Search results for: Jurassic sequences
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 620

Search results for: Jurassic sequences

290 Molecular Detection and Isolation of Benzimidazole Resistant Haemonchus contortus from Pakistan

Authors: K. Ali, M. F. Qamar, M. A. Zaman, M. Younus, I. Khan, S. Ehtisham-ul-Haque, R. Tamkeen, M. I. Rashid, Q. Ali

Abstract:

This study centers on molecular identification of Haemonchus contortus and isolation of Benz-imidazoles (BZ) resistant strains. Different abattoirs’ of two geographic regions of Punjab (Pakistan) were frequently visited for the collection of worms. Out of 1500 (n=1500) samples that were morphologically confirmed as H. contortus, 30 worms were subjected to molecular procedures for isolation of resistant strains. Resistant worms (n=8) were further subjected to DNA gene sequencing. Bio edit sequence alignment editor software was used to detect the possible mutation, deletion, replacement of nucleotides. Genetic diversity was noticed and genetic variation existing in β-tubulin isotype 1 of the H. contortus population of small ruminants of different regions considered in this study. H. contortus showed three different type of genetic sequences. 75%, 37.5%, 25% and 12.5% of the studied samples showed 100% query cover and identity with isolates and clones of China, UK, Australia and other countries, respectively. Interestingly the neighbor countries such as India and Iran haven’t many similarities with the Pakistani isolates. Thus, it suggests that population density of same genetic makeup H. contortus is scattered worldwide rather than clustering in a single region.

Keywords: Haemonchus contortus, Benzimidazole resistant, β-tubulin-1 gene, abattoirs

Procedia PDF Downloads 154
289 Potential Activities of Human Endogenous Retroviral kDNA in Melanoma Pathogenesis and HIV-1 Infection

Authors: Jianli Dong, Fangling Xu, Gengming Huang

Abstract:

Human endogenous retroviral elements (HERVs) comprise approximately 8% of the human genome. They are thought to be germline-integrated genetic remnants of retroviral infections. Although HERV sequences are highly defective, some, especially the K type (HERV-K), have been shown to be expressed and may have biological activities in the pathogenesis of cancer, chronic inflammation and autoimmune diseases. We found that HERV-K GAG and ENV proteins were strongly expressed in pleomorphic melanoma cells. We also detected a critical role of HERV-K ENV in mediating intercellular fusion and colony formation of melanoma cells. Interestingly, we found that levels of HERV-K GAG and ENV expression correlated with the activation of ERK and loss of p16INK4A in melanoma cells, and inhibition of MEK or CDK4, especially in combination, reduced HERV-K expression in melanoma cells. We also performed a reverse transcription-polymerase chain reaction (RT-PCR) assay using DNase I digestion to remove “contaminating” HERV-K genomic DNA and examined HERV-K RNA expression in plasma samples from HIV-1 infected individuals. We found a covariation between HERV-K RNA expression and CD4 cell counts in HIV-1 positive samples. Although a causal link between HERV-K activation and melanoma development, and between HERV-K activation, HIV-1 infection and CD4 cell count have yet to be determined, existing data support the further research efforts in HERV-K.

Keywords: CD4 cell, HERV-K, HIV-1, melanoma

Procedia PDF Downloads 211
288 Violence Detection and Tracking on Moving Surveillance Video Using Machine Learning Approach

Authors: Abe Degale D., Cheng Jian

Abstract:

When creating automated video surveillance systems, violent action recognition is crucial. In recent years, hand-crafted feature detectors have been the primary method for achieving violence detection, such as the recognition of fighting activity. Researchers have also looked into learning-based representational models. On benchmark datasets created especially for the detection of violent sequences in sports and movies, these methods produced good accuracy results. The Hockey dataset's videos with surveillance camera motion present challenges for these algorithms for learning discriminating features. Image recognition and human activity detection challenges have shown success with deep representation-based methods. For the purpose of detecting violent images and identifying aggressive human behaviours, this research suggested a deep representation-based model using the transfer learning idea. The results show that the suggested approach outperforms state-of-the-art accuracy levels by learning the most discriminating features, attaining 99.34% and 99.98% accuracy levels on the Hockey and Movies datasets, respectively.

Keywords: violence detection, faster RCNN, transfer learning and, surveillance video

Procedia PDF Downloads 73
287 Study of the Green Composite Jute/Epoxy

Authors: A. Mir, C. Aribi, B. Bezzazi

Abstract:

Work presented is interested in the characterization of the quasistatic mechanical properties and in fatigue of a composite laminated in jute/epoxy. The natural fibers offer promising prospects thanks to their interesting specific properties, because of their low density, but also with their bio deterioration. Several scientific studies highlighted the good mechanical resistance of the vegetable fiber composites reinforced, even after several recycling. Because of the environmental standards which become increasingly severe, one attends the emergence of eco-materials at the base of natural fibers such as flax, bamboo, hemp, sisal, jute. The fatigue tests on elementary vegetable fibers show an increase of about 60% of the rigidity of elementary fibers of hemp subjected to cyclic loading. In this study, the test-tubes manufactured by the method infusion have sequences of stacking of 0/90° and ± 45° for the shearing and tensile tests. The quasistatic tests reveal a variability of the mechanical properties of about 8%. The tensile fatigue tests were carried out for levels of constraints equivalent to half of the ultimate values of the composite. Once the fatigue tests carried out for well-defined values of cycles, a series of static tests of traction type highlights the influence of the number of cycles on the quasi static mechanical behavior of the laminate jute/epoxy.

Keywords: jute, epoxy resin, mechanical, static, dynamic behavior

Procedia PDF Downloads 220
286 Exploring the Activity Fabric of an Intelligent Environment with Hierarchical Hidden Markov Theory

Authors: Chiung-Hui Chen

Abstract:

The Internet of Things (IoT) was designed for widespread convenience. With the smart tag and the sensing network, a large quantity of dynamic information is immediately presented in the IoT. Through the internal communication and interaction, meaningful objects provide real-time services for users. Therefore, the service with appropriate decision-making has become an essential issue. Based on the science of human behavior, this study employed the environment model to record the time sequences and locations of different behaviors and adopted the probability module of the hierarchical Hidden Markov Model for the inference. The statistical analysis was conducted to achieve the following objectives: First, define user behaviors and predict the user behavior routes with the environment model to analyze user purposes. Second, construct the hierarchical Hidden Markov Model according to the logic framework, and establish the sequential intensity among behaviors to get acquainted with the use and activity fabric of the intelligent environment. Third, establish the intensity of the relation between the probability of objects’ being used and the objects. The indicator can describe the possible limitations of the mechanism. As the process is recorded in the information of the system created in this study, these data can be reused to adjust the procedure of intelligent design services.

Keywords: behavior, big data, hierarchical hidden Markov model, intelligent object

Procedia PDF Downloads 210
285 A Hybrid Feature Selection and Deep Learning Algorithm for Cancer Disease Classification

Authors: Niousha Bagheri Khulenjani, Mohammad Saniee Abadeh

Abstract:

Learning from very big datasets is a significant problem for most present data mining and machine learning algorithms. MicroRNA (miRNA) is one of the important big genomic and non-coding datasets presenting the genome sequences. In this paper, a hybrid method for the classification of the miRNA data is proposed. Due to the variety of cancers and high number of genes, analyzing the miRNA dataset has been a challenging problem for researchers. The number of features corresponding to the number of samples is high and the data suffer from being imbalanced. The feature selection method has been used to select features having more ability to distinguish classes and eliminating obscures features. Afterward, a Convolutional Neural Network (CNN) classifier for classification of cancer types is utilized, which employs a Genetic Algorithm to highlight optimized hyper-parameters of CNN. In order to make the process of classification by CNN faster, Graphics Processing Unit (GPU) is recommended for calculating the mathematic equation in a parallel way. The proposed method is tested on a real-world dataset with 8,129 patients, 29 different types of tumors, and 1,046 miRNA biomarkers, taken from The Cancer Genome Atlas (TCGA) database.

Keywords: cancer classification, feature selection, deep learning, genetic algorithm

Procedia PDF Downloads 90
284 Estimation of Transition and Emission Probabilities

Authors: Aakansha Gupta, Neha Vadnere, Tapasvi Soni, M. Anbarsi

Abstract:

Protein secondary structure prediction is one of the most important goals pursued by bioinformatics and theoretical chemistry; it is highly important in medicine and biotechnology. Some aspects of protein functions and genome analysis can be predicted by secondary structure prediction. This is used to help annotate sequences, classify proteins, identify domains, and recognize functional motifs. In this paper, we represent protein secondary structure as a mathematical model. To extract and predict the protein secondary structure from the primary structure, we require a set of parameters. Any constants appearing in the model are specified by these parameters, which also provide a mechanism for efficient and accurate use of data. To estimate these model parameters there are many algorithms out of which the most popular one is the EM algorithm or called the Expectation Maximization Algorithm. These model parameters are estimated with the use of protein datasets like RS126 by using the Bayesian Probabilistic method (data set being categorical). This paper can then be extended into comparing the efficiency of EM algorithm to the other algorithms for estimating the model parameters, which will in turn lead to an efficient component for the Protein Secondary Structure Prediction. Further this paper provides a scope to use these parameters for predicting secondary structure of proteins using machine learning techniques like neural networks and fuzzy logic. The ultimate objective will be to obtain greater accuracy better than the previously achieved.

Keywords: model parameters, expectation maximization algorithm, protein secondary structure prediction, bioinformatics

Procedia PDF Downloads 448
283 Fundamental Theory of the Evolution Force: Gene Engineering utilizing Synthetic Evolution Artificial Intelligence

Authors: L. K. Davis

Abstract:

The effects of the evolution force are observable in nature at all structural levels ranging from small molecular systems to conversely enormous biospheric systems. However, the evolution force and work associated with formation of biological structures has yet to be described mathematically or theoretically. In addressing the conundrum, we consider evolution from a unique perspective and in doing so we introduce the “Fundamental Theory of the Evolution Force: FTEF”. We utilized synthetic evolution artificial intelligence (SYN-AI) to identify genomic building blocks and to engineer 14-3-3 ζ docking proteins by transforming gene sequences into time-based DNA codes derived from protein hierarchical structural levels. The aforementioned served as templates for random DNA hybridizations and genetic assembly. The application of hierarchical DNA codes allowed us to fast forward evolution, while dampening the effect of point mutations. Natural selection was performed at each hierarchical structural level and mutations screened using Blosum 80 mutation frequency-based algorithms. Notably, SYN-AI engineered a set of three architecturally conserved docking proteins that retained motion and vibrational dynamics of native Bos taurus 14-3-3 ζ.

Keywords: 14-3-3 docking genes, synthetic protein design, time-based DNA codes, writing DNA code from scratch

Procedia PDF Downloads 90
282 Suppression Subtractive Hybridization Technique for Identification of the Differentially Expressed Genes

Authors: Tuhina-khatun, Mohamed Hanafi Musa, Mohd Rafii Yosup, Wong Mui Yun, Aktar-uz-Zaman, Mahbod Sahebi

Abstract:

Suppression subtractive hybridization (SSH) method is valuable tool for identifying differentially regulated genes in disease specific or tissue specific genes important for cellular growth and differentiation. It is a widely used method for separating DNA molecules that distinguish two closely related DNA samples. SSH is one of the most powerful and popular methods for generating subtracted cDNA or genomic DNA libraries. It is based primarily on a suppression polymerase chain reaction (PCR) technique and combines normalization and subtraction in a solitary procedure. The normalization step equalizes the abundance of DNA fragments within the target population, and the subtraction step excludes sequences that are common to the populations being compared. This dramatically increases the probability of obtaining low-abundance differentially expressed cDNAs or genomic DNA fragments and simplifies analysis of the subtracted library. SSH technique is applicable to many comparative and functional genetic studies for the identification of disease, developmental, tissue specific, or other differentially expressed genes, as well as for the recovery of genomic DNA fragments distinguishing the samples under comparison.

Keywords: suppression subtractive hybridization, differentially expressed genes, disease specific genes, tissue specific genes

Procedia PDF Downloads 410
281 Phylogenetic Relationships of Common Reef Fish Species in Vietnam

Authors: Dang Thuy Binh, Truong Thi Oanh, Le Phan Khanh Hung, Luong thi Tuong Vy

Abstract:

One of the greatest environmental challenges facing Asia is the management and conservation of the marine biodiversity threaten by fisheries overexploitation, pollution, habitat destruction, and climate change. To date, a few molecular taxonomical studies has been conducted on marine fauna in Vietnam. The purpose of this study was to clarify the phylogeny of economic and ecological reef fish species in Vietnam Reef fish species covering Labridae, Scaridae, Nemipteridae, Serranidae, Acanthuridae, Lutjanidae, Lethrinidae, Mullidae, Balistidae, Pseudochromidae, Pinguipedidae, Fistulariidae, Holocentridae, Synodontidae, and Pomacentridae representing 28 genera were collected from South and Center, Vietnam. Combine with Genbank sequences, a phylogenetic tree was constructed based on 16S gene of mitochondrial DNA using maximum parsimony, maximum likelihood, and Bayesian inference approaches. The phylogram showed the well-resolved clades at genus and family level. Perciformes is the major order of reef fish species in Vietnam. The monophyly of Perciformes is not strongly supported as it was clustered in the same clade with Tetraodontiformes syngnathiformes and Beryciformes. Continue sampling of commercial fish species and classification based on morphology and genetics to build DNA barcoding of fish species in Vietnam is really necessary.

Keywords: reef fish, 16s rDNA, Vietnam, phylogeny

Procedia PDF Downloads 411
280 CTHTC: A Convolution-Backed Transformer Architecture for Temporal Knowledge Graph Embedding with Periodicity Recognition

Authors: Xinyuan Chen, Mohd Nizam Husen, Zhongmei Zhou, Gongde Guo, Wei Gao

Abstract:

Temporal Knowledge Graph Completion (TKGC) has attracted increasing attention for its enormous value; however, existing models lack capabilities to capture both local interactions and global dependencies simultaneously with evolutionary dynamics, while the latest achievements in convolutions and Transformers haven't been employed in this area. What’s more, periodic patterns in TKGs haven’t been fully explored either. To this end, a multi-stage hybrid architecture with convolution-backed Transformers is introduced in TKGC tasks for the first time combining the Hawkes process to model evolving event sequences in a continuous-time domain. In addition, the seasonal-trend decomposition is adopted to identify periodic patterns. Experiments on six public datasets are conducted to verify model effectiveness against state-of-the-art (SOTA) methods. An extensive ablation study is carried out accordingly to evaluate architecture variants as well as the contributions of independent components in addition, paving the way for further potential exploitation. Besides complexity analysis, input sensitivity and safety challenges are also thoroughly discussed for comprehensiveness with novel methods.

Keywords: temporal knowledge graph completion, convolution, transformer, Hawkes process, periodicity

Procedia PDF Downloads 54
279 A Review of Paleo-Depositional Environment and Thermal Alteration Index of Carboniferous, Permian and Triassic of A1-9 well, NW Libya

Authors: Mohamed Ali Alrabib

Abstract:

This paper introduces a paleoenvironmental and hydrocarbon show in this well was identified in the interval of Dembaba formation to the Hassaona formation was poor to very poor oil show. And from palaeoenvironmental analysis there is neither particularly good reservoir nor source rock have been developed in the area. Recent palaeoenvironment work undertakes that the sedimentary succession in this area comprises the Upper Paleozoic rock of the Carboniferous and Permian and the Mesozoic (Triassic) sedimentary sequences. No early Paleozoic rocks have been found in this area, these rocks were eroding during the Late Carboniferous and Early Permian time. During Latest Permian and earliest Triassic time evidence for major marine transgression has occurred. From depths 5930-5940 feet, to 10800-10810 feet, the TAI of the Al Guidr, the Bir Al Jaja Al Uotia, Hebilia and the top varies between 3+ to 4-(mature-dry gas). This interval corporate the rest part of the Dembaba Formation. From depth 10800- 10810 feet, until total sediment depth (11944 feet Log) which corporate the rest of the Dembaba and underlying equivalents of the Assedjefar and M rar Formations and the underlying Indeterminate unit (Hassouna Formation) the TAI varies between 4 and 5 (dry gas-black& deformed).

Keywords: paleoenveronments, thermail index, carboniferous, Libya

Procedia PDF Downloads 397
278 Storyboarding for VR: Towards A Conceptual Framework for Transitioning Traditional Storyboarded Narrative Sequences to Immersive 3D VR Experiences

Authors: Sorin Oancea

Abstract:

More than half a century after Ivan Sutherland’s seminal essay, ‘The Ultimate Display’ (1965), 3D Virtual Reality is still an emergent and exploratory medium in terms of its narrative potential, production methodology, and market penetration. Traditionally positioned in front of the screen/canvas as a ‘window-on-the-world’, the storyboarder and animation director transcend the medium and its narrative reality entirely while designing a linear cinematic sequence. This paper proposes a gradual transition from the traditional linear sequence design process based on a transcendent position of the storyboarder and animation director to an increasingly immersed one characterized by a sense of unmediated presence and immanence. Employing a quaitative analysis of the current exploratory storyboarding processes for 3D VR, this research uses a practice-based methodology based on producing a short-form 3D VR narrative experience to derive its findings. The original contribution to knowledge is charting an empirically derived conceptual framework for VR storyboarding and animation directing, with the documented reflective and reflexive process as a map for directorial transitioning between converging mediums by articulating the new VR lexical categories and expounding links to allied performative arts, such as film and theatre.

Keywords: storyboarding, immersive, virtual reality, transitioning

Procedia PDF Downloads 73
277 An Improved Data Aided Channel Estimation Technique Using Genetic Algorithm for Massive Multi-Input Multiple-Output

Authors: M. Kislu Noman, Syed Mohammed Shamsul Islam, Shahriar Hassan, Raihana Pervin

Abstract:

With the increasing rate of wireless devices and high bandwidth operations, wireless networking and communications are becoming over crowded. To cope with such crowdy and messy situation, massive MIMO is designed to work with hundreds of low costs serving antennas at a time as well as improve the spectral efficiency at the same time. TDD has been used for gaining beamforming which is a major part of massive MIMO, to gain its best improvement to transmit and receive pilot sequences. All the benefits are only possible if the channel state information or channel estimation is gained properly. The common methods to estimate channel matrix used so far is LS, MMSE and a linear version of MMSE also proposed in many research works. We have optimized these methods using genetic algorithm to minimize the mean squared error and finding the best channel matrix from existing algorithms with less computational complexity. Our simulation result has shown that the use of GA worked beautifully on existing algorithms in a Rayleigh slow fading channel and existence of Additive White Gaussian Noise. We found that the GA optimized LS is better than existing algorithms as GA provides optimal result in some few iterations in terms of MSE with respect to SNR and computational complexity.

Keywords: channel estimation, LMMSE, LS, MIMO, MMSE

Procedia PDF Downloads 166
276 Analysis of the Lung Microbiome in Cystic Fibrosis Patients Using 16S Sequencing

Authors: Manasvi Pinnaka, Brianna Chrisman

Abstract:

Cystic fibrosis patients often develop lung infections that range anywhere in severity from mild to life-threatening due to the presence of thick and sticky mucus that fills their airways. Since many of these infections are chronic, they not only affect a patient’s ability to breathe but also increase the chances of mortality by respiratory failure. With a publicly available dataset of DNA sequences from bacterial species in the lung microbiome of cystic fibrosis patients, the correlations between different microbial species in the lung and the extent of deterioration of lung function were investigated. 16S sequencing technologies were used to determine the microbiome composition of the samples in the dataset. For the statistical analyses, referencing helped distinguish between taxonomies, and the proportions of certain taxa relative to another were determined. It was found that the Fusobacterium, Actinomyces, and Leptotrichia microbial types all had a positive correlation with the FEV1 score, indicating the potential displacement of these species by pathogens as the disease progresses. However, the dominant pathogens themselves, including Pseudomonas aeruginosa and Staphylococcus aureus, did not have statistically significant negative correlations with the FEV1 score as described by past literature. Examining the lung microbiology of cystic fibrosis patients can help with the prediction of the current condition of lung function, with the potential to guide doctors when designing personalized treatment plans for patients.

Keywords: bacterial infections, cystic fibrosis, lung microbiome, 16S sequencing

Procedia PDF Downloads 71
275 Long Short-Term Memory (LSTM) Matters: A Sequential Brief Text that Assistive Approach of Text Summarization

Authors: Sharun Akter Khushbu

Abstract:

‘SOS’ addresses text summary such as feasibility study and allows more comprehensive methods on text of language resources. Resources language has been exploited by the importance of text documental procedure. Throughout this key idea will come out a machine interpreter called an SOS that has built an argumentative as an employed model is LSTM-CNN(long short-term memory- recurrent neural network). Summarization of Bengali text formulated by the information of latent structure instead of brief input string counting as text. Text summarization is the proper utilization of optimal solutions being time reduction, and easy interpretation whenever human-generated summary and machine targeted summary remain similar and without degrading the semantic summarization quality. According to the problem affirmation key idea has advanced an algorithm with the method of encoder and decoder describing a sequential structure that is rigorously connected with actual predicted and meaningful output. Regarding the seq2seq approach aimed in the future with high semantic summarization similarity on behalf of the large data samples that are also enlisted by the method. Thus, the SOS method assigns a discriminator over Bengali text documents where encoded input sequences such as summary and decoded the targeted summary of gist will be an error-free machine.

Keywords: LSTM-CNN, NN, SOS, text summarization

Procedia PDF Downloads 46
274 PET Image Resolution Enhancement

Authors: Krzysztof Malczewski

Abstract:

PET is widely applied scanning procedure in medical imaging based research. It delivers measurements of functioning in distinct areas of the human brain while the patient is comfortable, conscious and alert. This article presents the new compression sensing based super-resolution algorithm for improving the image resolution in clinical Positron Emission Tomography (PET) scanners. The issue of motion artifacts is well known in Positron Emission Tomography (PET) studies as its side effect. The PET images are being acquired over a limited period of time. As the patients cannot hold breath during the PET data gathering, spatial blurring and motion artefacts are the usual result. These may lead to wrong diagnosis. It is shown that the presented approach improves PET spatial resolution in cases when Compressed Sensing (CS) sequences are used. Compressed Sensing (CS) aims at signal and images reconstructing from significantly fewer measurements than were traditionally thought necessary. The application of CS to PET has the potential for significant scan time reductions, with visible benefits for patients and health care economics. In this study the goal is to combine super-resolution image enhancement algorithm with CS framework to achieve high resolution PET output. Both methods emphasize on maximizing image sparsity on known sparse transform domain and minimizing fidelity.

Keywords: PET, super-resolution, image reconstruction, pattern recognition

Procedia PDF Downloads 346
273 Aptian Ramp Sedimentation of the Jebel Serdj Massif, North-Central Tunisia, and Sea Level Variations Recorded in Magnetic Susceptibility

Authors: Houda Khaled, Fredj Chaabani, Frederic Boulvain

Abstract:

The Aptian series in north-central Tunisia was studied in detail regarding to lithology, microfacies, and magnetic susceptibility to provide new insights into the paleoenvironmental evolution and sea level changes in the carbonate platform. The study series is about 350 meters thick, and it consists of fives sequences of limestones, separated by four levels of marlstones and marly limestones. Petrographic study leads to the definition of 11 microfacies which are successively recorded along the Serdj section into the outer ramp, mid-ramp, inner ramp and coastal facies associations. The magnetic susceptibility of all samples was measured and compared with the facies and microfacies. There is a clear link between facies and magnetic susceptibility; the distal facies show high values while the proximal areas show lower values. The magnetic susceptibility profile reflects stratigraphic variations in response to relative changes in sea level and input of detrital materials. During the Aptian, kaolinite/illite intensity ratios show high values possibly indicating a warming trend followed then by decreasing values that may indicate a cooling trend. During the Albian, this cooling trend is reverted into humid/warming.

Keywords: Aptian, mineralogy, petrology, Serdj massif

Procedia PDF Downloads 333
272 Isolation and Characterization of Endophytic Bacteria Associated with Root-Nodules of Medicago sativa in Al-Ahasa Region

Authors: Ashraf Y. Z. Khalifa, Mohammed A. Almalki

Abstract:

Medicago sativa (Alfalfa) is an important forage crop legume worldwide including Saudia Arabia due to its high nutritive value. Soil bacteria exist in root or root-nodules of Medicago sativa in either symbiotic relationships or in associations. The aim of the present study was to isolate and characterize endophytic bacteria that live in association with non-nodulated roots of Medicago sativa growing in Al-Ahsaa region, Saudia Arabia. Several bacterial strains were isolated from sterilized roots of Medicago sativa. Strains were characterized using 16S rRNA gene sequences, phylogenetic relationships analysis, morphological and biochemical characteristics. The strains utilized 50% (10 out of 20) of the different chemical substrates contained in the API20E strip. In general, many strains had the ability to ferment/oxidise all the carbohydrate tested except for rhamnose and the polyol carbohydrate, inositol. Comparative sequence analysis of the 16S rDNA gene indicated that the strains were closely related to the genus Bacillus. Furthermore, the growth parameters of Vigna sinensis were enhanced upon single-inoculation of the isolated strains, compared to the uninoculated control plants. The results highlighted that the root-nodules of Medicago sativa harbor non-nodulating bacterial strains that could have significant agricultural applications.

Keywords: Medicago sativa, endophytic bacteria, Pisum sativum, Vigna sinensis

Procedia PDF Downloads 351
271 Molecular Profiling and Potential Bioactive Characteristics of Endophytic Fungi Isolated from Leptadenia Pyrotechnica

Authors: Walaa Al-Maghraby

Abstract:

Endophytes are organisms that colonize internal plant tissues without causing apparent harm to their host. Almost all groups of microorganisms have been found in endophytic association with plants may be fungi. They stimulate the production of secondary metabolites with a diverse range of biological activities. Leptadenia pyrotechnica is a more or less leafless, erect shrub with straight stems which is highly distributed in Saudi Arabia. Four endophytes fungi were isolated from Leptadenia pyrotechnica and identified using 18S ribosomal RNA sequences, which revealed four fungi genuses, namely Aspergillus terreus; Aspergillus welwitschiae; Aspergillus fumigatus and Aspergillus flavus. In this present study, four endophytic fungi from Leptadenia pyrotechnica were used for obtaining crude aqueous and ethyl acetate extracts for antimicrobial screening against 6 human pathogens, the antibacterial tests presented satisfactory results, where the pathogenic bacteria were inhibited by the four extracts tested, except for Escherichia coli that was inhibited by all extracts except ethyl acetate extract of Aspergillus terreus. Analysis of variance showed that the extract produced by endophyte Leptadenia pyrotechnica was the most effective against all bacteria, either gram-negative or positive. However, the extract was not efficient against pathogenic fungi. Therefore, this study indicates that endophytes from medicinal plant Leptadenia pyrotechnica could be potential sources of antibacterial substances.

Keywords: antimicrobial activity, Aspergillus sp, endophytes, Leptadenia pyrotechnica

Procedia PDF Downloads 123
270 Chaos Fuzzy Genetic Algorithm

Authors: Mohammad Jalali Varnamkhasti

Abstract:

The genetic algorithms have been very successful in handling difficult optimization problems. The fundamental problem in genetic algorithms is premature convergence. This paper, present a new fuzzy genetic algorithm based on chaotic values instead of the random values in genetic algorithm processes. In this algorithm, for initial population is used chaotic sequences and then a new sexual selection proposed for selection mechanism. In this technique, the population is divided such that the male and female would be selected in an alternate way. The layout of the male and female chromosomes in each generation is different. A female chromosome is selected by tournament selection size from the female group. Then, the male chromosome is selected, in order of preference based on the maximum Hamming distance between the male chromosome and the female chromosome or The highest fitness value of male chromosome (if more than one male chromosome is having the maximum Hamming distance existed), or Random selection. The selections of crossover and mutation operators are achieved by running the fuzzy logic controllers, the crossover and mutation probabilities are varied on the basis of the phenotype and genotype characteristics of the chromosome population. Computational experiments are conducted on the proposed techniques and the results are compared with some other operators, heuristic and local search algorithms commonly used for solving p-median problems published in the literature.

Keywords: genetic algorithm, fuzzy system, chaos, sexual selection

Procedia PDF Downloads 363
269 Malware Beaconing Detection by Mining Large-scale DNS Logs for Targeted Attack Identification

Authors: Andrii Shalaginov, Katrin Franke, Xiongwei Huang

Abstract:

One of the leading problems in Cyber Security today is the emergence of targeted attacks conducted by adversaries with access to sophisticated tools. These attacks usually steal senior level employee system privileges, in order to gain unauthorized access to confidential knowledge and valuable intellectual property. Malware used for initial compromise of the systems are sophisticated and may target zero-day vulnerabilities. In this work we utilize common behaviour of malware called ”beacon”, which implies that infected hosts communicate to Command and Control servers at regular intervals that have relatively small time variations. By analysing such beacon activity through passive network monitoring, it is possible to detect potential malware infections. So, we focus on time gaps as indicators of possible C2 activity in targeted enterprise networks. We represent DNS log files as a graph, whose vertices are destination domains and edges are timestamps. Then by using four periodicity detection algorithms for each pair of internal-external communications, we check timestamp sequences to identify the beacon activities. Finally, based on the graph structure, we infer the existence of other infected hosts and malicious domains enrolled in the attack activities.

Keywords: malware detection, network security, targeted attack, computational intelligence

Procedia PDF Downloads 234
268 Anomaly Detection in a Data Center with a Reconstruction Method Using a Multi-Autoencoders Model

Authors: Victor Breux, Jérôme Boutet, Alain Goret, Viviane Cattin

Abstract:

Early detection of anomalies in data centers is important to reduce downtimes and the costs of periodic maintenance. However, there is little research on this topic and even fewer on the fusion of sensor data for the detection of abnormal events. The goal of this paper is to propose a method for anomaly detection in data centers by combining sensor data (temperature, humidity, power) and deep learning models. The model described in the paper uses one autoencoder per sensor to reconstruct the inputs. The auto-encoders contain Long-Short Term Memory (LSTM) layers and are trained using the normal samples of the relevant sensors selected by correlation analysis. The difference signal between the input and its reconstruction is then used to classify the samples using feature extraction and a random forest classifier. The data measured by the sensors of a data center between January 2019 and May 2020 are used to train the model, while the data between June 2020 and May 2021 are used to assess it. Performances of the model are assessed a posteriori through F1-score by comparing detected anomalies with the data center’s history. The proposed model outperforms the state-of-the-art reconstruction method, which uses only one autoencoder taking multivariate sequences and detects an anomaly with a threshold on the reconstruction error, with an F1-score of 83.60% compared to 24.16%.

Keywords: anomaly detection, autoencoder, data centers, deep learning

Procedia PDF Downloads 164
267 Noninvasive Disease Diagnosis through Breath Analysis Using DNA-functionalized SWNT Sensor Array

Authors: W. J. Zhang, Y. Q. Du, M. L. Wang

Abstract:

Noninvasive diagnostics of diseases via breath analysis has attracted considerable scientific and clinical interest for many years and become more and more promising with the rapid advancement in nanotechnology and biotechnology. The volatile organic compounds (VOCs) in exhaled breath, which are mainly blood borne, particularly provide highly valuable information about individuals’ physiological and pathophysiological conditions. Additionally, breath analysis is noninvasive, real-time, painless and agreeable to patients. We have developed a wireless sensor array based on single-stranded DNA (ssDNA)-decorated single-walled carbon nanotubes (SWNT) for the detection of a number of physiological indicators in breath. Eight DNA sequences were used to functionalize SWNT sensors to detect trace amount of methanol, benzene, dimethyl sulfide, hydrogen sulfide, acetone and ethanol, which are indicators of heavy smoking, excessive drinking, and diseases such as lung cancer, breast cancer, cirrhosis and diabetes. Our tests indicated that DNA functionalized SWNT sensors exhibit great selectivity, sensitivity, reproducibility, and repeatability. Furthermore, different molecules can be distinguished through pattern recognition enabled by this sensor array. Thus, the DNA-SWNT sensor array has great potential to be applied in chemical or bimolecular detection for the noninvasive diagnostics of diseases and health monitoring.

Keywords: breath analysis, diagnosis, DNA-SWNT sensor array, noninvasive

Procedia PDF Downloads 324
266 Bulk Amounts of Linear and Cyclic Polypeptides on Our Hand within a Short Time

Authors: Yu Zhang, Il Kim

Abstract:

Polypeptides with defined peptide sequences illustrate the power of remarkable applications in drug delivery, tissue engineering, sensing and catalysis. Especially the cyclic polypeptides, the distinctive topological architecture imparts many characteristic properties comparing to linear polypeptides. Here, a facile and highly efficient strategy for the synthesis of linear and cyclic polypeptides is reported using N-heterocyclic carbenes (NHCs)-mediated ring-opening polymerization (ROP) of α-amino acid N-carboxyanhydrides (NCA) in the presence or absence of primary amine initiator. The polymerization proceeds rapidly in a quasi-living manner, allowing access to linear and cyclic polypeptides of well-defined chain length and narrow polydispersity, as evidenced by nuclear magnetic resonance spectrum (1H NMR and 13C NMR spectra) and size exclusion chromatography (SEC) analysis. The cyclic architecture of the polypeptides was further verified by matrix-assisted laser desorption ionization-time of flight (MALDI-TOF) mass spectra (MALDI-TOF MS) and electrospray ionization (ESI) mass spectra, as well as viscosity studies. This approach can also simplify workup procedures and make bulk scale synthesis possible, which thereby opens avenues for practical uses in diverse areas, opening up the new generation of polypeptide synthesis.

Keywords: α-amino acid N-carboxyanhydrides, living polymerization, polypeptides, N-heterocyclic carbenes, ring-opening polymerization

Procedia PDF Downloads 141
265 Adaptive Analysis of Housing Policies in Development Programming After 1970s (Case Study: Kermanshah City in the Western Iran)

Authors: Zeinab. Shahrokhifar, Abolfazl Meshkini, Seyed Ali. Alavi

Abstract:

Considering the different dimensions of deprivation, housing supply is noted as a basic requirement in Iran after 1979 (coming to work of the new government). The government had built the constitution and obliged to meet this need in the form of five-year development programs in Iran’s provinces. This study focused on the adaptive analysis of housing policies in these five development programs in Kermanshah province located in western Iran. Our research is divided into two different analytical sections. In the first section, we collected the documentary information using approved plans and field studies. In the second section, a questionnaire was prepared and designed for the elite community (30) to support the documentary analysis. The results showed that various projects adopted in the form of strategic plans and implemented the policies included both quantitative and qualitative housing in Kermanshah province after 1979. The quality of housing, from the first to the fifth development plans has improved the situation in the housing indicators. The quantity of housing units for households has also been implemented through various policies that has desired results. The sequences of housing policies and plans do not overlap in the five development programs. According to the radar graph, the development programs overlapped in some policies, which shows the continuation of the previous policies, but this overlap is not perfect.

Keywords: law enforcement policy, housing policy, development programs, housing indicators, the city of Kermanshah

Procedia PDF Downloads 51
264 Antibacterial Activity of Salvadora persica Extracts against Oral Cavity Bacteria

Authors: Sulaiman A. Alrumman, Abd El-Latif Hesham

Abstract:

Despite medical progress worldwide, dental caries are still widespread. Miswak is derived from the plant arak (Salvadora persica). It is used by Muslim people as a natural product for the cleansing of teeth, to ensure oral and dental hygiene. This study was designed to evaluate the antimicrobial effects of ethanol, methanol, and ethanol/methanol extracts of miswak against three bacterial pathogens of the oral cavity. The pathogens were isolated from the oral cavity of volunteers/patients and were identified on the basis of 16S rRNA gene amplification data. Sequence comparisons were made with 16S rRNA gene sequences available in the GenBank database. The results of sequence alignment and phylogenetic analysis identified the three pathogens as being Staphylococcus aureus strain KKU-020, Enterococcus faecalis strain KKU-021 and Klebsiella pneumoniae strain KKU-022. All miswak extracts showed powerful antimicrobial activity against the three pathogens. The maximum zone of inhibition (40.67±0.88 mm) was observed against E. faecalis with ethanolic extracts whilst methanolic extracts showed the minimum zone of inhibition (10.33±0.88 mm) against K. pneumonia KKU-022. Based on the significant effects of the miswak extracts against the oral cavity pathogens in our study, we recommend that miswak is to be used as a dental hygiene method to prevent tooth caries.

Keywords: antibacterial, miswak, Salvadora persica, oral cavity pathogens

Procedia PDF Downloads 268
263 Particle Filter Supported with the Neural Network for Aircraft Tracking Based on Kernel and Active Contour

Authors: Mohammad Izadkhah, Mojtaba Hoseini, Alireza Khalili Tehrani

Abstract:

In this paper we presented a new method for tracking flying targets in color video sequences based on contour and kernel. The aim of this work is to overcome the problem of losing target in changing light, large displacement, changing speed, and occlusion. The proposed method is made in three steps, estimate the target location by particle filter, segmentation target region using neural network and find the exact contours by greedy snake algorithm. In the proposed method we have used both region and contour information to create target candidate model and this model is dynamically updated during tracking. To avoid the accumulation of errors when updating, target region given to a perceptron neural network to separate the target from background. Then its output used for exact calculation of size and center of the target. Also it is used as the initial contour for the greedy snake algorithm to find the exact target's edge. The proposed algorithm has been tested on a database which contains a lot of challenges such as high speed and agility of aircrafts, background clutter, occlusions, camera movement, and so on. The experimental results show that the use of neural network increases the accuracy of tracking and segmentation.

Keywords: video tracking, particle filter, greedy snake, neural network

Procedia PDF Downloads 312
262 The Ontological Memory in Bergson as a Conceptual Tool for the Analysis of the Digital Conjuncture

Authors: Douglas Rossi Ramos

Abstract:

The current digital conjuncture, called by some authors as 'Internet of Things' (IoT), 'Web 2.0' or even 'Web 3.0', consists of a network that encompasses any communication of objects and entities, such as data, information, technologies, and people. At this juncture, especially characterized by an "object socialization," communication can no longer be represented as a simple informational flow of messages from a sender, crossing a channel or medium, reaching a receiver. The idea of communication must, therefore, be thought of more broadly in which it is possible to analyze the process communicative from interactions between humans and nonhumans. To think about this complexity, a communicative process that encompasses both humans and other beings or entities communicating (objects and things), it is necessary to constitute a new epistemology of communication to rethink concepts and notions commonly attributed to humans such as 'memory.' This research aims to contribute to this epistemological constitution from the discussion about the notion of memory according to the complex ontology of Henri Bergson. Among the results (the notion of memory in Bergson presents itself as a conceptual tool for the analysis of posthumanism and the anthropomorphic conjuncture of the new advent of digital), there was the need to think about an ontological memory, analyzed as a being itself (being itself of memory), as a strategy for understanding the forms of interaction and communication that constitute the new digital conjuncture, in which communicating beings or entities tend to interact with each other. Rethinking the idea of communication beyond the dimension of transmission in informative sequences paves the way for an ecological perspective of the digital dwelling condition.

Keywords: communication, digital, Henri Bergson, memory

Procedia PDF Downloads 132
261 Bacterial Profiling and Development of Molecular Diagnostic Assays for Detection of Bacterial Pathogens Associated with Bovine mastitis

Authors: Aqeela Ashraf, Muhammad Imran, Tahir Yaqub, Muhammad Tayyab, Yung Fu Chang

Abstract:

For the identification of bovine mastitic pathogen, an economical, rapid and sensitive molecular diagnostic assay is developed by PCR multiplexing of gene and pathogenic species specific DNA sequences. The multiplex PCR assay is developed for detecting nine important bacterial pathogens causing mastitis Worldwide. The bacterial species selected for this study are Streptococcus agalactiae, Streptococcus dysagalactiae, Streptococcus uberis, Staphylococcus aureus, Escherichia coli, Staphylococcus haemolyticus, Staphylococcus chromogenes Mycoplasma bovis and Staphylococcus epidermidis. A single reaction assay was developed and validated by 27 reference strains and further tested on 276 bacterial strains obtained from culturing mastitic milk. The multiplex PCR assay developed here is further evaluated by applying directly on genomic DNA isolated from 200 mastitic milk samples. It is compared with bacterial culturing method and proved to be more sensitive, rapid, economical and can specifically identify 9 bacterial pathogens in a single reaction. It has detected the pathogens in few culture negative mastitic samples. Recognition of disease is the foundation of disease control and prevention. This assay can be very helpful for maintaining the udder health and milk monitoring.

Keywords: multiplex PCR, bacteria, mastitis, milk

Procedia PDF Downloads 303