Search results for: violation data discovery
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 25800

Search results for: violation data discovery

25470 Membrane Permeability of Middle Molecules: A Computational Chemistry Approach

Authors: Sundaram Arulmozhiraja, Kanade Shimizu, Yuta Yamamoto, Satoshi Ichikawa, Maenaka Katsumi, Hiroaki Tokiwa

Abstract:

Drug discovery is shifting from small molecule based drugs targeting local active site to middle molecules (MM) targeting large, flat, and groove-shaped binding sites, for example, protein-protein interface because at least half of all targets assumed to be involved in human disease have been classified as “difficult to drug” with traditional small molecules. Hence, MMs such as peptides, natural products, glycans, nucleic acids with various high potent bioactivities become important targets for drug discovery programs in the recent years as they could be used for ‘undruggable” intracellular targets. Cell membrane permeability is one of the key properties of pharmacodynamically active MM drug compounds and so evaluating this property for the potential MMs is crucial. Computational prediction for cell membrane permeability of molecules is very challenging; however, recent advancement in the molecular dynamics simulations help to solve this issue partially. It is expected that MMs with high membrane permeability will enable drug discovery research to expand its borders towards intracellular targets. Further to understand the chemistry behind the permeability of MMs, it is necessary to investigate their conformational changes during the permeation through membrane and for that their interactions with the membrane field should be studied reliably because these interactions involve various non-bonding interactions such as hydrogen bonding, -stacking, charge-transfer, polarization dispersion, and non-classical weak hydrogen bonding. Therefore, parameters-based classical mechanics calculations are hardly sufficient to investigate these interactions rather, quantum mechanical (QM) calculations are essential. Fragment molecular orbital (FMO) method could be used for such purpose as it performs ab initio QM calculations by dividing the system into fragments. The present work is aimed to study the cell permeability of middle molecules using molecular dynamics simulations and FMO-QM calculations. For this purpose, a natural compound syringolin and its analogues were considered in this study. Molecular simulations were performed using NAMD and Gromacs programs with CHARMM force field. FMO calculations were performed using the PAICS program at the correlated Resolution-of-Identity second-order Moller Plesset (RI-MP2) level with the cc-pVDZ basis set. The simulations clearly show that while syringolin could not permeate the membrane, its selected analogues go through the medium in nano second scale. These correlates well with the existing experimental evidences that these syringolin analogues are membrane-permeable compounds. Further analyses indicate that intramolecular -stacking interactions in the syringolin analogues influenced their permeability positively. These intramolecular interactions reduce the polarity of these analogues so that they could permeate the lipophilic cell membrane. Conclusively, the cell membrane permeability of various middle molecules with potent bioactivities is efficiently studied using molecular dynamics simulations. Insight of this behavior is thoroughly investigated using FMO-QM calculations. Results obtained in the present study indicate that non-bonding intramolecular interactions such as hydrogen-bonding and -stacking along with the conformational flexibility of MMs are essential for amicable membrane permeation. These results are interesting and are nice example for this theoretical calculation approach that could be used to study the permeability of other middle molecules. This work was supported by Japan Agency for Medical Research and Development (AMED) under Grant Number 18ae0101047.

Keywords: fragment molecular orbital theory, membrane permeability, middle molecules, molecular dynamics simulation

Procedia PDF Downloads 189
25469 Does Innovation Impact on Performance of Organizations? An Empirical Discovery

Authors: Zachary Bolo Awino

Abstract:

The need to gain and sustain a competitive advantage is overwhelming for businesses, especially now with cut throat competition. Innovation has been suggested as one way of gaining the advantage sustainably. But innovation can only happen within certain enabling environment and cultures. This study had one hypothesis: that there is no relationship between innovation and performance. This research was a cross sectional survey in which variables of interest are not controlled or manipulated. The cross sectional survey design is also appropriate for this study as it improves accuracy in generalizing findings, since it involves detailed study of a unit. Also known as one shot study, this design enhances uniform data collection and comparison across respondents. The population of the study was the 55 publicly quoted corporations in the Nairobi Securities Exchange (NSE) as at October 2013.The number was initially envisaged to be 60 but 5 firms were delisted or suspended during the year, hence leaving 55 firms as the population of study. The rationale for the choice for these firms is because they cut across the key economic sectors in Kenyan economy which include agriculture, commercial and services, manufacturing, finance and investment. This was a census survey and targeted all the firms listed at the Nairobi Securities Exchange as of October 2013. The primary data for the study was collected through the use of a structured questionnaire. A five point type Likert scale ranging from 1 - denoting to a less event to 5 - denoting to a greater extent was used. Respondents were from senior management of NSE. From the analyses, the study established that there was a strong positive relationship between innovation and performance, and organization innovation significantly contributes to employee engagement. Also there was a moderate positive relationship between innovation and performance. The study drew expressions of interrelations between various variables, offered generalization of understanding and meaning of these relationships, thus expanding the frontiers of knowledge both theoretical and practical with respect to innovation and firm performance. Major conclusion in this study was that there is a positive strong relationship between innovation and major measures of firm performance.

Keywords: emperical, innovation, NSE, organizations, performance

Procedia PDF Downloads 281
25468 Didactical and Semiotic Affordance of GeoGebra in a Productive Mathematical Discourse

Authors: Isaac Benning

Abstract:

Using technology to expand the learning space is critical for a productive mathematical discourse. This is a case study of two teachers who developed and enacted GeoGebra-based mathematics lessons following their engagement in a two-year professional development. The didactical and semiotic affordance of GeoGebra in widening the learning space for a productive mathematical discourse was explored. The approach of thematic analysis was used for lesson artefact, lesson observation, and interview data. The results indicated that constructing tools in GeoGebra provided a didactical milieu where students used them to explore mathematical concepts with little or no support from their teacher. The prompt feedback from the GeoGebra motivated students to practice mathematical concepts repeatedly in which they privately rethink their solutions before comparing their answers with that of their colleagues. The constructing tools enhanced self-discovery, team spirit, and dialogue among students. With regards to the semiotic construct, the tools widened the physical and psychological atmosphere of the classroom by providing animations that served as virtual concrete to enhance the recording, manipulation, testing of a mathematical idea, construction, and interpretation of geometric objects. These findings advance the discussion of widening the classroom for a productive mathematical discourse within the context of the mathematics curriculum of Ghana and similar Sub-Saharan African countries.

Keywords: GeoGebra, theory of didactical situation, semiotic mediation, mathematics laboratory, mathematical discussion

Procedia PDF Downloads 132
25467 An Empirical Analysis of the Effects of Corporate Derivatives Use on the Underlying Stock Price Exposure: South African Evidence

Authors: Edson Vengesai

Abstract:

Derivative products have become essential instruments in portfolio diversification, price discovery, and, most importantly, risk hedging. Derivatives are complex instruments; their valuation, volatility implications, and real impact on the underlying assets' behaviour are not well understood. Little is documented empirically, with conflicting conclusions on how these instruments affect firm risk exposures. Given the growing interest in using derivatives in risk management and portfolio engineering, this study examines the practical impact of derivative usage on the underlying stock price exposure and systematic risk. The paper uses data from South African listed firms. The study employs GARCH models to understand the effect of derivative uses on conditional stock volatility. The GMM models are used to estimate the effect of derivatives use on stocks' systematic risk as measured by Beta and on the total risk of stocks as measured by the standard deviation of returns. The results provide evidence on whether derivatives use is instrumental in reducing stock returns' systematic and total risk. The results are subjected to numerous controls for robustness, including financial leverage, firm size, growth opportunities, and macroeconomic effects.

Keywords: derivatives use, hedging, volatility, stock price exposure

Procedia PDF Downloads 112
25466 Homogeneous Anti-Corrosion Coating of Spontaneously Dissolved Defect-Free Graphene

Authors: M. K. Bin Subhan, P. Cullen, C. Howard

Abstract:

A recent study by the World Corrosion Organization estimated that corrosion related damage causes $2.5tr worth of damage every year. As such, a low cost easily scalable solution is required to the corrosion problem which is economically viable. Graphene is an ideal anti-corrosion barrier layer material due to its excellent barrier properties and chemical stability, which makes it impermeable to all molecules. However, attempts to employ graphene as a barrier layer has been hampered by the fact that defect sites in graphene accelerate corrosion due to the inert nature of graphene which promotes galvanic corrosion at the expense of the metal. The recent discovery of spontaneous dissolution of charged graphite intercalation compounds in aprotic solvents enables defect free graphene platelets to be employed for anti-corrosion applications. These ‘inks’ of defect-free charged graphene platelets in solution can be coated onto a metallic surfaces via electroplating to form a homogeneous barrier layer. In this paper, initial data showing homogeneous coatings of graphene barrier layers on steel coupons via electroplating will be presented. This easily scalable technique also provides a controllable method for applying different barrier thicknesses from ultra thin layers to thick opaque coatings making it useful for a wide range of applications.

Keywords: anti-corrosion, defect-free, electroplating, graphene

Procedia PDF Downloads 131
25465 Neuroblastoma in Children and the Potential Involvement of Viruses in Its Pathogenesis

Authors: Ugo Rovigatti

Abstract:

Neuroblastoma (NBL) has epitomized for at least 40 years our understanding of cancer cellular and molecular biology and its potential applications to novel therapeutic strategies. This includes the discovery of the very first oncogene aberrations and tumorigenesis suppression by differentiation in the 80s; the potential role of suppressor genes in the 90s; the relevance of immunotherapy in the millennium first, and the discovery of additional mutations by NGS technology in the millennium second decade. Similar discoveries were achieved in the majority of human cancers, and similar therapeutic interventions were obtained subsequently to NBL discoveries. Unfortunately, targeted therapies suggested by specific mutations (such as MYCN amplification –MNA- present in ¼ or 1/5 of cases) have not elicited therapeutic successes in aggressive NBL, where the prognosis is still dismal. The reasons appear to be linked to Tumor Heterogeneity, which is particularly evident in NBL but also a clear hallmark of aggressive human cancers generally. The new avenue of cancer immunotherapy (CIT) provided new hopes for cancer patients, but we still ignore the cellular or molecular targets. CIT is emblematic of high-risk disease (HR-NBL) since the mentioned GD2 passive immunotherapy is still providing better survival. We recently critically reviewed and evaluated the literature depicting the genomic landscapes of HR-NBL, coming to the qualified conclusion that among hundreds of affected genes, potential targets, or chromosomal sites, none correlated with anti-GD2 sensitivity. A better explanation is provided by the Micro-Foci inducing Virus (MFV) model, which predicts that neuroblasts infection with the MFV, an RNA virus isolated from a cancer-cluster (space-time association) of HR-NBL cases, elicits the appearance of MNA and additional genomic aberrations with mechanisms resembling chromothripsis. Neuroblasts infected with low titers of MFV amplified MYCN up to 100 folds and became highly transformed and malignant, thus causing neuroblastoma in young rat pups of strains SD and Fisher-344 and larger tumor masses in nu/nu mice. An association was discovered with GD2 since this glycosphingolipid is also the receptor for the family of MFV virus (dsRNA viruses). It is concluded that a dsRNA virus, MFV, appears to provide better explicatory mechanisms for the genesis of i) specific genomic aberrations such as MNA; ii) extensive tumor heterogeneity and chromothripsis; iii) the effects of passive immunotherapy with anti-GD2 monoclonals and that this and similar models should be further investigated in both pediatric and adult cancers.

Keywords: neuroblastoma, MYCN, amplification, viruses, GD2

Procedia PDF Downloads 100
25464 A Computational Investigation of Potential Drugs for Cholesterol Regulation to Treat Alzheimer’s Disease

Authors: Marina Passero, Tianhua Zhai, Zuyi (Jacky) Huang

Abstract:

Alzheimer’s disease has become a major public health issue, as indicated by the increasing populations of Americans living with Alzheimer’s disease. After decades of extensive research in Alzheimer’s disease, only seven drugs have been approved by Food and Drug Administration (FDA) to treat Alzheimer’s disease. Five of these drugs were designed to treat the dementia symptoms, and only two drugs (i.e., Aducanumab and Lecanemab) target the progression of Alzheimer’s disease, especially the accumulation of amyloid-b plaques. However, controversial comments were raised for the accelerated approvals of either Aducanumab or Lecanemab, especially with concerns on safety and side effects of these two drugs. There is still an urgent need for further drug discovery to target the biological processes involved in the progression of Alzheimer’s disease. Excessive cholesterol has been found to accumulate in the brain of those with Alzheimer’s disease. Cholesterol can be synthesized in both the blood and the brain, but the majority of biosynthesis in the adult brain takes place in astrocytes and is then transported to the neurons via ApoE. The blood brain barrier separates cholesterol metabolism in the brain from the rest of the body. Various proteins contribute to the metabolism of cholesterol in the brain, which offer potential targets for Alzheimer’s treatment. In the astrocytes, SREBP cleavage-activating protein (SCAP) binds to Sterol Regulatory Element-binding Protein 2 (SREBP2) in order to transport the complex from the endoplasmic reticulum to the Golgi apparatus. Cholesterol is secreted out of the astrocytes by ATP-Binding Cassette A1 (ABCA1) transporter. Lipoprotein receptors such as triggering receptor expressed on myeloid cells 2 (TREM2) internalize cholesterol into the microglia, while lipoprotein receptors such as Low-density lipoprotein receptor-related protein 1 (LRP1) internalize cholesterol into the neuron. Cytochrome P450 Family 46 Subfamily A Member 1 (CYP46A1) converts excess cholesterol to 24S-hydroxycholesterol (24S-OHC). Cholesterol has been approved for its direct effect on the production of amyloid-beta and tau proteins. The addition of cholesterol to the brain promotes the activity of beta-site amyloid precursor protein cleaving enzyme 1 (BACE1), secretase, and amyloid precursor protein (APP), which all aid in amyloid-beta production. The reduction of cholesterol esters in the brain have been found to reduce phosphorylated tau levels in mice. In this work, a computational pipeline was developed to identify the protein targets involved in cholesterol regulation in brain and further to identify chemical compounds as the inhibitors of a selected protein target. Since extensive evidence shows the strong correlation between brain cholesterol regulation and Alzheimer’s disease, a detailed literature review on genes or pathways related to the brain cholesterol synthesis and regulation was first conducted in this work. An interaction network was then built for those genes so that the top gene targets were identified. The involvement of these genes in Alzheimer’s disease progression was discussed, which was followed by the investigation of existing clinical trials for those targets. A ligand-protein docking program was finally developed to screen 1.5 million chemical compounds for the selected protein target. A machine learning program was developed to evaluate and predict the binding interaction between chemical compounds and the protein target. The results from this work pave the way for further drug discovery to regulate brain cholesterol to combat Alzheimer’s disease.

Keywords: Alzheimer’s disease, drug discovery, ligand-protein docking, gene-network analysis, cholesterol regulation

Procedia PDF Downloads 76
25463 A Proposed Optimized and Efficient Intrusion Detection System for Wireless Sensor Network

Authors: Abdulaziz Alsadhan, Naveed Khan

Abstract:

In recent years intrusions on computer network are the major security threat. Hence, it is important to impede such intrusions. The hindrance of such intrusions entirely relies on its detection, which is primary concern of any security tool like Intrusion Detection System (IDS). Therefore, it is imperative to accurately detect network attack. Numerous intrusion detection techniques are available but the main issue is their performance. The performance of IDS can be improved by increasing the accurate detection rate and reducing false positive. The existing intrusion detection techniques have the limitation of usage of raw data set for classification. The classifier may get jumble due to redundancy, which results incorrect classification. To minimize this problem, Principle Component Analysis (PCA), Linear Discriminant Analysis (LDA), and Local Binary Pattern (LBP) can be applied to transform raw features into principle features space and select the features based on their sensitivity. Eigen values can be used to determine the sensitivity. To further classify, the selected features greedy search, back elimination, and Particle Swarm Optimization (PSO) can be used to obtain a subset of features with optimal sensitivity and highest discriminatory power. These optimal feature subset used to perform classification. For classification purpose, Support Vector Machine (SVM) and Multilayer Perceptron (MLP) used due to its proven ability in classification. The Knowledge Discovery and Data mining (KDD’99) cup dataset was considered as a benchmark for evaluating security detection mechanisms. The proposed approach can provide an optimal intrusion detection mechanism that outperforms the existing approaches and has the capability to minimize the number of features and maximize the detection rates.

Keywords: Particle Swarm Optimization (PSO), Principle Component Analysis (PCA), Linear Discriminant Analysis (LDA), Local Binary Pattern (LBP), Support Vector Machine (SVM), Multilayer Perceptron (MLP)

Procedia PDF Downloads 367
25462 Origin, Exposition, and Treatment of Economic Violence

Authors: Lucrezia Crescenzi-Lanna, Silvia Cataldi, Williams Contreras, Valerio Pieri

Abstract:

According to the European Commission, gender-based violence (GBV) is a violation of human rights and a form of discrimination against women in five areas: physical violence, sexual violence, psychological violence, mistreatment of women, and economic violence (henceforth EV). The TESORO project "Treatment, ExpoSition, and ORigin of economic viOlence: An innovation and internationalization project between Italy and Spain" focuses on this last dimension of gender-based violence, the least studied and the one that has received least media coverage. In Spain, 12% (2,350,684) of women over fifteen years of age have suffered economic violence from their partner or ex-partner during their lives. In Italy, another country participating in the project, many women who are welcomed in refuges and who report cases of psychological violence (79%) and/or physical violence (61%) are also victims of economic violence (34%), according to the D.i.Re. Thermometer: "Donne in Rete contro la Violenza", the association that brings together more than eighty refuges against violence in Italy. At the social level, this form of violence is incorporated into practices of inequality that manifest themselves in both the daily management of couples and families and the workplace and institutional settings. As for the mechanisms related to EV, the literature argues that it is a complex and multidimensional phenomenon that has socioeconomic and cultural roots. EV manifests itself through various strategies, which represent forms of power and control aimed at preventing women's financial independence. To analyse the issue of EV we use a multidisciplinary approach and a mixed design that includes: 1) a questionnaire administered to a stratified sample of more than a thousand Italian and Spanish citizens to study the cultural and socio-relational mechanisms and the origin of EV in family and couple contexts; and 2) interviews with those running refuges as part of the struggle against gender violence, to understand how mechanisms and educational activities in the field of economic violence are manifested in the respective region and are supportive of women. The decision to use this strategy responds to the need to combine an exploratory perspective with an explanatory one in order to understand some of the relevant concepts related to the complex phenomena of EV and the interventions dedicated to its prevention. The data will be finalized in June 2022 and presented at the ICWS conference. Among TESORO’s contributions, its collection of qualitative and quantitative data on EV in Italy and Spain stands out, deepening its origin, prevention, and treatment beyond its incidence, which has already been studied in the Macro-Survey on Violence against Women.

Keywords: gender-based violence, economic violence, economic harm, gender inequality, workplace and family contexts

Procedia PDF Downloads 95
25461 Improving Collective Health and Social Care through a Better Consideration of Sex and Gender: Analytical Report by the French National Authority for Health

Authors: Thomas Suarez, Anne-Sophie Grenouilleau, Erwan Autin, Alexandre Biosse-Duplan, Emmanuelle Blondet, Laurence Chazalette, Marie Coniel, Agnes Dessaigne, Sylvie Lascols, Andrea Lasserre, Candice Legris, Pierre Liot, Aline Metais, Karine Petitprez, Christophe Varlet, Christian Saout

Abstract:

Background: The role of biological sex and gender identity -whether assigned or chosen- as health determinants are far from a recent discovery: several reports have stressed out how being a woman or a man could affect health on various scales. However, taking it into consideration beyond stereotypes and rigid binary assumptions still seems to be a work in progress. Method: The report is a synthesis on a variety of specific topics, each of which was studied by a specialist from the French National Authority for Health (HAS), through an analysis of existing literature on both healthcare policy construction process and instruments (norms, data analysis, clinical trials, guidelines, and professional practices). This work also implied a policy analysis of French recent public health laws and a retrospective study of guidelines with a gender mainstreaming approach. Results: The analysis showed that though sex and gender were well-known determinants of health, their consideration by both public policy and health operators was often incomplete, as it does not incorporate how sex and gender interact, as well as how they interact with other factors. As a result, the health and social care systems and their professionals tend to reproduce some stereotypical and inadequate habits. Though the data available often allows to take sex and gender into consideration, such data is often underused in practice guidelines and policy formulation. Another consequence is a lack of inclusiveness towards transgender or intersex persons. Conclusions: This report first urges for raising awareness of all the actors of health, in its broadest definition, that sex and gender matter beyond first-look conclusions. It makes a series of recommendations in order to reshape policy construction in the health sector on the one hand and to design public health instruments to make them more inclusive regarding sex and gender on the other hand. The HAS finally committed to integrate sex and gender preoccupations in its workings methods, to be a driving force in the spread of these concerns.

Keywords: biological sex, determinants of health, gender, healthcare policy instruments, social accompaniment

Procedia PDF Downloads 130
25460 Control the Flow of Big Data

Authors: Shizra Waris, Saleem Akhtar

Abstract:

Big data is a research area receiving attention from academia and IT communities. In the digital world, the amounts of data produced and stored have within a short period of time. Consequently this fast increasing rate of data has created many challenges. In this paper, we use functionalism and structuralism paradigms to analyze the genesis of big data applications and its current trends. This paper presents a complete discussion on state-of-the-art big data technologies based on group and stream data processing. Moreover, strengths and weaknesses of these technologies are analyzed. This study also covers big data analytics techniques, processing methods, some reported case studies from different vendor, several open research challenges and the chances brought about by big data. The similarities and differences of these techniques and technologies based on important limitations are also investigated. Emerging technologies are suggested as a solution for big data problems.

Keywords: computer, it community, industry, big data

Procedia PDF Downloads 194
25459 A Local Tensor Clustering Algorithm to Annotate Uncharacterized Genes with Many Biological Networks

Authors: Paul Shize Li, Frank Alber

Abstract:

A fundamental task of clinical genomics is to unravel the functions of genes and their associations with disorders. Although experimental biology has made efforts to discover and elucidate the molecular mechanisms of individual genes in the past decades, still about 40% of human genes have unknown functions, not to mention the diseases they may be related to. For those biologists who are interested in a particular gene with unknown functions, a powerful computational method tailored for inferring the functions and disease relevance of uncharacterized genes is strongly needed. Studies have shown that genes strongly linked to each other in multiple biological networks are more likely to have similar functions. This indicates that the densely connected subgraphs in multiple biological networks are useful in the functional and phenotypic annotation of uncharacterized genes. Therefore, in this work, we have developed an integrative network approach to identify the frequent local clusters, which are defined as those densely connected subgraphs that frequently occur in multiple biological networks and consist of the query gene that has few or no disease or function annotations. This is a local clustering algorithm that models multiple biological networks sharing the same gene set as a three-dimensional matrix, the so-called tensor, and employs the tensor-based optimization method to efficiently find the frequent local clusters. Specifically, massive public gene expression data sets that comprehensively cover dynamic, physiological, and environmental conditions are used to generate hundreds of gene co-expression networks. By integrating these gene co-expression networks, for a given uncharacterized gene that is of biologist’s interest, the proposed method can be applied to identify the frequent local clusters that consist of this uncharacterized gene. Finally, those frequent local clusters are used for function and disease annotation of this uncharacterized gene. This local tensor clustering algorithm outperformed the competing tensor-based algorithm in both module discovery and running time. We also demonstrated the use of the proposed method on real data of hundreds of gene co-expression data and showed that it can comprehensively characterize the query gene. Therefore, this study provides a new tool for annotating the uncharacterized genes and has great potential to assist clinical genomic diagnostics.

Keywords: local tensor clustering, query gene, gene co-expression network, gene annotation

Procedia PDF Downloads 169
25458 High Performance Computing and Big Data Analytics

Authors: Branci Sarra, Branci Saadia

Abstract:

Because of the multiplied data growth, many computer science tools have been developed to process and analyze these Big Data. High-performance computing architectures have been designed to meet the treatment needs of Big Data (view transaction processing standpoint, strategic, and tactical analytics). The purpose of this article is to provide a historical and global perspective on the recent trend of high-performance computing architectures especially what has a relation with Analytics and Data Mining.

Keywords: high performance computing, HPC, big data, data analysis

Procedia PDF Downloads 520
25457 Cultural Heritage, War and Heritage Legislations: An Empirical Review

Authors: Gebrekiros Welegebriel Asfaw

Abstract:

The conservation of cultural heritage during times of war is a topic of significant importance and concern in the field of heritage studies. The destruction, looting, and illicit acts against cultural heritages have devastating consequences. International and national legislations have been put in place to address these issues and provide a legal framework for protecting cultural heritage during armed conflicts. Thus, the aim of this review is to examine the existing heritage legislations and evaluate their effectiveness in protecting cultural heritage during times of war with a special insight of the Tigray war. The review is based on a comprehensive empirical analysis of existing heritage legislations related to the protection of cultural heritage during war, with a special focus on the Tigray war. The review reveals that there are several international and national legislations in place to protect cultural heritage during times of war. However, the implementation of these legislations has been insufficient and ineffective in the case of the Tigray war. The priceless cultural heritages in Tigray, which were once the centers of investment and world pride were, have been subjected to destruction, looting, and other illicit acts, in violation of both international conventions such as the UNESCO Convention and national legislations. Therefore, there is a need for consistent intervention and enforcement of different legislations from the international community and organizations to rehabilitate, repatriate, and reinstitute the irreplaceable heritages of Tigray.

Keywords: cultural heritage, heritage legislations, tigray, war

Procedia PDF Downloads 158
25456 Protecting the Privacy and Trust of VIP Users on Social Network Sites

Authors: Nidal F. Shilbayeh, Sameh T. Khuffash, Mohammad H. Allymoun, Reem Al-Saidi

Abstract:

There is a real threat on the VIPs personal pages on the Social Network Sites (SNS). The real threats to these pages is violation of privacy and theft of identity through creating fake pages that exploit their names and pictures to attract the victims and spread of lies. In this paper, we propose a new secure architecture that improves the trusting and finds an effective solution to reduce fake pages and possibility of recognizing VIP pages on SNS. The proposed architecture works as a third party that is added to Facebook to provide the trust service to personal pages for VIPs. Through this mechanism, it works to ensure the real identity of the applicant through the electronic authentication of personal information by storing this information within content of their website. As a result, the significance of the proposed architecture is that it secures and provides trust to the VIPs personal pages. Furthermore, it can help to discover fake page, protect the privacy, reduce crimes of personality-theft, and increase the sense of trust and satisfaction by friends and admirers in interacting with SNS.

Keywords: social network sites, online social network, privacy, trust, security and authentication

Procedia PDF Downloads 381
25455 A Landscape of Research Data Repositories in Re3data.org Registry: A Case Study of Indian Repositories

Authors: Prashant Shrivastava

Abstract:

The purpose of this study is to explore re3dat.org registry to identify research data repositories registration workflow process. Further objective is to depict a graph for present development of research data repositories in India. Preliminarily with an approach to understand re3data.org registry framework and schema design then further proceed to explore the status of research data repositories of India in re3data.org registry. Research data repositories are getting wider relevance due to e-research concepts. Now available registry re3data.org is a good tool for users and researchers to identify appropriate research data repositories as per their research requirements. In Indian environment, a compatible National Research Data Policy is the need of the time to boost the management of research data. Registry for Research Data Repositories is a crucial tool to discover specific information in specific domain. Also, Research Data Repositories in India have not been studied. Re3data.org registry and status of Indian research data repositories both discussed in this study.

Keywords: research data, research data repositories, research data registry, re3data.org

Procedia PDF Downloads 326
25454 A Study of Cloud Computing Solution for Transportation Big Data Processing

Authors: Ilgin Gökaşar, Saman Ghaffarian

Abstract:

The need for fast processed big data of transportation ridership (eg., smartcard data) and traffic operation (e.g., traffic detectors data) which requires a lot of computational power is incontrovertible in Intelligent Transportation Systems. Nowadays cloud computing is one of the important subjects and popular information technology solution for data processing. It enables users to process enormous measure of data without having their own particular computing power. Thus, it can also be a good selection for transportation big data processing as well. This paper intends to examine how the cloud computing can enhance transportation big data process with contrasting its advantages and disadvantages, and discussing cloud computing features.

Keywords: big data, cloud computing, Intelligent Transportation Systems, ITS, traffic data processing

Procedia PDF Downloads 470
25453 Need for Policy and Legal Framework for Caste Based Atrocities as Violation of International Human Rights in View of Indian Diaspora

Authors: Vijayalaxmi Khopade

Abstract:

The Prima facie caste system is intrinsic to Indian society. It is an ancient system of intense social stratification based upon birth and enjoying religious sanction. The uppermost strata and privileges are ascribed and enjoyed by brahmins (priestly class), while the lowest strata are occupied by Dalits who are not ascribed with any privileges. The caste system is inherently hierarchical, patriarchal, and systematic and thrives solely on exploitation justified through means of the Brahminical system of hegemony based singularly on birth. The caste system has extended its tentacles to other religions like Christianity, Buddhism, Jainism, and Islam in South Asia. Term Dalit is colloquially used to categorize persons belonging to lower strata in the caste hierarchy. However, this category is heterogenous and highly stratified, following practices like untouchability and exclusion amongst themselves. The modern Indian legal system acknowledges the existence of Caste and its perils. Therefore, by virtue of the Indian Constitution, provisions for affirmative action for the protection and development of Dalits are made. Courts in India have liberally interpreted laws to benefit Dalits. However, the modern system of governance is not immune from Caste based biases. These biases are reflected in the implementation of governance, including the dispensation of justice. The economic reforms of the 1990s gave a huge boost to the Indian diaspora. Persons of Indian origin are now seen making great strides in almost every sector and enjoying positions of power globally. As one peels off the layer of ethnic Indian origin, a deep seated layer of Caste and Caste based patriarchy is clearly visible. Indian diaspora enjoying positions of power essentially belongs to upper castes and carry Caste based biases with them. These castes have long enjoyed the benefits of education; therefore, they were the first ones to benefit from LPG (Liberalization, Privatization, Globalization) model adopted in the 1990s. Dalits, however, had little formal education until recently. The western legal system, to the best of our knowledge, does not recognize Caste and, therefore, cannot afford protection for Dalits, wherein discrimination and exploitation take place solely on the basis of Caste. Therefore, Dalits are left with no legal remedy outside domestic jurisdiction. Countries like the UK have made an attempt to include Caste in their Equality Bill 2010. This has met with tough resistance from Upper caste Hindus who shy away from recognizing their caste privileges and, therefore, the existence of Caste. In this paper, an attempt for comparative analysis is made between various legal protections accorded to Dalits in India vis-à-vis international human rights as protected by the United Nations under its declaration of Universal Human rights. An attempt has been made to mark a distinction between race and Caste and to establish a position of women in Caste based hierarchy. The paper also makes an argument for the inclusion of atrocities committed against Dalits as a violation of international human rights, their protection by the United Nations, and the trial of their violations by International Courts. The paper puts into perspective the need for an external agency like the United Nations and International courts to interfere in rights guaranteed by the Indian Constitution, even with the existence of a modern legal system in a sovereign democratic country.

Keywords: atrocity, caste, diaspora, legal framework

Procedia PDF Downloads 216
25452 Harmonic Data Preparation for Clustering and Classification

Authors: Ali Asheibi

Abstract:

The rapid increase in the size of databases required to store power quality monitoring data has demanded new techniques for analysing and understanding the data. One suggested technique to assist in analysis is data mining. Preparing raw data to be ready for data mining exploration take up most of the effort and time spent in the whole data mining process. Clustering is an important technique in data mining and machine learning in which underlying and meaningful groups of data are discovered. Large amounts of harmonic data have been collected from an actual harmonic monitoring system in a distribution system in Australia for three years. This amount of acquired data makes it difficult to identify operational events that significantly impact the harmonics generated on the system. In this paper, harmonic data preparation processes to better understanding of the data have been presented. Underlying classes in this data has then been identified using clustering technique based on the Minimum Message Length (MML) method. The underlying operational information contained within the clusters can be rapidly visualised by the engineers. The C5.0 algorithm was used for classification and interpretation of the generated clusters.

Keywords: data mining, harmonic data, clustering, classification

Procedia PDF Downloads 250
25451 Impact of Series Reactive Compensation on Increasing a Distribution Network Distributed Generation Hosting Capacity

Authors: Moataz Ammar, Ahdab Elmorshedy

Abstract:

The distributed generation hosting capacity of a distribution network is typically limited at a given connection point by the upper voltage limit that can be violated due to the injection of active power into the distribution network. The upper voltage limit violation concern becomes more important as the network equivalent resistance increases with respect to its equivalent reactance. This paper investigates the impact of modifying the distribution network equivalent reactance at the point of connection such that the upper voltage limit is violated at a higher distributed generation penetration, than it would without the addition of series reactive compensation. The results show that series reactive compensation proves efficient in certain situations (based on the ratio of equivalent network reactance to equivalent network resistance at the point of connection). As opposed to the conventional case of capacitive compensation of a distribution network to reduce voltage drop, inductive compensation is seen to be more appropriate for alleviation of distributed-generation-induced voltage rise.

Keywords: distributed generation, distribution networks, series compensation, voltage rise

Procedia PDF Downloads 398
25450 Linguistic Summarization of Structured Patent Data

Authors: E. Y. Igde, S. Aydogan, F. E. Boran, D. Akay

Abstract:

Patent data have an increasingly important role in economic growth, innovation, technical advantages and business strategies and even in countries competitions. Analyzing of patent data is crucial since patents cover large part of all technological information of the world. In this paper, we have used the linguistic summarization technique to prove the validity of the hypotheses related to patent data stated in the literature.

Keywords: data mining, fuzzy sets, linguistic summarization, patent data

Procedia PDF Downloads 272
25449 Proposal of Data Collection from Probes

Authors: M. Kebisek, L. Spendla, M. Kopcek, T. Skulavik

Abstract:

In our paper we describe the security capabilities of data collection. Data are collected with probes located in the near and distant surroundings of the company. Considering the numerous obstacles e.g. forests, hills, urban areas, the data collection is realized in several ways. The collection of data uses connection via wireless communication, LAN network, GSM network and in certain areas data are collected by using vehicles. In order to ensure the connection to the server most of the probes have ability to communicate in several ways. Collected data are archived and subsequently used in supervisory applications. To ensure the collection of the required data, it is necessary to propose algorithms that will allow the probes to select suitable communication channel.

Keywords: communication, computer network, data collection, probe

Procedia PDF Downloads 362
25448 Religious Beliefs versus Child’s Rights: Anti-Vaccine Movement in Indonesia

Authors: Ni Luh Bayu PurwaEka Payani, Destin Ristanti

Abstract:

Every child has the right to be healthy, and it is a parents’ obligation to fulfill their rights. In order to be healthy and prevented from the outbreak of infectious diseases, some vaccines are required. However, there are groups of people, who consider that vaccines consist of religiously forbidden ingredients. The government of Indonesia legally set the rule that all children must be vaccinated. However, merely based on religious beliefs and not supported by scientific evidence, these people ignore the vaccination. As a result, this anti-vaccine movement caused diphtheria outbreak in 2017. Categorized as a vulnerable group, child`s rights must be fulfilled in any forms. This paper tries to analyze the contradiction between religious beliefs and the fulfillment of child`s rights. Furthermore, it tries to identify the anti-vaccine movement as a form of human rights violation, especially regarding child's rights. This has been done by examining the event of the outbreak of diphtheria in 20 provinces of Indonesia. Furthermore, interview and literature reviews have been done to support the analysis. Through this process, it becomes clear that the anti-vaccine movements driven by religious beliefs did influence the outbreak of diphtheria. Hence, the anti-vaccine movements ignore the long-term effects not only on their own children’s health but also others.

Keywords: anti-vaccine movement, child rights, religious beliefs, right to health

Procedia PDF Downloads 214
25447 Human Thinking Explained with Basic Drives

Authors: Peter Pfeifer, Julian Pfeifer, Niko Pfeifer

Abstract:

Information processing is the focus of brain and cognition research. This work has a different perspective; it starts with behaviors. The detailed analysis of behaviors leads to the discovery that a significant proportion of them are based on only five basic drives. These basic drives are combinable, and the combinations result in the diversity of human behavior and thinking. The key elements are drive memories. They collect memories of drive-related situations and feelings. They contain variations of basic drives in numerous areas of life and build combinations with different meanings depending on the area. Human thinking could be explained with variations on these nested combinations of basic drives.

Keywords: cognition, psycholinguistics, psychology, psychophysiology of cognition

Procedia PDF Downloads 162
25446 A Review on Big Data Movement with Different Approaches

Authors: Nay Myo Sandar

Abstract:

With the growth of technologies and applications, a large amount of data has been producing at increasing rate from various resources such as social media networks, sensor devices, and other information serving devices. This large collection of massive, complex and exponential growth of dataset is called big data. The traditional database systems cannot store and process such data due to large and complexity. Consequently, cloud computing is a potential solution for data storage and processing since it can provide a pool of resources for servers and storage. However, moving large amount of data to and from is a challenging issue since it can encounter a high latency due to large data size. With respect to big data movement problem, this paper reviews the literature of previous works, discusses about research issues, finds out approaches for dealing with big data movement problem.

Keywords: Big Data, Cloud Computing, Big Data Movement, Network Techniques

Procedia PDF Downloads 88
25445 Optimized Approach for Secure Data Sharing in Distributed Database

Authors: Ahmed Mateen, Zhu Qingsheng, Ahmad Bilal

Abstract:

In the current age of technology, information is the most precious asset of a company. Today, companies have a large amount of data. As the data become larger, access to data for some particular information is becoming slower day by day. Faster data processing to shape it in the form of information is the biggest issue. The major problems in distributed databases are the efficiency of data distribution and response time of data distribution. The security of data distribution is also a big issue. For these problems, we proposed a strategy that can maximize the efficiency of data distribution and also increase its response time. This technique gives better results for secure data distribution from multiple heterogeneous sources. The newly proposed technique facilitates the companies for secure data sharing efficiently and quickly.

Keywords: ER-schema, electronic record, P2P framework, API, query formulation

Procedia PDF Downloads 333
25444 Forecasting of Innovative Development of Kondratiev-Schumpeter’s Economic Cycles

Authors: Alexander Gretchenko, Liudmila Goncharenko, Sergey Sybachin

Abstract:

This article summarizes the history of the discovery of N.D. Kondratiev of large cycles of economic conditions, as well as the creation and justification of the theory of innovation-cyclical economic development of Kondratiev-Schumpeter. An analysis of it in modern conditions is providing. The main conclusion in this article is that in general terms today it can be argued that the Kondratiev-Schumpeter theory is sufficiently substantiated. Further, the possibility of making a forecast of the development of the economic situation in the direction of applying this theory in practice, which demonstrate its effectiveness, is considered.

Keywords: Kondratiev's big cycles of economic conjuncture, Schumpeter's theory of innovative economic development, long-term cyclical forecasting, dating of Kondratiev cycles

Procedia PDF Downloads 163
25443 Collaborative Data Refinement for Enhanced Ionic Conductivity Prediction in Garnet-Type Materials

Authors: Zakaria Kharbouch, Mustapha Bouchaara, F. Elkouihen, A. Habbal, A. Ratnani, A. Faik

Abstract:

Solid-state lithium-ion batteries have garnered increasing interest in modern energy research due to their potential for safer, more efficient, and sustainable energy storage systems. Among the critical components of these batteries, the electrolyte plays a pivotal role, with LLZO garnet-based electrolytes showing significant promise. Garnet materials offer intrinsic advantages such as high Li-ion conductivity, wide electrochemical stability, and excellent compatibility with lithium metal anodes. However, optimizing ionic conductivity in garnet structures poses a complex challenge, primarily due to the multitude of potential dopants that can be incorporated into the LLZO crystal lattice. The complexity of material design, influenced by numerous dopant options, requires a systematic method to find the most effective combinations. This study highlights the utility of machine learning (ML) techniques in the materials discovery process to navigate the complex range of factors in garnet-based electrolytes. Collaborators from the materials science and ML fields worked with a comprehensive dataset previously employed in a similar study and collected from various literature sources. This dataset served as the foundation for an extensive data refinement phase, where meticulous error identification, correction, outlier removal, and garnet-specific feature engineering were conducted. This rigorous process substantially improved the dataset's quality, ensuring it accurately captured the underlying physical and chemical principles governing garnet ionic conductivity. The data refinement effort resulted in a significant improvement in the predictive performance of the machine learning model. Originally starting at an accuracy of 0.32, the model underwent substantial refinement, ultimately achieving an accuracy of 0.88. This enhancement highlights the effectiveness of the interdisciplinary approach and underscores the substantial potential of machine learning techniques in materials science research.

Keywords: lithium batteries, all-solid-state batteries, machine learning, solid state electrolytes

Procedia PDF Downloads 61
25442 Jurisprudencial Analysis of Torture in Spain and in the European Human Rights System

Authors: María José Benítez Jiménez

Abstract:

Article 3 of the European Convention for the Protection of Human Rights and Fundamental Freedoms (E.C.H.R.) proclaims that no one may be subjected to torture, punishment or degrading treatment. The legislative correlate in Spain is embodied in Article 15 of the Spanish Constitution, and there must be an overlapping interpretation of both precepts on the ideal plane. While it is true that there are not many cases in which the European Court of Human Rights (E.C.t.H.R. (The Strasbourg Court)) has sanctioned Spain for its failure to investigate complaints of torture, it must be emphasized that the tendency to violate Article 3 of the Convention appears to be on the rise, being necessary to know possible factors that may be affecting it. This paper addresses the analysis of sentences that directly or indirectly reveal the violation of Article 3 of the European Convention. To carry out the analysis, sentences of the Strasbourg Court have been consulted from 2012 to 2016, being able to address any previous sentences to this period if it provided justified information necessary for the study. After the review it becomes clear that there are two key groups of subjects that request a response to the Strasbourg Court on the understanding that they have been tortured or degradingly treated. These are: immigrants and terrorists. Both phenomena, immigration and terrorism, respond to patterns that have mutated in recent years, and it is important for this study to know if national regulations begin to be dysfunctional.

Keywords: E.C.H.R., E.C.t.H.R. sentences, Spanish Constitution, torture

Procedia PDF Downloads 161
25441 Identifying a Drug Addict Person Using Artificial Neural Networks

Authors: Mustafa Al Sukar, Azzam Sleit, Abdullatif Abu-Dalhoum, Bassam Al-Kasasbeh

Abstract:

Use and abuse of drugs by teens is very common and can have dangerous consequences. The drugs contribute to physical and sexual aggression such as assault or rape. Some teenagers regularly use drugs to compensate for depression, anxiety or a lack of positive social skills. Teen resort to smoking should not be minimized because it can be "gateway drugs" for other drugs (marijuana, cocaine, hallucinogens, inhalants, and heroin). The combination of teenagers' curiosity, risk taking behavior, and social pressure make it very difficult to say no. This leads most teenagers to the questions: "Will it hurt to try once?" Nowadays, technological advances are changing our lives very rapidly and adding a lot of technologies that help us to track the risk of drug abuse such as smart phones, Wireless Sensor Networks (WSNs), Internet of Things (IoT), etc. This technique may help us to early discovery of drug abuse in order to prevent an aggravation of the influence of drugs on the abuser. In this paper, we have developed a Decision Support System (DSS) for detecting the drug abuse using Artificial Neural Network (ANN); we used a Multilayer Perceptron (MLP) feed-forward neural network in developing the system. The input layer includes 50 variables while the output layer contains one neuron which indicates whether the person is a drug addict. An iterative process is used to determine the number of hidden layers and the number of neurons in each one. We used multiple experiment models that have been completed with Log-Sigmoid transfer function. Particularly, 10-fold cross validation schemes are used to access the generalization of the proposed system. The experiment results have obtained 98.42% classification accuracy for correct diagnosis in our system. The data had been taken from 184 cases in Jordan according to a set of questions compiled from Specialists, and data have been obtained through the families of drug abusers.

Keywords: drug addiction, artificial neural networks, multilayer perceptron (MLP), decision support system

Procedia PDF Downloads 301