Abstract: Nowadays, robust and secure watermarking algorithm and its optimization have been need of the hour. A watermarking algorithm is presented to achieve the copy right protection of the owner based on visual cryptography, histogram shape property and entropy. In this, both host image and watermark are preprocessed. Host image is preprocessed by using Butterworth filter, and watermark is with visual cryptography. Applying visual cryptography on water mark generates two shares. One share is used for embedding the watermark, and the other one is used for solving any dispute with the aid of trusted authority. Usage of histogram shape makes the process more robust against geometric and signal processing attacks. The combination of visual cryptography, Butterworth filter, histogram, and entropy can make the algorithm more robust, imperceptible, and copy right protection of the owner.
Abstract: The current Syrian crisis has caused unprecedented practices of global mobility. The process of forced eviction and the resettlement of refugees could be seen through the insights of the “new mobilities paradigm”. The mobility of refugees in terms of meaning and practice is a subject that calls for further studies. There is a need for the development of an approach to human mobility to understand a practice that is turning into a phenomenon in the 21st century. This paper aims at studying, from a qualitative point of view, the process of movement within the six constituents of mobility defined as the first phase of the journey of a refugee. The second phase would include the process of settling in and re-defining the host country as new “home” to refugees. The change in the refugee state of mind and crossing the physical and mental borders from a “foreigner” to a citizen is encouraged by both the governmental policies and the local communities’ efforts to embrace these newcomers. The paper would focus on these policies of social and economic integration. The concept of integration connotes the idea that refugees would enjoy the opportunities, rights and services available to the citizens of the refugee’s new community. So, this paper examines this concept through showcasing the two hosting countries of Canada and Egypt, as they provide two contrasting situations in terms of cultural, geographical, economic and political backgrounds. The analysis would highlight the specific policies defined towards the refugees including the mass communication, media calls, and access to employment. This research is part of a qualitative research project on the process of Urban Mobility practiced by the Syrian Refugees, drawing on conversational interviews with new-settlers who have moved to the different hosting countries, from their home in Syria. It explores these immigrants’ practical and emotional relationships with the process of movement and settlement. It uses the conversational interviews as a tool to document analysis and draw relationships in an attempt to establish an understanding of the factors that contribute to the new-settlers feeling of home and integration within the new community.
Abstract: Wireless Sensor Networks (WSNs) have many advantages. Their deployment is easier and faster than wired sensor networks or other wireless networks, as they do not need fixed infrastructure. Nodes are partitioned into many small groups named clusters to aggregate data through network organization. WSN clustering guarantees performance achievement of sensor nodes. Sensor nodes energy consumption is reduced by eliminating redundant energy use and balancing energy sensor nodes use over a network. The aim of such clustering protocols is to prolong network life. Low Energy Adaptive Clustering Hierarchy (LEACH) is a popular protocol in WSN. LEACH is a clustering protocol in which the random rotations of local cluster heads are utilized in order to distribute energy load among all sensor nodes in the network. This paper proposes Connected Dominant Set (CDS) based cluster formation. CDS aggregates data in a promising approach for reducing routing overhead since messages are transmitted only within virtual backbone by means of CDS and also data aggregating lowers the ratio of responding hosts to the hosts existing in virtual backbones. CDS tries to increase networks lifetime considering such parameters as sensors lifetime, remaining and consumption energies in order to have an almost optimal data aggregation within networks. Experimental results proved CDS outperformed LEACH regarding number of cluster formations, average packet loss rate, average end to end delay, life computation, and remaining energy computation.
Abstract: One of the leading problems in Cyber Security today
is the emergence of targeted attacks conducted by adversaries with
access to sophisticated tools. These attacks usually steal senior level
employee system privileges, in order to gain unauthorized access to
confidential knowledge and valuable intellectual property. Malware
used for initial compromise of the systems are sophisticated and
may target zero-day vulnerabilities. In this work we utilize common
behaviour of malware called ”beacon”, which implies that infected
hosts communicate to Command and Control servers at regular
intervals that have relatively small time variations. By analysing
such beacon activity through passive network monitoring, it is
possible to detect potential malware infections. So, we focus on
time gaps as indicators of possible C2 activity in targeted enterprise
networks. We represent DNS log files as a graph, whose vertices
are destination domains and edges are timestamps. Then by using
four periodicity detection algorithms for each pair of internal-external
communications, we check timestamp sequences to identify the
beacon activities. Finally, based on the graph structure, we infer the
existence of other infected hosts and malicious domains enrolled in
the attack activities.
Abstract: Pectinatella magnifica (Leidy, 1851) is an invasive freshwater animal that lives in colonies. A colony of Pectinatella magnifica (a gelatinous blob) can be up to several feet in diameter large and under favorable conditions it exhibits an extreme growth rate. Recently European countries around rivers of Elbe, Oder, Danube, Rhine and Vltava have confirmed invasion of Pectinatella magnifica, including freshwater reservoirs in South Bohemia (Czech Republic). Our project (Czech Science Foundation, GAČR P503/12/0337) is focused onto biology and chemistry of Pectinatella magnifica. We monitor the organism occurrence in selected South Bohemia ponds and sandpits during the last years, collecting information about physical properties of surrounding water, and sampling the colonies for various analyses (classification, maps of secondary metabolites, toxicity tests). Because the gelatinous matrix is during the colony lifetime also a host for algae, bacteria and cyanobacteria (co-habitants), in this contribution, we also applied a high performance liquid chromatography (HPLC) method for determination of potentially present cyanobacterial toxins (microcystin-LR, microcystin-RR, nodularin). Results from the last 3-year monitoring show that these toxins are under limit of detection (LOD), so that they do not represent a danger yet. The final goal of our study is to assess toxicity risks related to fresh water resources invaded by Pectinatella magnifica, and to understand the process of invasion, which can enable to control it.
Abstract: The emergence of Cloud data centers has revolutionized
the IT industry. Private Clouds in specific provide Cloud services
for certain group of customers/businesses. In a real-time private
Cloud each task that is given to the system has a deadline that
desirably should not be violated. Scheduling tasks in a real-time
private CLoud determine the way available resources in the system
are shared among incoming tasks. The aim of the scheduling policy is
to optimize the system outcome which for a real-time private Cloud
can include: energy consumption, deadline violation, execution time
and the number of host switches. Different scheduling policies can be
used for scheduling. Each lead to a sub-optimal outcome in a certain
settings of the system. A Bayesian Scheduling strategy is proposed
for scheduling to further improve the system outcome. The Bayesian
strategy showed to outperform all selected policies. It also has the
flexibility in dealing with complex pattern of incoming task and has
the ability to adapt.
Abstract: Nanocomposites of isotactic polypropylene (iPP) and
date wood fiber were prepared after modification of the host matrix
by reactive extrusion grafting of maleic anhydride. Chemical and
mechanical treatment of date wood flour (WF) was conducted to
obtain nanocrystalline cellulose. Layered silicates (clay) were
partially intercalated with date wood fiber, and the modified layered
silicate was used as filler in the PP matrix via a melt-blending
process. The tensile strength of composites prepared from wood fiber
modified clay was greater than that of the iPP-clay and iPP-WF
composites at a 6% filler concentration, whereas deterioration of
mechanical properties was observed when clay and WF were used
alone for reinforcement. The dispersion of the filler in the matrix
significantly decreased after clay modification with cellulose at
higher concentrations, as shown by X-ray diffraction (XRD) data.
Abstract: The early-stage damage detection in offshore
structures requires continuous structural health monitoring and for the
large area the position of sensors will also plays an important role in
the efficient damage detection. Determining the dynamic behavior of
offshore structures requires dense deployment of sensors. The wired
Structural Health Monitoring (SHM) systems are highly expensive
and always needs larger installation space to deploy. Wireless sensor
networks can enhance the SHM system by deployment of scalable
sensor network, which consumes lesser space. This paper presents the
results of wireless sensor network based Structural Health Monitoring
method applied to a scaled experimental model of offshore structure
that underwent wave loading. This method determines the
serviceability of the offshore structure which is subjected to various
environment loads. Wired and wireless sensors were installed in the
model and the response of the scaled BLSRP model under wave
loading was recorded. The wireless system discussed in this study is
the Raspberry pi board with Arm V6 processor which is programmed
to transmit the data acquired by the sensor to the server using Wi-Fi
adapter, the data is then hosted in the webpage. The data acquired
from the wireless and wired SHM systems were compared and the
design of the wireless system is verified.
Abstract: A myriad of environmental issues face the Nigerian
industrial region, resulting from; oil and gas production, mining,
manufacturing and domestic wastes. Amidst these, much effort has
been directed by stakeholders in the Nigerian oil producing regions,
because of the impacts of the region on the wider Nigerian economy.
Although collaborative environmental management has been noted as
an effective approach in managing environmental issues, little
attention has been given to the roles and practices of stakeholders in
effecting a collaborative environmental management framework for
the Nigerian oil-producing region. This paper produces a framework
to expand and deepen knowledge relating to stakeholders aspects of
collaborative roles in managing environmental issues in the Nigeria
oil-producing region. The knowledge is derived from analysis of
stakeholders’ practices – studied through multiple case studies using
document analysis. Selected documents of key stakeholders –
Nigerian government agencies, multi-national oil companies and host
communities, were analyzed. Open and selective coding was
employed manually during document analysis of data collected from
the offices and websites of the stakeholders. The findings showed
that the stakeholders have a range of roles, practices, interests, drivers
and barriers regarding their collaborative roles in managing
environmental issues. While they have interests for efficient resource
use, compliance to standards, sharing of responsibilities, generating
of new solutions, and shared objectives; there is evidence of major
barriers and these include resource allocation, disjointed policy,
ineffective monitoring, diverse socio- economic interests, lack of
stakeholders’ commitment and limited knowledge sharing. However,
host communities hold deep concerns over the collaborative roles of
stakeholders for economic interests, particularly, where government
agencies and multi-national oil companies are involved. With these
barriers and concerns, a genuine stakeholders’ collaboration is found
to be limited, and as a result, optimal environmental management
practices and policies have not been successfully implemented in the
Nigeria oil-producing region. A framework is produced that describes
practices that characterize collaborative environmental management
might be employed to satisfy the stakeholders’ interests. The
framework recommends critical factors, based on the findings, which
may guide a collaborative environmental management in the oil
producing regions. The recommendations are designed to re-define
the practices of stakeholders in managing environmental issues in the
oil producing regions, not as something wholly new, but as an
approach essential for implementing a sustainable environmental
policy. This research outcome may clarify areas for future research as
well as to contribute to industry guidance in the area of collaborative
environmental management.
Abstract: In the past years electric mobility became part of a
public discussion. The trend to fully electrified vehicles instead of
vehicles fueled with fossil energy has notably gained momentum.
Today nearly every big car manufacturer produces and sells fully
electrified vehicles, but electrified vehicles are still not as competitive
as conventional powered vehicles. As the traction battery states the
largest cost driver, lowering its price is a crucial objective. In
addition to improvements in product and production processes a nonnegligible,
but widely underestimated cost driver of production can
be found in logistics, since the production technology is not
continuous yet and neither are the logistics systems. This paper presents an approach to evaluate cost factors on
different designs of load carrier systems. Due to numerous
interdependencies, the combination of costs factors for a particular
scenario is not transparent. This is effecting actions for cost reduction
negatively, but still cost reduction is one of the major goals for
simultaneous engineering processes. Therefore a concurrent and
phase appropriate cost valuation method is necessary to serve cost
transparency. In this paper the four phases of this cost valuation
method are defined and explained, which based upon a new approach
integrating the logistics development process in to the integrated
product and process development.
Abstract: This paper focuses on the orbit avoidance strategy of
the optical remote sensing satellite. The optical remote sensing
satellite, moving along the Sun-synchronous orbit, is equipped with
laser warning equipment to alert CCD camera from laser attacks. This
paper explores the strategy of satellite avoidance to protect the CCD
camera and also the satellite. The satellite could evasive to several
target points in the orbital coordinates of virtual satellite. The so-called
virtual satellite is a passive vehicle which superposes the satellite at the
initial stage of avoidance. The target points share the consistent cycle
time and the same semi-major axis with the virtual satellite, which
ensures the properties of the satellite’s Sun-synchronous orbit remain
unchanged. Moreover, to further strengthen the avoidance capability
of satellite, it can perform multi-target-points avoid maneuvers. On
occasions of fulfilling the satellite orbit tasks, the orbit can be restored
back to virtual satellite through orbit maneuvers. There into, the avoid
maneuvers adopts pulse guidance. In addition, the fuel consumption is
optimized. The avoidance strategy discussed in this article is
applicable to optical remote sensing satellite when it is encountered
with hostile attack of space-based laser anti-satellite.
Abstract: This paper evaluates the accrual based scheduling for
cloud in single and multi-resource system. Numerous organizations
benefit from Cloud computing by hosting their applications. The
cloud model provides needed access to computing with potentially
unlimited resources. Scheduling is tasks and resources mapping to a
certain optimal goal principle. Scheduling, schedules tasks to virtual
machines in accordance with adaptable time, in sequence under
transaction logic constraints. A good scheduling algorithm improves
CPU use, turnaround time, and throughput. In this paper, three realtime
cloud services scheduling algorithm for single resources and
multiple resources are investigated. Experimental results show
Resource matching algorithm performance to be superior for both
single and multi-resource scheduling when compared to benefit first
scheduling, Migration, Checkpoint algorithms.
Abstract: Second generation military Filipino Amerasians
comprise a formidable contemporary segment of the estimated
250,000-plus biracial Amerasians in the Philippines today. Overall,
they are a stigmatized and socioeconomically marginalized diaspora;
historically, they were abandoned or estranged by U.S. military
personnel fathers assigned during the century-long Colonial, Post-
World War II and Cold War Era of permanent military basing (1898-
1992). Indeed, U.S. military personnel are assigned in smaller
numbers in the Philippines today. This inquiry is an outgrowth of two
recent small sample studies. The first surfaced the impact of the U.S.
military prostitution system on formation of the ‘Derivative
Amerasian Family Construct’ on first generation Amerasians; a
second, qualitative case study suggested the continued effect of the
prostitution systems' destructive impetuous on second generation
Amerasians. The intent of this current qualitative, multiple-case study
was to actively seek out second generation sex industry toilers. The
purpose was to focus further on this human phenomenon in the postbasing
and post-military prostitution system eras. As background, the
former military prostitution apparatus has transformed into a modern
dynamic of rampant sex tourism and prostitution nationwide. This is
characterized by hotel and resorts offering unrestricted carnal access,
urban and provincial brothels (casas), discos, bars and pickup clubs,
massage parlors, local barrio karaoke bars and street prostitution. A
small case study sample (N = 4) of female and male second
generation Amerasians were selected. Sample formation employed a
non-probability ‘snowball’ technique drawing respondents from the
notorious Angeles, Metro Manila, Olongapo City ‘AMO Amerasian
Triangle’ where most former U.S. military installations were sited
and modern sex tourism thrives. A six-month study and analysis of
in-depth interviews of female and male sex laborers, their families
and peers revealed a litany of disturbing, and troublesome
experiences. Results showed profiles of debilitating human poverty,
history of family disorganization, stigmatization, social
marginalization and the ghost of the military prostitution system and
its harmful legacy on Amerasian family units. Emerging were testimonials of wayward young people ensnared in a maelstrom of
deep economic deprivation, familial dysfunction, psychological
desperation and societal indifference. The paper recommends that
more study is needed and implications of unstudied psychosocial and
socioeconomic experiences of distressed younger generations of
military Amerasians require specific research. Heretofore apathetic or
disengaged U.S. institutions need to confront the issue and formulate
activist and solution-oriented social welfare, human services and
immigration easement policies and alternatives. These institutions
specifically include academic and social science research agencies,
corporate foundations, the U.S. Congress, and Departments of State,
Defense and Health and Human Services, and Homeland Security
(i.e. Citizen and Immigration Services) It is them who continue to
endorse a laissez-faire policy of non-involvement over the entire
Filipino Amerasian question. Such apathy, the paper concludes,
relegates this consequential but neglected blood progeny to the status
of humiliating destitution and exploitation. Amerasians; thus, remain
entrapped in their former colonial, and neo-colonial habitat.
Ironically, they are unwitting victims of a U.S. American homeland
that fancies itself geo-politically as a strong and strategic military
treaty ally of the Philippines in the Western Pacific.
Abstract: This paper seeks to assess the implications of
insurance to foreign direct investment inflow in Nigeria. Multiple
linear regression technique and correlation matrix test were employed
to measure the extent to which foreign direct investment was
influenced. The result showed that insurance premium (IP), asset size
of insurance industry (AS), and total investment of the industry (TI)
impacted significantly and positively on foreign direct investment
inflow in Nigeria. There should be effective risk transfer mechanism
and financial intermediation, which gives the investor confidence in
the risk management strength of the host country.
Abstract: Sewer deposits have been identified as a major cause
of dysfunctions in combined sewer systems regarding sewer
management, which induces different negative consequents resulting
in poor hydraulic conveyance, environmental damages as well as
worker’s health. In order to overcome the problematics of
sedimentation, flushing has been considered as the most operative
and cost-effective way to minimize the sediments impacts and
prevent such challenges. Flushing, by prompting turbulent wave
effects, can modify the bed form depending on the hydraulic
properties and geometrical characteristics of the conduit. So far, the
dynamics of the bed-load during high-flow events in combined sewer
systems as a complex environment is not well understood, mostly due
to lack of measuring devices capable to work in the “hostile” in
combined sewer system correctly. In this regards, a one-episode
flushing issue from an opening gate valve with weir function was
carried out in a trunk sewer in Paris to understand its cleansing
efficiency on the sediments (thickness: 0-30 cm). During more than
1h of flushing within 5 m distance in downstream of this flushing
device, a maximum flowrate and a maximum level of water have
been recorded at 5 m in downstream of the gate as 4.1 m3/s and 2.1
m respectively. This paper is aimed to evaluate the efficiency of this
type of gate for around 1.1 km (from the point -50 m to +1050 m in
downstream from the gate) by (i) determining bed grain-size
distribution and sediments evolution through the sewer channel, as
well as their organic matter content, and (ii) identifying sections that
exhibit more changes in their texture after the flush. For the first one,
two series of sampling were taken from the sewer length and then
analyzed in laboratory, one before flushing and second after, at same
points among the sewer channel. Hence, a non-intrusive sampling
instrument has undertaken to extract the sediments smaller than the
fine gravels. The comparison between sediments texture after the
flush operation and the initial state, revealed the most modified zones
by the flush effect, regarding the sewer invert slope and hydraulic
parameters in the zone up to 400 m from the gate. At this distance,
despite the increase of sediment grain-size rages, D50 (median grainsize)
varies between 0.6 mm and 1.1 mm compared to 0.8 mm and 10
mm before and after flushing, respectively. Overall, regarding the
sewer channel invert slope, results indicate that grains smaller than
sands (< 2 mm) are more transported to downstream along about 400
m from the gate: in average 69% before against 38% after the flush
with more dispersion of grain-sizes distributions. Furthermore, high
effect of the channel bed irregularities on the bed material evolution
has been observed after the flush.
Abstract: This study integrates a larger research empirical
project that examines second language (SL) learners’ profiles and
valid procedures to perform complete and diagnostic assessment in
schools. 102 learners of Portuguese as a SL aged 7 and 17 years
speakers of distinct home languages were assessed in several
linguistic tasks. In this article, we focused on writing performance in
the specific task of narrative essay composition. The written outputs
were measured using the score in six components adapted from an
English SL assessment context (Alberta Education): linguistic
vocabulary, grammar, syntax, strategy, socio-linguistic, and
discourse. The writing processes and strategies in Portuguese
language used by different immigrant students were analysed to
determine features and diversity of deficits on authentic texts
performed by SL writers. Differentiated performance was based on
the diversity of the following variables: grades, previous schooling,
home language, instruction in first language, and exposure to
Portuguese as Second Language. Indo-Aryan languages speakers
showed low writing scores compared to their peers and the type of
language and respective cognitive mapping (such as Mandarin and
Arabic) was the predictor, not linguistic distance. Home language
instruction should also be prominently considered in further research
to understand specificities of cognitive academic profile in a
Romance languages learning context. Additionally, this study also
examined the teachers’ representations that will be here addressed to
understand educational implications of second language teaching in
psychological distress of different minorities in schools of specific
host countries.
Abstract: In this paper, we propose moving object detection
method which is helpful for driver to safely take his/her car out of
parking lot. When moving objects such as motorbikes, pedestrians,
the other cars and some obstacles are detected at the rear-side of host
vehicle, the proposed algorithm can provide to driver warning. We
assume that the host vehicle is just before departure. Gaussian
Mixture Model (GMM) based background subtraction is basically
applied. Pre-processing such as smoothing and post-processing as
morphological filtering are added. We examine “which color space
has better performance for detection of moving objects?” Three color
spaces including RGB, YCbCr, and Y are applied and compared, in
terms of detection rate. Through simulation, we prove that RGB
space is more suitable for moving object detection based on
background subtraction.
Abstract: Any signal transmitted over a channel is corrupted by noise and interference. A host of channel coding techniques has been proposed to alleviate the effect of such noise and interference. Among these Turbo codes are recommended, because of increased capacity at higher transmission rates and superior performance over convolutional codes. The multimedia elements which are associated with ample amount of data are best protected by Turbo codes. Turbo decoder employs Maximum A-posteriori Probability (MAP) and Soft Output Viterbi Decoding (SOVA) algorithms. Conventional Turbo coded systems employ Equal Error Protection (EEP) in which the protection of all the data in an information message is uniform. Some applications involve Unequal Error Protection (UEP) in which the level of protection is higher for important information bits than that of other bits. In this work, enhancement to the traditional Log MAP decoding algorithm is being done by using optimized scaling factors for both the decoders. The error correcting performance in presence of UEP in Additive White Gaussian Noise channel (AWGN) and Rayleigh fading are analyzed for the transmission of image with Discrete Cosine Transform (DCT) as source coding technique. This paper compares the performance of log MAP, Modified log MAP (MlogMAP) and Enhanced log MAP (ElogMAP) algorithms used for image transmission. The MlogMAP algorithm is found to be best for lower Eb/N0 values but for higher Eb/N0 ElogMAP performs better with optimized scaling factors. The performance comparison of AWGN with fading channel indicates the robustness of the proposed algorithm. According to the performance of three different message classes, class3 would be more protected than other two classes. From the performance analysis, it is observed that ElogMAP algorithm with UEP is best for transmission of an image compared to Log MAP and MlogMAP decoding algorithms.
Abstract: Encapsulated O-rings are specifically designed to address the problem of sealing the most hostile chemicals and extreme temperature applications. Ultrasonic vibration hot embossing and ultrasonic welding techniques provide a fast and reliable method to fabricate encapsulated O-ring. This paper performs the design and analysis method of the acoustic horns with double extrusion to process tube double side flange simultaneously. The paper deals with study through Finite Element Method (FEM) of ultrasonic stepped horn used to process a capsulated O-ring, the theoretical dimensions of horns, and their natural frequencies and amplitudes are obtained through the simulations of COMOSOL software. Furthermore, real horns were fabricated, tested and verified to proof the practical utility of these horns.
Abstract: In the immunologic sense, clinical infection is a state
of failure of the immune system to combat the pathogenic weapon of
the bacteria invading the host. A motile gram negative vibroid
organism associated with marked mono and poly nuclear cell
responses was traced during the examination of a clinical material
from an infected common carp Cyprinus carpio. On primary plate
culture, growth was shown to be pure, dense population of an
Aeromonas-like colony morphotype. The pure isolate was found to
be; Aerobic, facultatively anaerobic, non-halophilic, grew at 0C, and
37C, oxidase positive utilizes glucose through fermentative pathway,
resist 0/129 and novobiocin, produces alanine and lysine
decarboxylases but non-producing ornithine dehydrolases. Tests for
the in vitro determinants of pathogenicity has shown to be; Betahaemolytic
onto blood agar, gelatinase, casienase and amylase
producer. Three in vivo determinants of pathogenicity were tested as,
the lethal dose fifty, the pathogenesis and pathogenicity. It was
evident that 0.1 milliliter of the causal bacterial cell suspension of a
density 1 x 107 CFU/ml injected intramuscularly into an average of
100gms fish toke five days incubation period, then at the day six
morbidity and mortality were initiated. LD50 was recorded at the day
12 post-infection. Use of an LD50 doses to study the pathogenicity,
reveals mononuclear and polynuclear cell responses, on examining
the stained direct films of the clinical materials from the
experimentally infected fish. Re-isolation tests confirm that the reisolant
is same. The course of the infection in natural case was shown
manifestation of; skin ulceration, haemorrhage and descaling. On
evisceration, the internal organs were shown; congestion in the
intestines, spleen and, air sacs. The induced infection showed a
milder form of these manifestations. The grading of the virulence of
this organism was virulent causing chronic course of infections as
indicated from the pathogenesis and pathogenicity studies. Thus the
infectious bacteria were consistent with Aeromonas hydrophila, and
the infection was chronic.