Search results for: threats identification
2948 Systemic Approach to Risk Measurement of Drainage Systems in Urban Areas
Authors: Jadwiga Królikowska, Andrzej Królikowski, Jarosław Bajer
Abstract:
The work delineates the threats of maladjustment of the capacity of rain canals, designed and built in the early 20th century, in connection to heavy rainfall, especially in summer. This is the cause of the so called 'urban floods.' It directly relates to fierce raise of paving in the cities. Resolving this problem requires a change in philosophy of draining the rainfall by wider use of retention, infiltration and usage of rainwater. In systemic approach to managing the safety of urban drainage systems the risk, which is directly connected to safety failures, has been accepted as a measure. The risk level defines the probability of occurrence of losses greater than the ones forecast for a given time frame. The procedure of risk modelling, enabling its numeric analysis by using appropriate weights, is a significant issue in this paper.Keywords: risk management, drainage system, urban areas, urban floods
Procedia PDF Downloads 3612947 Water Body Detection and Estimation from Landsat Satellite Images Using Deep Learning
Authors: M. Devaki, K. B. Jayanthi
Abstract:
The identification of water bodies from satellite images has recently received a great deal of attention. Different methods have been developed to distinguish water bodies from various satellite images that vary in terms of time and space. Urban water identification issues body manifests in numerous applications with a great deal of certainty. There has been a sharp rise in the usage of satellite images to map natural resources, including urban water bodies and forests, during the past several years. This is because water and forest resources depend on each other so heavily that ongoing monitoring of both is essential to their sustainable management. The relevant elements from satellite pictures have been chosen using a variety of techniques, including machine learning. Then, a convolution neural network (CNN) architecture is created that can identify a superpixel as either one of two classes, one that includes water or doesn't from input data in a complex metropolitan scene. The deep learning technique, CNN, has advanced tremendously in a variety of visual-related tasks. CNN can improve classification performance by reducing the spectral-spatial regularities of the input data and extracting deep features hierarchically from raw pictures. Calculate the water body using the satellite image's resolution. Experimental results demonstrate that the suggested method outperformed conventional approaches in terms of water extraction accuracy from remote-sensing images, with an average overall accuracy of 97%.Keywords: water body, Deep learning, satellite images, convolution neural network
Procedia PDF Downloads 892946 Bioactivities and Phytochemical Studies of Acrocarpus fraxinifolius Bark Wight and Arn
Authors: H. M. El-Rafie, A. H. Abou Zeid, R. S. Mohammed, A. A. Sleem
Abstract:
Acrocarpus is a genus of flowering plants in the legume family Fabaceae which considered as a large and economically important family. This study aimed to investigate the phytoconstituents of the petroleum ether extract (PEE) of Acrocarpus fraxinofolius bark by Gas chromatography coupled with mass spectrometry (GC/MS) analysis of its fractions (fatty acid and unsaponifiable matter). Concerning this, identification of 52 compounds constituting 97.03 % of the total composition of the unsaponifiable matter fraction. Cycloeucalenol was found to be the major compound representing 32.52% followed by 4a, 14a-dimethyl-A8~24(28)-ergostadien (26.50%) and ß-sitosterol(13.74%), furthermore Gas liquid chromatography (GLC) analysis of the sterol fraction revealed the identification of cholesterol (7.22 %), campesterol (13.30 %), stigmasterol (10.00 %) and β - sitosterol (69.48 %). Meanwhile, the identification of 33 fatty acids representing 90.71% of the total fatty acid constituents. Methyl-9,12-octadecadienoate (40.39%) followed by methyl hexadecanoate (23.64%) were found to be the major compounds. On the other hand, column chromatography and Thin layer chromatography (TLC) fractionation of PEE separate the triterpenoid: 21β-hydroxylup-20(29)-en-3-one and β- amyrin which were structurally identified by spectroscopic analysis (NMR, MS and IR). PEE has been biologically evaluated for 1: management of diabetes in alloxan induced diabetic rats 2: cytotoxic activity against four human tumor cell lines (Cervix carcinoma cell line[HELA], Breast carcinoma cell line [MCF7], Liver carcinoma cell line[HEPG2] and Colon carcinoma cell line[HCT-116] 3: hepatoprotective activity against CCl4-induced hepatotoxicity in rats and the activity was studied by assaying the serum marker enzymes like AST, ALT, and ALP. Concerning this, the anti-diabetic activity exhibited by 100mg of PEE extract was 74.38% relative to metformin (100% potency). It also showed a significant anti-proliferative activity against MCF-7 (IC50= 2.35µg), Hela(IC50=3.85µg) and HEPG-2 (IC50= 9.54µg) compared with Doxorubicin as reference drug. The hepatoprotective activity was evidenced by significant decrease in liver function enzymes, i.e. AST, ALT and ALP by (29.18%, 28.26%, and 34.11%, respectively using silymarin as the reference drug, compared to their concentration levels in an untreated group with liver damage induced by CCl₄. This study was performed for the first time on the bark of this species.Keywords: Acrocarpus fraxinofolius, antidiabetic, cytotoxic, hepatoprotective
Procedia PDF Downloads 1962945 Investigating 'Criticality' in Written Assignments of Postgraduate Students in TESOL and Applied Linguistics
Authors: Josephine Mirador
Abstract:
Too often, one hears teachers complaining about how uncritical students can be, yet the notion of ‘criticality’ may be subject to variable understandings or interpretations. One challenge facing postgraduate students is the writing of essays responding to a specific reading assignment. Such an essay requires students not only to summarise, but to engage in a discussion of the significant points of the article, pointing out its strengths as well as its weaknesses. This paper presents the results of an investigation on criticality in written assignments of postgraduate students in applied linguistics and TESOL. The guiding questions for this investigation were: -How ‘critical’ are postgraduate students when writing their assignments? -What kind of ‘critical’ comments are they able to offer? A total of 70 essays were analysed, using two sets of corpora in the initial and follow-through phases of the research from three different universities in Asia. The essays were written by MA applied linguistics and TESOL students. Students were told that the response essay should definitely not just summarise, but should offer a reflection or critique on the ideas presented in the subject article. The initial findings from the investigation include: the identification of at least 10 general ‘moves’ each of which has a number of possible specific categories; presence of critique ‘nodes’ as distinguished from ‘support’ comments; and the identification of at least 4 moves as the most recurrent and possibly obligatory categories. This investigation has unearthed a few more questions or issues that are definitely worth investigating as extensions of this research, and will be of interest (most especially) to genre analysts and teachers of writing.Keywords: criticality, discourse and genre analysis, postgraduate students, applied linguistics
Procedia PDF Downloads 3892944 Identification and Characterisation of Oil Sludge Degrading Bacteria Isolated from Compost
Authors: O. Ubani, H. I. Atagana, M. S. Thantsha, R. Adeleke
Abstract:
The oil sludge components (polycyclic aromatic hydrocarbons, PAHs) have been found to be cytotoxic, mutagenic and potentially carcinogenic and microorganisms such as bacteria and fungi can degrade the oil sludge to less toxic compounds such as carbon dioxide, water and salts. In the present study, we isolated different bacteria with PAH-degrading potentials from the co-composting of oil sludge and different animal manure. These bacteria were isolated on the mineral base medium and mineral salt agar plates as a growth control. A total of 31 morphologically distinct isolates were carefully selected from 5 different compost treatments for identification using polymerase chain reaction (PCR) of the 16S rDNA gene with specific primers (16S-P1 PCR and 16S-P2 PCR). The amplicons were sequenced and sequences were compared with the known nucleotides from the gene bank database. The phylogenetical analyses of the isolates showed that they belong to 3 different clades namely Firmicutes, Proteobacteria and Actinobacteria. These bacteria identified were closely related to genera Bacillus, Arthrobacter, Staphylococcus, Brevibacterium, Variovorax, Paenibacillus, Ralstonia and Geobacillus species. The results showed that Bacillus species were more dominant in all treated compost piles. Based on their characteristics these bacterial isolates have high potential to utilise PAHs of different molecular weights as carbon and energy sources. These identified bacteria are of special significance in their capacity to emulsify the PAHs and their ability to utilize them. Thus, they could be potentially useful for bioremediation of oil sludge and composting processes.Keywords: bioaugmentation, biodegradation, bioremediation, composting, oil sludge, PAHs, animal manures
Procedia PDF Downloads 2532943 Identification and Antibiotic Susceptibility of Bacteria Isolated from the Intestines of Slaughtered Goat and Cattle
Authors: Latifat Afolake Ogunfolabo, Hakeem Babafemi Ogunfolabo
Abstract:
The gastrointestinal tract is densely populated with micro-organism which closely and intensively interacts with the host and ingested feed. Food borne infections are some of the major international challenges that lead to high mortality and also, antimicrobial resistance, which has been classified as a serious threat by World Health Organization. Samples of slaughtered cattle and goats intestines were collected and standard culture methods were used for bacteria isolation and identification. Minimum inhibitory concentration of commonly used antibiotic using modification of the disk diffusion method was carried out on isolates. The samples cultured were all positive to Pseudomonas aeruginosa (95% and 90%), Escherichia coli (85%), Salmonella typhi (70% and 60%), Staphylococcus aureus (75%and 100%), Micrococcus luteus (55% and35%), Bacillus macerans (60% and 5%), Bacillus cereus (25% and 20%), Clostridium perfringens (20% and 5%), Micrococcus varians (20% and 5%), Bacillus subtilis (25% and 5%), Streptococcus faecalis (40% and 25%) and Streptococcus faecium (15% and 10%) in goat and cattle respectively. Also, Proteus mirabilis (40%), Micrococcus luteus (35%), Proteus vulgaris (30%), Klebsiella aerogenes(15%) were isolated from cattle. The total coliform (13.55 x10⁵cfu/gm ± 1.77) and (20.30 x10⁵cfu/gm ± 1.27) counts were significantly higher than the total bacteria count (8.3 x10⁵cfu/gm ± 1.41) and (16.60 x10⁵cfu/gm ±0.49) for goat and cattle respectively. Selected Bacteria count of isolates showed that Staphylococcus aureus had the highest significant value (6.9 x10⁵cfu/gm ± 0.57) and (16.80 x10⁵cfu/gm ± 0.57) Escherichia coli (4.60 x10⁵cfu/gm ± 0.42) and (7.05 x10⁵cfu/gm ± 0.64) while the lowest significant value was obtained in Salmonella/Shigella (1.7 x10⁵cfu/gm ± 0.00) and (1.5 x10⁵cfu/gm ± 0.00) for goat and cattle respectively. Susceptibility of bacteria isolated from slaughtered goat and cattle intestine to commonly used antibiotics showed that the highest statistical significant value for zone of inhibition for goat was obtained for Ciprofloxacin (30.00 ± 2.25, 23.75 ± 2.49, 17.17 ± 1.40) followed by Augmentin (28.33 ± 1.22, 21. 83 ± 2.44, 16.67 ± 1.49), Erythromycin (27.75 ±1.48, 20.25 ± 1.29, 16.67 ± 1.26) while the lowest values were obtained for Ofloxacin (27.17 ± 1.89, 21.42 ± 2.19, 16.83 ± 1.26) respectively and values obtained for cattle are Ciprofloxacin (30.64 ± 1.6, 25.79 ± 1.76, 8.07 ± 11.49) followed by Augmentin (28.29 ± 1.33, 22.64 ± 1.82, 17.43 ± 1.55) Ofloxacin (26.57 ± 2.02, 20.79 ± 2.75, 16.21 ± 1.19) while the lowest values were obtained for Erythromycin (26.64 ± 1.49, 20.29 ± 1.49, 16.29 ± 1.33) at different dilution factor (10⁻¹, 10⁻², 10⁻³) respectively. The isolates from goat and cattle were all susceptible to Augmentin at the three different dilution factors. Some goat isolates are intermediate to Ciprofloxacin and Erythromycin at 10⁻² and 10⁻³, while resistance to Ciprofloxacin at 10⁻³ dilution factor. Ciprofloxacin and Ofloxacin at the dilution factors of 10⁻³ and 10⁻¹ for some cattle isolate and resistance were observed for Ofloxacin and Erythromycin at dilution of 10⁻³. These results indicate the susceptibilities and the antimicrobial resistance to commonly used antibiotic.Keywords: antibiotic susceptibility, bacteria, cattle, goat, identification
Procedia PDF Downloads 1242942 Social Contact Patterns among School-Age Children in Taiwan
Authors: Dih Ling Luh, Zhi Shih You, Szu Chieh Chen
Abstract:
Social contact patterns among school-age children play an important role in the epidemiology of infectious disease. Since many of the greatest threats to human health are spread by direct person-to-person contact, understanding the spread of respiratory pathogens and patterns of human interactions are public health priorities. This study used social contact diaries to compare the number of contacts per day per participant across different flu/non-flu seasons and weekend/weekday. We also present contact properties such as sex, age, masking, setting, frequency, duration, and contact types among school-age children (grades 7–8). The sample size with pair-wise comparisons for the seasons (flu/non-flu) and stratification by location were 54 and 83, respectively. There was no difference in the number of contacts during the flu and non-flu seasons, with averages of 16.3 (S.D. = 12.9) and 14.6 (S.D. = 9.5) people, respectively. Weekdays were associated with 23% and 28% more contacts than weekend days during the non-flu and flu seasons, respectively (p < 0.001) (Wilcoxon signed-rank test).Keywords: contact patterns, behavior, influenza, social mixing
Procedia PDF Downloads 3452941 Anomaly Detection in Financial Markets Using Tucker Decomposition
Authors: Salma Krafessi
Abstract:
The financial markets have a multifaceted, intricate environment, and enormous volumes of data are produced every day. To find investment possibilities, possible fraudulent activity, and market oddities, accurate anomaly identification in this data is essential. Conventional methods for detecting anomalies frequently fail to capture the complex organization of financial data. In order to improve the identification of abnormalities in financial time series data, this study presents Tucker Decomposition as a reliable multi-way analysis approach. We start by gathering closing prices for the S&P 500 index across a number of decades. The information is converted to a three-dimensional tensor format, which contains internal characteristics and temporal sequences in a sliding window structure. The tensor is then broken down using Tucker Decomposition into a core tensor and matching factor matrices, allowing latent patterns and relationships in the data to be captured. A possible sign of abnormalities is the reconstruction error from Tucker's Decomposition. We are able to identify large deviations that indicate unusual behavior by setting a statistical threshold. A thorough examination that contrasts the Tucker-based method with traditional anomaly detection approaches validates our methodology. The outcomes demonstrate the superiority of Tucker's Decomposition in identifying intricate and subtle abnormalities that are otherwise missed. This work opens the door for more research into multi-way data analysis approaches across a range of disciplines and emphasizes the value of tensor-based methods in financial analysis.Keywords: tucker decomposition, financial markets, financial engineering, artificial intelligence, decomposition models
Procedia PDF Downloads 692940 The Systemic Approach to Risk Measurement of Drainage Systems in Urban Areas
Authors: Jadwiga Królikowska, Andrzej Królikowski, Jarosław Bajer
Abstract:
The work delineates the threats of maladjustment of the capacity of rain canals, designed and built in the early 20th century, in connection to heavy rainfall, especially in summer. This is the cause of the so called 'urban floods.' It directly relates to fierce raise of paving in the cities. Resolving this problem requires a change in philosophy of draining the rainfall by wider use of retention, infiltration and usage of rainwater. In systemic approach to managing the safety of urban drainage systems the risk, which is directly connected to safety failures, has been accepted as a measure. The risk level defines the probability of occurrence of losses grater than the ones forecast for a given time frame. The procedure of risk modelling, enabling its numeric analysis by using appropriate weights, is a significant issue in this paper.Keywords: drainage system, urban areas, risk measurement, systemic approach
Procedia PDF Downloads 2942939 Face Recognition Using Body-Worn Camera: Dataset and Baseline Algorithms
Authors: Ali Almadan, Anoop Krishnan, Ajita Rattani
Abstract:
Facial recognition is a widely adopted technology in surveillance, border control, healthcare, banking services, and lately, in mobile user authentication with Apple introducing “Face ID” moniker with iPhone X. A lot of research has been conducted in the area of face recognition on datasets captured by surveillance cameras, DSLR, and mobile devices. Recently, face recognition technology has also been deployed on body-worn cameras to keep officers safe, enabling situational awareness and providing evidence for trial. However, limited academic research has been conducted on this topic so far, without the availability of any publicly available datasets with a sufficient sample size. This paper aims to advance research in the area of face recognition using body-worn cameras. To this aim, the contribution of this work is two-fold: (1) collection of a dataset consisting of a total of 136,939 facial images of 102 subjects captured using body-worn cameras in in-door and daylight conditions and (2) evaluation of various deep-learning architectures for face identification on the collected dataset. Experimental results suggest a maximum True Positive Rate(TPR) of 99.86% at False Positive Rate(FPR) of 0.000 obtained by SphereFace based deep learning architecture in daylight condition. The collected dataset and the baseline algorithms will promote further research and development. A downloadable link of the dataset and the algorithms is available by contacting the authors.Keywords: face recognition, body-worn cameras, deep learning, person identification
Procedia PDF Downloads 1632938 Stature Prediction from Anthropometry of Extremities among Jordanians
Authors: Amal A. Mashali, Omar Eltaweel, Elerian Ekladious
Abstract:
Stature of an individual has an important role in identification, which is often required in medico-legal practice. The estimation of stature is an important step in the identification of dismembered remains or when only a part of a skeleton is only available as in major disasters or with mutilation. There is no published data on anthropological data among Jordanian population. The present study was designed in order to find out relationship of stature to some anthropometric measures among a sample of Jordanian population and to determine the most accurate and reliable one in predicting the stature of an individual. A cross sectional study was conducted on 336 adult healthy volunteers , free of bone diseases, nutritional diseases and abnormalities in the extremities after taking their consent. Students of Faculty of Medicine, Mutah University helped in collecting the data. The anthropometric measurements (anatomically defined) were stature, humerus length, hand length and breadth, foot length and breadth, foot index and knee height on both right and left sides of the body. The measurements were typical on both sides of the bodies of the studied samples. All the anthropologic data showed significant relation with age except the knee height. There was a significant difference between male and female measurements except for the foot index where F= 0.269. There was a significant positive correlation between the different measures and the stature of the individuals. Three equations were developed for estimation of stature. The most sensitive measure for prediction of a stature was found to be the humerus length.Keywords: foot index, foot length, hand length, humerus length, stature
Procedia PDF Downloads 3062937 A Constrained Model Predictive Control Scheme for Simultaneous Control of Temperature and Hygrometry in Greenhouses
Authors: Ayoub Moufid, Najib Bennis, Soumia El Hani
Abstract:
The objective of greenhouse climate control is to improve the culture development and to minimize the production costs. A greenhouse is an open system to external environment and the challenge is to regulate the internal climate despite the strong meteorological disturbances. The internal state of greenhouse considered in this work is defined by too relevant and coupled variables, namely inside temperature and hygrometry. These two variables are chosen to describe the internal state of greenhouses due to their importance in the development of plants and their sensitivity to external climatic conditions, sources of weather disturbances. A multivariable model is proposed and validated by considering a greenhouse as black-box system and the least square method is applied to parameters identification basing on collected experimental measures. To regulate the internal climate, we propose a Model Predictive Control (MPC) scheme. This one considers the measured meteorological disturbances and the physical and operational constraints on the control and state variables. A successful feasibility study of the proposed controller is presented, and simulation results show good performances despite the high interaction between internal and external variables and the strong external meteorological disturbances. The inside temperature and hygrometry are tracking nearly the desired trajectories. A comparison study with an On/Off control applied to the same greenhouse confirms the efficiency of the MPC approach to inside climate control.Keywords: climate control, constraints, identification, greenhouse, model predictive control, optimization
Procedia PDF Downloads 2062936 Management Opposition, Strikes, and Union Threats
Authors: Patrick Nüß
Abstract:
I estimate management opposition against unions in terms of hiring discrimination by a large scale field experiment in the German labor market. The results show that callback rates for union members decrease significantly in the presence of high sectoral union density and large firm size. I further explore how this effect varies with regional and sectoral labor dispute intensity and find that management opposition is stronger when a sector is exposed to an intense labor dispute. There is evidence that the observed management opposition can be explained by sectoral union threat effects. Sectors with lower hiring discrimination have lower coverage of collective agreements, and in the absence of a collective agreement, they are less likely to follow the collective agreement wage setting.Keywords: trade unions, Industrial relations, management opposition, union threat, labor disputes, field experiments
Procedia PDF Downloads 1852935 Cyber Attacks Management in IoT Networks Using Deep Learning and Edge Computing
Authors: Asmaa El Harat, Toumi Hicham, Youssef Baddi
Abstract:
This survey delves into the complex realm of Internet of Things (IoT) security, highlighting the urgent need for effective cybersecurity measures as IoT devices become increasingly common. It explores a wide array of cyber threats targeting IoT devices and focuses on mitigating these attacks through the combined use of deep learning and machine learning algorithms, as well as edge and cloud computing paradigms. The survey starts with an overview of the IoT landscape and the various types of attacks that IoT devices face. It then reviews key machine learning and deep learning algorithms employed in IoT cybersecurity, providing a detailed comparison to assist in selecting the most suitable algorithms. Finally, the survey provides valuable insights for cybersecurity professionals and researchers aiming to enhance security in the intricate world of IoT.Keywords: internet of things (IoT), cybersecurity, machine learning, deep learning
Procedia PDF Downloads 312934 Cheiloscopy: A Study on Predominant Lip Print Patterns among the Gujarati Population
Authors: Pooja Ahuja, Tejal Bhutani, M. S. Dahiya
Abstract:
Cheiloscopy, the study of lip prints, is a tool in forensic investigation technique that deals with identification of individuals based on lips patterns. The objective of this study is to determine predominant lip print pattern found among the Gujarati population, to evaluate whether any sex difference exists and to study the permanence of the pattern over six months duration. The study comprised of 100 healthy individuals (50 males and 50 females), in the age group of 18 to 25 years of Gujarati population of the Gandhinagar region of the Gujarat state, India. By using Suzuki and Tsuchihashi classification, Lip prints were then divided into four quadrants and also classified on the basis of peripheral shape of the lips. Materials used to record the lip prints were dark brown colored lipstick, cellophane tape, and white bond paper. Lipstick was applied uniformly, and lip prints were taken on the glued portion of cellophane tape and then stuck on to a white bond paper. These lip prints were analyzed with magnifying lens and virtually with stereo microscope. On the analysis of the subject population, results showed Branched pattern Type II (29.57 percentage) to be most predominant in the Gujarati population. Branched pattern Type II (35.60 percentage) and long vertical Type I (28.28 percentage) were most prevalent in males and females respectively and large full lips were most predominantly present in both the sexes. The study concludes that lip prints in any form can be an effective tool for identification of an individual in a closed or open group forms.Keywords: cheiloscopy, lip pattern, predomianant, Gujarati population
Procedia PDF Downloads 2982933 Cheiloscopy and Dactylography in Relation to ABO Blood Groups: Egyptian vs. Malay Populations
Authors: Manal Hassan Abdel Aziz, Fatma Mohamed Magdy Badr El Dine, Nourhan Mohamed Mohamed Saeed
Abstract:
Establishing association between lip print patterns and those of fingerprints as well as blood groups is of fundamental importance in the forensic identification domain. The first aim of the current study was to determine the prevalent types of ABO blood groups, lip prints and fingerprints patterns in both studied populations. Secondly, to analyze any relation found between the different print patterns and the blood groups, which would be valuable in identification purposes. The present study was conducted on 60 healthy volunteers, (30 males and 30 females) from each of the studied population. Lip prints and fingerprints were obtained and classified according to Tsuchihashi's classification and Michael Kuchen’s classification, respectively. The results show that the ulnar loop was the most frequent among both populations. Blood group A was the most frequent among Egyptians, while blood groups O and B were the predominant among Malaysians. Significant relations were observed between lip print patterns and fingerprint (in the second quadrant for Egyptian males and the first one for Malaysian). For Malaysian females, a statistically significant association was proved in the fourth quadrant. Regarding the blood groups, 89.5% of ulnar loops were significantly related to blood group A among Egyptian males. The results proved an association between the fingerprint pattern and the lip prints, as well as between the ABO blood group and the pattern of fingerprints. However, further researches with larger sample sizes need to be directed to approve the current results.Keywords: ABO, cheiloscopy, dactylography, Egyptians, Malaysians
Procedia PDF Downloads 2192932 DNA Barcoding Application in Study of Icthyo- Biodiversity in Rivers of Pakistan
Authors: Asma Karim
Abstract:
Fish taxonomy plays a fundamental role in the study of biodiversity. However, traditional methods of fish taxonomy rely on morphological features, which can lead to confusion due to great similarities between closely related species. To overcome this limitation, modern taxonomy employs DNA barcoding as a species identification method. This involves using a short standardized mitochondrial DNA region as a barcode, specifically a 658 base pair fragment near the 5′ ends of the mitochondrial cytochrome c oxidase subunit 1 (CO1) gene, to exploit the diversity in this region for identification of species. To test the effectiveness and reliability of DNA barcoding, 25 fish specimens from nine different fish species found in various rivers of Pakistan were identified morphologically using a dichotomous key at the start of the study. Comprising nine freshwater fish species, including Mystus cavasius, Mystus bleekeri, Osteobrama cotio, Labeo rohita, Labeo culbasu, Labeo gonius, Cyprinus carpio, Catla catla and Cirrhinus mrigala from different rivers of Pakistan were used in the present study. DNA was extracted from one of the pectoral fins and a partial sequence of CO1 gene was amplified using the conventional PCR method. Analysis of the barcodes confirmed that genetically identified fishes were the same as those identified morphologically at the beginning of the study. The sequences were also analyzed for biodiversity and phylogenetic studies. Based on the results of the study, it can be concluded that DNA barcoding is an effective and reliable method for studying biodiversity and conducting phylogenetic analysis of different fish species in Pakistan.Keywords: DNA barcoding, fresh water fishes, taxonomy, biodiversity, Pakistan
Procedia PDF Downloads 1082931 Phytochemical Screening and Identification of Anti-Biological Activity Properties of Pelargonium graveolens
Authors: Anupalli Roja Rani, Saraswathi Jaggali
Abstract:
Rose-scented geranium (Pelargonium graveolens L’Hér.) is an erect, much-branched shrub. It is indigenous to various parts of southern Africa, and it is often called Geranium. Pelargonium species are widely used by traditional healers in the areas of Southern Africa by Sotho, Xhosa, Khoi-San and Zulus for its curative and palliative effects in the treatment of diarrhea, dysentery, fever, respiratory tract infections, liver complaints, wounds, gastroenteritis, haemorrhage, kidney and bladder disorders. We have used Plant materials for extracting active compounds from analytical grades of solvents methanol, ethyl acetate, chloroform and water by a soxhlet apparatus. The phytochemical screening reveals that extracts of Pelargonium graveolens contains alkaloids, glycosides, steroids, tannins, saponins and phenols in ethyl acetate solvent. The antioxidant activity was determined using 1, 1-diphenyl-2-picrylhydrazyl (DPPH) bleaching method and the total phenolic content in the extracts was determined by the Folin–Ciocalteu method. Due to the presence of different phytochemical compounds in Pelargonium the anti-microbial activity against different micro-organisms like E.coli, Streptococcus, Klebsiella and Bacillus. Fractionation of plant extract was performed by column chromatography and was confirmed with HPLC analysis, NMR and FTIR spectroscopy for the compound identification in different organic solvent extracts.Keywords: Pelargonium graveolens L’Hér, DPPH, micro-organisms, HPLC analysis, NMR, FTIR spectroscopy
Procedia PDF Downloads 5002930 Analyze Long-Term Shoreline Change at Yi-Lan Coast, Taiwan Using Multiple Sources
Authors: Geng-Gui Wang, Chia-Hao Chang, Jee-Cheng Wu
Abstract:
A shoreline is a line where a body of water and the shore meet. It provides economic and social security to coastal habitations. However, shorelines face multiple threats due to both natural processes and man-made effects because of disasters, rapid urbanization, industrialization, and sand deposition and erosion, etc. In this study, we analyzed multi-temporal satellite images of the Yilan coast, Taiwan from 1978 to 2016, using the United States Geological Survey (USGS) Digital Shoreline Analysis System (DSAS), weather information (as rainfall records and typhoon routes), and man-made construction project data to explore the causes of shoreline changes. The results showed that the shoreline at Yilan coast is greatly influenced by typhoons and anthropogenic interventions.Keywords: shoreline change, multi-temporal satellite, digital shoreline analysis system, DSAS, Yi-Lan coast
Procedia PDF Downloads 1632929 Honey Bee (Apis Mellifera) Drone Flight Behavior Revealed by Radio Frequency Identification: Short Trips That May Help Drones Survey Weather Conditions
Authors: Vivian Wu
Abstract:
During the mating season, honeybee drones make mating fights to congregation areas where they face fierce competition to mate with a queen. Drones have developed distinct anatomical and functional features in order to optimize their chances of success. Flight activities of western honeybee (Apis mellifera) drones and foragers were monitored using radio frequency identification (RFID) to test if drones have also developed distinct flight behaviors. Drone flight durations showed a bimodal distribution dividing the flights into short flights and long flights while forager flight durations showed a left-skewed unimodal distribution. Interestingly, the short trips occurred prior to the long trips on a daily basis. The first trips of the day the drones made were primarily short trips, and the distribution significantly shifted to long trips as the drones made more trips. In contrast, forager trips showed no such shift of distribution. In addition, drones made short trips but no long mating trips on days associated with a significant drop in temperature and increase of clouds compared to the previous day. These findings suggest that drones may have developed a unique flight behavior making short trips first to survey the weather conditions before flying out to the congregation area to pursue a successful mating.Keywords: apis mellifera, drone, flight behavior, weather, RFID
Procedia PDF Downloads 812928 Terrorism: A Threat in Constant Evolution Still Misunderstood
Authors: M. J. Gazapo Lapayese
Abstract:
It is a well-established fact that terrorism is one of the foremost threats to present-day international security. The creation of tools or mechanisms for confronting it in an effective and efficient manner will only be possible by way of an objective assessment of the phenomenon. In order to achieve this, this paper has the following three main objectives: Firstly, setting out to find the reasons that have prevented the establishment of a universally accepted definition of terrorism, and consequently trying to outline the main features defining the face of the terrorist threat in order to discover the fundamental goals of what is now a serious blight on world society. Secondly, trying to explain the differences between a terrorist movement and a terrorist organisation, and the reasons for which a terrorist movement can be led to transform itself into an organisation. After analysing these motivations and the characteristics of a terrorist organisation, an example of the latter will be succinctly analysed to help the reader understand the ideas expressed. Lastly, discovering and exposing the factors that can lead to the appearance of terrorist tendencies, and discussing the most efficient and effective responses that can be given to this global security threat.Keywords: responses, resilience, security, terrorism
Procedia PDF Downloads 4532927 The Clustering of Multiple Sclerosis Subgroups through L2 Norm Multifractal Denoising Technique
Authors: Yeliz Karaca, Rana Karabudak
Abstract:
Multifractal Denoising techniques are used in the identification of significant attributes by removing the noise of the dataset. Magnetic resonance (MR) image technique is the most sensitive method so as to identify chronic disorders of the nervous system such as Multiple Sclerosis. MRI and Expanded Disability Status Scale (EDSS) data belonging to 120 individuals who have one of the subgroups of MS (Relapsing Remitting MS (RRMS), Secondary Progressive MS (SPMS), Primary Progressive MS (PPMS)) as well as 19 healthy individuals in the control group have been used in this study. The study is comprised of the following stages: (i) L2 Norm Multifractal Denoising technique, one of the multifractal technique, has been used with the application on the MS data (MRI and EDSS). In this way, the new dataset has been obtained. (ii) The new MS dataset obtained from the MS dataset and L2 Multifractal Denoising technique has been applied to the K-Means and Fuzzy C Means clustering algorithms which are among the unsupervised methods. Thus, the clustering performances have been compared. (iii) In the identification of significant attributes in the MS dataset through the Multifractal denoising (L2 Norm) technique using K-Means and FCM algorithms on the MS subgroups and control group of healthy individuals, excellent performance outcome has been yielded. According to the clustering results based on the MS subgroups obtained in the study, successful clustering results have been obtained in the K-Means and FCM algorithms by applying the L2 norm of multifractal denoising technique for the MS dataset. Clustering performance has been more successful with the MS Dataset (L2_Norm MS Data Set) K-Means and FCM in which significant attributes are obtained by applying L2 Norm Denoising technique.Keywords: clinical decision support, clustering algorithms, multiple sclerosis, multifractal techniques
Procedia PDF Downloads 1692926 Enhancing Tower Crane Safety: A UAV-based Intelligent Inspection Approach
Authors: Xin Jiao, Xin Zhang, Jian Fan, Zhenwei Cai, Yiming Xu
Abstract:
Tower cranes play a crucial role in the construction industry, facilitating the vertical and horizontal movement of materials and aiding in building construction, especially for high-rise structures. However, tower crane accidents can lead to severe consequences, highlighting the importance of effective safety management and inspection. This paper presents an innovative approach to tower crane inspection utilizing Unmanned Aerial Vehicles (UAVs) and an Intelligent Inspection APP System. The system leverages UAVs equipped with high-definition cameras to conduct efficient and comprehensive inspections, reducing manual labor, inspection time, and risk. By integrating advanced technologies such as Real-Time Kinematic (RTK) positioning and digital image processing, the system enables precise route planning and collection of safety hazards images. A case study conducted on a construction site demonstrates the practicality and effectiveness of the proposed method, showcasing its potential to enhance tower crane safety. On-site testing of UAV intelligent inspections reveals key findings: efficient tower crane hazard inspection within 30 minutes, with a full-identification capability coverage rates of 76.3%, 64.8%, and 76.2% for major, significant, and general hazards respectively and a preliminary-identification capability coverage rates of 18.5%, 27.2%, and 19%, respectively. Notably, UAVs effectively identify various tower crane hazards, except for those requiring auditory detection. The limitations of this study primarily involve two aspects: Firstly, during the initial inspection, manual drone piloting is required for marking tower crane points, followed by automated flight inspections and reuse based on the marked route. Secondly, images captured by the drone necessitate manual identification and review, which can be time-consuming for equipment management personnel, particularly when dealing with a large volume of images. Subsequent research efforts will focus on AI training and recognition of safety hazard images, as well as the automatic generation of inspection reports and corrective management based on recognition results. The ongoing development in this area is currently in progress, and outcomes will be released at an appropriate time.Keywords: tower crane, inspection, unmanned aerial vehicle (UAV), intelligent inspection app system, safety management
Procedia PDF Downloads 422925 Interior Noise Reduction of Construction Equipment Vehicle
Authors: Pradeep Jawale, Sharad Supare, Sachin Kumar Jain, Nagesh Walke
Abstract:
One can witness the constant development and redevelopment of cities throughout the world. Construction equipment vehicles (CEVs) are commonly used on the construction site. However, noise pollution from construction sites due to the use of CEV has become a major problem for many cities. The construction equipment employed, which includes excavators and bulldozers, is one of the main causes of these elevated noise levels. The construction workers possibly will face a potential risk to their auditory health and well-being due to the noise levels they are exposed to. Different countries have imposed exterior and operator noise limits for construction equipment vehicles, enabling them to control noise pollution from CEVs. In this study, the operator ear level noise of the identified vehicle is higher than the benchmark vehicle by 8 dB(A). It was a tough time for the NVH engineer to beat the interior noise level of the benchmark vehicle. Initially, the noise source identification technique was used to identify the dominant sources for increasing the interior noise of the test vehicle. It was observed that the transfer of structure-borne and air-borne noise to the cabin was the major issue with the vehicle. It was foremost required to address the issue without compromising the overall performance of the vehicle. Surprisingly, the steering pump and radiator fan were identified as the major dominant sources than typical conventional sources like powertrain, intake, and exhaust. Individual sources of noise were analyzed in detail, and optimizations were made to minimize the noise at the source. As a result, the significant noise reduction achieved inside the vehicle and the overall in-cab noise level for the vehicle became a new benchmark in the market.Keywords: interior noise, noise reduction, CEV, noise source identification
Procedia PDF Downloads 462924 Identification of a Lead Compound for Selective Inhibition of Nav1.7 to Treat Chronic Pain
Authors: Sharat Chandra, Zilong Wang, Ru-Rong Ji, Andrey Bortsov
Abstract:
Chronic pain (CP) therapeutic approaches have limited efficacy. As a result, doctors are prescribing opioids for chronic pain, leading to opioid overuse, abuse, and addiction epidemic. Therefore, the development of effective and safe CP drugs remains an unmet medical need. Voltage-gated sodium (Nav) channels act as cardiovascular and neurological disorder’s molecular targets. Nav channels selective inhibitors are hard to design because there are nine closely-related isoforms (Nav1.1-1.9) that share the protein sequence segments. We are targeting the Nav1.7 found in the peripheral nervous system and engaged in the perception of pain. The objective of this project was to screen a 1.5 million compound library for identification of inhibitors for Nav1.7 with analgesic effect. In this study, we designed a protocol for identification of isoform-selective inhibitors of Nav1.7, by utilizing the prior information on isoform-selective antagonists. First, a similarity search was performed; then the identified hits were docked into a binding site on the fourth voltage-sensor domain (VSD4) of Nav1.7. We used the FTrees tool for similarity searching and library generation; the generated library was docked in the VSD4 domain binding site using FlexX and compounds were shortlisted using a FlexX score and SeeSAR hyde scoring. Finally, the top 25 compounds were tested with molecular dynamics simulation (MDS). We reduced our list to 9 compounds based on the MDS root mean square deviation plot and obtained them from a vendor for in vitro and in vivo validation. Whole-cell patch-clamp recordings in HEK-293 cells and dorsal root ganglion neurons were conducted. We used patch pipettes to record transient Na⁺ currents. One of the compounds reduced the peak sodium currents in Nav1.7-HEK-293 stable cell line in a dose-dependent manner, with IC50 values at 0.74 µM. In summary, our computer-aided analgesic discovery approach allowed us to develop pre-clinical analgesic candidate with significant reduction of time and cost.Keywords: chronic pain, voltage-gated sodium channel, isoform-selective antagonist, similarity search, virtual screening, analgesics development
Procedia PDF Downloads 1242923 Identification of Outliers in Flood Frequency Analysis: Comparison of Original and Multiple Grubbs-Beck Test
Authors: Ayesha S. Rahman, Khaled Haddad, Ataur Rahman
Abstract:
At-site flood frequency analysis is used to estimate flood quantiles when at-site record length is reasonably long. In Australia, FLIKE software has been introduced for at-site flood frequency analysis. The advantage of FLIKE is that, for a given application, the user can compare a number of most commonly adopted probability distributions and parameter estimation methods relatively quickly using a windows interface. The new version of FLIKE has been incorporated with the multiple Grubbs and Beck test which can identify multiple numbers of potentially influential low flows. This paper presents a case study considering six catchments in eastern Australia which compares two outlier identification tests (original Grubbs and Beck test and multiple Grubbs and Beck test) and two commonly applied probability distributions (Generalized Extreme Value (GEV) and Log Pearson type 3 (LP3)) using FLIKE software. It has been found that the multiple Grubbs and Beck test when used with LP3 distribution provides more accurate flood quantile estimates than when LP3 distribution is used with the original Grubbs and Beck test. Between these two methods, the differences in flood quantile estimates have been found to be up to 61% for the six study catchments. It has also been found that GEV distribution (with L moments) and LP3 distribution with the multiple Grubbs and Beck test provide quite similar results in most of the cases; however, a difference up to 38% has been noted for flood quantiles for annual exceedance probability (AEP) of 1 in 100 for one catchment. These findings need to be confirmed with a greater number of stations across other Australian states.Keywords: floods, FLIKE, probability distributions, flood frequency, outlier
Procedia PDF Downloads 4502922 A Study on the Disclosure Experience of Adoptees
Authors: Tsung Chieh Ma, I-Ling Chen
Abstract:
Disclosing family origins to adoptees is an important topic in the adoption process. Adoption agencies usually educate adoptive parents on how to disclose to adoptees, but many adoptive parents worry that the disclosure will affect the parent–child relationship. Thus, how adoptees would like to receive the disclosure and whether they subjectively feel that the parent–child relationship is affected are both topics worthy of further discussion. This research takes a qualitative approach and connects with adoption agencies to interview six adoptees who are now adults. The purpose of the interviews is to learn about their experience receiving disclosures and their subjective feelings after learning of their family origins. The aim is to reveal the changes disclosure brought to the parent–child relationship and whether common concerns are raised due to the adoptive status. We also want to know about factors that affect their identification with their adopted status so that we can consequently give advice to other adoptive families. in this study finds that adoptees see disclosure as a process rather than an isolated event. The majority want to be told their family origin as early and proactively as possible and expect to learn the reasons they were given up for adoption and taken in as adoptees. The disclosure does not necessarily influence the parent–child relationship, and adoptees care more about the positive experiences they had with adoptive parents in their childhood. Moreover, adopted children seek contact with their original family mostly to understand why they were given up for adoption. The effects of disclosure depend on how the adoptive parents or other significant people in the lives of adoptees interpret the identity of the adoptees. That is, their response and attitude toward the identity have a lasting impact on the adoptees. The study suggests that early disclosure gives adoptees a chance to internalize the experience in the process and find self-identification.Keywords: adoption, adoptees, disclosure of family origins, parent–child relationship, self-identity
Procedia PDF Downloads 682921 How Restorative Justice Can Inform and Assist the Provision of Effective Remedies to Hate Crime, Case Study: The Christchurch Terrorist Attack
Authors: Daniel O. Kleinsman
Abstract:
The 2019 terrorist attack on two masjidain in Christchurch, New Zealand, was a shocking demonstration of the harm that can be caused by hate crime. As legal and governmental responses to the attack struggle to provide effective remedies to its victims, restorative justice has emerged as a tool that can assist, in terms of both meeting victims’ needs and discharging the obligations of the state under the International Covenant on Civil and Political Rights (ICCPR), arts 2(3), 26, 27. Restorative justice is a model that emphasizes the repair of harm caused or revealed by unjust behavior. It also prioritises the facilitation of dialogue, the restoration of equitable relationships, and the prevention of future harm. Returning to the case study, in the remarks of the sentencing judge, the terrorist’s actions were described as a hate crime of vicious malevolence that the Court was required to decisively reject, as anathema to the values of acceptance, tolerance and mutual respect upon which New Zealand’s inclusive society is based and which the country strives to maintain. This was one of the reasons for which the terrorist received a life sentence with no possibility of parole. However, in the report of the Royal Commission of Inquiry into the Attack, it was found that victims felt the attack occurred within the context of widespread racism, discrimination and Islamophobia, where hostile behaviors, including hate-based threats and attacks, were rarely recorded, analysed or acted on. It was also found that the Government had inappropriately concentrated intelligence resources on the risk of ‘Islamist’ terrorism and had failed to adequately respond to concerns raised about threats against the Muslim community. In this light, the remarks of the sentencing judge can be seen to reflect a criminal justice system that, in the absence of other remedies, denies systemic accountability and renders hate crime an isolated incident rather than an expression of more widespread discrimination and hate to be holistically addressed. One of the recommendations of the Royal Commission was to explore with victims the desirability and design of restorative justice processes. This presents an opportunity for victims to meet with state representatives and pursue effective remedies (ICCPR art 2(3)) not only for the harm caused by the terrorist but the harm revealed by a system that has exposed the minority Muslim community in New Zealand to hate in all forms, including but not limited to violent extremism. In this sense, restorative justice can also assist the state in discharging its wider obligations to protect all persons from discrimination (art 26) and allow ethnic and religious minorities to enjoy their own culture and profess and practice their own religion (art 27). It can also help give effect to the law and its purpose as a remedy to hate crime, as expressed in this case study by the sentencing judge.Keywords: hate crime, restorative justice, minorities, victims' rights
Procedia PDF Downloads 1112920 Radio Frequency Identification Device Based Emergency Department Critical Care Billing: A Framework for Actionable Intelligence
Authors: Shivaram P. Arunachalam, Mustafa Y. Sir, Andy Boggust, David M. Nestler, Thomas R. Hellmich, Kalyan S. Pasupathy
Abstract:
Emergency departments (EDs) provide urgent care to patients throughout the day in a complex and chaotic environment. Real-time location systems (RTLS) are increasingly being utilized in healthcare settings, and have shown to improve safety, reduce cost, and increase patient satisfaction. Radio Frequency Identification Device (RFID) data in an ED has been shown to compute variables such as patient-provider contact time, which is associated with patient outcomes such as 30-day hospitalization. These variables can provide avenues for improving ED operational efficiency. A major challenge with ED financial operations is under-coding of critical care services due to physicians’ difficulty reporting accurate times for critical care provided under Current Procedural Terminology (CPT) codes 99291 and 99292. In this work, the authors propose a framework to optimize ED critical care billing using RFID data. RFID estimated physician-patient contact times could accurately quantify direct critical care services which will help model a data-driven approach for ED critical care billing. This paper will describe the framework and provide insights into opportunities to prevent under coding as well as over coding to avoid insurance audits. Future work will focus on data analytics to demonstrate the feasibility of the framework described.Keywords: critical care billing, CPT codes, emergency department, RFID
Procedia PDF Downloads 1312919 Secure Authentication Scheme Based on Numerical Series Cryptography for Internet of Things
Authors: Maha Aladdin, Khaled Nagaty, Abeer Hamdy
Abstract:
The rapid advancement cellular networks and wireless networks have laid a solid basis for the Internet of Things. IoT has evolved into a unique standard that allows diverse physical devices to collaborate with one another. A service provider gives a variety of services that may be accessed via smart apps anywhere, at any time, and from any location over the Internet. Because of the public environment of mobile communication and the Internet, these services are highly vulnerable to a several malicious attacks, such as unauthorized disclosure by hostile attackers. As a result, the best option for overcoming these vulnerabilities is a strong authentication method. In this paper, a lightweight authentication scheme that is based on numerical series cryptography is proposed for the IoT environments. It allows mutual authentication between IoT devices Parametric study and formal proofs are utilized to illustrate that the pro-posed approach is resistant to a variety of security threats.Keywords: internet of things, authentication, cryptography, security protocol
Procedia PDF Downloads 122