteria of IBS. The mean age of the IBS participants was 30.16 years, females composed 75.1% of the IBS participants, and 55.2% did not seek medical help. Psychological alarms such as feeling anxious, feeling depressed, having suicidal ideations, bodily pain, having impaired functioning due to pain and feeling unable to cope with pain were significantly high among IBS individuals when compared to individuals not suffering from IBS. Psychological alarms such as feeling anxious, feeling depressed, having suicidal ideations, bodily pain, having impaired functioning due to pain and feeling unable to cope with pain were significantly high among IBS individuals compared to individuals not suffering from IBS. Conclusion: IBS is highly associated with significant psychological alarms including depression, anxiety and suicidal ideas. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=abdominal%20pain" title="abdominal pain ">abdominal pain </a>, <a href="https://publications.waset.org/abstracts/search?q=irritable%20bowel%20syndrome" title=" irritable bowel syndrome"> irritable bowel syndrome</a>, <a href="https://publications.waset.org/abstracts/search?q=distress" title=" distress"> distress</a>, <a href="https://publications.waset.org/abstracts/search?q=psychological%20alarms" title=" psychological alarms"> psychological alarms</a> </p> <a href="https://publications.waset.org/abstracts/91188/psychological-alarm-among-individuals-suffering-from-irritable-bowel-syndrome" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/91188.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">189</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">46</span> Filtering Intrusion Detection Alarms Using Ant Clustering Approach</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ghodhbani%20Salah">Ghodhbani Salah</a>, <a href="https://publications.waset.org/abstracts/search?q=Jemili%20Farah"> Jemili Farah</a> </p> <p class="card-text"><strong>Abstract:</strong></p> With the growth of cyber attacks, information safety has become an important issue all over the world. Many firms rely on security technologies such as intrusion detection systems (IDSs) to manage information technology security risks. IDSs are considered to be the last line of defense to secure a network and play a very important role in detecting large number of attacks. However the main problem with today’s most popular commercial IDSs is generating high volume of alerts and huge number of false positives. This drawback has become the main motivation for many research papers in IDS area. Hence, in this paper we present a data mining technique to assist network administrators to analyze and reduce false positive alarms that are produced by an IDS and increase detection accuracy. Our data mining technique is unsupervised clustering method based on hybrid ANT algorithm. This algorithm discovers clusters of intruders’ behavior without prior knowledge of a possible number of classes, then we apply K-means algorithm to improve the convergence of the ANT clustering. Experimental results on real dataset show that our proposed approach is efficient with high detection rate and low false alarm rate. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=intrusion%20detection%20system" title="intrusion detection system">intrusion detection system</a>, <a href="https://publications.waset.org/abstracts/search?q=alarm%20filtering" title=" alarm filtering"> alarm filtering</a>, <a href="https://publications.waset.org/abstracts/search?q=ANT%20class" title=" ANT class"> ANT class</a>, <a href="https://publications.waset.org/abstracts/search?q=ant%20clustering" title=" ant clustering"> ant clustering</a>, <a href="https://publications.waset.org/abstracts/search?q=intruders%E2%80%99%20behaviors" title=" intruders’ behaviors"> intruders’ behaviors</a>, <a href="https://publications.waset.org/abstracts/search?q=false%20alarms" title=" false alarms"> false alarms</a> </p> <a href="https://publications.waset.org/abstracts/23716/filtering-intrusion-detection-alarms-using-ant-clustering-approach" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/23716.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">403</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">45</span> Maintaining Energy Security in Natural Gas Pipeline Operations by Empowering Process Safety Principles Through Alarm Management Applications</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Huseyin%20Sinan%20Gunesli">Huseyin Sinan Gunesli</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Process Safety Management is a disciplined framework for managing the integrity of systems and processes that handle hazardous substances. It relies on good design principles, well-implemented automation systems, and operating and maintenance practices. Alarm Management Systems play a critically important role in the safe and efficient operation of modern industrial plants. In that respect, Alarm Management is one of the critical factors feeding the safe operations of the plants in the manner of applying effective process safety principles. Trans Anatolian Natural Gas Pipeline (TANAP) is part of the Southern Gas Corridor, which extends from the Caspian Sea to Italy. TANAP transports Natural Gas from the Shah Deniz gas field of Azerbaijan, and possibly from other neighboring countries, to Turkey and through Trans Adriatic Pipeline (TAP) Pipeline to Europe. TANAP plays a crucial role in maintaining Energy Security for the region and Europe. In that respect, the application of Process Safety principles is vital to deliver safe, reliable and efficient Natural Gas delivery to Shippers both in the region and Europe. Effective Alarm Management is one of those Process Safety principles which feeds safe operations of the TANAP pipeline. Alarm Philosophy was designed and implemented in TANAP Pipeline according to the relevant standards. However, it is essential to manage the alarms received in the control room effectively to maintain safe operations. In that respect, TANAP has commenced Alarm Management & Rationalization program as of February 2022 after transferring to Plateau Regime, reaching the design parameters. While Alarm Rationalization started, there were more than circa 2300 alarms received per hour from one of the compressor stations. After applying alarm management principles such as reviewing and removal of bad actors, standing, stale, chattering, fleeting alarms, comprehensive review and revision of alarm set points through a change management principle, conducting alarm audits/design verification and etc., it has been achieved to reduce down to circa 40 alarms per hour. After the successful implementation of alarm management principles as specified above, the number of alarms has been reduced to industry standards. That significantly improved operator vigilance to focus on mainly important and critical alarms to avoid any excursion beyond safe operating limits leading to any potential process safety events. Following the ‟What Gets Measured, Gets Managed” principle, TANAP has identified key Performance Indicators (KPIs) to manage Process Safety principles effectively, where Alarm Management has formed one of the key parameters of those KPIs. However, review and analysis of the alarms were performed manually. Without utilizing Alarm Management Software, achieving full compliance with international standards is almost infeasible. In that respect, TANAP has started using one of the industry-wide known Alarm Management Applications to maintain full review and analysis of alarms and define actions as required. That actually significantly empowered TANAP’s process safety principles in terms of Alarm Management. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=process%20safety%20principles" title="process safety principles">process safety principles</a>, <a href="https://publications.waset.org/abstracts/search?q=energy%20security" title=" energy security"> energy security</a>, <a href="https://publications.waset.org/abstracts/search?q=natural%20gas%20pipeline%20operations" title=" natural gas pipeline operations"> natural gas pipeline operations</a>, <a href="https://publications.waset.org/abstracts/search?q=alarm%20rationalization" title=" alarm rationalization"> alarm rationalization</a>, <a href="https://publications.waset.org/abstracts/search?q=alarm%20management" title=" alarm management"> alarm management</a>, <a href="https://publications.waset.org/abstracts/search?q=alarm%20management%20application" title=" alarm management application"> alarm management application</a> </p> <a href="https://publications.waset.org/abstracts/164904/maintaining-energy-security-in-natural-gas-pipeline-operations-by-empowering-process-safety-principles-through-alarm-management-applications" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/164904.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">103</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">44</span> Distributed Listening in Intensive Care: Nurses’ Collective Alarm Responses Unravelled through Auditory Spatiotemporal Trajectories</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Michael%20Sonne%20Kristensen">Michael Sonne Kristensen</a>, <a href="https://publications.waset.org/abstracts/search?q=Frank%20Loesche"> Frank Loesche</a>, <a href="https://publications.waset.org/abstracts/search?q=James%20Foster"> James Foster</a>, <a href="https://publications.waset.org/abstracts/search?q=Elif%20Ozcan"> Elif Ozcan</a>, <a href="https://publications.waset.org/abstracts/search?q=Judy%20Edworthy"> Judy Edworthy</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Auditory alarms play an integral role in intensive care nurses’ daily work. Most medical devices in the intensive care unit (ICU) are designed to produce alarm sounds in order to make nurses aware of immediate or prospective safety risks. The utilisation of sound as a carrier of crucial patient information is highly dependent on nurses’ presence - both physically and mentally. For ICU nurses, especially the ones who work with stationary alarm devices at the patient bed space, it is a challenge to display ‘appropriate’ alarm responses at all times as they have to navigate with great flexibility in a complex work environment. While being primarily responsible for a small number of allocated patients they are often required to engage with other nurses’ patients, relatives, and colleagues at different locations inside and outside the unit. This work explores the social strategies used by a team of nurses to comprehend and react to the information conveyed by the alarms in the ICU. Two main research questions guide the study: To what extent do alarms from a patient bed space reach the relevant responsible nurse by direct auditory exposure? By which means do responsible nurses get informed about their patients’ alarms when not directly exposed to the alarms? A comprehensive video-ethnographic field study was carried out to capture and evaluate alarm-related events in an ICU. The study involved close collaboration with four nurses who wore eye-level cameras and ear-level binaural audio recorders during several work shifts. At all time the entire unit was monitored by multiple video and audio recorders. From a data set of hundreds of hours of recorded material information about the nurses’ location, social interaction, and alarm exposure at any point in time was coded in a multi-channel replay-interface. The data shows that responsible nurses’ direct exposure and awareness of the alarms of their allocated patients vary significantly depending on work load, social relationships, and the location of the patient’s bed space. Distributed listening is deliberately employed by the nursing team as a social strategy to respond adequately to alarms, but the patterns of information flow prompted by alarm-related events are not uniform. Auditory Spatiotemporal Trajectory (AST) is proposed as a methodological label to designate the integration of temporal, spatial and auditory load information. As a mixed-method metrics it provides tangible evidence of how nurses’ individual alarm-related experiences differ from one another and from stationary points in the ICU. Furthermore, it is used to demonstrate how alarm-related information reaches the individual nurse through principles of social and distributed cognition, and how that information relates to the actual alarm event. Thereby it bridges a long-standing gap in the literature on medical alarm utilisation between, on the one hand, initiatives to measure objective data of the medical sound environment without consideration for any human experience, and, on the other hand, initiatives to study subjective experiences of the medical sound environment without detailed evidence of the objective characteristics of the environment. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=auditory%20spatiotemporal%20trajectory" title="auditory spatiotemporal trajectory">auditory spatiotemporal trajectory</a>, <a href="https://publications.waset.org/abstracts/search?q=medical%20alarms" title=" medical alarms"> medical alarms</a>, <a href="https://publications.waset.org/abstracts/search?q=social%20cognition" title=" social cognition"> social cognition</a>, <a href="https://publications.waset.org/abstracts/search?q=video-ethography" title=" video-ethography"> video-ethography</a> </p> <a href="https://publications.waset.org/abstracts/73648/distributed-listening-in-intensive-care-nurses-collective-alarm-responses-unravelled-through-auditory-spatiotemporal-trajectories" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/73648.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">190</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">43</span> Generation of Automated Alarms for Plantwide Process Monitoring</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Hyun-Woo%20Cho">Hyun-Woo Cho</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Earlier detection of incipient abnormal operations in terms of plant-wide process management is quite necessary in order to improve product quality and process safety. And generating warning signals or alarms for operating personnel plays an important role in process automation and intelligent plant health monitoring. Various methodologies have been developed and utilized in this area such as expert systems, mathematical model-based approaches, multivariate statistical approaches, and so on. This work presents a nonlinear empirical monitoring methodology based on the real-time analysis of massive process data. Unfortunately, the big data includes measurement noises and unwanted variations unrelated to true process behavior. Thus the elimination of such unnecessary patterns of the data is executed in data processing step to enhance detection speed and accuracy. The performance of the methodology was demonstrated using simulated process data. The case study showed that the detection speed and performance was improved significantly irrespective of the size and the location of abnormal events. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=detection" title="detection">detection</a>, <a href="https://publications.waset.org/abstracts/search?q=monitoring" title=" monitoring"> monitoring</a>, <a href="https://publications.waset.org/abstracts/search?q=process%20data" title=" process data"> process data</a>, <a href="https://publications.waset.org/abstracts/search?q=noise" title=" noise"> noise</a> </p> <a href="https://publications.waset.org/abstracts/72518/generation-of-automated-alarms-for-plantwide-process-monitoring" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/72518.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">252</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">42</span> Pupil Size: A Measure of Identification Memory in Target Present Lineups</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Camilla%20Elphick">Camilla Elphick</a>, <a href="https://publications.waset.org/abstracts/search?q=Graham%20Hole"> Graham Hole</a>, <a href="https://publications.waset.org/abstracts/search?q=Samuel%20Hutton"> Samuel Hutton</a>, <a href="https://publications.waset.org/abstracts/search?q=Graham%20Pike"> Graham Pike</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Pupil size has been found to change irrespective of luminosity, suggesting that it can be used to make inferences about cognitive processes, such as cognitive load. To see whether identifying a target requires a different cognitive load to rejecting distractors, the effect of viewing a target (compared with viewing distractors) on pupil size was investigated using a sequential video lineup procedure with two lineup sessions. Forty one participants were chosen randomly via the university. Pupil sizes were recorded when viewing pre target distractors and post target distractors and compared to pupil size when viewing the target. Overall, pupil size was significantly larger when viewing the target compared with viewing distractors. In the first session, pupil size changes were significantly different between participants who identified the target (Hits) and those who did not. Specifically, the pupil size of Hits reduced significantly after viewing the target (by 26%), suggesting that cognitive load reduced following identification. The pupil sizes of Misses (who made no identification) and False Alarms (who misidentified a distractor) did not reduce, suggesting that the cognitive load remained high in participants who failed to make the correct identification. In the second session, pupil sizes were smaller overall, suggesting that cognitive load was smaller in this session, and there was no significant difference between Hits, Misses and False Alarms. Furthermore, while the frequency of Hits increased, so did False Alarms. These two findings suggest that the benefits of including a second session remain uncertain, as the second session neither provided greater accuracy nor a reliable way to measure it. It is concluded that pupil size is a measure of face recognition strength in the first session of a target present lineup procedure. However, it is still not known whether cognitive load is an adequate explanation for this, or whether cognitive engagement might describe the effect more appropriately. If cognitive load and cognitive engagement can be teased apart with further investigation, this would have positive implications for understanding eyewitness identification. Nevertheless, this research has the potential to provide a tool for improving the reliability of lineup procedures. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=cognitive%20load" title="cognitive load">cognitive load</a>, <a href="https://publications.waset.org/abstracts/search?q=eyewitness%20identification" title=" eyewitness identification"> eyewitness identification</a>, <a href="https://publications.waset.org/abstracts/search?q=face%20recognition" title=" face recognition"> face recognition</a>, <a href="https://publications.waset.org/abstracts/search?q=pupillometry" title=" pupillometry"> pupillometry</a> </p> <a href="https://publications.waset.org/abstracts/65435/pupil-size-a-measure-of-identification-memory-in-target-present-lineups" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/65435.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">404</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">41</span> Performance of On-site Earthquake Early Warning Systems for Different Sensor Locations</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ting-Yu%20Hsu">Ting-Yu Hsu</a>, <a href="https://publications.waset.org/abstracts/search?q=Shyu-Yu%20Wu"> Shyu-Yu Wu</a>, <a href="https://publications.waset.org/abstracts/search?q=Shieh-Kung%20Huang"> Shieh-Kung Huang</a>, <a href="https://publications.waset.org/abstracts/search?q=Hung-Wei%20Chiang"> Hung-Wei Chiang</a>, <a href="https://publications.waset.org/abstracts/search?q=Kung-Chun%20Lu"> Kung-Chun Lu</a>, <a href="https://publications.waset.org/abstracts/search?q=Pei-Yang%20Lin"> Pei-Yang Lin</a>, <a href="https://publications.waset.org/abstracts/search?q=Kuo-Liang%20Wen"> Kuo-Liang Wen</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Regional earthquake early warning (EEW) systems are not suitable for Taiwan, as most destructive seismic hazards arise due to in-land earthquakes. These likely cause the lead-time provided by regional EEW systems before a destructive earthquake wave arrives to become null. On the other hand, an on-site EEW system can provide more lead-time at a region closer to an epicenter, since only seismic information of the target site is required. Instead of leveraging the information of several stations, the on-site system extracts some P-wave features from the first few seconds of vertical ground acceleration of a single station and performs a prediction of the oncoming earthquake intensity at the same station according to these features. Since seismometers could be triggered by non-earthquake events such as a passing of a truck or other human activities, to reduce the likelihood of false alarms, a seismometer was installed at three different locations on the same site and the performance of the EEW system for these three sensor locations were discussed. The results show that the location on the ground of the first floor of a school building maybe a good choice, since the false alarms could be reduced and the cost for installation and maintenance is the lowest. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=earthquake%20early%20warning" title="earthquake early warning">earthquake early warning</a>, <a href="https://publications.waset.org/abstracts/search?q=on-site" title=" on-site"> on-site</a>, <a href="https://publications.waset.org/abstracts/search?q=seismometer%20location" title=" seismometer location"> seismometer location</a>, <a href="https://publications.waset.org/abstracts/search?q=support%20vector%20machine" title=" support vector machine"> support vector machine</a> </p> <a href="https://publications.waset.org/abstracts/48504/performance-of-on-site-earthquake-early-warning-systems-for-different-sensor-locations" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/48504.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">243</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">40</span> Epileptic Seizure Prediction by Exploiting Signal Transitions Phenomena</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Mohammad%20Zavid%20Parvez">Mohammad Zavid Parvez</a>, <a href="https://publications.waset.org/abstracts/search?q=Manoranjan%20Paul"> Manoranjan Paul</a> </p> <p class="card-text"><strong>Abstract:</strong></p> A seizure prediction method is proposed by extracting global features using phase correlation between adjacent epochs for detecting relative changes and local features using fluctuation/deviation within an epoch for determining fine changes of different EEG signals. A classifier and a regularization technique are applied for the reduction of false alarms and improvement of the overall prediction accuracy. The experiments show that the proposed method outperforms the state-of-the-art methods and provides high prediction accuracy (i.e., 97.70%) with low false alarm using EEG signals in different brain locations from a benchmark data set. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Epilepsy" title="Epilepsy">Epilepsy</a>, <a href="https://publications.waset.org/abstracts/search?q=seizure" title=" seizure"> seizure</a>, <a href="https://publications.waset.org/abstracts/search?q=phase%20correlation" title=" phase correlation"> phase correlation</a>, <a href="https://publications.waset.org/abstracts/search?q=fluctuation" title=" fluctuation"> fluctuation</a>, <a href="https://publications.waset.org/abstracts/search?q=deviation." title=" deviation. "> deviation. </a> </p> <a href="https://publications.waset.org/abstracts/37585/epileptic-seizure-prediction-by-exploiting-signal-transitions-phenomena" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/37585.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">467</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">39</span> Fast Accurate Detection of Frequency Jumps Using Kalman Filter with Non Linear Improvements</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Mahmoud%20E.%20Mohamed">Mahmoud E. Mohamed</a>, <a href="https://publications.waset.org/abstracts/search?q=Ahmed%20F.%20Shalash"> Ahmed F. Shalash</a>, <a href="https://publications.waset.org/abstracts/search?q=Hanan%20A.%20Kamal"> Hanan A. Kamal</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In communication systems, frequency jump is a serious problem caused by the oscillators used. Kalman filters are used to detect that jump, Despite the tradeoff between the noise level and the speed of the detection. In this paper, An improvement is introduced in the Kalman filter, Through a nonlinear change in the bandwidth of the filter. Simulation results show a considerable improvement in the filter speed with a very low noise level. Additionally, The effect on the response to false alarms is also presented and false alarm rate show improvement. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Kalman%20filter" title="Kalman filter">Kalman filter</a>, <a href="https://publications.waset.org/abstracts/search?q=innovation" title=" innovation"> innovation</a>, <a href="https://publications.waset.org/abstracts/search?q=false%20detection" title=" false detection"> false detection</a>, <a href="https://publications.waset.org/abstracts/search?q=improvement" title=" improvement "> improvement </a> </p> <a href="https://publications.waset.org/abstracts/7978/fast-accurate-detection-of-frequency-jumps-using-kalman-filter-with-non-linear-improvements" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/7978.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">602</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">38</span> Risk Based Maintenance Planning for Loading Equipment in Underground Hard Rock Mine: Case Study</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Sidharth%20Talan">Sidharth Talan</a>, <a href="https://publications.waset.org/abstracts/search?q=Devendra%20Kumar%20Yadav"> Devendra Kumar Yadav</a>, <a href="https://publications.waset.org/abstracts/search?q=Yuvraj%20Singh%20Rajput"> Yuvraj Singh Rajput</a>, <a href="https://publications.waset.org/abstracts/search?q=Subhajit%20Bhattacharjee"> Subhajit Bhattacharjee</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Mining industry is known for its appetite to spend sizeable capital on mine equipment. However, in the current scenario, the mining industry is challenged by daunting factors of non-uniform geological conditions, uneven ore grade, uncontrollable and volatile mineral commodity prices and the ever increasing quest to optimize the capital and operational costs. Thus, the role of equipment reliability and maintenance planning inherits a significant role in augmenting the equipment availability for the operation and in turn boosting the mine productivity. This paper presents the Risk Based Maintenance (RBM) planning conducted on mine loading equipment namely Load Haul Dumpers (LHDs) at Vedanta Resources Ltd subsidiary Hindustan Zinc Limited operated Sindesar Khurd Mines, an underground zinc and lead mine situated in Dariba, Rajasthan, India. The mining equipment at the location is maintained by the Original Equipment Manufacturers (OEMs) namely Sandvik and Atlas Copco, who carry out the maintenance and inspection operations for the equipment. Based on the downtime data extracted for the equipment fleet over the period of 6 months spanning from 1<sup>st</sup> January 2017 until 30<sup>th</sup> June 2017, it was revealed that significant contribution of three downtime issues related to namely Engine, Hydraulics, and Transmission to be common among all the loading equipment fleet and substantiated by Pareto Analysis. Further scrutiny through Bubble Matrix Analysis of the given factors revealed the major influence of selective factors namely Overheating, No Load Taken (NTL) issues, Gear Changing issues and Hose Puncture and leakage issues. Utilizing the equipment wise analysis of all the downtime factors obtained, spares consumed, and the alarm logs extracted from the machines, technical design changes in the equipment and pre shift critical alarms checklist were proposed for the equipment maintenance. The given analysis is beneficial to allow OEMs or mine management to focus on the critical issues hampering the reliability of mine equipment and design necessary maintenance strategies to mitigate them. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=bubble%20matrix%20analysis" title="bubble matrix analysis">bubble matrix analysis</a>, <a href="https://publications.waset.org/abstracts/search?q=LHDs" title=" LHDs"> LHDs</a>, <a href="https://publications.waset.org/abstracts/search?q=OEMs" title=" OEMs"> OEMs</a>, <a href="https://publications.waset.org/abstracts/search?q=Pareto%20chart%20analysis" title=" Pareto chart analysis"> Pareto chart analysis</a>, <a href="https://publications.waset.org/abstracts/search?q=spares%20consumption%20matrix" title=" spares consumption matrix"> spares consumption matrix</a>, <a href="https://publications.waset.org/abstracts/search?q=critical%20alarms%20checklist" title=" critical alarms checklist"> critical alarms checklist</a> </p> <a href="https://publications.waset.org/abstracts/80804/risk-based-maintenance-planning-for-loading-equipment-in-underground-hard-rock-mine-case-study" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/80804.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">153</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">37</span> Intelligent Driver Safety System Using Fatigue Detection</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Samra%20Naz">Samra Naz</a>, <a href="https://publications.waset.org/abstracts/search?q=Aneeqa%20Ahmed"> Aneeqa Ahmed</a>, <a href="https://publications.waset.org/abstracts/search?q=Qurat-ul-ain%20Mubarak"> Qurat-ul-ain Mubarak</a>, <a href="https://publications.waset.org/abstracts/search?q=Irum%20Nausheen"> Irum Nausheen</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Driver safety systems protect driver from accidents by sensing signs of drowsiness. The paper proposes a technique which can detect the signs of drowsiness and make corresponding decisions to make the driver alert. This paper presents a technique in which the driver will be continuously monitored by a camera and his eyes, head and mouth movements will be observed. If the drowsiness signs are detected on the basis of these three movements under the predefined criteria, driver will be declared as sleepy and he will get alert with the help of alarms. Three robust techniques of drowsiness detection are combined together to make a robust system that can prevent form accident. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=drowsiness" title="drowsiness">drowsiness</a>, <a href="https://publications.waset.org/abstracts/search?q=eye%20closure" title=" eye closure"> eye closure</a>, <a href="https://publications.waset.org/abstracts/search?q=fatigue%20detection" title=" fatigue detection"> fatigue detection</a>, <a href="https://publications.waset.org/abstracts/search?q=yawn%20detection" title=" yawn detection"> yawn detection</a> </p> <a href="https://publications.waset.org/abstracts/58479/intelligent-driver-safety-system-using-fatigue-detection" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/58479.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">293</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">36</span> Development of a Force-Sensing Toothbrush for Gum Recession Measurement Using Programmable Automation Controller</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Sorayya%20Kazemi">Sorayya Kazemi</a>, <a href="https://publications.waset.org/abstracts/search?q=Hamed%20Kharrati"> Hamed Kharrati</a>, <a href="https://publications.waset.org/abstracts/search?q=Mehdi%20Abedinpour%20Fallah"> Mehdi Abedinpour Fallah</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper presents the design and implementation of a novel electric pressure-sensitive toothbrush, capable of measuring the forces applied to the head of the brush. The developed device is used for gum recession measurement. In particular, the percentage of gum recession is measured by a Programmable Automation controller (PAC). Moreover, the brushing forces are measured by a Force Sensing Resistor (FSR) sensor. These forces are analog inputs of PAC. According to the applied forces during patient’s brushing and the patient’s percentage of gum recession, dentist sets the standard force range. The instrument alarms when the patient applies a force over the set range. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=gum%20recession" title="gum recession">gum recession</a>, <a href="https://publications.waset.org/abstracts/search?q=force%20sensing%20resistor" title=" force sensing resistor"> force sensing resistor</a>, <a href="https://publications.waset.org/abstracts/search?q=controller" title=" controller"> controller</a>, <a href="https://publications.waset.org/abstracts/search?q=toothbrush" title=" toothbrush"> toothbrush</a> </p> <a href="https://publications.waset.org/abstracts/30211/development-of-a-force-sensing-toothbrush-for-gum-recession-measurement-using-programmable-automation-controller" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/30211.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">497</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">35</span> Robust Diagnosis Efficiency by Bond-Graph Approach</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Benazzouz%20Djamel">Benazzouz Djamel</a>, <a href="https://publications.waset.org/abstracts/search?q=Termeche%20Adel"> Termeche Adel</a>, <a href="https://publications.waset.org/abstracts/search?q=Touati%20Youcef"> Touati Youcef</a>, <a href="https://publications.waset.org/abstracts/search?q=Alem%20Said"> Alem Said</a>, <a href="https://publications.waset.org/abstracts/search?q=Ouziala%20Mahdi"> Ouziala Mahdi</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper presents an approach which detect and isolate efficiently a fault in a system. This approach avoids false alarms, non-detections and delays in detecting faults. A study case have been proposed to show the importance of taking into consideration the uncertainties in the decision-making procedure and their effect on the degradation diagnostic performance and advantage of using Bond Graph (BG) for such degradation. The use of BG in the Linear Fractional Transformation (LFT) form allows generating robust Analytical Redundancy Relations (ARR’s), where the uncertain part of ARR’s is used to generate the residuals adaptive thresholds. The study case concerns an electromechanical system composed of a motor, a reducer and an external load. The aim of this application is to show the effectiveness of the BG-LFT approach to robust fault detection. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=bond%20graph" title="bond graph">bond graph</a>, <a href="https://publications.waset.org/abstracts/search?q=LFT" title=" LFT"> LFT</a>, <a href="https://publications.waset.org/abstracts/search?q=uncertainties" title=" uncertainties"> uncertainties</a>, <a href="https://publications.waset.org/abstracts/search?q=detection%20and%20faults%20isolation" title=" detection and faults isolation"> detection and faults isolation</a>, <a href="https://publications.waset.org/abstracts/search?q=ARR" title=" ARR"> ARR</a> </p> <a href="https://publications.waset.org/abstracts/44029/robust-diagnosis-efficiency-by-bond-graph-approach" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/44029.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">305</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">34</span> The Importance of Fire Safety in Egypt</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Omar%20Shakra">Omar Shakra</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper contains a huge number of benefits that we can use it in several places and times in fire safety protection in the Middle East especially in Egypt . People here in Egypt did not consider the safety and fire protection as important as it is. But on the other hand, its very important for them to contain the fire systems and safety in every facility, the companies , hospitals , police stations , and even the super markets must use the fire system. It makes the facility safe to the visitors while they are using it.From my point of view as the owner Fire Safety Company called Deluge Egypt , i can say that not all of the companies use the fire system protection according to the high cost they prefer to build their company without the protection, and this is make the building totally unsafe to be used from the visitors or client.So, i am looking for new methods and technology to invest in Egypt, and this is through attending this Conference and let the audiences know more about the services i provide and [to let them know about the importance of the Fire Safety in Egypt. The Objectives of my research 1- The system that i used in my Company. 2- The benefits of the Fire System Protection. 3-The importance of the Fire System and safety. 4-The use of the new Technologies. 5-The hardships that i found while having new deals with new clients. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=fire" title="fire">fire</a>, <a href="https://publications.waset.org/abstracts/search?q=system" title=" system"> system</a>, <a href="https://publications.waset.org/abstracts/search?q=protection" title=" protection"> protection</a>, <a href="https://publications.waset.org/abstracts/search?q=fire%20hydrants" title=" fire hydrants"> fire hydrants</a>, <a href="https://publications.waset.org/abstracts/search?q=security" title=" security"> security</a>, <a href="https://publications.waset.org/abstracts/search?q=alarms" title=" alarms"> alarms</a> </p> <a href="https://publications.waset.org/abstracts/171993/the-importance-of-fire-safety-in-egypt" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/171993.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">109</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">33</span> Its about Cortana, Microsoft’s Virtual Assistant</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Aya%20Idriss">Aya Idriss</a>, <a href="https://publications.waset.org/abstracts/search?q=Esraa%20Othman"> Esraa Othman</a>, <a href="https://publications.waset.org/abstracts/search?q=Lujain%20Malak"> Lujain Malak</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Artificial intelligence is the emulation of human intelligence processes by machines, particularly computer systems that act logically. Some of the specific applications of AI include natural language processing, speech recognition, and machine vision. Cortana is a virtual assistant and she’s an example of an AI Application. Microsoft made it possible for this app to be accessed not only on laptops and PCs but can be downloaded on mobile phones and used as a virtual assistant which was a huge success. Cortana can offer a lot apart from the basic orders such as setting alarms and marking the calendar. Its capabilities spread past that, for example, it provides us with listening to music and podcasts on the go, managing my to-do list and emails, connecting with my contacts hands-free by simply just telling the virtual assistant to call somebody, gives me instant answers and so on. A questionnaire was sent online to numerous friends and family members to perform the study, which is critical in evaluating Cortana's recognition capacity and the majority of the answers were in favor of Cortana’s capabilities. The results of the questionnaire assisted us in determining the level of Cortana's skills. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=artificial%20intelligence" title="artificial intelligence">artificial intelligence</a>, <a href="https://publications.waset.org/abstracts/search?q=Cortana" title=" Cortana"> Cortana</a>, <a href="https://publications.waset.org/abstracts/search?q=AI" title=" AI"> AI</a>, <a href="https://publications.waset.org/abstracts/search?q=abstract" title=" abstract"> abstract</a> </p> <a href="https://publications.waset.org/abstracts/145049/its-about-cortana-microsofts-virtual-assistant" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/145049.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">175</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">32</span> The Cardiac Diagnostic Prediction Applied to a Designed Holter</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Leonardo%20Juan%20Ram%C3%ADrez%20L%C3%B3pez">Leonardo Juan Ramírez López</a>, <a href="https://publications.waset.org/abstracts/search?q=Javier%20Oswaldo%20Rodriguez%20Velasquez"> Javier Oswaldo Rodriguez Velasquez</a> </p> <p class="card-text"><strong>Abstract:</strong></p> We have designed a Holter that measures the heart&acute;s activity for over 24 hours, implemented a prediction methodology, and generate alarms as well as indicators to patients and treating physicians. Various diagnostic advances have been developed in clinical cardiology thanks to Holter implementation; however, their interpretation has largely been conditioned to clinical analysis and measurements adjusted to diverse population characteristics, thus turning it into a subjective examination. This, however, requires vast population studies to be validated that, in turn, have not achieved the ultimate goal: mortality prediction. Given this context, our Insight Research Group developed a mathematical methodology that assesses cardiac dynamics through entropy and probability, creating a numerical and geometrical attractor which allows quantifying the normalcy of chronic and acute disease as well as the evolution between such states, and our Tigum Research Group developed a holter device with 12 channels and advanced computer software. This has been shown in different contexts with 100% sensitivity and specificity results. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=attractor" title="attractor ">attractor </a>, <a href="https://publications.waset.org/abstracts/search?q=cardiac" title=" cardiac"> cardiac</a>, <a href="https://publications.waset.org/abstracts/search?q=entropy" title=" entropy"> entropy</a>, <a href="https://publications.waset.org/abstracts/search?q=holter" title=" holter"> holter</a>, <a href="https://publications.waset.org/abstracts/search?q=mathematical" title=" mathematical "> mathematical </a>, <a href="https://publications.waset.org/abstracts/search?q=prediction" title=" prediction"> prediction</a> </p> <a href="https://publications.waset.org/abstracts/115339/the-cardiac-diagnostic-prediction-applied-to-a-designed-holter" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/115339.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">169</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">31</span> Design and Optimization Fire Alarm System to Protect Gas Condensate Reservoirs With the Use of Nano-Technology </h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Hefzollah%20Mohammadian">Hefzollah Mohammadian</a>, <a href="https://publications.waset.org/abstracts/search?q=Ensieh%20Hajeb"> Ensieh Hajeb</a>, <a href="https://publications.waset.org/abstracts/search?q=Mohamad%20Baqer%20Heidari"> Mohamad Baqer Heidari</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In this paper, for the protection and safety of tanks gases (flammable materials) and also due to the considerable economic value of the reservoir, the new system for the protection, the conservation and fire fighting has been cloned. The system consists of several parts: the Sensors to detect heat and fire with Nanotechnology (nano sensor), Barrier for isolation and protection from a range of two electronic zones, analyzer for detection and locating point of fire accurately, Main electronic board to announce fire, Fault diagnosis in different locations, such as relevant alarms and activate different devices for fire distinguish and announcement. An important feature of this system, high speed and capability of fire detection system in a way that is able to detect the value of the ambient temperature that can be adjusted. Another advantage of this system is autonomous and does not require human operator in place. Using nanotechnology, in addition to speeding up the work, reduces the cost of construction of the sensor and also the notification system and fire extinguish. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=analyser" title="analyser">analyser</a>, <a href="https://publications.waset.org/abstracts/search?q=barrier" title=" barrier"> barrier</a>, <a href="https://publications.waset.org/abstracts/search?q=heat%20resistance" title=" heat resistance"> heat resistance</a>, <a href="https://publications.waset.org/abstracts/search?q=general%20fault" title=" general fault"> general fault</a>, <a href="https://publications.waset.org/abstracts/search?q=general%20alarm" title=" general alarm"> general alarm</a>, <a href="https://publications.waset.org/abstracts/search?q=nano%20sensor" title=" nano sensor"> nano sensor</a> </p> <a href="https://publications.waset.org/abstracts/36332/design-and-optimization-fire-alarm-system-to-protect-gas-condensate-reservoirs-with-the-use-of-nano-technology" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/36332.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">456</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">30</span> Predicting Indonesia External Debt Crisis: An Artificial Neural Network Approach</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Riznaldi%20Akbar">Riznaldi Akbar</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In this study, we compared the performance of the Artificial Neural Network (ANN) model with back-propagation algorithm in correctly predicting in-sample and out-of-sample external debt crisis in Indonesia. We found that exchange rate, foreign reserves, and exports are the major determinants to experiencing external debt crisis. The ANN in-sample performance provides relatively superior results. The ANN model is able to classify correctly crisis of 89.12 per cent with reasonably low false alarms of 7.01 per cent. In out-of-sample, the prediction performance fairly deteriorates compared to their in-sample performances. It could be explained as the ANN model tends to over-fit the data in the in-sample, but it could not fit the out-of-sample very well. The 10-fold cross-validation has been used to improve the out-of-sample prediction accuracy. The results also offer policy implications. The out-of-sample performance could be very sensitive to the size of the samples, as it could yield a higher total misclassification error and lower prediction accuracy. The ANN model could be used to identify past crisis episodes with some accuracy, but predicting crisis outside the estimation sample is much more challenging because of the presence of uncertainty. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=debt%20crisis" title="debt crisis">debt crisis</a>, <a href="https://publications.waset.org/abstracts/search?q=external%20debt" title=" external debt"> external debt</a>, <a href="https://publications.waset.org/abstracts/search?q=artificial%20neural%20network" title=" artificial neural network"> artificial neural network</a>, <a href="https://publications.waset.org/abstracts/search?q=ANN" title=" ANN"> ANN</a> </p> <a href="https://publications.waset.org/abstracts/28240/predicting-indonesia-external-debt-crisis-an-artificial-neural-network-approach" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/28240.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">440</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">29</span> A Novel Technological Approach to Maintaining the Cold Chain during Transportation</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Philip%20J.%20Purnell">Philip J. Purnell</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Innovators propose to use the Internet of Things to solve the problem of maintaining the cold chain during the transport of biopharmaceutical products. Sending a data logger with refrigerated goods is only useful to inform the recipient of the goods that they have either breached the cold chain and are therefore potentially spoiled or that they have not breached it and are therefore assumed to be in good condition. Connecting the data logger to the Internet of Things means that the supply chain manager will be informed in real-time of the exact location and the precise temperature of the material at any point on earth. Readable using a simple online interface, the supply chain manager will watch the progress of their material on a Google map together with accurate and crucially real-time temperature readings. The data logger will also send alarms to the supply chain manager if a cold chain breach becomes imminent allowing them time to contact the transporter and restore the cold chain before the material is affected. This development is expected to save billions of dollars in wasted biologics that currently arrive either spoiled or in an unreliable condition. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=internet%20of%20things" title="internet of things">internet of things</a>, <a href="https://publications.waset.org/abstracts/search?q=cold%20chain" title=" cold chain"> cold chain</a>, <a href="https://publications.waset.org/abstracts/search?q=data%20logger" title=" data logger"> data logger</a>, <a href="https://publications.waset.org/abstracts/search?q=transportation" title=" transportation "> transportation </a> </p> <a href="https://publications.waset.org/abstracts/15660/a-novel-technological-approach-to-maintaining-the-cold-chain-during-transportation" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/15660.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">442</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">28</span> A Novel Software Model for Enhancement of System Performance and Security through an Optimal Placement of PMU and FACTS</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=R.%20Kiran">R. Kiran</a>, <a href="https://publications.waset.org/abstracts/search?q=B.%20R.%20Lakshmikantha"> B. R. Lakshmikantha</a>, <a href="https://publications.waset.org/abstracts/search?q=R.%20V.%20Parimala"> R. V. Parimala</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Secure operation of power systems requires monitoring of the system operating conditions. Phasor measurement units (PMU) are the device, which uses synchronized signals from the GPS satellites, and provide the phasors information of voltage and currents at a given substation. The optimal locations for the PMUs must be determined, in order to avoid redundant use of PMUs. The objective of this paper is to make system observable by using minimum number of PMUs & the implementation of stability software at 22OkV grid for on-line estimation of the power system transfer capability based on voltage and thermal limitations and for security monitoring. This software utilizes State Estimator (SE) and synchrophasor PMU data sets for determining the power system operational margin under normal and contingency conditions. This software improves security of transmission system by continuously monitoring operational margin expressed in MW or in bus voltage angles, and alarms the operator if the margin violates a pre-defined threshold. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=state%20estimator%20%28SE%29" title="state estimator (SE)">state estimator (SE)</a>, <a href="https://publications.waset.org/abstracts/search?q=flexible%20ac%20transmission%20systems%20%28FACTS%29" title=" flexible ac transmission systems (FACTS)"> flexible ac transmission systems (FACTS)</a>, <a href="https://publications.waset.org/abstracts/search?q=optimal%20location" title=" optimal location"> optimal location</a>, <a href="https://publications.waset.org/abstracts/search?q=phasor%20measurement%20units%20%28PMU%29" title=" phasor measurement units (PMU)"> phasor measurement units (PMU)</a> </p> <a href="https://publications.waset.org/abstracts/39366/a-novel-software-model-for-enhancement-of-system-performance-and-security-through-an-optimal-placement-of-pmu-and-facts" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/39366.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">409</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">27</span> Machine Learning Invariants to Detect Anomalies in Secure Water Treatment</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Jonathan%20Heng">Jonathan Heng</a>, <a href="https://publications.waset.org/abstracts/search?q=Yoong%20Cheah%20Huei"> Yoong Cheah Huei</a> </p> <p class="card-text"><strong>Abstract:</strong></p> A strategic model that does not trigger any false alarms to detect anomalies in Secure Water Treatment (SWaT) test bed is presented. This model uses machine learning invariants formulated from streamlining the general form of Auto-Regressive models with eXogenous input. A creative generalized CUSUM algorithm to integrate the invariants and the detection strategy technique is successfully developed and tested in the SWaT Programmable Logic Controllers (PLCs). Three steps to fine-tune parameters, b and τ in the generalized algorithm are stated and an example used to demonstrate the tuning process is discussed. This approach can swiftly and effectively detect various scopes of cyber-attacks such as multiple points single stage and multiple points multiple stages in SWaT. This technique can be applied in water treatment plants and other cyber physical systems like power and gas plants too. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=machine%20learning%20invariants" title="machine learning invariants">machine learning invariants</a>, <a href="https://publications.waset.org/abstracts/search?q=generalized%20CUSUM%20algorithm%20with%20invariants%20and%20detection%20strategy" title=" generalized CUSUM algorithm with invariants and detection strategy"> generalized CUSUM algorithm with invariants and detection strategy</a>, <a href="https://publications.waset.org/abstracts/search?q=scope%20of%20cyber%20attacks" title=" scope of cyber attacks"> scope of cyber attacks</a>, <a href="https://publications.waset.org/abstracts/search?q=strategic%20model" title=" strategic model"> strategic model</a>, <a href="https://publications.waset.org/abstracts/search?q=tuning%20parameters" title=" tuning parameters"> tuning parameters</a> </p> <a href="https://publications.waset.org/abstracts/101614/machine-learning-invariants-to-detect-anomalies-in-secure-water-treatment" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/101614.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">181</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">26</span> Test of Moisture Sensor Activation Speed</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=I.%20Parkova">I. Parkova</a>, <a href="https://publications.waset.org/abstracts/search?q=A.%20Vali%C5%A1evskis"> A. Vališevskis</a>, <a href="https://publications.waset.org/abstracts/search?q=A.%20Vi%C4%BCumsone"> A. Viļumsone</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Nocturnal enuresis or bed-wetting is intermittent incontinence during sleep of children after age 5 that may precipitate wide range of behavioural and developmental problems. One of the non-pharmacological treatment methods is the use of a bed-wetting alarm system. In order to improve comfort conditions of nocturnal enuresis alarm system, modular moisture sensor should be replaced by a textile sensor. In this study behaviour and moisture detection speed of woven and sewn sensors were compared by analysing change in electrical resistance after solution (salt water) was dripped on sensor samples. Material of samples has different structure and yarn location, which affects solution detection rate. Sensor system circuit was designed and two sensor tests were performed: system activation test and false alarm test to determine the sensitivity of the system and activation threshold. Sewn sensor had better result in system’s activation test – faster reaction, but woven sensor had better result in system’s false alarm test – it was less sensitive to perspiration simulation. After experiments it was found that the optimum switching threshold is 3V in case of 5V input voltage, which provides protection against false alarms, for example – during intensive sweating. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=conductive%20yarns" title="conductive yarns">conductive yarns</a>, <a href="https://publications.waset.org/abstracts/search?q=moisture%20textile%20sensor" title=" moisture textile sensor"> moisture textile sensor</a>, <a href="https://publications.waset.org/abstracts/search?q=industry" title=" industry"> industry</a>, <a href="https://publications.waset.org/abstracts/search?q=material" title=" material"> material</a> </p> <a href="https://publications.waset.org/abstracts/7649/test-of-moisture-sensor-activation-speed" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/7649.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">246</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">25</span> Epileptic Seizure Onset Detection via Energy and Neural Synchronization Decision Fusion</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Marwa%20Qaraqe">Marwa Qaraqe</a>, <a href="https://publications.waset.org/abstracts/search?q=Muhammad%20Ismail"> Muhammad Ismail</a>, <a href="https://publications.waset.org/abstracts/search?q=Erchin%20Serpedin"> Erchin Serpedin</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper presents a novel architecture for a patient-specific epileptic seizure onset detector using scalp electroencephalography (EEG). The proposed architecture is based on the decision fusion calculated from energy and neural synchronization related features. Specifically, one level of the detector calculates the condition number (CN) of an EEG matrix to evaluate the amount of neural synchronization present within the EEG channels. On a parallel level, the detector evaluates the energy contained in four EEG frequency subbands. The information is then fed into two independent (parallel) classification units based on support vector machines to determine the onset of a seizure event. The decisions from the two classifiers are then combined together according to two fusion techniques to determine a global decision. Experimental results demonstrate that the detector based on the AND fusion technique outperforms existing detectors with a sensitivity of 100%, detection latency of 3 seconds, while it achieves a 2:76 false alarm rate per hour. The OR fusion technique achieves a sensitivity of 100%, and significantly improves delay latency (0:17 seconds), yet it achieves 12 false alarms per hour. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=epilepsy" title="epilepsy">epilepsy</a>, <a href="https://publications.waset.org/abstracts/search?q=EEG" title=" EEG"> EEG</a>, <a href="https://publications.waset.org/abstracts/search?q=seizure%20onset" title=" seizure onset"> seizure onset</a>, <a href="https://publications.waset.org/abstracts/search?q=electroencephalography" title=" electroencephalography"> electroencephalography</a>, <a href="https://publications.waset.org/abstracts/search?q=neuron" title=" neuron"> neuron</a>, <a href="https://publications.waset.org/abstracts/search?q=detection" title=" detection"> detection</a> </p> <a href="https://publications.waset.org/abstracts/24040/epileptic-seizure-onset-detection-via-energy-and-neural-synchronization-decision-fusion" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/24040.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">477</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">24</span> Effect of Composition Fuel on Safety of Combustion Process</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Lourdes%20I.%20Meri%C3%B1o">Lourdes I. Meriño</a>, <a href="https://publications.waset.org/abstracts/search?q=Viatcheslav%20Kafarov"> Viatcheslav Kafarov</a>, <a href="https://publications.waset.org/abstracts/search?q=Maria%20G%C3%B3mez"> Maria Gómez</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Fuel gas used in the burner receives as contributors other gases from different processes and this result in variability in the composition, which may cause an incomplete combustion. The burners are designed to operate in a certain curve, the calorific power dependent on the pressure and gas burners. When deviation of propane and C5+ is huge, there is a large release of energy, which causes it to work out the curves of the burners, because less pressure is required to force curve into operation. That increases the risk of explosion in an oven, besides of a higher environmental impact. There should be flame detection systems, and instrumentation equipment, such as local pressure gauges located at the entrance of the gas burners, to permit verification by the operator. Additionally, distributed control systems must be configured with different combustion instruments associated with respective alarms, as well as its operational windows, and windows control guidelines of integrity, leaving the design information of this equipment. Therefore, it is desirable to analyze when a plant is taken out of service and make good operational analysis to determine the impact of changes in fuel gas streams contributors, by varying the calorific power. Hence, poor combustion is one of the cause instability in the flame of the burner and having a great impact on process safety, the integrity of individuals and teams and environment. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=combustion%20process" title="combustion process">combustion process</a>, <a href="https://publications.waset.org/abstracts/search?q=fuel%20composition" title=" fuel composition"> fuel composition</a>, <a href="https://publications.waset.org/abstracts/search?q=safety" title=" safety"> safety</a>, <a href="https://publications.waset.org/abstracts/search?q=fuel%20gas" title=" fuel gas"> fuel gas</a> </p> <a href="https://publications.waset.org/abstracts/15092/effect-of-composition-fuel-on-safety-of-combustion-process" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/15092.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">489</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">23</span> An Innovative Equipment for ICU Infection Control </h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ankit%20Agarwal">Ankit Agarwal</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Background: To develop a fully indigenous equipment which is an innovation in critical care, which can effectively scavenge contaminated ICU ventilator air. Objectives: Infection control in ICUs is a concern the world over. Various modalities from simple hand hygiene to costly antibiotics exist. However, one simple and scientific fact has been unnoticed till date, that the air exhaled by patients harboring MDR and other microorganisms, is released by ventilators into ICU atmosphere itself. This increases infection in ICU atmosphere and poses risk to other patients. Material and Methods: Some parts of the ventilator are neither disposable nor sterilizable. Over time, microorganisms accumulate in ventilator and act as a source of infection and also contaminate ICU air. This was demonstrated by exposing microbiological culture plates to air from expiratory port of ventilator, whereby dense growth of pathogenic microorganisms was observed. The present prototype of the equipment is totally self-made. It has a mechanism of controlled negative pressure, active and passive systems and various alarms and is versatile to be used with any ventilator. Results: This equipment captures the whole of contaminated exhaled air from the expiratory port of the ventilator and directs it out of the ICU space. Thus, it does not allow contaminated ventilator air to release into the ICU atmosphere. Therefore, there is no chance of exposure of other patients to contaminated air. Conclusion: The equipment is first of its kind the world over and is already under patent process. It has rightly been called ICU Ventilator Air Removal System (ICU VARS). It holds a chance that this technique will gain widespread acceptance shall find use in all the ventilators in most of the ICUs throughout the world. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=innovative" title="innovative">innovative</a>, <a href="https://publications.waset.org/abstracts/search?q=ICU%20Infection%20Control" title=" ICU Infection Control"> ICU Infection Control</a>, <a href="https://publications.waset.org/abstracts/search?q=microorganism" title=" microorganism"> microorganism</a>, <a href="https://publications.waset.org/abstracts/search?q=negative%20pressure" title=" negative pressure"> negative pressure</a> </p> <a href="https://publications.waset.org/abstracts/15734/an-innovative-equipment-for-icu-infection-control" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/15734.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">352</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">22</span> An Operators’ Real-sense-based Fire Simulation for Human Factors Validation in Nuclear Power Plants</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Sa-Kil%20Kim">Sa-Kil Kim</a>, <a href="https://publications.waset.org/abstracts/search?q=Jang-Soo%20Lee"> Jang-Soo Lee</a> </p> <p class="card-text"><strong>Abstract:</strong></p> On March 31, 1993, a severe fire accident took place in a nuclear power plant located in Narora in North India. The event involved a major fire in the turbine building of NAPS unit-1 and resulted in a total loss of power to the unit for 17 hours. In addition, there was a heavy ingress of smoke in the control room, mainly through the intake of the ventilation system, forcing the operators to vacate the control room. The Narora fire accident provides us lessons indicating that operators could lose their mind and predictable behaviors during a fire. After the Fukushima accident, which resulted from a natural disaster, unanticipated external events are also required to be prepared and controlled for the ultimate safety of nuclear power plants. From last year, our research team has developed a test and evaluation facility that can simulate external events such as an earthquake and fire based on the operators’ real-sense. As one of the results of the project, we proposed a unit real-sense-based facility that can simulate fire events in a control room for utilizing a test-bed of human factor validation. The test-bed has the operator’s workstation shape and functions to simulate fire conditions such as smoke, heat, and auditory alarms in accordance with the prepared fire scenarios. Furthermore, the test-bed can be used for the operators’ training and experience. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=human%20behavior%20in%20fire" title="human behavior in fire">human behavior in fire</a>, <a href="https://publications.waset.org/abstracts/search?q=human%20factors%20validation" title=" human factors validation"> human factors validation</a>, <a href="https://publications.waset.org/abstracts/search?q=nuclear%20power%20plants" title=" nuclear power plants"> nuclear power plants</a>, <a href="https://publications.waset.org/abstracts/search?q=real-sense-based%20fire%20simulation" title=" real-sense-based fire simulation"> real-sense-based fire simulation</a> </p> <a href="https://publications.waset.org/abstracts/50329/an-operators-real-sense-based-fire-simulation-for-human-factors-validation-in-nuclear-power-plants" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/50329.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">283</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">21</span> Beyond the Jingoism of “Infodemic” in the Use of Language: Prospects for a Better Nigeria</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Anacletus%20Ogbunkwu">Anacletus Ogbunkwu</a> </p> <p class="card-text"><strong>Abstract:</strong></p> It is very disheartening that fake news or inaccurate information spread like wide fire and even with greater speed than fact based news/information. The peak of this anomaly is manifest in information management on the Corona virus pandemic, political/leadership based information, ethnic bigotry, unwarranted panics, false alarms, religious fanaticism, and business moguls in their advertorials, comedies, etc. This ugly situation has left Nigeria and her citizens with emotional trauma, unguided agitations, incessant tribal wars, lost of life and property, widened disunity among Nigerian ethnic and religious groups, amplified insecurity, aided election violence, etc. Unfortunately, among the major driving factors to this misinformation and conspiracy are the official/government and private news agencies, gossip, comedians, and social media handles such as; facebook, twitter, whatsapp, instagram, and online news agencies, etc. Thus this paper examines the impact of misinformation here referred to as infodemic. Also, it studies the epistemic effect of misinformation on the citizens of Nigeria in order to find ways of abating this anomaly for a better society. The methods of exposition and hermeneutics will be used in order to gain in-depth study of the details of infodemic in Nigeria and to offer philosophical analysis/interpretation of data as gathered, respectively. This paper concludes that misinformation or fake news has a perilous effect of epistemic mistrust to Nigeria and her citizens; hence infodemic is a cog in the wheel of National progress. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=nigeria" title="nigeria">nigeria</a>, <a href="https://publications.waset.org/abstracts/search?q=infodemic" title=" infodemic"> infodemic</a>, <a href="https://publications.waset.org/abstracts/search?q=language" title=" language"> language</a>, <a href="https://publications.waset.org/abstracts/search?q=media" title=" media"> media</a>, <a href="https://publications.waset.org/abstracts/search?q=news" title=" news"> news</a>, <a href="https://publications.waset.org/abstracts/search?q=progress" title=" progress"> progress</a> </p> <a href="https://publications.waset.org/abstracts/155354/beyond-the-jingoism-of-infodemic-in-the-use-of-language-prospects-for-a-better-nigeria" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/155354.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">118</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">20</span> High Prevalence of Multi-drug Resistant Diarrheagenic Escherichia coli among Hospitalised Diarrheal Patients in Kolkata, India</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Debjani%20Ghosh">Debjani Ghosh</a>, <a href="https://publications.waset.org/abstracts/search?q=Goutam%20Chowdhury"> Goutam Chowdhury</a>, <a href="https://publications.waset.org/abstracts/search?q=Prosenjit%20Samanta"> Prosenjit Samanta</a>, <a href="https://publications.waset.org/abstracts/search?q=Asish%20Kumar%20Mukhopadhyay"> Asish Kumar Mukhopadhyay</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Acute diarrhoea caused by diarrheagenic Escherichia coli (DEC) is one of the major public health problem in developing countries, mainly in Asia and Africa. DEC consists of six pathogroups, but the majority of the cases were associated with the three pathogropus, enterotoxigenic E. coli (ETEC), enteroaggregative E. coli (EAEC), and enteropathogenic E. coli (EPEC). Hence, we studied the prevalence and antimicrobial resistance of these three major DEC pathogroups in hospitalized diarrheal patients in Kolkata, India, during 2012-2019 with a large sample size. 8,891 stool samples were processed, and 7.8% of them was identified as DEC infection screened by multiplex PCR, in which ETEC was most common (47.7%) followed by EAEC (38.4%) and EPEC (13.9%). Clinical patient history suggested that children <5 years of age were mostly affected with ETEC and EAEC, whereas people within >5-14 years of age were significantly associated with EPEC and ETEC infections. Antibiogram profile showed a high prevalence of multidrug resistant (MDR) isolates among DEC (56.9%), in which 9% were resistant to antibiotics of six different antimicrobial classes. Screening of the antibiotic resistance conferring genes in DEC showed the presence of blaCTX-M (30.2%) in highest number followed by blaTEM (27.5%), tetB (18%), sul2 (12.6%), strA (11.8%), aadA1 (9.8%), blaOXA-1 (9%), dfrA1 (1.6%) and blaSHV (1.2%) which indicates the existence of mobile genetic elements in those isolates. Therefore, the presence of MDR DEC strains in higher number alarms the public health authorities to take preventive measures before the upsurge of the DEC caused diarrhea cases in near future. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=diarrheagenic%20escherichia%20coli" title="diarrheagenic escherichia coli">diarrheagenic escherichia coli</a>, <a href="https://publications.waset.org/abstracts/search?q=ETEC" title=" ETEC"> ETEC</a>, <a href="https://publications.waset.org/abstracts/search?q=EAEC" title=" EAEC"> EAEC</a>, <a href="https://publications.waset.org/abstracts/search?q=EPEC" title=" EPEC"> EPEC</a> </p> <a href="https://publications.waset.org/abstracts/143560/high-prevalence-of-multi-drug-resistant-diarrheagenic-escherichia-coli-among-hospitalised-diarrheal-patients-in-kolkata-india" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/143560.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">161</span> </span> </div> </div> <ul class="pagination"> <li class="page-item disabled"><span class="page-link">&lsaquo;</span></li> <li class="page-item active"><span class="page-link">1</span></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=alarms&amp;page=2">2</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=alarms&amp;page=2" rel="next">&rsaquo;</a></li> </ul> </div> </main> <footer> <div id="infolinks" class="pt-3 pb-2"> <div class="container"> <div style="background-color:#f5f5f5;" class="p-3"> <div class="row"> <div class="col-md-2"> <ul class="list-unstyled"> About <li><a href="https://waset.org/page/support">About Us</a></li> <li><a href="https://waset.org/page/support#legal-information">Legal</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/WASET-16th-foundational-anniversary.pdf">WASET celebrates its 16th foundational anniversary</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Account <li><a href="https://waset.org/profile">My Account</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Explore <li><a href="https://waset.org/disciplines">Disciplines</a></li> <li><a href="https://waset.org/conferences">Conferences</a></li> <li><a href="https://waset.org/conference-programs">Conference Program</a></li> <li><a href="https://waset.org/committees">Committees</a></li> <li><a href="https://publications.waset.org">Publications</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Research <li><a href="https://publications.waset.org/abstracts">Abstracts</a></li> <li><a href="https://publications.waset.org">Periodicals</a></li> <li><a href="https://publications.waset.org/archive">Archive</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Open Science <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Philosophy.pdf">Open Science Philosophy</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Award.pdf">Open Science Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Society-Open-Science-and-Open-Innovation.pdf">Open Innovation</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Postdoctoral-Fellowship-Award.pdf">Postdoctoral Fellowship Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Scholarly-Research-Review.pdf">Scholarly Research Review</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Support <li><a href="https://waset.org/page/support">Support</a></li> <li><a href="https://waset.org/profile/messages/create">Contact Us</a></li> <li><a href="https://waset.org/profile/messages/create">Report Abuse</a></li> </ul> </div> </div> </div> </div> </div> <div class="container text-center"> <hr style="margin-top:0;margin-bottom:.3rem;"> <a href="https://creativecommons.org/licenses/by/4.0/" target="_blank" class="text-muted small">Creative Commons Attribution 4.0 International License</a> <div id="copy" class="mt-2">&copy; 2024 World Academy of Science, Engineering and Technology</div> </div> </footer> <a href="javascript:" id="return-to-top"><i class="fas fa-arrow-up"></i></a> <div class="modal" id="modal-template"> <div class="modal-dialog"> <div class="modal-content"> <div class="row m-0 mt-1"> <div class="col-md-12"> <button type="button" class="close" data-dismiss="modal" aria-label="Close"><span aria-hidden="true">&times;</span></button> </div> </div> <div class="modal-body"></div> </div> </div> </div> <script src="https://cdn.waset.org/static/plugins/jquery-3.3.1.min.js"></script> <script src="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/js/bootstrap.bundle.min.js"></script> <script src="https://cdn.waset.org/static/js/site.js?v=150220211556"></script> <script> jQuery(document).ready(function() { /*jQuery.get("https://publications.waset.org/xhr/user-menu", function (response) { jQuery('#mainNavMenu').append(response); });*/ jQuery.get({ url: "https://publications.waset.org/xhr/user-menu", cache: false }).then(function(response){ jQuery('#mainNavMenu').append(response); }); }); </script> </body> </html>

Pages: 1 2 3 4 5 6 7 8 9 10