Search results for: damage identification
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 5119

Search results for: damage identification

4789 Clothes Identification Using Inception ResNet V2 and MobileNet V2

Authors: Subodh Chandra Shakya, Badal Shrestha, Suni Thapa, Ashutosh Chauhan, Saugat Adhikari

Abstract:

To tackle our problem of clothes identification, we used different architectures of Convolutional Neural Networks. Among different architectures, the outcome from Inception ResNet V2 and MobileNet V2 seemed promising. On comparison of the metrices, we observed that the Inception ResNet V2 slightly outperforms MobileNet V2 for this purpose. So this paper of ours proposes the cloth identifier using Inception ResNet V2 and also contains the comparison between the outcome of ResNet V2 and MobileNet V2. The document here contains the results and findings of the research that we performed on the DeepFashion Dataset. To improve the dataset, we used different image preprocessing techniques like image shearing, image rotation, and denoising. The whole experiment was conducted with the intention of testing the efficiency of convolutional neural networks on cloth identification so that we could develop a reliable system that is good enough in identifying the clothes worn by the users. The whole system can be integrated with some kind of recommendation system.

Keywords: inception ResNet, convolutional neural net, deep learning, confusion matrix, data augmentation, data preprocessing

Procedia PDF Downloads 154
4788 An Experimental Study of the Influence of Flow Rate on Formation Damage at Different pH

Authors: Khabat M. Ahmad

Abstract:

This experiment focuses on the reduction of permeability (formation damage) as a result of fines migration by changing pH and flow rate on core plugs selected from sandstone reservoir of Pannonian basin (Upper Miocene, East Hungary). The main objective of coreflooding experiments was to investigate the influence of both high and low pH fluids and the flow rate on stability of clay minerals. The selected core samples were examined by X-ray powder diffraction (XRD) for bulk mineralogical and clay mineral composition. The shape, position, distribution and type of clay minerals within the core samples were diagnosed by scanning electron microscopy and energy dispersive spectroscopy (SEM- EDS). The basic petrophysical properties such as porosity and initial permeability were determined prior to experiments. The special core analysis (influence of pH and flow rate) on permeability reduction was examined through a series of laboratory coreflooding experiments, testing for acidic (3) and alkaline (11) solutions at different flow rates (50, 100 and 200 ml/h). Permeability in continuously reduced for pH 11 to more than 50 % of initial permeability. However, at pH 3 after a slow decrease, a significant increase is observed, to more than 40 % of initial permeability. The variation is also influenced by flow rate.

Keywords: flow rate, pH, permeability, fine migration, formation damage, XRD, SEM- EDS

Procedia PDF Downloads 28
4787 A Mixed 3D Finite Element for Highly Deformable Thermoviscoplastic Materials Under Ductile Damage

Authors: João Paulo Pascon

Abstract:

In this work, a mixed 3D finite element formulation is proposed in order to analyze thermoviscoplastic materials under large strain levels and ductile damage. To this end, a tetrahedral element of linear order is employed, considering a thermoviscoplastic constitutive law together with the neo-Hookean hyperelastic relationship and a nonlocal Gurson`s porous plasticity theory The material model is capable of reproducing finite deformations, elastoplastic behavior, void growth, nucleation and coalescence, thermal effects such as plastic work heating and conductivity, strain hardening and strain-rate dependence. The nonlocal character is introduced by means of a nonlocal parameter applied to the Laplacian of the porosity field. The element degrees of freedom are the nodal values of the deformed position, the temperature and the nonlocal porosity field. The internal variables are updated at the Gauss points according to the yield criterion and the evolution laws, including the yield stress of matrix, the equivalent plastic strain, the local porosity and the plastic components of the Cauchy-Green stretch tensor. Two problems involving 3D specimens and ductile damage are numerically analyzed with the developed computational code: the necking problem and a notched sample. The effect of the nonlocal parameter and the mesh refinement is investigated in detail. Results indicate the need of a proper nonlocal parameter. In addition, the numerical formulation can predict ductile fracture, based on the evolution of the fully damaged zone.

Keywords: mixed finite element, large strains, ductile damage, thermoviscoplasticity

Procedia PDF Downloads 56
4786 Development of Hit Marks on Clothes Using Amino Acid Reagents

Authors: Hyo-Su Lim, Ye-Eun Song, Eun-Bi Lee, Sang-Yoon Lee, Young-Il Seo, Jin-Pyo Kim, Nam-Kyu Park

Abstract:

If we analogize any physical external force given to victims in many crimes including violence, it would be possible not only to presume mutual action between victims and suspects, but to make a deduction of more various facts in cases. Therefore, the aim of this study is to identify criminal tools through secretion on clothes by using amino acid reagents such as Ninhydrin, DFO(1,8-dizafluoren-9-one), 1,2 – IND (1,2-indanedione) which are reacting to skin secretion. For more effective collecting condition, porcine skin which is physiologically similar to human was used. Although there were little differences of shape identification according to sensitivity, amino acid reagents were able to identify the fist, foot, and baseball bat. Furthermore, we conducted the experiments for developmental variations through change over time setting up 5-weeks period including first damage as variation factor, and developing materials in each action through certain reagents. Specimen level of development depending on change over time was identified. As a result, each of initial level of development was seen no changes.

Keywords: hit marks, amino acid reagents, porcine skin, criminal tool

Procedia PDF Downloads 236
4785 Antibacterial Activity of Endophytic Bacteria against Multidrug-Resistant Bacteria: Isolation, Characterization, and Antibacterial Activity

Authors: Maryam Beiranvand, Sajad Yaghoubi

Abstract:

Background: Some microbes can colonize plants’ inner tissues without causing obvious damage and can even produce useful bioactive substances. In the present study, the diversity of the endophytic bacteria associated with medicinal plants from Iran was investigated by culturing techniques, molecular gene identification, as well as measuring them for antibacterial activity. Results: In the spring season from 2013 to 2014, 35 herb pharmacology samples were collected, sterilized, meshed, and then cultured on selective media culture. A total of 199 endophytic bacteria were successfully isolated from 35 tissue cultures of medical plants, and sixty-seven out of 199 bacterial isolates were subjected to identification by the 16S rRNA gene sequence analysis method. Based on the sequence similarity gene and phylogenetic analyses, these isolates were grouped into five classes, fourteen orders, seventeen families, twenty-one genera, and forty strains. The most abundant group of endophytic bacteria was actinobacterial, consisting of thirty-two (47%) out of 67 bacterial isolates. Ten (22.3%) out of 67 bacterial isolates remained unidentified and classified at the genus level. The signature of the 16S rRNA gene formed a distinct line in a phylogenetic tree showing that they might be new species of bacteria. One (5.2%) out of 67 bacterial isolates was still not well categorized. Forty-two out of 67 strains were candidates for antimicrobial activity tests. Nineteen (45%) out of 42 strains showed antimicrobial activity multidrug resistance (MDR); thirteen (68%) out of 19 strains were allocated to classes actinobacteria. Four (21%) out of 19 strains belonged to the Bacillaceae family, one (5.2%) out of 19 strains was the Paenibacillaceae family, and one (5.2%) out of 19 strains belonged to the Pseudomonadaceae family. The other twenty-three strains did not show inhibitory activities. Conclusions: Our research showed a high-level phylogenetic diversity and the intoxicating antibiotic activity of endophytic bacteria in the herb pharmacology of Iran.

Keywords: Antibacterial activity, endophytic bacteria, multidrug-resistant bacteria, whole genom sequencing

Procedia PDF Downloads 60
4784 Therapeutic Effects of Toll Like Receptor 9 Ligand CpG-ODN on Radiation Injury

Authors: Jianming Cai

Abstract:

Exposure to ionizing radiation causes severe damage to human body and an safe and effective radioprotector is urgently required for alleviating radiation damage. In 2008, flagellin, an agonist of TLR5, was found to exert radioprotective effects on radiation injury through activating NF-kB signaling pathway. From then, the radioprotective effects of TLR ligands has shed new lights on radiation protection. CpG-ODN is an unmethylated oligonucleotide which activates TLR9 signaling pathway. In this study, we demonstrated that CpG-ODN has therapeutic effects on radiation injuries induced by γ ray and 12C6+ heavy ion particles. Our data showed that CpG-ODN increased the survival rate of mice after whole body irradiation and increased the number of leukocytes as well as the bone marrow cells. CpG-ODN also alleviated radiation damage on intestinal crypt through regulating apoptosis signaling pathway including bcl2, bax, and caspase 3 etc. By using a radiation-induced pulmonary fibrosis model, we found that CpG-ODN could alleviate structural damage, within 20 week after whole–thorax 15Gy irradiation. In this model, Th1/Th2 imbalance induced by irradiation was also reversed by CpG-ODN. We also found that TGFβ-Smad signaling pathway was regulated by CpG-ODN, which accounts for the therapeutic effects of CpG-ODN in radiation-induced pulmonary injury. On another hand, for high LET radiation protection, we investigated protective effects of CpG-ODN against 12C6+ heavy ion irradiation and found that after CpG-ODN treatment, the apoptosis and cell cycle arrest induced by 12C6+ irradiation was reduced. CpG-ODN also reduced the expression of Bax and caspase 3, while increased the level of bcl2. Then we detected the effect of CpG-ODN on heavy ion induced immune dysfunction. Our data showed that CpG-ODN increased the survival rate of mice and also the leukocytes after 12C6+ irradiation. Besides, the structural damage of immune organ such as thymus and spleen was also alleviated by CpG-ODN treatment. In conclusion, we found that TLR9 ligand, CpG-ODN reduced radiation injuries in response to γ ray and 12C6+ heavy ion irradiation. On one hand, CpG-ODN inhibited the activation of apoptosis induced by radiation through regulating bcl2, bax and caspase 3. On another hand, through activating TLR9, CpG-ODN recruit MyD88-IRAK-TRAF6 complex, activating TAK1, IRF5 and NF-kB pathway, and thus alleviates radiation damage. This study provides novel insights into protection and therapy of radiation damages.

Keywords: TLR9, CpG-ODN, radiation injury, high LET radiation

Procedia PDF Downloads 459
4783 Experimental Assessment of the Effectiveness of Judicial Instructions and of Expert Testimony in Improving Jurors’ Evaluation of Eyewitness Evidence

Authors: Alena Skalon, Jennifer L. Beaudry

Abstract:

Eyewitness misidentifications can sometimes lead to wrongful convictions of innocent people. This occurs in part because jurors tend to believe confident eyewitnesses even when the identification took place under suggestive conditions. Empirical research demonstrated that jurors are often unaware of the factors that can influence the reliability of eyewitness identification. Most common legal safeguards that are designed to educate jurors about eyewitness evidence are judicial instructions and expert testimony. To date, very few studies assessed the effectiveness of judicial instructions and most of them found that judicial instructions make jurors more skeptical of eyewitness evidence or do not have any effect on jurors’ judgments. Similar results were obtained for expert testimony. However, none of the previous studies focused on the ability of legal safeguards to improve jurors’ assessment of evidence obtained from suggestive identification procedures—this is one of the gaps addressed by this paper. Furthermore, only three studies investigated whether legal safeguards improve the ultimate accuracy of jurors’ judgments—that is, whether after listening to judicial instructions or expert testimony jurors can differentiate between accurate and inaccurate eyewitnesses. This presentation includes two studies. Both studies used genuine eyewitnesses (i.e., eyewitnesses who watched the crime) and manipulated the suggestiveness of identification procedures. The first study manipulated the presence of judicial instructions; the second study manipulated the presence of one of two types of expert testimony: a traditional, verbal expert testimony or expert testimony accompanied by visual aids. All participant watched a video-recording of an identification procedure and of an eyewitness testimony. The results indicated that neither judicial instructions nor expert testimony affected jurors’ judgments. However, consistent with the previous findings, when the identification procedure was non-suggestive, jurors believed accurate eyewitnesses more often than inaccurate eyewitnesses. When the procedure was suggestive, jurors believed accurate and inaccurate eyewitnesses at the same rate. The paper will discuss the implications of these studies and directions for future research.

Keywords: expert testimony, eyewitness evidence, judicial instructions, jurors’ decision making, legal safeguards

Procedia PDF Downloads 151
4782 Isolation, Characterization, and Antibacterial Activity of Endophytic Bacteria from Iranian Medicinal Plants

Authors: Maryam Beiranvand, Sajad Yaghoubi

Abstract:

Background: Some microbes can colonize plants’ inner tissues without causing obvious damage and can even produce useful bioactive substances. In the present study, the diversity of the endophytic bacteria associated with medicinal plants from Iran was investigated by culturing techniques, molecular gene identification, as well as measuring them for antibacterial activity. Results: In the spring season from 2013 to 2014, 35 herb pharmacology samples were collected, sterilized, meshed, and then cultured on selective media culture. A total of 199 endophytic bacteria were successfully isolated from 35 tissue cultures of medical plants, and sixty-seven out of 199 bacterial isolates were subjected to identification by the 16S rRNA gene sequence analysis method. Based on the sequence similarity gene and phylogenetic analyses, these isolates were grouped into five classes, fourteen orders, seventeen families, twenty-one genera, and forty strains. The most abundant group of endophytic bacteria was actinobacterial, consisting of thirty-two (47%) out of 67 bacterial isolates. Ten (22.3%) out of 67 bacterial isolates remained unidentified and classified at the genus level. The signature of the 16S rRNA gene formed a distinct line in a phylogenetic tree showing that they might be new species of bacteria. One (5.2%) out of 67 bacterial isolates was still not well categorized. Forty-two out of 67 strains were candidates for antimicrobial activity tests. Nineteen (45%) out of 42 strains showed antimicrobial activity multidrug-resistance (MDR); thirteen (68%) out of 19 strains were allocated to classes actinobacteria. Four (21%) out of 19 strains belonged to the Bacillaceae family, one (5.2%) out of 19 strains was the Paenibacillaceae family, and one (5.2%) out of 19 strains belonged to the Pseudomonadaceae family. The other twenty-three strains did not show inhibitory activities. Conclusions: Our research showed a high-level phylogenetic diversity and the intoxicating antibiotic activity of endophytic bacteria in the herb pharmacology of Iran.

Keywords: medical plant, endophytic bacteria, antimicrobial activity, whole genome sequencing analysis

Procedia PDF Downloads 88
4781 Effective Removal of Tetrodotoxin with Fiber Mat Containing Activated Charcoal

Authors: Min Sik Kim, Hwa Sung Shin

Abstract:

From 2013, small eel farms, which are located in Han River Estuary, South Korea suffer damage because of unknown massive perish. In the middle of discussion that the cause of perish could be environmental changes or waste water, a large amount of unknown nemertean was discovered during that time. Some nemerteans are known releasing neurotoxin substance. In this study, we isolated intestinal bacteria using selective media and conducted 16s rDNA microbial identification by gene alignment. As a result, there was a type of bacteria producing TTX, blocks sodium-channel inducing organism’s death. TTX production from the bacteria was confirmed by ELISA and liquid chromatography coupled with mass spectrometer. Additionally, the activated-charcoal which has an ability to absorb small molecules like toxin was applied to fibrous mesh to prevent ingestion of aquatic organisms and increase applicable area. The viability of zebrafish in the water with TTX and charcoal fiber mat were not decreased meaning it could be used for solving the perishing problem in fish farm.

Keywords: nemertean, TTX, fiber mat, activated charcoal, zebrafish

Procedia PDF Downloads 179
4780 Identification of Shark Species off The Nigerian Coast Using DNA Barcoding

Authors: O. O. Fola-Matthews, O. O. Soyinka, D. N. Bitalo

Abstract:

Nigeria is one of the major shark fishing nations in Africa, but its fisheries managers still record catch data in aggregates ‘sharks’ with no species-specific details. This is because most of the shark specimens look identical in morphology, and field identification of some closely related species is tricky. This study uses DNA barcoding as a method to identify shark species from five different landing areas off the Nigerian Coast. 100 dorsal fins were sampled in order to provide a Chondrichthyan sequence that would be matched to reference specimens in a DNA barcode database

Keywords: BOLD, DNA barcoding, nigeria, sharks

Procedia PDF Downloads 137
4779 Host Range and Taxonomy of Hairy Caterpillars (Erebidae: Lepidoptera) in Different Cropping Ecosystems

Authors: Mallikarjun Warad, C. M. Kalleshwaraswamy, P. R. Shashank

Abstract:

Studies were conducted to record the occurrence of different species of hairy caterpillar on different host plants in and around Shivamogga, Karnataka, India. Twelve genera of hairy caterpillars belonging to Arctiinae and Lymantriinae were recorded on different host plants and reared to adults in laboratory on their respective hosts. The Porthesia sp. feed on castor, Creatonotus gangis on cocoa, Perina nuda on fig, Pericalia ricini on pigeon pea, Utetheisa pulchella on sunhemp and Euproctis sp. on paddy and banana. Illustrations of immature and adults were made to associate them. Along with this, light traps were also set during the rainy season, to capture adults of hairy caterpillars. An illustrated identification key was provided for easy and accurate identification of adult of hairy caterpillars based on their morphological (male genitalial) characters. The study through a light on the existence of sexual dimorphism, polyphagous nature and diapause are the major hindrance in taxonomic identification. Hence, attempts were made to address these issues in the study.

Keywords: Erebidae, hairy caterpillars, male genitalia, taxonomy

Procedia PDF Downloads 169
4778 Determination of the Effectiveness of Some Methods Used in Greater Wax Moth (Galleria mellonella L.) in Honeycombs

Authors: Neslihan Ozsoy Taskiran, Miray Dayioglu, Belgin Gunbey, Banu Yucel, Cigdem Takma, Unal Karik, Tugce Olgun, Levent Aydin

Abstract:

A greater wax moth (Galleria mellonella L.), which is one of the most important pests after Varroa, plays a role in the transportation of many pathogens into the hive as well as damage to the honeycombs, and beekeepers suffer economically. Due to the risk that some of the methods against this pest may cause residue in bee products, and it can be harmful to the health of people who consume these products. Therefore, the most appropriate, most economical, and effective method should be applied in the moth control. For this purpose, in the first phase of the project (2017-2018), planned to be 2-stage in the Aegean Agricultural Research Institute in 2017-2020, the honeycombs, certified with good agricultural practice, were kept in a favorable condition for moths. Later, applications (Sulfur - B401 - Walnut (Leaf & Smoker) - lavender essential oil (1cc & 2cc & 3cc & 4cc) - laurel essential oil (1cc & 2cc & 3cc & 4cc) - control) were applied to the honeycombs with moths. In 2017, the B401 group had the highest wax moth damage area, and the group with the lowest wax moth damage area was determined as lavender 1cc; In 2018, the highest wax moth damage area was found in the walnut smoker group, while the lowest wax moth damage area was found in sulfur, walnut leaves, laurel 1cc - 2cc - 4cc, lavender 1cc - 2cc - 3cc - 4cc and control groups. In addition, sulfur residue amount (mean 128,18 mg/kg) in honeycomb was measured in the sulfur-treated group. Phase 1 of the project was completed, and the most important sub-groups among walnut (leaf) - lavender (1cc) and laurel (4cc) groups were identified. Accordingly, it is planned to carry out these treatments ((sulfur - B401 - walnut (leaf) - lavender (1cc) and laurel (4cc)) on honeycombs with do not contain moths, and later, it is planned to examine the effects of the treatment on the offspring area and honey yield by giving these honeycombs to the hives, in the 2nd stage of the project (2019-2020).

Keywords: honey bee, lavender essential oil, laurel essential oil, walnut, wax moth

Procedia PDF Downloads 144
4777 Fault Tree Analysis and Bayesian Network for Fire and Explosion of Crude Oil Tanks: Case Study

Authors: B. Zerouali, M. Kara, B. Hamaidi, H. Mahdjoub, S. Rouabhia

Abstract:

In this paper, a safety analysis for crude oil tanks to prevent undesirable events that may cause catastrophic accidents. The estimation of the probability of damage to industrial systems is carried out through a series of steps, and in accordance with a specific methodology. In this context, this work involves developing an assessment tool and risk analysis at the level of crude oil tanks system, based primarily on identification of various potential causes of crude oil tanks fire and explosion by the use of Fault Tree Analysis (FTA), then improved risk modelling by Bayesian Networks (BNs). Bayesian approach in the evaluation of failure and quantification of risks is a dynamic analysis approach. For this reason, have been selected as an analytical tool in this study. Research concludes that the Bayesian networks have a distinct and effective method in the safety analysis because of the flexibility of its structure; it is suitable for a wide variety of accident scenarios.

Keywords: bayesian networks, crude oil tank, fault tree, prediction, safety

Procedia PDF Downloads 633
4776 Component Level Flood Vulnerability Framework for the United Kingdom

Authors: Mohammad Shoraka, Francesco Preti, Karen Angeles, Raulina Wojtkiewicz, Karthik Ramanathan

Abstract:

Catastrophe modeling has evolved significantly over the last four decades. Verisk introduced its pioneering comprehensive inland flood model tailored for the U.K. in 2008. Over the course of the last 15 years, Verisk has built a suite of physically driven flood models for several countries and regions across the globe. This paper aims to spotlight a selection of these advancements tailored to the development of vulnerability estimation, which forms an integral part of a forthcoming update to Verisk’s U.K. inland flood model. Vulnerability functions are critical to evaluating and robust modeling flood-induced damage to buildings and contents. The subsequent damage assessments then allow for direct quantification of losses for entire building portfolios. Notably, today’s flood loss models more often prioritize enhanced development of hazard characterization, while vulnerability functions often lack sufficient granularity for a robust assessment. This study proposes a novel, engineering-driven, physically based component-level flood vulnerability framework for the U.K. Various aspects of the framework, including component classification and comprehensive cost analysis, meticulously tailored to capture the distinct building characteristics unique to the U.K., will be discussed. This analysis will elucidate how the cost distribution across individual components contributes to translating component-level damage functions into building-level damage functions. Furthermore, a succinct overview of essential datasets employed to gauge building regional vulnerability will be highlighted.

Keywords: catastrophe modeling, inland flood, vulnerability, cost analysis

Procedia PDF Downloads 39
4775 An Intelligent Text Independent Speaker Identification Using VQ-GMM Model Based Multiple Classifier System

Authors: Ben Soltane Cheima, Ittansa Yonas Kelbesa

Abstract:

Speaker Identification (SI) is the task of establishing identity of an individual based on his/her voice characteristics. The SI task is typically achieved by two-stage signal processing: training and testing. The training process calculates speaker specific feature parameters from the speech and generates speaker models accordingly. In the testing phase, speech samples from unknown speakers are compared with the models and classified. Even though performance of speaker identification systems has improved due to recent advances in speech processing techniques, there is still need of improvement. In this paper, a Closed-Set Tex-Independent Speaker Identification System (CISI) based on a Multiple Classifier System (MCS) is proposed, using Mel Frequency Cepstrum Coefficient (MFCC) as feature extraction and suitable combination of vector quantization (VQ) and Gaussian Mixture Model (GMM) together with Expectation Maximization algorithm (EM) for speaker modeling. The use of Voice Activity Detector (VAD) with a hybrid approach based on Short Time Energy (STE) and Statistical Modeling of Background Noise in the pre-processing step of the feature extraction yields a better and more robust automatic speaker identification system. Also investigation of Linde-Buzo-Gray (LBG) clustering algorithm for initialization of GMM, for estimating the underlying parameters, in the EM step improved the convergence rate and systems performance. It also uses relative index as confidence measures in case of contradiction in identification process by GMM and VQ as well. Simulation results carried out on voxforge.org speech database using MATLAB highlight the efficacy of the proposed method compared to earlier work.

Keywords: feature extraction, speaker modeling, feature matching, Mel frequency cepstrum coefficient (MFCC), Gaussian mixture model (GMM), vector quantization (VQ), Linde-Buzo-Gray (LBG), expectation maximization (EM), pre-processing, voice activity detection (VAD), short time energy (STE), background noise statistical modeling, closed-set tex-independent speaker identification system (CISI)

Procedia PDF Downloads 281
4774 Design and Development of an Application for the Evaluation of Personal Injury and Disability in Occupational and Forensic Medicine

Authors: Daniel Suárez, Jesús Tomas, Sandra Sendra, Sandra Viciano-Tudela, Luis Felipe Calle, Javier Urios, Jaime Lloret

Abstract:

Our study is to develop a tool for the mobile phone to an assessment of body damage or determination of the degree of disability. This is a field of action of legal medicine and insurance with obvious economic implications. Those people who have suffered an accident or bodily harm demand a quantification of it. The assessment of bodily harm or disability by the expert medical professional is not exempt from complexity. Sometimes it is difficult to quantify pain; other times, the doctor faces simulators or exaggerators, and on many occasions, it is difficult to remember the extensive tables of scales whose details are complex to remember and apply. We present a tool, as a mobile application, that allows entering the sociodemographic date of the patient as well as the characteristics of the accident suffered by the person. With these preliminary data and introducing bodily damage, an approximate calculation of the compensation that the injured party should receive can be made. One of the results of this study is that it allows calculating joint mobility angles without the need to use a goniometer.

Keywords: mobile tool, body damage, personal injury and disability, telemedicine

Procedia PDF Downloads 56
4773 Pupil Size: A Measure of Identification Memory in Target Present Lineups

Authors: Camilla Elphick, Graham Hole, Samuel Hutton, Graham Pike

Abstract:

Pupil size has been found to change irrespective of luminosity, suggesting that it can be used to make inferences about cognitive processes, such as cognitive load. To see whether identifying a target requires a different cognitive load to rejecting distractors, the effect of viewing a target (compared with viewing distractors) on pupil size was investigated using a sequential video lineup procedure with two lineup sessions. Forty one participants were chosen randomly via the university. Pupil sizes were recorded when viewing pre target distractors and post target distractors and compared to pupil size when viewing the target. Overall, pupil size was significantly larger when viewing the target compared with viewing distractors. In the first session, pupil size changes were significantly different between participants who identified the target (Hits) and those who did not. Specifically, the pupil size of Hits reduced significantly after viewing the target (by 26%), suggesting that cognitive load reduced following identification. The pupil sizes of Misses (who made no identification) and False Alarms (who misidentified a distractor) did not reduce, suggesting that the cognitive load remained high in participants who failed to make the correct identification. In the second session, pupil sizes were smaller overall, suggesting that cognitive load was smaller in this session, and there was no significant difference between Hits, Misses and False Alarms. Furthermore, while the frequency of Hits increased, so did False Alarms. These two findings suggest that the benefits of including a second session remain uncertain, as the second session neither provided greater accuracy nor a reliable way to measure it. It is concluded that pupil size is a measure of face recognition strength in the first session of a target present lineup procedure. However, it is still not known whether cognitive load is an adequate explanation for this, or whether cognitive engagement might describe the effect more appropriately. If cognitive load and cognitive engagement can be teased apart with further investigation, this would have positive implications for understanding eyewitness identification. Nevertheless, this research has the potential to provide a tool for improving the reliability of lineup procedures.

Keywords: cognitive load, eyewitness identification, face recognition, pupillometry

Procedia PDF Downloads 378
4772 In vitro Cytotoxic and Genotoxic Effects of Arsenic Trioxide on Human Keratinocytes

Authors: H. Bouaziz, M. Sefi, J. de Lapuente, M. Borras, N. Zeghal

Abstract:

Although arsenic trioxide has been the subject of toxicological research, in vitro cytotoxicity and genotoxicity studies using relevant cell models and uniform methodology are not well elucidated. Hence, the aim of the present study was to evaluate the cytotoxicity and genotoxicity induced by arsenic trioxide in human keratinocytes (HaCaT) using the MTT [3-(4, 5-dimethylthiazol-2-yl)-2,5-diphenyltetrazolium bromide] and alkaline single cell gel electrophoresis (Comet) assays, respectively. Human keratinocytes were treated with different doses of arsenic trioxide for 4 h prior to cytogenetic assessment. Data obtained from the MTT assay indicated that arsenic trioxide significantly reduced the viability of HaCaT cells in a dose-dependent manner, showing a IC50 value of 34.18 ± 0.6 µM. Data generated from the comet assay also indicated a significant dose-dependent increase in DNA damage in HaCaT cells associated with arsenic trioxide exposure. We observed a significant increase in comet tail length and tail moment, showing an evidence of arsenic trioxide -induced genotoxic damage in HaCaT cells. This study confirms that the comet assay is a sensitive and effective method to detect DNA damage caused by arsenic.

Keywords: arsenic trioxide, cytotoxixity, genotoxicity, HaCaT

Procedia PDF Downloads 227
4771 Predicting Oil Spills in Real-Time: A Machine Learning and AIS Data-Driven Approach

Authors: Tanmay Bisen, Aastha Shayla, Susham Biswas

Abstract:

Oil spills from tankers can cause significant harm to the environment and local communities, as well as have economic consequences. Early predictions of oil spills can help to minimize these impacts. Our proposed system uses machine learning and neural networks to predict potential oil spills by monitoring data from ship Automatic Identification Systems (AIS). The model analyzes ship movements, speeds, and changes in direction to identify patterns that deviate from the norm and could indicate a potential spill. Our approach not only identifies anomalies but also predicts spills before they occur, providing early detection and mitigation measures. This can prevent or minimize damage to the reputation of the company responsible and the country where the spill takes place. The model's performance on the MV Wakashio oil spill provides insight into its ability to detect and respond to real-world oil spills, highlighting areas for improvement and further research.

Keywords: Anomaly Detection, Oil Spill Prediction, Machine Learning, Image Processing, Graph Neural Network (GNN)

Procedia PDF Downloads 46
4770 Iot-Based Interactive Patient Identification and Safety Management System

Authors: Jonghoon Chun, Insung Kim, Jonghyun Lim, Gun Ro

Abstract:

We believe that it is possible to provide a solution to reduce patient safety accidents by displaying correct medical records and prescription information through interactive patient identification. Our system is based on the use of smart bands worn by patients and these bands communicate with the hybrid gateways which understand both BLE and Wifi communication protocols. Through the convergence of low-power Bluetooth (BLE) and hybrid gateway technology, which is one of short-range wireless communication technologies, we implement ‘Intelligent Patient Identification and Location Tracking System’ to prevent medical malfunction frequently occurring in medical institutions. Based on big data and IOT technology using MongoDB, smart band (BLE, NFC function) and hybrid gateway, we develop a system to enable two-way communication between medical staff and hospitalized patients as well as to store locational information of the patients in minutes. Based on the precise information provided using big data systems, such as location tracking and movement of in-hospital patients wearing smart bands, our findings include the fact that a patient-specific location tracking algorithm can more efficiently operate HIS (Hospital Information System) and other related systems. Through the system, we can always correctly identify patients using identification tags. In addition, the system automatically determines whether the patient is a scheduled for medical service by the system in use at the medical institution, and displays the appropriateness of the medical treatment and the medical information (medical record and prescription information) on the screen and voice. This work was supported in part by the Korea Technology and Information Promotion Agency for SMEs (TIPA) grant funded by the Korean Small and Medium Business Administration (No. S2410390).

Keywords: BLE, hybrid gateway, patient identification, IoT, safety management, smart band

Procedia PDF Downloads 283
4769 The Development of the Prototype of Bamboo Shading Device

Authors: Nuanwan Tuaycharoen, Wanarat Konisranukul

Abstract:

The main aim of this research was to investigate the prototype of bamboo shading device. There were two objectives of this study. The first objective was to investigate the effect of non-chemical treatments on damage of bamboo shading device by powder-post beetle and fungi. The second aim of this study was to develop a prototype of bamboo shading device. The study of the effect of non-chemical treatments on damage of bamboo shading device by powder-post beetle in laboratory showed that, among seven treatments tested, wood vinegar treatment can protect powder-post beetle better than the original method up to 92.91%. It was also found that wood vinegar treatment can show the best performance in fungi protection and work better than the original method up to 40%. The second experiment was carried out by constructing four bamboo shading devices and installing them on a building for 28 days. All aspects of shading device were investigated in terms of their beauty, durability, and ease of construction and assembly. The final prototype was developed from the lessons drawn from these tested options. In conclusion this study showed the effectiveness of some natural preservatives against insect and fungi damage. It also illustrated the characteristics of the prototype of bamboo shading device that can constructed by rural workers within one week.

Keywords: bamboo, shading device, energy conservation, alternative material

Procedia PDF Downloads 348
4768 Identification of Functional T Cell Receptors Reactive to Tumor Antigens from the T Cell Repertoire of Healthy Donors

Authors: Isaac Quiros-Fernandez, Angel Cid-Arregui

Abstract:

Tumor-reactive T cell receptors (TCRs) are being subject of intense investigation since they offer great potential in adoptive cell therapies against cancer. However, the identification of tumor-specific TCRs has proven challenging, for instance, due to the limited expansion capacity of tumor-infiltrating T cells (TILs) and the extremely low frequencies of tumor-reactive T cells in the repertoire of patients and healthy donors. We have developed an approach for rapid identification and characterization of neoepitope-reactive TCRs from the T cell repertoire of healthy donors. CD8 T cells isolated from multiple donors are subjected to a first sorting step after staining with HLA multimers carrying the peptide of interest. The isolated cells are expanded for two weeks, after which a second sorting is performed using the same peptide-HLA multimers. The cells isolated in this way are then processed for single-cell sequencing of their TCR alpha and beta chains. Newly identified TCRs are cloned in appropriate expression vectors for functional analysis on Jurkat, NK92, and primary CD8 T cells and tumor cells expressing the appropriate antigen. We have identified TCRs specifically binding HLA-A2 presenting epitopes of tumor antigens, which are capable of inducing TCR-mediated cell activation and cytotoxicity in target cancer cell lines. This method allows the identification of tumor-reactive TCRs in about two to three weeks, starting from peripheral blood samples of readily available healthy donors.

Keywords: cancer, TCR, tumor antigens, immunotherapy

Procedia PDF Downloads 37
4767 Large-Scale Electroencephalogram Biometrics through Contrastive Learning

Authors: Mostafa ‘Neo’ Mohsenvand, Mohammad Rasool Izadi, Pattie Maes

Abstract:

EEG-based biometrics (user identification) has been explored on small datasets of no more than 157 subjects. Here we show that the accuracy of modern supervised methods falls rapidly as the number of users increases to a few thousand. Moreover, supervised methods require a large amount of labeled data for training which limits their applications in real-world scenarios where acquiring data for training should not take more than a few minutes. We show that using contrastive learning for pre-training, it is possible to maintain high accuracy on a dataset of 2130 subjects while only using a fraction of labels. We compare 5 different self-supervised tasks for pre-training of the encoder where our proposed method achieves the accuracy of 96.4%, improving the baseline supervised models by 22.75% and the competing self-supervised model by 3.93%. We also study the effects of the length of the signal and the number of channels on the accuracy of the user-identification models. Our results reveal that signals from temporal and frontal channels contain more identifying features compared to other channels.

Keywords: brainprint, contrastive learning, electroencephalo-gram, self-supervised learning, user identification

Procedia PDF Downloads 132
4766 A Fundamental Study for Real-Time Safety Evaluation System of Landing Pier Using FBG Sensor

Authors: Heungsu Lee, Youngseok Kim, Jonghwa Yi, Chul Park

Abstract:

A landing pier is subjected to safety assessment by visual inspection and design data, but it is difficult to check the damage in real-time. In this study, real - time damage detection and safety evaluation methods were studied. As a result of structural analysis of the arbitrary landing pier structure, the inflection point of deformation and moment occurred at 10%, 50%, and 90% of pile length. The critical value of Fiber Bragg Grating (FBG) sensor was set according to the safety factor, and the FBG sensor application method for real - time safety evaluation was derived.

Keywords: FBG sensor, harbor structure, maintenance, safety evaluation system

Procedia PDF Downloads 188
4765 Resilience-Vulnerability Interaction in the Context of Disasters and Complexity: Study Case in the Coastal Plain of Gulf of Mexico

Authors: Cesar Vazquez-Gonzalez, Sophie Avila-Foucat, Leonardo Ortiz-Lozano, Patricia Moreno-Casasola, Alejandro Granados-Barba

Abstract:

In the last twenty years, academic and scientific literature has been focused on understanding the processes and factors of coastal social-ecological systems vulnerability and resilience. Some scholars argue that resilience and vulnerability are isolated concepts due to their epistemological origin, while others note the existence of a strong resilience-vulnerability relationship. Here we present an ordinal logistic regression model based on the analytical framework about dynamic resilience-vulnerability interaction along adaptive cycle of complex systems and disasters process phases (during, recovery and learning). In this way, we demonstrate that 1) during the disturbance, absorptive capacity (resilience as a core of attributes) and external response capacity explain the probability of households capitals to diminish the damage, and exposure sets the thresholds about the amount of disturbance that households can absorb, 2) at recovery, absorptive capacity and external response capacity explain the probability of households capitals to recovery faster (resilience as an outcome) from damage, and 3) at learning, adaptive capacity (resilience as a core of attributes) explains the probability of households adaptation measures based on the enhancement of physical capital. As a result, during the disturbance phase, exposure has the greatest weight in the probability of capital’s damage, and households with absorptive and external response capacity elements absorbed the impact of floods in comparison with households without these elements. At the recovery phase, households with absorptive and external response capacity showed a faster recovery on their capital; however, the damage sets the thresholds of recovery time. More importantly, diversity in financial capital increases the probability of recovering other capital, but it becomes a liability so that the probability of recovering the household finances in a longer time increases. At learning-reorganizing phase, adaptation (modifications to the house) increases the probability of having less damage on physical capital; however, it is not very relevant. As conclusion, resilience is an outcome but also core of attributes that interacts with vulnerability along the adaptive cycle and disaster process phases. Absorptive capacity can diminish the damage experienced by floods; however, when exposure overcomes thresholds, both absorptive and external response capacity are not enough. In the same way, absorptive and external response capacity diminish the recovery time of capital, but the damage sets the thresholds in where households are not capable of recovering their capital.

Keywords: absorptive capacity, adaptive capacity, capital, floods, recovery-learning, social-ecological systems

Procedia PDF Downloads 108
4764 Identification of Individuals in Forensic Situations after Allo-Hematopoietic Stem Cell Transplantation

Authors: Anupuma Raina, Ajay Parkash

Abstract:

In forensic investigation, DNA analysis helps in the identification of a particular individual under investigation. A set of Short Tandem Repeats loci are widely used for individualization at a molecular level in forensic testing. STRs with tetrameric repeats of DNA are highly polymorphic and widely used for forensic DNA analysis. Identification of an individual became challenging for forensic examiners after Hematopoietic Stem Cell Transplantation. HSCT is a well-accepted and life-saving treatment to treat malignant and nonmalignant diseases. It involves the administration of healthy donor stem cells to replace the patient’s own unhealthy stem cells. A successful HSCT results in complete donor-derived cells in a patient’s hematopoiesis and hence have the capability to change the genetic makeup of the patient. Although an individual who has undergone HSCT and then committed a crime is a very rare situation, but not impossible. Keeping such a situation in mind, various biological samples like blood, buccal swab, and hair follicle were collected and studied after a certain interval of time after HSCT. Blood was collected from both the patient and the donor before the transplant. The DNA profile of both was analyzed using a short tandem repeat kit for autosomal chromosomes. Among all exhibits studied, only hair follicles were found to be the most suitable biological exhibit, as no donor DNA profile was observed for up to 90 days of study.

Keywords: chimerism, HSCT, STRs analysis, forensic identification

Procedia PDF Downloads 42
4763 A Case Study of Alkali-Silica Reaction Induced Consistent Damage and Strength Degradation Evaluation in a Textile Mill Building Due to Slow-Reactive Aggregates

Authors: Ahsan R. Khokhar, Fizza Hassan

Abstract:

Alkali-Silica Reaction (ASR) has been recognized as a potential cause of concrete degradation in the world since the 1940s. In Pakistan, mega hydropower structures like dams, weirs constructed from aggregates extracted from a local riverbed exhibited different levels of alkali-silica reactivity over an extended service period. The concrete expansion potential due to such aggregates has been categorized as slow-reactive. Apart from hydropower structures, ASR existence has been identified in the concrete structural elements of a Textile Mill building which used aggregates extracted from the nearby riverbed. The original structure of the Textile Mill was erected in the 80s with the addition of a textile ‘sizing and wrapping’ hall constructed in the 90s. In the years to follow, intensive spalling was observed in the structural members of the subject hall; enough to threat to the overall stability of the building. Limitations such as incomplete building data posed hurdles during the detailed structural investigation. The paper lists observations made while assessing the extent of damage and its effect on the building hall structure. Core testing and Petrographic tests were carried out as per the ASTM standards for strength degradation analysis followed by the identifying its root cause. Results confirmed significant structural strength reduction because of ASR which necessitated the formulation of an immediate re-strengthening solution. The paper also discusses the possible tracks of rehabilitative measures which are being adapted to stabilize the structure and seize further concrete expansion.

Keywords: Alkali-Silica Reaction (ASR), concrete strength degradation, damage assessment, damage evaluation

Procedia PDF Downloads 101
4762 Time-Dependent Behavior of Damaged Reinforced Concrete Shear Walls Strengthened with Composite Plates Having Variable Fibers Spacing

Authors: Redha Yeghnem, Laid Boulefrakh, Sid Ahmed Meftah, Abdelouahed Tounsi, El Abbas Adda Bedia

Abstract:

In this study, the time-dependent behavior of damaged reinforced concrete shear wall structures strengthened with composite plates having variable fibers spacing was investigated to analyze their seismic response. In the analytical formulation, the adherent and the adhesive layers are all modeled as shear walls, using the mixed finite element method (FEM). The anisotropic damage model is adopted to describe the damage extent of the RC shear walls. The phenomenon of creep and shrinkage of concrete has been determined by Eurocode 2. Large earthquakes recorded in Algeria (El-Asnam and Boumerdes) have been tested to demonstrate the accuracy of the proposed method. Numerical results are obtained for non uniform distributions of carbon fibers in epoxy matrices. The effects of damage extent and the delay mechanism creep and shrinkage of concrete are highlighted. Prospects are being studied.

Keywords: RC shear wall structures, composite plates, creep and shrinkage, damaged reinforced concrete structures, finite element method

Procedia PDF Downloads 335
4761 Digital Structural Monitoring Tools @ADaPT for Cracks Initiation and Growth due to Mechanical Damage Mechanism

Authors: Faizul Azly Abd Dzubir, Muhammad F. Othman

Abstract:

Conventional structural health monitoring approach for mechanical equipment uses inspection data from Non-Destructive Testing (NDT) during plant shut down window and fitness for service evaluation to estimate the integrity of the equipment that is prone to crack damage. Yet, this forecast is fraught with uncertainty because it is often based on assumptions of future operational parameters, and the prediction is not continuous or online. Advanced Diagnostic and Prognostic Technology (ADaPT) uses Acoustic Emission (AE) technology and a stochastic prognostic model to provide real-time monitoring and prediction of mechanical defects or cracks. The forecast can help the plant authority handle their cracked equipment before it ruptures, causing an unscheduled shutdown of the facility. The ADaPT employs process historical data trending, finite element analysis, fitness for service, and probabilistic statistical analysis to develop a prediction model for crack initiation and growth due to mechanical damage. The prediction model is combined with live equipment operating data for real-time prediction of the remaining life span owing to fracture. ADaPT was devised at a hot combined feed exchanger (HCFE) that had suffered creep crack damage. The ADaPT tool predicts the initiation of a crack at the top weldment area by April 2019. During the shutdown window in April 2019, a crack was discovered and repaired. Furthermore, ADaPT successfully advised the plant owner to run at full capacity and improve output by up to 7% by April 2019. ADaPT was also used on a coke drum that had extensive fatigue cracking. The initial cracks are declared safe with ADaPT, with remaining crack lifetimes extended another five (5) months, just in time for another planned facility downtime to execute repair. The prediction model, when combined with plant information data, allows plant operators to continuously monitor crack propagation caused by mechanical damage for improved maintenance planning and to avoid costly shutdowns to repair immediately.

Keywords: mechanical damage, cracks, continuous monitoring tool, remaining life, acoustic emission, prognostic model

Procedia PDF Downloads 49
4760 Systematic Identification of Noncoding Cancer Driver Somatic Mutations

Authors: Zohar Manber, Ran Elkon

Abstract:

Accumulation of somatic mutations (SMs) in the genome is a major driving force of cancer development. Most SMs in the tumor's genome are functionally neutral; however, some cause damage to critical processes and provide the tumor with a selective growth advantage (termed cancer driver mutations). Current research on functional significance of SMs is mainly focused on finding alterations in protein coding sequences. However, the exome comprises only 3% of the human genome, and thus, SMs in the noncoding genome significantly outnumber those that map to protein-coding regions. Although our understanding of noncoding driver SMs is very rudimentary, it is likely that disruption of regulatory elements in the genome is an important, yet largely underexplored mechanism by which somatic mutations contribute to cancer development. The expression of most human genes is controlled by multiple enhancers, and therefore, it is conceivable that regulatory SMs are distributed across different enhancers of the same target gene. Yet, to date, most statistical searches for regulatory SMs have considered each regulatory element individually, which may reduce statistical power. The first challenge in considering the cumulative activity of all the enhancers of a gene as a single unit is to map enhancers to their target promoters. Such mapping defines for each gene its set of regulating enhancers (termed "set of regulatory elements" (SRE)). Considering multiple enhancers of each gene as one unit holds great promise for enhancing the identification of driver regulatory SMs. However, the success of this approach is greatly dependent on the availability of comprehensive and accurate enhancer-promoter (E-P) maps. To date, the discovery of driver regulatory SMs has been hindered by insufficient sample sizes and statistical analyses that often considered each regulatory element separately. In this study, we analyzed more than 2,500 whole-genome sequence (WGS) samples provided by The Cancer Genome Atlas (TCGA) and The International Cancer Genome Consortium (ICGC) in order to identify such driver regulatory SMs. Our analyses took into account the combinatorial aspect of gene regulation by considering all the enhancers that control the same target gene as one unit, based on E-P maps from three genomics resources. The identification of candidate driver noncoding SMs is based on their recurrence. We searched for SREs of genes that are "hotspots" for SMs (that is, they accumulate SMs at a significantly elevated rate). To test the statistical significance of recurrence of SMs within a gene's SRE, we used both global and local background mutation rates. Using this approach, we detected - in seven different cancer types - numerous "hotspots" for SMs. To support the functional significance of these recurrent noncoding SMs, we further examined their association with the expression level of their target gene (using gene expression data provided by the ICGC and TCGA for samples that were also analyzed by WGS).

Keywords: cancer genomics, enhancers, noncoding genome, regulatory elements

Procedia PDF Downloads 81