Search results for: human detection and identification
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 13296

Search results for: human detection and identification

10716 Health Monitoring and Failure Detection of Electronic and Structural Components in Small Unmanned Aerial Vehicles

Authors: Gopi Kandaswamy, P. Balamuralidhar

Abstract:

Fully autonomous small Unmanned Aerial Vehicles (UAVs) are increasingly being used in many commercial applications. Although a lot of research has been done to develop safe, reliable and durable UAVs, accidents due to electronic and structural failures are not uncommon and pose a huge safety risk to the UAV operators and the public. Hence there is a strong need for an automated health monitoring system for UAVs with a view to minimizing mission failures thereby increasing safety. This paper describes our approach to monitoring the electronic and structural components in a small UAV without the need for additional sensors to do the monitoring. Our system monitors data from four sources; sensors, navigation algorithms, control inputs from the operator and flight controller outputs. It then does statistical analysis on the data and applies a rule based engine to detect failures. This information can then be fed back into the UAV and a decision to continue or abort the mission can be taken automatically by the UAV and independent of the operator. Our system has been verified using data obtained from real flights over the past year from UAVs of various sizes that have been designed and deployed by us for various applications.

Keywords: fault detection, health monitoring, unmanned aerial vehicles, vibration analysis

Procedia PDF Downloads 252
10715 Application of Computer Aided Engineering Tools in Performance Prediction and Fault Detection of Mechanical Equipment of Mining Process Line

Authors: K. Jahani, J. Razavi

Abstract:

Nowadays, to decrease the number of downtimes in the industries such as metal mining, petroleum and chemical industries, predictive maintenance is crucial. In order to have efficient predictive maintenance, knowing the performance of critical equipment of production line such as pumps and hydro-cyclones under variable operating parameters, selecting best indicators of this equipment health situations, best locations for instrumentation, and also measuring of these indicators are very important. In this paper, computer aided engineering (CAE) tools are implemented to study some important elements of copper process line, namely slurry pumps and cyclone to predict the performance of these components under different working conditions. These modeling and simulations can be used in predicting, for example, the damage tolerance of the main shaft of the slurry pump or wear rate and location of cyclone wall or pump case and impeller. Also, the simulations can suggest best-measuring parameters, measuring intervals, and their locations.

Keywords: computer aided engineering, predictive maintenance, fault detection, mining process line, slurry pump, hydrocyclone

Procedia PDF Downloads 398
10714 Seroprevalence of Bovine Brucellosis and its Public Health Significance in Selected Sites of Central High Land of Ethiopia

Authors: Temesgen Kassa Getahun, Gezahegn Mamo, Beksisa Urge

Abstract:

A cross-sectional study was conducted from December 2019 to May 2020 with the aim of determining the seroprevalence of brucellosis in dairy cows and their owners in the central highland of Oromia, Ethiopia. A total of 352 blood samples from dairy cattle, 149 from animal owners, and 17 from farm workers were collected and initially screened using the Rose Bengal Plate test and confirmed by the Complement Fixation test. Overall seroprevalence was 0.6% (95% CI: 0.0016–0.0209) in bovines and 1.2% (95% CI: 0.0032–0.0427) in humans. Market-based stock replacement (OR=16.55, p=0.002), breeding by artificial insemination (OR=7.58, p=0.05), and parturition pen (OR = 11.511, p=0.027) were found to be significantly associated with the seropositivity for Brucella infection in dairy cattle. Human housing (OR=1.8, p=0.002), contact with an aborted fetus (OR=21.19, p=0.017), drinking raw milk from non-aborted (OR=24.99, p=0.012), aborted (OR=5.72, p=0.019) and retained fetal membrane (OR=4.22, p=0.029) cows had a significant influence on human brucellosis. A structured interview question was administered to 284 respondents. Accordingly, most respondents had no knowledge of brucellosis (93.3%), and in contrast, 90% of them consumed raw milk. In conclusion, the present seroprevalence study revealed that brucellosis was low among dairy cattle and exposed individuals in the study areas. However, since there were no control strategies implemented in the study areas, there is a potential risk of transmission of brucellosis in dairy cattle and the exposed human population in the study areas. Implementation of a test and slaughter strategy with compensation to farmers is recommended, while in the case of human brucellosis, continuous social training and implementing one health approach framework must be applied.

Keywords: abortion, bovine brucellosis, human brucellosis, risk factors, seroprevalence

Procedia PDF Downloads 99
10713 Economic Indicators as Correlates of Inward Foreign Direct Investment in Nigeria

Authors: C. F. Popoola, P. Osho, S. B. Babarinde

Abstract:

This study examined economic indicators as correlates of inward FDI. An exploratory research design was used to obtained annual published data on inflation rate, market size, exchange rate, political instability, human development, and infrastructure from Central Bank of Nigeria, National Bureau of Statistics, Nigerian Capital Market, Nigeria Institute of Social and Economic Research, and UNCTAD. Data generated were analyzed using Pearson correlation, analysis of variance and regression. The findings of the study revealed that market size (r = 0.852, p < 0.001), infrastructure (r = 0.264, p < 0.001), human development (r = 0.154, p < 0.01) and exchange rate ( r= 0.178, p < 0.05) correlate positively with inward FDI, while inflation rate (r = -0.88, p < 0.001), and political instability (r= -0.102, p < 0.05) correlate negatively with inward FDI. Findings also revealed that the economic indicators significantly predicted inward FDI (R2 = 0.913; F(1,19) = 29.40; p < 0.05) for Nigeria. It was concluded that exchange rate, market size, human development, and infrastructure positively related to inward FDI while the high level of inflation and political instability negatively related to inward FDI. Therefore, it was suggested that policy makers and government agencies should readdress steps and design policies that would encourage more FDI into the country.

Keywords: exchange rate, foreign direct investment, human development, inflation rate, infrastructure, market size, political instability

Procedia PDF Downloads 407
10712 Domain Adaptation Save Lives - Drowning Detection in Swimming Pool Scene Based on YOLOV8 Improved by Gaussian Poisson Generative Adversarial Network Augmentation

Authors: Simiao Ren, En Wei

Abstract:

Drowning is a significant safety issue worldwide, and a robust computer vision-based alert system can easily prevent such tragedies in swimming pools. However, due to domain shift caused by the visual gap (potentially due to lighting, indoor scene change, pool floor color etc.) between the training swimming pool and the test swimming pool, the robustness of such algorithms has been questionable. The annotation cost for labeling each new swimming pool is too expensive for mass adoption of such a technique. To address this issue, we propose a domain-aware data augmentation pipeline based on Gaussian Poisson Generative Adversarial Network (GP-GAN). Combined with YOLOv8, we demonstrate that such a domain adaptation technique can significantly improve the model performance (from 0.24 mAP to 0.82 mAP) on new test scenes. As the augmentation method only require background imagery from the new domain (no annotation needed), we believe this is a promising, practical route for preventing swimming pool drowning.

Keywords: computer vision, deep learning, YOLOv8, detection, swimming pool, drowning, domain adaptation, generative adversarial network, GAN, GP-GAN

Procedia PDF Downloads 85
10711 Design of Parity-Preserving Reversible Logic Signed Array Multipliers

Authors: Mojtaba Valinataj

Abstract:

Reversible logic as a new favorable design domain can be used for various fields especially creating quantum computers because of its speed and intangible power consumption. However, its susceptibility to a variety of environmental effects may lead to yield the incorrect results. In this paper, because of the importance of multiplication operation in various computing systems, some novel reversible logic array multipliers are proposed with error detection capability by incorporating the parity-preserving gates. The new designs are presented for two main parts of array multipliers, partial product generation and multi-operand addition, by exploiting the new arrangements of existing gates, which results in two signed parity-preserving array multipliers. The experimental results reveal that the best proposed 4×4 multiplier in this paper reaches 12%, 24%, and 26% enhancements in the number of constant inputs, number of required gates, and quantum cost, respectively, compared to previous design. Moreover, the best proposed design is generalized for n×n multipliers with general formulations to estimate the main reversible logic criteria as the functions of the multiplier size.

Keywords: array multipliers, Baugh-Wooley method, error detection, parity-preserving gates, quantum computers, reversible logic

Procedia PDF Downloads 252
10710 An Analysis of Human Resource Management Policies for Constructing Employer Brands in the Logistics Sector

Authors: Müberra Yüksel, Ömer Faruk Görçün

Abstract:

The purpose of the present study is to investigate the role of strategic human resource management (SHRM) in constructing "employer branding" in logistics. Prior research does not focus on internal stakeholders, that is, employees. Despite the fact that logistic sector has become customer-oriented, the focus is solely on service quality as the unique aspect of logistic companies for competitive advantage. With an increasing interest lately in internal marketing of the employer brand, the emphasis is on the value that human capital brings to the firm which cannot be imitated. `Employer branding` has been the application of branding and relationship marketing principles for competitive advantage in SHRM. Employer branding is an organizing framework for human resource managers since it represents an organization’s efforts to promote, both within and outside, a coherent view of what makes the firm different and desirable as an employer, i.e., the distinct “employer brand personality” and "employee value propositions" (EVP) offered. The presumption of employer branding enhanced by internal marketing is to make customer-conscious employees to handle services better by being aligned with business mission and goals. Starting from internal customers and analyzing the gaps of EVP by using analytical hierarchy process methodology (AHP) and inquiring whether these brand values are communicated and conceived well may be the initial steps in our proposal for employer branding in logistics sector. This empirical study aims to fill this research gap within the context of an emergent market- Turkey, which is located at a hub of transportation and logistics.

Keywords: Strategic Human Resource Management (SHRM), employer branding, Employee Value Propositions (EVP), Analytical Hierarchy Process (AHP), logistics

Procedia PDF Downloads 338
10709 Salt Tolerance of Potato: Genetically Engineered with Atriplex canescens BADH Gene Driven by 3 Copies of CAMV35s Promoter

Authors: Arfan Ali, Muhammad Shahzad Iqbal, Idrees Ahmad Nasir

Abstract:

Potato (Solanum tuberosum L.) is ranked among the top leading staple foods in the world. Salinity adversely affects potato crop yield and quality. Therefore, increased level of salt tolerance is a key factor to ensure high yield. The present study focused on the Agrobacterium-mediated transformation of Atriplex canescens betaine aldehyde dehydrogenase (BADH) gene, using single, double and triple CAMV35s promoter to improve salt tolerance in potato. Detection of seven potato lines harboring BADH gene, followed by identification of T-DNA insertions, determination of transgenes copies no through Southern Hybridization and quantification of BADH protein through Enzyme Linked Immunosorbent Assay were considered in this study. The results clearly depict that the salt tolerance of potato was found to be promoter-dependent, as the potato transgenic lines with triple promoter showed 4.4 times more glycine betaine production which consequently leads towards high resistance to salt stress as compared to transgenic potato lines with single and double promoters having least production of glycine betaine. Moreover, triple promoter transgenic potato lines have also shown lower levels of H2O2, malondialdehyde (MDA), relative electrical conductivity, high proline and chlorophyll content as compared other two lines having a single and double promoter. Insilco analysis also confirmed that Atriplex canescens BADH has the tendency to interact with sodium ions and water molecules. Taken together these facts it can be concluded that over-expression of BADH under triple CAMV35s promoter with more glycine betaine, chlorophyll & MDA contents, high relative quantities of other metabolites results in an enhanced level of salt tolerance in potato.

Keywords: Atriplex canescens, BADH, CAMV35s promotor, potato, Solanum tubersum

Procedia PDF Downloads 269
10708 Biochemical and Electrochemical Characterization of Glycated Albumin: Clinical Relevance in Diabetes Associated Complications

Authors: Alok Raghav, Jamal Ahmad

Abstract:

Background: Serum albumin glycation and advanced glycation end products (AGE) formation correlates in diabetes and its associated complications. Extensive modified human serum albumin is used to study the biochemical, electrochemical and functional properties in hyperglycemic environment with relevance to diabetes. We evaluate Spectroscopic, side chain modifications, amino acid analysis, biochemical and functional group properties in four glucose modified samples. Methods: A series four human serum albumin samples modified with glucose was characterized in terms of amino acid analysis, spectroscopic properties and side chain modifications. The diagnostic technique employed incorporates UV Spectroscopy, Fluorescence Spectroscopy, biochemical assays for side chain modifications, amino acid estimations. Conclusion: Glucose modified human serum albumin confers AGE formation causes biochemical and functional property that depend on the reactivity of glucose and its concentration used for in-vitro glycation. A biochemical and functional characterization of modified albumin in-vitro produced AGE product that will be useful to interpret the complications and pathophysiological significance in diabetes.

Keywords: glycation, diabetes, human serum albumin, biochemical and electrochemical characterization

Procedia PDF Downloads 369
10707 Pefloxacin as a Surrogate Marker for Ciprofloxacin Resistance in Salmonella: Study from North India

Authors: Varsha Gupta, Priya Datta, Gursimran Mohi, Jagdish Chander

Abstract:

Fluoroquinolones form the mainstay of therapy for the treatment of infections due to Salmonella enterica subsp. enterica. There is a complex interplay between several resistance mechanisms for quinolones and various fluoroquinolones discs, giving varying results, making detection and interpretation of fluoroquinolone resistance difficult. For detection of fluoroquinolone resistance in Salmonella ssp., we compared the use of pefloxacin and nalidixic acid discs as surrogate marker. Using MIC for ciprofloxacin as the gold standard, 43.5% of strains showed MIC as ≥1 μg/ml and were thus resistant to fluoroquinoloes. Based on the performance of nalidixic acid and pefloxacin discs as surrogate marker for ciprofloxacin resistance, both the discs could correctly detect all the resistant phenotypes; however, use of nalidixic acid disc showed false resistance in the majority of the sensitive phenotypes. We have also tested newer antimicrobial agents like cefixime, imipenem, tigecycline and azithromycin against Salmonella spp. Moreover, there was a comeback of susceptibility to older antimicrobials like ampicillin, chloramphenicol, and cotrimoxazole. We can also use cefixime, imipenem, tigecycline and azithromycin in the treatment of multidrug resistant S. typhi due to their high susceptibility.

Keywords: salmonella, pefloxacin, surrogate marker, chloramphenicol

Procedia PDF Downloads 979
10706 The Socio-Cultural Aspect of Food in Ceremonial Turkey

Authors: Suheyla Saritas

Abstract:

No matter who we are or where we live, our lives revolve around food, which is much more than a merely sustenance. As a part of the human culture, food carries complex significance and symbolic meanings. Turkish people attribute great value to food and its usage specifically tied to rites of passages of human life. Traditions, especially the ones practiced during rites of passages, such as birth, circumcisions, weddings and funerals, have always been accompanied by food in Turkish culture. Since food celebrates and symbolizes human progress in life in the culture, it also surrounds by aspects of belief, custom, magic, ritual and religion and has always been used in ceremonial context during such rites. Even though that context may be different depending on the religious, economic and social nuances of the various Turkish regions, like wheat, meat and bread, certain kinds of food play key roles during Turkish rites, generally upholding traditions. This paper highlights the sociocultural aspect of food in the rites of passages in the Turkish culture. The importance of this work also is how the ceremonial food represents the identity of Turkish people.

Keywords: food, culture, rites of passages, ritual and identity

Procedia PDF Downloads 417
10705 Real-Time Network Anomaly Detection Systems Based on Machine-Learning Algorithms

Authors: Zahra Ramezanpanah, Joachim Carvallo, Aurelien Rodriguez

Abstract:

This paper aims to detect anomalies in streaming data using machine learning algorithms. In this regard, we designed two separate pipelines and evaluated the effectiveness of each separately. The first pipeline, based on supervised machine learning methods, consists of two phases. In the first phase, we trained several supervised models using the UNSW-NB15 data-set. We measured the efficiency of each using different performance metrics and selected the best model for the second phase. At the beginning of the second phase, we first, using Argus Server, sniffed a local area network. Several types of attacks were simulated and then sent the sniffed data to a running algorithm at short intervals. This algorithm can display the results of each packet of received data in real-time using the trained model. The second pipeline presented in this paper is based on unsupervised algorithms, in which a Temporal Graph Network (TGN) is used to monitor a local network. The TGN is trained to predict the probability of future states of the network based on its past behavior. Our contribution in this section is introducing an indicator to identify anomalies from these predicted probabilities.

Keywords: temporal graph network, anomaly detection, cyber security, IDS

Procedia PDF Downloads 98
10704 Design and Application of NFC-Based Identity and Access Management in Cloud Services

Authors: Shin-Jer Yang, Kai-Tai Yang

Abstract:

In response to a changing world and the fast growth of the Internet, more and more enterprises are replacing web-based services with cloud-based ones. Multi-tenancy technology is becoming more important especially with Software as a Service (SaaS). This in turn leads to a greater focus on the application of Identity and Access Management (IAM). Conventional Near-Field Communication (NFC) based verification relies on a computer browser and a card reader to access an NFC tag. This type of verification does not support mobile device login and user-based access management functions. This study designs an NFC-based third-party cloud identity and access management scheme (NFC-IAM) addressing this shortcoming. Data from simulation tests analyzed with Key Performance Indicators (KPIs) suggest that the NFC-IAM not only takes less time in identity identification but also cuts time by 80% in terms of two-factor authentication and improves verification accuracy to 99.9% or better. In functional performance analyses, NFC-IAM performed better in salability and portability. The NFC-IAM App (Application Software) and back-end system to be developed and deployed in mobile device are to support IAM features and also offers users a more user-friendly experience and stronger security protection. In the future, our NFC-IAM can be employed to different environments including identification for mobile payment systems, permission management for remote equipment monitoring, among other applications.

Keywords: cloud service, multi-tenancy, NFC, IAM, mobile device

Procedia PDF Downloads 430
10703 Subjectivities of the Inhabitants and Trajectories of Family Life in Vulnerable Groups

Authors: Mora Kestelman

Abstract:

This paper analyzes various family groups of vulnerable populations as regards their family, educational, labor trajectory and sociability from a relational and historical approach based on archive research and fieldwork. Therefrom, their position and life projects are reconsidered as regards the planning and design of the habitat in which they are immersed. It concludes that a critical review of objectivity and subjectivity emphasizes the nonrational, often unconscious, forces that drive human and non-human relationships to configure identities, which, thus, permanently become constituent to the subjects.

Keywords: social psychology, urban planning, self concept, social networks, identity theory

Procedia PDF Downloads 74
10702 Proteomics Associated with Colonization of Human Enteric Pathogen on Solanum lycopersicum

Authors: Neha Bhadauria, Indu Gaur, Shilpi Shilpi, Susmita Goswami, Prabir K. Paul

Abstract:

The aerial surface of plants colonized by Human Enteric Pathogens ()has been implicated in outbreaks of enteric diseases in humans. Practice of organic farming primarily using animal dung as manure and sewage water for irrigation are the most significant source of enteric pathogens on the surface of leaves, fruits and vegetables. The present work aims to have an insight into the molecular mechanism of interaction of Human Enteric Pathogens or their metabolites with cell wall receptors in plants. Tomato plants grown under aseptic conditions at 12 hours L/D photoperiod, 25±1°C and 75% RH were inoculated individually with S. fonticola and K. pneumonia. The leaves from treated plants were sampled after 24 and 48 hours of incubation. The cell wall and cytoplasmic proteins were extracted and isocratically separated on 1D SDS-PAGE. The sampled leaves were also subjected to formaldehyde treatment prior to isolation of cytoplasmic proteins to study protein-protein interactions induced by Human Enteric Pathogens. Protein bands extracted from the gel were subjected to MALDI-TOF-TOF MS analysis. The foremost interaction of Human Enteric Pathogens on the plant surface was found to be cell wall bound receptors which possibly set ups a wave a critical protein-protein interaction in cytoplasm. The study revealed the expression and suppression of specific cytoplasmic and cell wall-bound proteins, some of them being important components of signaling pathways. The results also demonstrated HEP induced rearrangement of signaling pathways which possibly are crucial for adaptation of these pathogens to plant surface. At the end of the study, it can be concluded that controlling the over-expression or suppression of these specific proteins rearrange the signaling pathway thus reduces the outbreaks of food-borne illness.

Keywords: cytoplasmic protein, cell wall-bound protein, Human Enteric Pathogen (HEP), protein-protein interaction

Procedia PDF Downloads 273
10701 Genetic Diversity of Termite (Isoptera) Fauna of Western Ghats of India

Authors: A. S. Vidyashree, C. M. Kalleshwaraswamy, R. Asokan, H. M. Mahadevaswamy

Abstract:

Termites are very vital ecological thespians in tropical ecosystem, having been designated as “ecosystem engineers”, due to their significant role in providing soil ecosystem services. Despite their importance, our understanding of a number of their basic biological processes in termites is extremely limited. Developing a better understanding of termite biology is closely dependent upon consistent species identification. At present, identification of termites is relied on soldier castes. But for many species, soldier caste is not reported, that creates confusion in identification. The use of molecular markers may be helpful in estimating phylogenetic relatedness between the termite species and estimating genetic differentiation among local populations within each species. To understand this, termites samples were collected from various places of Western Ghats covering four states namely Karnataka, Kerala, Tamil Nadu, Maharashtra during 2013-15. Termite samples were identified based on their morphological characteristics, molecular characteristics, or both. Survey on the termite fauna in Karnataka, Kerala, Maharashtra and Tamil Nadu indicated the presence of a 16 species belongs to 4 subfamilies under two families viz., Rhinotermitidae and Termitidae. Termititidae was the dominant family which was belonging to 4 genera and four subfamilies viz., Macrotermitinae, Amitermitinae, Nasutitermitinae and Termitinae. Amitermitinae had three species namely, Microcerotermes fletcheri, M. pakistanicus and Speculitermes sinhalensis. Macrotermitinae had the highest number of species belonging two genera, namely Microtermes and Odontotermes. Microtermes genus was with only one species i.e., Microtermes obesi. The genus Odontotermes was represented by the highest number of species (07), namely, O. obesus was the dominant (41 per cent) and the most widely distributed species in Karnataka, Karala, Maharashtra and Tamil nadu followed by O. feae (19 per cent), O.assmuthi (11 per cent) and others like O. bellahunisensis O. horni O. redemanni, O. yadevi. Nasutitermitinae was represented by two genera namely Nasutitermes anamalaiensis and Trinervitermes biformis. Termitinae subfamily was represented by Labiocapritermes distortus. Rhinotermitidae was represented by single subfamily Heterotermetinae. In Heterotermetinae, two species namely Heterotermes balwanthi and H. malabaricus were recorded. Genetic relationship among termites collected from various locations of Western Ghats of India was characterized based on mitochondrial DNA sequences (12S, 16S, and COII). Sequence analysis and divergence among the species was assessed. These results suggest that the use of both molecular and morphological approaches is crucial in ensuring accurate species identification. Efforts were made to understand their evolution and to address the ambiguities in morphological taxonomy. The implication of the study in revising the taxonomy of Indian termites, their characterization and molecular comparisons between the sequences are discussed.

Keywords: isoptera, mitochondrial DNA sequences, rhinotermitidae, termitidae, Western ghats

Procedia PDF Downloads 260
10700 Census and Mapping of Oil Palms Over Satellite Dataset Using Deep Learning Model

Authors: Gholba Niranjan Dilip, Anil Kumar

Abstract:

Conduct of accurate reliable mapping of oil palm plantations and census of individual palm trees is a huge challenge. This study addresses this challenge and developed an optimized solution implemented deep learning techniques on remote sensing data. The oil palm is a very important tropical crop. To improve its productivity and land management, it is imperative to have accurate census over large areas. Since, manual census is costly and prone to approximations, a methodology for automated census using panchromatic images from Cartosat-2, SkySat and World View-3 satellites is demonstrated. It is selected two different study sites in Indonesia. The customized set of training data and ground-truth data are created for this study from Cartosat-2 images. The pre-trained model of Single Shot MultiBox Detector (SSD) Lite MobileNet V2 Convolutional Neural Network (CNN) from the TensorFlow Object Detection API is subjected to transfer learning on this customized dataset. The SSD model is able to generate the bounding boxes for each oil palm and also do the counting of palms with good accuracy on the panchromatic images. The detection yielded an F-Score of 83.16 % on seven different images. The detections are buffered and dissolved to generate polygons demarcating the boundaries of the oil palm plantations. This provided the area under the plantations and also gave maps of their location, thereby completing the automated census, with a fairly high accuracy (≈100%). The trained CNN was found competent enough to detect oil palm crowns from images obtained from multiple satellite sensors and of varying temporal vintage. It helped to estimate the increase in oil palm plantations from 2014 to 2021 in the study area. The study proved that high-resolution panchromatic satellite image can successfully be used to undertake census of oil palm plantations using CNNs.

Keywords: object detection, oil palm tree census, panchromatic images, single shot multibox detector

Procedia PDF Downloads 157
10699 The Multiple Sclerosis and the Role of Human Herpesvirus 6 in Its Progression

Authors: Sina Mahdavi

Abstract:

Background and Objective: Multiple sclerosis (MS) is an inflammatory autoimmune disease of the CNS that affects the myelination process in the central nervous system (CNS). Complex interactions of various "environmental or infectious" factors may act as triggers in autoimmunity and disease progression. The association between viral infections, especially Human Herpesvirus 6 (HHV-6), and MS is one potential cause that is not well understood. In this study, we aim to summarize the available data on HHV-6 infection in MS disease progression. Materials and Methods: For this study, the keywords "Multiple sclerosis", " Human Herpesvirus 6 ", and "central nervous system" in the databases PubMed and Google Scholar between 2017 and 2022 were searched, and 12 articles were chosen, studied, and analyzed. Results: HHV 6 tends towards TCD 4+ lymphocytes and enters the CNS due to the weakening of the blood-brain barrier due to inflammatory damage. Following the observation that the HHV-6 U24 protein has a seven amino acid sequence with myelin basic protein, which is one of the main components of the myelin sheath, it could cause a molecular mimicry mechanism followed by cross-reactivity. Reactivation of HHV-6 in the CNS can cause the release of proinflammatory cytokines, including TNF-α, leading to immune-mediated demyelination in patients with MS. Conclusion: There is a high expression of endogenous retroviruses during the course of MS, which indicates the relationship between HHV-6 and MS, and that this virus can play a role in the development of MS by creating an inflammatory state. Therefore, measures to modulate the expression of HHV-6 may be effective in reducing inflammatory processes in demyelinated areas of MS patients.

Keywords: multiple sclerosis, human herpesvirus 6, central nervous system, autoimmunity

Procedia PDF Downloads 104
10698 Integrating Deterministic and Probabilistic Safety Assessment to Decrease Risk & Energy Consumption in a Typical PWR

Authors: Ebrahim Ghanbari, Mohammad Reza Nematollahi

Abstract:

Integrating deterministic and probabilistic safety assessment (IDPSA) is one of the most commonly used issues in the field of safety analysis of power plant accident. It has also been recognized today that the role of human error in creating these accidents is not less than systemic errors, so the human interference and system errors in fault and event sequences are necessary. The integration of these analytical topics will be reflected in the frequency of core damage and also the study of the use of water resources in an accident such as the loss of all electrical power of the plant. In this regard, the SBO accident was simulated for the pressurized water reactor in the deterministic analysis issue, and by analyzing the operator's behavior in controlling the accident, the results of the combination of deterministic and probabilistic assessment were identified. The results showed that the best performance of the plant operator would reduce the risk of an accident by 10%, as well as a decrease of 6.82 liters/second of the water sources of the plant.

Keywords: IDPSA, human error, SBO, risk

Procedia PDF Downloads 123
10697 Big Data’s Mechanistic View of Human Behavior May Displace Traditional Library Missions That Empower Users

Authors: Gabriel Gomez

Abstract:

The very concept of information seeking behavior, and the means by which librarians teach users to gain information, that is information literacy, are at the heart of how libraries deliver information, but big data will forever change human interaction with information and the way such behavior is both studied and taught. Just as importantly, big data will orient the study of behavior towards commercial ends because of a tendency towards instrumentalist views of human behavior, something one might also call a trend towards behaviorism. This oral presentation seeks to explore how the impact of big data on understandings of human behavior might impact a library information science (LIS) view of human behavior and information literacy, and what this might mean for social justice aims and concomitant community action normally at the center of librarianship. The methodology employed here is a non-empirical examination of current understandings of LIS in regards to social justice alongside an examination of the benefits and dangers foreseen with the growth of big data analysis. The rise of big data within the ever-changing information environment encapsulates a shift to a more mechanistic view of human behavior, one that can easily encompass information seeking behavior and information use. As commercial aims displace the important political and ethical aims that are often central to the missions espoused by libraries and the social sciences, the very altruism and power relations found in LIS are at risk. In this oral presentation, an examination of the social justice impulses of librarians regarding power and information demonstrates how such impulses can be challenged by big data, particularly as librarians understand user behavior and promote information literacy. The creeping behaviorist impulse inherent in the emphasis big data places on specific solutions, that is answers to question that ask how, as opposed to larger questions that hint at an understanding of why people learn or use information threaten library information science ideals. Together with the commercial nature of most big data, this existential threat can harm the social justice nature of librarianship.

Keywords: big data, library information science, behaviorism, librarianship

Procedia PDF Downloads 375
10696 Design and Realization of Computer Network Security Perception Control System

Authors: El Miloudi Djelloul

Abstract:

Based on analysis on applications by perception control technology in computer network security status and security protection measures, from the angles of network physical environment and network software system environmental security, this paper provides network security system perception control solution using Internet of Things (IOT), telecom and other perception technologies. Security Perception Control System is in the computer network environment, utilizing Radio Frequency Identification (RFID) of IOT and telecom integration technology to carry out integration design for systems. In the network physical security environment, RFID temperature, humidity, gas and perception technologies are used to do surveillance on environmental data, dynamic perception technology is used for network system security environment, user-defined security parameters, security log are used for quick data analysis, extends control on I/O interface, by development of API and AT command, Computer Network Security Perception Control based on Internet and GSM/GPRS is achieved, which enables users to carry out interactive perception and control for network security environment by WEB, E-MAIL as well as PDA, mobile phone short message and Internet. In the system testing, through middle ware server, security information data perception in real time with deviation of 3-5% was achieved; it proves the feasibility of Computer Network Security Perception Control System.

Keywords: computer network, perception control system security strategy, Radio Frequency Identification (RFID)

Procedia PDF Downloads 440
10695 Comparative Study of Mutations Associated with Second Line Drug Resistance and Genetic Background of Mycobacterium tuberculosis Strains

Authors: Syed Beenish Rufai, Sarman Singh

Abstract:

Background: Performance of Genotype MTBDRsl (Hain Life science GmbH Germany) for detection of mutations associated with second-line drug resistance is well known. However, less evidence regarding the association of mutations and genetic background of strains is known which, in the future, is essential for clinical management of anti-tuberculosis drugs in those settings where the probability of particular genotype is predominant. Material and Methods: During this retrospective study, a total of 259 MDR-TB isolates obtained from pulmonary TB patients were tested for second-line drug susceptibility testing (DST) using Genotype MTBDRsl VER 1.0 and compared with BACTEC MGIT-960 as a reference standard. All isolates were further characterized using spoligotyping. The spoligo patterns obtained were compared and analyzed using SITVIT_WEB. Results: Of total 259 MDR-TB isolates which were screened for second-line DST by Genotype MTBDRsl, mutations were found to be associated with gyrA, rrs and emb genes in 82 (31.6%), 2 (0.8%) and 90 (34.7%) isolates respectively. 16 (6.1%) isolates detected mutations associated with both FQ as well as to AG/CP drugs (XDR-TB). No mutations were detected in 159 (61.4%) isolates for corresponding gyrA and rrs genes. Genotype MTBDRsl showed a concordance of 96.4% for detection of sensitive isolates in comparison with second-line DST by BACTEC MGIT-960 and 94.1%, 93.5%, 60.5% and 50% for detection of XDR-TB, FQ, EMB, and AMK/CAP respectively. D94G was the most prevalent mutation found among (38 (46.4%)) OFXR isolates (37 FQ mono-resistant and 1 XDR-TB) followed by A90V (23 (28.1%)) (17 FQ mono-resistant and 6 XDR-TB). Among AG/CP resistant isolates A1401G was the most frequent mutation observed among (11 (61.1%)) isolates (2 AG/CP mono-resistant isolates and 9 XDR-TB isolates) followed by WT+A1401G (6 (33.3%)) and G1484T (1 (5.5%)) respectively. On spoligotyping analysis, Beijing strain (46%) was found to be the most predominant strain among pre-XDR and XDR TB isolates followed by CAS (30%), X (6%), Unique (5%), EAI and T each of 4%, Manu (3%) and Ural (2%) respectively. Beijing strain was found to be strongly associated with D94G (47.3%) and A90V mutations by (47.3%) and 34.8% followed by CAS strain by (31.6%) and 30.4% respectively. However, among AG/CP resistant isolates, only Beijing strain was found to be strongly associated with A1401G and WT+A1401G mutations by 54.5% and 50% respectively. Conclusion: Beijing strain was found to be strongly associated with the most prevalent mutations among pre-XDR and XDR TB isolates. Acknowledgments: Study was supported with Grant by All India Institute of Medical Sciences, New Delhi reference No. P-2012/12452.

Keywords: tuberculosis, line probe assay, XDR TB, drug susceptibility

Procedia PDF Downloads 134
10694 Enhancing the Sensitivity of Antigen Based Sandwich ELISA for COVID-19 Diagnosis in Saliva Using Gold Conjugated Nanobodies

Authors: Manal Kamel, Sara Maher

Abstract:

Development of sensitive non-invasive tests for detection of SARS-CoV-2 antigens is imperative to manage the extent of infection throughout the population, yet, it is still challenging. Here, we designed and optimized a sandwich enzyme-linked immunosorbent assay (ELISA) for SARS-CoV-2 S1 antigen detection in saliva. Both saliva samples and nasopharyngeal swapswere collected from 170 PCR-confirmed positive and negative cases. Gold nanoparticles (AuNPs) were conjugated with S1protein receptor binding domain (RBD) nanobodies. Recombinant S1 monoclonal antibodies (S1mAb) as primery antibody and gold conjugated nanobodies as secondary antibody were employed in sandwich ELISA. Our developed system were optimized to achieve 87.5 % sensitivity and 100% specificity for saliva samples compared to 89 % and 100% for nasopharyngeal swaps, respectively. This means that saliva could be a suitable replacement for nasopharyngeal swaps No cross reaction was detected with other corona virus antigens. These results revealed that our developed ELISAcould be establishedas a new, reliable, sensitive, and non-invasive test for diagnosis of SARS-CoV-2 infection, using the easily collected saliva samples.

Keywords: COVID 19, diagnosis, ELISA, nanobodies

Procedia PDF Downloads 126
10693 Habitat-Specific Divergences in the Gene Repertoire among the Reference Prevotella Genomes of the Human Microbiome

Authors: Vinod Kumar Gupta, Narendrakumar M. Chaudhari, Suchismitha Iskepalli, Chitra Dutta

Abstract:

Background-The community composition of the human microbiome is known to vary at distinct anatomical niches. But little is known about the nature of variations if any, at the genome/sub-genome levels of a specific microbial community across different niches. The present report aims to explore, as a case study, the variations in gene repertoire of 28 Prevotella reference draft genomes derived from different body-sites of human, as reported earlier by the Human Microbiome Consortium. Results-The analysis reveals the exclusive presence of 11798, 3673, 3348 and 934 gene families and exclusive absence of 17, 221, 115 and 645 gene families in Prevotella genomes derived from the human oral cavity, gastro-intestinal tracts (GIT), urogenital tract (UGT) and skin, respectively. The pan-genome for Prevotella remains “open”. Distribution of various functional COG categories differs appreciably among the habitat-specific genes, within Prevotella pan-genome and between the GIT-derived Bacteroides and Prevotella. The skin and GIT isolates of Prevotella are enriched in singletons involved in Signal transduction mechanisms, while the UGT and oral isolates show higher representation of the Defense mechanisms category. No niche-specific variations could be observed in the distribution of KEGG pathways. Conclusion-Prevotella may have developed distinct genetic strategies for adaptation to different anatomical habitats through selective, niche-specific acquisition and elimination of suitable gene-families. In addition, individual microorganisms tend to develop their own distinctive adaptive stratagems through large repertoires of singletons. Such in situ, habitat-driven refurbishment of the genetic makeup can impart substantial intra-lineage genome diversity within the microbes without perturbing their general taxonomic heritage.

Keywords: body niche adaptation, human microbiome, pangenome, Prevotella

Procedia PDF Downloads 245
10692 Towards a Complete Automation Feature Recognition System for Sheet Metal Manufacturing

Authors: Bahaa Eltahawy, Mikko Ylihärsilä, Reino Virrankoski, Esko Petäjä

Abstract:

Sheet metal processing is automated, but the step from product models to the production machine control still requires human intervention. This may cause time consuming bottlenecks in the production process and increase the risk of human errors. In this paper we present a system, which automatically recognizes features from the CAD-model of the sheet metal product. By using these features, the system produces a complete model of the particular sheet metal product. Then the model is used as an input for the sheet metal processing machine. Currently the system is implemented, capable to recognize more than 11 of the most common sheet metal structural features, and the procedure is fully automated. This provides remarkable savings in the production time, and protects against the human errors. This paper presents the developed system architecture, applied algorithms and system software implementation and testing.

Keywords: feature recognition, automation, sheet metal manufacturing, CAD, CAM

Procedia PDF Downloads 348
10691 The Study on How Social Cues in a Scene Modulate Basic Object Recognition Proces

Authors: Shih-Yu Lo

Abstract:

Stereotypes exist in almost every society, affecting how people interact with each other. However, to our knowledge, the influence of stereotypes was rarely explored in the context of basic perceptual processes. This study aims to explore how the gender stereotype affects object recognition. Participants were presented with a series of scene pictures, followed by a target display with a man or a woman, holding a weapon or a non-weapon object. The task was to identify whether the object in the target display was a weapon or not. Although the gender of the object holder could not predict whether he or she held a weapon, and was irrelevant to the task goal, the participant nevertheless tended to identify the object as a weapon when the object holder was a man than a woman. The analysis based on the signal detection theory showed that the stereotype effect on object recognition mainly resulted from the participant’s bias to make a 'weapon' response when a man was in the scene instead of a woman in the scene. In addition, there was a trend that the participant’s sensitivity to differentiate a weapon from a non-threating object was higher when a woman was in the scene than a man was in the scene. The results of this study suggest that the irrelevant social cues implied in the visual scene can be very powerful that they can modulate the basic object recognition process.

Keywords: gender stereotype, object recognition, signal detection theory, weapon

Procedia PDF Downloads 202
10690 An Entropy Based Novel Algorithm for Internal Attack Detection in Wireless Sensor Network

Authors: Muhammad R. Ahmed, Mohammed Aseeri

Abstract:

Wireless Sensor Network (WSN) consists of low-cost and multi functional resources constrain nodes that communicate at short distances through wireless links. It is open media and underpinned by an application driven technology for information gathering and processing. It can be used for many different applications range from military implementation in the battlefield, environmental monitoring, health sector as well as emergency response of surveillance. With its nature and application scenario, security of WSN had drawn a great attention. It is known to be valuable to variety of attacks for the construction of nodes and distributed network infrastructure. In order to ensure its functionality especially in malicious environments, security mechanisms are essential. Malicious or internal attacker has gained prominence and poses the most challenging attacks to WSN. Many works have been done to secure WSN from internal attacks but most of it relay on either training data set or predefined threshold. Without a fixed security infrastructure a WSN needs to find the internal attacks is a challenge. In this paper we present an internal attack detection method based on maximum entropy model. The final experimental works showed that the proposed algorithm does work well at the designed level.

Keywords: internal attack, wireless sensor network, network security, entropy

Procedia PDF Downloads 450
10689 3D Vision Transformer for Cervical Spine Fracture Detection and Classification

Authors: Obulesh Avuku, Satwik Sunnam, Sri Charan Mohan Janthuka, Keerthi Yalamaddi

Abstract:

In the United States alone, there are over 1.5 million spine fractures per year, resulting in about 17,730 spinal cord injuries. The cervical spine is where fractures in the spine most frequently occur. The prevalence of spinal fractures in the elderly has increased, and in this population, fractures may be harder to see on imaging because of coexisting degenerative illness and osteoporosis. Nowadays, computed tomography (CT) is almost completely used instead of radiography for the imaging diagnosis of adult spine fractures (x-rays). To stop neurologic degeneration and paralysis following trauma, it is vital to trace any vertebral fractures at the earliest. Many approaches have been proposed for the classification of the cervical spine [2d models]. We are here in this paper trying to break the bounds and use the vision transformers, a State-Of-The-Art- Model in image classification, by making minimal changes possible to the architecture of ViT and making it 3D-enabled architecture and this is evaluated using a weighted multi-label logarithmic loss. We have taken this problem statement from a previously held Kaggle competition, i.e., RSNA 2022 Cervical Spine Fracture Detection.

Keywords: cervical spine, spinal fractures, osteoporosis, computed tomography, 2d-models, ViT, multi-label logarithmic loss, Kaggle, public score, private score

Procedia PDF Downloads 104
10688 Cytolethal Distending Toxins in Intestinal and Extraintestinal E. coli

Authors: Katarína Čurová, Leonard Siegfried, Radka Vargová, Marta Kmeťová, Vladimír Hrabovský

Abstract:

Introduction: Cytolethal distending toxins (CDTs) represent intracellular acting proteins which interfere with cell cycle of eukaryotic cells. They are produced by Gram-negative bacteria with afinity to mucocutaneous surfaces and could play a role in the pathogenesis of various diseases. CDTs induce DNA damage probably through DNAse activity, which causes cell cycle arrest and leads to further changes (cell distension and death, apoptosis) depending on the cell type. Five subtypes of CDT (I to V) were reported in E. coli. Methods: We examined 252 E. coli strains belonging to four different groups. Of these strains, 57 were isolated from patients with diarrhea, 65 from patients with urinary tract infections (UTI), 65 from patients with sepsis and 65 from patients with other extraintestinal infections (mostly surgical wounds, decubitus ulcers and respiratory tract infections). Identification of these strains was performed by MALDI-TOF analysis and detection of genes encoding CDTs and determination of the phylogenetic group was performed by PCR. Results: In this study, we detected presence of cdt genes in 11 of 252 E. coli strains tested (4,4 %). Four cdt positive E. coli strains were confirmed in group of UTI (6,15 %), three cdt positive E. coli strains in groups of diarrhea (5,3 %) and other extraintestinal infections (4,6 %). The lowest incidence, one cdt positive E. coli strain, was observed in group of sepsis (1,5 %). All cdt positive E. coli strains belonged to phylogenetic group B2. Conclusion: CDT-producing E. coli are isolated in a low percentage from patients with intestinal and extraintestinal infections, including sepsis and our results correspond with these studies. A weak prevalence of cdt genes suggests that CDTs are not major virulence factors but in combination with other virulence factors may increase virulence potential of E. coli. We suppose that all 11 cdt positive E. coli strains represent real pathogens because they belong to the phylogenetic group B2 which is pathogenic lineage for bacteria E. coli.

Keywords: cytolethal distending toxin, E. coli, phylogenetic group, extraintestinal infection, diarrhea

Procedia PDF Downloads 344
10687 Autogenous Diabetic Retinopathy Censor for Ophthalmologists - AKSHI

Authors: Asiri Wijesinghe, N. D. Kodikara, Damitha Sandaruwan

Abstract:

The Diabetic Retinopathy (DR) is a rapidly growing interrogation around the world which can be annotated by abortive metabolism of glucose that causes long-term infection in human retina. This is one of the preliminary reason of visual impairment and blindness of adults. Information on retinal pathological mutation can be recognized using ocular fundus images. In this research, we are mainly focused on resurrecting an automated diagnosis system to detect DR anomalies such as severity level classification of DR patient (Non-proliferative Diabetic Retinopathy approach) and vessel tortuosity measurement of untwisted vessels to assessment of vessel anomalies (Proliferative Diabetic Retinopathy approach). Severity classification method is obtained better results according to the precision, recall, F-measure and accuracy (exceeds 94%) in all formats of cross validation. In ROC (Receiver Operating Characteristic) curves also visualized the higher AUC (Area Under Curve) percentage (exceeds 95%). User level evaluation of severity capturing is obtained higher accuracy (85%) result and fairly better values for each evaluation measurements. Untwisted vessel detection for tortuosity measurement also carried out the good results with respect to the sensitivity (85%), specificity (89%) and accuracy (87%).

Keywords: fundus image, exudates, microaneurisms, hemorrhages, tortuosity, diabetic retinopathy, optic disc, fovea

Procedia PDF Downloads 337