Search results for: genotypic identification
2881 Heart Failure Identification and Progression by Classifying Cardiac Patients
Authors: Muhammad Saqlain, Nazar Abbas Saqib, Muazzam A. Khan
Abstract:
Heart Failure (HF) has become the major health problem in our society. The prevalence of HF has increased as the patient’s ages and it is the major cause of the high mortality rate in adults. A successful identification and progression of HF can be helpful to reduce the individual and social burden from this syndrome. In this study, we use a real data set of cardiac patients to propose a classification model for the identification and progression of HF. The data set has divided into three age groups, namely young, adult, and old and then each age group have further classified into four classes according to patient’s current physical condition. Contemporary Data Mining classification algorithms have been applied to each individual class of every age group to identify the HF. Decision Tree (DT) gives the highest accuracy of 90% and outperform all other algorithms. Our model accurately diagnoses different stages of HF for each age group and it can be very useful for the early prediction of HF.Keywords: decision tree, heart failure, data mining, classification model
Procedia PDF Downloads 4022880 An Approach to Apply Kernel Density Estimation Tool for Crash Prone Location Identification
Authors: Kazi Md. Shifun Newaz, S. Miaji, Shahnewaz Hazanat-E-Rabbi
Abstract:
In this study, the kernel density estimation tool has been used to identify most crash prone locations in a national highway of Bangladesh. Like other developing countries, in Bangladesh road traffic crashes (RTC) have now become a great social alarm and the situation is deteriorating day by day. Today’s black spot identification process is not based on modern technical tools and most of the cases provide wrong output. In this situation, characteristic analysis and black spot identification by spatial analysis would be an effective and low cost approach in ensuring road safety. The methodology of this study incorporates a framework on the basis of spatial-temporal study to identify most RTC occurrence locations. In this study, a very important and economic corridor like Dhaka to Sylhet highway has been chosen to apply the method. This research proposes that KDE method for identification of Hazardous Road Location (HRL) could be used for all other National highways in Bangladesh and also for other developing countries. Some recommendations have been suggested for policy maker to reduce RTC in Dhaka-Sylhet especially in black spots.Keywords: hazardous road location (HRL), crash, GIS, kernel density
Procedia PDF Downloads 3142879 A Diagnostic Accuracy Study: Comparison of Two Different Molecular-Based Tests (Genotype HelicoDR and Seeplex Clar-H. pylori ACE Detection), in the Diagnosis of Helicobacter pylori Infections
Authors: Recep Kesli, Huseyin Bilgin, Yasar Unlu, Gokhan Gungor
Abstract:
Aim: The aim of this study was to compare diagnostic values of two different molecular-based tests (GenoType® HelicoDR ve Seeplex® H. pylori-ClaR- ACE Detection) in detection presence of the H. pylori from gastric biopsy specimens. In addition to this also was aimed to determine resistance ratios of H. pylori strains against to clarytromycine and quinolone isolated from gastric biopsy material cultures by using both the genotypic (GenoType® HelicoDR, Seeplex ® H. pylori -ClaR- ACE Detection) and phenotypic (gradient strip, E-test) methods. Material and methods: A total of 266 patients who admitted to Konya Education and Research Hospital Department of Gastroenterology with dyspeptic complaints, between January 2011-June 2013, were included in the study. Microbiological and histopathological examinations of biopsy specimens taken from antrum and corpus regions were performed. The presence of H. pylori in all the biopsy samples was investigated by five differnt dignostic methods together: culture (C) (Portagerm pylori-PORT PYL, Pylori agar-PYL, GENbox microaer, bioMerieux, France), histology (H) (Giemsa, Hematoxylin and Eosin staining), rapid urease test (RUT) (CLOtest, Cimberly-Clark, USA), and two different molecular tests; GenoType® HelicoDR, Hain, Germany, based on DNA strip assay, and Seeplex ® H. pylori -ClaR- ACE Detection, Seegene, South Korea, based on multiplex PCR. Antimicrobial resistance of H. pylori isolates against clarithromycin and levofloxacin was determined by GenoType® HelicoDR, Seeplex ® H. pylori -ClaR- ACE Detection, and gradient strip (E-test, bioMerieux, France) methods. Culture positivity alone or positivities of both histology and RUT together was accepted as the gold standard for H. pylori positivity. Sensitivity and specificity rates of two molecular methods used in the study were calculated by taking the two gold standards previously mentioned. Results: A total of 266 patients between 16-83 years old who 144 (54.1 %) were female, 122 (45.9 %) were male were included in the study. 144 patients were found as culture positive, and 157 were H and RUT were positive together. 179 patients were found as positive with GenoType® HelicoDR and Seeplex ® H. pylori -ClaR- ACE Detection together. Sensitivity and specificity rates of studied five different methods were found as follows: C were 80.9 % and 84.4 %, H + RUT were 88.2 % and 75.4 %, GenoType® HelicoDR were 100 % and 71.3 %, and Seeplex ® H. pylori -ClaR- ACE Detection were, 100 % and 71.3 %. A strong correlation was found between C and H+RUT, C and GenoType® HelicoDR, and C and Seeplex ® H. pylori -ClaR- ACE Detection (r:0.644 and p:0.000, r:0.757 and p:0.000, r:0.757 and p:0.000, respectively). Of all the isolated 144 H. pylori strains 24 (16.6 %) were detected as resistant to claritromycine, and 18 (12.5 %) were levofloxacin. Genotypic claritromycine resistance was detected only in 15 cases with GenoType® HelicoDR, and 6 cases with Seeplex ® H. pylori -ClaR- ACE Detection. Conclusion: In our study, it was concluded that; GenoType® HelicoDR and Seeplex ® H. pylori -ClaR- ACE Detection was found as the most sensitive diagnostic methods when comparing all the investigated other ones (C, H, and RUT).Keywords: Helicobacter pylori, GenoType® HelicoDR, Seeplex ® H. pylori -ClaR- ACE Detection, antimicrobial resistance
Procedia PDF Downloads 1682878 Studying in Private Muslim Schools in Australia: Implications for Identity, Religiosity, and Adjustment
Authors: Hisham Motkal Abu-Rayya, Maram Hussein Abu-Rayya
Abstract:
Education in religious private schools raises questions regarding identity, belonging and adaptation in multicultural Australia. This research project aimed at examined cultural identification styles among Australian adolescent Muslims studying in Muslim schools, adolescents’ religiosity and the interconnections between cultural identification styles, religiosity, and adaptation. Two Muslim high school samples were recruited for the purposes of this study, one from Muslim schools in metropolitan Sydney and one from Muslim schools in metropolitan Melbourne. Participants filled in a survey measuring themes of the current study. Findings revealed that the majority of Australian adolescent Muslims showed a preference for the integration identification style (55.2%); separation was less prevailing (26.9%), followed by assimilation (9.7%) and marginalisation (8.3%). Supporting evidence suggests that the styles of identification were valid representation of the participants’ identification. A series of hierarchical regression analyses revealed that while adolescents’ preference for integration of their cultural and Australian identities was advantageous for a range of their psychological and socio-cultural adaptation measures, marginalisation was consistently the worst. Further hierarchical regression analyses showed that adolescent Muslims’ religiosity was better for a range of their adaptation measures compared to their preference for an integration acculturation style. Theoretical and practical implications of these findings are discussed.Keywords: adaptation, identity, multiculturalism, religious school education
Procedia PDF Downloads 3022877 Smartphone Video Source Identification Based on Sensor Pattern Noise
Authors: Raquel Ramos López, Anissa El-Khattabi, Ana Lucila Sandoval Orozco, Luis Javier García Villalba
Abstract:
An increasing number of mobile devices with integrated cameras has meant that most digital video comes from these devices. These digital videos can be made anytime, anywhere and for different purposes. They can also be shared on the Internet in a short period of time and may sometimes contain recordings of illegal acts. The need to reliably trace the origin becomes evident when these videos are used for forensic purposes. This work proposes an algorithm to identify the brand and model of mobile device which generated the video. Its procedure is as follows: after obtaining the relevant video information, a classification algorithm based on sensor noise and Wavelet Transform performs the aforementioned identification process. We also present experimental results that support the validity of the techniques used and show promising results.Keywords: digital video, forensics analysis, key frame, mobile device, PRNU, sensor noise, source identification
Procedia PDF Downloads 4282876 Detection of Tetracycline Resistance Genes in Lactococcus garvieae Strains Isolated from Rainbow Trout
Authors: M. Raissy, M. Shahrani
Abstract:
The present study was done to evaluate the presence of tetracycline resistance genes in Lactococcus garvieae isolated from cultured rainbow trout, West Iran. The isolates were examined for antimicrobial resistance using disc diffusion method. Of the 49 strains tested, 19 were resistant to tetracycline (38.7%), 32 to enrofloxacin (65.3%), 21 to erythromycin (42.8%), 20 to chloramphenicol and trimetoprim-sulfamethoxazole (40.8%). The strains were then characterized for their genotypic resistance profiles. The results revealed that all 49 isolates contained at least one of the tetracycline resistance genes. Tet (A) was found in 89.4% of tetracycline resistant isolates and the frequency of other gene were as follow: tet (E) 42.1%, tet (B) 47.3%, tet (D) 15.7%, tet (L) 26.3%, tet (K) 52.6%, tet (G) 36.8%, tet (34) 21%, tet (S) 63.1%, tet (C) 57.8%, tet (M) 73.6%, tet (O) 42.1%. The results revealed high levels of antibiotic resistance in L. garvieae strains which is a potential danger for trout culture as well as for public health.Keywords: Lactococcus garvieae, tetracycline resistance genes, rainbow trout, antimicrobial resistance
Procedia PDF Downloads 5182875 Native Language Identification with Cross-Corpus Evaluation Using Social Media Data: ’Reddit’
Authors: Yasmeen Bassas, Sandra Kuebler, Allen Riddell
Abstract:
Native language identification is one of the growing subfields in natural language processing (NLP). The task of native language identification (NLI) is mainly concerned with predicting the native language of an author’s writing in a second language. In this paper, we investigate the performance of two types of features; content-based features vs. content independent features, when they are evaluated on a different corpus (using social media data “Reddit”). In this NLI task, the predefined models are trained on one corpus (TOEFL), and then the trained models are evaluated on different data using an external corpus (Reddit). Three classifiers are used in this task; the baseline, linear SVM, and logistic regression. Results show that content-based features are more accurate and robust than content independent ones when tested within the corpus and across corpus.Keywords: NLI, NLP, content-based features, content independent features, social media corpus, ML
Procedia PDF Downloads 1372874 Identification of Nonlinear Systems Using Radial Basis Function Neural Network
Authors: C. Pislaru, A. Shebani
Abstract:
This paper uses the radial basis function neural network (RBFNN) for system identification of nonlinear systems. Five nonlinear systems are used to examine the activity of RBFNN in system modeling of nonlinear systems; the five nonlinear systems are dual tank system, single tank system, DC motor system, and two academic models. The feed forward method is considered in this work for modelling the non-linear dynamic models, where the K-Means clustering algorithm used in this paper to select the centers of radial basis function network, because it is reliable, offers fast convergence and can handle large data sets. The least mean square method is used to adjust the weights to the output layer, and Euclidean distance method used to measure the width of the Gaussian function.Keywords: system identification, nonlinear systems, neural networks, radial basis function, K-means clustering algorithm
Procedia PDF Downloads 4692873 Improving the Efficiency of Wheat and Triticale Androgenesis: Ultrastructural and Transcriptomic Study
Authors: M. Szechynska-Hebda, M. Sobczak, E. Rozanska, J. Troczynska, Z. Banaszak, N. Hordyńska, M. Dyda, M. Wedzony
Abstract:
Chloroplasts, as essential organelles for photosynthesis, play a critical role in plant development. However, disturbances in the proper functioning of chloroplasts, in the extreme case manifesting as albinism of tissues and whole plants, are a phenomenon often occurring in conditions deviating from natural (e.g., in vitro cultures applied in breeding programs). Using whole-transcriptome analysis (RNA-Seq) together with light, fluorescent and electron microscopy, it was shown, that development of chloroplasts and formation of green or albino plants in the androgenesis process are genotype-dependent; however, they could be modulated by sub-optimal temperature treatment. The reprogramming of the microspore development from gametophytic to sporophytic, and then regeneration of green plant can be positively regulated by cold stress (4 ⁰C). A high temperature stress (32 ⁰C) can induce androgenesis, but it is a factor negatively influencing green plant regeneration (promoting albinism). A similar effect on microspores, androgenesis, and subsequent chloroplast formation, is elicited as a result of postponing the date of spike collection from spring to summer in field conditions (natural temperature rise). It is determined in both environmental or genotypic manner. The delay of the sowing date (environmental effect) or growing of late genotypes (genotypic effect) result in spike maturation at higher temperatures and significantly enhance albino plant formation in androgenesis process. Such a temperature system (4 ⁰C vs. 32 ⁰C) was used to study the chloroplast biogenesis process in wheat and triticale. It was shown, that efficiency of physiological processes differentiates microspore development during cold reprograming in genotypes susceptible and resistant to androgenesis. Moreover, a great variation in developmental stages of the microspores in one anther is observed for susceptible genotypes. Microspores that are more physiologically active under cold conditions can activate signaling pathways and processes, which provide an appropriate supply of metabolites to cell compartments. This, in turn, fully correlates with the genotype-dependent efficiency of chloroplast formation (or different types of plastid) at particular steps of androgenesis. The effect obtained after applying a high temperature stress is different. High temperature causes a significant acceleration of microspore development and less variation in developmental stages at the end of the treatment. Therefore, the developmental diversity of the microspores in one anther seems to be a critical factor for subsequent cell and chloroplast differentiation. The work was financed by Ministry of Agriculture and Rural Development within Program: 'Biological Progress in Plant Production', project no HOR.hn.802.15.2018Keywords: androgenesis, chloroplast biogenesis, temperature stress, wheat
Procedia PDF Downloads 1452872 An Improved OCR Algorithm on Appearance Recognition of Electronic Components Based on Self-adaptation of Multifont Template
Authors: Zhu-Qing Jia, Tao Lin, Tong Zhou
Abstract:
The recognition method of Optical Character Recognition has been expensively utilized, while it is rare to be employed specifically in recognition of electronic components. This paper suggests a high-effective algorithm on appearance identification of integrated circuit components based on the existing methods of character recognition, and analyze the pros and cons.Keywords: optical character recognition, fuzzy page identification, mutual correlation matrix, confidence self-adaptation
Procedia PDF Downloads 5402871 Identification of Stakeholders and Practices of Inclusive Education
Authors: Luis Javier Serrano-Tamayo
Abstract:
This paper focuses on the recent interest in the concept of inclusion from multiple areas of social sciences, but particularly from the academic studies on what do scholars mean when they refer to inclusive education. Therefore, this paper has been based on a three-year systematic review of near two hundred peer-reviewed documents in the last two decades. The results illustrate some of the use, misuse, and abuse of inclusive education as well as shed some light on the identification of the different stakeholders involved in the dynamic concept of inclusive education and their suggested practices.Keywords: inclusion, inclusive education, inclusive practices, education stakeholders
Procedia PDF Downloads 2372870 Design of Bacterial Pathogens Identification System Based on Scattering of Laser Beam Light and Classification of Binned Plots
Authors: Mubashir Hussain, Mu Lv, Xiaohan Dong, Zhiyang Li, Bin Liu, Nongyue He
Abstract:
Detection and classification of microbes have a vast range of applications in biomedical engineering especially in detection, characterization, and quantification of bacterial contaminants. For identification of pathogens, different techniques are emerging in the field of biomedical engineering. Latest technology uses light scattering, capable of identifying different pathogens without any need for biochemical processing. Bacterial Pathogens Identification System (BPIS) which uses a laser beam, passes through the sample and light scatters off. An assembly of photodetectors surrounded by the sample at different angles to detect the scattering of light. The algorithm of the system consists of two parts: (a) Library files, and (b) Comparator. Library files contain data of known species of bacterial microbes in the form of binned plots, while comparator compares data of unknown sample with library files. Using collected data of unknown bacterial species, highest voltage values stored in the form of peaks and arranged in 3D histograms to find the frequency of occurrence. Resulting data compared with library files of known bacterial species. If sample data matching with any library file of known bacterial species, sample identified as a matched microbe. An experiment performed to identify three different bacteria particles: Enterococcus faecalis, Pseudomonas aeruginosa, and Escherichia coli. By applying algorithm using library files of given samples, results were compromising. This system is potentially applicable to several biomedical areas, especially those related to cell morphology.Keywords: microbial identification, laser scattering, peak identification, binned plots classification
Procedia PDF Downloads 1492869 Tag Impersonation Attack on Ultra-lightweight Radio Frequency Identification Authentication Scheme (ESRAS)
Authors: Reham Al-Zahrani, Noura Aleisa
Abstract:
The proliferation of Radio Frequency Identification (RFID) technology has raised concerns about system security, particularly regarding tag impersonation attacks. Regarding RFID systems, an appropriate authentication protocol must resist active and passive attacks. A tag impersonation occurs when an adversary's tag is used to fool an authenticating reader into believing it is a legitimate tag. This paper analyzed the security of the efficient, secure, and practical ultra-lightweight RFID Authentication Scheme (ESRAS). Then, the paper presents a comprehensive analysis of the Efficient, Secure, and Practical Ultra-Lightweight RFID Authentication Scheme (ESRAS) in the context of radio frequency identification (RFID) systems that employed the Scyther tool to examine the protocol's security against a tag impersonation attack.Keywords: RFID, impersonation attack, authentication, ultra-lightweight protocols
Procedia PDF Downloads 652868 Evaluation Study of Easily Identification of Tactile Symbol on Body Soap Bottle
Authors: K. Doi, T. Nishimura, H. Fujimoto, Y. Hoshikawa, T. Wada
Abstract:
Japanese industrial standard (JIS) association established one JIS (JIS S 0021) regarding packaging accessible design for people with visual impairments and elderly people in 2000. Recently, tactile symbol on shampoo bottle has been known as one of package accessible design and more effectively used. However, it has been said that people with visual impairment have been not been in trouble with difficulty of identifying body soap bottle between three bottles such as body soap bottle, shampoo bottle, and conditioner bottle. Japanese low vision association asked JIS association to solve this problem. JIS association and Japan cosmetic industry association constituted one review team for solving the problem. The review team asked our research team to make a proposal regarding new tactile symbol on body soap bottle. We conducted user survey and maker survey regarding tactile symbol on body soap bottle with easily identification. Seven test tactile symbol marks were elected in our proposed tactile symbols. In this study, we evaluate easily identification of tactile symbol on body soap bottle. Six visual impaired subjects were participated in our experiment. These subjects were asked to identify body soap bottle between three bottles such as body soap bottle, shampoo bottle, and conditioner bottle. The test tactile symbol on body soap were presented in random order. The test tactile symbols were produced by use of our originally developed 3D raised equipment. From our study, test tactile symbol marks with easily identification were made a short list of our proposed tactile symbols. This knowledge will be helpful in revision of ISO 11156.Keywords: tactile symbol, easily identification, body soap, people with visual impairments
Procedia PDF Downloads 3132867 Solving Crimes through DNA Methylation Analysis
Authors: Ajay Kumar Rana
Abstract:
Predicting human behaviour, discerning monozygotic twins or left over remnant tissues/fluids of a single human source remains a big challenge in forensic science. Recent advances in the field of DNA methylations which are broadly chemical hallmarks in response to environmental factors can certainly help to identify and discriminate various single-source DNA samples collected from the crime scenes. In this review, cytosine methylation of DNA has been methodologically discussed with its broad applications in many challenging forensic issues like body fluid identification, race/ethnicity identification, monozygotic twins dilemma, addiction or behavioural prediction, age prediction, or even authenticity of the human DNA. With the advent of next-generation sequencing techniques, blooming of DNA methylation datasets and together with standard molecular protocols, the prospect of investigating and solving the above issues and extracting the exact nature of the truth for reconstructing the crime scene events would be undoubtedly helpful in defending and solving the critical crime cases.Keywords: DNA methylation, differentially methylated regions, human identification, forensics
Procedia PDF Downloads 3202866 Genetic Identification of Crop Cultivars Using Barcode System
Authors: Kesavan Markkandan, Ha Young Park, Seung-Il Yoo, Sin-Gi Park, Junhyung Park
Abstract:
For genetic identification of crop cultivars, insertions/deletions (InDel) markers have been preferred currently because they are easy to use, PCR based, co-dominant and relatively abundant. However, new InDels need to be developed for genetic studies of new varieties due to the difference of allele frequencies in InDels among the population groups. These new varieties are evolved with low levels of genetic diversity in specific genome loci with high recombination rate. In this study, we described soybean barcode system approach based on InDel makers, each of which is specific to a variation block (VB), where the genomes split by all assumed recombination sites. Firstly, VBs in crop cultivars were mined for transferability to VB-specific InDel markers. Secondly, putative InDels in the VB regions were identified for the development of barcode system by analyzing particular cultivar’s whole genome data. Thirdly, common VB-specific InDels from all cultivars were selected by gel electrophoresis, which were converted as 2D barcode types according to comparing amplicon polymorphisms in the five cultivars to the reference cultivar. Finally, the polymorphism of the selected markers was assessed with other cultivars, and the barcode system that allows a clear distinction among those cultivars is described. The same approach can be applicable for other commercial crops. Hence, VB-based genetic identification not only minimize the molecular markers but also useful for assessing cultivars and for marker-assisted breeding in other crop species.Keywords: variation block, polymorphism, InDel marker, genetic identification
Procedia PDF Downloads 3802865 Clothes Identification Using Inception ResNet V2 and MobileNet V2
Authors: Subodh Chandra Shakya, Badal Shrestha, Suni Thapa, Ashutosh Chauhan, Saugat Adhikari
Abstract:
To tackle our problem of clothes identification, we used different architectures of Convolutional Neural Networks. Among different architectures, the outcome from Inception ResNet V2 and MobileNet V2 seemed promising. On comparison of the metrices, we observed that the Inception ResNet V2 slightly outperforms MobileNet V2 for this purpose. So this paper of ours proposes the cloth identifier using Inception ResNet V2 and also contains the comparison between the outcome of ResNet V2 and MobileNet V2. The document here contains the results and findings of the research that we performed on the DeepFashion Dataset. To improve the dataset, we used different image preprocessing techniques like image shearing, image rotation, and denoising. The whole experiment was conducted with the intention of testing the efficiency of convolutional neural networks on cloth identification so that we could develop a reliable system that is good enough in identifying the clothes worn by the users. The whole system can be integrated with some kind of recommendation system.Keywords: inception ResNet, convolutional neural net, deep learning, confusion matrix, data augmentation, data preprocessing
Procedia PDF Downloads 1872864 Experimental Assessment of the Effectiveness of Judicial Instructions and of Expert Testimony in Improving Jurors’ Evaluation of Eyewitness Evidence
Authors: Alena Skalon, Jennifer L. Beaudry
Abstract:
Eyewitness misidentifications can sometimes lead to wrongful convictions of innocent people. This occurs in part because jurors tend to believe confident eyewitnesses even when the identification took place under suggestive conditions. Empirical research demonstrated that jurors are often unaware of the factors that can influence the reliability of eyewitness identification. Most common legal safeguards that are designed to educate jurors about eyewitness evidence are judicial instructions and expert testimony. To date, very few studies assessed the effectiveness of judicial instructions and most of them found that judicial instructions make jurors more skeptical of eyewitness evidence or do not have any effect on jurors’ judgments. Similar results were obtained for expert testimony. However, none of the previous studies focused on the ability of legal safeguards to improve jurors’ assessment of evidence obtained from suggestive identification procedures—this is one of the gaps addressed by this paper. Furthermore, only three studies investigated whether legal safeguards improve the ultimate accuracy of jurors’ judgments—that is, whether after listening to judicial instructions or expert testimony jurors can differentiate between accurate and inaccurate eyewitnesses. This presentation includes two studies. Both studies used genuine eyewitnesses (i.e., eyewitnesses who watched the crime) and manipulated the suggestiveness of identification procedures. The first study manipulated the presence of judicial instructions; the second study manipulated the presence of one of two types of expert testimony: a traditional, verbal expert testimony or expert testimony accompanied by visual aids. All participant watched a video-recording of an identification procedure and of an eyewitness testimony. The results indicated that neither judicial instructions nor expert testimony affected jurors’ judgments. However, consistent with the previous findings, when the identification procedure was non-suggestive, jurors believed accurate eyewitnesses more often than inaccurate eyewitnesses. When the procedure was suggestive, jurors believed accurate and inaccurate eyewitnesses at the same rate. The paper will discuss the implications of these studies and directions for future research.Keywords: expert testimony, eyewitness evidence, judicial instructions, jurors’ decision making, legal safeguards
Procedia PDF Downloads 1772863 Identification of Shark Species off The Nigerian Coast Using DNA Barcoding
Authors: O. O. Fola-Matthews, O. O. Soyinka, D. N. Bitalo
Abstract:
Nigeria is one of the major shark fishing nations in Africa, but its fisheries managers still record catch data in aggregates ‘sharks’ with no species-specific details. This is because most of the shark specimens look identical in morphology, and field identification of some closely related species is tricky. This study uses DNA barcoding as a method to identify shark species from five different landing areas off the Nigerian Coast. 100 dorsal fins were sampled in order to provide a Chondrichthyan sequence that would be matched to reference specimens in a DNA barcode databaseKeywords: BOLD, DNA barcoding, nigeria, sharks
Procedia PDF Downloads 1662862 Host Range and Taxonomy of Hairy Caterpillars (Erebidae: Lepidoptera) in Different Cropping Ecosystems
Authors: Mallikarjun Warad, C. M. Kalleshwaraswamy, P. R. Shashank
Abstract:
Studies were conducted to record the occurrence of different species of hairy caterpillar on different host plants in and around Shivamogga, Karnataka, India. Twelve genera of hairy caterpillars belonging to Arctiinae and Lymantriinae were recorded on different host plants and reared to adults in laboratory on their respective hosts. The Porthesia sp. feed on castor, Creatonotus gangis on cocoa, Perina nuda on fig, Pericalia ricini on pigeon pea, Utetheisa pulchella on sunhemp and Euproctis sp. on paddy and banana. Illustrations of immature and adults were made to associate them. Along with this, light traps were also set during the rainy season, to capture adults of hairy caterpillars. An illustrated identification key was provided for easy and accurate identification of adult of hairy caterpillars based on their morphological (male genitalial) characters. The study through a light on the existence of sexual dimorphism, polyphagous nature and diapause are the major hindrance in taxonomic identification. Hence, attempts were made to address these issues in the study.Keywords: Erebidae, hairy caterpillars, male genitalia, taxonomy
Procedia PDF Downloads 2062861 An Intelligent Text Independent Speaker Identification Using VQ-GMM Model Based Multiple Classifier System
Authors: Ben Soltane Cheima, Ittansa Yonas Kelbesa
Abstract:
Speaker Identification (SI) is the task of establishing identity of an individual based on his/her voice characteristics. The SI task is typically achieved by two-stage signal processing: training and testing. The training process calculates speaker specific feature parameters from the speech and generates speaker models accordingly. In the testing phase, speech samples from unknown speakers are compared with the models and classified. Even though performance of speaker identification systems has improved due to recent advances in speech processing techniques, there is still need of improvement. In this paper, a Closed-Set Tex-Independent Speaker Identification System (CISI) based on a Multiple Classifier System (MCS) is proposed, using Mel Frequency Cepstrum Coefficient (MFCC) as feature extraction and suitable combination of vector quantization (VQ) and Gaussian Mixture Model (GMM) together with Expectation Maximization algorithm (EM) for speaker modeling. The use of Voice Activity Detector (VAD) with a hybrid approach based on Short Time Energy (STE) and Statistical Modeling of Background Noise in the pre-processing step of the feature extraction yields a better and more robust automatic speaker identification system. Also investigation of Linde-Buzo-Gray (LBG) clustering algorithm for initialization of GMM, for estimating the underlying parameters, in the EM step improved the convergence rate and systems performance. It also uses relative index as confidence measures in case of contradiction in identification process by GMM and VQ as well. Simulation results carried out on voxforge.org speech database using MATLAB highlight the efficacy of the proposed method compared to earlier work.Keywords: feature extraction, speaker modeling, feature matching, Mel frequency cepstrum coefficient (MFCC), Gaussian mixture model (GMM), vector quantization (VQ), Linde-Buzo-Gray (LBG), expectation maximization (EM), pre-processing, voice activity detection (VAD), short time energy (STE), background noise statistical modeling, closed-set tex-independent speaker identification system (CISI)
Procedia PDF Downloads 3092860 Pupil Size: A Measure of Identification Memory in Target Present Lineups
Authors: Camilla Elphick, Graham Hole, Samuel Hutton, Graham Pike
Abstract:
Pupil size has been found to change irrespective of luminosity, suggesting that it can be used to make inferences about cognitive processes, such as cognitive load. To see whether identifying a target requires a different cognitive load to rejecting distractors, the effect of viewing a target (compared with viewing distractors) on pupil size was investigated using a sequential video lineup procedure with two lineup sessions. Forty one participants were chosen randomly via the university. Pupil sizes were recorded when viewing pre target distractors and post target distractors and compared to pupil size when viewing the target. Overall, pupil size was significantly larger when viewing the target compared with viewing distractors. In the first session, pupil size changes were significantly different between participants who identified the target (Hits) and those who did not. Specifically, the pupil size of Hits reduced significantly after viewing the target (by 26%), suggesting that cognitive load reduced following identification. The pupil sizes of Misses (who made no identification) and False Alarms (who misidentified a distractor) did not reduce, suggesting that the cognitive load remained high in participants who failed to make the correct identification. In the second session, pupil sizes were smaller overall, suggesting that cognitive load was smaller in this session, and there was no significant difference between Hits, Misses and False Alarms. Furthermore, while the frequency of Hits increased, so did False Alarms. These two findings suggest that the benefits of including a second session remain uncertain, as the second session neither provided greater accuracy nor a reliable way to measure it. It is concluded that pupil size is a measure of face recognition strength in the first session of a target present lineup procedure. However, it is still not known whether cognitive load is an adequate explanation for this, or whether cognitive engagement might describe the effect more appropriately. If cognitive load and cognitive engagement can be teased apart with further investigation, this would have positive implications for understanding eyewitness identification. Nevertheless, this research has the potential to provide a tool for improving the reliability of lineup procedures.Keywords: cognitive load, eyewitness identification, face recognition, pupillometry
Procedia PDF Downloads 4042859 Iot-Based Interactive Patient Identification and Safety Management System
Authors: Jonghoon Chun, Insung Kim, Jonghyun Lim, Gun Ro
Abstract:
We believe that it is possible to provide a solution to reduce patient safety accidents by displaying correct medical records and prescription information through interactive patient identification. Our system is based on the use of smart bands worn by patients and these bands communicate with the hybrid gateways which understand both BLE and Wifi communication protocols. Through the convergence of low-power Bluetooth (BLE) and hybrid gateway technology, which is one of short-range wireless communication technologies, we implement ‘Intelligent Patient Identification and Location Tracking System’ to prevent medical malfunction frequently occurring in medical institutions. Based on big data and IOT technology using MongoDB, smart band (BLE, NFC function) and hybrid gateway, we develop a system to enable two-way communication between medical staff and hospitalized patients as well as to store locational information of the patients in minutes. Based on the precise information provided using big data systems, such as location tracking and movement of in-hospital patients wearing smart bands, our findings include the fact that a patient-specific location tracking algorithm can more efficiently operate HIS (Hospital Information System) and other related systems. Through the system, we can always correctly identify patients using identification tags. In addition, the system automatically determines whether the patient is a scheduled for medical service by the system in use at the medical institution, and displays the appropriateness of the medical treatment and the medical information (medical record and prescription information) on the screen and voice. This work was supported in part by the Korea Technology and Information Promotion Agency for SMEs (TIPA) grant funded by the Korean Small and Medium Business Administration (No. S2410390).Keywords: BLE, hybrid gateway, patient identification, IoT, safety management, smart band
Procedia PDF Downloads 3112858 Identification of Functional T Cell Receptors Reactive to Tumor Antigens from the T Cell Repertoire of Healthy Donors
Authors: Isaac Quiros-Fernandez, Angel Cid-Arregui
Abstract:
Tumor-reactive T cell receptors (TCRs) are being subject of intense investigation since they offer great potential in adoptive cell therapies against cancer. However, the identification of tumor-specific TCRs has proven challenging, for instance, due to the limited expansion capacity of tumor-infiltrating T cells (TILs) and the extremely low frequencies of tumor-reactive T cells in the repertoire of patients and healthy donors. We have developed an approach for rapid identification and characterization of neoepitope-reactive TCRs from the T cell repertoire of healthy donors. CD8 T cells isolated from multiple donors are subjected to a first sorting step after staining with HLA multimers carrying the peptide of interest. The isolated cells are expanded for two weeks, after which a second sorting is performed using the same peptide-HLA multimers. The cells isolated in this way are then processed for single-cell sequencing of their TCR alpha and beta chains. Newly identified TCRs are cloned in appropriate expression vectors for functional analysis on Jurkat, NK92, and primary CD8 T cells and tumor cells expressing the appropriate antigen. We have identified TCRs specifically binding HLA-A2 presenting epitopes of tumor antigens, which are capable of inducing TCR-mediated cell activation and cytotoxicity in target cancer cell lines. This method allows the identification of tumor-reactive TCRs in about two to three weeks, starting from peripheral blood samples of readily available healthy donors.Keywords: cancer, TCR, tumor antigens, immunotherapy
Procedia PDF Downloads 692857 Large-Scale Electroencephalogram Biometrics through Contrastive Learning
Authors: Mostafa ‘Neo’ Mohsenvand, Mohammad Rasool Izadi, Pattie Maes
Abstract:
EEG-based biometrics (user identification) has been explored on small datasets of no more than 157 subjects. Here we show that the accuracy of modern supervised methods falls rapidly as the number of users increases to a few thousand. Moreover, supervised methods require a large amount of labeled data for training which limits their applications in real-world scenarios where acquiring data for training should not take more than a few minutes. We show that using contrastive learning for pre-training, it is possible to maintain high accuracy on a dataset of 2130 subjects while only using a fraction of labels. We compare 5 different self-supervised tasks for pre-training of the encoder where our proposed method achieves the accuracy of 96.4%, improving the baseline supervised models by 22.75% and the competing self-supervised model by 3.93%. We also study the effects of the length of the signal and the number of channels on the accuracy of the user-identification models. Our results reveal that signals from temporal and frontal channels contain more identifying features compared to other channels.Keywords: brainprint, contrastive learning, electroencephalo-gram, self-supervised learning, user identification
Procedia PDF Downloads 1562856 Identification of Individuals in Forensic Situations after Allo-Hematopoietic Stem Cell Transplantation
Authors: Anupuma Raina, Ajay Parkash
Abstract:
In forensic investigation, DNA analysis helps in the identification of a particular individual under investigation. A set of Short Tandem Repeats loci are widely used for individualization at a molecular level in forensic testing. STRs with tetrameric repeats of DNA are highly polymorphic and widely used for forensic DNA analysis. Identification of an individual became challenging for forensic examiners after Hematopoietic Stem Cell Transplantation. HSCT is a well-accepted and life-saving treatment to treat malignant and nonmalignant diseases. It involves the administration of healthy donor stem cells to replace the patient’s own unhealthy stem cells. A successful HSCT results in complete donor-derived cells in a patient’s hematopoiesis and hence have the capability to change the genetic makeup of the patient. Although an individual who has undergone HSCT and then committed a crime is a very rare situation, but not impossible. Keeping such a situation in mind, various biological samples like blood, buccal swab, and hair follicle were collected and studied after a certain interval of time after HSCT. Blood was collected from both the patient and the donor before the transplant. The DNA profile of both was analyzed using a short tandem repeat kit for autosomal chromosomes. Among all exhibits studied, only hair follicles were found to be the most suitable biological exhibit, as no donor DNA profile was observed for up to 90 days of study.Keywords: chimerism, HSCT, STRs analysis, forensic identification
Procedia PDF Downloads 652855 Post-Earthquake Damage Detection Using System Identification with a Pair of Seismic Recordings
Authors: Lotfi O. Gargab, Ruichong R. Zhang
Abstract:
A wave-based framework is presented for modeling seismic motion in multistory buildings and using measured response for system identification which can be utilized to extract important information regarding structure integrity. With one pair of building response at two locations, a generalized model response is formulated based on wave propagation features and expressed as frequency and time response functions denoted, respectively, as GFRF and GIRF. In particular, GIRF is fundamental in tracking arrival times of impulsive wave motion initiated at response level which is dependent on local model properties. Matching model and measured-structure responses can help in identifying model parameters and infer building properties. To show the effectiveness of this approach, the Millikan Library in Pasadena, California is identified with recordings of the Yorba Linda earthquake of September 3, 2002.Keywords: system identification, continuous-discrete mass modeling, damage detection, post-earthquake
Procedia PDF Downloads 3692854 Leveraging SHAP Values for Effective Feature Selection in Peptide Identification
Authors: Sharon Li, Zhonghang Xia
Abstract:
Post-database search is an essential phase in peptide identification using tandem mass spectrometry (MS/MS) to refine peptide-spectrum matches (PSMs) produced by database search engines. These engines frequently face difficulty differentiating between correct and incorrect peptide assignments. Despite advances in statistical and machine learning methods aimed at improving the accuracy of peptide identification, challenges remain in selecting critical features for these models. In this study, two machine learning models—a random forest tree and a support vector machine—were applied to three datasets to enhance PSMs. SHAP values were utilized to determine the significance of each feature within the models. The experimental results indicate that the random forest model consistently outperformed the SVM across all datasets. Further analysis of SHAP values revealed that the importance of features varies depending on the dataset, indicating that a feature's role in model predictions can differ significantly. This variability in feature selection can lead to substantial differences in model performance, with false discovery rate (FDR) differences exceeding 50% between different feature combinations. Through SHAP value analysis, the most effective feature combinations were identified, significantly enhancing model performance.Keywords: peptide identification, SHAP value, feature selection, random forest tree, support vector machine
Procedia PDF Downloads 232853 Material Parameter Identification of Modified AbdelKarim-Ohno Model
Authors: Martin Cermak, Tomas Karasek, Jaroslav Rojicek
Abstract:
The key role in phenomenological modelling of cyclic plasticity is good understanding of stress-strain behaviour of given material. There are many models describing behaviour of materials using numerous parameters and constants. Combination of individual parameters in those material models significantly determines whether observed and predicted results are in compliance. Parameter identification techniques such as random gradient, genetic algorithm, and sensitivity analysis are used for identification of parameters using numerical modelling and simulation. In this paper genetic algorithm and sensitivity analysis are used to study effect of 4 parameters of modified AbdelKarim-Ohno cyclic plasticity model. Results predicted by Finite Element (FE) simulation are compared with experimental data from biaxial ratcheting test with semi-elliptical loading path.Keywords: genetic algorithm, sensitivity analysis, inverse approach, finite element method, cyclic plasticity, ratcheting
Procedia PDF Downloads 4532852 Plant Leaf Recognition Using Deep Learning
Authors: Aadhya Kaul, Gautam Manocha, Preeti Nagrath
Abstract:
Our environment comprises of a wide variety of plants that are similar to each other and sometimes the similarity between the plants makes the identification process tedious thus increasing the workload of the botanist all over the world. Now all the botanists cannot be accessible all the time for such laborious plant identification; therefore, there is an urge for a quick classification model. Also, along with the identification of the plants, it is also necessary to classify the plant as healthy or not as for a good lifestyle, humans require good food and this food comes from healthy plants. A large number of techniques have been applied to classify the plants as healthy or diseased in order to provide the solution. This paper proposes one such method known as anomaly detection using autoencoders using a set of collections of leaves. In this method, an autoencoder model is built using Keras and then the reconstruction of the original images of the leaves is done and the threshold loss is found in order to classify the plant leaves as healthy or diseased. A dataset of plant leaves is considered to judge the reconstructed performance by convolutional autoencoders and the average accuracy obtained is 71.55% for the purpose.Keywords: convolutional autoencoder, anomaly detection, web application, FLASK
Procedia PDF Downloads 162