Search results for: detecting unknown viruses
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1799

Search results for: detecting unknown viruses

809 A Survey of Feature-Based Steganalysis for JPEG Images

Authors: Syeda Mainaaz Unnisa, Deepa Suresh

Abstract:

Due to the increase in usage of public domain channels, such as the internet, and communication technology, there is a concern about the protection of intellectual property and security threats. This interest has led to growth in researching and implementing techniques for information hiding. Steganography is the art and science of hiding information in a private manner such that its existence cannot be recognized. Communication using steganographic techniques makes not only the secret message but also the presence of hidden communication, invisible. Steganalysis is the art of detecting the presence of this hidden communication. Parallel to steganography, steganalysis is also gaining prominence, since the detection of hidden messages can prevent catastrophic security incidents from occurring. Steganalysis can also be incredibly helpful in identifying and revealing holes with the current steganographic techniques, which makes them vulnerable to attacks. Through the formulation of new effective steganalysis methods, further research to improve the resistance of tested steganography techniques can be developed. Feature-based steganalysis method for JPEG images calculates the features of an image using the L1 norm of the difference between a stego image and the calibrated version of the image. This calibration can help retrieve some of the parameters of the cover image, revealing the variations between the cover and stego image and enabling a more accurate detection. Applying this method to various steganographic schemes, experimental results were compared and evaluated to derive conclusions and principles for more protected JPEG steganography.

Keywords: cover image, feature-based steganalysis, information hiding, steganalysis, steganography

Procedia PDF Downloads 193
808 The Identification of Combined Genomic Expressions as a Diagnostic Factor for Oral Squamous Cell Carcinoma

Authors: Ki-Yeo Kim

Abstract:

Trends in genetics are transforming in order to identify differential coexpressions of correlated gene expression rather than the significant individual gene. Moreover, it is known that a combined biomarker pattern improves the discrimination of a specific cancer. The identification of the combined biomarker is also necessary for the early detection of invasive oral squamous cell carcinoma (OSCC). To identify the combined biomarker that could improve the discrimination of OSCC, we explored an appropriate number of genes in a combined gene set in order to attain the highest level of accuracy. After detecting a significant gene set, including the pre-defined number of genes, a combined expression was identified using the weights of genes in a gene set. We used the Principal Component Analysis (PCA) for the weight calculation. In this process, we used three public microarray datasets. One dataset was used for identifying the combined biomarker, and the other two datasets were used for validation. The discrimination accuracy was measured by the out-of-bag (OOB) error. There was no relation between the significance and the discrimination accuracy in each individual gene. The identified gene set included both significant and insignificant genes. One of the most significant gene sets in the classification of normal and OSCC included MMP1, SOCS3 and ACOX1. Furthermore, in the case of oral dysplasia and OSCC discrimination, two combined biomarkers were identified. The combined genomic expression achieved better performance in the discrimination of different conditions than in a single significant gene. Therefore, it could be expected that accurate diagnosis for cancer could be possible with a combined biomarker.

Keywords: oral squamous cell carcinoma, combined biomarker, microarray dataset, correlated genes

Procedia PDF Downloads 402
807 The Map of Cassini: An Accurate View of Current Border Between Spain and France

Authors: Barbara Polo Martin

Abstract:

During the 18th century, the border between Spain and France underwent various changes, primarily due to territorial agreements, wars, and treaties between the two nations and other European powers. For studying these changes, the Cassini maps remain valuable historical documents, offering a glimpse into the landscape and geography of 18th-century France and its neighboring regions, including the border between Spain and France. However, it's essential to recognize that these maps may not reflect modern political boundaries or territorial changes that have occurred since their creation. The project was initiated by King Louis XV in 1744 and continued by his successor, Louis XVI. The primary objective was to produce accurate maps of France, which would serve various purposes, including military, administrative, and scientific. The Cassini maps were groundbreaking for their time, as they were among the earliest attempts to create topographic maps on a national scale. They covered the entirety of France and were based on meticulous surveying and cartographic techniques. The maps featured precise geographic details, including elevation contours, rivers, roads, forests, and settlements. This study aims to analyze this rich and unknown cartography of France, study the rich place names it offers, as well as the accuracy of delimitations created over time between both empires in a historical way but also through a Geographical Information System. This study will offer a deeper knowledge about the cartography that supposes the beginning of topography in Europe.

Keywords: cartography, engineering, borders, Spain, France, Cassini

Procedia PDF Downloads 38
806 Macular Ganglion Cell Inner Plexiform Layer Thinning

Authors: Hye-Young Shin, Chan Kee Park

Abstract:

Background: To compare the thinning patterns of the ganglion cell-inner plexiform layer (GCIPL) and peripapillary retinal nerve fiber layer (pRNFL) as measured using Cirrus high-definition optical coherence tomography (HD-OCT) in patients with visual field (VF) defects that respect the vertical meridian. Methods: Twenty eyes of eleven patients with VF defects that respect the vertical meridian were enrolled retrospectively. The thicknesses of the macular GCIPL and pRNFL were measured using Cirrus HD-OCT. The 5% and 1% thinning area index (TAI) was calculated as the proportion of abnormally thin sectors at the 5% and 1% probability level within the area corresponding to the affected VF. The 5% and 1% TAI were compared between the GCIPL and pRNFL measurements. Results: The color-coded GCIPL deviation map showed a characteristic vertical thinning pattern of the GCIPL, which is also seen in the VF of patients with brain lesions. The 5% and 1% TAI were significantly higher in the GCIPL measurements than in the pRNFL measurements (all P < 0.01). Conclusions: Macular GCIPL analysis clearly visualized a characteristic topographic pattern of retinal ganglion cell (RGC) loss in patients with VF defects that respect the vertical meridian, unlike pRNFL measurements. Macular GCIPL measurements provide more valuable information than pRNFL measurements for detecting the loss of RGCs in patients with retrograde degeneration of the optic nerve fibers.

Keywords: brain lesion, macular ganglion cell, inner plexiform layer, spectral-domain optical coherence tomography

Procedia PDF Downloads 322
805 Multi-Temporal Cloud Detection and Removal in Satellite Imagery for Land Resources Investigation

Authors: Feng Yin

Abstract:

Clouds are inevitable contaminants in optical satellite imagery, and prevent the satellite imaging systems from acquiring clear view of the earth surface. The presence of clouds in satellite imagery bring negative influences for remote sensing land resources investigation. As a consequence, detecting the locations of clouds in satellite imagery is an essential preprocessing step, and further remove the existing clouds is crucial for the application of imagery. In this paper, a multi-temporal based satellite imagery cloud detection and removal method is proposed, which will be used for large-scale land resource investigation. The proposed method is mainly composed of four steps. First, cloud masks are generated for cloud contaminated images by single temporal cloud detection based on multiple spectral features. Then, a cloud-free reference image of target areas is synthesized by weighted averaging time-series images in which cloud pixels are ignored. Thirdly, the refined cloud detection results are acquired by multi-temporal analysis based on the reference image. Finally, detected clouds are removed via multi-temporal linear regression. The results of a case application in Hubei province indicate that the proposed multi-temporal cloud detection and removal method is effective and promising for large-scale land resource investigation.

Keywords: cloud detection, cloud remove, multi-temporal imagery, land resources investigation

Procedia PDF Downloads 261
804 A Real-Time Simulation Environment for Avionics Software Development and Qualification

Authors: Ferdinando Montemari, Antonio Vitale, Nicola Genito, Luca Garbarino, Urbano Tancredi, Domenico Accardo, Michele Grassi, Giancarmine Fasano, Anna Elena Tirri

Abstract:

The development of guidance, navigation and control algorithms and avionic procedures requires the disposability of suitable analysis and verification tools, such as simulation environments, which support the design process and allow detecting potential problems prior to the flight test, in order to make new technologies available at reduced cost, time and risk. This paper presents a simulation environment for avionic software development and qualification, especially aimed at equipment for general aviation aircrafts and unmanned aerial systems. The simulation environment includes models for short and medium-range radio-navigation aids, flight assistance systems, and ground control stations. All the software modules are able to simulate the modeled systems both in fast-time and real-time tests, and were implemented following component oriented modeling techniques and requirement based approach. The paper describes the specific models features, the architectures of the implemented software systems and its validation process. Performed validation tests highlighted the capability of the simulation environment to guarantee in real-time the required functionalities and performance of the simulated avionics systems, as well as to reproduce the interaction between these systems, thus permitting a realistic and reliable simulation of a complete mission scenario.

Keywords: ADS-B, avionics, NAVAIDs, real-time simulation, TCAS, UAS ground control station

Procedia PDF Downloads 210
803 A Novel Approach to Design and Implement Context Aware Mobile Phone

Authors: G. S. Thyagaraju, U. P. Kulkarni

Abstract:

Context-aware computing refers to a general class of computing systems that can sense their physical environment, and adapt their behaviour accordingly. Context aware computing makes systems aware of situations of interest, enhances services to users, automates systems and personalizes applications. Context-aware services have been introduced into mobile devices, such as PDA and mobile phones. In this paper we are presenting a novel approaches used to realize the context aware mobile. The context aware mobile phone (CAMP) proposed in this paper senses the users situation automatically and provides user context required services. The proposed system is developed by using artificial intelligence techniques like Bayesian Network, fuzzy logic and rough sets theory based decision table. Bayesian Network to classify the incoming call (high priority call, low priority call and unknown calls), fuzzy linguistic variables and membership degrees to define the context situations, the decision table based rules for service recommendation. To exemplify and demonstrate the effectiveness of the proposed methods, the context aware mobile phone is tested for college campus scenario including different locations like library, class room, meeting room, administrative building and college canteen.

Keywords: context aware mobile, fuzzy logic, decision table, Bayesian probability

Procedia PDF Downloads 347
802 Exposure to Violence and Its Association with Mental Health in Swedish Prospective Exchange Students and Campus Students

Authors: Emil Danehorn, Ulla Peterson, Marie Oscarsson, Goldina Smirthwaite, Katarina Swahnberg

Abstract:

Swedish students who choose to study abroad are common, but there has been limited research on exchange students. There are indications that some Swedish exchange students have been exposed to violence, but it is not known if they, already before their semester abroad, are more exposed to violence than students who remain on campus. Our aim was to investigate potential differences in exposure to physical, sexual, and emotional violence between prospective exchange students and campus students and between male and female students in general, as well as to determine any associations between mental health and exposure to violence among students in the total sample. Method: Comparative cross-sectional design using an online survey containing the NorVold Abuse Questionnaire and the General Health Questionnaire 12. A total of 565 participants took part in the study. Results: Prospective exchange students were less exposed to emotional violence compared to campus students. About one-half of all the participating female students had been exposed to sexual violence and about one-third of all the male students had been exposed to physical violence. The results also indicated that exposure to more than one form of violence was associated with poor mental health for students as a group. Conclusion: Prospective exchange students as a group do not report more exposure to physical and sexual violence than campus students but do report less exposure to emotional violence. However, the overall frequency of exposure to violence among the students was high. This highlights the need for proactive efforts for everyone, not least for exchange students who will be staying in a new environment unknown to them.

Keywords: sexual violence, physical violence, emotional violence, exchange students, mental health

Procedia PDF Downloads 103
801 Patient Outcomes Following Out-of-Hospital Cardiac Arrest

Authors: Scott Ashby, Emily Granger, Mark Connellan

Abstract:

Background: In-hospital management of Out-of-Hospital Cardiac Arrest (OHCA) is complex as the aetiologies are varied. Acute coronary angiography has been shown to improve outcomes for patients with coronary occlusion as the cause; however, these patients are difficult to identify. ECG results may help identify these patients, but the accuracy of this diagnostic test is under debate, and requires further investigation. Methods: Arrest and hospital management information was collated retrospectively for OHCA patients who presented to a single clinical site between 2009 and 2013. Angiography results were then collected and checked for significance with survival to discharge. The presence of a severe lesion (>70%) was then compared to categorised ECG findings, and the accuracy of the test was calculated. Results: 104 patients were included in this study, 44 survived to discharge, 52 died and 8 were transferred to other clinical sites. Angiography appears to significantly correlate with survival to discharge. ECG showed 54.8% sensitivity for detecting the presence of a severe lesion within the group that received angiography. A combined criterion including any ECG pathology showed 100% sensitivity and negative predictive value, however, a low specificity and positive predictive value. Conclusion: In the cohort investigated, ST elevation on ECG is not a sensitive enough screening test to be used to determine whether OHCA patients have coronary stenosis as the likely cause of their arrest, and more investigation into whether screening with a combined ECG criterion, or whether all patients should receive angiography routinely following OHCA is needed.

Keywords: out of hospital cardiac arrest, coronary angiography, resuscitation, emergency medicine

Procedia PDF Downloads 381
800 Cimifugin Inhibited Th2-Type Allergic Contact Dermatitis

Authors: Xiaoyan Jiang, Huizhu Wang, Lili Gui, Dandan Shen, Xiao Wei, Xi Yu, Hailiang Liu, Min Hong

Abstract:

Objective: Applicate FITC to establish Th2-type allergic contact dermatitis model, and study the effect and mechanism of Cimifugin on Th2-type allergic contact dermatitis. Methods: The Balb/c mice were sensitized with painting 80 ul of 1.5% FITC onto the shaved abdomen skin at DAY1 and DAY2. The animals were challenged on their right ears with 20 ul of 0.6% FITC, and the left ears were painted with solvent alone at day 6, mice were administered cimifugin for 7 days. 24h later, ear swelling was noted, and the infiltration of eosinophils was investigated by hematoxylin and eosin (H&E) staining. while part of the ear tissue homogenates prepared for detecting interleukin-4 levels by ELISA .Mice were administered cimifugin In the initial stage of the above model for 5 days(-1DAY—DAY3), ear tissue were homogenized to detect IL-33 levels by ELISA. Results: Cimifugin 25mg/kg, 50mg/kg inhibited mouse ear swelling, ear histopathology showed that mice given Cimifugin has significantly reduced levels of local tissue fluid exudation, congestion, infiltration of lymphocytes, and other inflammatory conditions compared with the model group. At the same time, it has significantly reduce of Th2 cytokines IL-4 in the mouse ear tissue homogenate. Data of the initial stage shows that 12.5mg/kg, 50mg/kg Cimifugin significantly inhibited IL-33 levels. Conclusion: Cimifugin inhibit FITC-induced Th2-type allergic contact dermatitis, and its mechanism may be related to inhibition of IL-33.

Keywords: cimifugin, allergic contact dermatitis, Th1/Th2, IL-33

Procedia PDF Downloads 459
799 Cdk1 Gates Cell Cycle-Dependent tRNA Synthesis by Regulating RNA Polymerase III Activity

Authors: Maricarmen Herrera, Pierre Chymkowitch, Joe Robertson, Jens Eriksson, Jorrit Enserink

Abstract:

tRNA genes are transcribed by RNA polymerase III. During recent years, it has become clear that tDNA transcription fluctuates during the cell cycle. However, the mechanism by which the cell cycle controls the amplitude of tDNA transcription remains unknown. We found that the cyclin Clb5 recruits the cyclin dependent kinase Cdk1 to tRNA genes to sharply increase tRNA synthesis during a brief interval in the cell cycle. We show that Cdk1 promotes the interaction of TFIIIB with TFIIIC, that it stimulates the recruitment of TFIIIC to tRNA genes, that it prevents the formation of an overly stable TFIIIB-tDNA complex and that it augments the dynamics of RNA polymerase III. Furthermore, we identify Bdp1 as a novel Cdk1 substrate, and phosphorylation of Bdp1 is required for the cell cycle-dependent increase in tDNA transcription. In addition, we show that phosphorylation of the Cdk1 substrate Nup60 mediates formation of a Nup60-Nup2 complex at tRNA genes, which is also required for cell cycle-dependent tDNA transcription. Together, our findings indicate that Cdk1 activity gates tRNA synthesis by regulating the dynamics of the TFIIIB-TFIIIC-RNAPIII complex, and that it may promote the formation of a nuclear pore microenvironment conducive to efficient tDNA transcription.

Keywords: Cdk1, cell cycle, RNAPIII machinery, tRNA

Procedia PDF Downloads 165
798 BLS-2/BSL-3 Laboratory for Diagnosis of Pathogens on the Colombia-Ecuador Border Region: A Post-COVID Commitment to Public Health

Authors: Anderson Rocha-Buelvas, Jaqueline Mena Huertas, Edith Burbano Rosero, Arsenio Hidalgo Troya, Mauricio Casas Cruz

Abstract:

COVID-19 is a disruptive pandemic for the public health and economic system of whole countries, including Colombia. Nariño Department is the southwest of the country and draws attention to being on the border with Ecuador, constantly facing demographic transition affecting infections between countries. In Nariño, the early routine diagnosis of SARS-CoV-2, which can be handled at BSL-2, has affected the transmission dynamics of COVID-19. However, new emerging and re-emerging viruses with biological flexibility classified as a Risk Group 3 agent can take advantage of epidemiological opportunities, generating the need to increase clinical diagnosis, mainly in border regions between countries. The overall objective of this project was to assure the quality of the analytical process in the diagnosis of high biological risk pathogens in Nariño by building a laboratory that includes biosafety level (BSL)-2 and (BSL)-3 containment zones. The delimitation of zones was carried out according to the Verification Tool of the National Health Institute of Colombia and following the standard requirements for the competence of testing and calibration laboratories of the International Organization for Standardization. This is achieved by harmonization of methods and equipment for effective and durable diagnostics of the large-scale spread of highly pathogenic microorganisms, employing negative-pressure containment systems and UV Systems in accordance with a finely controlled electrical system and PCR systems as new diagnostic tools. That increases laboratory capacity. Protection in BSL-3 zones will separate the handling of potentially infectious aerosols within the laboratory from the community and the environment. It will also allow the handling and inactivation of samples with suspected pathogens and the extraction of molecular material from them, allowing research with pathogens with high risks, such as SARS-CoV-2, Influenza, and syncytial virus, and malaria, among others. The diagnosis of these pathogens will be articulated across the spectrum of basic, applied, and translational research that could receive about 60 daily samples. It is expected that this project will be articulated with the health policies of neighboring countries to increase research capacity.

Keywords: medical laboratory science, SARS-CoV-2, public health surveillance, Colombia

Procedia PDF Downloads 68
797 A Supervised Approach for Detection of Singleton Spam Reviews

Authors: Atefeh Heydari, Mohammadali Tavakoli, Naomie Salim

Abstract:

In recent years, we have witnessed that online reviews are the most important source of customers’ opinion. They are progressively more used by individuals and organisations to make purchase and business decisions. Unfortunately, for the reason of profit or fame, frauds produce deceptive reviews to hoodwink potential customers. Their activities mislead not only potential customers to make appropriate purchasing decisions and organisations to reshape their business, but also opinion mining techniques by preventing them from reaching accurate results. Spam reviews could be divided into two main groups, i.e. multiple and singleton spam reviews. Detecting a singleton spam review that is the only review written by a user ID is extremely challenging due to lack of clue for detection purposes. Singleton spam reviews are very harmful and various features and proofs used in multiple spam reviews detection are not applicable in this case. Current research aims to propose a novel supervised technique to detect singleton spam reviews. To achieve this, various features are proposed in this study and are to be combined with the most appropriate features extracted from literature and employed in a classifier. In order to compare the performance of different classifiers, SVM and naive Bayes classification algorithms were used for model building. The results revealed that SVM was more accurate than naive Bayes and our proposed technique is capable to detect singleton spam reviews effectively.

Keywords: classification algorithms, Naïve Bayes, opinion review spam detection, singleton review spam detection, support vector machine

Procedia PDF Downloads 287
796 A Practical and Theoretical Study on the Electromotor Bearing Defect Detection in a Wet Mill Using the Vibration Analysis Method and Defect Length Calculation in the Bearing

Authors: Mostafa Firoozabadi, Alireza Foroughi Nematollahi

Abstract:

Wet mills are one of the most important equipment in the mining industries and any defect occurrence in them can stop the production line and it can make some irrecoverable damages to the system. Electromotors are the significant parts of a mill and their monitoring is a necessary process to prevent unwanted defects. The purpose of this study is to investigate the Electromotor bearing defects, theoretically and practically, using the vibration analysis method. When a defect happens in a bearing, it can be transferred to the other parts of the equipment like inner ring, outer ring, balls, and the bearing cage. The electromotor defects source can be electrical or mechanical. Sometimes, the electrical and mechanical defect frequencies are modulated and the bearing defect detection becomes difficult. In this paper, to detect the electromotor bearing defects, the electrical and mechanical defect frequencies are extracted firstly. Then, by calculating the bearing defect frequencies, and the spectrum and time signal analysis, the bearing defects are detected. In addition, the obtained frequency determines that the bearing level in which the defect has happened and by comparing this level to the standards it determines the bearing remaining lifetime. Finally, the defect length is calculated by theoretical equations to demonstrate that there is no need to replace the bearing. The results of the proposed method, which has been implemented on the wet mills in the Golgohar mining and industrial company in Iran, show that this method is capable of detecting the electromotor bearing defects accurately and on time.

Keywords: bearing defect length, defect frequency, electromotor defects, vibration analysis

Procedia PDF Downloads 481
795 Magnetic Survey for the Delineation of Concrete Pillars in Geotechnical Investigation for Site Characterization

Authors: Nuraddeen Usman, Khiruddin Abdullah, Mohd Nawawi, Amin Khalil Ismail

Abstract:

A magnetic survey is carried out in order to locate the remains of construction items, specifically concrete pillars. The conventional Euler deconvolution technique can perform the task but it requires the use of fixed structural index (SI) and the construction items are made of materials with different shapes which require different SI (unknown). A Euler deconvolution technique that estimate background, horizontal coordinate (xo and yo), depth and structural index (SI) simultaneously is prepared and used for this task. The synthetic model study carried indicated the new methodology can give a good estimate of location and does not depend on magnetic latitude. For field data, both the total magnetic field and gradiometer reading had been collected simultaneously. The computed vertical derivatives and gradiometer readings are compared and they have shown good correlation signifying the effectiveness of the method. The filtering is carried out using automated procedure, analytic signal and other traditional techniques. The clustered depth solutions coincided with the high amplitude/values of analytic signal and these are the possible target positions of the concrete pillars being sought. The targets under investigation are interpreted to be located at the depth between 2.8 to 9.4 meters. More follow up survey is recommended as this mark the preliminary stage of the work.

Keywords: concrete pillar, magnetic survey, geotechnical investigation, Euler Deconvolution

Procedia PDF Downloads 244
794 Rearrangement and Depletion of Human Skin Folate after UVA Exposure

Authors: Luai Z. Hasoun, Steven W. Bailey, Kitti K. Outlaw, June E. Ayling

Abstract:

Human skin color is thought to have evolved to balance sufficient photochemical synthesis of vitamin D versus the need to protect not only DNA but also folate from degradation by ultraviolet light (UV). Although the risk of DNA damage and subsequent skin cancer is related to light skin color, the effect of UV on skin folate of any species is unknown. Here we show that UVA irradiation at 13 mW/cm2 for a total exposure of 187 J/cm2 (similar to a maximal daily equatorial dose) induced a significant loss of total folate in epidermis of ex vivo white skin. No loss was observed in black skin samples, or in the dermis of either color. Interestingly, while the concentration of 5 methyltetrahydrofolate (5-MTHF) fell in white epidermis, a concomitant increase of tetrahydrofolic acid was found, though not enough to maintain the total pool. These results demonstrate that UVA indeed not only decreases folate in skin, but also rearranges the pool components. This could be due in part to the reported increase of NADPH oxidase activity upon UV irradiation, which in turn depletes the NADPH needed for 5-MTHF biosynthesis by 5,10-methylenetetrahydrofolate reductase. The increased tetrahydrofolic acid might further support production of the nucleotide bases needed for DNA repair. However, total folate was lost at a rate that could, with strong or continuous enough exposure to ultraviolet radiation, substantially deplete light colored skin locally, and also put pressure on total body stores for individuals with low intake of folate.

Keywords: depletion, folate, human skin, ultraviolet

Procedia PDF Downloads 370
793 From Edible Products to Disinfecting Currency Notes

Authors: Aniruddha Hore, Saptarshi Mitra, Sandip Ghosh, Sujoy Bose, Avijit Ghosh

Abstract:

The Indian rupee is the official currency of India. With time, science and technology got advanced, and our society is slowly making its way to a cashless mode of transaction. But as India is still a developing country, a large part of our society still depends on transaction through cash. During times of pandemics, we came to understand that everything that we touch is not safe from microbial contamination. The Indian currency is also not an exception. The Indian currency is the modern-day medium of harmful bacterial as well as other microbial contaminations resulting in diseases in human bodies. Therefore, the need came to make the currency disinfectant to give our people a healthier lifestyle. The main focus of the study is to develop a solution that, when applied to the currency notes, will kill the persisting bacteria or microbes present in the notes. So various natural edible products were used in order to prepare the solution, which is highly effective against the presence of harmful bacteria such as E. coli and S. aureus. The antibacterial activity of these natural ingredients is not unknown to us, so extracts from those products were mixed together to form a solution which was made the Indian currency notes antibacterial for 20min approx. The solution was creating a layer on the surface of currency notes, therefore, making it antibacterial for a given duration of time, i.e., no bacterial growth was seen during the time period of 20 minutes, therefore, making it safe for the usage of human hands.

Keywords: Indian currency, antibacterial property of Indian currency, surface coating, currency disinfectant

Procedia PDF Downloads 109
792 Diversity for Safety and Security of Autonomous Vehicles against Accidental and Deliberate Faults

Authors: Anil Ranjitbhai Patel, Clement John Shaji, Peter Liggesmeyer

Abstract:

Safety and security of autonomous vehicles (AVs) is a growing concern, first, due to the increased number of safety-critical functions taken over by automotive embedded systems; second, due to the increased exposure of the software-intensive systems to potential attackers; third, due to dynamic interaction in an uncertain and unknown environment at runtime which results in changed functional and non-functional properties of the system. Frequently occurring environmental uncertainties, random component failures, and compromise security of the AVs might result in hazardous events, sometimes even in an accident, if left undetected. Beyond these technical issues, we argue that the safety and security of AVs against accidental and deliberate faults are poorly understood and rarely implemented. One possible way to overcome this is through a well-known diversity approach. As an effective approach to increase safety and security, diversity has been widely used in the aviation, railway, and aerospace industries. Thus, the paper proposes fault-tolerance by diversity model takes into consideration the mitigation of accidental and deliberate faults by application of structure and variant redundancy. The model can be used to design the AVs with various types of diversity in hardware and software-based multi-version system. The paper evaluates the presented approach by employing an example from adaptive cruise control, followed by discussing the case study with initial findings.

Keywords: autonomous vehicles, diversity, fault-tolerance, adaptive cruise control, safety, security

Procedia PDF Downloads 110
791 Effect of Far Infrared and Endothelial Cell Growth Supplement on Human Umbilical Vascular Endothelial Cells

Authors: Ming-Tzu Tsai, Jui-Ting Hsu, Chia-Chieh Lin, Feng-Tsai Chiang, Cheng-Chin Huang

Abstract:

Far infrared (FIR), an invisible and short electromagnetic waves ranges from 6-14 μm also defines as the “growth ray.” Although the mechanism of FIR is still unknown, most data have suggested that FIR could accelerate the skin microcirculation by elevating the blood flow and nitric-oxide (NO) synthesis. In this present work, the effect of FIR irradiation and endothelial cell growth supplement (ECGS) on human umbilical vascular endothelial cells (HUVECs) was evaluated. To understand whether the cell viability and NO production of HUVECs affected by NO, cells with/without ECGS were treated in the presence or absence of L-NAME, an eNOS inhibitor. For FIR exposure, FIR-emitted ceramic powders consisted of a variety of well-mixed metal oxides were developed. The results showed that L-NAME did had a strong effect on the inhibition of NO production, especially in the ECGS-treated group. However, the cell viability of each group was rarely affected in the presence of L-NAME. Cells with the incubation of ECGS showed much higher cell viability compared to the control. Moreover, NO production of HUVECs exposed to FIR irradiation was significantly inhibited in the presence of L-NAME. It suggested that NO could play a role modulating the downstream signals of HUVECs during FIR exposure.

Keywords: far-infrared irradiation (FIR), nitric oxide (NO), endothelial nitric oxide synthase (eNOS), endothelial cell growth supplement (ECGS)

Procedia PDF Downloads 409
790 Literature Review of the Antibacterial Effects of Salvia Officinalis L.

Authors: Benguerine Zohra, Merzak Siham, Bouziane Cheimaa, Si Tayeb Fatima, Jou Siham, Belkessam

Abstract:

Introduction: Antibiotics, widely produced and consumed in large quantities, have proven problematic due to various types of side effects. The development of bacterial resistance to currently available antibiotics has made the search for new antibacterial agents necessary. One alternative strategy to combat antibiotic-resistant bacteria is the use of natural antimicrobial substances such as plant extracts. The objective of this study is to provide an overview of the antibacterial effects of a plant native to the Middle East and Mediterranean regions, Salvia officinalis (sage). Materials and Methods: This review article was conducted by searching studies in the PubMed, Scopus, JSTOR, and SpringerLink databases. The search terms were "Salvia officinalis L." and "antibacterial effects." Only studies that met our inclusion criteria (in English, antibacterial effects of Salvia officinalis L., and primarily dating from 2012 to 2023) were accepted for further review. Results and Discussion: The initial search strategy identified approximately 78 references, with only 13 articles included in this review. The synthesis of the articles revealed that several data sources confirm the antimicrobial effects of S. officinalis. Its essential oil and alcoholic extract exhibit strong bactericidal and bacteriostatic effects against both Gram-positive and Gram-negative bacteria. Conclusion: The significant value of the extract, oil, and leaves of S. officinalis calls for further studies on the other useful and unknown properties of this multi-purpose plant.

Keywords: salvia officinalis, literature review, antibacterial, effects

Procedia PDF Downloads 20
789 Microfluidic Construction of Responsive Photonic Microcapsules for Microsensors

Authors: Lingling Shui, Shuting Xie

Abstract:

As alternatives to electronic devices, optically active structures from responsive nanomaterials offer great opportunity buildup smart functional sensors. Hereby, we report on droplet microfluidics enabled construction and application of photonic microcapsules (PMCs) for colorimetric temperature microsensors, enabling miniaturization for injectable local micro-area sensing and integration for large-area sensing. Monodispersed PMCs are produced by in-situ photopolymerization of hydrogel shells of cholesteric liquid crystal (CLC)-in-water-in-oil double emulsion droplets prepared using microfluidic devices, with controllable physical structures and chemical compositions. Constructed PMCs exhibit thermal responsive structural color according to the selective Bragg reflection of CLC’s periodical helical structures within the microdroplet’s spherical confinement. Constructed PMCs with tunable size and composition have been successfully applied for monitoring the living cell extracellular temperature via co-incubation with cell suspension, and for detecting human body temperature via a flexible device from assembled PMCs. These PMCs could be flexibly applied in either micro-environment or large-area surface, enabling wide applications for precision temperature monitoring biological activities (e.g. cells or organs), optoelectronic devices working conditions (e.g. temperature indicators under extreme conditions), and etc.

Keywords: droplet, microfluidics, assembly, soft materials, microsensor

Procedia PDF Downloads 65
788 Biodiversity of Platyhelminthes Parasites on Batoids (Elasmobranchii) Fishes from the Algerian Coasts: First Annotated Inventory

Authors: Fadila Tazerouti, Affaf Boukadoum, Kamilia Gharbi, Karima Benmeslem

Abstract:

Parasites are recognized as an important component of biodiversity because of their crucial role in providing valuable information on host populations and in the functioning and balance of natural ecosystems. Although the knowledge about these pathogen organisms' diversity has increased these last years, many species still need to be identified and more investigations should be performed. Batoid fishes represent a significant biological resource, especially among populations of the Mediterranean basin. However, the data on their parasitic fauna, particularly in Algeria, remains unknown and still incomplete. Therefore, the aim of this study is to survey and provide data on the biodiversity of Platyhelminthes parasites of Elasmobranches fishes from Algerian coasts. 3217 specimens of Batoids belonging to 4 families, Topedinidae, Rajdae, Dasyatidae and Myliobatidae, caught in several sites on the Algerian coasts, were examined for their parasites. 47 taxa, including 7 new for science and belonging to 2 classes Monogenea and Cestoda, have been identified. Monogeneans presented the highest richness with 24 taxa and 5 new species for science: 4 Amphibdelloides species and one Calicotyle species. Cestodes are represented by 23 taxa and 3 new species: 2 Acanthobothrium and 1 species Echinobothrium. This study allowed us to establish for the first time in Algeria an inventory of Platyhelminthes parasites of this group of Chondrichthyes fish, as well as an invaluable contribution to the knowledge about the parasitic fauna of Algerian and Mediterranean Elasmobranch fishes.

Keywords: parasitic platyhelminthes, biodiversity, elasmobranches, algerian coasts, inventory

Procedia PDF Downloads 58
787 Distances over Incomplete Diabetes and Breast Cancer Data Based on Bhattacharyya Distance

Authors: Loai AbdAllah, Mahmoud Kaiyal

Abstract:

Missing values in real-world datasets are a common problem. Many algorithms were developed to deal with this problem, most of them replace the missing values with a fixed value that was computed based on the observed values. In our work, we used a distance function based on Bhattacharyya distance to measure the distance between objects with missing values. Bhattacharyya distance, which measures the similarity of two probability distributions. The proposed distance distinguishes between known and unknown values. Where the distance between two known values is the Mahalanobis distance. When, on the other hand, one of them is missing the distance is computed based on the distribution of the known values, for the coordinate that contains the missing value. This method was integrated with Wikaya, a digital health company developing a platform that helps to improve prevention of chronic diseases such as diabetes and cancer. In order for Wikaya’s recommendation system to work distance between users need to be measured. Since there are missing values in the collected data, there is a need to develop a distance function distances between incomplete users profiles. To evaluate the accuracy of the proposed distance function in reflecting the actual similarity between different objects, when some of them contain missing values, we integrated it within the framework of k nearest neighbors (kNN) classifier, since its computation is based only on the similarity between objects. To validate this, we ran the algorithm over diabetes and breast cancer datasets, standard benchmark datasets from the UCI repository. Our experiments show that kNN classifier using our proposed distance function outperforms the kNN using other existing methods.

Keywords: missing values, incomplete data, distance, incomplete diabetes data

Procedia PDF Downloads 203
786 A Location-based Authentication and Key Management Scheme for Border Surveillance Wireless Sensor Networks

Authors: Walid Abdallah, Noureddine Boudriga

Abstract:

Wireless sensor networks have shown their effectiveness in the deployment of many critical applications especially in the military domain. Border surveillance is one of these applications where a set of wireless sensors are deployed along a country border line to detect illegal intrusion attempts to the national territory and report this to a control center to undergo the necessary measures. Regarding its nature, this wireless sensor network can be the target of many security attacks trying to compromise its normal operation. Particularly, in this application the deployment and location of sensor nodes are of great importance for detecting and tracking intruders. This paper proposes a location-based authentication and key distribution mechanism to secure wireless sensor networks intended for border surveillance where the key establishment is performed using elliptic curve cryptography and identity-based public key scheme. In this scheme, the public key of each sensor node will be authenticated by keys that depend on its position in the monitored area. Before establishing a pairwise key between two nodes, each one of them must verify the neighborhood location of the other node using a message authentication code (MAC) calculated on the corresponding public key and keys derived from encrypted beacon messages broadcast by anchor nodes. We show that our proposed public key authentication and key distribution scheme is more resilient to node capture and node replication attacks than currently available schemes. Also, the achievement of the key distribution between nodes in our scheme generates less communication overhead and hence increases network performances.

Keywords: wireless sensor networks, border surveillance, security, key distribution, location-based

Procedia PDF Downloads 641
785 Application of KL Divergence for Estimation of Each Metabolic Pathway Genes

Authors: Shohei Maruyama, Yasuo Matsuyama, Sachiyo Aburatani

Abstract:

The development of the method to annotate unknown gene functions is an important task in bioinformatics. One of the approaches for the annotation is The identification of the metabolic pathway that genes are involved in. Gene expression data have been utilized for the identification, since gene expression data reflect various intracellular phenomena. However, it has been difficult to estimate the gene function with high accuracy. It is considered that the low accuracy of the estimation is caused by the difficulty of accurately measuring a gene expression. Even though they are measured under the same condition, the gene expressions will vary usually. In this study, we proposed a feature extraction method focusing on the variability of gene expressions to estimate the genes' metabolic pathway accurately. First, we estimated the distribution of each gene expression from replicate data. Next, we calculated the similarity between all gene pairs by KL divergence, which is a method for calculating the similarity between distributions. Finally, we utilized the similarity vectors as feature vectors and trained the multiclass SVM for identifying the genes' metabolic pathway. To evaluate our developed method, we applied the method to budding yeast and trained the multiclass SVM for identifying the seven metabolic pathways. As a result, the accuracy that calculated by our developed method was higher than the one that calculated from the raw gene expression data. Thus, our developed method combined with KL divergence is useful for identifying the genes' metabolic pathway.

Keywords: metabolic pathways, gene expression data, microarray, Kullback–Leibler divergence, KL divergence, support vector machines, SVM, machine learning

Procedia PDF Downloads 385
784 An Observer-Based Direct Adaptive Fuzzy Sliding Control with Adjustable Membership Functions

Authors: Alireza Gholami, Amir H. D. Markazi

Abstract:

In this paper, an observer-based direct adaptive fuzzy sliding mode (OAFSM) algorithm is proposed. In the proposed algorithm, the zero-input dynamics of the plant could be unknown. The input connection matrix is used to combine the sliding surfaces of individual subsystems, and an adaptive fuzzy algorithm is used to estimate an equivalent sliding mode control input directly. The fuzzy membership functions, which were determined by time consuming try and error processes in previous works, are adjusted by adaptive algorithms. The other advantage of the proposed controller is that the input gain matrix is not limited to be diagonal, i.e. the plant could be over/under actuated provided that controllability and observability are preserved. An observer is constructed to directly estimate the state tracking error, and the nonlinear part of the observer is constructed by an adaptive fuzzy algorithm. The main advantage of the proposed observer is that, the measured outputs is not limited to the first entry of a canonical-form state vector. The closed-loop stability of the proposed method is proved using a Lyapunov-based approach. The proposed method is applied numerically on a multi-link robot manipulator, which verifies the performance of the closed-loop control. Moreover, the performance of the proposed algorithm is compared with some conventional control algorithms.

Keywords: adaptive algorithm, fuzzy systems, membership functions, observer

Procedia PDF Downloads 186
783 Electrical Effects during the Wetting-Drying Cycle of Porous Brickwork: Electrical Aspects of Rising Damp

Authors: Sandor Levai, Valentin Juhasz, Miklos Gasz

Abstract:

Rising damp is an extremely complex phenomenon that is of great practical interest to the field of building conservation due to the irreversible damages it can make to old and historic structures. The electrical effects occurring in damp masonry have been scarcely researched and are a largely unknown aspect of rising damp. Present paper describes the typical electrical patterns occurring in porous brickwork during a wetting and drying cycle. It has been found that in contrast with dry masonry, where electrical phenomena are virtually non-existent, damp masonry exhibits a wide array of electrical effects. Long-term real-time measurements performed in the lab on small-scale brick structures, using an array of embedded micro-sensors, revealed significant voltage, current, capacitance and resistance variations which can be linked to the movement of moisture inside porous materials. The same measurements performed on actual old buildings revealed a similar behaviour, the electrical effects being more significant in areas of the brickwork affected by rising damp. Understanding these electrical phenomena contributes to a better understanding of the driving mechanisms of rising damp, potentially opening new avenues of dealing with it in a less invasive manner.

Keywords: brick masonry, electrical phenomena in damp brickwork, porous building materials, rising damp, spontaneous electrical potential, wetting-drying cycle

Procedia PDF Downloads 114
782 Gender Differences in Walking Capacity and Cardiovascular Regulation in Patients with Peripheral Arterial Disease

Authors: Gabriel Cucato, Marilia Correia, Wagner Domingues, Aline Palmeira, Paulo Longano, Nelson Wolosker, Raphael Ritti-Dias

Abstract:

Women with peripheral arterial disease (PAD) present lower walking capacity in comparison with men. However, whether cardiovascular regulation is also different between genders is unknown. Thus, the aim of this study was to compare walking capacity and cardiovascular regulation between men and women with PAD. A total of 23 women (66±7 yrs) and 31 men (64±9 yrs) were recruited. Patients performed a 6-minute test and the onset claudication distance and total walking distance were measured. Additionally, cardiovascular regulation was assessed by arterial stiffness (pulse wave velocity and augmentation index) and heart rate variability (frequency domain). Independent T test or Mann-Whitney U test were performed. In comparison with men, women present lower onset claudication distance (108±66m vs. 143±50m; P=0.032) and total walking distance (286±83m vs. 361±91 m, P=0.007). Regarding cardiovascular regulation, there were no differences in heart rate variability SDNN (72±160ms vs. 32±22ms, P=0.587); RMSSD (75±209 vs. 25±22ms, P=0.726); pNN50 (11±17ms vs. 8±14ms, P=0.836) in women and men, respectively. Moreover, there were no difference in augmentation index (39±10% vs. 34±11%, P=0.103); pulse pressure (59±17mmHg vs. 56±19mmHg, P=0.593) and pulse wave velocity (8.6±2.6m\s vs. 9.0±2.7m/s, P=0.580). In conclusion, women have impaired walking capacity compared to men. However, sex differences were not observed on cardiovascular regulation in patients with PAD.

Keywords: exercise, intermittent claudication, cardiovascular load, arterial stiffness

Procedia PDF Downloads 374
781 Effect of Sensory Manipulations on Human Joint Stiffness Strategy and Its Adaptation for Human Dynamic Stability

Authors: Aizreena Azaman, Mai Ishibashi, Masanori Ishizawa, Shin-Ichiroh Yamamoto

Abstract:

Sensory input plays an important role to human posture control system to initiate strategy in order to counterpart any unbalance condition and thus, prevent fall. In previous study, joint stiffness was observed able to describe certain issues regarding to movement performance. But, correlation between balance ability and joint stiffness is still remains unknown. In this study, joint stiffening strategy at ankle and hip were observed under different sensory manipulations and its correlation with conventional clinical test (Functional Reach Test) for balance ability was investigated. In order to create unstable condition, two different surface perturbations (tilt up-tilt (TT) down and forward-backward (FB)) at four different frequencies (0.2, 0.4, 0.6 and 0.8 Hz) were introduced. Furthermore, four different sensory manipulation conditions (include vision and vestibular system) were applied to the subject and they were asked to maintain their position as possible. The results suggested that joint stiffness were high during difficult balance situation. Less balance people generated high average joint stiffness compared to balance people. Besides, adaptation of posture control system under repetitive external perturbation also suggested less during sensory limited condition. Overall, analysis of joint stiffening response possible to predict unbalance situation faced by human.

Keywords: balance ability, joint stiffness, sensory, adaptation, dynamic

Procedia PDF Downloads 442
780 Investigation of the Cyclic Response of Mudrock

Authors: Shaymaa Kennedy, Sam Clark, Paul Shaply

Abstract:

With the upcoming construction of high-speed rail HS2 in the UK, a number of issues surrounding the construction technology and track design need to be answered. In this paper performance of subsoil subjected to dynamic loads were studied. The material of study is Mudrock backfill, a weak prevalent rock which response under indicative loading of high-speed rail line is unknown. This paper aims to investigate the use of different track types and the influence they will have on the underlying soil, in order to evaluate the behaviour of it. Ballstless track is a well-established concept in Europe, and the investigation the benefit of the form of construction due to its known savings in maintenance costs. Physical test using a triaxial cyclic loading machine was conducted to assess the expected mechanical behaviour of mudrock under a range of dynamic loads which could be generated beneath different track constructions. Some further parameters are required to frame the problem including determining the stress change with depth and cyclic response are vital to determine the residual plastic strain which is a major concern. In addition, Stress level is discussed in this paper, which are applied to recreate conditions of soil in the laboratory. Results indicate that stress levels are highly influential on the performance of soil at shallower depth and become insignificant with increasing depth.

Keywords: stress level, dynamic load, residual plastic strain, high speed railway

Procedia PDF Downloads 236