Search results for: detecting unknown viruses
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1777

Search results for: detecting unknown viruses

1687 Enhancing Precision Agriculture through Object Detection Algorithms: A Study of YOLOv5 and YOLOv8 in Detecting Armillaria spp.

Authors: Christos Chaschatzis, Chrysoula Karaiskou, Pantelis Angelidis, Sotirios K. Goudos, Igor Kotsiuba, Panagiotis Sarigiannidis

Abstract:

Over the past few decades, the rapid growth of the global population has led to the need to increase agricultural production and improve the quality of agricultural goods. There is a growing focus on environmentally eco-friendly solutions, sustainable production, and biologically minimally fertilized products in contemporary society. Precision agriculture has the potential to incorporate a wide range of innovative solutions with the development of machine learning algorithms. YOLOv5 and YOLOv8 are two of the most advanced object detection algorithms capable of accurately recognizing objects in real time. Detecting tree diseases is crucial for improving the food production rate and ensuring sustainability. This research aims to evaluate the efficacy of YOLOv5 and YOLOv8 in detecting the symptoms of Armillaria spp. in sweet cherry trees and determining their health status, with the goal of enhancing the robustness of precision agriculture. Additionally, this study will explore Computer Vision (CV) techniques with machine learning algorithms to improve the detection process’s efficiency.

Keywords: Armillaria spp., machine learning, precision agriculture, smart farming, sweet cherries trees, YOLOv5, YOLOv8

Procedia PDF Downloads 80
1686 An Eigen-Approach for Estimating the Direction-of Arrival of Unknown Number of Signals

Authors: Dia I. Abu-Al-Nadi, M. J. Mismar, T. H. Ismail

Abstract:

A technique for estimating the direction-of-arrival (DOA) of unknown number of source signals is presented using the eigen-approach. The eigenvector corresponding to the minimum eigenvalue of the autocorrelation matrix yields the minimum output power of the array. Also, the array polynomial with this eigenvector possesses roots on the unit circle. Therefore, the pseudo-spectrum is found by perturbing the phases of the roots one by one and calculating the corresponding array output power. The results indicate that the DOAs and the number of source signals are estimated accurately in the presence of a wide range of input noise levels.

Keywords: array signal processing, direction-of-arrival, antenna arrays, Eigenvalues, Eigenvectors, Lagrange multiplier

Procedia PDF Downloads 307
1685 Detection of Intentional Attacks in Images Based on Watermarking

Authors: Hazem Munawer Al-Otum

Abstract:

In this work, an efficient watermarking technique is proposed and can be used for detecting intentional attacks in RGB color images. The proposed technique can be implemented for image authentication and exhibits high robustness against unintentional common image processing attacks. It deploys two measures to discern between intentional and unintentional attacks based on using a quantization-based technique in a modified 2D multi-pyramidal DWT transform. Simulations have shown high accuracy in detecting intentionally attacked regions while exhibiting high robustness under moderate to severe common image processing attacks.

Keywords: image authentication, copyright protection, semi-fragile watermarking, tamper detection

Procedia PDF Downloads 228
1684 Improving Capability of Detecting Impulsive Noise

Authors: Farbod Rohani, Elyar Ghafoori, Matin Saeedkondori

Abstract:

Impulse noise is electromagnetic emission which generated by many house hold appliances that are attached to the electrical network. The main difficulty of impulsive noise (IN) elimination process from communication channels is to distinguish it from the transmitted signal and more importantly choosing the proper threshold bandwidth in order to eliminate the signal. Because of wide band property of impulsive noise, we present a novel method for setting the detection threshold, by taking advantage of the fact that impulsive noise bandwidth is usually wider than that of typical communication channels and specifically OFDM channel. After IN detection procedure, we apply simple windowing mechanisms to eliminate them from the communication channel.

Keywords: impulsive noise, OFDM channel, threshold detecting, windowing mechanisms

Procedia PDF Downloads 316
1683 An Experimental Study on the Optimum Installation of Fire Detector for Early Stage Fire Detecting in Rack-Type Warehouses

Authors: Ki Ok Choi, Sung Ho Hong, Dong Suck Kim, Don Mook Choi

Abstract:

Rack type warehouses are different from general buildings in the kinds, amount, and arrangement of stored goods, so the fire risk of rack type warehouses is different from those buildings. The fire pattern of rack type warehouses is different in combustion characteristic and storing condition of stored goods. The initial fire burning rate is different in the surface condition of materials, but the running time of fire is closely related with the kinds of stored materials and stored conditions. The stored goods of the warehouse are consisted of diverse combustibles, combustible liquid, and so on. Fire detection time may be delayed because the residents are less than office and commercial buildings. If fire detectors installed in rack type warehouses are inadaptable, the fire of the warehouse may be the great fire because of delaying of fire detection. In this paper, we studied what kinds of fire detectors are optimized in early detecting of rack type warehouse fire by real-scale fire tests. The fire detectors used in the tests are rate of rise type, fixed type, photo electric type, and aspirating type detectors. We considered optimum fire detecting method in rack type warehouses suggested by the response characteristic and comparative analysis of the fire detectors.

Keywords: fire detector, rack, response characteristic, warehouse

Procedia PDF Downloads 714
1682 Qualitative Detection of HCV and GBV-C Co-infection in Cirrhotic Patients Using a SYBR Green Multiplex Real Time RT-PCR Technique

Authors: Shahzamani Kiana, Esmaeil Lashgarian Hamed, Merat Shahin

Abstract:

HCV and GBV-C belong to the Flaviviridae family of viruses and GBV-C is the closest virus to HCV genetically. Accumulative research is in progress all over the world to clarify clinical aspects of GBV-C. Possibility of interaction between HCV and GBV-C and also its consequence with other liver diseases are the most important clinical aspects which encourage researchers to develop a technique for simultaneous detection of these viruses. In this study a SYBR Green multiplex real time RT-PCR technique as a new economical and sensitive method was optimized for simultaneous detection of HCV/GBV-C in HCV positive plasma samples. After designing and selection of two pairs of specific primers for HCV and GBV-C, SYBR Green Real time RT-PCR technique optimization was performed separately for each virus. Establishment of multiplex PCR was the next step. Finally our technique was performed on positive and negative plasma samples. 89 cirrhotic HCV positive plasma samples (29 of genotype 3 a and 27 of genotype 1a) were collected from patients before receiving treatment. 14% of genotype 3a and 17.1% of genotype 1a showed HCV/GBV-C co-infection. As a result, 13.48% of 89 samples had HCV/GBV-C co-infection that was compatible with other results from all over the world. Data showed no apparent influence of HGV co-infection on the either clinical or virological aspect of HCV infection. Furthermore, with application of multiplex Real time RT-PCR technique, more time and cost could be saved in clinical-research settings.

Keywords: HCV, GBV-C, cirrhotic patients, multiplex real time RT- PCR

Procedia PDF Downloads 272
1681 Epidemiology of Hepatitis B and Hepatitis C Viruses Among Pregnant Women at Queen Elizabeth Central Hospital, Malawi

Authors: Charles Bijjah Nkhata, Memory Nekati Mvula, Milton Masautso Kalongonda, Martha Masamba, Isaac Thom Shawa

Abstract:

Viral Hepatitis is a serious public health concern globally with deaths estimated at 1.4 million annually due to liver fibrosis, cirrhosis, and hepatocellular carcinoma. Hepatitis B and C are the most common viruses that cause liver damage. However, the majority of infected individuals are unaware of their serostatus. Viral Hepatitis has contributed to maternal and neonatal morbidity and mortality. There is no updated data on the Epidemiology of hepatitis B and C among pregnant mothers in Malawi. To assess the epidemiology of Hepatitis B and C viruses among pregnant women at Queen Elizabeth Central Hospital. Specific Objectives • To determine sero-prevalence of HBsAg and Anti-HCV in pregnant women at QECH. • To investigate risk factors associated with HBV and HCV infection in pregnant women. • To determine the distribution of HBsAg and Anti-HCV infection among pregnant women of different age group. A descriptive cross-sectional study was conducted among pregnant women at QECH in last quarter of 2021. Of the 114 pregnant women, 96 participants were consented and enrolled using a convenient sampling technique. 12 participants were dropped due to various reasons; therefore 84 completed the study. A semi-structured questionnaire was used to collect socio-demographic and behavior characteristics to assess the risk of exposure. Serum was processed from venous blood samples and tested for HBsAg and Anti-HCV markers utilizing Rapid screening assays for screening and Enzyme Linked Immunosorbent Assay for confirmatory. A total of 84 pregnant consenting pregnant women participated in the study, with 1.2% (n=1/84) testing positive for HBsAg and nobody had detectable anti-HCV antibodies. There was no significant link between HBV and HCV in any of the socio-demographic data or putative risk variables. The findings indicate a viral hepatitis prevalence lower than the set range by the WHO. This suggests that HBV and HCV are rare in pregnant women at QECH. Nevertheless, accessible screening for all pregnant women should be provided. The prevention of MTCT is key for reduction and prevention of the global burden of chronic viral Hepatitis.

Keywords: viral hepatitis, hepatitis B, hepatitis C, pregnancy, malawi, liver disease, mother to child transmission

Procedia PDF Downloads 143
1680 New Segmentation of Piecewise Moving-Average Model by Using Reversible Jump MCMC Algorithm

Authors: Suparman

Abstract:

This paper addresses the problem of the signal segmentation within a Bayesian framework by using reversible jump MCMC algorithm. The signal is modelled by piecewise constant Moving-Average (MA) model where the numbers of segments, the position of change-point, the order and the coefficient of the MA model for each segment are unknown. The reversible jump MCMC algorithm is then used to generate samples distributed according to the joint posterior distribution of the unknown parameters. These samples allow calculating some interesting features of the posterior distribution. The performance of the methodology is illustrated via several simulation results.

Keywords: piecewise, moving-average model, reversible jump MCMC, signal segmentation

Procedia PDF Downloads 198
1679 Face Shield Design with Additive Manufacturing Practice Combating COVID-19 Pandemic

Authors: May M. Youssef

Abstract:

This article introduces a design, for additive manufacturing technology, face shield as Personal Protective Equipment from the respiratory viruses such as coronavirus 2. The face shields help to reduce ocular exposure and play a vital role in diverting away from the respiratory COVID-19 air droplets around the users' face. The proposed face shield comprises three assembled polymer parts. The frame with a transparency overhead projector sheet visor is suitable for frontline health care workers and ordinary citizens. The frame design allows tightening the shield around the user’s head and permits rubber elastic straps to be used if required. That ergonomically designed with a unique face mask support used in case of wearing extra protective mask was created using computer aided design (CAD) software package. The finite element analysis (FEA) structural verification of the proposed design is performed by an advanced simulation technique. Subsequently, the prototype model was fabricated by a 3D printing using Fused Deposition Modeling (FDM) as a globally developed face shield product. This study provides a different face shield designs for global production, which showed to be suitable and effective toward supply chain shortages and frequent needs of personal protective goods during coronavirus disease and similar viruses.

Keywords: additive manufacturing, Coronavirus-19, face shield, personal protective equipment, 3D printing

Procedia PDF Downloads 163
1678 Double Layer Security Authentication Model for Automatic Dependent Surveillance-Broadcast

Authors: Buse T. Aydin, Enver Ozdemir

Abstract:

An automatic dependent surveillance-broadcast (ADS-B) system has serious security problems. In this study, a double layer authentication scheme between the aircraft and ground station, aircraft to aircraft, ground station to ATC tower is designed to prevent any unauthorized aircrafts from introducing themselves as friends. This method can be used as a solution to the problem of authentication. The method is a combination of classical cryptographic methods and new generation physical layers. The first layer has employed the embedded key of the aircraft. The embedded key is assumed to installed during the construction of the utility. The other layer is a physical attribute (flight path, distance, etc.) between the aircraft and the ATC tower. We create a mathematical model so that two layers’ information is employed and an aircraft is authenticated as a friend or unknown according to the accuracy of the results of the model. The results of the aircraft are compared with the results of the ATC tower and if the values found by the aircraft and ATC tower match within a certain error margin, we mark the aircraft as friend. As a result, the ADS-B messages coming from this authenticated friendly aircraft will be processed. In this method, even if the embedded key is captured by the unknown aircraft, without the information of the second layer, the unknown aircraft can easily be determined. Overall, in this work, we present a reliable system by adding physical layer in the authentication process.

Keywords: ADS-B, authentication, communication with physical layer security, cryptography, identification friend or foe

Procedia PDF Downloads 148
1677 Limit State of Heterogeneous Smart Structures under Unknown Cyclic Loading

Authors: M. Chen, S-Q. Zhang, X. Wang, D. Tate

Abstract:

This paper presents a numerical solution, namely limit and shakedown analysis, to predict the safety state of smart structures made of heterogeneous materials under unknown cyclic loadings, for instance, the flexure hinge in the micro-positioning stage driven by piezoelectric actuator. In combination of homogenization theory and finite-element method (FEM), the safety evaluation problem is converted to a large-scale nonlinear optimization programming for an acceptable bounded loading as the design reference. Furthermore, a general numerical scheme integrated with the FEM and interior-point-algorithm based optimization tool is developed, which makes the practical application possible.

Keywords: limit state, shakedown analysis, homogenization, heterogeneous structure

Procedia PDF Downloads 308
1676 Determination of Unknown Radionuclides Using High Purity Germanium Detectors

Authors: O. G. Onuk, L. S. Taura, C. M. Eze, S. M. Ngaram

Abstract:

The decay chain of radioactive elements in the laboratory and the verification of natural radioactivity of the human body was investigated using the High Purity Germanium (HPGe) detector. Properties of the HPGe detectors were also investigated. The efficiency and energy resolution of HPGe detector used in the laboratory was found to be excellent. The detector was calibrated three times so as to cover a wider energy range. Also the Centroid C of the detector was found to have a linear relationship with the energies of the known gamma-rays. Using the three calibrations of the detector, the energy of an unknown radionuclide was found to follow the decay chain of thorium-232 (232Th) and it was also found that an average adult has about 2.5g Potasium-40 (40K) in the body.

Keywords: detector, efficiency, energy, radionuclides, resolution

Procedia PDF Downloads 230
1675 Epidemiological Survey of Feline Leukemia Virus in Domestic Cats on Tsushima Island, Japan: Tsushima Leopard Cats Are at Risk

Authors: Isaac Makundi, Kazuo Nishigaki

Abstract:

The Tsushima leopard cat (TLC) Prionailurus bengalensis euptilurus, designated a National Natural Monument of Japan, inhabits Tsushima Island, Nagasaki Prefecture, Japan. TLC is considered a subspecies of P. bengalensis, and lives only on Tsushima Island. TLCs are threatened by various infectious diseases. Feline leukemia virus (FeLV) causes a serious infectious disease with a poor prognosis in cats. Therefore, the transmission of FeLV from Tsushima domestic cats (TDCs) to TLCs may threaten the TLC population. We investigated the FeLV infection status of both TDCs and TLCs on Tsushima Island by screening blood samples for FeLV p27 antigen and using PCR to amplify the full-length FeLV env gene. The prevalence of FeLV was 6.4% in TDCs and 0% in TLCs. We also demonstrated that the virus can replicate in the cells of TLCs, suggesting its potential cross-species transmission. The viruses in TDCs were classified as genotype I/clade 3, which is prevalent on a nearby island, based on previous studies of FeLV genotypes and FeLV epidemiology. The FeLV viruses identified on Tsushima Island can be further divided into two lineages within genotype I/clade 3, which are geographically separated in Kamijima and Shimojima, indicating that FeLV may have been transmitted to Tsushima Island at least twice. Monitoring FeLV infection in the TDC and TLC populations is highly recommended as part of the TLC surveillance and management strategy.

Keywords: epidemiology, Feline leukemia virus, Tsushima Island, wildlife management

Procedia PDF Downloads 184
1674 A Novel Peptide Showing Universal Effect against Multiple Viruses in Vitro and in Vivo

Authors: Hanjun Zhao, Ke Zhang, Bojian Zheng

Abstract:

Background: So far, there is no universal antiviral agent which can inhibit multiple viral infections. More and more drug-resistant viral strains emerge after the antiviral drug application for treatment. Defensins are the front line of host innate immunity and have broad spectrum antibacterial and antiviral effects. However, there is limited data to show if these defensins have good antiviral activity in vivo and what the antiviral mechanism is. Subjects: To investigate a peptide with widespread antivirus activity in vitro and in vivo and illustrate the antiviral mechanism. Methods: Antiviral peptide library designed from mouse beta defensins was synthesized by the company. Recombinant beta defensin was obtained from E. coli. Antiviral activity in vitro was assayed by plaque assay, qPCR. Antiviral activity in vivo was detected by animal challenge with 2009 pandemic H1N1 influenza A virus. The antiviral mechanism was assayed by western blot, ELISA, and qPCR. Conclusions: We identify a new peptide which has widespread effects against multiple viruses (H1N1, H5N1, H7N9, MERS-CoV) in vitro and has efficient antivirus activity in vivo. This peptide inhibits viral entry into target cells and subsequently blocks viral replication. The in vivo study of the antiviral peptide against other viral infections and the investigation of its more detail antiviral mechanism are ongoing.

Keywords: antiviral peptide, defensin, Influenza A virus, mechanism

Procedia PDF Downloads 373
1673 Molecular Detection of Viruses Causing Hemorrhagic Fevers in Rodents in the South-West of Korea

Authors: Sehrish Jalal, Choon-Mee Kim, Dong-Min Kim

Abstract:

Background: Many pathogens causing hemorrhagic fevers of medical and veterinary importance have been identified and isolated from rodents in the Republic of Korea (ROK). Objective: We investigated the prevalence of emerging viruses causing hemorrhagic fevers, such as hemorrhagic fever with renal syndrome (HFRS), severe fever with thrombocytopenia syndrome (SFTS) and flaviviruses, from wild rodents. Methods: Striped field mice, Apodemus agrarius, (n=39) were captured during 2014-2015 in the south-west of ROK. Using molecular methods, lung samples were evaluated for SFTS virus, HFRS virus and flavivirus, and seropositivity was evaluated in the blood. Results: A high positive rate of Hantavirus (46.2%) was detected in A.agrarius lungs by reverse transcription-nested polymerase chain reaction (RT-N-PCR). The monthly prevalence of HFRS virus was 16.7% in October, 86.7% in November and 25% in August of the following year (p < 0.001). Moreover, 17.9% of blood samples were serologically positive for Hantavirus antibodies. The most prevalent strain in A. agrarius was Hantaan virus. All samples were positive for neither SFTS nor flavivirus. Conclusion: Hantan virus was detected in 86.7% of A. agrarius in November (autumn), and thus, virus shedding from A. agrarius can increase the risk of humans contracting HFRS. These findings may help to predict and prevent disease outbreaks in ROK.

Keywords: hemorrhagic fever virus, molecular diagnostic technique, rodents, Korea

Procedia PDF Downloads 127
1672 The Selection of the Nearest Anchor Using Received Signal Strength Indication (RSSI)

Authors: Hichem Sassi, Tawfik Najeh, Noureddine Liouane

Abstract:

The localization information is crucial for the operation of WSN. There are principally two types of localization algorithms. The Range-based localization algorithm has strict requirements on hardware; thus, it is expensive to be implemented in practice. The Range-free localization algorithm reduces the hardware cost. However, it can only achieve high accuracy in ideal scenarios. In this paper, we locate unknown nodes by incorporating the advantages of these two types of methods. The proposed algorithm makes the unknown nodes select the nearest anchor using the Received Signal Strength Indicator (RSSI) and choose two other anchors which are the most accurate to achieve the estimated location. Our algorithm improves the localization accuracy compared with previous algorithms, which has been demonstrated by the simulating results.

Keywords: WSN, localization, DV-Hop, RSSI

Procedia PDF Downloads 334
1671 Study on Network-Based Technology for Detecting Potentially Malicious Websites

Authors: Byung-Ik Kim, Hong-Koo Kang, Tae-Jin Lee, Hae-Ryong Park

Abstract:

Cyber terrors against specific enterprises or countries have been increasing recently. Such attacks against specific targets are called advanced persistent threat (APT), and they are giving rise to serious social problems. The malicious behaviors of APT attacks mostly affect websites and penetrate enterprise networks to perform malevolent acts. Although many enterprises invest heavily in security to defend against such APT threats, they recognize the APT attacks only after the latter are already in action. This paper discusses the characteristics of APT attacks at each step as well as the strengths and weaknesses of existing malicious code detection technologies to check their suitability for detecting APT attacks. It then proposes a network-based malicious behavior detection algorithm to protect the enterprise or national networks.

Keywords: Advanced Persistent Threat (APT), malware, network security, network packet, exploit kits

Procedia PDF Downloads 337
1670 Role-Specific Target-Systems in Professional Bureaucracies: A Qualitative Analysis in the OR

Authors: Kirsten Hoeper, Maike Kriependorf

Abstract:

This paper firstly discusses the initial situation and problems. Afterward, it defines professional bureaucracies and shows their impact for the OR-work. The OR-center and its actors are shown. Finally, the paper provides the empiric design for detecting the target systems of the different work groups within the OR, the quality criteria in qualitative research and empirical results. It is shown that different groups have different targets in their daily work and that helps for a better understanding. More precisely, by detecting the target systems of these experts, we can ‘bridge’ the different points of view to create a common basis for the work in the OR. One of the aims was to find bridges to overcome separating factors. This paper describes the situation in Germany focusing the Hannover Medical School. It can be assumed that the results can be transferred to other countries using the DRG-System (Diagnosis Related Groups).

Keywords: hospital, OR, professional bureaucracies, target systems

Procedia PDF Downloads 272
1669 Influenza Virus Circulation among the Population of Kazakhstan in 2012-2014

Authors: N. G. Klivleyeva, T. I. Glebova, G. V. Lukmanova, S. B. Bayseit, S. Z. Taubaeva, M. K. Kalkozhaeva

Abstract:

The role of viral diseases in the general infectious disease incidence increases every year and requires special attention to the problem of interpreting the etiology of infectious agents. Influenza and acute respiratory viral infections are one of the most pressing public health issues. In the period 2012-2014, collection of 419 nasal swabs and 150 blood sera has been carried out in the patient care institutions of the various Kazakhstan regions from patients with symptoms of ARVI and pneumonia. Primary identification of biosamples for the presence of influenza viral antigens in enzyme immunoassay on nitrocellulose membrane gave positive results in 125 swabs (29.8%). Biosample screening in immunofluorescence test revealed the presence of influenza viral antigens against A/H1 in 63 samples (15.0%), A/H3 – in 70 samples (16.7%) and type B – in 9 samples (2.1%). As a result of primary infection, and successive passages in chick embryos and MDCK cell cultures, 38 HAAg were isolated from 419 samples with a clear cytopathic effect and hemagglutination titre in MDCK cell culture within 1:2-1:4, in CE - 1:8-1:256. The infectivity of isolates in chicken embryos were 3.5-6.5 lg EID50/0.2, in MDCK cell culture – 2.5-6.5 lg PFU/ml. Identification of 28 isolates was carried out in inhibition reactions of hemagglutinating activity and neuraminidase activity, showed their belonging to the influenza virus: 26 strains to A/H1N1, one - to A/H3N2, and one - to type B. Serological examination of blood sera for the presence of specific antibodies being an indirect evidence of the performed isolation and contributing to the timely interpretation of the disease etiology in the epidemics takes an important place in the comprehensive study of influenza viruses circulating among people. Serological analyzes were carried out in HAI assay using a kit consisting of 12 reference strains obtained from the WHO centre for reference and research on Influenza (CDC, Atlanta, USA) and three Kazakhstan (A/Almaty/347/09 (H1N1v), A/Almaty/462/11 (H3N2) and B/Almaty/414/10) human influenza viruses that are stored in the laboratory collection. The results of serological analysis of 150 blood sera showed that antihaemagglutinins against the A/H3N2 virus serosubtype were found in 46 samples (49.4%) out of 93 sera collected in 2012-2013. The antibody titres were within 1:160-1:320. 19 sera (20.4%) were seropositive against influenza A/H1N1 virus, the antibodies were observed in titres of 1:20-1:40. Six sera (6.4%) were positive against the influenza A/H1N1+A/H3N2 virus (mixed infection); the antibodies were recorded in titres of 1:20-1:40. Antihaemagglutinins against influenza type B virus were detected only in five sera (5.4%). The results of analysis of 57 sera collected in 2014 showed that antihaemagglutinins against A/H3N2 virus subtype were detected in 32 blood sera (56.1%) in titres of 1:160-1:640. Ten sera (17.5%) were seropositive against A/H1N1 virus; antihaemagglutinins against influenza type B virus were not detected. Therefore, virological and serological studies have shown that in Kazakhstan, as well as in the world, the influenza viruses A/H1N1, A/H3N2 and influenza B viruses were actively circulating during the epidemic seasons in 2012-2014.

Keywords: influenza, MDCK cell, serological analysis, virus

Procedia PDF Downloads 151
1668 A Pipeline for Detecting Copy Number Variation from Whole Exome Sequencing Using Comprehensive Tools

Authors: Cheng-Yang Lee, Petrus Tang, Tzu-Hao Chang

Abstract:

Copy number variations (CNVs) have played an important role in many kinds of human diseases, such as Autism, Schizophrenia and a number of cancers. Many diseases are found in genome coding regions and whole exome sequencing (WES) is a cost-effective and powerful technology in detecting variants that are enriched in exons and have potential applications in clinical setting. Although several algorithms have been developed to detect CNVs using WES and compared with other algorithms for finding the most suitable methods using their own samples, there were not consistent datasets across most of algorithms to evaluate the ability of CNV detection. On the other hand, most of algorithms is using command line interface that may greatly limit the analysis capability of many laboratories. We create a series of simulated WES datasets from UCSC hg19 chromosome 22, and then evaluate the CNV detective ability of 19 algorithms from OMICtools database using our simulated WES datasets. We compute the sensitivity, specificity and accuracy in each algorithm for validation of the exome-derived CNVs. After comparison of 19 algorithms from OMICtools database, we construct a platform to install all of the algorithms in a virtual machine like VirtualBox which can be established conveniently in local computers, and then create a simple script that can be easily to use for detecting CNVs using algorithms selected by users. We also build a table to elaborate on many kinds of events, such as input requirement, CNV detective ability, for all of the algorithms that can provide users a specification to choose optimum algorithms.

Keywords: whole exome sequencing, copy number variations, omictools, pipeline

Procedia PDF Downloads 285
1667 Bending Tests for the Axial Load Identifications in Space Structures with Unknown Boundary Conditions

Authors: M. Bonopera, N. Tullini, C. C. Chen, T. K. Lin, K. C. Chang

Abstract:

This paper presents the extension of a static method for the axial load identifications in prismatic beam-columns with uncertain length and unknown boundary conditions belonging to generic space structures, such as columns of space frames or struts and ties of space trusses. The non-destructive method requires the knowledge of the beam-column flexural rigidity only. Flexural displacements are measured at five cross sections along the beam-column subjected to an additional vertical load at the mid-span. Unlike analogous dynamic methods, any set of experimental data may be used in the identification procedure. The method is verified by means of many numerical and experimental tests on beam-columns having unknown boundary conditions and different slenderness belonging to three different space prototypes in small-scale. Excellent estimates of the tensile and compressive forces are obtained for the elements with higher slenderness and when the greatest possible distance between sensors is adopted. Moreover, the application of larger values of the vertical load and very accurate displacement measurements are required. The method could be an efficacious technique in-situ, considering that safety inspections will become increasingly important in the near future, especially because of the improvement of the material properties that allowed designing space structures composed of beam-columns with higher slenderness.

Keywords: force identification, in-situ test, space structure, static test

Procedia PDF Downloads 222
1666 Neuroblastoma in Children and the Potential Involvement of Viruses in Its Pathogenesis

Authors: Ugo Rovigatti

Abstract:

Neuroblastoma (NBL) has epitomized for at least 40 years our understanding of cancer cellular and molecular biology and its potential applications to novel therapeutic strategies. This includes the discovery of the very first oncogene aberrations and tumorigenesis suppression by differentiation in the 80s; the potential role of suppressor genes in the 90s; the relevance of immunotherapy in the millennium first, and the discovery of additional mutations by NGS technology in the millennium second decade. Similar discoveries were achieved in the majority of human cancers, and similar therapeutic interventions were obtained subsequently to NBL discoveries. Unfortunately, targeted therapies suggested by specific mutations (such as MYCN amplification –MNA- present in ¼ or 1/5 of cases) have not elicited therapeutic successes in aggressive NBL, where the prognosis is still dismal. The reasons appear to be linked to Tumor Heterogeneity, which is particularly evident in NBL but also a clear hallmark of aggressive human cancers generally. The new avenue of cancer immunotherapy (CIT) provided new hopes for cancer patients, but we still ignore the cellular or molecular targets. CIT is emblematic of high-risk disease (HR-NBL) since the mentioned GD2 passive immunotherapy is still providing better survival. We recently critically reviewed and evaluated the literature depicting the genomic landscapes of HR-NBL, coming to the qualified conclusion that among hundreds of affected genes, potential targets, or chromosomal sites, none correlated with anti-GD2 sensitivity. A better explanation is provided by the Micro-Foci inducing Virus (MFV) model, which predicts that neuroblasts infection with the MFV, an RNA virus isolated from a cancer-cluster (space-time association) of HR-NBL cases, elicits the appearance of MNA and additional genomic aberrations with mechanisms resembling chromothripsis. Neuroblasts infected with low titers of MFV amplified MYCN up to 100 folds and became highly transformed and malignant, thus causing neuroblastoma in young rat pups of strains SD and Fisher-344 and larger tumor masses in nu/nu mice. An association was discovered with GD2 since this glycosphingolipid is also the receptor for the family of MFV virus (dsRNA viruses). It is concluded that a dsRNA virus, MFV, appears to provide better explicatory mechanisms for the genesis of i) specific genomic aberrations such as MNA; ii) extensive tumor heterogeneity and chromothripsis; iii) the effects of passive immunotherapy with anti-GD2 monoclonals and that this and similar models should be further investigated in both pediatric and adult cancers.

Keywords: neuroblastoma, MYCN, amplification, viruses, GD2

Procedia PDF Downloads 79
1665 Plagiarism Detection for Flowchart and Figures in Texts

Authors: Ahmadu Maidorawa, Idrissa Djibo, Muhammad Tella

Abstract:

This paper presents a method for detecting flow chart and figure plagiarism based on shape of image processing and multimedia retrieval. The method managed to retrieve flowcharts with ranked similarity according to different matching sets. Plagiarism detection is well known phenomenon in the academic arena. Copying other people is considered as serious offense that needs to be checked. There are many plagiarism detection systems such as turn-it-in that has been developed to provide these checks. Most, if not all, discard the figures and charts before checking for plagiarism. Discarding the figures and charts result in look holes that people can take advantage. That means people can plagiarize figures and charts easily without the current plagiarism systems detecting it. There are very few papers which talks about flowcharts plagiarism detection. Therefore, there is a need to develop a system that will detect plagiarism in figures and charts.

Keywords: flowchart, multimedia retrieval, figures similarity, image comparison, figure retrieval

Procedia PDF Downloads 435
1664 Application of Nanoparticles in Biomedical and MRI

Authors: Raziyeh Mohammadi

Abstract:

At present, nanoparticles are used for various biomedical applications where they facilitate laboratory diagnostics and therapeutics. The performance of nanoparticles for biomedical applications is often assessed by their narrow size distribution, suitable magnetic saturation, and low toxicity effects. Superparamagnetic iron oxide nanoparticles have received great attention due to their applications as contrast agents for magnetic resonance imaging (MRI. (Processes in the tissue where the blood brain barrier is intact in this way shielded from the contact to this conventional contrast agent and will only reveal changes in the tissue if it involves an alteration in the vasculature. This technique is very useful for detecting tumors and can even be used for detecting metabolic functional alterations in the brain, such as epileptic activity.SPIONs have found application in Magnetic Resonance Imaging (MRI) and magnetic hyperthermia. Unlike bulk iron, SPIONs do not have remnant magnetization in the absence of the external magnetic field; therefore, a precise remote control over their action is possible.

Keywords: nanoparticles, MRI, biomedical, iron oxide, spions

Procedia PDF Downloads 183
1663 Microbial Contaminants in Drinking Water Collected from Different Regions of Kuwait

Authors: Abu Salim Mustafa

Abstract:

Water plays a major role in maintaining life on earth, but it can also serve as a matrix for pathogenic organisms, posing substantial health threats to humans. Although, outbreaks of diseases attributable to drinking water may not be common in industrialized countries, they still occur and can lead to serious acute, chronic, or sometimes fatal health consequences. The analysis of drinking water samples from different regions of Kuwait was performed in this study for bacterial and viral contaminations. Drinking tap water samples were collected from 15 different locations of the six Kuwait governorates. All samples were analyzed by confocal microscopy for the presence of bacteria. The samples were cultured in vitro to detect cultivable organisms. DNA was isolated from the cultured organisms and the identity of the bacteria was determined by sequencing the bacterial 16S rRNA genes, followed by BLAST analysis in the database of NCBI, USA. RNA was extracted from water samples and analyzed by real-time PCR for the detection of viruses with potential health risks, i.e. Astrovirus, Enterovirus, Norovirus, Rotavirus, and Hepatitis A. Confocal microscopy showed the presence of bacteria in some water samples. The 16S rRNA gene sequencing of culture grown organisms, followed by BLAST analysis, identified the presence of several non-pathogenic bacterial species. However, one sample had Acinetobacter baumannii, which often causes opportunistic infections in immunocompromised people, but none of the studied viruses could be detected in the drinking water samples analyzed. The results indicate that drinking water samples analyzed from various locations in Kuwait are relatively safe for drinking and do not contain many harmful pathogens.

Keywords: drinking water, microbial contaminant, 16S rDNA, Kuwait

Procedia PDF Downloads 108
1662 Iterative Segmentation and Application of Hausdorff Dilation Distance in Defect Detection

Authors: S. Shankar Bharathi

Abstract:

Inspection of surface defects on metallic components has always been challenging due to its specular property. Occurrences of defects such as scratches, rust, pitting are very common in metallic surfaces during the manufacturing process. These defects if unchecked can hamper the performance and reduce the life time of such component. Many of the conventional image processing algorithms in detecting the surface defects generally involve segmentation techniques, based on thresholding, edge detection, watershed segmentation and textural segmentation. They later employ other suitable algorithms based on morphology, region growing, shape analysis, neural networks for classification purpose. In this paper the work has been focused only towards detecting scratches. Global and other thresholding techniques were used to extract the defects, but it proved to be inaccurate in extracting the defects alone. However, this paper does not focus on comparison of different segmentation techniques, but rather describes a novel approach towards segmentation combined with hausdorff dilation distance. The proposed algorithm is based on the distribution of the intensity levels, that is, whether a certain gray level is concentrated or evenly distributed. The algorithm is based on extraction of such concentrated pixels. Defective images showed higher level of concentration of some gray level, whereas in non-defective image, there seemed to be no concentration, but were evenly distributed. This formed the basis in detecting the defects in the proposed algorithm. Hausdorff dilation distance based on mathematical morphology was used to strengthen the segmentation of the defects.

Keywords: metallic surface, scratches, segmentation, hausdorff dilation distance, machine vision

Procedia PDF Downloads 390
1661 Applications of Drones in Infrastructures: Challenges and Opportunities

Authors: Jin Fan, M. Ala Saadeghvaziri

Abstract:

Unmanned aerial vehicles (UAVs), also referred to as drones, equipped with various kinds of advanced detecting or surveying systems, are effective and low-cost in data acquisition, data delivery and sharing, which can benefit the building of infrastructures. This paper will give an overview of applications of drones in planning, designing, construction and maintenance of infrastructures. The drone platform, detecting and surveying systems, and post-data processing systems will be introduced, followed by cases with details of the applications. Challenges from different aspects will be addressed. Opportunities of drones in infrastructure include but not limited to the following. Firstly, UAVs equipped with high definition cameras or other detecting equipment are capable of inspecting the hard to reach infrastructure assets. Secondly, UAVs can be used as effective tools to survey and map the landscape to collect necessary information before infrastructure construction. Furthermore, an UAV or multi-UVAs are useful in construction management. UVAs can also be used in collecting roads and building information by taking high-resolution photos for future infrastructure planning. UAVs can be used to provide reliable and dynamic traffic information, which is potentially helpful in building smart cities. The main challenges are: limited flight time, the robustness of signal, post data analyze, multi-drone collaboration, weather condition, distractions to the traffic caused by drones. This paper aims to help owners, designers, engineers and architects to improve the building process of infrastructures for higher efficiency and better performance.

Keywords: bridge, construction, drones, infrastructure, information

Procedia PDF Downloads 92
1660 Development of Cost-effective Sensitive Methods for Pathogen Detection in Community Wastewater for Disease Surveillance

Authors: Jesmin Akter, Chang Hyuk Ahn, Ilho Kim, Jaiyeop Lee

Abstract:

Global pandemic coronavirus disease (COVID-19) caused by Severe acute respiratory syndrome SARS-CoV-2, to control the spread of the COVID-19 pandemic, wastewater surveillance has been used to monitor SARS-CoV2 prevalence in the community. The challenging part is establishing wastewater surveillance; there is a need for a well-equipped laboratory for wastewater sample analysis. According to many previous studies, reverse transcription-polymerase chain reaction (RT-PCR) based molecular tests are the most widely used and popular detection method worldwide. However, the RT-qPCR based approaches for the detection or quantification of SARS-CoV-2 genetic fragments ribonucleic acid (RNA) from wastewater require a specialized laboratory, skilled personnel, expensive instruments, and a workflow that typically requires 6 to 8 hours to provide results for just minimum samples. Rapid and reliable alternative detection methods are needed to enable less-well-qualified practitioners to set up and provide sensitive detection of SARS-CoV-2 within wastewater at less-specialized regional laboratories. Therefore, scientists and researchers are conducting experiments for rapid detection methods of COVID-19; in some cases, the structural and molecular characteristics of SARS-CoV-2 are unknown, and various strategies for the correct diagnosis of COVID-19 have been proposed by research laboratories, which are presented in the present study. The ongoing research and development of these highly sensitive and rapid technologies, namely RT-LAMP, ELISA, Biosensors, GeneXpert, allows a wide range of potential options not only for SARS-CoV-2 detection but also for other viruses as well. The effort of this study is to discuss the above effective and regional rapid detection and quantification methods in community wastewater as an essential step in advancing scientific goals.

Keywords: rapid detection, SARS-CoV-2, sensitive detection, wastewater surveillance

Procedia PDF Downloads 57
1659 Molecular Characterization and Phylogenetic Analysis of Capripoxviruses from Outbreak in Iran 2021

Authors: Maryam Torabi, Habibi, Abdolahi, Mohammadi, Hassanzadeh, Darban Maghami, Baghi

Abstract:

Sheeppox Virus (SPPV) and goatpox virus (GTPV) are considerable diseases of sheep, and goats, caused by viruses of the Capripoxvirus (CaPV) genus. They are responsible for economic losses. Animal mortality, morbidity, cost of vaccinations, and restrictions in animal products’ trade are the reasons of economic losses. Control and eradication of CaPV depend on early detection of outbreaks so that molecular detection and genetic analysis could be effective to this aim. This study was undertaken to molecularly characterize SPPV and GTPV strains that have been circulating in Iran. 120 skin papules and nodule biopsies were collected from different regions of Iran and were examined for SPPV, GTPV viruses using TaqMan Real -Time PCR. Some of these amplified genes were sequenced, and phylogenetic trees were constructed. Out of the 120 samples analysed, 98 were positive for CaPV by Real- Time PCR (81.6%), and most of them wereSPPV. then 10 positive samples were sequenced and characterized by amplifying the ORF 103CaPV gene. sequencing and phylogenetic analysis for these positive samples revealed a high percentage of identity with SPPV isolated from different countries in Middle East. In conclusions, molecular characterization revealed nearly complete identity with all recent SPPVs strains in local countries that requires further studies to monitor the virus evolution and transmission pathways to better understand the virus pathobiology that will help for SPPV control.

Keywords: molecular epidemiology, Real-Time PCR, phylogenetic analysis, capripoxviruses

Procedia PDF Downloads 114
1658 Decentralized Control of Interconnected Systems with Non-Linear Unknown Interconnections

Authors: Haci Mehmet Guzey, Levent Acar

Abstract:

In this paper, a novel decentralized controller is developed for linear systems with nonlinear unknown interconnections. A model linear decoupled system is assigned for each system. By using the difference actual and model state dynamics, the problem is formulated as inverse problem. Then, the interconnected dynamics are approximated by using Galerkin’s expansion method for inverse problems. Two different sets of orthogonal basis functions are utilized to approximate the interconnected dynamics. Approximated interconnections are utilized in the controller to cancel the interconnections and decouple the systems. Subsequently, the interconnected systems behave as a collection of decoupled systems.

Keywords: decentralized control, inverse problems, large scale systems, nonlinear interconnections, basis functions, system identification

Procedia PDF Downloads 507