12 research outputs found

    Integration of Fuzzy with Incremental Import Vector Machine for Intrusion Detection

    Get PDF
    IDM design and implementation remain a difficult undertaking and an unsolved research topic. Multi-dimensional irrelevant characteristics and duplicate information are included in the network dataset. To boost the effectiveness of IDM, a novel hybrid model is developed that combines Fuzzy Genetic Algorithms with Increment Import Vector Machines (FGA-I2VM), which works with huge amounts of both normal and aberrant network data with high detecting accuracy and low false alarm rates. The algorithms chosen for IDM in this stage are machine learning algorithms, which learn, find, and adapt patterns to changing situations over time. Pre-processing is the most essential stage in any IDM, and feature selection is utilized for pre-processing, which is the act of picking a collection or subset of relevant features for the purpose of creating a solution model. Information Gain (IG) is utilized in this FGA-I2VM model to pick features from the dataset for I2VM classification. To train the I2VM classifier, FGA uses three sets of operations to produce a new set of inhabitants with distinct patterns: cross over operation, selection, and finally mutation. The new population is then put into the Import Vector Machine, a strong classifier that has been used to solve a wide range of pattern recognition issues. FGA are quick, especially considering their capacity to discover global optima. Another advantage of FGA is their naturally parallel nature of assessing the individuals within a population. As a classifier, I2VM has self-tuning properties that allow patterns to attain global optimums. The FGA-efficacy I2VM model’s is complemented by information gain, which improves speed and detection accuracy while having a low computing cos

    In vivo dose estimations through transit signal measured with thimble chamber positioned along the central axis at electronic portal imaging device level in medical linear accelerator in carcinoma of the middle-third esophagus patients undergoing three-dimensional conformal radiotherapy

    No full text
    Objective: This study presents a method to estimate midplane dose (Diso, transit) in vivo from transit signal (St) measured with thimble ionization chamber in cancer of the middle-third esophagus patients treated with three-dimensional radiotherapy (RT). This detector is positioned at the level of electronic portal imaging device in the gantry of a medical linear accelerator. Materials and Methods: Efficacy of inhomogeneity corrections of three dose calculation algorithms available in XiO treatment planning system (TPS) for planned dose (for open fields) (Diso, TPS) was studied with three heterogeneous phantoms. Diso, transit represents measured signal at transit point (St) far away correlating to dose at isocenter. A locally fabricated thorax phantom was used to measure the in vivo midplane dose (Diso, mid) which was also estimated through St. Thirteen patients with carcinoma of the middle-third esophagus treated with three-dimensional conformal RT were studied. St was recorded (three times, with a gap of 5–6 fractions during the treatment) to estimate Diso, transit, which was compared with the doses calculated by TPS. Results: The dose predictions by superposition algorithm were superior compared to the other algorithms. Percentage deviation of Diso, transit, Diso, mid with Diso, TPS combined all fields was 2.7 and –2.6%, respectively, with the thorax phantom. The mean percentage deviation with standard deviation of estimated Diso, transit with Diso, TPS observed in patients was within standard deviation –0.73% ±2.09% (n = 39). Conclusions: Midplane dose estimates in vivo using this method provide accurate determination of delivered dose in the middle-third esophagus RT treatments. This method could be useful in similar clinical circumstances for dose confirmation and documentation

    Cybercrime issues in smart cities networks and prevention using ethical hacking

    No full text
    Today, the need for security and data protection has increased because of the increase in Internet use. In today’s era, all industries have digitally moved their data to cloud platforms that bring new data protection issues and challenges especially in IoT and Smart cities networks. Internet of Things (IoT) is a growing field in today’s world that offers reliable and consistent communication via wireless and wired connections and generate a huge amount of data. Therefore, it is essential to ensure the security and reliability of generated data. IoT systems and networks should have strong security mechanism to protect users’ private data and processed information. Internet development and usability have brought numerous challenges in term of online frauds, hacking, and phishing activities, spamming and many others. According to Cybersecurity Ventures survey, cybercrime damages could cost the world $6 trillion per annum by 2021. This information shows growing number of Internet frauds, the finances losses and cybercrime in the coming era for every industry. Without adequate awareness and comprehensive knowledge, it has become difficult to defend against such practices. Ethical Hacking allows users and businesses to scrutinize their systems and networks vulnerabilities, take proper measures to protect their network and systems against unlawful and malicious attacks. It also strengthens network and systems by identifying common vulnerabilities, scrutinize, and taking proper security measures. Kali Linux Operating System (OS) is known as the most sophisticated penetration testing tool to perform Ethical Hacking. In this chapter, we addressed latest information regarding IoT and Smart City networks worldwide in terms of financial and data losses. We have also discussed the Ethical Hacking terminologies along with various kinds of social engineering and phishing attacks could occur on IoT and smart cities networks. We have performed several social engineering experiments using Kali Tools to demonstrate identification of common mistakes in web-based applications and smart networks for the apprentices. In the end, we have proposed some appropriate solutions to strengthen against hackers

    Dose verification in carcinoma of uterine cervix patients undergoing 3D conformal radiotherapy with Farmer type ion chamber

    No full text
    External beam radiotherapy (EBRT) for carcinoma of uterine cervix is a basic line of treatment with three dimensional conformal radiotherapy (3DCRT) in large number of patients. There is need for an established method for verification dosimetry. We tried to document absorbed doses in a group of carcinoma cervix patients by inserting a 0.6 cc Farmer type ion chamber in the vaginal cavity. A special long perspex sleeve cap is designed to cover the chamber for using in the patient′s body. Response of ionization chamber is checked earlier in water phantom with and without cap. Treatment planning was carried out with X-ray computed tomography (CT) scan and with the chamber along with cap in inserted position, and with the images Xio treatment planning system. Three measurements on 3 days at 5-6 fraction intervals were recorded in 12 patients. Electrometer measured charges are converted to absorbed dose at the chamber center, in vivo. Our results show good agreement with planned dose within 3% against prescribed dose. This study, is a refinement over our previous studies with transmission dosimetry and chemicals in ampules. This preliminary work shows promise that this can be followed as a routine dose check with special relevance to new protocols in the treatment of carcinoma cervix with EBRT

    Abstracts of National Conference on Research and Developments in Material Processing, Modelling and Characterization 2020

    No full text
    This book presents the abstracts of the papers presented to the Online National Conference on Research and Developments in Material Processing, Modelling and Characterization 2020 (RDMPMC-2020) held on 26th and 27th August 2020 organized by the Department of Metallurgical and Materials Science in Association with the Department of Production and Industrial Engineering, National Institute of Technology Jamshedpur, Jharkhand, India. Conference Title: National Conference on Research and Developments in Material Processing, Modelling and Characterization 2020Conference Acronym: RDMPMC-2020Conference Date: 26–27 August 2020Conference Location: Online (Virtual Mode)Conference Organizer: Department of Metallurgical and Materials Engineering, National Institute of Technology JamshedpurCo-organizer: Department of Production and Industrial Engineering, National Institute of Technology Jamshedpur, Jharkhand, IndiaConference Sponsor: TEQIP-

    Antioxidant Alternatives in the Treatment of Amyotrophic Lateral Sclerosis: A Comprehensive Review

    No full text

    The surgical safety checklist and patient outcomes after surgery: a prospective observational cohort study, systematic review and meta-analysis

    Get PDF
    © 2017 British Journal of Anaesthesia Background: The surgical safety checklist is widely used to improve the quality of perioperative care. However, clinicians continue to debate the clinical effectiveness of this tool. Methods: Prospective analysis of data from the International Surgical Outcomes Study (ISOS), an international observational study of elective in-patient surgery, accompanied by a systematic review and meta-analysis of published literature. The exposure was surgical safety checklist use. The primary outcome was in-hospital mortality and the secondary outcome was postoperative complications. In the ISOS cohort, a multivariable multi-level generalized linear model was used to test associations. To further contextualise these findings, we included the results from the ISOS cohort in a meta-analysis. Results are reported as odds ratios (OR) with 95% confidence intervals. Results: We included 44 814 patients from 497 hospitals in 27 countries in the ISOS analysis. There were 40 245 (89.8%) patients exposed to the checklist, whilst 7508 (16.8%) sustained ≥1 postoperative complications and 207 (0.5%) died before hospital discharge. Checklist exposure was associated with reduced mortality [odds ratio (OR) 0.49 (0.32–0.77); P\u3c0.01], but no difference in complication rates [OR 1.02 (0.88–1.19); P=0.75]. In a systematic review, we screened 3732 records and identified 11 eligible studies of 453 292 patients including the ISOS cohort. Checklist exposure was associated with both reduced postoperative mortality [OR 0.75 (0.62–0.92); P\u3c0.01; I2=87%] and reduced complication rates [OR 0.73 (0.61–0.88); P\u3c0.01; I2=89%). Conclusions: Patients exposed to a surgical safety checklist experience better postoperative outcomes, but this could simply reflect wider quality of care in hospitals where checklist use is routine
    corecore