Search results for: forensic signature
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 492

Search results for: forensic signature

192 Smartphone Video Source Identification Based on Sensor Pattern Noise

Authors: Raquel Ramos López, Anissa El-Khattabi, Ana Lucila Sandoval Orozco, Luis Javier García Villalba

Abstract:

An increasing number of mobile devices with integrated cameras has meant that most digital video comes from these devices. These digital videos can be made anytime, anywhere and for different purposes. They can also be shared on the Internet in a short period of time and may sometimes contain recordings of illegal acts. The need to reliably trace the origin becomes evident when these videos are used for forensic purposes. This work proposes an algorithm to identify the brand and model of mobile device which generated the video. Its procedure is as follows: after obtaining the relevant video information, a classification algorithm based on sensor noise and Wavelet Transform performs the aforementioned identification process. We also present experimental results that support the validity of the techniques used and show promising results.

Keywords: digital video, forensics analysis, key frame, mobile device, PRNU, sensor noise, source identification

Procedia PDF Downloads 407
191 Comprehensive Review of Adversarial Machine Learning in PDF Malware

Authors: Preston Nabors, Nasseh Tabrizi

Abstract:

Portable Document Format (PDF) files have gained significant popularity for sharing and distributing documents due to their universal compatibility. However, the widespread use of PDF files has made them attractive targets for cybercriminals, who exploit vulnerabilities to deliver malware and compromise the security of end-user systems. This paper reviews notable contributions in PDF malware detection, including static, dynamic, signature-based, and hybrid analysis. It presents a comprehensive examination of PDF malware detection techniques, focusing on the emerging threat of adversarial sampling and the need for robust defense mechanisms. The paper highlights the vulnerability of machine learning classifiers to evasion attacks. It explores adversarial sampling techniques in PDF malware detection to produce mimicry and reverse mimicry evasion attacks, which aim to bypass detection systems. Improvements for future research are identified, including accessible methods, applying adversarial sampling techniques to malicious payloads, evaluating other models, evaluating the importance of features to malware, implementing adversarial defense techniques, and conducting comprehensive examination across various scenarios. By addressing these opportunities, researchers can enhance PDF malware detection and develop more resilient defense mechanisms against adversarial attacks.

Keywords: adversarial attacks, adversarial defense, adversarial machine learning, intrusion detection, PDF malware, malware detection, malware detection evasion

Procedia PDF Downloads 16
190 Fluorescence in situ Hybridization (FISH) Detection of Bacteria and Archaea in Fecal Samples

Authors: Maria Nejjari, Michel Cloutier, Guylaine Talbot, Martin Lanthier

Abstract:

The fluorescence in situ hybridization (FISH) is a staining technique that allows the identification, detection and quantification of microorganisms without prior cultivation by means of epifluorescence and confocal laser scanning microscopy (CLSM). Oligonucleotide probes have been used to detect bacteria and archaea that colonize the cattle and swine digestive systems. These bacterial strains have been obtained from fecal samples issued from cattle manure and swine slurry. The collection of these samples has been done at 3 different pit’s levels A, B and C with same height. Two collection depth levels have been taken in consideration, one collection level just under the pit’s surface and the second one at the bottom of the pit. Cells were fixed and FISH was performed using oligonucleotides of 15 to 25 nucleotides of length associated with a fluorescent molecule Cy3 or Cy5. The double hybridization using Cy3 probe targeting bacteria (Cy3-EUB338-I) along with a Cy5 probe targeting Archaea (Gy5-ARCH915) gave a better signal. The CLSM images show that there are more bacteria than archaea in swine slurry. However, the choice of fluorescent probes is critical for getting the double hybridization and a unique signature for each microorganism. FISH technique is an easy way to detect pathogens like E. coli O157, Listeria, Salmonella that easily contaminate water streams, agricultural soils and, consequently, food products and endanger human health.

Keywords: archaea, bacteria, detection, FISH, fluorescence

Procedia PDF Downloads 361
189 Evaluation of the Relations between Childhood Trauma and Dissociative Experiences, Self-Perception, and Early Maladaptive Schemes in Sexual Assault Convicts

Authors: Safak Akdemir

Abstract:

The main purpose of this research is to evaluate the relationships between childhood traumas and dissociative experiences, self-perceptions and early maladaptive schemas in male convicts convicted of sexual assault crimes in prison. In our study, male convicts in prison for the crime of sexual assault constitute the experimental group, and the participants matched with this experimental group in terms of education, age and gender constitute the control group. The experimental group of the research consists of 189 male individuals who are convicted in the Ministry of Justice, General Directorate of Prisons, Istanbul/Maltepe L Type Closed Prison. The control group of this study consists of 147 adult males matched with the experimental group in terms of age, gender and education parameters. A total of 336 adult male individuals are included in the sample of this study. 46% of the experimental group were convicted of only sexual assault, 54% of them were convicted of both sexual assault and murder, injury and drug crimes. Total of five data collection tools, namely the Personal Information Form created by S. A. & E. O., Childhood Trauma Questionnaire (CTQ), the Dissociative Experiences Scale (DES), the Rosenberg Self-Esteem Scale (RSES), and the Young Schema Questionnaire-Short Form (YSQ-SF3), were completed. DES cut-off score of 99 (52.39%) of 189 convicts in the experimental group and 12 (8.17%) of 147 people in the control group was found to be 30 and above, and this result indicates the presence of pathological dissociative experiences. 180 (95.23%) of the sexual assault convicts in the experimental group had at least one childhood trauma, 154 (81.48%) were emotional neglect, 140 (74.07%) were emotional abuse, 121 (64.02%) were physical neglect, 91 (4814%) physical abuse and 70 (37.03%) sexual abuse. 168 (88.88%) of the experimental group reported multiple type of trauma and 12 (6.34%) reported single type of trauma. While the childhood traumas, isolation, abandonment and emotional deprivation schema levels of the convicts with a DES cut-off score of 30 and above are higher than the convicts with a DES cut-off score of 30 and above, their self-esteem is lower than this group. Experimental group while childhood traumas, dissociative experiences and early maladaptive schemas are higher than the control group, their self-esteem levels are lower. Dissociative experiences, abandonment and emotional deprivation early maladaptive schemas are more common in convicts aged between 18-30 years compared to convicts aged 31 and over. In addition, dissociative experiences and early maladaptive schemas of male convicts who reported physical and sexual abuse were higher than those who did not report physical and sexual abuse, while their self-esteem was at a lower level. As a result, in terms of psychotraumatology and clinical forensic psychology, dissociative disorders developed under the influence of chronic childhood traumas, with clinical interviews and psychometric measurements to be made in terms of forensic psychiatry; it is of fundamental importance to evaluate it in terms of neurosis-psychosis distinction, disability retirement, custody, malpractice, criminal and legal capacity criteria.

Keywords: crime, sexual assault, criminology, rape crimes, dissocitative disorders, maladative schemas

Procedia PDF Downloads 43
188 Efficiency of Grover’s Search Algorithm Implemented on Open Quantum System in the Presence of Drive-Induced Dissipation

Authors: Nilanjana Chanda, Rangeet Bhattacharyya

Abstract:

Grover’s search algorithm is the fastest possible quantum mechanical algorithm to search a certain element from an unstructured set of data of N items. The algorithm can determine the desired result in only O(√N) steps. It has been demonstrated theoretically and experimentally on two-qubit systems long ago. In this work, we investigate the fidelity of Grover’s search algorithm by implementing it on an open quantum system. In particular, we study with what accuracy one can estimate that the algorithm would deliver the searched state. In reality, every system has some influence on its environment. We include the environmental effects on the system dynamics by using a recently reported fluctuation-regulated quantum master equation (FRQME). We consider that the environment experiences thermal fluctuations, which leave its signature in the second-order term of the master equation through its appearance as a regulator. The FRQME indicates that in addition to the regular relaxation due to system-environment coupling, the applied drive also causes dissipation in the system dynamics. As a result, the fidelity is found to depend on both the drive-induced dissipative terms and the relaxation terms, and we find that there exists a competition between them, leading to an optimum drive amplitude for which the fidelity becomes maximum. For efficient implementation of the search algorithm, precise knowledge of this optimum drive amplitude is essential.

Keywords: dissipation, fidelity, quantum master equation, relaxation, system-environment coupling

Procedia PDF Downloads 79
187 Damage Assessment and Repair for Older Brick Buildings

Authors: Tim D. Sass

Abstract:

The experience of engineers and architects practicing today is typically limited to current building code requirements and modern construction methods and materials. However, many cities have a mix of new and old buildings with many buildings constructed over one hundred years ago when building codes and construction methods were much different. When a brick building sustains damage, a structural engineer is often hired to determine the cause of damage as well as determine the necessary repairs. Forensic studies of dozens of brick buildings shows an appreciation of historical building methods and materials is needed to correctly identify the cause of damage and design an appropriate repair. Damage on an older, brick building can be mistakenly attributed to storms or seismic events when the real source of the damage is deficient original construction. Assessing and remediating damaged brickwork on older brick buildings requires an understanding of the original construction, an understanding of older repair methods, and, an understanding of current building code requirements.

Keywords: brick, damage, deterioration, facade

Procedia PDF Downloads 204
186 The Need for Educational Psychology in Teacher Education for Sustainable Transformation and Security in Nigeria

Authors: Kaltume Kabir Sharrif

Abstract:

Teacher education is the bedrock of educational growth and development of any nation. With development in education all human problems can be overcome. Educational Psychology, on the other hand, is in a strategic position for any programme in teacher education to be successful hence other aspects of societal issues. In other words, no teacher education can be of any help in ensuring transformation and security without adequate study in Educational Psychology. Without adequate knowledge and skills in Educational Psychology the teacher may not function effectively in the course of discharging his duty. It is in view of this, that the paper discusses some aspects of Educational Psychology that are of paramount importance in teacher education for sustainable transformation and security of Nigeria. Some recommendations were offered on the role educational psychology play in resolving security challenges facing the country. These include enriching educational psychology with topics from forensic psychology that will provide the teacher the skills of fighting crime in the school, Behavioural Science Unit should be established in each school to monitor the behavior of students, among others.

Keywords: transformation, security challenges, teacher education, educational psychology

Procedia PDF Downloads 471
185 Genome-Wide Functional Analysis of Phosphatase in Cryptococcus neoformans

Authors: Jae-Hyung Jin, Kyung-Tae Lee, Yee-Seul So, Eunji Jeong, Yeonseon Lee, Dongpil Lee, Dong-Gi Lee, Yong-Sun Bahn

Abstract:

Cryptococcus neoformans causes cryptococcal meningoencephalitis mainly in immunocompromised patients as well as immunocompetent people. But therapeutic options are limited to treat cryptococcosis. Some signaling pathways including cyclic AMP pathway, MAPK pathway, and calcineurin pathway play a central role in the regulation of the growth, differentiation, and virulence of C. neoformans. To understand signaling networks regulating the virulence of C. neoformans, we selected the 114 putative phosphatase genes, one of the major components of signaling networks, in the genome of C. neoformans. We identified putative phosphatases based on annotation in C. neoformans var. grubii genome database provided by the Broad Institute and National Center for Biotechnology Information (NCBI) and performed a BLAST search of phosphatases of Saccharomyces cerevisiae, Aspergillus nidulans, Candida albicans and Fusarium graminearum to Cryptococcus neoformans. We classified putative phosphatases into 14 groups based on InterPro phosphatase domain annotation. Here, we constructed 170 signature-tagged gene-deletion strains through homologous recombination methods for 91 putative phosphatases. We examined their phenotypic traits under 30 different in vitro conditions, including growth, differentiation, stress response, antifungal resistance and virulence-factor production.

Keywords: human fungal pathogen, phosphatase, deletion library, functional genomics

Procedia PDF Downloads 337
184 The Influence of Silica on the Properties of Cementitious Composites

Authors: Eva Stefanovska, Estefania Cuenca, Aleksandra Momirov, Monika Fidanchevska, Liberato Ferrara, Emilija Fidanchevski

Abstract:

Silica is used in construction materials as a part of natural raw materials or as an additive in powder form (micro and nano dimensions). SiO₂ particles in cement act as centers of nucleation, as a filler or as pozzolan material. In this regard, silica improves the microstructure of cementitious composites, increases the mechanical properties, and finally also results into improved durability of the final products. Improved properties of cementitious composites may lead to better structural efficiency, which, together with increased durability, results into increased sustainability signature of structures made with this kind of materials. The aim of the present work was to investigate the influence of silica on the properties of cement. Fly ash (as received and mechanically activated) and synthetized silica (sol-gel method using TEOS as precursor) was used in the investigation as source of silica. Four types of cement mixtures were investigated (reference cement paste, cement paste with addition of 15wt.% as-received fly ash, cement paste with 15 wt.% mechanically activated fly ash and cement paste with 14wt.% mechanically activated fly ash and 1 wt.% silica). The influence of silica on setting time and mechanical properties (2, 7 and 28 days) was followed. As a matter of fact it will be shown that cement paste with composition 85 wt. % cement, 14 wt.% mechanically activated fly ash and 1 wt. % SiO₂ obtained by the sol-gel method was the best performing one, with increased compressive and flexure strength by 9 and 10 % respectively, as compared to the reference mixture. Acknowledgements: 'COST Action CA15202, www.sarcos.eng.cam.ac.uk'

Keywords: cement, fly ash, mechanical properties, silica, sol-gel

Procedia PDF Downloads 120
183 Gaze Patterns of Skilled and Unskilled Sight Readers Focusing on the Cognitive Processes Involved in Reading Key and Time Signatures

Authors: J. F. Viljoen, Catherine Foxcroft

Abstract:

Expert sight readers rely on their ability to recognize patterns in scores, their inner hearing and prediction skills in order to perform complex sight reading exercises. They also have the ability to observe deviations from expected patterns in musical scores. This increases the “Eye-hand span” (reading ahead of the point of playing) in order to process the elements in the score. The study aims to investigate the gaze patterns of expert and non-expert sight readers focusing on key and time signatures. 20 musicians were tasked with playing 12 sight reading examples composed for one hand and five examples composed for two hands to be performed on a piano keyboard. These examples were composed in different keys and time signatures and included accidentals and changes of time signature to test this theory. Results showed that the experts fixate more and for longer on key and time signatures as well as deviations in examples for two hands than the non-expert group. The inverse was true for the examples for one hand, where expert sight readers showed fewer and shorter fixations on key and time signatures as well as deviations. This seems to suggest that experts focus more on the key and time signatures as well as deviations in complex scores to facilitate sight reading. The examples written for one appeared to be too easy for the expert sight readers, compromising gaze patterns.

Keywords: cognition, eye tracking, musical notation, sight reading

Procedia PDF Downloads 118
182 Automatic Adult Age Estimation Using Deep Learning of the ResNeXt Model Based on CT Reconstruction Images of the Costal Cartilage

Authors: Ting Lu, Ya-Ru Diao, Fei Fan, Ye Xue, Lei Shi, Xian-e Tang, Meng-jun Zhan, Zhen-hua Deng

Abstract:

Accurate adult age estimation (AAE) is a significant and challenging task in forensic and archeology fields. Attempts have been made to explore optimal adult age metrics, and the rib is considered a potential age marker. The traditional way is to extract age-related features designed by experts from macroscopic or radiological images followed by classification or regression analysis. Those results still have not met the high-level requirements for practice, and the limitation of using feature design and manual extraction methods is loss of information since the features are likely not designed explicitly for extracting information relevant to age. Deep learning (DL) has recently garnered much interest in imaging learning and computer vision. It enables learning features that are important without a prior bias or hypothesis and could be supportive of AAE. This study aimed to develop DL models for AAE based on CT images and compare their performance to the manual visual scoring method. Chest CT data were reconstructed using volume rendering (VR). Retrospective data of 2500 patients aged 20.00-69.99 years were obtained between December 2019 and September 2021. Five-fold cross-validation was performed, and datasets were randomly split into training and validation sets in a 4:1 ratio for each fold. Before feeding the inputs into networks, all images were augmented with random rotation and vertical flip, normalized, and resized to 224×224 pixels. ResNeXt was chosen as the DL baseline due to its advantages of higher efficiency and accuracy in image classification. Mean absolute error (MAE) was the primary parameter. Independent data from 100 patients acquired between March and April 2022 were used as a test set. The manual method completely followed the prior study, which reported the lowest MAEs (5.31 in males and 6.72 in females) among similar studies. CT data and VR images were used. The radiation density of the first costal cartilage was recorded using CT data on the workstation. The osseous and calcified projections of the 1 to 7 costal cartilages were scored based on VR images using an eight-stage staging technique. According to the results of the prior study, the optimal models were the decision tree regression model in males and the stepwise multiple linear regression equation in females. Predicted ages of the test set were calculated separately using different models by sex. A total of 2600 patients (training and validation sets, mean age=45.19 years±14.20 [SD]; test set, mean age=46.57±9.66) were evaluated in this study. Of ResNeXt model training, MAEs were obtained with 3.95 in males and 3.65 in females. Based on the test set, DL achieved MAEs of 4.05 in males and 4.54 in females, which were far better than the MAEs of 8.90 and 6.42 respectively, for the manual method. Those results showed that the DL of the ResNeXt model outperformed the manual method in AAE based on CT reconstruction of the costal cartilage and the developed system may be a supportive tool for AAE.

Keywords: forensic anthropology, age determination by the skeleton, costal cartilage, CT, deep learning

Procedia PDF Downloads 45
181 Fault Detection and Diagnosis of Broken Bar Problem in Induction Motors Base Wavelet Analysis and EMD Method: Case Study of Mobarakeh Steel Company in Iran

Authors: M. Ahmadi, M. Kafil, H. Ebrahimi

Abstract:

Nowadays, induction motors have a significant role in industries. Condition monitoring (CM) of this equipment has gained a remarkable importance during recent years due to huge production losses, substantial imposed costs and increases in vulnerability, risk, and uncertainty levels. Motor current signature analysis (MCSA) is one of the most important techniques in CM. This method can be used for rotor broken bars detection. Signal processing methods such as Fast Fourier transformation (FFT), Wavelet transformation and Empirical Mode Decomposition (EMD) are used for analyzing MCSA output data. In this study, these signal processing methods are used for broken bar problem detection of Mobarakeh steel company induction motors. Based on wavelet transformation method, an index for fault detection, CF, is introduced which is the variation of maximum to the mean of wavelet transformation coefficients. We find that, in the broken bar condition, the amount of CF factor is greater than the healthy condition. Based on EMD method, the energy of intrinsic mode functions (IMF) is calculated and finds that when motor bars become broken the energy of IMFs increases.

Keywords: broken bar, condition monitoring, diagnostics, empirical mode decomposition, fourier transform, wavelet transform

Procedia PDF Downloads 128
180 Rapid Method for the Determination of Acid Dyes by Capillary Electrophoresis

Authors: Can Hu, Huixia Shi, Hongcheng Mei, Jun Zhu, Hongling Guo

Abstract:

Textile fibers are important trace evidence and frequently encountered in criminal investigations. A significant aspect of fiber evidence examination is the determination of fiber dyes. Although several instrumental methods have been developed for dyes detection, the analysis speed is not fast enough yet. A rapid dye analysis method is still needed to further improve the efficiency of case handling. Capillary electrophoresis has the advantages of high separation speed and high separation efficiency and is an ideal method for the rapid analysis of fiber dyes. In this paper, acid dyes used for protein fiber dyeing were determined by a developed short-end injection capillary electrophoresis technique. Five acid red dyes with similar structures were successfully baseline separated within 5 min. The separation reproducibility is fairly good for the relative standard deviation of retention time is 0.51%. The established method is rapid and accurate which has great potential to be applied in forensic setting.

Keywords: acid dyes, capillary electrophoresis, fiber evidence, rapid determination

Procedia PDF Downloads 125
179 The Translational Fandom of Marvel Cinematic Universe in the Outlier of Chinese Television Culture

Authors: Xiao Yao

Abstract:

The escalating tech innovation in new media culture is liberating audiences from passive consumption to more productive and critical engagement with the legacy and streaming television media. However, how fan translation is furthering the reception and interpretation of global screen stories remains the outlier of television studies. This paper will showcase the fan-based cross-cultural engagement with the Marvel Cinematic Universe (MCU) in China. This is to highlight: 1) the ways marginal audiences (Chinese MCU fans) seek to sync with the recent telecinematic expansion of MCU; 2) the forensic and interpretative works done by Chinese MCU fans who persistently seek to amplify the pleasure of MCU content in their media contexts; 3) the crucial but largely unacknowledged cultural value generated by Chinese MCU fandom in the outlier of contemporary Chinese TV culture. Taken together, this study aims to further explore the notion of “translational fandom” and integrate its theorisation into the present research in television culture.

Keywords: Chinese MCU fans, cross-cultural engagement, Loki, television media, translational fandom

Procedia PDF Downloads 100
178 Elemental and Magnetic Properties of Bed Sediment of Siang River, a Major River of Brahmaputra Basin

Authors: Abhishek Dixit, Sandip S. Sathe, Chandan Mahanta

Abstract:

The Siang river originates in Angsi glacier in southern Tibet (there known as the Yarlung Tsangpo). After traveling through Indus-Tsangpo suture zone and deep gorges near Namcha Barwa peak, it takes a south-ward turn and enters India, where it is known as Siang river and becomes a major tributary of the Brahmaputra in Assam plains. In this study, we have analyzed the bed sediment of the Siang river at two locations (one at extreme upstream near the India-China border and one downstream before Siang Brahmaputra confluence). We have also sampled bed sediment at the remote location of Yammeng river, an eastern tributary of Siang. The magnetic hysteresis properties show the combination of paramagnetic and weak ferromagnetic behavior with a multidomain state. Moreover, curie temperature analysis shows titanomagnetite solid solution series, which is causing the weak ferromagnetic signature. Given that the magnetic mineral was in a multidomain state, the presence of Ti, Fe carrying heave mineral, may be inferred. The Chemical index of alteration shows less weathered sediment. However, the Yammeng river sample being close to source shows fresh grains subjected to physical weathering and least chemically alteration. Enriched Ca and K and depleted Na and Mg with respect to upper continental crust concentration also points toward the less intense chemical weathering along with the dominance of calcite weathering.

Keywords: bed sediment, magnetic properties, Siang, weathering

Procedia PDF Downloads 101
177 Using Autoencoder as Feature Extractor for Malware Detection

Authors: Umm-E-Hani, Faiza Babar, Hanif Durad

Abstract:

Malware-detecting approaches suffer many limitations, due to which all anti-malware solutions have failed to be reliable enough for detecting zero-day malware. Signature-based solutions depend upon the signatures that can be generated only when malware surfaces at least once in the cyber world. Another approach that works by detecting the anomalies caused in the environment can easily be defeated by diligently and intelligently written malware. Solutions that have been trained to observe the behavior for detecting malicious files have failed to cater to the malware capable of detecting the sandboxed or protected environment. Machine learning and deep learning-based approaches greatly suffer in training their models with either an imbalanced dataset or an inadequate number of samples. AI-based anti-malware solutions that have been trained with enough samples targeted a selected feature vector, thus ignoring the input of leftover features in the maliciousness of malware just to cope with the lack of underlying hardware processing power. Our research focuses on producing an anti-malware solution for detecting malicious PE files by circumventing the earlier-mentioned shortcomings. Our proposed framework, which is based on automated feature engineering through autoencoders, trains the model over a fairly large dataset. It focuses on the visual patterns of malware samples to automatically extract the meaningful part of the visual pattern. Our experiment has successfully produced a state-of-the-art accuracy of 99.54 % over test data.

Keywords: malware, auto encoders, automated feature engineering, classification

Procedia PDF Downloads 49
176 Adherence of Trauma and Orthopaedics Surgery Operative Notes to the RCS Good Surgical Practice Guidelines in Ashford and St. Peter's Hospital

Authors: Maryam Risla Shahul Hameed, Tharsiga Yogarajah, Fritzy Mathew, Tayyaba Syed, Shalin Shaunak

Abstract:

Aim: Auditing the adherence of Trauma and Orthopaedics Operative notes to the RCS Good Surgical Practice Guidelines. Method: Clinical audit conducted on 150 operative notes over a period of 2 months April- May 2023, including emergency and elective surgeries performed in Ashford and St. Peter’s Hospital. The RCS Good Practice Surgical Guidelines for an ideal operative note were used to compare.Results: Date of the procedure and signature of the surgeon were mentioned in all the notes by default in the electronic template being used. Title of the operation performed and whether elective or emergency were mentioned by 92% and 45%, respectively. Name of theatre anaesthetist and operating surgeons were mentioned by 73% and 93% respectively. Time of surgery mentioned by 26%. Operative findings and operative diagnosis mentioned by 83% and 53% respectively. Incision and complications of surgery mentioned in 80% and 53%, respectively. Details of tissue added/ altered/ removed mentioned by 46%. Information on prosthesis or implant used is mentioned by 54%. Details of closure and anticipated blood loss mentioned in 91% and 45% respectively. Antibiotic prophylaxis was mentioned by 63%, out of which only 23% mentioned the name and duration of the antibiotic. VTE prophylaxis was mentioned by 84%, out of which only 23% and 29% mentioned the name and duration of the prophylaxis, respectively. Conclusion: There is more for improvement in the operative notes for better continuity of care between the operating surgeons and other doctors in the wards taking care of the patients post operatively. We recommend to follow a standardized guidelines by all the nationwide and a standard template to be followed by all.

Keywords: surgery, notes, RCS, guidelines

Procedia PDF Downloads 136
175 Visualization of Latent Sweat Fingerprints Deposit on Paper by Infrared Radiation and Blue Light

Authors: Xiaochun Huang, Xuejun Zhao, Yun Zou, Feiyu Yang, Wenbin Liu, Nan Deng, Ming Zhang, Nengbin Cai

Abstract:

A simple device termed infrared radiation (IR) was developed for rapid visualization of sweat fingerprints deposit on paper with blue light (450 nm, 11 W). In this approach, IR serves as the pretreatment device before the sweat fingerprints was illuminated by blue light. An annular blue light source was adopted for visualizing latent sweat fingerprints. Sample fingerprints were examined under various conditions after deposition, and experimental results indicate that the recovery rate of the latent sweat fingerprints is in the range of 50%-100% without chemical treatments. A mechanism for the observed visibility is proposed based on transportation and re-impregnation of fluorescer in paper at the region of water. And further exploratory experimental results gave the full support to the visible mechanism. Therefore, such a method as IR-pretreated in detecting latent fingerprints may be better for examination in the case where biological information of samples is needed for consequent testing.

Keywords: forensic science, visualization, infrared radiation, blue light, latent sweat fingerprints, detection

Procedia PDF Downloads 476
174 Biodegradation Effects onto Source Identification of Diesel Fuel Contaminated Soils

Authors: Colin S. Chen, Chien-Jung Tien, Hsin-Jan Huang

Abstract:

For weathering studies, the change of chemical constituents by biodegradation effect in diesel-contaminated soils are important factors to be considered, especially when there is a prolonged period of weathering processes. The objective was to evaluate biodegradation effects onto hydrocarbon fingerprinting and distribution patterns of diesel fuels, fuel source screening and differentiation, source-specific marker compounds, and diagnostic ratios of diesel fuel constituents by laboratory and field studies. Biodegradation processes of diesel contaminated soils were evaluated by experiments lasting for 15 and 12 months, respectively. The degradation of diesel fuel in top soils was affected by organic carbon content and biomass of microorganisms in soils. Higher depletion of total petroleum hydrocarbon (TPH), n-alkanes, and polynuclear aromatic hydrocarbons (PAHs) and their alkyl homologues was observed in soils containing higher organic carbon content and biomass. Decreased ratio of selected isoprenoids (i.e., pristane (Pr) and phytane (Ph)) including n-C17/pristane and n-C18/phytane was observed. The ratio of pristane/phytane was remained consistent for a longer period of time. At the end of the experimental period, a decrease of pristane/phytane was observed. Biomarker compounds of bicyclic sesquiterpanes (BS) were less susceptible to the effects of biodegradation. The ratios of characteristic factors such as C15 sesquiterpane/ 8β(H)-drimane (BS3/BS5), C15 sesquiterpane/ 8β(H)-drimane (BS4/BS5), 8β(H)-drimane/8β(H)-homodrimane (BS5/BS10), and C15 sesquiterpane/8β(H)-homodrimane (BS3/BS10) could be adopted for source identification of diesel fuels in top soil. However, for biodegradation processes lasted for six months but shorter than nine months, only BS3/BS5 and BS3/BS10 could be distinguished in two diesel fuels. In subsoil experiments (contaminated soil located 50 cm below), the ratios of characteristic factors including BS3/BS5, BS4/BS5, and BS5/BS10 were valid for source identification of two diesel fuels for nine month biodegradation. At the early stage of contamination, biomass of soil decreased significantly. However, 6 and 7 dominant species were found in soils in top soil experiments, respectively. With less oxygen and nutrients in subsoil, less biomass of microorganisms was observed in subsoils. Only 2 and 4 diesel-degrading species of microorganisms were identified in two soils, respectively. Parameters of double ratio such as fluorene/C1-fluorene: C2-phenanthrene/C3-phenanthrene (C0F/C1F:C2P/C3P) in both top and subsoil, C2-naphthalene/C2-phenanthrene: C1-phenanthrene/C3-phenanthrene (C2N/C2P:C1P/C3P), and C1-phenanthrene/C1-fluorene: C3-naphthalene/C3-phenanthrene (C1P/C1F:C3N/C3P) in subsoil could serve as forensic indicators in diesel contaminated sites. BS3/BS10:BS4/BS5 could be used in 6 to 9 months of biodegradation processes. Results of principal component analysis (PCA) indicated that source identification of diesel fuels in top soil could only be perofrmed for weathering process less than 6 months. For subsoil, identification can be conducted for weathering process less than 9 months. Ratio of isoprenoids (pristane and phytane) and PAHs might be affected by biodegradation in spilled sites. The ratios of bicyclic sesquiterpanes could serve as forensic indicators in diesel-contaminated soils. Finally, source identification was attemped for samples collected from different fuel contaminated sites by using the unique pattern of sesquiterpanes. It was anticipated that the information generated from this study would be adopted by decision makers to evaluate the liability of cleanup in diesel contaminated sites.

Keywords: biodegradation, diagnostic ratio, diesel fuel, environmental forensics

Procedia PDF Downloads 195
173 Bile Salt Induced Microstructural Changes of Gemini Surfactant Micelles

Authors: Vijaykumar Patel, P. Bahadur

Abstract:

Microstructural evolution of a cationic gemini surfactant 12-4-12 micelles in the presence of bile salts has been investigated using different techniques. A negative value of interaction parameter evaluated from surface tension measurements is a signature of strong synergistic interaction between oppositely charged surfactants. Both the bile salts compete with each other in inducing the micellar transition of 12-4-12 micelles depending on their hydrophobicity. Viscosity measurements disclose that loading of bile salts induces morphological changes in 12-4-12 micelles; sodium deoxycholate is more efficient in altering the aggregation behaviour of 12-4-12 micelles compared to sodium cholate and presents pronounced increase in viscosity and micellar growth which is suppressed at elevated temperatures. A remarkable growth of 12-4-12 micelles in the presence of sodium deoxycholate at low pH has been ascribed to the solubilization of bile acids formed in acidic medium. Small angle neutron scattering experiments provided size and shape of 12-4-12/bile salt mixed micelles are explicated on the basis of hydrophobicity of bile salts. The location of bile salts in micelle was determined from nuclear overhauser effect spectroscopy. The present study characterizes 12-4-12 gemini-bile salt mixed systems which significantly enriches our knowledge, and such a structural transition provides an opportunity to use these bioamphiphiles as delivery vehicles and in some pharmaceutical formulations.

Keywords: gemini surfactants, bile salts, SANS (small angle neutron scattering), NOESY (nuclear overhauser effect spectroscopy)

Procedia PDF Downloads 132
172 Development of Zinc Oxide Coated Carbon Nanoparticles from Pineapples Leaves Using SOL Gel Method for Optimal Adsorption of Copper ion and Reuse in Latent Fingerprint

Authors: Bienvenu Gael Fouda Mbanga, Zikhona Tywabi-Ngeva, Kriveshini Pillay

Abstract:

This work highlighted a new method for preparing Nitrogen carbon nanoparticles fused on zinc oxide nanoparticle nanocomposite (N-CNPs/ZnONPsNC) to remove copper ions (Cu²+) from wastewater by sol-gel method and applying the metal-loaded adsorbent in latent fingerprint application. The N-CNPs/ZnONPsNC showed to be an effective sorbent for optimum Cu²+ sorption at pH 8 and 0.05 g dose. The Langmuir isotherm was found to best fit the process, with a maximum adsorption capacity of 285.71 mg/g, which was higher than most values found in other research for Cu²+ removal. Adsorption was spontaneous and endothermic at 25oC. In addition, the Cu²+-N-CNPs/ZnONPsNC was found to be sensitive and selective for latent fingerprint (LFP) recognition on a range of porous surfaces. As a result, in forensic research, it is an effective distinguishing chemical for latent fingerprint detection.

Keywords: latent fingerprint, nanocomposite, adsorption, copper ions, metal loaded adsorption, adsorbent

Procedia PDF Downloads 57
171 Time Parameter Based for the Detection of Catastrophic Faults in Analog Circuits

Authors: Arabi Abderrazak, Bourouba Nacerdine, Ayad Mouloud, Belaout Abdeslam

Abstract:

In this paper, a new test technique of analog circuits using time mode simulation is proposed for the single catastrophic faults detection in analog circuits. This test process is performed to overcome the problem of catastrophic faults being escaped in a DC mode test applied to the inverter amplifier in previous research works. The circuit under test is a second-order low pass filter constructed around this type of amplifier but performing a function that differs from that of the previous test. The test approach performed in this work is based on two key- elements where the first one concerns the unique square pulse signal selected as an input vector test signal to stimulate the fault effect at the circuit output response. The second element is the filter response conversion to a square pulses sequence obtained from an analog comparator. This signal conversion is achieved through a fixed reference threshold voltage of this comparison circuit. The measurement of the three first response signal pulses durations is regarded as fault effect detection parameter on one hand, and as a fault signature helping to hence fully establish an analog circuit fault diagnosis on another hand. The results obtained so far are very promising since the approach has lifted up the fault coverage ratio in both modes to over 90% and has revealed the harmful side of faults that has been masked in a DC mode test.

Keywords: analog circuits, analog faults diagnosis, catastrophic faults, fault detection

Procedia PDF Downloads 419
170 A Study on Abnormal Behavior Detection in BYOD Environment

Authors: Dongwan Kang, Joohyung Oh, Chaetae Im

Abstract:

Advancement of communication technologies and smart devices in the recent times is leading to changes into the integrated wired and wireless communication environments. Since early days, businesses had started introducing environments for mobile device application to their operations in order to improve productivity (efficiency) and the closed corporate environment gradually shifted to an open structure. Recently, individual user's interest in working environment using mobile devices has increased and a new corporate working environment under the concept of BYOD is drawing attention. BYOD (bring your own device) is a concept where individuals bring in and use their own devices in business activities. Through BYOD, businesses can anticipate improved productivity (efficiency) and also a reduction in the cost of purchasing devices. However, as a result of security threats caused by frequent loss and theft of personal devices and corporate data leaks due to low security, companies are reluctant about adopting BYOD system. In addition, without considerations to diverse devices and connection environments, there are limitations in detecting abnormal behaviors such as information leaks which use the existing network-based security equipment. This study suggests a method to detect abnormal behaviors according to individual behavioral patterns, rather than the existing signature-based malicious behavior detection and discusses applications of this method in BYOD environment.

Keywords: BYOD, security, anomaly behavior detection, security equipment, communication technologies

Procedia PDF Downloads 299
169 Classification of Hyperspectral Image Using Mathematical Morphological Operator-Based Distance Metric

Authors: Geetika Barman, B. S. Daya Sagar

Abstract:

In this article, we proposed a pixel-wise classification of hyperspectral images using a mathematical morphology operator-based distance metric called “dilation distance” and “erosion distance”. This method involves measuring the spatial distance between the spectral features of a hyperspectral image across the bands. The key concept of the proposed approach is that the “dilation distance” is the maximum distance a pixel can be moved without changing its classification, whereas the “erosion distance” is the maximum distance that a pixel can be moved before changing its classification. The spectral signature of the hyperspectral image carries unique class information and shape for each class. This article demonstrates how easily the dilation and erosion distance can measure spatial distance compared to other approaches. This property is used to calculate the spatial distance between hyperspectral image feature vectors across the bands. The dissimilarity matrix is then constructed using both measures extracted from the feature spaces. The measured distance metric is used to distinguish between the spectral features of various classes and precisely distinguish between each class. This is illustrated using both toy data and real datasets. Furthermore, we investigated the role of flat vs. non-flat structuring elements in capturing the spatial features of each class in the hyperspectral image. In order to validate, we compared the proposed approach to other existing methods and demonstrated empirically that mathematical operator-based distance metric classification provided competitive results and outperformed some of them.

Keywords: dilation distance, erosion distance, hyperspectral image classification, mathematical morphology

Procedia PDF Downloads 59
168 Characterization of the Intestinal Microbiota: A Signature in Fecal Samples from Patients with Irritable Bowel Syndrome

Authors: Mina Hojat Ansari, Kamran Bagheri Lankarani, Mohammad Reza Fattahi, Ali Reza Safarpour

Abstract:

Irritable bowel syndrome (IBS) is a common bowel disorder which is usually diagnosed through the abdominal pain, fecal irregularities and bloating. Alteration in the intestinal microbial composition is implicating to inflammatory and functional bowel disorders which is recently also noted as an IBS feature. Owing to the potential importance of microbiota implication in both efficiencies of the treatment and prevention of the diseases, we examined the association between the intestinal microbiota and different bowel patterns in a cohort of subjects with IBS and healthy controls. Fresh fecal samples were collected from a total of 50 subjects, 30 of whom met the Rome IV criteria for IBS and 20 Healthy control. Total DNA was extracted and library preparation was conducted following the standard protocol for small whole genome sequencing. The pooled libraries sequenced on an Illumina Nextseq platform with a 2 × 150 paired-end read length and obtained sequences were analyzed using several bioinformatics programs. The majority of sequences obtained in the current study assigned to bacteria. However, our finding highlighted the significant microbial taxa variation among the studied groups. The result, therefore, suggests a significant association of the microbiota with symptoms and bowel characteristics in patients with IBS. These alterations in fecal microbiota could be exploited as a biomarker for IBS or its subtypes and suggest the modification of the microbiota might be integrated into prevention and treatment strategies for IBS.

Keywords: irritable bowel syndrome, intestinal microbiota, small whole genome sequencing, fecal samples, Illumina

Procedia PDF Downloads 134
167 Collaboration of UNFPA and USAID to Mobilize Domestic Government Resources for Contraceptive Procurement in Madagascar

Authors: Josiane Yaguibou, Ngoy Kishimba, Issiaka v. Coulibaly, Sabrina Pestilli, Falinirina Razanalison, Hantanirina Andremanisa

Abstract:

Background: In recent years, Madagascar has faced a significant reduction in donors’ financial resources for the purchase of contraceptive products to meet the family planning needs of the population. In order to ensure the sustainability of the family planning program in the current context, UNFPA Madagascar engaged in a series of initiatives with the ultimate scope of identifying sustainable financing mechanisms for the program. Program intervention: UNFPA Madagascar established a strict collaboration with USAID to engage in a series of joint advocacy and resource mobilization activities with the government. The following initiatives were conducted: (i) Organization of a high-level Round Table to engage the government; (ii) Support to the government in renewing the FP2030 Commitments; (iii) Signature of the Country Compact 2022-2024; (iv) Allocation of government funds in 2022 and 2023 of over 829,222 USD; (v) Obtaining a Matching Fund of 1.5 million USD from UNFPA to encourage the government to allocate resources for the purchase of contraceptive products. Program Implications: The collaboration and the joint advocacy made it possible to (i) have budgetary allocations from the government to purchase products in 2022 and 2023 with a significant reduction in financing gaps; (ii) to convince the government to seek additional financing from partners such as the World Bank which granted more than 8 million USD for the purchase of products; (iii) reduce stock shortages from more than 30% to 15%.

Keywords: UNFPA, USAID, collaboration, contraceptives

Procedia PDF Downloads 42
166 O.MG- It’s a Cyber-Enabled Fraud

Authors: Damola O. Lawal, David W. Gresty, Diane E. Gan, Louise Hewitt

Abstract:

This paper investigates the feasibility of using a programmable USB such as the O.MG Cable to perform a file tampering attack. Here, the O.MG Cable, an apparently harmless mobile device charger, is used in an unauthorized way to alter the content of a file (accounts record-January_Contributions.xlsx). The aim is to determine if a forensics analyst can reliably determine who has altered the target file; the O.MG Cable or the user of the machine. This work highlights some of the traces of the O.MG Cable left behind on the target computer itself, such as the Product ID (PID) and Vendor ID (ID). Also discussed is the O.MG Cable’s behavior during the experiments. We determine if a forensics analyst could identify if any evidence has been left behind by the programmable device on the target file once it has been removed from the computer to establish if the analyst would be able to link the traces left by the O.MG Cable to the file tampering. It was discovered that the forensic analyst might mistake the actions of the O.MG Cable for the computer users. Experiments carried out in this work could further the discussion as to whether an innocent user could be punished for the unauthorized changes made by a programmable device.

Keywords: O.MG cable, programmable USB, file tampering attack, digital evidence credibility, miscarriage of justice, cyber fraud

Procedia PDF Downloads 132
165 Design of an Improved Distributed Framework for Intrusion Detection System Based on Artificial Immune System and Neural Network

Authors: Yulin Rao, Zhixuan Li, Burra Venkata Durga Kumar

Abstract:

Intrusion detection refers to monitoring the actions of internal and external intruders on the system and detecting the behaviours that violate security policies in real-time. In intrusion detection, there has been much discussion about the application of neural network technology and artificial immune system (AIS). However, many solutions use static methods (signature-based and stateful protocol analysis) or centralized intrusion detection systems (CIDS), which are unsuitable for real-time intrusion detection systems that need to process large amounts of data and detect unknown intrusions. This article proposes a framework for a distributed intrusion detection system (DIDS) with multi-agents based on the concept of AIS and neural network technology to detect anomalies and intrusions. In this framework, multiple agents are assigned to each host and work together, improving the system's detection efficiency and robustness. The trainer agent in the central server of the framework uses the artificial neural network (ANN) rather than the negative selection algorithm of AIS to generate mature detectors. Mature detectors can distinguish between self-files and non-self-files after learning. Our analyzer agents use genetic algorithms to generate memory cell detectors. This kind of detector will effectively reduce false positive and false negative errors and act quickly on known intrusions.

Keywords: artificial immune system, distributed artificial intelligence, multi-agent, intrusion detection system, neural network

Procedia PDF Downloads 83
164 Characterization of Kopff Crater Using Remote Sensing Data

Authors: Shreekumari Patel, Prabhjot Kaur, Paras Solanki

Abstract:

Moon Mineralogy Mapper (M3), Miniature Radio Frequency (Mini-RF), Kaguya Terrain Camera images, Lunar Orbiter Laser Altimeter (LOLA) digital elevation model (DEM) and Lunar Reconnaissance Orbiter Camera (LROC)- Narrow angle camera (NAC) and Wide angle camera (WAC) images were used to study mineralogy, surface physical properties, and age of the 42 km diameter Kopff crater. M3 indicates the low albedo crater floor to be high-Ca pyroxene dominated associated with floor fracture suggesting the igneous activity of the gabbroic material. Signature of anorthositic material is sampled on the eastern edge as target material is excavated from ~3 km diameter impact crater providing access to the crustal composition. Several occurrences of spinel were detected in northwestern rugged terrain. Our observation can be explained by exposure of spinel by this crater that impacted onto the inner rings of Orientale basin. Spinel was part of the pre-impact target, an intrinsic unit of basin ring. Crater floor was dated by crater counts performed on Kaguya TC images. Nature of surface was studied in detail with LROC NAC and Mini-RF. Freshly exposed surface and boulder or debris seen in LROC NAC images have enhanced radar signal in comparison to mature terrain of Kopff crater. This multidisciplinary analysis of remote sensing data helps to assess lunar surface in detail.

Keywords: crater, mineralogy, moon, radar observations

Procedia PDF Downloads 133
163 Cytochrome B Marker Reveals Three Distinct Genetic Lineages of the Oriental Latrine Fly Chrysomya megacephala (Diptera: Calliphoridae) in Malaysia

Authors: Rajagopal Kavitha, Van Lun Low, Mohd Sofian-Azirun, Chee Dhang Chen, Mohd Yusof Farida Zuraina, Mohd Salleh Ahmad Firdaus, Navaratnam Shanti, Abdul Haiyee Zaibunnisa

Abstract:

This study investigated the hidden genetic lineages in the oriental latrine fly Chrysomya megacephala (Fabricius) across four states (i.e., Johore, Pahang, Perak and Selangor) and a federal territory (i.e., Kuala Lumpur) in Malaysia using Cytochrome b (Cyt b) genetic marker. The Cyt b phylogenetic tree and haplotype network revealed three distinct genetic lineages of Ch. megacephala. Lineage A, the basal clade was restricted to flies that originated from Kuala Lumpur and Selangor, while Lineages B and C, comprised of flies from all studied populations. An overlap of the three genetically divergent groups of Ch. megacephala was observed. However, the flies from both Kuala Lumpur and Selangor populations consisted of three different lineages, indicating that they are genetically diverse compared to those from Pahang, Perak and Johore.

Keywords: forensic entomology, calliphoridae, mitochondrial DNA, cryptic lineage

Procedia PDF Downloads 482