Search results for: threats identification
3128 Modern Trends in Foreign Direct Investments in Georgia
Authors: Rusudan Kinkladze, Guguli Kurashvili, Ketevan Chitaladze
Abstract:
Foreign direct investment is a driving force in the development of the interdependent national economies, and the study and analysis of investments is an urgent problem. It is particularly important for transitional economies, such as Georgia, and the study and analysis of investments is an urgent problem. Consequently, the goal of the research is the study and analysis of direct foreign investments in Georgia, and identification and forecasting of modern trends, and covers the period of 2006-2015. The study uses the methods of statistical observation, grouping and analysis, the methods of analytical indicators of time series, trend identification and the predicted values are calculated, as well as various literary and Internet sources relevant to the research. The findings showed that modern investment policy In Georgia is favorable for domestic as well as foreign investors. Georgia is still a net importer of investments. In 2015, the top 10 investing countries was led by Azerbaijan, United Kingdom and Netherlands, and the largest share of FDIs were allocated in the transport and communication sector; the financial sector was the second, followed by the health and social work sector, and the same trend will continue in the future.Keywords: foreign direct investments, methods, statistics, analysis
Procedia PDF Downloads 3313127 A Faunistic Study of Syrphidae Flowerflies in Alfalfa Fields of North of Khouzestan, Iran
Authors: Zahra Safaeian, Shila Goldasteh, Rouhollah Radjabi
Abstract:
Flowerflies of Syrphidae family is one of the largest families among the Diptera order that due to predatory habit of some species in larva stage has an important role for controlling aphids of the fields. In the present study, flowerflies fauna in the alfalfa fields of the north of Khouzestan were studied during 2012-2013. The species of the family were collected using appropriate methods including insect collecting sweeping net and Malaise traps. According to the fact that the shape of male genitalia in the male insect is important in identification of these species the male genitalia was separated from the body and microscopical slide was prepared then species identification was done considering the male genitalia, the patterns and figures on the abdomen and using available keys. Based on the finding four species of Sphaerophoria scripta, Sphaerophoria turkmenica, Melanostoma mellinu, Sphaerophoria ruppelli were collected and according to the abundance frequency of the collected species the most abundance was related to Sphaerophoria scripta, then Sphaerophoria turkmenica had the most abundance and the least abundance was related to Sphaerophoria ruppelli.Keywords: syrphidae, fauna, alfalfa, Iran
Procedia PDF Downloads 3943126 Identification Strategies for Unknown Victims from Mass Disasters and Unknown Perpetrators from Violent Crime or Terrorist Attacks
Authors: Michael Josef Schwerer
Abstract:
Background: The identification of unknown victims from mass disasters, violent crimes, or terrorist attacks is frequently facilitated through information from missing persons lists, portrait photos, old or recent pictures showing unique characteristics of a person such as scars or tattoos, or simply reference samples from blood relatives for DNA analysis. In contrast, the identification or at least the characterization of an unknown perpetrator from criminal or terrorist actions remains challenging, particularly in the absence of material or data for comparison, such as fingerprints, which had been previously stored in criminal records. In scenarios that result in high levels of destruction of the perpetrator’s corpse, for instance, blast or fire events, the chance for a positive identification using standard techniques is further impaired. Objectives: This study shows the forensic genetic procedures in the Legal Medicine Service of the German Air Force for the identification of unknown individuals, including such cases in which reference samples are not available. Scenarios requiring such efforts predominantly involve aircraft crash investigations, which are routinely carried out by the German Air Force Centre of Aerospace Medicine as one of the Institution’s essential missions. Further, casework by military police or military intelligence is supported based on administrative cooperation. In the talk, data from study projects, as well as examples from real casework, will be demonstrated and discussed with the audience. Methods: Forensic genetic identification in our laboratories involves the analysis of Short Tandem Repeats and Single Nucleotide Polymorphisms in nuclear DNA along with mitochondrial DNA haplotyping. Extended DNA analysis involves phenotypic markers for skin, hair, and eye color together with the investigation of a person’s biogeographic ancestry. Assessment of the biological age of an individual employs CpG-island methylation analysis using bisulfite-converted DNA. Forensic Investigative Genealogy assessment allows the detection of an unknown person’s blood relatives in reference databases. Technically, end-point-PCR, real-time PCR, capillary electrophoresis, pyrosequencing as well as next generation sequencing using flow-cell-based and chip-based systems are used. Results and Discussion: Optimization of DNA extraction from various sources, including difficult matrixes like formalin-fixed, paraffin-embedded tissues, degraded specimens from decomposed bodies or from decedents exposed to blast or fire events, provides soil for successful PCR amplification and subsequent genetic profiling. For cases with extremely low yields of extracted DNA, whole genome preamplification protocols are successfully used, particularly regarding genetic phenotyping. Improved primer design for CpG-methylation analysis, together with validated sampling strategies for the analyzed substrates from, e.g., lymphocyte-rich organs, allows successful biological age estimation even in bodies with highly degraded tissue material. Conclusions: Successful identification of unknown individuals or at least their phenotypic characterization using pigmentation markers together with age-informative methylation profiles, possibly supplemented by family tree search employing Forensic Investigative Genealogy, can be provided in specialized laboratories. However, standard laboratory procedures must be adapted to work with difficult and highly degraded sample materials.Keywords: identification, forensic genetics, phenotypic markers, CPG methylation, biological age estimation, forensic investigative genealogy
Procedia PDF Downloads 513125 Enhancing Transfer Path Analysis with In-Situ Component Transfer Path Analysis for Interface Forces Identification
Authors: Raef Cherif, Houssine Bakkali, Wafaa El Khatiri, Yacine Yaddaden
Abstract:
The analysis of how vibrations are transmitted between components is required in many engineering applications. Transfer path analysis (TPA) has been a valuable engineering tool for solving Noise, Vibration, and Harshness (NVH problems using sub-structuring applications. The most challenging part of a TPA analysis is estimating the equivalent forces at the contact points between the active and the passive side. Component TPA in situ Method calculates these forces by inverting the frequency response functions (FRFs) measured at the passive subsystem, relating the motion at indicator points to forces at the interface. However, matrix inversion could pose problems due to the ill-conditioning of the matrices leading to inaccurate results. This paper establishes a TPA model for an academic system consisting of two plates linked by four springs. A numerical study has been performed to improve the interface forces identification. Several parameters are studied and discussed, such as the singular value rejection and the number and position of indicator points chosen and used in the inversion matrix.Keywords: transfer path analysis, matrix inverse method, indicator points, SVD decomposition
Procedia PDF Downloads 853124 Six Years Antimicrobial Resistance Trends among Bacterial Isolates in Amhara National Regional State, Ethiopia
Authors: Asrat Agalu Abejew
Abstract:
Background: Antimicrobial resistance (AMR) is a silent tsunami and one of the top global threats to health care and public health. It is one of the common agendas globally and in Ethiopia. Emerging AMR will be a double burden to Ethiopia, which is facing a series of problems from infectious disease morbidity and mortality. In Ethiopia, although there are attempts to document AMR in healthcare institutions, comprehensive and all-inclusive analysis is still lacking. Thus, this study is aimed to determine trends in AMR from 2016-2021. Methods: A retrospective analysis of secondary data recorded in the Amhara Public Health Institute (APHI) from 2016 to 2021 G.C was conducted. Blood, Urine, Stool, Swabs, Discharge, body effusions, and other Microbiological specimens were collected from each study participants, and Bacteria identification and Resistance tests were done using the standard microbiologic procedure. Data was extracted from excel in August 2022, Trends in AMR were analyzed, and the results were described. In addition, the chi-square (X2) test and binary logistic regression were used, and a P. value < 0.05 was used to determine a significant association. Results: During 6 years period, there were 25143 culture and susceptibility tests. Overall, 265 (46.2%) bacteria were resistant to 2-4 antibiotics, 253 (44.2%) to 5-7 antibiotics, and 56 (9.7%) to >=8 antibiotics. The gram-negative bacteria were 166 (43.9%), 155 (41.5%), and 55 (14.6%) resistant to 2-4, 5-7, and ≥8 antibiotics, respectively, whereas 99(50.8%), 96(49.2% and 1 (0.5%) of gram-positive bacteria were resistant to 2-4, 5-7 and ≥8 antibiotics respectively. K. pneumonia 3783 (15.67%) and E. coli 3199 (13.25%) were the most commonly isolated bacteria, and the overall prevalence of AMR was 2605 (59.9%), where K. pneumonia 743 (80.24%), E. cloacae 196 (74.81%), A. baumannii 213 (66.56%) being the most common resistant bacteria for antibiotics tested. Except for a slight decline during 2020 (6469 (25.4%)), the overall trend of AMR is rising from year to year, with a peak in 2019 (8480 (33.7%)) and in 2021 (7508 (29.9%). If left un-intervened, the trend in AMR will increase by 78% of variation from the study period, as explained by the differences in years (R2=0.7799). Ampicillin, Augmentin, ciprofloxacin, cotrimoxazole, tetracycline, and Tobramycin were almost resistant to common bacteria they were tested. Conclusion: AMR is linearly increasing during the last 6 years. If left as it is without appropriate intervention after 15 years (2030 E.C), AMR will increase by 338.7%. A growing number of multi-drug resistant bacteria is an alarm to awake policymakers and those who do have the concern to intervene before it is too late. This calls for a periodic, integrated, and continuous system to determine the prevalence of AMR in commonly used antibiotics.Keywords: AMR, trend, pattern, MDR
Procedia PDF Downloads 763123 Significance of Monumental Heritage in India: A Case Study of Humayun Tomb
Authors: Bhawna Shivan
Abstract:
Indian monuments have been spoken of as for variety, extent, completeness and beauty unsurpassed perhaps unequaled in world. India’s monumental heritage is a part and parcel of India today. The underlying issue with the monumental heritage in contemporary times is that these monuments suffered many times with various degrees of threats/ pressures which hampered their beauty. In the current situation, the urbanization policies for sustainable development and tourism management pay no attention to the basic point of conservation and protection of these cultural heritages rather they focus more on profit earned from these sites. Many times rich heritage is found balancing between conflicting pressures of conservation of heritage elements with sustainability and local economic development. There is a need of a new attitude to India’s independent and democratic ideology. The paper will enquire about the historical perspective by analyzing and understanding the importance of Mughal Architecture while focusing on Humayun Tomb while assessing the value and sentiment people attach to these monuments. It will also put the focus on the future of these monuments in the era of globalization and urbanization. The role of public and private authorities for conservation and sustainable development of these monuments. As well as assessing other facilities like toilets, parking, eatery joint, Museum with Display of structural representation and display of books, and a mobile shop. The research will be helpful in assessing the importance of heritage buildings whether they are a tool of enhancing ‘Tourism Industry’ for Central and State Government or really there is still some future of these monuments. Can we still consider these heritage sites as the integral part of our society in this urbanized world? The study will also analyze the attitude of the central and state government towards a building when it declared as a ‘World Heritage Site’. The study will also examine how the Youth and other aged generations append their sentimental values towards them, say (what is their purpose of coming to a heritage site, what makes them coming here, how they view this particular monument) Apart from this, probing the factors such as rapid growth of cities and its population, increasing value of urban land and effect of globalization on urban growth pattern that are capable of producing a variety of threats and pressures on any monument for instance Humayun Tomb.Keywords: globalization, monuments, tourism, urban heritage
Procedia PDF Downloads 2963122 Fragile States as the Fertile Ground for Non-State Actors: Colombia and Somalia
Authors: Giorgi Goguadze, Jakub Zajączkowski
Abstract:
This paper is written due to overview the connection between fragile states and non-state actors, we should take into account that fragile states may vary from weak, failing and failed. In this paper we will discuss about two countries, one of them is weak (Colombia/ second one is already failed- Somalia. We will try to understand what feeds ill non-state actors such as: terrorist organizations, criminal entities and other cells in these countries, what threats are they representing and how to eliminate these dangers in both national and international scope. This paper is mainly based on literature overview and personal attitude and doesn’t claim to be in scientific chain.Keywords: fragile States, terrorism, tribalism, Somalia
Procedia PDF Downloads 3673121 Generating Synthetic Chest X-ray Images for Improved COVID-19 Detection Using Generative Adversarial Networks
Authors: Muneeb Ullah, Daishihan, Xiadong Young
Abstract:
Deep learning plays a crucial role in identifying COVID-19 and preventing its spread. To improve the accuracy of COVID-19 diagnoses, it is important to have access to a sufficient number of training images of CXRs (chest X-rays) depicting the disease. However, there is currently a shortage of such images. To address this issue, this paper introduces COVID-19 GAN, a model that uses generative adversarial networks (GANs) to generate realistic CXR images of COVID-19, which can be used to train identification models. Initially, a generator model is created that uses digressive channels to generate images of CXR scans for COVID-19. To differentiate between real and fake disease images, an efficient discriminator is developed by combining the dense connectivity strategy and instance normalization. This approach makes use of their feature extraction capabilities on CXR hazy areas. Lastly, the deep regret gradient penalty technique is utilized to ensure stable training of the model. With the use of 4,062 grape leaf disease images, the Leaf GAN model successfully produces 8,124 COVID-19 CXR images. The COVID-19 GAN model produces COVID-19 CXR images that outperform DCGAN and WGAN in terms of the Fréchet inception distance. Experimental findings suggest that the COVID-19 GAN-generated CXR images possess noticeable haziness, offering a promising approach to address the limited training data available for COVID-19 model training. When the dataset was expanded, CNN-based classification models outperformed other models, yielding higher accuracy rates than those of the initial dataset and other augmentation techniques. Among these models, ImagNet exhibited the best recognition accuracy of 99.70% on the testing set. These findings suggest that the proposed augmentation method is a solution to address overfitting issues in disease identification and can enhance identification accuracy effectively.Keywords: classification, deep learning, medical images, CXR, GAN.
Procedia PDF Downloads 963120 How Can Personal Protective Equipment Be Best Used and Reused: A Human Factors based Look at Donning and Doffing Procedures
Authors: Devin Doos, Ashley Hughes, Trang Pham, Paul Barach, Rami Ahmed
Abstract:
Over 115,000 Health Care Workers (HCWs) have died from COVID-19, and millions have been infected while caring for patients. HCWs have filed thousands of safety complaints surrounding safety concerns due to Personal Protective Equipment (PPE) shortages, which included concerns around inadequate and PPE reuse. Protocols for donning and doffing PPE remain ambiguous, lacking an evidence-base, and often result in wide deviations in practice. PPE donning and doffing protocol deviations commonly result in self-contamination but have not been thoroughly addressed. No evidence-driven protocols provide guidance on protecting HCW during periods of PPE reuse. Objective: The aim of this study was to examine safety-related threats and risks to Health Care Workers (HCWs) due to the reuse of PPE among Emergency Department personnel. Method: We conducted a prospective observational study to examine the risks of reusing PPE. First, ED personnel were asked to don and doff PPE in a simulation lab. Each participant was asked to don and doff PPE five times, according to the maximum reuse recommendation set by the Centers for Disease Control and Prevention (CDC). Each participant was videorecorded; video recordings were reviewed and coded independently by at least 2 of the 3trained coders for safety behaviors and riskiness of actions. A third coder was brought in when the agreement between the 2 coders could not be reached. Agreement between coders was high (81.9%), and all disagreements (100%) were resolved via consensus. A bowtie risk assessment chart was constructed analyzing the factors that contribute to increased risks HCW are faced with due to PPE use and reuse. Agreement amongst content experts in the field of Emergency Medicine, Human Factors, and Anesthesiology was used to select aspects of health care that both contribute and mitigate risks associated with PPE reuse. Findings: Twenty-eight clinician participants completed five rounds of donning/doffing PPE, yielding 140 PPE donning/doffing sequences. Two emerging threats were associated with behaviors in donning, doffing, and re-using PPE: (i) direct exposure to contaminant, and (ii) transmission/spread of contaminant. Protective behaviors included: hand hygiene, not touching the patient-facing surface of PPE, and ensuring a proper fit and closure of all PPE materials. 100% of participants (n= 28) deviated from the CDC recommended order, and most participants (92.85%, n=26) self-contaminated at least once during reuse. Other frequent errors included failure to tie all ties on the PPE (92.85%, n=26) and failure to wash hands after a contamination event occurred (39.28%, n=11). Conclusions: There is wide variation and regular errors in how HCW don and doffPPE while including in reusing PPE that led to self-contamination. Some errors were deemed “recoverable”, such as hand washing after touching a patient-facing surface to remove the contaminant. Other errors, such as using a contaminated mask and accidentally spreading to the neck and face, can lead to compound risks that are unique to repeated PPE use. A more comprehensive understanding of the contributing threats to HCW safety and complete approach to mitigating underlying risks, including visualizing with risk management toolsmay, aid future PPE designand workflow and space solutions.Keywords: bowtie analysis, health care, PPE reuse, risk management
Procedia PDF Downloads 913119 Safety of Ports, Harbours, Marine Terminals: Application of Quantitative Risk Assessment
Authors: Dipak Sonawane, Sudarshan Daga, Somesh Gupta
Abstract:
Quantitative risk assessment (QRA) is a very precise and consistent approach to defining the likelihood, consequence and severity of a major incident/accident. A variety of hazardous cargoes in bulk, such as hydrocarbons and flammable/toxic chemicals, are handled at various ports. It is well known that most of the operations are hazardous, having the potential of damaging property, causing injury/loss of life and, in some cases, the threat of environmental damage. In order to ensure adequate safety towards life, environment and property, the application of scientific methods such as QRA is inevitable. By means of these methods, comprehensive hazard identification, risk assessment and appropriate implementation of Risk Control measures can be carried out. In this paper, the authors, based on their extensive experience in Risk Analysis for ports and harbors, have exhibited how QRA can be used in practice to minimize and contain risk to tolerable levels. A specific case involving the operation for unloading of hydrocarbon at a port is presented. The exercise provides confidence that the method of QRA, as proposed by the authors, can be used appropriately for the identification of hazards and risk assessment of Ports and Terminals.Keywords: quantitative risk assessment, hazard assessment, consequence analysis, individual risk, societal risk
Procedia PDF Downloads 803118 Vibration-Based Structural Health Monitoring of a 21-Story Building with Tuned Mass Damper in Seismic Zone
Authors: David Ugalde, Arturo Castillo, Leopoldo Breschi
Abstract:
The Tuned Mass Dampers (TMDs) are an effective system for mitigating vibrations in building structures. These dampers have traditionally focused on the protection of high-rise buildings against earthquakes and wind loads. The Camara Chilena de la Construction (CChC) building, built in 2018 in Santiago, Chile, is a 21-story RC wall building equipped with a 150-ton TMD and instrumented with six permanent accelerometers, offering an opportunity to monitor the dynamic response of this damped structure. This paper presents the system identification of the CChC building using power spectral density plots of ambient vibration and two seismic events (5.5 Mw and 6.7 Mw). Linear models of the building with and without the TMD are used to compute the theoretical natural periods through modal analysis and simulate the response of the building through response history analysis. Results show that natural periods obtained from both ambient vibrations and earthquake records are quite similar to the theoretical periods given by the modal analysis of the building model. Some of the experimental periods are noticeable by simple inspection of the earthquake records. The accelerometers in the first story better captured the modes related to the building podium while the upper accelerometers clearly captured the modes related to the tower. The earthquake simulation showed smaller accelerations in the model with TMD that are similar to that measured by the accelerometers. It is concluded that the system identification through power spectral density shows consistency with the expected dynamic properties. The structural health monitoring of the CChC building confirms the advantages of seismic protection technologies such as TMDs in seismic prone areas.Keywords: system identification, tuned mass damper, wall buildings, seismic protection
Procedia PDF Downloads 1253117 The Works of Ibrahim Eissa: A Controversy
Authors: Malak Khaled Hosny
Abstract:
The paper inspects Ibrahim Eissa, a famous Egyptian writer and TV persona, and his literary and film works. Having faced threats of persecution and assassination, Eissa is a controversial figure in Egyptian media, and his works always pose a trigger of outrage and conversation. His book The Preacher, his movie The Guest, and his TV show Faten Amal Harby all led to some controversy unfolding in Egyptian society, and all led to conversations erupting in Egyptian households and on social media platforms. Through a close reading of his written work and an analytic watch of his work on-screen, the paper delves into the details of the intentions behind and the repercussions of Ibrahim Eissa's work.Keywords: censorship, film, literature, religion
Procedia PDF Downloads 1063116 Analysis of Big Data
Authors: Sandeep Sharma, Sarabjit Singh
Abstract:
As per the user demand and growth trends of large free data the storage solutions are now becoming more challenge-able to protect, store and to retrieve data. The days are not so far when the storage companies and organizations are start saying 'no' to store our valuable data or they will start charging a huge amount for its storage and protection. On the other hand as per the environmental conditions it becomes challenge-able to maintain and establish new data warehouses and data centers to protect global warming threats. A challenge of small data is over now, the challenges are big that how to manage the exponential growth of data. In this paper we have analyzed the growth trend of big data and its future implications. We have also focused on the impact of the unstructured data on various concerns and we have also suggested some possible remedies to streamline big data.Keywords: big data, unstructured data, volume, variety, velocity
Procedia PDF Downloads 5483115 Isolation and Identification of Biosurfactant Producing Microorganism for Bioaugmentation
Authors: Karthick Gopalan, Selvamohan Thankiah
Abstract:
Biosurfactants are lipid compounds produced by microbes, which are amphipathic molecules consisting of hydrophophic and hydrophilic domains. In the present investigation, ten bacterial strains were isolated from petroleum oil contaminated sites near petrol bunk. Oil collapsing test, haemolytic activity were used as a criteria for primary isolation of biosurfactant producing bacteria. In this study, all the bacterial strains gave positive results. Among the ten strains, two were observed as good biosurfactant producers, they utilize the diesel as a sole carbon source. Optimization of biosurfactant producing bacteria isolated from petroleum oil contaminated sites was carried out using different parameters such as, temperature (20ºC, 25ºC, 30ºC, 37ºC and 45ºC), pH (5,6,7,8 & 9) and nitrogen sources (ammonium chloride, ammonium carbonate and sodium nitrate). Biosurfactants produced by bacteria were extracted, dried and quantified. As a result of optimization of parameters the suitable values for the production of more amount of biosurfactant by the isolated bacterial species was observed as 30ºC (0.543 gm/lt) in the pH 7 (0.537 gm/lt) with ammonium nitrate (0.431 gm/lt) as sole carbon source.Keywords: isolation and identification, biosurfactant, microorganism, bioaugmentation
Procedia PDF Downloads 3503114 Strategic Cyber Sentinel: A Paradigm Shift in Enhancing Cybersecurity Resilience
Authors: Ayomide Oyedele
Abstract:
In the dynamic landscape of cybersecurity, "Strategic Cyber Sentinel" emerges as a revolutionary framework, transcending traditional approaches. This paper pioneers a holistic strategy, weaving together threat intelligence, machine learning, and adaptive defenses. Through meticulous real-world simulations, we demonstrate the unprecedented resilience of our framework against evolving cyber threats. "Strategic Cyber Sentinel" redefines proactive threat mitigation, offering a robust defense architecture poised for the challenges of tomorrow.Keywords: cybersecurity, resilience, threat intelligence, machine learning, adaptive defenses
Procedia PDF Downloads 833113 A CM-Based Model for 802.11 Networks Security Policies Enforcement
Authors: Karl Mabiala Dondia, Jing Ma
Abstract:
In recent years, networks based on the 802.11 standards have gained a prolific deployment. The reason for this massive acceptance of the technology by both home users and corporations is assuredly due to the "plug-and-play" nature of the technology and the mobility. The lack of physical containment due to inherent nature of the wireless medium makes maintenance very challenging from a security standpoint. This study examines via continuous monitoring various predictable threats that 802.11 networks can face, how they are executed, where each attack may be executed and how to effectively defend against them. The key goal is to identify the key components of an effective wireless security policy.Keywords: wireless LAN, IEEE 802.11 standards, continuous monitoring, security policy
Procedia PDF Downloads 3803112 Selective Recovery and Molecular Identification of Laccase-Producing Bacteria from Selected Terrestrial and Aquatic Milieu in the Eastern Cape, South Africa: Toward the Production of Environmentally Relevant Biocatalysts
Authors: John Onolame Unuofin, Uchechukuw U. Nwodo, Anthony I. Okoh
Abstract:
Laccase is constantly gaining status as important biocatalyst in biotechnology. The illimitable potential of its industrial applications and the corresponding aggressive need for phenomenal volumes of extracellularly secreted laccases have called for its interminable production from sources which are able to meet this demand within a relatively short period of time, preferably bacteria. In response to this call, this study was designed to source for laccase-producing bacteria from different environmental matrices. Three sampling environments were chosen such as wastewater treatment plants, University of Fort Hare vicinity and the Hogback woodland, all within the Eastern Cape, South Africa. Samples such as effluents, sediments, leaf litters, degrading wood and rock scrapings were selectively enriched with some model aromatic compounds and were further screened qualitatively and quantitatively on five phenolic substrates ABTS (2,2’-azino-bis(3-ethylbenzothiazoline-6-sulphonic acid), Guaiacol, 1-Naphthol, Potassium Ferric Cyanide and Syringaldazine). Basis for selection was their ability to elicit a colour change on at least three of the above mentioned agar based assay substrates. The choice isolates were further identified based on 16S rRNA molecular identification techniques. 33 isolates were screened out of the 40 representative distinct colonies during the qualitative plate screens, while quantitative screens selected out 11 bacterial isolates. They were, based on molecular identification, desginated as members of the genera Pseudomonas, Stenotrophomonas and Citrobacter of the gammaproteobacteria and Bordetalla and Achromobacter of the betaproteobacteria respectively. We therefore conclude based on our outcomes that we may have isolated efficient laccase-producing bacteria, which might be of beneficial significance in catalysis and biotechnology.Keywords: beta proteobacteria, catalysis, gammaproteobacteria, laccase
Procedia PDF Downloads 1743111 System Identification in Presence of Outliers
Authors: Chao Yu, Qing-Guo Wang, Dan Zhang
Abstract:
The outlier detection problem for dynamic systems is formulated as a matrix decomposition problem with low-rank, sparse matrices and further recast as a semidefinite programming (SDP) problem. A fast algorithm is presented to solve the resulting problem while keeping the solution matrix structure and it can greatly reduce the computational cost over the standard interior-point method. The computational burden is further reduced by proper construction of subsets of the raw data without violating low rank property of the involved matrix. The proposed method can make exact detection of outliers in case of no or little noise in output observations. In case of significant noise, a novel approach based on under-sampling with averaging is developed to denoise while retaining the saliency of outliers and so-filtered data enables successful outlier detection with the proposed method while the existing filtering methods fail. Use of recovered “clean” data from the proposed method can give much better parameter estimation compared with that based on the raw data.Keywords: outlier detection, system identification, matrix decomposition, low-rank matrix, sparsity, semidefinite programming, interior-point methods, denoising
Procedia PDF Downloads 3073110 Small Fixed-Wing UAV Physical Based Modeling, Simulation, and Validation
Authors: Ebrahim H. Kapeel, Ehab Safwat, Hossam Hendy, Ahmed M. Kamel, Yehia Z. Elhalwagy
Abstract:
Motivated by the problem of the availability of high-fidelity flight simulation models for small unmanned aerial vehicles (UAVs). This paper focuses on the geometric-mass inertia modeling and the actuation system modeling for the small fixed-wing UAVs. The UAV geometric parameters for the body, wing, horizontal and vertical tail are physically measured. Pendulum experiment with high-grade sensors and data analysis using MATLAB is used to estimate the airplane moment of inertia (MOI) model. Finally, UAV’s actuation system is modeled by estimating each servo transfer function by using the system identification, which uses experimental measurement for input and output angles through using field-programmable gate array (FPGA). Experimental results for the designed models are given to illustrate the effectiveness of the methodology. It also gives a very promising result to finalize the open-loop flight simulation model through modeling the propulsion system and the aerodynamic system.Keywords: unmanned aerial vehicle, geometric-mass inertia model, system identification, Simulink
Procedia PDF Downloads 1793109 Molecular Identification of Camel Tick and Investigation of Its Natural Infection by Rickettsia and Borrelia in Saudi Arabia
Authors: Reem Alajmi, Hind Al Harbi, Tahany Ayaad, Zainab Al Musawi
Abstract:
Hard ticks Hyalomma spp. (family: Ixodidae) are obligate ectoparasite in their all life stages on some domestic animals mainly camels and cattle. Ticks may lead to many economic and public health problems because of their blood feeding behavior. Also, they act as vectors for many bacterial, viral and protozoan agents which may cause serious diseases such as tick-born encephalitis, Rocky-mountain spotted fever, Q-fever and Lyme disease which can affect human and/or animals. In the present study, molecular identification of ticks that attack camels in Riyadh region, Saudi Arabia based on the partial sequence of mitochondrial 16s rRNA gene was applied. Also, the present study aims to detect natural infections of collected camel ticks with Rickessia spp. and Borelia spp. using PCR/hybridization of Citrate synthase encoding gene present in bacterial cells. Hard ticks infesting camels were collected from different camels located in a farm in Riyadh region, Saudi Arabia. Results of the present study showed that the collected specimens belong to two species: Hyalomma dromedari represent 99% of the identified specimens and Hyalomma marginatum which account for 1 % of identified ticks. The molecular identification was made through blasting the obtained sequence of this study with sequences already present and identified in GeneBank. All obtained sequences of H. dromedarii specimens showed 97-100% identity with the same gene sequence of the same species (Accession # L34306.1) which was used as a reference. Meanwhile, no intraspecific variations of H. marginatum mesured because only one specimen was collected. Results also had shown that the intraspecific variability between individuals of H. dromedarii obtained in 92 % of samples ranging from 0.2- 6.6%, while the remaining 7 % of the total samples of H. dromedarii showed about 10.3 % individual differences. However, the interspecific variability between H. dromedarii and H. marginatum was approximately 18.3 %. On the other hand, by using the technique of PCR/hybridization, we could detect natural infection of camel ticks with Rickettsia spp. and Borrelia spp. Results revealed the natural presence of both bacteria in collected ticks. Rickettsial spp. infection present in 29% of collected ticks, while 35% of collected specimen were infected with Borrelia spp. The valuable results obtained from the present study are a new record for the molecular identification of camel ticks in Riyadh, Saudi Arabia and their natural infection with both Rickettsia spp. and Borrelia spp. These results may help scientists to provide a good and direct control strategy of ticks in order to protect one of the most important economic animals which are camels. Also results of this project spotlight on the disease that might be transmitted by ticks to put out a direct protective plan to prevent spreading of these dangerous agents. Further molecular studies are needed to confirm the results of the present study by using other mitochondrial and nuclear genes for tick identification.Keywords: Camel ticks, Rickessia spp. , Borelia spp. , mitochondrial 16s rRNA gene
Procedia PDF Downloads 2773108 Impacts of Public Insurance on Health Access and Outcomes: Evidence from India
Authors: Titir Bhattacharya, Tanika Chakraborty, Prabal K. De
Abstract:
Maternal and child health continue to be a significant policy focus in developing countries, including India. An emerging model in health care is the creation of public and private partnerships. Since the construction of physical infrastructure is costly, governments at various levels have tried to implement social health insurance schemes where a trust calculates insurance premiums and medical payments. Typically, qualifying families get full subsidization of the premium and get access to private hospitals, in addition to low cost public hospitals, for their tertiary care needs. We analyze one such pioneering social insurance scheme in the Indian state of Andhra Pradesh (AP). The Rajiv Aarogyasri program (RA) was introduced by the Government of AP on a pilot basis in 2007 and implemented in 2008. In this paper, we first examine the extent to which access to reproductive health care changed. For example, the RA scheme reimburses hospital deliveries leading us to expect an increase in institutional deliveries, particularly in private hospitals. Second, we expect an increase in institutional deliveries to also improve child health outcomes. Hence, we estimate if the program improved infant and child mortality. We use District Level Health Survey data to create annual birth cohorts from 2000-2015. Since AP was the only state in which such a state insurance program was implemented, the neighboring states constituted a plausible control group. Combined with the policy timing, and the year of birth, we employ a difference-indifference strategy to identify the effects of RA on the residents of AP. We perform several checks against threats to identification, including testing for pre-treatment trends between the treatment and control states. We find that the policy significantly lowered infant and child mortality in AP. We also find that deliveries in private hospitals increased, and government hospitals decreased, showing a substitution effect of the relative price change. Finally, as expected, out-of-pocket costs declined for the treatment group. However, we do not find any significant effects for usual preventive care such as vaccination, showing that benefits of insurance schemes targeted at the tertiary level may not trickle down to the primary care level.Keywords: public health insurance, maternal and child health, public-private choice
Procedia PDF Downloads 963107 Prevalence, Isolation and Identification of Feline Panleukopaenia Virus from Wild Felids in Nandankanan Zoo, Odisha
Authors: Arun Kharate, Sarata Kumar Sahu, Susen Kumar Panda, Niranjan Sahoo, H. K. Panda
Abstract:
In the present study, an attempt has been made for isolation and identification of feline panleukopaenia virus (FPLV) from wild felids of Nandankanan zoo, Odisha, India, along with prevalence study of FPLV. Fecal samples collected from wild felids (26 tigers, 22 lions, 5 leopards, 3 hyenas, 1 jaguar, 2 foxes and 1 wild cat) were subjected to hemagglutinnation test and fluorescent antibody test. In hemagglutinnation test 13 (50%) samples from tiger, 14 (63.63%) samples from lions, 1 (20%) sample from leopards, 1 (50%) from fox, 3 (100%) samples from hyenas and 1 (100%) sample from wild cat were positive. On fluorescent antibody test (FAT), 15 (57.69%) samples from tiger, 18 (81.81%) from lions, 2 (40%) from leopards, 1 (50%) from fox, 3 (100%) from hyenas and 1 (100%) from wild cat were positive. FPLV was isolated using MDBK cell line and preliminary characterization was done on the basis of characteristic cytopathic effect. The virus samples were quantified through titration in MDBK cells. Serological confirmation of FPLV isolates was carried out by HI test, micro-SNT and indirect-ELISA. Physico-chemical characters like pH and temperature resistance along molecular identification using specific FPLV primers was carried out. Seroprevalence study of 36 serum samples employing HI test, micro SNT and indirect-ELISA revealed prevalence of 38.8, 44.4 and 72.2% respectively. During study period an adult tigress and a tiger cub died suspected of feline panleukopenia. The necropsy findings in both animals showed hemorrhagic gastroenteritis. The cytological examination revealed presence of intranuclear inclusion bodies in the intestinal epithelial cells. Spleen, mesenteric lymph node and intestine were positive for feline panleukopenia by FAT. The investigation revealed that feline panleukopenia was prevalent in wild felines of Nandankanan zoo.Keywords: Feline panleukopenia, fluorescent antibody test, hemagglutination test, indirect-ELISA, Nandankanan zoo
Procedia PDF Downloads 3263106 Comprehensive Profiling and Characterization of Untargeted Extracellular Metabolites in Fermentation Processes: Insights and Advances in Analysis and Identification
Authors: Marianna Ciaccia, Gennaro Agrimi, Isabella Pisano, Maurizio Bettiga, Silvia Rapacioli, Giulia Mensa, Monica Marzagalli
Abstract:
Objective: Untargeted metabolomic analysis of extracellular metabolites is a powerful approach that focuses on comprehensively profiling in the extracellular space. In this study, we applied extracellular metabolomic analysis to investigate the metabolism of two probiotic microorganisms with health benefits that extend far beyond the digestive tract and the immune system. Methods: Analytical techniques employed in extracellular metabolomic analysis encompass various technologies, including mass spectrometry (MS), which enables the identification of metabolites present in the fermentation media, as well as the comparison of metabolic profiles under different experimental conditions. Multivariate statistical analysis techniques like principal component analysis (PCA) or partial least squares-discriminant analysis (PLS-DA) play a crucial role in uncovering metabolic signatures and understanding the dynamics of metabolic networks. Results: Different types of supernatants from fermentation processes, such as dairy-free, not dairy-free media and media with no cells or pasteurized, were subjected to metabolite profiling, which contained a complex mixture of metabolites, including substrates, intermediates, and end-products. This profiling provided insights into the metabolic activity of the microorganisms. The integration of advanced software tools has facilitated the identification and characterization of metabolites in different fermentation conditions and microorganism strains. Conclusions: In conclusion, untargeted extracellular metabolomic analysis, combined with software tools, allowed the study of the metabolites consumed and produced during the fermentation processes of probiotic microorganisms. Ongoing advancements in data analysis methods will further enhance the application of extracellular metabolomic analysis in fermentation research, leading to improved bioproduction and the advancement of sustainable manufacturing processes.Keywords: biotechnology, metabolomics, lactic bacteria, probiotics, postbiotics
Procedia PDF Downloads 713105 Target and Biomarker Identification Platform to Design New Drugs against Aging and Age-Related Diseases
Authors: Peter Fedichev
Abstract:
We studied fundamental aspects of aging to develop a mathematical model of gene regulatory network. We show that aging manifests itself as an inherent instability of gene network leading to exponential accumulation of regulatory errors with age. To validate our approach we studied age-dependent omic data such as transcriptomes, metabolomes etc. of different model organisms and humans. We build a computational platform based on our model to identify the targets and biomarkers of aging to design new drugs against aging and age-related diseases. As biomarkers of aging, we choose the rate of aging and the biological age since they completely determine the state of the organism. Since rate of aging rapidly changes in response to an external stress, this kind of biomarker can be useful as a tool for quantitative efficacy assessment of drugs, their combinations, dose optimization, chronic toxicity estimate, personalized therapies selection, clinical endpoints achievement (within clinical research), and death risk assessments. According to our model, we propose a method for targets identification for further interventions against aging and age-related diseases. Being a biotech company, we offer a complete pipeline to develop an anti-aging drug-candidate.Keywords: aging, longevity, biomarkers, senescence
Procedia PDF Downloads 2743104 Identification of Novel Differentially Expressed and Co-Expressed Genes between Tumor and Adjacent Tissue in Prostate Cancer
Authors: Luis Enrique Bautista-Hinojosa, Luis A. Herrera, Cristian Arriaga-Canon
Abstract:
Text should be written in the third person. Please avoid using "I" “my” or the pronoun "one". It is best to say "It is believed..." rather than "I believe..." or "One believes...".Keywords: transcriptomics, co-expression, cancer, biomarkers
Procedia PDF Downloads 753103 Source Identification Model Based on Label Propagation and Graph Ordinary Differential Equations
Authors: Fuyuan Ma, Yuhan Wang, Junhe Zhang, Ying Wang
Abstract:
Identifying the sources of information dissemination is a pivotal task in the study of collective behaviors in networks, enabling us to discern and intercept the critical pathways through which information propagates from its origins. This allows for the control of the information’s dissemination impact in its early stages. Numerous methods for source detection rely on pre-existing, underlying propagation models as prior knowledge. Current models that eschew prior knowledge attempt to harness label propagation algorithms to model the statistical characteristics of propagation states or employ Graph Neural Networks (GNNs) for deep reverse modeling of the diffusion process. These approaches are either deficient in modeling the propagation patterns of information or are constrained by the over-smoothing problem inherent in GNNs, which limits the stacking of sufficient model depth to excavate global propagation patterns. Consequently, we introduce the ODESI model. Initially, the model employs a label propagation algorithm to delineate the distribution density of infected states within a graph structure and extends the representation of infected states from integers to state vectors, which serve as the initial states of nodes. Subsequently, the model constructs a deep architecture based on GNNs-coupled Ordinary Differential Equations (ODEs) to model the global propagation patterns of continuous propagation processes. Addressing the challenges associated with solving ODEs on graphs, we approximate the analytical solutions to reduce computational costs. Finally, we conduct simulation experiments on two real-world social network datasets, and the results affirm the efficacy of our proposed ODESI model in source identification tasks.Keywords: source identification, ordinary differential equations, label propagation, complex networks
Procedia PDF Downloads 203102 Features of Formation and Development of Possessory Risk Management Systems of Organization in the Russian Economy
Authors: Mikhail V. Khachaturyan, Inga A. Koryagina, Maria Nikishova
Abstract:
The study investigates the impact of the ongoing financial crisis, started in the 2nd half of 2014, on marketing budgets spent by Fast-moving consumer goods companies. In these conditions, special importance is given to efficient possessory risk management systems. The main objective for establishing and developing possessory risk management systems for FMCG companies in a crisis is to analyze the data relating to the external environment and consumer behavior in a crisis. Another important objective for possessory risk management systems of FMCG companies is to develop measures and mechanisms to maintain and stimulate sales. In this regard, analysis of risks and threats which consumers define as the main reasons affecting their level of consumption become important. It is obvious that in crisis conditions the effective risk management systems responsible for development and implementation of strategies for consumer demand stimulation, as well as the identification, analysis, assessment and management of other types of risks of economic security will be the key to sustainability of a company. In terms of financial and economic crisis, the problem of forming and developing possessory risk management systems becomes critical not only in the context of management models of FMCG companies, but for all the companies operating in other sectors of the Russian economy. This study attempts to analyze the specifics of formation and development of company possessory risk management systems. In the modern economy, special importance among all the types of owner’s risks has the risk of reduction in consumer activity. This type of risk is common not only for the consumer goods trade. Study of consumer activity decline is especially important for Russia due to domestic market of consumer goods being still in the development stage, despite its significant growth. In this regard, it is especially important to form and develop possessory risk management systems for FMCG companies. The authors offer their own interpretation of the process of forming and developing possessory risk management systems within owner’s management models of FMCG companies as well as in Russian economy in general. Proposed methods and mechanisms of problem analysis of formation and development of possessory risk management systems in FMCG companies and the results received can be helpful for researchers interested in problems of consumer goods market development in Russia and overseas.Keywords: FMCG companies, marketing budget, risk management, owner, Russian economy, organization, formation, development, system
Procedia PDF Downloads 3773101 The Perspective of Waste Frying Oil in São Paulo and Its Dimensions in the Reverse Logistics of the Production of Biodiesel
Authors: Max Filipe Goncalves, Alessandra Concilio, Rodrigo Shimada
Abstract:
The waste frying oil is highly pollutant when disposed incorrectly in the environment. Is necessary search of the Reverse Logistics to identify how can be structure to return the waste like this to productive chain and to be used in the new process. In this context, the objective of this paper is to analyze the perspective of the waste frying oil in São Paulo, and its dimensions in the production of biodiesel. Subjacent factors such as the agents, motivators and legal aspects were analyzed to demonstrate it. Then, the SWOT matrix was built with the aspects observed and the forces, weaknesses, opportunities and threats of the reverse logistic chain in São Paulo.Keywords: biodiesel, perspective, reverse logistic, WFO
Procedia PDF Downloads 2093100 Non-Candida Albicans Candida: Virulence Factors and Species Identification in India
Authors: Satender Saraswat, Dharmendra Prasad Singh, Rajesh Kumar Verma, Swati Sarswat
Abstract:
Background and Purpose: The predominant cause of candidiasis was Candida albicans which has shifted towards non-Candida albicans Candida (NCAC) (Candida species other than the C. albicans). NCAC, earlier considered non-pathogenic or minimally virulent, are now considered a primary cause of morbidity and mortality in immunocompromised. With the NCAC spp. gaining weightage in the clinical cases, this study was conducted to determine the prevalence of NCAC spp. in different clinical specimens and to assess a few of their virulence factors. Material and Methods: Routine samples for bacterial culture and sensitivity, showing colony characteristics like Candida on Blood Agar and microscopic features resembling Candida spp. were processed further. Candida isolates were tested for chlamydospore formation, biochemical tests including sugar fermentation and sugar assimilation tests, and growth at 42oC, colony colour on HiCrome™ Candida Differential Agar, HiCandida Identification Kit and VITEK-2 Compact. Virulence factors like adherence to buccal epithelial cells (ABEC), biofilm formation, hemolytic activity, and production of coagulase enzyme were also tested. Results: Mean age of the patients was 38.46 with a male-female ratio of 1.36:1. 137 Candida isolates were recovered. 45.3% isolates were isolated from urine, 19.7% from vaginal swabs and 13.9% from oropharyngeal swabs. 55 (40.1%) isolates of C. albicans and 82 (59.9%) of NCAC spp. were identified, with C. tropicalis (23.4%) in NCAC. C. albicans (3; 50%) was the commonest species in cases of candidemia. Haemolysin production (85.5%) and ABEC (78.2%) were the major virulence factors in C. albicans. C. tropicalis (59.4%) and C. dubliniensis (50%) showed maximum ABEC. Biofilm forming capacity was higher in C. tropicalis (78.1%) than C. albicans (67%). Conclusion: This study suggests varied prevalence and virulence based on geographical locations, even within a subcontinent. It clearly demarcates the emergence of NCAC and their predominance in different body fluids. Identification of Candida to species level should become a routine in all the laboratories.Keywords: ABEC, NCAC, non-Candida albicans Candida, Vitek-2TM compact
Procedia PDF Downloads 1333099 Radio Frequency Identification (Rfid) Cost-Effective, Location-Based System for Managing Construction Materials
Authors: Mourad Bakouka, Abdelaziz Rabehi
Abstract:
Companies need to have logistics and transportation in place that can adapt to the changing nature of construction sites. This ensures they can react quickly when needed. A study was conducted to develop a way to locate and track materials on construction sites. The system is an RFID/GPS integration that's required to pull off this feat. The study also reports how the platform has been used in construction. They found many advantages to using it, including reductions in both time and costs as well as improved management of materials orders. . For example, the time in which a project could start up was shortened from two weeks to three days with just a single digital order. As of now, the technology is still limited in its widespread adoption due largely to overall lack of awareness and difficulty connecting to it. However, as more and more companies embrace it in construction, the technology is expected to become ubiquitous. The developed platform provides contractors and construction managers with real-time information about the status of materials and work, allowing them to better manage the workflow in a project. The study sheds new light on this subject, which is essential to know. This work is becoming increasingly aware of the use of smart tools in constructing buildings.Keywords: materials management, internet of things (IoT), radio frequency identification (RFID), construction site, supply chain management
Procedia PDF Downloads 81