173 research outputs found
Fuel Consumption Investigation for Quran Disposal Incinerator System
In this study, the fuel consumption characteristic of a Quran incineration system was conducted. The experiment examines the relation between fuel usage and Quran loads as well as how the usage of blower affects the fuel utilization. The result proved that the blower unit shortens the combustion time and uses less fuel. Nevertheless, the electrical source to power the blower will increase the operating costs, especially during full loading operation. Therefore, this study will provide insight in determining the balance between the combustion duration over the operational costing of such a system
Detecting Distributed Denial-of-Service (DDoS) Attacks Through the Log Consolidation Processing (LCP) Framework
One major problem commonly faced by organizations is a network attack especially if the network is vulnerable due to poor security policies. Network security is vital in protecting not only the infrastructure but most importantly, the data that moves around the network and is stored within the organization. Ensuring a secure network requires a complex combination of hardware including both network and security devices, specialized applications such as web filtering and log management, and a group of well-trained network administrators and highly skilled analysts. This paper aims to present an alternative to the current log management solution. A hindrance to the current log management solution is the difficulty in amalgamating and correlating a vast number of logs with different formats and variables. This paper uses a novel framework called Log Consolidation Processing (LCP) based on the System Information Event Management (SIEM) technology, to monitor the behavior and the fitness of a network. LCP provides a flexible and complete solution to collect, correlate, and analyze logs from multiple devices as well as applications. An experiment testing the effectiveness of LCP in detecting DDoS attacks in a campus network environment was conducted, demonstrating a highly successful rate of detection. Besides threat detection and avoidance through log monitoring and analysis, other benefits of implementing the LCP framework are also included. This paper concludes by mentioning suggested enhancements for the LCP framework
A PID-controlled approach in the design of a physiotherapy robot for upper arm rehabilitation
The main objective to develop controller for the rebab robot, therefore to achieve the main objective, the subsequent objective is to formulate the mathematical modelling of 2 DOF of upper arm, to develop upper arm rebab robot, evaluate the performance of the controller and facilitate the creation of new and more improved devices for physiotherapy robot ; therefore, this research will investigate rehabilitation robots, it have shown a high potential for improving the patient’s mobility, improving their functional movements and assisting in daily activities. However, this technology is still an emerging field and suffers from several challenges like compliance control and dynamic uncertain caused by the human–robot collaboration. The main challenge addressed in this thesis is to develop a controller to the rehab robot and formulate the mathematical modelling of 2 DOF of upper arm. Ensure that the exoskeleton robot provides a suitable compliance control that allows it to cooperate perfectly with humans even if the dynamic model of the exoskeleton robot is uncertain. The PID controller is a widely used control algorithm that aims to regulate a system's output by continuously adjusting its input. In the context of a two-degree-of-freedom (2-DOF) robot arm, the PID controller plays a crucial role in achieving precise and accurate arm movements. The Proportional-Integral-Derivative (PID) controller employs three main components to achieve control: proportional, integral, and derivative terms
Concurrent hyphema and orbital apex syndrome following herpeszoster ophthalmicus in a middle aged lady
INTRODUCTION: Hyphema and orbital apex syndrome occurring concurrently in a patient with herpes zoster ophthalmicus have not been reported previously. We present a case with these unique findings and discuss the pathogenesis of these conditions and their management.
PRESENTATION OF CASE: A 59-year-old Malay lady with underlying diabetes mellitus presented with manifestations of zoster ophthalmicus in the left eye. Two weeks later, she developed total hyphema,and complete ophthalmoplegia suggestive of orbital apex syndrome. She was treated with combinationof intravenous acyclovir and oral corticosteroids, and regained full recovery of ocular motility. Totalhyphema persisted, and she required surgical intervention.
DISCUSSION: Hyphema is postulated to occur due to an immune vasculitis affecting the iris vessels. Orbitalapex syndrome is probably due to an occlusive vasculitis affecting the vasculature of the extraocular muscles and optic nerve, resulting from a direct invasion by varicella zoster virus or infiltration of perivascularinflammatory cells. Magnetic Resonance Imaging of the brain is essential to exclude possibility of localcauses at the orbital apex area.
CONCLUSION: Herpes zoster ophthalmicus is an uncommon ocular presentation. Managing two concur-rent complications; persistent total hyphema and orbital apex syndrome is a challenging clinical situation.Early diagnosis and prompt treatment are essential to prevent potential blinding situation
Concurrent hyphema and orbital apex syndrome following herpeszoster ophthalmicus in a middle aged lady
INTRODUCTION: Hyphema and orbital apex syndrome occurring concurrently in a patient with herpeszoster ophthalmicus have not been reported previously. We present a case with these unique findingsand discuss the pathogenesis of these conditions and their management.PRESENTATION OF CASE: A 59-year-old Malay lady with underlying diabetes mellitus presented withmanifestations of zoster ophthalmicus in the left eye. Two weeks later, she developed total hyphema,and complete ophthalmoplegia suggestive of orbital apex syndrome. She was treated with combinationof intravenous acyclovir and oral corticosteroids, and regained full recovery of ocular motility. Totalhyphema persisted, and she required surgical intervention.DISCUSSION: Hyphema is postulated to occur due to an immune vasculitis affecting the iris vessels. Orbitalapex syndrome is probably due to an occlusive vasculitis affecting the vasculature of the extraocular mus-cles and optic nerve, resulting from a direct invasion by varicella zoster virus or infiltration of perivascularinflammatory cells. Magnetic Resonance Imaging of the brain is essential to exclude possibility of localcauses at the orbital apex area.CONCLUSION: Herpes zoster ophthalmicus is an uncommon ocular presentation. Managing two concur-rent complications; persistent total hyphema and orbital apex syndrome is a challenging clinical situation.Early diagnosis and prompt treatment are essential to prevent potential blinding situation
Blue Ocean Leadership (BOL) practices towards promoting employee engagement in public service
Malaysia has bold intention to be an advanced nation in 2020. Here, public service holds the key as they are the primary facilitator in achieving this noble dream. It required fully engaged public service workforce as achieving Vision 2020 is an ardours task. Getting employees’ engagement is within reach with the introduction of Blue Ocean Leadership that provides a totally new approach as employees views are taken into consideration in developing new leadership profile. What makes it more interesting, it can be implemented at any time, low cost and able to provide high impact result. The issue of employee engagement needs special attention as the current situation portrays a shocking truth where only 13% of employees worldwide are engaged. In Malaysia, the rate is even worse as there are only 11% employees engaged in their jobs. Hence, employee engagement is critical issue that need to be addressed urgently in public service. As such, Blue Ocean Leadership is offering new framework and tools for leaders in public service with the aim of increasing level of employee engagement. Finally, this new leadership profile is shown on leadership canvas and shared among employees that aim to motivate them to strive for organizational excellence
A hybrid automata framework for an adaptive impedance control of a robot-assisted training system
There is an increasing demand for an effective and adaptive robot-assisted training
system for traumatic brain injury patients which can considerably promote their
sensorimotor control performance, apart from ensuring the safety of the patients.
This study focuses on the impedance control framework to simultaneously track the
position trajectory while regulating the apparent impedance of the robot. The
framework is based on the hybrid automata model that is used to govern the desired
trajectory deployed by the robot-assisted training in assisting rehabilitative motion.
A designed experimental setup was developed to evaluate the performance of the
proposed hybrid automata scheme. Preliminary simulation results demonstrated the
excellent response of the proposed framework with its ability to track the desired
trajectory as well as the varying patients' arm impedance profile
Right sided infective endocarditis masquerading as pulmonary tuberculosis: a case report
Right-sided infective endocarditis is not as common as left-sided infective endocarditis. The clinical signs and symptoms of right-sided infective endocarditis are subtle, making clinical detection more complex and easily leads to this diagnosis. We present a case of mild haemoptysis as a presentation of right-sided infective endocarditis but was initially misdiagnosed as pulmonary tuberculosis, which led to a delay in treatment. The patient had multiple visits to the health facilities (private clinic, government’s health clinic and hospital) and one admission to the hospital for recurrent cough, fever, and haemoptysis without any improvement. Later, he was diagnosed with right-sided infective endocarditis and was well after treatment. Delays in treatment can lead to an increased risk of permanent morbidity to the patient. This case report highlights the importance of a high index of suspicion and exploring other differential diagnoses of haemoptysis apart from pulmonary tuberculosis
SIEM Network Behaviour Monitoring Framework using Deep Learning Approach for Campus Network Infrastructure
One major problem faced by network users is an attack on the security of the network especially if the network is vulnerable due to poor security policies. Network security is largely an exercise to protect not only the network itself but most importantly, the data. This exercise involves hardware and software technology. Secure and effective access management falls under the purview of network security. It focuses on threats both internally and externally, intending to protect and stop the threats from entering or spreading into the network. A specialized collection of physical devices, such as routers, firewalls, and anti-malware tools, is required to address and ensure a secure network. Almost all agencies and businesses employ highly qualified information security analysts to execute security policies and validate the policies’ effectiveness on regular basis. This research paper presents a significant and flexible way of providing centralized log analysis between network devices. Moreover, this paper proposes a novel method for compiling and displaying all potential threats and alert information in a single dashboard using a deep learning approach for campus network infrastructure
Chili plant classification using transfer learning models through object detection
This study presents an application of using a Convolutional Neural Network (CNN) based detector to detect chili and its leaves in the chili plant image. Detecting chili on its plant is essential for the development of robotic vision and monitoring. Thus, helps us supervise the plant growth, furthermore, analyses their productivity and quality. This paper aims to develop a system that can monitor and identify bird’s eye chili plants by implementing machine learning. First, the development of methodology for efficient detection of bird’s eye chili and its leaf was made. A dataset of a total of 1866 images after augmentation of bird’s eye chili and its leaf was used in this experiment. YOLO Darknet was implemented to train the dataset. After a series of experiments were conducted, the model is compared with other transfer learning models like YOLO Tiny, Faster R-CNN, and EfficientDet. The classification performance of these transfer learning models has been calculated and compared with each other. The experimental result shows that the Yolov4 Darknet model achieves mAP of 75.69%, followed by EfficientDet at 71.85% for augmented dataset
- …
