Search results for: identification human remains
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 12531

Search results for: identification human remains

11631 Development of Allergenic and Melliferous Floral Pollen Spectrum Using Scanning Electron Microscopy

Authors: Mehwish Jamil Noor

Abstract:

Morphological features of pollen (sculpturing) were useful for identification of different floral taxa. In this study 49 pollen grains, types belonging to 25 families were studied using Scanning Electron Microscope. Shape and sculpturing of pollen ranging from Psilate, scabrate to reticulate, bireticulate and echinolophate. Honey pollen was identified using morphological features, number and arrangement of pore and colpi, size and shape. It presents the first attempt from Pakistan involving extraction of pollen from honey, its identification and taxonomic analysis. Among pollen studied diversity in shape and sculpturing has been observed ranging from Psilate, scabrate to reticulate to bireticulate and echinolophate condition. Pollen has been identified with the help of morphological feature, number and arrangement of pore and colpi, size and shape, reference slides, light microscopic data and previous literature have been consulted for pollen identification. Pollen of closely related species resemble each other therefore pollen identification of airborne and honey pollen is not possible till species level. Survey of flora was carried in parallel to keep the record about the allergenic and melliferous preference of specific sites through surveys and interviews. Their pollination season and geographical distribution were recorded. Two hundred and five including wild and cultivated taxa were identified belonging to sixty-seven families. Major bee attracting wild shrub and trees includes Justicia adhatoda, Acacia nilotica, Ziziphus jujuba, Taraxicum officinalis, Artemisia dubia, Casuarina sp., Ulmus sp., Broussonetia papyrifera, Cupressus sp. or Pinus roxburghii etc. Cultivated crops like Pennisetum typhoides, Nigella sativa, Triticum sativum along with fruit trees of Pyrus, Prunus, Eryobotria, Citrus etc. are popular melliferous floras. Exotic/ introduced species like Eucalyptus or Parthenium hysterophorus, are also frequently visited by bees indicating the significance of those plants in the honey industry. It is concluded that different microscopic analysis techniques give more clear and authentic pictures of and melliferous pollen identification which is well supported by the floral calendar. The diversity of pollen are observed in case of melliferous pollen, and most of the windborne pollen were found less sculptured or psilate expressing the adaptation to the specific mode of pollination. Pollen morphology and sculpturing would serve as a reference for future studies.

Keywords: pollen, allergenic flora, sem, pollen key, Scanning Electron Microscopy (SEM)

Procedia PDF Downloads 201
11630 Antibiotic Treatment of Apical Periodontitis

Authors: Ilma Robo, Saimir Heta, Gerhard Nokaj

Abstract:

Introduction: The method of treatment and the treatment protocols of apical periodontitis are now known, but the ongoing debate remains on whether or not prescription antibiotics should be given to patients suffering from this type of pathology. In fact, as an indication for prescribing antibiotics, this type of pathology remains between clinical indication and contraindication. Material and Methods: This article is of the short-communication type and has the sole purpose of analyzing the clinical picture of apical periodontitis and the fact that the appearance and extent of this pathology in the periapex area passes the stage when the host or the immune cells of the organism of the affected individual, react against bacterial factors. Results: Determining whether or not to prescribe systemic antibiotics according to literature sources can be avoided. In some cases, research in this field about this pathology even indicates endodontic rinsers or irrigants, such as chlorhexidine, in typical cases, mainly in persistent apical periodontitis. Conclusions: In times when bacterial resistance is a hot topic in some fields of scientific research, it is important to divide dental pathologies of bacterial origin into those when systemic antibiotic prescriptions must be given and those when every clinical issue is resolved only with endodontic root canal treatment. Even certain sources of published literature show the specifics of the most effective antibiotics against the bacterial flora causing the pathology of apical periodontitis.

Keywords: endodontic treatment, apical periodontitis, antibiotics, chlorhexidine

Procedia PDF Downloads 69
11629 The Impact of Artificial Intelligence on Sustainable Architecture and Urban Design

Authors: Alfons Aziz Asaad Hozain

Abstract:

The goal of sustainable architecture is to design buildings that have the least negative impact on the environment and provide better conditions for people. What forms of development enhance the area? This question was asked at the Center for the Study of Spatial Development and Building Forms in Cambridge in the late 1960s. This has resulted in many influential articles that have had a profound impact on the practice of urban planning. This article focuses on the sustainability outcomes caused by the climatic conditions of traditional Iranian architecture in hot and dry regions. Since people spend a lot of time at home, it is very important that these homes meet their physical and spiritual needs as well as the cultural and religious aspects of their lifestyle. In a country as large as Iran with different climates, traditional builders have put forward a number of logical solutions to ensure human comfort. With these solutions, the environmental problems of the have long been solved. Taking into account the experiences of traditional architecture in Iran's hot and dry climate, sustainable architecture can be achieved.

Keywords: sustainable development, human rights, the right to development, the human rights-based approach to development, environmental rights, economic development, social sustainability human rights protection, human rights violations, workers’ rights, justice, security

Procedia PDF Downloads 77
11628 Erosion of Culture through Democratization

Authors: Mladen Milicevic

Abstract:

This paper explores how the explosion of computer technologies has allowed for the democratization of many aspects of human activities, which were in the past only available through the institutionalized channels of production and distribution. We will going to use as an example the music recording industries, just to illustrate this process, but the analogies to other activities and aspects of human life can easily be extrapolated from it.

Keywords: aura, democratization, music industry, music sharing, paradigm-shift

Procedia PDF Downloads 235
11627 Nontuberculous Mycobacterium Infection – Still An Important Disease Among People With Late HIV Diagnosis

Authors: Jakub Młoźniak, Adam Szymański, Gabriela Stondzik, Dagny Krankowska, Tomasz Mikuła

Abstract:

Nontuberculous mycobacteria (NTM) are bacterial species that cause diversely manifesting diseases mainly in immunocompromised patients. In people with HIV, NTM infection is an AIDS-defining disease and usually appears when the lymphocyte T CD4 count is below 50 cells/μl. The usage of antiretroviral therapy has decreased the prevalence of NTM among people with HIV, but the disease can still be observed especially among patients with late HIV diagnosis. Common presence in environment, human colonization, clinical similarity with tuberculosis and slow growth on culture makes NTM especially hard to diagnose. The study aimed to analyze the epidemiology and clinical course of NTM among patients with HIV. This study included patients with NTM and HIV admitted to our department between 2017 and 2023. Medical records of patients were analyzed and data on age, sex, median time from HIV diagnosis to identification of NTM infection, median CD4 count at NTM diagnosis, methods of determining NTM infection, type of species of mycobacteria identified, clinical symptoms and treatment course were gathered. Twenty-four patients (20 men, 4 women) with identified NTM were included in this study. Among them, 20 were HIV late presenters. The patients' median age was 40. The main symptoms which patients presented were fever, weight loss and cough. Pulmonary disease confirmed with positive cultures from sputum/bronchoalveolar lavage was present in 18 patients. M. avium was the most common species identified. M. marinum caused disseminated skin lesions in 1 patient. Out of all, 5 people were not treated for NTM caused by lack of symptoms and suspicion of colonization with mycobacterium. Concomitant tuberculosis was present in 6 patients. The median diagnostic time from HIV to NTM infections was 3.5 months. The median CD4 count at NTM identification was 69.5 cells/μl. Median NTM treatment time was 16 months but 7 patients haven’t finished their treatment yet. The most commonly used medications were ethambutol and clarithromycin. Among analyzed patients, 4 of them have died. NTM infections are still an important disease among patients who are HIV late presenters. This disease should be taken into consideration during the differential diagnosis of fever, weight loss and cough in people with HIV with lymphocyte T CD4 count <100 cells/μl. Presence of tuberculosis does not exclude nontuberculous mycobacterium coinfection.

Keywords: mycobacteriosis, HIV, late presenter, epidemiology

Procedia PDF Downloads 42
11626 Identity Verification Based on Multimodal Machine Learning on Red Green Blue (RGB) Red Green Blue-Depth (RGB-D) Voice Data

Authors: LuoJiaoyang, Yu Hongyang

Abstract:

In this paper, we experimented with a new approach to multimodal identification using RGB, RGB-D and voice data. The multimodal combination of RGB and voice data has been applied in tasks such as emotion recognition and has shown good results and stability, and it is also the same in identity recognition tasks. We believe that the data of different modalities can enhance the effect of the model through mutual reinforcement. We try to increase the three modalities on the basis of the dual modalities and try to improve the effectiveness of the network by increasing the number of modalities. We also implemented the single-modal identification system separately, tested the data of these different modalities under clean and noisy conditions, and compared the performance with the multimodal model. In the process of designing the multimodal model, we tried a variety of different fusion strategies and finally chose the fusion method with the best performance. The experimental results show that the performance of the multimodal system is better than that of the single modality, especially in dealing with noise, and the multimodal system can achieve an average improvement of 5%.

Keywords: multimodal, three modalities, RGB-D, identity verification

Procedia PDF Downloads 70
11625 Interaction between Human Resource Management and Marketing

Authors: Besa Muthuri

Abstract:

This paper examines the correlation between the organization's human resources (HR) and marketing entities and reviews the literature on customer acquisition and loyalty retention and the various aspects of employer branding. It will also explore how these concepts can be applied to the marketing and human resources departments. HR and marketing teams in the organization function to educate, attract and retain the attention and interests of the modern talent market. While the teams' target products, personas, or services tend to differ, their execution, desired results, and implementation of the respective activities are closely related. Therefore, promoting collaboration between HR and marketing enables the company to enhance business branding and recruitment of top-tier talents that will drive the much-needed change in the organization and promote a higher employee and customer retention rate. To achieve the ultimate HR and marketing relationship, organizations should build their external and internal awareness, track their performance and programs, and promote in-house meetings among employees from all interfacing departments.

Keywords: branding, employee retention, human resources, marketing

Procedia PDF Downloads 97
11624 Inversely Designed Chipless Radio Frequency Identification (RFID) Tags Using Deep Learning

Authors: Madhawa Basnayaka, Jouni Paltakari

Abstract:

Fully passive backscattering chipless RFID tags are an emerging wireless technology with low cost, higher reading distance, and fast automatic identification without human interference, unlike already available technologies like optical barcodes. The design optimization of chipless RFID tags is crucial as it requires replacing integrated chips found in conventional RFID tags with printed geometric designs. These designs enable data encoding and decoding through backscattered electromagnetic (EM) signatures. The applications of chipless RFID tags have been limited due to the constraints of data encoding capacity and the ability to design accurate yet efficient configurations. The traditional approach to accomplishing design parameters for a desired EM response involves iterative adjustment of design parameters and simulating until the desired EM spectrum is achieved. However, traditional numerical simulation methods encounter limitations in optimizing design parameters efficiently due to the speed and resource consumption. In this work, a deep learning neural network (DNN) is utilized to establish a correlation between the EM spectrum and the dimensional parameters of nested centric rings, specifically square and octagonal. The proposed bi-directional DNN has two simultaneously running neural networks, namely spectrum prediction and design parameters prediction. First, spectrum prediction DNN was trained to minimize mean square error (MSE). After the training process was completed, the spectrum prediction DNN was able to accurately predict the EM spectrum according to the input design parameters within a few seconds. Then, the trained spectrum prediction DNN was connected to the design parameters prediction DNN and trained two networks simultaneously. For the first time in chipless tag design, design parameters were predicted accurately after training bi-directional DNN for a desired EM spectrum. The model was evaluated using a randomly generated spectrum and the tag was manufactured using the predicted geometrical parameters. The manufactured tags were successfully tested in the laboratory. The amount of iterative computer simulations has been significantly decreased by this approach. Therefore, highly efficient but ultrafast bi-directional DNN models allow rapid and complicated chipless RFID tag designs.

Keywords: artificial intelligence, chipless RFID, deep learning, machine learning

Procedia PDF Downloads 50
11623 Characterizing Nasal Microbiota in COVID-19 Patients: Insights from Nanopore Technology and Comparative Analysis

Authors: David Pinzauti, Simon De Jaegher, Maria D'Aguano, Manuele Biazzo

Abstract:

The COVID-19 pandemic has left an indelible mark on global health, leading to a pressing need for understanding the intricate interactions between the virus and the human microbiome. This study focuses on characterizing the nasal microbiota of patients affected by COVID-19, with a specific emphasis on the comparison with unaffected individuals, to shed light on the crucial role of the microbiome in the development of this viral disease. To achieve this objective, Nanopore technology was employed to analyze the bacterial 16s rRNA full-length gene present in nasal swabs collected in Malta between January 2021 and August 2022. A comprehensive dataset consisting of 268 samples (126 SARS-negative samples and 142 SARS-positive samples) was subjected to a comparative analysis using an in-house, custom pipeline. The findings from this study revealed that individuals affected by COVID-19 possess a nasal microbiota that is significantly less diverse, as evidenced by lower α diversity, and is characterized by distinct microbial communities compared to unaffected individuals. The beta diversity analyses were carried out at different taxonomic resolutions. At the phylum level, Bacteroidota was found to be more prevalent in SARS-negative samples, suggesting a potential decrease during the course of viral infection. At the species level, the identification of several specific biomarkers further underscores the critical role of the nasal microbiota in COVID-19 pathogenesis. Notably, species such as Finegoldia magna, Moraxella catarrhalis, and others exhibited relative abundance in SARS-positive samples, potentially serving as significant indicators of the disease. This study presents valuable insights into the relationship between COVID-19 and the nasal microbiota. The identification of distinct microbial communities and potential biomarkers associated with the disease offers promising avenues for further research and therapeutic interventions aimed at enhancing public health outcomes in the context of COVID-19.

Keywords: COVID-19, nasal microbiota, nanopore technology, 16s rRNA gene, biomarkers

Procedia PDF Downloads 68
11622 Double Layer Security Model for Identification Friend or Foe

Authors: Buse T. Aydın, Enver Ozdemir

Abstract:

In this study, a double layer authentication scheme between the aircraft and the Air Traffic Control (ATC) tower is designed to prevent any unauthorized aircraft from introducing themselves as friends. The method is a combination of classical cryptographic methods and new generation physical layers. The first layer has employed the embedded key of the aircraft. The embedded key is assumed to installed during the construction of the utility. The other layer is a physical attribute (flight path, distance, etc.) between the aircraft and the ATC tower. We create a mathematical model so that two layers’ information is employed and an aircraft is authenticated as a friend or foe according to the accuracy of the results of the model. The results of the aircraft are compared with the results of the ATC tower and if the values found by the aircraft and ATC tower match within a certain error margin, we mark the aircraft as a friend. In this method, even if embedded key is captured by the enemy aircraft, without the information of the second layer, the enemy can easily be determined. Overall, in this work, we present a more reliable system by adding a physical layer in the authentication process.

Keywords: ADS-B, communication with physical layer security, cryptography, identification friend or foe

Procedia PDF Downloads 161
11621 Instruction Program for Human Factors in Maintenance, Addressed to the People Working in Colombian Air Force Aeronautical Maintenance Area to Strengthen Operational Safety

Authors: Rafael Andres Rincon Barrera

Abstract:

Safety in global aviation plays a preponderant role in organizations that seek to avoid accidents in an attempt to preserve their most precious assets (the people and the machines). Human factors-based programs have shown to be effective in managing human-generated risks. The importance of training on human factors in maintenance has not been indifferent to the Colombian Air Force (COLAF). This research, which has a mixed quantitative, qualitative and descriptive approach, deals with its absence of structuring an instruction program in Human Factors in Aeronautical Maintenance, which serves as a tool to improve Operational Safety in the military air units of the COLAF. Research shows the trends and evolution of human factors programs in aeronautical maintenance through the analysis of a data matrix with 33 sources taken from different databases that are about the incorporation of these types of programs in the aeronautical industry in the last 20 years; as well as the improvements in the operational safety process that are presented after the implementation of these ones. Likewise, it compiles different normative guides in force from world aeronautical authorities for training in these programs, establishing a matrix of methodologies that may be applicable to develop a training program in human factors in maintenance. Subsequently, it illustrates the design, validation, and development of a human factors knowledge measurement instrument for maintenance at the COLAF that includes topics on Human Factors (HF), Safety Management System (SMS), and aeronautical maintenance regulations at the COLAF. With the information obtained, it performs the statistical analysis showing the aspects of knowledge and strengthening the staff for the preparation of the instruction program. Performing data triangulation based on the applicable methods and the weakest aspects found in the maintenance people shows a variable crossing from color coding, thus indicating the contents according to a training program for human factors in aeronautical maintenance, which are adjusted according to the competencies that are expected to be developed with the staff in a curricular format established by the COLAF. Among the most important findings are the determination that different authors are dealing with human factors in maintenance agrees that there is no standard model for its instruction and implementation, but that it must be adapted to the needs of the organization, that the Safety Culture in the Companies which incorporated programs on human factors in maintenance increased, that from the data obtained with the instrument for knowledge measurement of human factors in maintenance, the level of knowledge is MEDIUM-LOW with a score of 61.79%. And finally that there is an opportunity to improve Operational Safety for the COLAF through the implementation of the training program of human factors in maintenance for the technicians working in this area.

Keywords: Colombian air force, human factors, safety culture, safety management system, triangulation

Procedia PDF Downloads 134
11620 Importance of Human Capital Development and Management in Industries

Authors: Birce Boga Bakirli

Abstract:

In this paper, we investigate ideas on human capital development and management in industries. We structured a model to be able to gather the data from the interviews conducted with worker, specialists and owners of companies. Different aspects of the situation are found in these interviews, and we used the information to model the benefit of the business owners and workers perspectives. These are modelled as a bi-level programming problem. Several instances of the generic cases are solved. The results show the importance of education within and out of the company for workers, and it returns for the company.

Keywords: bi-level programming, corporate strategy, cost tradeoffs, human capital, mixed integer programming, Stackelberg game, supplier relations, strategic planning

Procedia PDF Downloads 354
11619 The Mental Workload of Intensive Care Unit Nurses in Performing Human-Machine Tasks: A Cross-Sectional Survey

Authors: Yan Yan, Erhong Sun, Lin Peng, Xuchun Ye

Abstract:

Aims: The present study aimed to explore Intensive Care Unit (ICU) nurses’ mental workload (MWL) and associated factors with it in performing human-machine tasks. Background: A wide range of emerging technologies have penetrated widely in the field of health care, and ICU nurses are facing a dramatic increase in nursing human-machine tasks. However, there is still a paucity of literature reporting on the general MWL of ICU nurses performing human-machine tasks and the associated influencing factors. Methods: A cross-sectional survey was employed. The data was collected from January to February 2021 from 9 tertiary hospitals in 6 provinces (Shanghai, Gansu, Guangdong, Liaoning, Shandong, and Hubei). Two-stage sampling was used to recruit eligible ICU nurses (n=427). The data were collected with an electronic questionnaire comprising sociodemographic characteristics and the measures of MWL, self-efficacy, system usability, and task difficulty. The univariate analysis, two-way analysis of variance (ANOVA), and a linear mixed model were used for data analysis. Results: Overall, the mental workload of ICU nurses in performing human-machine tasks was medium (score 52.04 on a 0-100 scale). Among the typical nursing human-machine tasks selected, the MWL of ICU nurses in completing first aid and life support tasks (‘Using a defibrillator to defibrillate’ and ‘Use of ventilator’) was significantly higher than others (p < .001). And ICU nurses’ MWL in performing human-machine tasks was also associated with age (p = .001), professional title (p = .002), years of working in ICU (p < .001), willingness to study emerging technology actively (p = .006), task difficulty (p < .001), and system usability (p < .001). Conclusion: The MWL of ICU nurses is at a moderate level in the context of a rapid increase in nursing human-machine tasks. However, there are significant differences in MWL when performing different types of human-machine tasks, and MWL can be influenced by a combination of factors. Nursing managers need to develop intervention strategies in multiple ways. Implications for practice: Multidimensional approaches are required to perform human-machine tasks better, including enhancing nurses' willingness to learn emerging technologies actively, developing training strategies that vary with tasks, and identifying obstacles in the process of human-machine system interaction.

Keywords: mental workload, nurse, ICU, human-machine, tasks, cross-sectional study, linear mixed model, China

Procedia PDF Downloads 69
11618 Hybrid Subspace Approach for Time Delay Estimation in MIMO Systems

Authors: Mojtaba Saeedinezhad, Sarah Yousefi

Abstract:

In this paper, we present a hybrid subspace approach for Time Delay Estimation (TDE) in multivariable systems. While several methods have been proposed for time delay estimation in SISO systems, delay estimation in MIMO systems were always a big challenge. In these systems the existing TDE methods have significant limitations because most of procedures are just based on system response estimation or correlation analysis. We introduce a new hybrid method for TDE in MIMO systems based on subspace identification and explicit output error method; and compare its performance with previously introduced procedures in presence of different noise levels and in a statistical manner. Then the best method is selected with multi objective decision making technique. It is shown that the performance of new approach is much better than the existing methods, even in low signal-to-noise conditions.

Keywords: system identification, time delay estimation, ARX, OE, merit ratio, multi variable decision making

Procedia PDF Downloads 346
11617 Migratory Trajectory of Transnational Street Beggars in South Western, Nigeria

Authors: Usman Adekunle Ojedokun, Adeyinka Abideen Aderinto

Abstract:

Migration remains an important course of action often resort-to by human and some other classes of animal for survival in the face of life-threatening conditions. However, the activity of certain group of immigrants, who are exploiting the socio-economic and environmental challenges in their home countries to conduct street begging across different countries in Africa, is fast becoming a major cause for concern. This paper examined the migratory trajectory of transnational street beggars in South Western, Nigeria. Strain and Migration Network Theories were adopted for the study. The methods of data collection were survey questionnaire, in-depth interview, and key informant interview. Convenience and purposive sampling techniques were employed for the selection of 395 transnational street beggars and 4 key informants were purposively chosen. Findings revealed that transnational street beggars immigrated into Nigeria all year round and all of them came by road. Also, while some of them entered the country officially, others gained entry illegally. The majority (29.3%) arrived through Sokoto, a border State to some neighbouring countries. This study calls for more security measures at the Nigerian borders as a way of controlling the influx of this category of beggars into the country.

Keywords: transnational street beggars, street begging, migration, Nigeria

Procedia PDF Downloads 261
11616 Utilizing the Principal Component Analysis on Multispectral Aerial Imagery for Identification of Underlying Structures

Authors: Marcos Bosques-Perez, Walter Izquierdo, Harold Martin, Liangdon Deng, Josue Rodriguez, Thony Yan, Mercedes Cabrerizo, Armando Barreto, Naphtali Rishe, Malek Adjouadi

Abstract:

Aerial imagery is a powerful tool when it comes to analyzing temporal changes in ecosystems and extracting valuable information from the observed scene. It allows us to identify and assess various elements such as objects, structures, textures, waterways, and shadows. To extract meaningful information, multispectral cameras capture data across different wavelength bands of the electromagnetic spectrum. In this study, the collected multispectral aerial images were subjected to principal component analysis (PCA) to identify independent and uncorrelated components or features that extend beyond the visible spectrum captured in standard RGB images. The results demonstrate that these principal components contain unique characteristics specific to certain wavebands, enabling effective object identification and image segmentation.

Keywords: big data, image processing, multispectral, principal component analysis

Procedia PDF Downloads 175
11615 A Context-Sensitive Algorithm for Media Similarity Search

Authors: Guang-Ho Cha

Abstract:

This paper presents a context-sensitive media similarity search algorithm. One of the central problems regarding media search is the semantic gap between the low-level features computed automatically from media data and the human interpretation of them. This is because the notion of similarity is usually based on high-level abstraction but the low-level features do not sometimes reflect the human perception. Many media search algorithms have used the Minkowski metric to measure similarity between image pairs. However those functions cannot adequately capture the aspects of the characteristics of the human visual system as well as the nonlinear relationships in contextual information given by images in a collection. Our search algorithm tackles this problem by employing a similarity measure and a ranking strategy that reflect the nonlinearity of human perception and contextual information in a dataset. Similarity search in an image database based on this contextual information shows encouraging experimental results.

Keywords: context-sensitive search, image search, similarity ranking, similarity search

Procedia PDF Downloads 365
11614 Discourse Analysis of the Perception of ‘Safety’ in EU and Refugee Law

Authors: Klaudia Krogulec

Abstract:

The concept and the meaning of safety is largely undermined in International and EU refugee law. While the Geneva Convention 1951 concentrates mainly on the principle of non-refoulment (no-return) and the idea of physical safety of refugees, countries continue to implement harmful readmission agreements that presume ‘safe countries’ for the hosting and return of the refugees. This research intends to use discourse analysis of the legal provisions and interviews with Syrian refugees, NGO workers, and refugee lawyers in Tukey to understand what ‘safety’ actually means and how law shapes the experiences of Syrians in Turkey (the country that hosts the largest population of Syrians and is a key partner of the EU-Turkey Agreement 2016). The preliminary findings reveal the competing meanings of safety (rights-based vs state interests approach). As the refugee policies continue to prioritize state interests/safety over human safety and human rights, it is extremely important to provide recommendations on how ‘safety’ should be defined in the refugee law in the future.

Keywords: human rights law, refugee law, human safety, EU-turkey agreement

Procedia PDF Downloads 160
11613 From Risk/Security Analysis via Timespace to a Model of Human Vulnerability and Human Security

Authors: Anders Troedsson

Abstract:

For us humans, risk and insecurity are intimately linked to vulnerabilities - where there is vulnerability, there is potentially risk and insecurity. Reducing vulnerability through compensatory measures means decreasing the likelihood of a certain external event be qualified as a risk/threat/assault, and thus also means increasing the individual’s sense of security. The paper suggests that a meaningful way to approach the study of risk/ insecurity is to organize thinking about the vulnerabilities that external phenomena evoke in humans as perceived by them. Such phenomena are, through a set of given vulnerabilities, potentially translated into perceptions of "insecurity." An ontological discussion about salient timespace characteristics of external phenomena as perceived by humans, including such which potentially can be qualified as risk/threat/assault, leads to the positing of two dimensions which are central for describing what in the paper is called the essence of risk/threat/assault. As is argued, such modeling helps analysis steer free of the subjective factor which is intimately connected to human perception and which mediates between phenomena “out there” potentially identified as risk/threat/assault, and their translation into an experience of security or insecurity. A proposed set of universally given vulnerabilities are scrutinized with the help of the two dimensions, resulting in a modeling effort featuring four realms of vulnerabilities which together represent a dynamic whole. This model in turn informs modeling on human security.

Keywords: human vulnerabilities, human security, immediate-inert, material-immaterial, timespace

Procedia PDF Downloads 297
11612 Fisheries Education in Karnataka: Trends, Current Status, Performance and Prospects

Authors: A. Vinay, Mary Josephine, Shreesha. S. Rao, Dhande Kranthi Kumar, J. Nandini

Abstract:

This paper looks at the development of Fisheries education in Karnataka and the supply of skilled human capital to the sector. The study tries to analyse their job occupancy patterns, Compound Growth Rate (CGR) and forecasts the fisheries graduates supply using the Holt method. In Karnataka, fisheries are one of the neglected allied sectors of agriculture in spite of having enormous scope and potential to contribute to the State's agriculture GDP. The State Government has been negligent in absorbing skilled human capital for the development of fisheries, as there are so many vacant positions in both education institutes, as well as the State fisheries department. CGR and forecasting of fisheries graduates shows a positive growth rate and increasing trend, from which we can understand that by proper utilization of skilled human capital can bring development in the fisheries sector of Karnataka.

Keywords: compound growth rate, fisheries education, holt method, skilled human capital

Procedia PDF Downloads 266
11611 Health Portals for Specific Populations: A Design for Pregnant Women

Authors: Janine Sommer, Mariana Daus, Mariana Simon, Maria Smith, Daniel Luna

Abstract:

The technologies and communication advances contributed to new tools development which allows patients to have an active role in their own health. In the light of information needs and paradigms changes about health, the patient self-manages their care. This line of care focuses on patients; specific portals come up to people with particular requirements like pregnant women. Thinking of a portal design to this sector of the population, in September 2016 a survey was made to users with the objective to knowing and understanding information’s needs at the moment to use an application for pregnant. Also, prototypes of the portal´s features were designed to try and validate with users, using the methodology of human-centered design. Investigations have made possible the identification of needs of this population and develop a tool who try to satisfy, providing timely information for each part of pregnancy and allowing the patients to make a physical check and the follow up of pregnancy seeking advice from our obstetricians.

Keywords: electronic health record, health personal record, mobile applications, pregnant women

Procedia PDF Downloads 351
11610 Development of a Paediatric Head Model for the Computational Analysis of Head Impact Interactions

Authors: G. A. Khalid, M. D. Jones, R. Prabhu, A. Mason-Jones, W. Whittington, H. Bakhtiarydavijani, P. S. Theobald

Abstract:

Head injury in childhood is a common cause of death or permanent disability from injury. However, despite its frequency and significance, there is little understanding of how a child’s head responds during injurious loading. Whilst Infant Post Mortem Human Subject (PMHS) experimentation is a logical approach to understand injury biomechanics, it is the authors’ opinion that a lack of subject availability is hindering potential progress. Computer modelling adds great value when considering adult populations; however, its potential remains largely untapped for infant surrogates. The complexities of child growth and development, which result in age dependent changes in anatomy, geometry and physical response characteristics, present new challenges for computational simulation. Further geometric challenges are presented by the intricate infant cranial bones, which are separated by sutures and fontanelles and demonstrate a visible fibre orientation. This study presents an FE model of a newborn infant’s head, developed from high-resolution computer tomography scans, informed by published tissue material properties. To mimic the fibre orientation of immature cranial bone, anisotropic properties were applied to the FE cranial bone model, with elastic moduli representing the bone response both parallel and perpendicular to the fibre orientation. Biofiedility of the computational model was confirmed by global validation against published PMHS data, by replicating experimental impact tests with a series of computational simulations, in terms of head kinematic responses. Numerical results confirm that the FE head model’s mechanical response is in favourable agreement with the PMHS drop test results.

Keywords: finite element analysis, impact simulation, infant head trauma, material properties, post mortem human subjects

Procedia PDF Downloads 326
11609 Stems of Prunus avium: An Unexplored By-product with Great Bioactive Potential

Authors: Luís R. Silva, Fábio Jesus, Catarina Bento, Ana C. Gonçalves

Abstract:

Over the last few years, the traditional medicine has gained ground at nutritional and pharmacological level. The natural products and their derivatives have great importance in several drugs used in modern therapeutics. Plant-based systems continue to play an essential role in primary healthcare. Additionally, the utilization of their plant parts, such as leaves, stems and flowers as nutraceutical and pharmaceutical products, can add a high value in the natural products market, not just by the nutritional value due to the significant levels of phytochemicals, but also by to the high benefit for the producers and manufacturers business. Stems of Prunus avium L. are a byproduct resulting from the processing of cherry, and have been consumed over the years as infusions and decoctions due to its bioactive properties, being used as sedative, diuretic and draining, to relief of renal stones, edema and hypertension. In this work, we prepared a hydroethanolic and infusion extracts from stems of P. avium collected in Fundão Region (Portugal), and evaluate the phenolic profile by LC/DAD, antioxidant capacity, α-glucosidase inhibitory activity and protection of human erythrocytes against oxidative damage. The LC-DAD analysis allowed to the identification of 19 phenolic compounds, catechin and 3-O-caffolquinic acid were the main ones. In a general way, hydroethanolic extract proved to be more active than infusion. This extract had the best antioxidant activity against DPPH• (IC50=22.37 ± 0.28 µg/mL) and superoxide radical (IC50=13.93 ± 0.30 µg/mL). Furthermore, it was the most active concerning inhibition of hemoglobin oxidation (IC50=13.73 ± 0.67 µg/mL), hemolysis (IC50=1.49 ± 0.18 µg/mL) and lipid peroxidation (IC50=26.20 ± 0.38 µg/mL) on human erythrocytes. On the other hand, infusion revealed to be more efficient towards α-glucosidase inhibitory activity (IC50=3.18 ± 0.23 µg/mL) and against nitric oxide radical (IC50=99.99 ± 1.89 µg/mL). The Sweet cherry sector is very important in Fundão Region (Portugal), and taking profit from the great wastes produced during processing of the cherry to produce added-value products, such as food supplements cannot be ignored. Our results demonstrate that P. avium stems possesses remarkable antioxidant and free radical scavenging properties. It is therefore, suggest, that P. avium stems can be used as a natural antioxidant with high potential to prevent or slow the progress of human diseases mediated by oxidative stress.

Keywords: stems, Prunus avium, phenolic compounds, biological potential

Procedia PDF Downloads 297
11608 Protection of Human Rights in Polish Centres for Foreigners – in the Context of the European Human Rights System

Authors: Oktawia Braniewicz

Abstract:

The phenomenon of emigration and migration increasingly affects Poland's borders as well. For this reason, it is necessary to examine the level of protection of Human Rights in Polish Centres for Foreigners. The field study covered 11 centers for Foreigners in the provinces Kujawsko-Pomorskie Region, Lubelskie Region, Lodzkie Region, Mazowieckie Region and Podlaskie Region. Photographic documentation of living and social conditions, conversations with center employees and refugees allow to show a comprehensive picture of the situation prevailing in Centres for Foreigners. The object of reflection will be, in particular, the standards resulting from art. 8 and 13 of the Convention for the Protection of Human Rights and Fundamental Freedoms and article 2 of Protocol No. 1 to the Convention for the Protection of Human Rights and Fundamental Freedoms. The degree of realization of the right to education and the right to respect for family and private life will be shown. Issues related to learning the Polish language, access to a professional translator and psychological help will also be approximated. Learning Polish is not obligatory, which causes problems with assimilation and integration with other members of the new community. In centers for foreigners, there are no translators - a translator from an external company is rented if necessary. The waiting time for an interpreter makes the refugees feel anxious, unable to communicate with the employees of the centers (this is a situation in which the refugees do not know either English, Polish or Russian). Psychologist's help is available on designated days of the week. There is no separate specialist in child psychology, which is a serious problem.

Keywords: human rights, Polish centres, foreigners, fundamental freedoms

Procedia PDF Downloads 133
11607 Human Intraocular Thermal Field in Action with Different Boundary Conditions Considering Aqueous Humor and Vitreous Humor Fluid Flow

Authors: Dara Singh, Keikhosrow Firouzbakhsh, Mohammad Taghi Ahmadian

Abstract:

In this study, a validated 3D finite volume model of human eye is developed to study the fluid flow and heat transfer in the human eye at steady state conditions. For this purpose, discretized bio-heat transfer equation coupled with Boussinesq equation is analyzed with different anatomical, environmental, and physiological conditions. It is demonstrated that the fluid circulation is formed as a result of thermal gradients in various regions of eye. It is also shown that posterior region of the human eye is less affected by the ambient conditions compared to the anterior segment which is sensitive to the ambient conditions and also to the way the gravitational field is defined compared to the geometry of the eye making the circulations and the thermal field complicated in transient states. The effect of variation in material and boundary conditions guides us to the conclusion that thermal field of a healthy and non-healthy eye can be distinguished via computer simulations.

Keywords: bio-heat, boussinesq, conduction, convection, eye

Procedia PDF Downloads 345
11606 Application of Post-Stack and Pre-Stack Seismic Inversion for Prediction of Hydrocarbon Reservoirs in a Persian Gulf Gas Field

Authors: Nastaran Moosavi, Mohammad Mokhtari

Abstract:

Seismic inversion is a technique which has been in use for years and its main goal is to estimate and to model physical characteristics of rocks and fluids. Generally, it is a combination of seismic and well-log data. Seismic inversion can be carried out through different methods; we have conducted and compared post-stack and pre- stack seismic inversion methods on real data in one of the fields in the Persian Gulf. Pre-stack seismic inversion can transform seismic data to rock physics such as P-impedance, S-impedance and density. While post- stack seismic inversion can just estimate P-impedance. Then these parameters can be used in reservoir identification. Based on the results of inverting seismic data, a gas reservoir was detected in one of Hydrocarbon oil fields in south of Iran (Persian Gulf). By comparing post stack and pre-stack seismic inversion it can be concluded that the pre-stack seismic inversion provides a more reliable and detailed information for identification and prediction of hydrocarbon reservoirs.

Keywords: density, p-impedance, s-impedance, post-stack seismic inversion, pre-stack seismic inversion

Procedia PDF Downloads 323
11605 Molecular Identification and Evolutionary Status of Lucilia bufonivora: An Obligate Parasite of Amphibians in Europe

Authors: Gerardo Arias, Richard Wall, Jamie Stevens

Abstract:

Lucilia bufonivora Moniez, is an obligate parasite of toads and frogs widely distributed in Europe. Its sister taxon Lucilia silvarum Meigen behaves mainly as a carrion breeder in Europe, however it has been reported as a facultative parasite of amphibians. These two closely related species are morphologically almost identical, which has led to misidentification, and in fact, it has been suggested that the amphibian myiasis cases by L. silvarum reported in Europe should be attributed to L. bufonivora. Both species remain poorly studied and their taxonomic relationships are still unclear. The identification of the larval specimens involved in amphibian myiasis with molecular tools and phylogenetic analysis of these two closely related species may resolve this problem. In this work seventeen unidentified larval specimens extracted from toad myiasis cases of the UK, the Netherlands and Switzerland were obtained, their COX1 (mtDNA) and EF1-α (Nuclear DNA) gene regions were amplified and then sequenced. The 17 larval samples were identified with both molecular markers as L. bufonivora. Phylogenetic analysis was carried out with 10 other blowfly species, including L. silvarum samples from the UK and USA. Bayesian Inference trees of COX1 and a combined-gene dataset suggested that L. silvarum and L. bufonivora are separate sister species. However, the nuclear gene EF1-α does not appear to resolve their relationships, suggesting that the rates of evolution of the mtDNA are much faster than those of the nuclear DNA. This work provides the molecular evidence for successful identification of L. bufonivora and a molecular analysis of the populations of this obligate parasite from different locations across Europe. The relationships with L. silvarum are discussed.

Keywords: calliphoridae, molecular evolution, myiasis, obligate parasitism

Procedia PDF Downloads 242
11604 Spatio-Temporal Analysis of Rabies Incidence in Herbivores of Economic Interest in Brazil

Authors: Francisco Miroslav Ulloa-Stanojlovic, Gina Polo, Ricardo Augusto Dias

Abstract:

In Brazil, there is a high incidence of rabies in herbivores of economic interest (HEI) transmitted by the common vampire bat Desmodus rotundus, the presence of human rabies cases and the huge economic losses in the world's largest cattle industry, it is important to assist the National Program for Control of Rabies in herbivores in Brazil, that aims to reduce the incidence of rabies in HEI populations, mainly through epidemiological surveillance, vaccination of herbivores and control of vampire-bat roosts. Material and Methods: A spatiotemporal retrospective Kulldorff's spatial scan statistic based on a Poisson model and Monte Carlo simulation and an Anselin's Local Moran's I statistic were used to uncover spatial clustering of HEI rabies from 2000 – 2014. Results: Were identify three important clusters with significant year-to-year variation (Figure 1). In 2000, was identified one area of clustering in the North region, specifically in the State of Tocantins. Between the year 2000 and 2004, a cluster centered in the Midwest and Southeast region including the States of Goiás, Minas Gerais, Rio de Janeiro, Espirito Santo and São Paulo was prominent. And finally between 2000 and 2005 was found an important cluster in the North, Midwest and South region. Conclusions: The HEI rabies is endemic in the country, in addition, appears to be significant differences among the States according to their surveillance services, that may be difficulting the control of the disease, also other factors could be influencing in the maintenance of this problem like the lack of information of vampire-bat roosts identification, and limited human resources for realization of field monitoring. A review of the program control by the authorities it’s necessary.

Keywords: Brazil, Desmodus rotundus, herbivores, rabies

Procedia PDF Downloads 417
11603 Multiperson Drone Control with Seamless Pilot Switching Using Onboard Camera and Openpose Real-Time Keypoint Detection

Authors: Evan Lowhorn, Rocio Alba-Flores

Abstract:

Traditional classification Convolutional Neural Networks (CNN) attempt to classify an image in its entirety. This becomes problematic when trying to perform classification with a drone’s camera in real-time due to unpredictable backgrounds. Object detectors with bounding boxes can be used to isolate individuals and other items, but the original backgrounds remain within these boxes. These basic detectors have been regularly used to determine what type of object an item is, such as “person” or “dog.” Recent advancement in computer vision, particularly with human imaging, is keypoint detection. Human keypoint detection goes beyond bounding boxes to fully isolate humans and plot points, or Regions of Interest (ROI), on their bodies within an image. ROIs can include shoulders, elbows, knees, heads, etc. These points can then be related to each other and used in deep learning methods such as pose estimation. For drone control based on human motions, poses, or signals using the onboard camera, it is important to have a simple method for pilot identification among multiple individuals while also giving the pilot fine control options for the drone. To achieve this, the OpenPose keypoint detection network was used with body and hand keypoint detection enabled. OpenPose supports the ability to combine multiple keypoint detection methods in real-time with a single network. Body keypoint detection allows simple poses to act as the pilot identifier. The hand keypoint detection with ROIs for each finger can then offer a greater variety of signal options for the pilot once identified. For this work, the individual must raise their non-control arm to be identified as the operator and send commands with the hand on their other arm. The drone ignores all other individuals in the onboard camera feed until the current operator lowers their non-control arm. When another individual wish to operate the drone, they simply raise their arm once the current operator relinquishes control, and then they can begin controlling the drone with their other hand. This is all performed mid-flight with no landing or script editing required. When using a desktop with a discrete NVIDIA GPU, the drone’s 2.4 GHz Wi-Fi connection combined with OpenPose restrictions to only body and hand allows this control method to perform as intended while maintaining the responsiveness required for practical use.

Keywords: computer vision, drone control, keypoint detection, openpose

Procedia PDF Downloads 184
11602 Approach for Evaluating Wastewater Reuse Options in Agriculture

Authors: Manal Elgallal, Louise Fletcher, Barbara Evans

Abstract:

Water scarcity is a growing concern in many arid and semi-arid countries. The increase of water scarcity threatens economic development and sustainability of human livelihoods as well as environment especially in developing countries. Globally, agriculture is the largest water consumption sector, accounting for approximately 70% of all freshwater extraction. Growing competition between the agricultural and higher economic value in urban and industrial uses of high-quality freshwater supplies, especially in regions where water scarcity major problems, will increase the pressure on this precious resource. In this circumstance, wastewater may provide reliable source of water for agriculture and enable freshwater to be exchanged for more economically valuable purposes. Concern regarding the risks from microbial and toxic components to human health and environment quality is a serious obstacle for wastewater reuse particularly in agriculture. Although powerful approaches and tools for microbial risk assessment and management for safe use of wastewater are now available, few studies have attempted to provide any mechanism to quantitatively assess and manage the environmental risks resulting from reusing wastewater. In seeking pragmatic solutions to sustainable wastewater reuse, there remains a lack of research incorporating both health and environmental risk assessment and management with economic analysis in order to quantitatively combine cost, benefits and risks to rank alternative reuse options. This study seeks to enhance effective reuse of wastewater for irrigation in arid and semi-arid areas, the outcome of the study is an evaluation approach that can be used to assess different reuse strategies and to determine the suitable scale at which treatment alternatives and interventions are possible, feasible and cost effective in order to optimise the trade-offs between risks to protect public health and the environment and preserving the substantial benefits.

Keywords: environmental risks, management, life cycle costs, waste water irrigation

Procedia PDF Downloads 262