Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 41

Identification Related Abstracts

41 Investigations into Effect of Neural Network Predictive Control of UPFC for Improving Transient Stability Performance of Multimachine Power System

Authors: Sheela Tiwari, R. Naresh, R. Jha

Abstract:

The paper presents an investigation into the effect of neural network predictive control of UPFC on the transient stability performance of a multi-machine power system. The proposed controller consists of a neural network model of the test system. This model is used to predict the future control inputs using the damped Gauss-Newton method which employs ‘backtracking’ as the line search method for step selection. The benchmark 2 area, 4 machine system that mimics the behavior of large power systems is taken as the test system for the study and is subjected to three phase short circuit faults at different locations over a wide range of operating conditions. The simulation results clearly establish the robustness of the proposed controller to the fault location, an increase in the critical clearing time for the circuit breakers and an improved damping of the power oscillations as compared to the conventional PI controller.

Keywords: Neural Networks, Identification, Predictive control, Transient Stability, UPFC

Procedia PDF Downloads 190
40 A New Protocol Ensuring Users' Privacy in Pervasive Environment

Authors: Mohammed Nadir Djedid, Abdallah Chouarfia

Abstract:

Transparency of the system and its integration into the natural environment of the user are some of the important features of pervasive computing. But these characteristics that are considered as the strongest points of pervasive systems are also their weak points in terms of the user’s privacy. The privacy in pervasive systems involves more than the confidentiality of communications and concealing the identity of virtual users. The physical presence and behavior of the user in the pervasive space cannot be completely hidden and can reveal the secret of his/her identity and affect his/her privacy. This paper shows that the application of major techniques for protecting the user’s privacy still insufficient. A new solution named Shadow Protocol is proposed, which allows the users to authenticate and interact with the surrounding devices within an ubiquitous computing environment while preserving their privacy.

Keywords: Privacy, Identification, Authentication, Pervasive Systems

Procedia PDF Downloads 275
39 Adaptive Kaman Filter for Fault Diagnosis of Linear Parameter-Varying Systems

Authors: Rajamani Doraiswami, Lahouari Cheded

Abstract:

Fault diagnosis of Linear Parameter-Varying (LPV) system using an adaptive Kalman filter is proposed. The LPV model is comprised of scheduling parameters, and the emulator parameters. The scheduling parameters are chosen such that they are capable of tracking variations in the system model as a result of changes in the operating regimes. The emulator parameters, on the other hand, simulate variations in the subsystems during the identification phase and have negligible effect during the operational phase. The nominal model and the influence vectors, which are the gradient of the feature vector respect to the emulator parameters, are identified off-line from a number of emulator parameter perturbed experiments. A Kalman filter is designed using the identified nominal model. As the system varies, the Kalman filter model is adapted using the scheduling variables. The residual is employed for fault diagnosis. The proposed scheme is successfully evaluated on simulated system as well as on a physical process control system.

Keywords: Identification, Fault diagnosis, Kalman Filter, linear parameter-varying systems, least-squares estimation, emulators

Procedia PDF Downloads 351
38 Phenotypical and Genotypical Assessment Techniques for Identification of Some Contagious Mastitis Pathogens

Authors: Ayman El Behiry, Rasha Nabil Zahran, Reda Tarabees, Eman Marzouk, Musaad Al-Dubaib

Abstract:

Mastitis is one of the most economic disease affecting dairy cows worldwide. Its classic diagnosis using bacterial culture and biochemical findings is a difficult and prolonged method. In this research, using of matrix-assisted laser desorption/ionization time-of-flight mass spectrometry (MALDI-TOF MS) permitted identification of different microorganisms with high accuracy and rapidity (only 24 hours for microbial growth and analysis). During the application of MALDI-TOF MS, one hundred twenty strains of Staphylococcus and Streptococcus species isolated from milk of cows affected by clinical and subclinical mastitis were identified, and the results were compared with those obtained by traditional methods as API and VITEK 2 Systems. 37 of totality 39 strains (~95%) of Staphylococcus aureus (S. aureus) were exactly detected by MALDI TOF MS and then confirmed by a nuc-based PCR technique, whereas accurate identification was observed in 100% (50 isolates) of the coagulase negative staphylococci (CNS) and Streptococcus agalactiae (31 isolates). In brief, our results demonstrated that MALDI-TOF MS is a fast and truthful technique which has the capability to replace conventional identification of several bacterial strains usually isolated in clinical laboratories of microbiology.

Keywords: Identification, mastitis pathogens, mass spectral, phenotypical

Procedia PDF Downloads 222
37 Biodiversity of Plants Rhizosphere and Rhizoplane Bacteria in the Presence of Petroleum Hydrocarbons

Authors: Togzhan D. Mukasheva, Anel A. Omirbekova, Raikhan S. Sydykbekova, Ramza Zh. Berzhanova, Lyudmila V. Ignatova

Abstract:

Following plants-barley (Hordeum sativum), alfalfa (Medicago sativa), grass mixture (red fescue-75%, long-term ryegrass - 20% Kentucky bluegrass - 10%), oilseed rape (Brassica napus biennis), resistant to growth in the contaminated soil with oil content of 15.8 g / kg 25.9 g / kg soil were used. Analysis of the population showed that the oil pollution reduces the number of bacteria in the rhizosphere and rhizoplane of plants and enhances the amount of spore-forming bacteria and saprotrophic micromycetes. It was shown that regardless of the plant, dominance of Pseudomonas and Bacillus genera bacteria was typical for the rhizosphere and rhizoplane of plants. The frequency of bacteria of these genera was more than 60%. Oil pollution changes the ratio of occurrence of various types of bacteria in the rhizosphere and rhizoplane of plants. Besides the Pseudomonas and Bacillus genera, in the presence of hydrocarbons in the root zone of plants dominant and most typical were the representatives of the Mycobacterium and Rhodococcus genera. Together the number was between 62% to 72%.

Keywords: Identification, Pollution, root system, micromycetes

Procedia PDF Downloads 326
36 Microbial Diversity of El-Baida Marsh: Setif, Algeria

Authors: H. Necef, A. Benayad

Abstract:

Fungi are becoming more and more important in our life. Therefore, as a start for the symposium on filamentous fungi in biotechnology a short survey of the role of fungi in biotechnology. Salin soils occupy about 7% of land area; they are characterized by unsuitable physical conditions for the growth of living organisms. However, researches showed that some microorganisms especially fungi are able to grow and adapt to such extreme conditions; it is due to their ability to develop different physiological mechanisms in their adaptation. This is the first study on the physiological and biological characteristics of El-Beida marsh. Nine soil samples were taken at different points in two steps, the first was in winter (low temperature), and the second was in summer (high temperature). The physicochemical analyses of the soil were conducted, then the isolation process was applied using two methods, direct method and dilution method (10-1, 10-2, 10-3, 10-4). Different species of fungi were identified belong to 21 genera in addition to 3 yeast species, Aspergillus showed the highest proportion by 43%, then Penicillium by 20% then Alternaria by 7%, in addition to various genera in different proportions. As for the sampling periods, it was observed that the spread of fungi in winter was higher than in summer with the proportion 75.47% and 24.53% respectively. Some halotolerant fungi have a biotechnological importance especially if the salinity of the medium is necessary for the fermentation, and if the halotolerance genes of the fungus will define, this will open the research to study and improve this property for the industrial important micro-organisms.

Keywords: Identification, Fungi, Salinity, aspergillus oryzae, halotolerance

Procedia PDF Downloads 263
35 Isolation and Identification Fibrinolytic Protease Endophytic Fungi from Hibiscus Leaves in Shah Alam

Authors: Mohd Sidek Ahmad, Zainon Mohd Noor, Zaidah Zainal Ariffin

Abstract:

Fibrin degradation is an important part in prevention or treatment of intravascular thrombosis and cardiovascular diseases. Plasmin like fibrinolytic enzymes has given new hope to patient with cardiovascular diseases by treating fibrin aggregation related diseases with traditional plasminogen activator which have many side effects. Various researches involving wide range of sources for production of fibrinolytic proteases, from bacteria, fungi, insects and fermented foods. But few have looked into endophytic fungi as a potential source. Sixteen (16) endophytic fungi were isolated from Hibiscus sp. leaves from six different locations in Shah Alam, Selangor. Only two endophytic fungi, FH3 and S13 showed positive fibrinolytic protease activities. FH3 produced 5.78cm and S13 produced 4.48cm on Skim Milk Agar after 4 days of incubation at 27°C. Fibrinolytic activity was observed; 3.87cm and 1.82cm diameter clear zone on fibrin plate of FH3 and S13 respectively. 18srRNA was done for identification of the isolated fungi with positive fibrinolytic protease. S13 had the highest similarity (100%) to that of Penicillium citrinum strain TG2 and FH3 had the highest similarity (99%) to that of Fusarium sp. FW2PhC1, Fusarium sp. 13002, Fusarium sp. 08006, Fusarium equiseti strain Salicorn 8 and Fungal sp. FCASAn-2. Media composition variation showed the effects of carbon nitrogen on protein concentration, where the decrement of 50% of media composition caused drastic decrease in protease of FH3 from 1.081 to 0.056 and also S13 from 2.946 to 0.198.

Keywords: Identification, Isolation, fibrinolytic protease, endophytic fungi, Hibiscus leaves

Procedia PDF Downloads 241
34 Optimization of Fermentation Conditions for Extracellular Production of the Oncolytic Enzyme, L-Asparaginase, by New Subsp. Streptomyces Rochei Subsp. Chromatogenes NEAE-K Using Response Surface Methodology under Solid State Fermentation

Authors: Noura El-Ahmady El-Naggar

Abstract:

L-asparaginase is an important enzyme as therapeutic agents used in combination therapy with other drugs in the treatment of acute lymphoblastic leukemia in children. L-asparaginase producing actinomycete strain, NEAE-K, was isolated from soil sample and identified on the basis of morphological, cultural, physiological and biochemical properties, together with 16S rDNA sequence as new subsp. Streptomyces rochei subsp. chromatogenes NEAE-K and sequencing product (1532 bp) was deposited in the GenBank database under accession number KJ200343. The study was conducted to screen parameters affecting the production of L-asparaginase by Streptomyces rochei subsp. chromatogenes NEAE-K on solid state fermentation using Plackett–Burman experimental design. Sixteen different independent variables including incubation time, moisture content, inoculum size, temperature, pH, soybean meal+ wheat bran, dextrose, fructose, L-asparagine, yeast extract, KNO3, K2HPO4, MgSO4.7H2O, NaCl, FeSO4. 7H2O, CaCl2, and three dummy variables were screened in Plackett–Burman experimental design of 20 trials. The most significant independent variables affecting enzyme production (dextrose, L-asparagine and K2HPO4) were further optimized by the central composite design. As a result, a medium of the following formula is the optimum for producing an extracellular L-asparaginase by Streptomyces rochei subsp. chromatogenes NEAE-K from solid state fermentation: g/L (soybean meal+ wheat bran 15, dextrose 3, fructose 4, L-asparagine 8, yeast extract 2, KNO3 1, K2HPO4 2, MgSO4.7H2O 0.5, NaCl 0.1, FeSO4. 7H2O 0.02, CaCl2 0.01), incubation time 7 days, moisture content 50%, inoculum size 3 mL, temperature 30°C, pH 8.5.

Keywords: Identification, solid state fermentation, Plackett-Burman design, streptomyces rochei subsp. chromatogenes neae-k, l-asparaginase production, central composite design

Procedia PDF Downloads 294
33 The Impact of the Number of Neurons in the Hidden Layer on the Performance of MLP Neural Network: Application to the Fast Identification of Toxics Gases

Authors: Slimane Ouhmad, Abdellah Halimi

Abstract:

In this work, we have applied neural networks method MLP type to a database from an array of six sensors for the detection of three toxic gases. As the choice of the number of hidden layers and the weight values has a great influence on the convergence of the learning algorithm, we proposed, in this article, a mathematical formulation to determine the optimal number of hidden layers and good weight values based on the method of back propagation of errors. The results of this modeling have improved discrimination of these gases on the one hand, and optimize the computation time on the other hand, the comparison to other results achieved in this case.

Keywords: Identification, MLP Neural Network, back-propagation, number of neurons in the hidden layer, computing time

Procedia PDF Downloads 213
32 Evaluation of the Patient Identification Process in Healthcare Facilities in a Brazilian City Area

Authors: Carmen Silvia Gabriel, Maria de Fátima Paiva Brito, Mariane de Paula Candido, Vanessa Barato Oliveira

Abstract:

Patient identification is a necessary practice to ensure patient safety in any healthcare environment, including emergency care units, test laboratories, home care and clinics. The present study aimed to provide evidence that can effectively contribute to practices concerning patient identification. Its objective was to investigate patient identification in basic healthcare units through patient safety standards. To do so, a descriptive and non-experimental research outline study was carried out to inquire how patient identification takes place in a particular situation. All technical manager nurses from the chosen healthcare facilities were included in the sample for the study. Data was collected in September of 2014 after approval from the Committee of Ethics. All researched institutions fit the same profile: they’re public facilities for general care with observation beds. None of them has a wristband identification protocol or policy. Only one institution mentioned using some kind of visual identification; namely, body tags separated by colors according to the type of care, but it still does not apply the recommended tags by the Brazilian Ministry of Health. This study allowed the authors to acknowledge how important the commitment from the whole healthcare team in the patient identification process is and also acknowledge how necessary it is to implement institutional policies that may aid the healthcare units in this area to promote a quality and safe patient care.

Keywords: Identification, Nursing, Patient Safety, emergency care units

Procedia PDF Downloads 249
31 The Crossroads of Corruption and Terrorism in the Global South

Authors: Stephen M. Magu

Abstract:

The 9/11 and Christmas bombing attacks in the United States are mostly associated with the inability of intelligence agencies to connect dots based on intelligence that was already available. The 1998, 2002, 2013 and several 2014 terrorist attacks in Kenya, on the other hand, are probably driven by a completely different dynamic: the invisible hand of corruption. The World Bank and Transparency International annually compute the Worldwide Governance Indicators and the Corruption Perception Index respectively. What perhaps is not adequately captured in the corruption metrics is the impact of corruption on terrorism. The World Bank data includes variables such as the control of corruption, (estimates of) government effectiveness, political stability and absence of violence/terrorism, regulatory quality, rule of law and voice and accountability. TI's CPI does not include measures related to terrorism, but it is plausible that there is an expectation of some terrorism impact arising from corruption. This paper, by examining the incidence, frequency and total number of terrorist attacks that have occurred especially since 1990, and further examining the specific cases of Kenya and Nigeria, argues that in addition to having major effects on governance, corruption has an even more frightening impact: that of facilitating and/or violating security mechanisms to the extent that foreign nationals can easily obtain identification that enables them to perpetuate major events, targeting powerful countries' interests in countries with weak corruption-fighting mechanisms. The paper aims to model interactions that demonstrate the cost/benefit analysis and agents' rational calculations as being non-rational calculations, given the ultimate impact. It argues that eradication of corruption is not just a matter of a better business environment, but that it is implicit in national security, and that for anti-corruption crusaders, this is an argument more potent than the economic cost / cost of doing business argument.

Keywords: Identification, Corruption, Terrorism, global south, passports

Procedia PDF Downloads 303
30 Antagonist Study of Fungi Isolated from the Burned Forests of Region of Mila, Algeria

Authors: Abdelaziz Wided, Khiat Nawel, Khiat Inssaf

Abstract:

The present study was initiated to: Determine burned forest-inhabiting fungi in Zouagha, Terri Beinène, Mila and study the antagonistic activity of Trichoderma sp against Fusarium sp, Penicillium sp, Rhizoctonia sp, Alternaria sp. 18 fungal strains were isolated from Soil samples taken from the forest Zouagha (Burned) in the region Mila representing 6 genera: Trichoderma sp et Fusarium sp, Penicillium sp, Rhizoctonia sp, Alternaria sp, Rhizopus sp. The tests of dual culture method on culture medium (PDA) against Trichoderma sp et Fusarium sp, Penicillium sp, Rhizoctonia sp, Alternaria sp revealed that: Trichoderma sp could reduce l mycelium grouth of Fusarium sp23.13%, Penicillium sp33.13%, Rhizoctoniasp33.75 %and Alternaria sp 38.31% in comparaison with the witness after 6 days at room temperature. The strains of Fusarium sp ,Penicillium sp, Rhizoctonia sp et Alternaria sp showed differences sensibility to the antagoniste.

Keywords: Identification, Isolation, Molds, Antagonism, Trichoderma sp, burned soil of zouagha

Procedia PDF Downloads 131
29 Comparison of Different Methods of Microorganism's Identification from a Copper Mining in Pará, Brazil

Authors: Louise H. Gracioso, Luciana J. Gimenes, Bruno Karolski, Elen A. Perpetuo, Ingrid R. Avanzi, Marcela P.G. Baltazar, Claudio O. Nascimento

Abstract:

Introduction: Higher copper concentrations promote a selection pressure on organisms such as plants, fungi and bacteria, which allows surviving only the resistant organisms to the contaminated site. This selective pressure keeps only the organisms most resistant to a specific condition and subsequently increases their bioremediation potential. Despite the bacteria importance for biosphere maintenance, it is estimated that only a small fraction living microbial species has been described and characterized. Due to the molecular biology development, tools based on analysis 16S ribosomal RNA or another specific gene are making a new scenario for the characterization studies and identification of microorganisms in the environment. News identification of microorganisms methods have also emerged like Biotyper (MALDI / TOF), this method mass spectrometry is subject to the recognition of spectroscopic patterns of conserved and features proteins for different microbial species. In view of this, this study aimed to isolate bacteria resistant to copper present in a Copper Processing Area (Sossego Mine, Canaan, PA) and identifies them in two different methods: Recent (spectrometry mass) and conventional. This work aimed to use them for a future bioremediation of this Mining. Material and Methods: Samples were collected at fifteen different sites of five periods of times. Microorganisms were isolated from mining wastes by culture enrichment technique; this procedure was repeated 4 times. The isolates were inoculated into MJS medium containing different concentrations of chloride copper (1mM, 2.5mM, 5mM, 7.5mM and 10 mM) and incubated in plates for 72 h at 28 ºC. These isolates were subjected to mass spectrometry identification methods (Biotyper – MALDI/TOF) and 16S gene sequencing. Results: A total of 105 strains were isolated in this area, bacterial identification by mass spectrometry method (MALDI/TOF) achieved 74% agreement with the conventional identification method (16S), 31% have been unsuccessful in MALDI-TOF and 2% did not obtain identification sequence the 16S. These results show that Biotyper can be a very useful tool in the identification of bacteria isolated from environmental samples, since it has a better value for money (cheap and simple sample preparation and MALDI plates are reusable). Furthermore, this technique is more rentable because it saves time and has a high performance (the mass spectra are compared to the database and it takes less than 2 minutes per sample).

Keywords: Bioremediation, Identification, Microorganisms, copper mining area, MALDI/TOF, RNA 16S

Procedia PDF Downloads 184
28 Identification of Lactic Acid Bacteria Isolated from Raw Camel Milk Produced in South of Morocco

Authors: Maha Alaoui Ismaili, Bouchta Saidi, Mohamed Zahar, Abed Hamama

Abstract:

112 lactic isolates were obtained from 15 samples of camel raw milk produced in Laayoune Boujdour Sakia-El Hamra region (South of Morocco). The main objective was the identification of species of lactic flora belonging to Lactococcus, Lactobacillus and Leuconostoc. Data obtained showed predominance of cocci among lactic isolates (86.6%) while lactic rods represented only 13.4%. With regard to genera identified, Enterococcus was the mostly found out (53.57%), followed by Lactococcus (28.57%), Lactobacillus (13.4%) and Leuconostoc (4.4 %). Identification of the lactic isolates according to their morphological, physiological, and biochemical characteristics led to differentiating 11 species with Lactococcus lactis ssp lactis biovar diacetylactis being the mostly encountered (24.1%) followed by Lactobacillus brevis (3.57%), Lactobacillus plantarum (3.57%), Lactobacillus delbrueckii subsp lactis (3.57%) and Lactococcus lactis subsp cremoris (2.67%).

Keywords: Identification, Lactic Acid Bacteria, raw camel milk, south of morocco

Procedia PDF Downloads 319
27 Police and Crime Scene Management Model

Authors: Najaf Hamadzadeh Arbabi

Abstract:

Crime scene management is the first and most critical step in criminal investigations and all the criminal investigations are based on the ability of the crime scene investigation officers for diagnosing the importance and the role of physical evidence at the crime scene. According to the role of available physical evidence at the scene to prove the crime and identify the perpetrator and prove the innocence of those accused have been unduly and also impossible due to the rejection of these reasons, the maintenance and investigation of crime scene and collect evidence are very important in the crime scene. This research, by identifying the factors affecting the management of the crime scene, looking for presenting the effective and efficient indigenous pattern for managing of the crime scene in Iran. Method: This study is an applied and development research. Wilcoxon signed-rank test and the Friedman test for ranking, were used for analyzing the data and all hypotheses were tested at 95% confidence level. The target population is 50 judges and experts in Tehran.

Keywords: Identification, Reconstruction, Crime Scene, designation, individualization

Procedia PDF Downloads 119
26 Study of Germs Responsible of Nosocomial Infections in Hospital of Guelma

Authors: Adel Gouri, Wissem Abdaoui, Ilhem Mokhtari, Benouareth Djamel Eddine

Abstract:

Contracted in a health facility, hospital-acquired infections are a major public health problem in recent years. The increase of nosocomial infections is partly related to diagnostic and therapeutic advances in medicine. The aim of our study was to isolate and diagnose some types of bacteria that are circulating in the hospital by performing different samples at two medical services: Pulmonary and Infectious Diseases. The antibiotic susceptibility tests were performed for bacterial isolates. The results have shown that there is a predominance of enterobacteria followed by the staphylococcus with its two species epidermidis ans saprophyticus. The study of the antibiogramme identified that some of these bacteria have a resistant profile against all the tested antibiotics. The fight against nosocomial infections is difficult because it must act on several factors: quality of care, safety of the hospital environment, hygiene, wearing gloves etc. are all areas that should be of heightened vigilance and preventive measures.

Keywords: Identification, Isolation, nosocomial infection, sensitivity and resistance to antibiotics

Procedia PDF Downloads 221
25 Gender Identification Using Digital Forensics

Authors: Vinod C. Nayak

Abstract:

In day-to-day forensic practice, identification is always a difficult task. Availability of anti-mortem and postmortem records plays a major rule in facilitating this tough task. However, the advent of digital forensic is a boon for forensic experts. This study has made use of digital forensics to establish identity by radiological dimensions of maxillary sinus using workstation software. The findings suggest a significant association between maxillary sinus dimensions and human gender. The author will be discussing the methods and results of the study in this e-poster.

Keywords: Identification, Radiology, Digital Forensics, maxillary sinus

Procedia PDF Downloads 247
24 Non-Invasive Characterization of the Mechanical Properties of Arterial Walls

Authors: Bruno RamaëL, GwenaëL Page, Catherine Knopf-Lenoir, Olivier Baledent, Anne-Virginie Salsac

Abstract:

No routine technique currently exists for clinicians to measure the mechanical properties of vascular walls non-invasively. Most of the data available in the literature come from traction or dilatation tests conducted ex vivo on native blood vessels. The objective of the study is to develop a non-invasive characterization technique based on Magnetic Resonance Imaging (MRI) measurements of the deformation of vascular walls under pulsating blood flow conditions. The goal is to determine the mechanical properties of the vessels by inverse analysis, coupling imaging measurements and numerical simulations of the fluid-structure interactions. The hyperelastic properties are identified using Solidworks and Ansys workbench (ANSYS Inc.) solving an optimization technique. The vessel of interest targeted in the study is the common carotid artery. In vivo MRI measurements of the vessel anatomy and inlet velocity profiles was acquired along the facial vascular network on a cohort of 30 healthy volunteers: - The time-evolution of the blood vessel contours and, thus, of the cross-section surface area was measured by 3D imaging angiography sequences of phase-contrast MRI. - The blood flow velocity was measured using a 2D CINE MRI phase contrast (PC-MRI) method. Reference arterial pressure waveforms were simultaneously measured in the brachial artery using a sphygmomanometer. The three-dimensional (3D) geometry of the arterial network was reconstructed by first creating an STL file from the raw MRI data using the open source imaging software ITK-SNAP. The resulting geometry was then transformed with Solidworks into volumes that are compatible with Ansys softwares. Tetrahedral meshes of the wall and fluid domains were built using the ANSYS Meshing software, with a near-wall mesh refinement method in the case of the fluid domain to improve the accuracy of the fluid flow calculations. Ansys Structural was used for the numerical simulation of the vessel deformation and Ansys CFX for the simulation of the blood flow. The fluid structure interaction simulations showed that the systolic and diastolic blood pressures of the common carotid artery could be taken as reference pressures to identify the mechanical properties of the different arteries of the network. The coefficients of the hyperelastic law were identified using Ansys Design model for the common carotid. Under large deformations, a stiffness of 800 kPa is measured, which is of the same order of magnitude as the Young modulus of collagen fibers. Areas of maximum deformations were highlighted near bifurcations. This study is a first step towards patient-specific characterization of the mechanical properties of the facial vessels. The method is currently applied on patients suffering from facial vascular malformations and on patients scheduled for facial reconstruction. Information on the blood flow velocity as well as on the vessel anatomy and deformability will be key to improve surgical planning in the case of such vascular pathologies.

Keywords: Identification, Numerical Simulations, Mechanical Properties, arterial walls, MRI measurements

Procedia PDF Downloads 205
23 Acoustic Analysis for Comparison and Identification of Normal and Disguised Speech of Individuals

Authors: Surbhi Mathur, J. M. Vyas

Abstract:

Although the rapid development of forensic speaker recognition technology has been conducted, there are still many problems to be solved. The biggest problem arises when the cases involving disguised voice samples come across for the purpose of examination and identification. Such type of voice samples of anonymous callers is frequently encountered in crimes involving kidnapping, blackmailing, hoax extortion and many more, where the speaker makes a deliberate effort to manipulate their natural voice in order to conceal their identity due to the fear of being caught. Voice disguise causes serious damage to the natural vocal parameters of the speakers and thus complicates the process of identification. The sole objective of this doctoral project is to find out the possibility of rendering definite opinions in cases involving disguised speech by experimentally determining the effects of different disguise forms on personal identification and percentage rate of speaker recognition for various voice disguise techniques such as raised pitch, lower pitch, increased nasality, covering the mouth, constricting tract, obstacle in mouth etc by analyzing and comparing the amount of phonetic and acoustic variation in of artificial (disguised) and natural sample of an individual, by auditory as well as spectrographic analysis.

Keywords: Identification, Forensic, Speech, Speaker recognition, voice, disguise

Procedia PDF Downloads 228
22 Trusting the Eyes: The Changing Landscape of Eyewitness Testimony

Authors: Manveen Singh

Abstract:

Since the very advent of law enforcement, eyewitness testimony has played a pivotal role in identifying, arresting and convicting suspects. Reliant heavily on the accuracy of human memory, nothing seems to carry more weight with the judiciary than the testimony of an actual witness. The acceptance of eyewitness testimony as a substantive piece of evidence lies embedded in the assumption that the human mind is adept at recording and storing events. Research though, has proven otherwise. Having carried out extensive study in the field of eyewitness testimony for the past 40 years, psychologists have concluded that human memory is fragile and needs to be treated carefully. The question that arises then, is how reliable is eyewitness testimony? The credibility of eyewitness testimony, simply put, depends on several factors leaving it reliable at times while not so much at others. This is further substantiated by the fact that as per scientific research, over 75 percent of all eyewitness testimonies may stand in error; quite a few of these cases resulting in life sentences. Although the advancement of scientific techniques, especially DNA testing, helped overturn many of these eyewitness testimony-based convictions, yet eyewitness identifications continue to form the backbone of most police investigations and courtroom decisions till date. What then is the solution to this long standing concern regarding the accuracy of eyewitness accounts? The present paper shall analyze the linkage between human memory and eyewitness identification as well as look at the various factors governing the credibility of eyewitness testimonies. Furthermore, it shall elaborate upon some best practices developed over the years to help reduce mistaken identifications. Thus, in the process, trace out the changing landscape of eyewitness testimony amidst the evolution of DNA and trace evidence.

Keywords: Identification, Dna, evidence, eyewitness, testimony

Procedia PDF Downloads 191
21 The Influence of Superordinate Identity and Group Size on Group Decision Making through Discussion

Authors: Jin Zhang, Lin Peng, Yuanyuan Miao, Quanquan Zheng

Abstract:

Group discussion and group decision-making have long been a topic of research interest. Traditional research on group decision making typically focuses on the strategies or functional models of combining members’ preferences to reach an optimal consensus. In this research, we want to explore natural process group decision making through discussion and examine relevant, influential factors--common superordinate identity shared by group and size of the groups. We manipulated the social identity of the groups into either a shared superordinate identity or different subgroup identities. We also manipulated the size to make it either a big (6-8 person) group or small group (3-person group). Using experimental methods, we found members of a superordinate identity group tend to modify more of their own opinions through the discussion, compared to those only identifying with their subgroups. Besides, members of superordinate identity groups also formed stronger identification with group decision--the results of group discussion than their subgroup peers. We also found higher member modification in bigger groups compared to smaller groups. Evaluations of decisions before and after discussion as well as group decisions are strongly linked to group identity, as members of superordinate group feel more confident and satisfied with both the results and decision-making process. Members’ opinions are more similar and homogeneous in smaller groups compared to bigger groups. This research have many implications for further research and applied behaviors in organizations.

Keywords: Identification, Modification, Group Decision Making, group size, superordinate identity

Procedia PDF Downloads 181
20 On the Performance of Improvised Generalized M-Estimator in the Presence of High Leverage Collinearity Enhancing Observations

Authors: Sohel Rana, Habshah Midi, Mohammed A. Mohammed

Abstract:

Multicollinearity occurs when two or more independent variables in a multiple linear regression model are highly correlated. The ridge regression is the commonly used method to rectify this problem. However, the ridge regression cannot handle the problem of multicollinearity which is caused by high leverage collinearity enhancing observation (HLCEO). Since high leverage points (HLPs) are responsible for inducing multicollinearity, the effect of HLPs needs to be reduced by using Generalized M estimator. The existing GM6 estimator is based on the Minimum Volume Ellipsoid (MVE) which tends to swamp some low leverage points. Hence an improvised GM (MGM) estimator is presented to improve the precision of the GM6 estimator. Numerical example and simulation study are presented to show how HLPs can cause multicollinearity. The numerical results show that our MGM estimator is the most efficient method compared to some existing methods.

Keywords: Identification, multicollinearity, high leverage points, GM-estimator, DRGP, DFFITS

Procedia PDF Downloads 95
19 Reliable Line-of-Sight and Non-Line-of-Sight Propagation Channel Identification in Ultra-Wideband Wireless Networks

Authors: Mohamed Adnan Landolsi, Ali F. Almutairi

Abstract:

The paper addresses the problem of line-of-sight (LOS) vs. non-line-of-sight (NLOS) propagation link identification in ultra-wideband (UWB) wireless networks, which is necessary for improving the accuracy of radiolocation and positioning applications. A LOS/NLOS likelihood hypothesis testing approach is applied based on exploiting distinctive statistical features of the channel impulse response (CIR) using parameters related to the “skewness” of the CIR and its root mean square (RMS) delay spread. A log-normal fit is presented for the probability densities of the CIR parameters. Simulation results show that different environments (residential, office, outdoor, etc.) have measurable differences in their CIR parameters’ statistics, which is then exploited in determining the nature of the propagation channels. Correct LOS/NLOS channel identification rates exceeding 90% are shown to be achievable for most types of environments. Additional improvement is also obtained by combining both CIR skewness and RMS delay statistics.

Keywords: Identification, propagation, uwb, LOS, NLOS

Procedia PDF Downloads 95
18 Relationship between Growth of Non-Performing Assets and Credit Risk Management Practices in Indian Banks

Authors: Sirus Sharifi, Arunima Haldar, S. V. D. Nageswara Rao

Abstract:

The study attempts to analyze the impact of credit risk management practices of Indian scheduled commercial banks on their non-performing assets (NPAs). The data on credit risk practices was collected by administering a questionnaire to risk managers/executives at different banks. The data on NPAs (from 2012 to 2016) is sourced from Prowess, a database compiled by the Centre for Monitoring Indian Economy (CMIE). The model was estimated using cross-sectional regression method. As expected, the findings suggest that there is a negative relationship between credit risk management and NPA growth in Indian banks. The study has implications for Indian banks given the high level of losses, and the implementation of Basel III norms by the central bank, i.e. Reserve Bank of India (RBI). Evidence on credit risk management in Indian banks, and their relationship with non-performing assets held by them.

Keywords: Identification, credit risk, ownership, Indian banks, NPAs

Procedia PDF Downloads 223
17 Multilocus Phylogenetic Approach Reveals Informative DNA Barcodes for Studying Evolution and Taxonomy of Fusarium Fungi

Authors: Alexander A. Stakheev, Larisa V. Samokhvalova, Sergey K. Zavriev

Abstract:

Fusarium fungi are among the most devastating plant pathogens distributed all over the world. Significant reduction of grain yield and quality caused by Fusarium leads to multi-billion dollar annual losses to the world agricultural production. These organisms can also cause infections in immunocompromised persons and produce the wide range of mycotoxins, such as trichothecenes, fumonisins, and zearalenone, which are hazardous to human and animal health. Identification of Fusarium fungi based on the morphology of spores and spore-forming structures, colony color and appearance on specific culture media is often very complicated due to the high similarity of these features for closely related species. Modern Fusarium taxonomy increasingly uses data of crossing experiments (biological species concept) and genetic polymorphism analysis (phylogenetic species concept). A number of novel Fusarium sibling species has been established using DNA barcoding techniques. Species recognition is best made with the combined phylogeny of intron-rich protein coding genes and ribosomal DNA sequences. However, the internal transcribed spacer of (ITS), which is considered to be universal DNA barcode for Fungi, is not suitable for genus Fusarium, because of its insufficient variability between closely related species and the presence of non-orthologous copies in the genome. Nowadays, the translation elongation factor 1 alpha (TEF1α) gene is the “gold standard” of Fusarium taxonomy, but the search for novel informative markers is still needed. In this study, we used two novel DNA markers, frataxin (FXN) and heat shock protein 90 (HSP90) to discover phylogenetic relationships between Fusarium species. Multilocus phylogenetic analysis based on partial sequences of TEF1α, FXN, HSP90, as well as intergenic spacer of ribosomal DNA (IGS), beta-tubulin (β-TUB) and phosphate permease (PHO) genes has been conducted for 120 isolates of 19 Fusarium species from different climatic zones of Russia and neighboring countries using maximum likelihood (ML) and maximum parsimony (MP) algorithms. Our analyses revealed that FXN and HSP90 genes could be considered as informative phylogenetic markers, suitable for evolutionary and taxonomic studies of Fusarium genus. It has been shown that PHO gene possesses more variable (22 %) and parsimony informative (19 %) characters than other markers, including TEF1α (12 % and 9 %, correspondingly) when used for elucidating phylogenetic relationships between F. avenaceum and its closest relatives – F. tricinctum, F. acuminatum, F. torulosum. Application of novel DNA barcodes confirmed the fact that F. arthrosporioides do not represent a separate species but only a subspecies of F. avenaceum. Phylogeny based on partial PHO and FXN sequences revealed the presence of separate cluster of four F. avenaceum strains which were closer to F. torulosum than to major F. avenaceum clade. The strain F-846 from Moldova, morphologically identified as F. poae, formed a separate lineage in all the constructed dendrograms, and could potentially be considered as a separate species, but more information is needed to confirm this conclusion. Variable sites in PHO sequences were used for the first-time development of specific qPCR-based diagnostic assays for F. acuminatum and F. torulosum. This work was supported by Russian Foundation for Basic Research (grant № 15-29-02527).

Keywords: Identification, Phylogenetics, taxonomy, Fusarium, DNA barcode

Procedia PDF Downloads 204
16 Identification and Management of Septic Arthritis of the Untouched Glenohumeral Joint

Authors: Sumit Kanwar, Manisha Chand, Gregory Gilot

Abstract:

Background: Septic arthritis of the shoulder has infrequently been discussed. Focus on infection of the untouched shoulder has not heretofore been described. We present four patients with glenohumeral septic arthritis. Methods: Case 1: A 59 year old male with left shoulder pain in the anterior, posterior and superior aspects. Case 2: A 60 year old male with fever, chills, and generalized muscle aches. Case 3: A 70 year old male with right shoulder pain about the anterior and posterior aspects. Case 4: A 55 year old male with global right shoulder pain, swelling, and limited ROM. Results: In case 1, the left shoulder was affected. Physical examination, swelling was notable, there was global tenderness with a painful range of motion (ROM). The lab values indicated an erythrocyte sedimentation rate (ESR) of 96, and a C-reactive protein (CRP) of 304.30. Imaging studies were performed and MRI indicated a high suspicion for an abscess with osteomyelitis of the humeral head. Our second case’s left arm was affected. He had swelling, global tenderness and painful ROM. His ESR was 38, CRP was 14.9. X-ray showed severe arthritis. Case 3 differed with the right arm being affected. Again, global tenderness and painful ROM was observed. His ESR was 94, and CRP was 10.6. X-ray displayed an eroded glenoid space. Our fourth case’s right shoulder was affected. He had global tenderness and painful, limited ROM. ESR was 108 and CRP was 2.4. X-ray was non-significant. Discussion: Monoarticular septic arthritis of the virgin glenohumeral joint is seldom diagnosed in clinical practice. Common denominators include elevated ESR, painful, limited ROM, and involvement of the dominant arm. The male population is more frequently affected with an average age of 57. Septic arthritis is managed with incision and drainage or needle aspiration of synovial fluid supplemented with 3-6 weeks of intravenous antibiotics. Due to better irrigation and joint visualization, arthroscopy is preferred. Open surgical drainage may be indicated if the above methods fail. Conclusion: If a middle-aged male presents with vague anterior or posterior shoulder pain, elevated inflammatory markers and a low grade fever, an x-ray should be performed. If this displays degenerative joint disease, the complete further workup with advanced imaging, such as an MRI, CT scan, or an ultrasound. If these imaging modalities display anterior space joint effusion with soft tissue involvement, we can suspect septic arthritis of the untouched glenohumeral joint and surgery is indicated.

Keywords: Identification, Infection, glenohumeral joint, septic arthritis, shoulder

Procedia PDF Downloads 310
15 A Study of the Costs and Benefits of Smart City Projects Including the Scenario of Public-Private Partnerships

Authors: Patrick T. I. Lam, Wenjing Yang

Abstract:

A smart city project embraces benefits and costs which can be classified under direct and indirect categories. Externalities come into the picture, but they are often difficult to quantify. Despite this barrier, policy makers need to carry out cost-benefit analysis to justify the huge investments needed to make a city smart. The recent trend is towards the engagement of the private sector to utilize their resources and expertise, especially in the Information and Communication Technology (ICT) areas, where innovations blossom. This study focuses on the identification of costs (on a life cycle basis) and benefits associated with smart city project developments based on a comprehensive literature review and case studies, where public-private partnerships would warrant consideration, the related costs and benefits are highlighted. The findings will be useful for policy makers of cities.

Keywords: Identification, smart city projects, costs and benefits, public-private partnerships

Procedia PDF Downloads 188
14 Generalized π-Armendariz Authentication Cryptosystem

Authors: Nadia M. G. AL-Saidi, Areej M. Abduldaim

Abstract:

Algebra is one of the important fields of mathematics. It concerns with the study and manipulation of mathematical symbols. It also concerns with the study of abstractions such as groups, rings, and fields. Due to the development of these abstractions, it is extended to consider other structures, such as vectors, matrices, and polynomials, which are non-numerical objects. Computer algebra is the implementation of algebraic methods as algorithms and computer programs. Recently, many algebraic cryptosystem protocols are based on non-commutative algebraic structures, such as authentication, key exchange, and encryption-decryption processes are adopted. Cryptography is the science that aimed at sending the information through public channels in such a way that only an authorized recipient can read it. Ring theory is the most attractive category of algebra in the area of cryptography. In this paper, we employ the algebraic structure called skew -Armendariz rings to design a neoteric algorithm for zero knowledge proof. The proposed protocol is established and illustrated through numerical example, and its soundness and completeness are proved.

Keywords: Identification, cryptosystem, skew π-Armendariz rings, skew polynomial rings, zero knowledge protocol

Procedia PDF Downloads 72
13 Timely Detection and Identification of Abnormalities for Process Monitoring

Authors: Hyun-Woo Cho

Abstract:

The detection and identification of multivariate manufacturing processes are quite important in order to maintain good product quality. Unusual behaviors or events encountered during its operation can have a serious impact on the process and product quality. Thus they should be detected and identified as soon as possible. This paper focused on the efficient representation of process measurement data in detecting and identifying abnormalities. This qualitative method is effective in representing fault patterns of process data. In addition, it is quite sensitive to measurement noise so that reliable outcomes can be obtained. To evaluate its performance a simulation process was utilized, and the effect of adopting linear and nonlinear methods in the detection and identification was tested with different simulation data. It has shown that the use of a nonlinear technique produced more satisfactory and more robust results for the simulation data sets. This monitoring framework can help operating personnel to detect the occurrence of process abnormalities and identify their assignable causes in an on-line or real-time basis.

Keywords: Identification, monitoring, Detection, measurement data, multivariate techniques

Procedia PDF Downloads 92
12 Identification and Origins of Multiple Personality: A Criterion from Wiggins

Authors: Brittany L. Kang

Abstract:

One familiar theory of the origin of multiple personalities focuses on how symptoms of trauma or abuse are central causes, as seen in paradigmatic examples of the condition. The theory states that multiple personalities constitute a congenital condition, as babies all exhibit multiplicity, and that generally alters only remain separated due to trauma. In more typical cases, the alters converge and become a single identity; only in cases of trauma, according to this account, do the alters remain separated. This theory is misleading in many aspects, the most prominent being that not all multiple personality patients are victims of child abuse or trauma, nor are all cases of multiple personality observed in early childhood. The use of this criterion also causes clinical problems, including an inability to identify multiple personalities through the variety of symptoms and traits seen across observed cases. These issues present a need for revision in the currently applied criterion in order to separate the notion of child abuse and to be able to better understand the origins of multiple personalities itself. Identifying multiplicity through the application of identity theories will improve the current criterion, offering a bridge between identifying existing cases and understanding their origins. We begin by applying arguments from Wiggins, who held that each personality within a multiple was not a whole individual, but rather characters who switch off. Wiggins’ theory is supported by observational evidence of how such characters are differentiated. Alters of older ages are seen to require different prescription lens, in addition to having different handwriting. The alters may also display drastically varying styles of clothing, preferences in food, their gender, sexuality, religious beliefs and more. The definitions of terms such as 'personality' or 'persons' also become more distinguished, leading to greater understanding of who is exactly able to be classified as a patient of multiple personalities. While a more common meaning of personality is a designation of specific characteristics which account for the entirety of a person, this paper argues from Wiggins’ theory that each 'personality' is in fact only partial. Clarification of the concept in question will allow for more successful future clinical applications.

Keywords: Identification, origin, multiple personalities, Wiggins' theory

Procedia PDF Downloads 94