977 resultados para Vehicle identification and detection system


Relevância:

100.00% 100.00%

Publicador:

Resumo:

Seafood products fraud, the misrepresentation of them, have been discovered all around the world in different forms as false labeling, species substitution, short-weighting or over glazing in order to hide the correct identity, origin or weight of the seafood products. Due to the value of seafood products such as canned tuna, swordfish or grouper, these species are the subject of the commercial fraud is mainly there placement of valuable species with other little or no value species. A similar situation occurs with the shelled shrimp or shellfish that are reduced into pieces for the commercialization. Food fraud by species substitution is an emerging risk given the increasingly global food supply chain and the potential food safety issues. Economic food fraud is committed when food is deliberately placed on the market, for financial gain deceiving consumers (Woolfe, M. & Primrose, S. 2004). As a result of the increased demand and the globalization of the seafood supply, more fish species are encountered in the market. In this scenary, it becomes essential to unequivocally identify the species. The traditional taxonomy, based primarily on identification keys of species, has shown a number of limitations in the use of the distinctive features in many animal taxa, amplified when fish, crustacean or shellfish are commercially transformed. Many fish species show a similar texture, thus the certification of fish products is particularly important when fishes have undergone procedures which affect the overall anatomical structure, such as heading, slicing or filleting (Marko et al., 2004). The absence of morphological traits, a main characteristic usually used to identify animal species, represents a challenge and molecular identification methods are required. Among them, DNA-based methods are more frequently employed for food authentication (Lockley & Bardsley, 2000). In addition to food authentication and traceability, studies of taxonomy, population and conservation genetics as well as analysis of dietary habits and prey selection, also rely on genetic analyses including the DNA barcoding technology (Arroyave & Stiassny, 2014; Galimberti et al., 2013; Mafra, Ferreira, & Oliveira, 2008; Nicolé et al., 2012; Rasmussen & Morrissey, 2008), consisting in PCR amplification and sequencing of a COI mitochondrial gene specific region. The system proposed by P. Hebert et al. (2003) locates inside the mitochondrial COI gene (cytochrome oxidase subunit I) the bioidentification system useful in taxonomic identification of species (Lo Brutto et al., 2007). The COI region, used for genetic identification - DNA barcode - is short enough to allow, with the current technology, to decode sequence (the pairs of nucleotide bases) in a single step. Despite, this region only represents a tiny fraction of the mitochondrial DNA content in each cell, the COI region has sufficient variability to distinguish the majority of species among them (Biondo et al. 2016). This technique has been already employed to address the demand of assessing the actual identity and/or provenance of marketed products, as well as to unmask mislabelling and fraudulent substitutions, difficult to detect especially in manufactured seafood (Barbuto et al., 2010; Galimberti et al., 2013; Filonzi, Chiesa, Vaghi, & Nonnis Marzano, 2010). Nowadays,the research concerns the use of genetic markers to identify not only the species and/or varieties of fish, but also to identify molecular characters able to trace the origin and to provide an effective control tool forproducers and consumers as a supply chain in agreementwith local regulations.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The Picornaviridae family consists of positive-strand RNA viruses that are the causative agents of a variety of diseases in humans and animals. Few drugs targeting picornaviruses are available, making the discovery of new antivirals a high priority. Here, we identified and characterized three compounds from a library of kinase inhibitors that block replication of poliovirus, coxsackievirus B3, and encephalomyocarditis virus. The antiviral effect of these compounds is not likely related to their known cellular targets because other inhibitors targeting the same pathways did not inhibit viral replication. Using an in vitro translation-replication system, we showed that these drugs inhibit different stages of the poliovirus life cycle. A4(1) inhibited the formation of a functional replication complex, while E5(1) and E7(2) affected replication after the replication complex had formed. A4(1) demonstrated partial protection from paralysis in a murine model of poliomyelitis. Poliovirus resistant to E7(2) had a single mutation in the 3A protein. This mutation was previously found to confer resistance to enviroxime-like compounds, which target either PI4KIIIβ (major enviroxime-like compounds) or OSBP (minor enviroxime-like compounds), cellular factors involved in lipid metabolism and shown to be important for replication of diverse positive-strand RNA viruses. We classified E7(2) as a minor enviroxime-like compound, because the localization of OSBP changed in the presence of this inhibitor. Interestingly, both E7(2) and major enviroxime-like compound GW5074 interfered with the viral polyprotein processing. Multiple attempts to isolate resistant mutants in the presence of A4(1) or E5(1) were unsuccessful, showing that effective broad-spectrum antivirals could be developed on the basis of these compounds. Studies with these compounds shed light on pathways shared by diverse picornaviruses that could be potential targets for the development of broad-spectrum antiviral drugs.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Network Intrusion Detection Systems (NIDS) are computer systems which monitor a network with the aim of discerning malicious from benign activity on that network. While a wide range of approaches have met varying levels of success, most IDSs rely on having access to a database of known attack signatures which are written by security experts. Nowadays, in order to solve problems with false positive alerts, correlation algorithms are used to add additional structure to sequences of IDS alerts. However, such techniques are of no help in discovering novel attacks or variations of known attacks, something the human immune system (HIS) is capable of doing in its own specialised domain. This paper presents a novel immune algorithm for application to the IDS problem. The goal is to discover packets containing novel variations of attacks covered by an existing signature base.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The role of T-cells within the immune system is to confirm and assess anomalous situations and then either respond to or tolerate the source of the effect. To illustrate how these mechanisms can be harnessed to solve real-world problems, we present the blueprint of a T-cell inspired algorithm for computer security worm detection. We show how the three central T-cell processes, namely T-cell maturation, differentiation and proliferation, naturally map into this domain and further illustrate how such an algorithm fits into a complete immune inspired computer security system and framework.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Background: WNT4 is a protein that plays a crucial role in ovarian differentiation and development in mammals, with a relatively well understood function in mammalian gonadal differentiation. The role of Wnt4 in teleost fish; however, remains unclear. In the present study, cDNAs of Wnt4a and Wnt4b were cloned and characterized in the spotted scat. The expression patterns of two Wnt4 genes in the gonads at different stages of development and in fish after treatment with 17α-methyltestosterone (MT) were investigated. Results: The tissue distribution showed that Wnt4a was expressed in various tissues, including the gonads, gills, spleen, brain, and fin. Interestingly, Wnt4b not only was expressed in the gills, brain, and spleen, but also was obviously expressed in the ovary. During gonad development, Wnt4a was highly expressed in the testis at stage I and Wnt4b was mainly expressed in the ovary at stages II–III. After MT treatment, the mRNA expression of Wnt4a increased significantly up to 40 d, and the transcript level of Wnt4b decreased at 20 d. Conclusions: These results suggest that Wnt4a may be involved in gonad development and plays a role in the process of spermatogonial proliferation. Our results also demonstrate that Wnt4b is not only expressed in the nervous system, but also in the ovary and it may be involved in ovary development of the spotted scat.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Plants frequently suffer contaminations by toxigenic fungi, and their mycotoxins can be produced throughout growth, harvest, drying and storage periods. The objective of this work was to validate a method for detection of toxins in medicinal and aromatic plants, through a fast and highly sensitive method, optimizing the joint co-extraction of aflatoxins (AF: AFB1, AFB2, AFG1 and AFG2) and ochratoxin A (OTA) by using Aloysia citrodora P. (lemon verbena) as a case study. For optimization purposes, samples were spiked (n=3) with standard solutions of a mix of the four AFs and OTA at 10 ng/g for AFB1, AFG1 and OTA, and at 6 ng/g of AFB2 and AFG2. Several extraction procedures were tested: i) ultrasound-assisted extraction in sodium chloride and methanol/water (80:20, v/v) [(OTA+AFs)1]; ii) maceration in methanol/1% NaHCO3 (70:30, v/v) [(OTA+AFs)2]; iii) maceration in methanol/1% NaHCO3 (70:30, v/v) (OTA1); and iv) maceration in sodium chloride and methanol/water (80:20, v/v) (AF1). AF and OTA were purified using the mycotoxin-specific immunoaffinity columns AflaTest WB and OchraTest WB (VICAM), respectively. Separation was performed with a Merck Chromolith Performance C18 column (100 x 4.6 mm) by reverse-phase HPLC coupled to a fluorescence detector (FLD) and a photochemical derivatization system (for AF). The recoveries obtained from the spiked samples showed that the single-extraction methods (OTA1 and AF1) performed better than co-extraction methods. For in-house validation of the selected methods OTA1 and AF1, recovery and precision were determined (n=6). The recovery of OTA for method OTA1 was 81%, and intermediate precision (RSDint) was 1.1%. The recoveries of AFB1, AFB2, AFG1 and AFG2 ranged from 64% to 110% for method AF1, with RSDint lower than 5%. Methods OTA1 and AF1 showed precision and recoveries within the legislated values and were found to be suitable for the extraction of OTA and AF for the matrix under study.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Network Intrusion Detection Systems (NIDS) are computer systems which monitor a network with the aim of discerning malicious from benign activity on that network. While a wide range of approaches have met varying levels of success, most IDSs rely on having access to a database of known attack signatures which are written by security experts. Nowadays, in order to solve problems with false positive alerts, correlation algorithms are used to add additional structure to sequences of IDS alerts. However, such techniques are of no help in discovering novel attacks or variations of known attacks, something the human immune system (HIS) is capable of doing in its own specialised domain. This paper presents a novel immune algorithm for application to the IDS problem. The goal is to discover packets containing novel variations of attacks covered by an existing signature base.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

International audience

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Department of Equal Opportunities; Presidency of the Council of Ministries; Province of Rome (metropolitan area)

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Currently, it is accepted that there are three species that were formerly grouped under Candida parapsilosis : C. parapsilosis sensu stricto, Candida orthopsilosis , and Candida metapsilosis . In fact, the antifungal susceptibility profiles and distinct virulence attributes demonstrate the differences in these nosocomial pathogens. An accurate, fast, and economical identification of fungal species has been the main goal in mycology. In the present study, we searched sequences that were available in the GenBank database in order to identify the complete sequence for the internal transcribed spacer (ITS)1-5.8S-ITS2 region, which is comprised of the forward and reverse primers ITS1 and ITS4. Subsequently, an in silico polymerase chain reaction-restriction fragment length polymorphism (PCR-RFLP) was performed to differentiate the C. parapsilosis complex species. Ninety-eight clinical isolates from patients with fungaemia were submitted for analysis, where 59 isolates were identified as C. parapsilosis sensu stricto, 37 were identified as C. orthopsilosis, and two were identified as C. metapsilosis. PCR-RFLP quickly and accurately identified C. parapsilosis complex species, making this method an alternative and routine identification system for use in clinical mycology laboratories.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Detecting abnormalities from multiple correlated time series is valuable to those applications where a credible realtime event prediction system will minimize economic losses (e.g. stock market crash) and save lives (e.g. medical surveillance in the operating theatre). For example, in an intensive care scenario, anesthetists perform a vital role in monitoring the patient and adjusting the flow and type of anesthetics to the patient during an operation. An early awareness of possible complications is vital for an anesthetist to correctly react to a given situation. In this demonstration, we provide a comprehensive medical surveillance system to effectively detect abnormalities from multiple physiological data streams for assisting online intensive care management. Particularly, a novel online support vector regression (OSVR) algorithm is developed to approach the problem of discovering the abnormalities from multiple correlated time series for accuracy and real-time efficiency. We also utilize historical data streams to optimize the precision of the OSVR algorithm. Moreover, this system comprises a friendly user interface by integrating multiple physiological data streams and visualizing alarms of abnormalities. © 2013 IEEE.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

It is remarkable that there are no deployed military hybrid vehicles since battlefield fuel is approximately 100 times the cost of civilian fuel. In the commercial marketplace, where fuel prices are much lower, electric hybrid vehicles have become increasingly common due to their increased fuel efficiency and the associated operating cost benefit. An absence of military hybrid vehicles is not due to a lack of investment in research and development, but rather because applying hybrid vehicle architectures to a military application has unique challenges. These challenges include inconsistent duty cycles for propulsion requirements and the absence of methods to look at vehicle energy in a holistic sense. This dissertation provides a remedy to these challenges by presenting a method to quantify the benefits of a military hybrid vehicle by regarding that vehicle as a microgrid. This innovative concept allowed for the creation of an expandable multiple input numerical optimization method that was implemented for both real-time control and system design optimization. An example of each of these implementations was presented. Optimization in the loop using this new method was compared to a traditional closed loop control system and proved to be more fuel efficient. System design optimization using this method successfully illustrated battery size optimization by iterating through various electric duty cycles. By utilizing this new multiple input numerical optimization method, a holistic view of duty cycle synthesis, vehicle energy use, and vehicle design optimization can be achieved.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Sampling and preconcentration techniques play a critical role in headspace analysis in analytical chemistry. My dissertation presents a novel sampling design, capillary microextraction of volatiles (CMV), that improves the preconcentration of volatiles and semivolatiles in a headspace with high throughput, near quantitative analysis, high recovery and unambiguous identification of compounds when coupled to mass spectrometry. The CMV devices use sol-gel polydimethylsiloxane (PDMS) coated microglass fibers as the sampling/preconcentration sorbent when these fibers are stacked into open-ended capillary tubes. The design allows for dynamic headspace sampling by connecting the device to a hand-held vacuum pump. The inexpensive device can be fitted into a thermal desorption probe for thermal desorption of the extracted volatile compounds into a gas chromatography-mass spectrometer (GC-MS). The performance of the CMV devices was compared with two other existing preconcentration techniques, solid phase microextraction (SPME) and planar solid phase microextraction (PSPME). Compared to SPME fibers, the CMV devices have an improved surface area and phase volume of 5000 times and 80 times, respectively. One (1) minute dynamic CMV air sampling resulted in similar performance as a 30 min static extraction using a SPME fiber. The PSPME devices have been fashioned to easily interface with ion mobility spectrometers (IMS) for explosives or drugs detection. The CMV devices are shown to offer dynamic sampling and can now be coupled to COTS GC-MS instruments. Several compound classes representing explosives have been analyzed with minimum breakthrough even after a 60 min. sampling time. The extracted volatile compounds were retained in the CMV devices when preserved in aluminum foils after sampling. Finally, the CMV sampling device were used for several different headspace profiling applications which involved sampling a shipping facility, six illicit drugs, seven military explosives and eighteen different bacteria strains. Successful detection of the target analytes at ng levels of the target signature volatile compounds in these applications suggests that the CMV devices can provide high throughput qualitative and quantitative analysis with high recovery and unambiguous identification of analytes.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The migratory endoparasitic nematode Bursaphelenchus xylophilus, which is the causal agent of pine wilt disease, has phytophagous and mycetophagous phases during its life cycle. This highly unusual feature distinguishes it from other plantparasitic nematodes and requires profound changes in biology between modes. During the phytophagous stage, the nematode migrates within pine trees, feeding on the contents of parenchymal cells. Like other plant pathogens, B. xylophilus secretes effectors from pharyngeal gland cells into the host during infection.We provide the first description of changes in the morphology of these gland cells between juvenile and adult life stages. Using a comparative transcriptomics approach and an effector identification pipeline, we identify numerous novel parasitism genes which may be important for the mediation of interactions of B. xylophilus with its host. In-depth characterization of all parasitism genes using in situ hybridization reveals two major categories of detoxification proteins, those specifically expressed in either the pharyngeal gland cells or the digestive system. These data suggest that B. xylophilus incorporates effectors in a multilayer detoxification strategy in order to protect itself from host defence responses during phytophagy.