Search results for: forensic signature analysis
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 27681

Search results for: forensic signature analysis

27381 Customer Satisfaction with Artificial Intelligence-Based Service in Catering Industry: Empirical Study on Smart Kiosks

Authors: Mai Anh Tuan, Wenlong Liu, Meng Li

Abstract:

Despite warnings and concerns about the use of fast food that has health effects, the fast-food industry is actually a source of profit for the global food industry. Obviously, in the face of such huge economic benefits, investors will not hesitate to continuously add recipes, processing methods, menu diversity, etc., to improve and apply information technology in enhancing the diners' experience; the ultimate goal is still to attract diners to find their brand and give them the fastest, most convenient and enjoyable service. In China, as the achievements of the industrial revolution 4.0, big data and artificial intelligence are reaching new heights day by day, now fast-food diners can instantly pay the bills only by identifying the biometric signature available on the self-ordering kiosk, using their own face without any additional form of confirmation. In this study, the author will evaluate the acceptance level of customers with this new form of payment through a survey of customers who have used and witnessed the use of smart kiosks and biometric payments within the city of Nanjing, China. A total of 200 valid volunteers were collected in order to test the customers' intentions and feelings when choosing and experiencing payment through AI services. 55% think that it bothers them because of the need for personal information, but more than 70% think that smart kiosk brings out many benefits and convenience. According to the data analysis findings, perceived innovativeness has a positive influence on satisfaction which in turn affects behavioral intentions, including reuse and word-of-mouth intentions.

Keywords: artificial intelligence, catering industry, smart kiosks, technology acceptance

Procedia PDF Downloads 88
27380 Automatic Adult Age Estimation Using Deep Learning of the ResNeXt Model Based on CT Reconstruction Images of the Costal Cartilage

Authors: Ting Lu, Ya-Ru Diao, Fei Fan, Ye Xue, Lei Shi, Xian-e Tang, Meng-jun Zhan, Zhen-hua Deng

Abstract:

Accurate adult age estimation (AAE) is a significant and challenging task in forensic and archeology fields. Attempts have been made to explore optimal adult age metrics, and the rib is considered a potential age marker. The traditional way is to extract age-related features designed by experts from macroscopic or radiological images followed by classification or regression analysis. Those results still have not met the high-level requirements for practice, and the limitation of using feature design and manual extraction methods is loss of information since the features are likely not designed explicitly for extracting information relevant to age. Deep learning (DL) has recently garnered much interest in imaging learning and computer vision. It enables learning features that are important without a prior bias or hypothesis and could be supportive of AAE. This study aimed to develop DL models for AAE based on CT images and compare their performance to the manual visual scoring method. Chest CT data were reconstructed using volume rendering (VR). Retrospective data of 2500 patients aged 20.00-69.99 years were obtained between December 2019 and September 2021. Five-fold cross-validation was performed, and datasets were randomly split into training and validation sets in a 4:1 ratio for each fold. Before feeding the inputs into networks, all images were augmented with random rotation and vertical flip, normalized, and resized to 224×224 pixels. ResNeXt was chosen as the DL baseline due to its advantages of higher efficiency and accuracy in image classification. Mean absolute error (MAE) was the primary parameter. Independent data from 100 patients acquired between March and April 2022 were used as a test set. The manual method completely followed the prior study, which reported the lowest MAEs (5.31 in males and 6.72 in females) among similar studies. CT data and VR images were used. The radiation density of the first costal cartilage was recorded using CT data on the workstation. The osseous and calcified projections of the 1 to 7 costal cartilages were scored based on VR images using an eight-stage staging technique. According to the results of the prior study, the optimal models were the decision tree regression model in males and the stepwise multiple linear regression equation in females. Predicted ages of the test set were calculated separately using different models by sex. A total of 2600 patients (training and validation sets, mean age=45.19 years±14.20 [SD]; test set, mean age=46.57±9.66) were evaluated in this study. Of ResNeXt model training, MAEs were obtained with 3.95 in males and 3.65 in females. Based on the test set, DL achieved MAEs of 4.05 in males and 4.54 in females, which were far better than the MAEs of 8.90 and 6.42 respectively, for the manual method. Those results showed that the DL of the ResNeXt model outperformed the manual method in AAE based on CT reconstruction of the costal cartilage and the developed system may be a supportive tool for AAE.

Keywords: forensic anthropology, age determination by the skeleton, costal cartilage, CT, deep learning

Procedia PDF Downloads 67
27379 An Earth Mover’s Distance Algorithm Based DDoS Detection Mechanism in SDN

Authors: Yang Zhou, Kangfeng Zheng, Wei Ni, Ren Ping Liu

Abstract:

Software-defined networking (SDN) provides a solution for scalable network framework with decoupled control and data plane. However, this architecture also induces a particular distributed denial-of-service (DDoS) attack that can affect or even overwhelm the SDN network. DDoS attack detection problem has to date been mostly researched as entropy comparison problem. However, this problem lacks the utilization of SDN, and the results are not accurate. In this paper, we propose a DDoS attack detection method, which interprets DDoS detection as a signature matching problem and is formulated as Earth Mover’s Distance (EMD) model. Considering the feasibility and accuracy, we further propose to define the cost function of EMD to be a generalized Kullback-Leibler divergence. Simulation results show that our proposed method can detect DDoS attacks by comparing EMD values with the ones computed in the case without attacks. Moreover, our method can significantly increase the true positive rate of detection.

Keywords: DDoS detection, EMD, relative entropy, SDN

Procedia PDF Downloads 330
27378 Auteur 3D Filmmaking: From Hitchcock’s Protrusion Technique to Godard’s Immersion Aesthetic

Authors: Delia Enyedi

Abstract:

Throughout film history, the regular return of 3D cinema has been discussed in connection to crises caused by the advent of television or the competition of the Internet. In addition, the three waves of stereoscopic 3D (from 1952 up to 1983) and its current digital version have been blamed for adding a challenging technical distraction to the viewing experience. By discussing the films Dial M for Murder (1954) and Goodbye to Language (2014), the paper aims to analyze the response of recognized auteurs to the use of 3D techniques in filmmaking. For Alfred Hitchcock, the solution to attaining perceptual immersion paradoxically resided in restraining the signature effect of 3D, namely protrusion. In Jean-Luc Godard’s vision, 3D techniques allowed him to explore perceptual absorption by means of depth of field, for which he had long advocated as being central to cinema. Thus, both directors contribute to the foundation of an auteur aesthetic in 3D filmmaking.

Keywords: Alfred Hitchcock, authorship, 3D filmmaking, Jean-Luc Godard, perceptual absorption, perceptual immersion

Procedia PDF Downloads 283
27377 The Evolution of Man through Cranial and Dental Remains: A Literature Review

Authors: Rishana Bilimoria

Abstract:

Darwin’s insightful anthropological theory on the evolution drove mankind’s understanding of our existence in the natural world. Scientists consider analysis of dental and craniofacial remains to be pivotal in uncovering facts about our evolutionary journey. The resilient mineral content of enamel and dentine allow cranial and dental remains to be preserved for millions of years, making it an excellent resource not only in anthropology but other fields of research including forensic dentistry. This literature review aims to chronologically approach each ancestral species, reviewing Australopithecus, Paranthropus, Homo Habilis, Homo Rudolfensis, Homo Erectus, Homo Neanderthalis, and finally Homo Sapiens. Studies included in the review assess the features of cranio-dental remains that are of evolutionary importance, such as microstructure, microwear, morphology, and jaw biomechanics. The article discusses the plethora of analysis techniques employed to study dental remains including carbon dating, dental topography, confocal imaging, DPI scanning and light microscopy, in addition to microwear study and analysis of features such as coronal and root morphology, mandibular corpus shape, craniofacial anatomy and microstructure. Furthermore, results from these studies provide insight into the diet, lifestyle and consequently, ecological surroundings of each species. We can correlate dental fossil evidence with wider theories on pivotal global events, to help us contextualize each species in space and time. Examples include dietary adaptation during the period of global cooling converting the landscape of Africa from forest to grassland. Global migration ‘out of Africa’ can be demonstrated by enamel thickness variation, cranial vault variation over time demonstrates accommodation to larger brain sizes, and dental wear patterns can place the commencement of lithic technology in history. Conclusions from this literature review show that dental evidence plays a major role in painting a phenotypic and all rounded picture of species of the Homo genus, in particular, analysis of coronal morphology through carbon dating and dental wear analysis. With regards to analysis technique, whilst studies require larger sample sizes, this could be unrealistic since there are limitations in ability to retrieve fossil data. We cannot deny the reliability of carbon dating; however, there is certainly scope for the use of more recent techniques, and further evidence of their success is required.

Keywords: cranio-facial, dental remains, evolution, hominids

Procedia PDF Downloads 159
27376 A Novel Methodology for Browser Forensics to Retrieve Searched Keywords from Windows 10 Physical Memory Dump

Authors: Dija Sulekha

Abstract:

Nowadays, a good percentage of reported cybercrimes involve the usage of the Internet, directly or indirectly for committing the crime. Usually, Web Browsers leave traces of browsing activities on the host computer’s hard disk, which can be used by investigators to identify internet-based activities of the suspect. But criminals, who involve in some organized crimes, disable browser file generation feature to hide the evidence while doing illegal activities through the Internet. In such cases, even though browser files were not generated in the storage media of the system, traces of recent and ongoing activities were generated in the Physical Memory of the system. As a result, the analysis of Physical Memory Dump collected from the suspect's machine retrieves lots of forensically crucial information related to the browsing history of the Suspect. This information enables the cyber forensic investigators to concentrate on a few highly relevant selected artefacts while doing the Offline Forensics analysis of storage media. This paper addresses the reconstruction of web browsing activities by conducting live forensics to identify searched terms, downloaded files, visited sites, email headers, email ids, etc. from the physical memory dump collected from Windows 10 Systems. Well-known entry points are available for retrieving all the above artefacts except searched terms. The paper describes a novel methodology to retrieve the searched terms from Windows 10 Physical Memory. The searched terms retrieved in this way can be used for doing advanced file and keyword search in the storage media files reconstructed from the file system recovery in offline forensics.

Keywords: browser forensics, digital forensics, live Forensics, physical memory forensics

Procedia PDF Downloads 111
27375 CVOIP-FRU: Comprehensive VoIP Forensics Report Utility

Authors: Alejandro Villegas, Cihan Varol

Abstract:

Voice over Internet Protocol (VoIP) products is an emerging technology that can contain forensically important information for a criminal activity. Without having the user name and passwords, this forensically important information can still be gathered by the investigators. Although there are a few VoIP forensic investigative applications available in the literature, most of them are particularly designed to collect evidence from the Skype product. Therefore, in order to assist law enforcement with collecting forensically important information from variety of Betamax VoIP tools, CVOIP-FRU framework is developed. CVOIP-FRU provides a data gathering solution that retrieves usernames, contact lists, as well as call and SMS logs from Betamax VoIP products. It is a scripting utility that searches for data within the registry, logs and the user roaming profiles in Windows and Mac OSX operating systems. Subsequently, it parses the output into readable text and html formats. One superior way of CVOIP-FRU compared to the other applications that due to intelligent data filtering capabilities and cross platform scripting back end of CVOIP-FRU, it is expandable to include other VoIP solutions as well. Overall, this paper reveals the exploratory analysis performed in order to find the key data paths and locations, the development stages of the framework, and the empirical testing and quality assurance of CVOIP-FRU.

Keywords: betamax, digital forensics, report utility, VoIP, VoIPBuster, VoIPWise

Procedia PDF Downloads 291
27374 Attack Redirection and Detection using Honeypots

Authors: Chowduru Ramachandra Sharma, Shatunjay Rawat

Abstract:

A false positive state is when the IDS/IPS identifies an activity as an attack, but the activity is acceptable behavior in the system. False positives in a Network Intrusion Detection System ( NIDS ) is an issue because they desensitize the administrator. It wastes computational power and valuable resources when rules are not tuned properly, which is the main issue with anomaly NIDS. Furthermore, most false positives reduction techniques are not performed during the real-time of attempted intrusions; instead, they have applied afterward on collected traffic data and generate alerts. Of course, false positives detection in ‘offline mode’ is tremendously valuable. Nevertheless, there is room for improvement here; automated techniques still need to reduce False Positives in real-time. This paper uses the Snort signature detection model to redirect the alerted attacks to Honeypots and verify attacks.

Keywords: honeypot, TPOT, snort, NIDS, honeybird, iptables, netfilter, redirection, attack detection, docker, snare, tanner

Procedia PDF Downloads 148
27373 Survivability of Maneuvering Aircraft against Air to Air Infrared Missile

Authors: Ji-Yeul Bae, Hyung Mo Bae, Jihyuk Kim, Hyung Hee Cho

Abstract:

An air to air infrared missile poses a significant threat to the survivability of an aircraft due to an advanced sensitivity of sensor and maneuverability of the missile. Therefore, recent military aircraft is equipped with MAW (Missile Approach Warning) to take an evasive maneuver and to deploy countermeasures like chaff and flare. In this research, an effect of MAW sensitivity and resulting evasive maneuver on the survivability of the fighter aircraft is studied. A single engine fighter jet with Mach 0.9 flying at an altitude of 5 km is modeled in the research and infrared signature of the aircraft is calculated by numerical simulation. The survivability is assessed in terms of lethal range. The MAW sensitivity and maneuverability of an aircraft is used as variables. The result showed that improvement in survivability mainly achieved when the missile approach from the side of the aircraft. And maximum 30% increase in survivability of the aircraft is achieved when existence of the missile is noticed at 7 km distance. As a conclusion, sensitivity of the MAW seems to be more important factor than the maneuverability of the aircraft in terms of the survivability.

Keywords: air to air missile, missile approach warning, lethal range, survivability

Procedia PDF Downloads 558
27372 Exploration of Abuse of Position for Sexual Gain by UK Police

Authors: Terri Cole, Fay Sweeting

Abstract:

Abuse of position for sexual gain by police is defined as behavior involving individuals taking advantage of their role to pursue a sexual or improper relationship. Previous research has considered whether it involves ‘bad apples’ - individuals with poor moral ethos or ‘bad barrels’ – broader organizational flaws which may unconsciously allow, minimize, or do not effectively deal with such behavior. Low level sexual misconduct (e.g., consensual sex on duty) is more common than more serious offences (e.g., rape), yet the impact of such behavior can have severe implications not only for those involved but can also negatively undermine public confidence in the police. This ongoing, collaborative research project has identified variables from 514 historic case files from 35 UK police forces in order to identify potential risk indicators which may lead to such behavior. Quantitative analysis using logistic regression and the Cox proportion hazard model has resulted in the identification of specific risk factors of significance in prediction. Factors relating to both perpetrator background such as a history of intimate partner violence, debt, and substance misuse coupled with in work behavior such as misusing police systems increase the risk. Findings are able to provide pragmatic recommendations for those tasked with identifying potential or investigating suspected perpetrators of misconduct.

Keywords: abuse of position, forensic psychology, misconduct, sexual abuse

Procedia PDF Downloads 189
27371 Forensic Study on Personal Identification of Pakistani Population by Individualizing Characteristics of Footprints

Authors: Muneeba Butt

Abstract:

One of the most important physical evidence which leaves suspects at the crime scene is footprints. Analysis of footprints, which can provide useful information for personal identification, is helpful in crime scene investigation. For the current study, 200 samples collected (144 male and 56 female) from Pakistani population with a consent form. The footprints were collected by using black ink with an ink pad. The entire samples were photographed, and then the magnifying glass was used for visualization of individual characteristics including detail of toes, humps, phalange mark, and flat foot cracks in footprint patterns. The descriptive results of individualizing characteristics features were presented in tabular form with respective frequency and percentage. In the result in the male population, the prevalence of tibialis type (T-type) is highest. In the female population, the prevalence of midularis type (M-type) is highest. Humps on the first toe are more found in the male population rather than other humps. In the female population, humps on the third toe are more found rather than other humps. In the male population, the prevalence of phalange mark by toe 1 is highest followed by toe 3, toe 5, toe 2, toe 4 and in female population the prevalence of phalange mark by toe 1 is highest followed by toe 5, 4, 3 and 2. Creases marks are found highest in male population as compared to the female population.

Keywords: foot prints, toes, humps, cracks

Procedia PDF Downloads 158
27370 Succession and Rural vs. Urban Habitat Differences of Coleoptera Species Attracted to Pig Carrions in Eskişehir Province, Turkey

Authors: Cansu Kılıç, Ferhat Altunsoy

Abstract:

In this study, a total of 82 species belonging to the families Staphylinidae, Histeridae, Dermestidae, Silphidae and Cleridae within Coleptera were detected which are collected from 24 pig carrion for a duration of one year. While 12 of the carrions have been placed in rural areas, other 12 have been placed in urban areas in Eskişehir province. The distribution of these species according to months and the period that they exist on different stages of decomposition were determined. Furthermore, Coleoptera species attracted to the pig carrions both in rural and urban areas were detected and their similarities and differences were presented.

Keywords: forensic entomology, Coleoptera, succession, Turkey, rural, urban

Procedia PDF Downloads 307
27369 Temperature-Related Alterations to Mineral Levels and Crystalline Structure in Porcine Long Bone: Intense Heat Vs. Open Flame

Authors: Caighley Logan

Abstract:

The outcome of fire related fatalities, along with other research, has found fires can have a detrimental effect to the mineral and crystalline structures within bone. This study focused on the mineral and crystalline structures within porcine bone samples to analyse the changes caused, with the intent of effectively ‘reverse engineering’ the data collected from burned bone samples to discover what may have happened. Using Fourier Transform Infrared (FT-IR), and X-Ray Fluorescence (XRF), the data collected from a controlled source of intense heat (muffle furnace) and an open fire, based in a living room setting in a standard size shipping container (8.5ft x 8ft) of a similar temperature with a known ignition source, a gasoline lighter. This approach is to analyse the changes to the samples and how the changes differ depending on the heat source. Results have found significant differences in the levels of remaining minerals for each type of heat/burning (p=<0.001), particularly Phosphorus and Calcium, this also includes notable additions of absorbed elements and minerals from the surrounding materials, i.e., Cerium (Ce), Bromine (Br) and Neodymium (Ne). The analysis techniques included provide validated results in conjunction with previous studies.

Keywords: forensic anthropology, thermal alterations, porcine bone, FTIR, XRF

Procedia PDF Downloads 79
27368 Economies of Scale of Worker's Continuing Professional Development in Selected Universities in South- South, Nigeria

Authors: Jonathan E. Oghenekohwo

Abstract:

The return to scale constitutes a significant investment index in the determination of the quantum of resources that is deployed in investment decision on worker’s continuing professional development. Such investment decision is always predicted on the expected outcomes to the individual, institution and the society in context. Several investments in the development of human capacity on the job have been made, but the return to the scale of such seems not to have been correlated positively with the quantum of resources invested in terms of productivity and performance among workers in many universities. This paper thus found out that, despite the commitment and policy instrument to avail workers the right of continuing professional development, the multiplier effects are not evident in diligence, commitment, honesty, dedication, productivity and improved performance on the job among most administrative staff in Nigerian Universities This author, therefore concludes that, given the policy on the right of workers to get trained on-the job, the outcomes of such training must reflect on the overall performance indices, otherwise, institutions should carry out a forensic analysis of the types of continuing professional development programmes that workers participate in, whether or not, they are consistent with the vision and mission of the institutions in terms of economies of scale of workers professional development to the individual, institution and the nation in context.

Keywords: continuing, professional development, economies of scale, worker’s education, administrative staff

Procedia PDF Downloads 317
27367 Minimum Data of a Speech Signal as Special Indicators of Identification in Phonoscopy

Authors: Nazaket Gazieva

Abstract:

Voice biometric data associated with physiological, psychological and other factors are widely used in forensic phonoscopy. There are various methods for identifying and verifying a person by voice. This article explores the minimum speech signal data as individual parameters of a speech signal. Monozygotic twins are believed to be genetically identical. Using the minimum data of the speech signal, we came to the conclusion that the voice imprint of monozygotic twins is individual. According to the conclusion of the experiment, we can conclude that the minimum indicators of the speech signal are more stable and reliable for phonoscopic examinations.

Keywords: phonogram, speech signal, temporal characteristics, fundamental frequency, biometric fingerprints

Procedia PDF Downloads 137
27366 Effect of Built in Polarization on Thermal Properties of InGaN/GaN Heterostructures

Authors: Bijay Kumar Sahoo

Abstract:

An important feature of InₓGa₁-ₓN/GaN heterostructures is strong built-in polarization (BIP) electric field at the hetero-interface due to spontaneous (sp) and piezoelectric (pz) polarizations. The intensity of this electric field reaches several MV/cm. This field has profound impact on optical, electrical and thermal properties. In this work, the effect of BIP field on thermal conductivity of InₓGa₁-ₓN/GaN heterostructure has been investigated theoretically. The interaction between the elastic strain and built in electric field induces additional electric polarization. This additional polarization contributes to the elastic constant of InₓGa₁-ₓN alloy. This in turn modifies material parameters of InₓGa₁-ₓN. The BIP mechanism enhances elastic constant, phonon velocity and Debye temperature and their bowing constants in InₓGa₁-ₓN alloy. These enhanced thermal parameters increase phonon mean free path which boost thermal conduction process. The thermal conductivity (k) of InxGa1-xN alloy has been estimated for x=0, 0.1, 0.3 and 0.9. Computation finds that irrespective of In content, the room temperature k of InₓGa₁-ₓN/GaN heterostructure is enhanced by BIP mechanism. Our analysis shows that at a certain temperature both k with and without BIP show crossover. Below this temperature k with BIP field is lower than k without BIP; however, above this temperature k with BIP field is significantly contributed by BIP mechanism leading to k with BIP field become higher than k without BIP field. The crossover temperature is primary pyroelectric transition temperature. The pyroelectric transition temperature of InₓGa₁-ₓN alloy has been predicted for different x. This signature of pyroelectric nature suggests that thermal conductivity can reveal pyroelectricity in InₓGa₁-ₓN alloy. The composition dependent room temperature k for x=0.1 and 0.3 are in line with prior experimental studies. The result can be used to minimize the self-heating effect in InₓGa₁-ₓN/GaN heterostructures.

Keywords: built-in polarization, phonon relaxation time, thermal properties of InₓGa₁-ₓN /GaN heterostructure, self-heating

Procedia PDF Downloads 403
27365 Retrofitting Adaptive Reuse into Palaces of Northern India

Authors: Shefali Nayak

Abstract:

The architectural appeal, familiarity, and idiom of culturally significant structures are due to societal attachment to various movements, historical association or deviation. Generally, the urge to preserve a building in the northern part of India is driven either by emotional dogma or rational thinking, but, it is also influenced by traditional affinity. The northern region of India has an assortment of palaces and Havelis belonging to various time periods and families with vernacular yet signature style of architecture. Many of them are either successfully conserved by being put into adaptive reuse and some of them have been midst controversies and continued to remain in ruins. The research focuses on comparing successful examples of adaptive reuse such as Neemrana, Mehrangargh Fort palace with a few other merchant havelis converted into heritage hotels. Furthermore, evaluates the architectural aspects of structure, materials, plumbing and electrical installations, as well as specific challenges faced by heritage professionals practicing sustainability, while respecting traditional feelings of various stakeholders. This paper concludes through the analysis of the case study that, its highly unlikely for sustainable design cannot be used as a stand-alone application for heritage structures or cities, it needs the support of architecture conservation to be put into practice. However, it is often demanding to fit a new use of a building into an aged structure. This paper records modern-day generic requirements that reflect challenges faced by different architects, while conserving a heritage structure and retrofitting it into today's requisites. The research objective is to establish how conservation, restoration, and urban regeneration are closely related to sustainable architecture in historical cities.

Keywords: architecture conservation, architecture heritage, adaptive reuse, retrofitting, sustainability, urban regeneration

Procedia PDF Downloads 173
27364 Pathomorphological Markers of the Explosive Wave Action on Human Brain

Authors: Sergey Kozlov, Juliya Kozlova

Abstract:

Introduction: The increased attention of researchers to an explosive trauma around the world is associated with a constant renewal of military weapons and a significant increase in terrorist activities using explosive devices. Explosive wave is a well known damaging factor of explosion. The most sensitive to the action of explosive wave in the human body are the head brain, lungs, intestines, urine bladder. The severity of damage to these organs depends on the distance from the explosion epicenter to the object, the power of the explosion, presence of barriers, parameters of the body position, and the presence of protective clothing. One of the places where a shock wave acts, in human tissues and organs, is the vascular endothelial barrier, which suffers the greatest damage in the head brain and lungs. The objective of the study was to determine the pathomorphological changes of the head brain followed the action of explosive wave. Materials and methods of research: To achieve the purpose of the study, there have been studied 6 male corpses delivered to the morgue of Municipal Institution "Dnipropetrovsk regional forensic bureau" during 2014-2016 years. The cause of death of those killed was a military explosive injury. After a visual external assessment of the head brain, for histological study there was conducted the 1 x 1 x 1 cm/piece sampling from different parts of the head brain, i.e. the frontal, parietal, temporal, occipital sites, and also from the cerebellum, pons, medulla oblongata, thalamus, walls of the lateral ventricles, the bottom of the 4th ventricle. Pieces of the head brain were immersed in 10% formalin solution for 24 hours. After fixing, the paraffin blocks were made from the material using the standard method. Then, using a microtome, there were made sections of 4-6 micron thickness from paraffin blocks which then were stained with hematoxylin and eosin. Microscopic analysis was performed using a light microscope with x4, x10, x40 lenses. Results of the study: According to the results of our study, injuries of the head brain were divided into macroscopic and microscopic. Macroscopic injuries were marked according to the results of visual assessment of haemorrhages under the membranes and into the substance, their nature, and localisation, areas of softening. In the microscopic study, our attention was drawn to both vascular changes and those of neurons and glial cells. Microscopic qualitative analysis of histological sections of different parts of the head brain revealed a number of structural changes both at the cellular and tissue levels. Typical changes in most of the studied areas of the head brain included damages of the vascular system. The most characteristic microscopic sign was the separation of vascular walls from neuroglia with the formation of perivascular space. Along with this sign, wall fragmentation of these vessels, haemolysis of erythrocytes, formation of haemorrhages in the newly formed perivascular spaces were found. In addition to damages of the cerebrovascular system, destruction of the neurons, presence of oedema of the brain tissue were observed in the histological sections of the brain. On some sections, the head brain had a heterogeneous step-like or wave-like nature. Conclusions: The pathomorphological microscopic changes in the brain, identified in the study on the died of explosive traumas, can be used for diagnostic purposes in conjunction with other characteristic signs of explosive trauma in forensic and pathological studies. The complex of microscopic signs in the head brain, i.e. separation of blood vessel walls from neuroglia with the perivascular space formation, fragmentation of walls of these blood vessels, erythrocyte haemolysis, formation of haemorrhages in the newly formed perivascular spaces is the direct indication of explosive wave action.

Keywords: blast wave, neurotrauma, human, brain

Procedia PDF Downloads 188
27363 Chaos Cryptography in Cloud Architectures with Lower Latency

Authors: Mohammad A. Alia

Abstract:

With the rapid evolution of the internet applications, cloud computing becomes one of today’s hottest research areas due to its ability to reduce costs associated with computing. Cloud is, therefore, increasing flexibility and scalability for computing services in the internet. Cloud computing is Internet based computing due to shared resources and information which are dynamically delivered to consumers. As cloud computing share resources via the open network, hence cloud outsourcing is vulnerable to attack. Therefore, this paper will explore data security of cloud computing by implementing chaotic cryptography. The proposal scenario develops a problem transformation technique that enables customers to secretly transform their information. This work proposes the chaotic cryptographic algorithms have been applied to enhance the security of the cloud computing accessibility. However, the proposed scenario is secure, easy and straightforward process. The chaotic encryption and digital signature systems ensure the security of the proposed scenario. Though, the choice of the key size becomes crucial to prevent a brute force attack.

Keywords: chaos, cloud computing, security, cryptography

Procedia PDF Downloads 341
27362 Burden of Severe COVID-19 in Center of Iran: Results of Disability-Adjusted Life Years (DALYs)

Authors: Moslem Taheri Soodejani, Mohammad Hassan Lotfi

Abstract:

Introduction: The outbreak of Covid-19 disease is an international public health concern. Therefore, the analysis of information related to mortality and disability due to COVID-19 is considered important, so the present study was designed and conducted with the aim of assessing COVID-19 Disability-Adjusted Life Years (DALYs) in Yazd. Methods: In Yazd province, all suspected cases of Covid-19 that would be referred to central hospitals in order to get confirmed through PCR or CT scan tests were recruited to our study. The fatality data of Covid- 19 was gathered from the forensic medicine organization. The Disability-Adjusted Life Years (DALYs) combines in one measure years of life lost (YLL), the loss of healthy life due to premature mortality and years of life lived with disability (YLD), the loss of healthy life because of disease and disability. Results: The total burden of COVID-19 was 23,472 years. The number of years lost due to premature death was 23385 and the number of years of life with disability due to COVID-19 was estimated to be 87 years. The disease burden was 12992 years for men and 10480 years for women. The overall incidence of COVID-19 was 1411 per 100,000, of which 1419 in men and 1402 in women per 100,000. Conclusion: The outbreak of the COVID-19 pandemic affected a large population and the residents of Yazd Province lost many years of their lives due to this disease.

Keywords: DALY, covid- 19, Yazd, Iran

Procedia PDF Downloads 185
27361 Biodegradation Effects onto Source Identification of Diesel Fuel Contaminated Soils

Authors: Colin S. Chen, Chien-Jung Tien, Hsin-Jan Huang

Abstract:

For weathering studies, the change of chemical constituents by biodegradation effect in diesel-contaminated soils are important factors to be considered, especially when there is a prolonged period of weathering processes. The objective was to evaluate biodegradation effects onto hydrocarbon fingerprinting and distribution patterns of diesel fuels, fuel source screening and differentiation, source-specific marker compounds, and diagnostic ratios of diesel fuel constituents by laboratory and field studies. Biodegradation processes of diesel contaminated soils were evaluated by experiments lasting for 15 and 12 months, respectively. The degradation of diesel fuel in top soils was affected by organic carbon content and biomass of microorganisms in soils. Higher depletion of total petroleum hydrocarbon (TPH), n-alkanes, and polynuclear aromatic hydrocarbons (PAHs) and their alkyl homologues was observed in soils containing higher organic carbon content and biomass. Decreased ratio of selected isoprenoids (i.e., pristane (Pr) and phytane (Ph)) including n-C17/pristane and n-C18/phytane was observed. The ratio of pristane/phytane was remained consistent for a longer period of time. At the end of the experimental period, a decrease of pristane/phytane was observed. Biomarker compounds of bicyclic sesquiterpanes (BS) were less susceptible to the effects of biodegradation. The ratios of characteristic factors such as C15 sesquiterpane/ 8β(H)-drimane (BS3/BS5), C15 sesquiterpane/ 8β(H)-drimane (BS4/BS5), 8β(H)-drimane/8β(H)-homodrimane (BS5/BS10), and C15 sesquiterpane/8β(H)-homodrimane (BS3/BS10) could be adopted for source identification of diesel fuels in top soil. However, for biodegradation processes lasted for six months but shorter than nine months, only BS3/BS5 and BS3/BS10 could be distinguished in two diesel fuels. In subsoil experiments (contaminated soil located 50 cm below), the ratios of characteristic factors including BS3/BS5, BS4/BS5, and BS5/BS10 were valid for source identification of two diesel fuels for nine month biodegradation. At the early stage of contamination, biomass of soil decreased significantly. However, 6 and 7 dominant species were found in soils in top soil experiments, respectively. With less oxygen and nutrients in subsoil, less biomass of microorganisms was observed in subsoils. Only 2 and 4 diesel-degrading species of microorganisms were identified in two soils, respectively. Parameters of double ratio such as fluorene/C1-fluorene: C2-phenanthrene/C3-phenanthrene (C0F/C1F:C2P/C3P) in both top and subsoil, C2-naphthalene/C2-phenanthrene: C1-phenanthrene/C3-phenanthrene (C2N/C2P:C1P/C3P), and C1-phenanthrene/C1-fluorene: C3-naphthalene/C3-phenanthrene (C1P/C1F:C3N/C3P) in subsoil could serve as forensic indicators in diesel contaminated sites. BS3/BS10:BS4/BS5 could be used in 6 to 9 months of biodegradation processes. Results of principal component analysis (PCA) indicated that source identification of diesel fuels in top soil could only be perofrmed for weathering process less than 6 months. For subsoil, identification can be conducted for weathering process less than 9 months. Ratio of isoprenoids (pristane and phytane) and PAHs might be affected by biodegradation in spilled sites. The ratios of bicyclic sesquiterpanes could serve as forensic indicators in diesel-contaminated soils. Finally, source identification was attemped for samples collected from different fuel contaminated sites by using the unique pattern of sesquiterpanes. It was anticipated that the information generated from this study would be adopted by decision makers to evaluate the liability of cleanup in diesel contaminated sites.

Keywords: biodegradation, diagnostic ratio, diesel fuel, environmental forensics

Procedia PDF Downloads 218
27360 Optimization Query Image Using Search Relevance Re-Ranking Process

Authors: T. G. Asmitha Chandini

Abstract:

Web-based image search re-ranking, as an successful method to get better the results. In a query keyword, the first stair is store the images is first retrieve based on the text-based information. The user to select a query keywordimage, by using this query keyword other images are re-ranked based on their visual properties with images.Now a day to day, people projected to match images in a semantic space which is used attributes or reference classes closely related to the basis of semantic image. though, understanding a worldwide visual semantic space to demonstrate highly different images from the web is difficult and inefficient. The re-ranking images, which automatically offline part learns dissimilar semantic spaces for different query keywords. The features of images are projected into their related semantic spaces to get particular images. At the online stage, images are re-ranked by compare their semantic signatures obtained the semantic précised by the query keyword image. The query-specific semantic signatures extensively improve both the proper and efficiency of image re-ranking.

Keywords: Query, keyword, image, re-ranking, semantic, signature

Procedia PDF Downloads 545
27359 Deciphering the Action of Neuraminidase in Glioblastoma Models

Authors: Nathalie Baeza-Kallee, Raphaël Bergès, Victoria Hein, Stéphanie Cabaret, Jeremy Garcia, Abigaëlle Gros, Emeline Tabouret, Aurélie Tchoghandjian, Carole Colin, Dominique Figarella-Branger

Abstract:

Glioblastoma (GBM) contains cancer stem cells that are resistant to treatment. GBM cancer stem cell expresses glycolipids recognized by the A2B5 antibody. A2B5, induced by the enzyme ST8 alpha-N-acetyl-neuraminide alpha-2,8-sialyl transferase 3 (ST8Sia3), plays a crucial role in the proliferation, migration, clonogenicity, and tumorigenesis of GBM cancer stem cells. Our aim was to characterize the resulting effects of neuraminidase that remove A2B5 in order to target GBM cancer stem cells. To this end, we set up a GBM organotypic slice model; quantified A2B5 expression by flow cytometry in U87-MG, U87-ST8Sia3, and GBM cancer stem cell lines, treated or not by neuraminidase; performed RNAseq and DNA methylation profiling; and analyzed the ganglioside expression by liquid chromatography-mass spectrometry in these cell lines, treated or not with neuraminidase. Results demonstrated that neuraminidase decreased A2B5 expression, tumor size, and regrowth after surgical removal in the organotypic slice model but did not induce a distinct transcriptomic or epigenetic signature in GBM CSC lines. RNAseq analysis revealed that OLIG2, CHI3L1, TIMP3, TNFAIP2, and TNFAIP6 transcripts were significantly overexpressed in U87-ST8Sia3 compared to U87-MG. RT-qPCR confirmed these results and demonstrated that neuraminidase decreased gene expression in GBM cancer stem cell lines. Moreover, neuraminidase drastically reduced ganglioside expression in GBM cancer stem cell lines. Neuraminidase, by its pleiotropic action, is an attractive local treatment against GBM.

Keywords: cancer stem cell, ganglioside, glioblastoma, targeted treatment

Procedia PDF Downloads 69
27358 Postmortem Genetic Testing to Sudden and Unexpected Deaths Using the Next Generation Sequencing

Authors: Eriko Ochiai, Fumiko Satoh, Keiko Miyashita, Yu Kakimoto, Motoki Osawa

Abstract:

Sudden and unexpected deaths from unknown causes occur in infants and youths. Recently, molecular links between a part of these deaths and several genetic diseases are examined in the postmortem. For instance, hereditary long QT syndrome and Burgada syndrome are occasionally fatal through critical ventricular tachyarrhythmia. There are a large number of target genes responsible for such diseases, the conventional analysis using the Sanger’s method has been laborious. In this report, we attempted to analyze sudden deaths comprehensively using the next generation sequencing (NGS) technique. Multiplex PCR to subject’s DNA was performed using Ion AmpliSeq Library Kits 2.0 and Ion AmpliSeq Inherited Disease Panel (Life Technologies). After the library was constructed by emulsion PCR, the amplicons were sequenced 500 flows on Ion Personal Genome Machine System (Life Technologies) according to the manufacture instruction. SNPs and indels were analyzed to the sequence reads that were mapped on hg19 of reference sequences. This project has been approved by the ethical committee of Tokai University School of Medicine. As a representative case, the molecular analysis to a 40 years old male who received a diagnosis of Brugada syndrome demonstrated a total of 584 SNPs or indels. Non-synonymous and frameshift nucleotide substitutions were selected in the coding region of heart disease related genes of ANK2, AKAP9, CACNA1C, DSC2, KCNQ1, MYLK, SCN1B, and STARD3. In particular, c.629T-C transition in exon 3 of the SCN1B gene, resulting in a leu210-to-pro (L210P) substitution is predicted “damaging” by the SIFT program. Because the mutation has not been reported, it was unclear if the substitution was pathogenic. Sudden death that failed in determining the cause of death constitutes one of the most important unsolved subjects in forensic pathology. The Ion AmpliSeq Inherited Disease Panel can amplify the exons of 328 genes at one time. We realized the difficulty in selection of the true source from a number of candidates, but postmortem genetic testing using NGS analysis deserves of a diagnostic to date. We now extend this analysis to SIDS suspected subjects and young sudden death victims.

Keywords: postmortem genetic testing, sudden death, SIDS, next generation sequencing

Procedia PDF Downloads 354
27357 Construction and Validation of Allied Bank-Teller Aptitude Test

Authors: Muhammad Kashif Fida

Abstract:

In the bank, teller’s job (cash officer) is highly important and critical as at one end it requires soft and brisk customer services and on the other side, handling cash with integrity. It is always challenging for recruiters to hire competent and trustworthy tellers. According to author’s knowledge, there is no comprehensive test available that may provide assistance in recruitment in Pakistan. So there is a dire need of a psychometric battery that could provide support in recruitment of potential candidates for the teller’ position. So, the aim of the present study was to construct ABL-Teller Aptitude Test (ABL-TApT). Three major phases have been designed by following American Psychological Association’s guidelines. The first phase was qualitative, indicators of the test have been explored by content analysis of the a) teller’s job descriptions (n=3), b) interview with senior tellers (n=6) and c) interview with HR personals (n=4). Content analysis of above yielded three border constructs; i). Personality, ii). Integrity/honesty, iii). Professional Work Aptitude. Identified indicators operationalized and statements (k=170) were generated using verbatim. It was then forwarded to the five experts for review of content validity. They finalized 156 items. In the second phase; ABL-TApT (k=156) administered on 323 participants through a computer application. The overall reliability of the test shows significant alpha coefficient (α=.81). Reliability of subscales have also significant alpha coefficients. Confirmatory Factor Analysis (CFA) performed to estimate the construct validity, confirms four main factors comprising of eight personality traits (Confidence, Organized, Compliance, Goal-oriented, Persistent, Forecasting, Patience, Caution), one Integrity/honesty factor, four factors of professional work aptitude (basic numerical ability and perceptual accuracy of letters, numbers and signature) and two factors for customer services (customer services, emotional maturity). Values of GFI, AGFI, NNFI, CFI, RFI and RMSEA are in recommended range depicting significant model fit. In third phase concurrent validity evidences have been pursued. Personality and integrity part of this scale has significant correlations with ‘conscientiousness’ factor of NEO-PI-R, reflecting strong concurrent validity. Customer services and emotional maturity have significant correlations with ‘Bar-On EQI’ showing another evidence of strong concurrent validity. It is concluded that ABL-TAPT is significantly reliable and valid battery of tests, will assist in objective recruitment of tellers and help recruiters in finding a more suitable human resource.

Keywords: concurrent validity, construct validity, content validity, reliability, teller aptitude test, objective recruitment

Procedia PDF Downloads 217
27356 Index t-SNE: Tracking Dynamics of High-Dimensional Datasets with Coherent Embeddings

Authors: Gaelle Candel, David Naccache

Abstract:

t-SNE is an embedding method that the data science community has widely used. It helps two main tasks: to display results by coloring items according to the item class or feature value; and for forensic, giving a first overview of the dataset distribution. Two interesting characteristics of t-SNE are the structure preservation property and the answer to the crowding problem, where all neighbors in high dimensional space cannot be represented correctly in low dimensional space. t-SNE preserves the local neighborhood, and similar items are nicely spaced by adjusting to the local density. These two characteristics produce a meaningful representation, where the cluster area is proportional to its size in number, and relationships between clusters are materialized by closeness on the embedding. This algorithm is non-parametric. The transformation from a high to low dimensional space is described but not learned. Two initializations of the algorithm would lead to two different embeddings. In a forensic approach, analysts would like to compare two or more datasets using their embedding. A naive approach would be to embed all datasets together. However, this process is costly as the complexity of t-SNE is quadratic and would be infeasible for too many datasets. Another approach would be to learn a parametric model over an embedding built with a subset of data. While this approach is highly scalable, points could be mapped at the same exact position, making them indistinguishable. This type of model would be unable to adapt to new outliers nor concept drift. This paper presents a methodology to reuse an embedding to create a new one, where cluster positions are preserved. The optimization process minimizes two costs, one relative to the embedding shape and the second relative to the support embedding’ match. The embedding with the support process can be repeated more than once, with the newly obtained embedding. The successive embedding can be used to study the impact of one variable over the dataset distribution or monitor changes over time. This method has the same complexity as t-SNE per embedding, and memory requirements are only doubled. For a dataset of n elements sorted and split into k subsets, the total embedding complexity would be reduced from O(n²) to O(n²=k), and the memory requirement from n² to 2(n=k)², which enables computation on recent laptops. The method showed promising results on a real-world dataset, allowing to observe the birth, evolution, and death of clusters. The proposed approach facilitates identifying significant trends and changes, which empowers the monitoring high dimensional datasets’ dynamics.

Keywords: concept drift, data visualization, dimension reduction, embedding, monitoring, reusability, t-SNE, unsupervised learning

Procedia PDF Downloads 139
27355 Long Term Love Relationships Analyzed as a Dynamic System with Random Variations

Authors: Nini Johana Marín Rodríguez, William Fernando Oquendo Patino

Abstract:

In this work, we model a coupled system where we explore the effects of steady and random behavior on a linear system like an extension of the classic Strogatz model. This is exemplified by modeling a couple love dynamics as a linear system of two coupled differential equations and studying its stability for four types of lovers chosen as CC='Cautious- Cautious', OO='Only other feelings', OP='Opposites' and RR='Romeo the Robot'. We explore the effects of, first, introducing saturation, and second, adding a random variation to one of the CC-type lover, which will shape his character by trying to model how its variability influences the dynamics between love and hate in couple in a long run relationship. This work could also be useful to model other kind of systems where interactions can be modeled as linear systems with external or internal random influence. We found the final results are not easy to predict and a strong dependence on initial conditions appear, which a signature of chaos.

Keywords: differential equations, dynamical systems, linear system, love dynamics

Procedia PDF Downloads 348
27354 Age Determination from Epiphyseal Union of Bones at Shoulder Joint in Girls of Central India

Authors: B. Tirpude, V. Surwade, P. Murkey, P. Wankhade, S. Meena

Abstract:

There is no statistical data to establish variation in epiphyseal fusion in girls in central India population. This significant oversight can lead to exclusion of persons of interest in a forensic investigation. Epiphyseal fusion of proximal end of humerus in eighty females were analyzed on radiological basis to assess the range of variation of epiphyseal fusion at each age. In the study, the X ray films of the subjects were divided into three groups on the basis of degree of fusion. Firstly, those which were showing No Epiphyseal Fusion (N), secondly those showing Partial Union (PC), and thirdly those showing Complete Fusion (C). Observations made were compared with the previous studies.

Keywords: epiphyseal union, shoulder joint, proximal end of humerus

Procedia PDF Downloads 486
27353 Diffuse CO₂ Degassing to Study Blind Geothermal Systems: The Acoculco, Puebla (Mexico) Case Study

Authors: Mirna Guevara, Edgar Santoyo, Daniel Perez-Zarate, Erika Almirudis

Abstract:

The Acoculco caldera located in Puebla (Mexico) has been preliminary identified as a blind hot-dry rock geothermal system. Two drilled wells suggest the existence of high temperatures >300°C and non-conventional tools are been applied to study this system. A comprehensive survey of soil-gas (CO₂) flux measurements (1,500 sites) was carried out during the dry seasons over almost two years (2015 and 2016). Isotopic analyses of δ¹³CCO₂ were performed to discriminate the origin source of the CO2 fluxes. The soil CO2 flux measurements were made in situ by the accumulation chamber method, whereas gas samples for δ13CCO2 were selectively collected from the accumulation chamber with evacuated gas vials via a septum. Two anomalous geothermal zones were identified as a result of these campaigns: Los Azufres (19°55'29.4'' N; 98°08'39.9'' W; 2,839 masl) and Alcaparrosa (19°55'20.6'' N; 98°08'38.3'' W; 2,845 masl). To elucidate the origin of the C in soil CO₂ fluxes, the isotopic signature of δ¹³C was used. Graphical Statistical Analysis (GSA) and a three end-member mixing diagram were used to corroborate the presence of distinctive statistical samples, and trends for the diffuse gas fluxes. Spatial and temporal distributions of the CO₂ fluxes were studied. High CO₂ emission rates up to 38,217 g/m2/d and 33,706 g/m2/d were measured for the Los Azufres and Alcaparrosa respectively; whereas the δ¹³C signatures showed values ranging from -3.4 to -5.5 o/oo for both zones, confirming their magmatic origin. This study has provided a valuable framework to set the direction of further exploration campaigns in the Acoculco caldera. Acknowledgements: The authors acknowledge the funding received from CeMIE-Geo P09 project (SENER-CONACyT).

Keywords: accumulation chamber method, carbon dioxide, diffusive degassing, geothermal exploration

Procedia PDF Downloads 259
27352 Genomics Approach for Excavation of NAS Genes from Nutri Rich Minor Millet Crops: Transforming Perspective from Orphan Plants to Future Food Crops

Authors: Mahima Dubey, Girish Chandel

Abstract:

Minor millets are highly nutritious and climate resilient cereal crops. These features make them ideal candidates to excavate the physiology of the underlying mechanism. In an attempt to understand the basis of mineral nutrition in minor millets, a set of five Barnyard millet genotypes were analyzed for grain Fe and Zn content under contrasting Fe-Zn supply to identify genotypes proficient in tolerating mineral deficiency. This resulted in the identification of Melghat-1 genotype to be nutritionally superior with better ability to withstand deficiency. Expression analysis of several Nicotianamine synthase (NAS) genes showed that HvNAS1 and OsNAS2 genes were prominent in positively mediating mineral deficiency response in Barnyard millet. Further, strategic efforts were employed for fast-track identification of more effective orthologous NAS genes from Barnyard millet. This resulted in the identification of two genes namely EfNAS1 (orthologous to HvNAS1 of barley) and EfNAS2 (orthologous to OsNAS2 gene of rice). Sequencing and thorough characterization of these sequences revealed the presence of intact NAS domain and signature tyrosine and di-leucine motifs in their predicted proteins and thus established their candidature as functional NAS genes in Barnyard millet. Moreover, EfNAS1 showed structural superiority over previously known NAS genes and is anticipated to have role in more efficient metal transport. Findings of the study provide insight into Fe-Zn deficiency response and mineral nutrition in millets. This provides millets with a physiological edge over micronutrient deficient staple cereals such as rice in withstanding Fe-Zn deficiency and subsequently accumulating higher levels of Fe and Zn in millet grains.

Keywords: gene expression, micronutrient, millet, ortholog

Procedia PDF Downloads 227