Search results for: axillary lymph node metastasis
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 694

Search results for: axillary lymph node metastasis

334 Non-Conformance Clearance through an Intensified Mentorship towards ISO 15189 Accreditation: The Case of Jimma and Hawassa Hospital Microbiology Laboratories, Ethiopia

Authors: Dawit Assefa, Kassaye Tekie, Gebrie Alebachew, Degefu Beyene, Bikila Alemu, Naji Mohammed, Asnakech Agegnehu, Seble Tsehay, Geremew Tasew

Abstract:

Background: Implementation of a Laboratory Quality Management System (LQMS) is critical to ensure accurate, reliable, and efficient laboratory testing of antimicrobial resistance (AMR). However, limited LQMS implementation and progress toward accreditation in the AMR surveillance laboratory testing setting exist in Ethiopia. By addressing non-conformances (NCs) and working towards accreditation, microbiology laboratories can improve the quality of their services, increase staff competence, and contribute to mitigate the spread of AMR. Methods: Using standard ISO 15189 horizontal and vertical assessment checklists, certified assessors identified NCs at Hawassa and Jimma Hospital microbiology laboratories. The Ethiopian Public Health Institute AMR mentors and IDDS staff prioritized closing the NCs through the implementation of an intensified mentorship program that included ISO 15189 orientation training, resource allocation, and action plan development. Results: For the two facilities to clear their NCs, an intensified mentorship approach was adopted by providing ISO 15189 orientation training, provision of buffer reagents, controls, standards, and axillary equipment, and facilitating equipment maintenance and calibration. Method verification and competency assessment were also conducted along with the implementation of standard operating procedures and recommended corrective actions. This approach enhanced the laboratory's readiness for accreditation. After addressing their NCs, the two laboratories applied to Ethiopian Accreditation Services for ISO 15189 accreditation. Conclusions: Clearing NCs through the implementation of intensified mentorship was crucial in preparing the two laboratories for accreditation and improving quality laboratory test results. This approach can guide other microbiology laboratories’ accreditation attainment efforts.

Keywords: non-conformance clearance, intensified mentorship, accreditation, ISO 15189

Procedia PDF Downloads 91
333 Power MOSFET Models Including Quasi-Saturation Effect

Authors: Abdelghafour Galadi

Abstract:

In this paper, accurate power MOSFET models including quasi-saturation effect are presented. These models have no internal node voltages determined by the circuit simulator and use one JFET or one depletion mode MOSFET transistors controlled by an “effective” gate voltage taking into account the quasi-saturation effect. The proposed models achieve accurate simulation results with an average error percentage less than 9%, which is an improvement of 21 percentage points compared to the commonly used standard power MOSFET model. In addition, the models can be integrated in any available commercial circuit simulators by using their analytical equations. A description of the models will be provided along with the parameter extraction procedure.

Keywords: power MOSFET, drift layer, quasi-saturation effect, SPICE model

Procedia PDF Downloads 194
332 Sleep Scheduling Schemes Integrating Relay Node and User Equipment in LTE-A

Authors: Chun-Chuan Yang, Jeng-Yueng Chen, Yi-Ting Mai, Hsieh-Hua Liu

Abstract:

By introduction of Relay Nodes (RNs), LTE-Advanced can provide enhanced coverage and capacity at cell edges and hot-spot areas. The authors have been researching the issue of power saving in mobile communications technology such as WiMax and LTE for some years. Based on the idea of Load-Based Power Saving (LBPS), three efficient power saving schemes for the user equipment (UE) were proposed in the authors’ previous work. In this paper, three revised schemes of the previous work in order to integrate RN and UE in power saving are proposed. Simulation study shows the proposed schemes can achieve significantly better power saving efficiency than the standard based scheme at the cost of moderately increased delay.

Keywords: DRX, LTE-A, power saving, RN

Procedia PDF Downloads 524
331 Safety and Efficacy of Laparoscopic D2 Gastrectomy for Advanced Gastric Cancers Single Unit Experience

Authors: S. M. P Manjula, Ishara Amarathunga, Aryan Nath Koura, Jaideepraj Rao

Abstract:

Background: Laparoscopic D2 Gastrectomy for non metastatic advanced Gastric cancer (AGC) has become a controversial topic as there are confronting ideas from experts in the field. Lack of consensus are mainly due to non feasibility of the dissection and safety and efficacy. Method: Data from all D2 Gastrectomies performed (both Subtotal and Total Gastrectomies) in our unit from 2009 December to 2013 December were retrospectively analysed. Computor database was prospectively maintained. Pathological stage two A (iiA) and above considered advanced Gastric cancers, who underwent curative intent D2 Gastrectomy were included for analysis(n=46). Four patients excluded from the study as peritoneal fluid cytology came positive for cancer cells and one patient exempted as microscopic resection margin positive(R1) after curative resection. Thirty day morbidity and mortality, operative time, lymph nodes harvest and survival (disease free and overall) analyzed. Results: Complete curative resection achieved in 40 patients. Mean age of the study population was 62.2 (32-88) and male to female ratio was 23: 17. Thirty day mortality (1/40) and morbidity (6/40). Average operative time 203.7 minutes (185- 400) and average lymphnodes harvest was 40.5 (18-91). Disease free survival of the AGC in this study population was 16.75 months (1-49). Average hospital stay was 6.8 days (3-31). Conclusion: Laparoscopic dissection is effective feasible and safe in AGC.

Keywords: laparoscopy, advanced gastric cancer, safety, efficacy

Procedia PDF Downloads 336
330 Transmit Power Optimization for Cooperative Beamforming in Reverse-Link MIMO Ad-Hoc Networks

Authors: Younghyun Jeon, Seungjoo Maeng

Abstract:

In the Ad-hoc network, the great interests regarding MIMO scheme leads to their combination, which is also utilized into its applicable network. We manage the field of the problem into Reverse-link MIMO Ad-hoc Network (RMAN) and propose the methodology to maximize the data rate with its power consumption using Node-Cooperative beamforming technique. Based on the result of mathematical optimization formulation, we design the algorithm to construct optimal orthogonal weight vector according to channel feedback and control its transmission power according to QoS-pricing value level. In simulation results, we show the validity of the proposed mathematical optimization result and algorithm which mean that the sum-rate of each link is converged into some point.

Keywords: ad-hoc network, MIMO, cooperative beamforming, transmit power

Procedia PDF Downloads 398
329 Improved FP-Growth Algorithm with Multiple Minimum Supports Using Maximum Constraints

Authors: Elsayeda M. Elgaml, Dina M. Ibrahim, Elsayed A. Sallam

Abstract:

Association rule mining is one of the most important fields of data mining and knowledge discovery. In this paper, we propose an efficient multiple support frequent pattern growth algorithm which we called “MSFP-growth” that enhancing the FP-growth algorithm by making infrequent child node pruning step with multiple minimum support using maximum constrains. The algorithm is implemented, and it is compared with other common algorithms: Apriori-multiple minimum supports using maximum constraints and FP-growth. The experimental results show that the rule mining from the proposed algorithm are interesting and our algorithm achieved better performance than other algorithms without scarifying the accuracy.

Keywords: association rules, FP-growth, multiple minimum supports, Weka tool

Procedia PDF Downloads 485
328 Anti-Inflammatory Effect of Omega-3 Fish-Oil Supplements: Eicosapentaenoic Acid and Docosahexaenoic Acid in Early-Stage Tumors

Authors: Corina Muscurel, Irina Stoian, Laura Gaman, Valeriu Atanasiu

Abstract:

Chronic inflammation predisposes cells to neoplastic transformation and is associated with angiogenesis. Omega-3 polyunsaturated fatty acids (n-3 PUFAs) give rise to anti-inflammatory metabolites and decrease some inflammatory cytokines. The aim of the study was to analyze the effect of n-3 PUFAs intake on patients with tumors in early-stage (without regional or distant metastasis). There were two groups of patients: one group with colon tumors and one group with lung tumors. All patients took for 60 days daily supplements from fish-oil containing 600 mg eicosapentaenoic acid and 400 mg docosahexaenoic acid. The plasma markers were evaluated before and after PUFAs intake: ceruloplasmin (using p-phenylenediamine oxidase method), plasma total thiol groups (using dithiobis-nitrobenzoic acid method) and CEA (carcinoembryonic antigen using electrochemiluminescent immunoassay). The results reflect ceruloplasmin decrease (p < 0.05), plasma total thiol groups increase (not statistically significant) and CEA decrease (p < 0.05) after n-3 PUFAs intake. Conclusions: n-3 PUFAs intake is favorable in premalignant lesions or in early tumor stage and dietary fish-oil has anti-inflammatory effects and can contribute to reduce cancer progression.

Keywords: cancer, fish-oil, inflammation, n-3 polyunsaturated fatty acids

Procedia PDF Downloads 136
327 Performance Analysis of Carbon Nanotube for VLSI Interconnects and Their Comparison with Copper Interconnects

Authors: Gagnesh Kumar, Prashant Gupta

Abstract:

This paper investigates the performance of the bundle of single wall carbon nanotubes (SWCNT) for low-power and high-speed interconnects for future VLSI applications. The power dissipation, delay and power delay product (PDP) of SWCNT bundle interconnects are examined and compared with that of the Cu interconnects at 22 nm technology node for both intermediate and global interconnects. The results show that SWCNT bundle consume less power and also faster than Cu for intermediate and global interconnects. It is concluded that the metallic SWCNT has been regarded as a viable candidate for intermediate and global interconnects in future technologies.

Keywords: carbon nanotube, SWCNT, low power, delay, power delay product, global and intermediate interconnects

Procedia PDF Downloads 320
326 Case Report on ‘Primary Adenocarcinoma of Aberrant HER2+ Anogenital Mammary-like Glands in a Male'

Authors: Shivani Kuttuva, James Sampson, Timothy Simmons, Vinayak Thattaruparambil, Holly Burton, Peter Coyne

Abstract:

Anogenital mammary-like glands were established to be embryological remnants of breast tissue due to failed resolution of the ectodermal mammary ridge. However, recent studies are now considering this to represent normal constituents of the anogenital area with histological resemblance to the orthotopic breast tissue with multiple benign and malignant lesions arising from it. The incidence of the above has been predominant in females in the vulval region. Due to the paucity of cases reported in men, this poses a diagnostic and therapeutic challenge resulting in a delay in treatment and, thereby, poor outcomes. Our patient presented to the dermatology clinic with an itchy, purplish lesion in the peri-anal region which, on punch biopsy, was diagnosed to be Extra-mammary Paget’s disease and taken up for Wide local excision. Immunochemically, staining was positive for HER2, ER and Cytokeratin 7, keeping with the presence of actual breast tissue with no primary breast carcinoma. Due to the invasive nature of the disease, he required Abdominoperineal resection with flap reconstruction. Despite complete surgical clearance and adjuvant radiotherapy, the disease progressed to adjacent inguinal and obturator lymph nodes with origin resembling anogenital type mammary glands but histology negative for hormonal receptors of the breast.

Keywords: anogenital mammary-like glands, abdominoperineal resection, ectopic breast tissue, ectopic male breast carcinoma, peri-anal skin lesion

Procedia PDF Downloads 80
325 Visualizing Matrix Metalloproteinase-2 Activity Using Extracellular Matrix-Immobilized Fluorescence Resonance Energy Transfer Bioprobe in Cancer Cells

Authors: Hawon Lee, Young-Pil Kim

Abstract:

Visualizing matrix metalloproteinases (MMPs) activity is necessary for understanding cancer metastasis because they are implicated in cell migration and invasion by degrading the extracellular matrix (ECM). While much effort has been made to sense the MMP activity, but extracellularly long-term monitoring of MMP activity still remains challenging. Here, we report a collagen-bound fluorescent bioprobe for the detection of MMP-2 activity in the extracellular environment. This bioprobe consists of ECM-immobilized part (including collagen-bound protein) and MMP-sensing part (including peptide substrate linked with fluorescence resonance energy transfer (FRET) coupler between donor green fluorescent protein (GFP) and acceptor TAMRA dye), which was constructed through intein-mediated self-splicing conjugation. Upon being immobilized on the collagen-coated surface, this bioprobe enabled efficient long-lasting observation of MMP-2 activity in the cultured cells without affecting cell growth and viability. As a result, the FRET ratio (acceptor/donor) decreased as the MMP2 activity increased in cultured cancer cells. Furthermore, unlike wild-type MMP-2, mutated MMP-2 expression (Y580A in the hemopexin region) gave rise to lowering the secretion of MMP-2 in HeLa. Conclusively, our method is anticipated to find applications for tracing and visualizing enzyme activity.

Keywords: collagen, ECM, FRET, MMP

Procedia PDF Downloads 202
324 TRNG Based Key Generation for Certificateless Signcryption

Authors: S.Balaji, R.Sujatha, M. Ramakrishnan

Abstract:

Signcryption is a cryptographic primitive that fulfills both the functions of digital signature and public key encryption simultaneously in low cost when compared with the traditional signature-then-encryption approach. In this paper, we propose a novel mouse movement based key generation technique to generate secret keys which is secure against the outer and insider attacks. Tag Key Encapsulation Mechanism (KEM) process is implemented using True Random Number Generator (TRNG) method. This TRNG based key is used for data encryption in the Data Encapsulation Mechanism (DEM). We compare the statistical reports of the proposed system with the previous methods which implements TKEM based on pseudo random number generator

Keywords: pseudo random umber generator, signcryption, true random number generator, node deployment

Procedia PDF Downloads 341
323 Risk Factors Associated with Outbreak of Cerebrospinal Meningitis in Kano State- Nigeria, March-May 2017

Authors: Visa I. Tyakaray, M. Abdulaziz, O. Badmus, N. Karaye, M. Dalhat, A. Shehu, I. Bello, T. Hussaini, S. Akar, G. Effah, P. Nguku

Abstract:

Introduction: Nigeria has recorded outbreaks of meningitis in the past, being in the meningitis belt. A multi-state outbreak of Cerebrospinal Meningitis (CSM) from Neisseria meningitides occurred in 2017 involving 24 states, and Kano State reported its first two confirmed CSM cases on 22nd March, 2017. We conducted the outbreak investigation to characterize the outbreak, determine its associated risk factors and institute appropriate control measures. Method: We conducted an unmatched Case-control study with ratio 1:2. A case was defined as any person with sudden onset of fever (>38.5˚C rectal or 38.0˚C axillary) and one of the following: neck stiffness, altered consciousness or bulging fontanelle in toddlers while a control was defined as any person who resides around the case such as family members, caregivers, neighbors, and healthcare personnel. We reviewed and validated line list and conducted active case search in health facilities and neighboring communities. Descriptive, bivariate, stratified and multivariate analysis were performed. Laboratory confirmation was by Latex agglutination and/or Culture. Results: We recruited 48 cases with median age of 11 years (1 month – 65 years), attack rate was 2.4/100,000 population with case fatality rate of 8%; 34 of 44 local government areas were affected.On stratification, age was found to be a confounder. Independent factors associated with the outbreak were age (Adjusted Odds Ratio, AOR =6.58; 95% Confidence Interval (CI) =2.85-15.180, history of Vaccination (AOR=0.37; 95% CI=0.13-0.99) and history of travel (AOR=10.16; (1.99-51.85). Laboratory results showed 22 positive cases for Neisseria meningitides types C and A/Y. Conclusion: Major risk factors associated with this outbreak were age (>14years), not being vaccinated and history of travel. We sensitized communities and strengthened case management. We recommended immediate reactive vaccination and enhanced surveillance in bordering communities.

Keywords: cerebrospinal, factors, Kano-Nigeria, meningitis, risk

Procedia PDF Downloads 215
322 Survey on Energy Efficient Routing Protocols in Mobile Ad-Hoc Networks

Authors: Swapnil Singh, Sanjoy Das

Abstract:

Mobile Ad-Hoc Network (MANET) is infrastructure less networks dynamically formed by autonomous system of mobile nodes that are connected via wireless links. Mobile nodes communicate with each other on the fly. In this network each node also acts as a router. The battery power and the bandwidth are very scarce resources in this network. The network lifetime and connectivity of nodes depends on battery power. Therefore, energy is a valuable constraint which should be efficiently used. In this paper, we survey various energy efficient routing protocol. The energy efficient routing protocols are classified on the basis of approaches they use to minimize the energy consumption. The purpose of this paper is to facilitate the research work and combine the existing solution and to develop a more energy efficient routing mechanism.

Keywords: delaunay triangulation, deployment, energy efficiency, MANET

Procedia PDF Downloads 615
321 Reliable and Energy-Aware Data Forwarding under Sink-Hole Attack in Wireless Sensor Networks

Authors: Ebrahim Alrashed

Abstract:

Wireless sensor networks are vulnerable to attacks from adversaries attempting to disrupt their operations. Sink-hole attacks are a type of attack where an adversary node drops data forwarded through it and hence affecting the reliability and accuracy of the network. Since sensor nodes have limited battery power, it is essential that any solution to the sinkhole attack problem be very energy-aware. In this paper, we present a reliable and energy efficient scheme to forward data from source nodes to the base station while under sink-hole attack. The scheme also detects sink-hole attack nodes and avoid paths that includes them.

Keywords: energy-aware routing, reliability, sink-hole attack, WSN

Procedia PDF Downloads 396
320 Expression of Hypoxia-Inducible Transmembrane Carbonic Anhydrases IX, Ca XII and Glut 1 in Ovarian Cancer

Authors: M. Sunitha, B. Nithyavani, Mathew Yohannan, S. Thiruvieni Balajji, M. A. Rathi, C. Arul Raj, P. Ragavendran, V. K. Gopalkrishnan

Abstract:

Establishment of an early and reliable biomarker for ovarian carcinogenesis whose expression can be monitored through noninvasive techniques will enable early diagnosis of cancer. Carbonic anhydrases (CA) isozymes IX and XII have been suggested to play a role in oncogenic processes. In von Hippel-Lindau (VHL)-defective tumors, the cell surface transmembrane carbonic anhydrase (CA) CA XI and CA XII genes are overexpressed because of the absence of pVHL. These enzymes are involved in causing a hypoxia condition, thereby providing an environment for metastasis. Aberrant expression of the facilitative glucose transporter GLUT I is found in a wide spectrum of epithelial malignancies. Studying the mRNA expression of CA IX, CA XII and Glut I isozymes in ovarian cancer cell lines (OAW-42 and PA-1) revealed the expression of these hypoxia genes. Immunohistochemical staining of carbonic anhydrases was also performed in 40 ovarian cancer tissues. CA IX and CA XII were expressed at 540 bp and 520 bp in OAW42, PA1 in ovarian cancer cell lines. GLUT-1 was expressed at 325bp in OAW 42, PA1 genes in ovarian cancer cell lines. Immunohistochemistry revealed high to moderate levels of expression of these enzymes. The immuostaining was seen predominantly on the cell surface membrane. The study concluded that these genes CA IX, CA XII and Glut I are expressed under hypoxic condition in tumor cells. From the present results expression of CA IX, XII and Glut I may represent potential targets in ovarian cancer therapy.

Keywords: ovarian cancer, carbonic anhydrase IX, XII, Glut I, tumor markers

Procedia PDF Downloads 369
319 Performance Analysis of Double Gate FinFET at Sub-10NM Node

Authors: Suruchi Saini, Hitender Kumar Tyagi

Abstract:

With the rapid progress of the nanotechnology industry, it is becoming increasingly important to have compact semiconductor devices to function and offer the best results at various technology nodes. While performing the scaling of the device, several short-channel effects occur. To minimize these scaling limitations, some device architectures have been developed in the semiconductor industry. FinFET is one of the most promising structures. Also, the double-gate 2D Fin field effect transistor has the benefit of suppressing short channel effects (SCE) and functioning well for less than 14 nm technology nodes. In the present research, the MuGFET simulation tool is used to analyze and explain the electrical behaviour of a double-gate 2D Fin field effect transistor. The drift-diffusion and Poisson equations are solved self-consistently. Various models, such as Fermi-Dirac distribution, bandgap narrowing, carrier scattering, and concentration-dependent mobility models, are used for device simulation. The transfer and output characteristics of the double-gate 2D Fin field effect transistor are determined at 10 nm technology node. The performance parameters are extracted in terms of threshold voltage, trans-conductance, leakage current and current on-off ratio. In this paper, the device performance is analyzed at different structure parameters. The utilization of the Id-Vg curve is a robust technique that holds significant importance in the modeling of transistors, circuit design, optimization of performance, and quality control in electronic devices and integrated circuits for comprehending field-effect transistors. The FinFET structure is optimized to increase the current on-off ratio and transconductance. Through this analysis, the impact of different channel widths, source and drain lengths on the Id-Vg and transconductance is examined. Device performance was affected by the difficulty of maintaining effective gate control over the channel at decreasing feature sizes. For every set of simulations, the device's features are simulated at two different drain voltages, 50 mV and 0.7 V. In low-power and precision applications, the off-state current is a significant factor to consider. Therefore, it is crucial to minimize the off-state current to maximize circuit performance and efficiency. The findings demonstrate that the performance of the current on-off ratio is maximum with the channel width of 3 nm for a gate length of 10 nm, but there is no significant effect of source and drain length on the current on-off ratio. The transconductance value plays a pivotal role in various electronic applications and should be considered carefully. In this research, it is also concluded that the transconductance value of 340 S/m is achieved with the fin width of 3 nm at a gate length of 10 nm and 2380 S/m for the source and drain extension length of 5 nm, respectively.

Keywords: current on-off ratio, FinFET, short-channel effects, transconductance

Procedia PDF Downloads 61
318 Synthesis of a Library of Substituted Isoquinolines Based on a Triazolization Strategy, and Their Anti-HIV and C-X-C Chemokine Receptor Type 4 Antagonist Activity

Authors: Mastaneh Safarnejad Shad, Wim Dehaen, Steven De Jonghe

Abstract:

Since CXCR4 is the main coreceptor of HIV-1 and plays an important role in human immunodeficiency virus (HIV) entry, numerous efforts were directed towards the discovery of new classes of small molecules that act as CXCR4 antagonists. In addition, CXCR4 antagonists are potentially useful in the treatment of several other disorders, such as cancer cell metastasis, leukemia cell proliferation, rheumatoid arthritis, and pulmonary fibrosis. Since AMD3100 (plerixafor) is the only CXCR4 antagonist which obtained approval by the Food and Drug Administration (FDA), we were motivated to investigate a new category of molecules as CXCR4 antagonists. Most of the scaffolds which have been studied so far as CXCR4 antagonists are based on the tetrahydroquinoline (THQ) moiety in which AMD11070 (mavorixafor), GSK-812394, and TIQ15 displayed the most potent CXCR4 antagonism. Due to the high potency of these scaffolds, two different series of compounds were prepared in this work. In the first set, the THQ moiety is coupled to an amine chain and various isoquinoline derivatives (prepared by an in-house developed triazolization strategy), of which the upper part of molecules is identical to AMD11070 and TIQ15. In the second category of compounds, the THQ moiety was simplified by the synthesis of a substituted pyridine moiety. In order to investigate if CXCR4 antagonism requires the presence of an isoquinoline moiety, the corresponding pyridine analogues were also prepared. In both series of compounds, potent CXCR4 antagonism was noticed.

Keywords: CXCR4 coreceptor, CXCR4 antagonists, HIV inhibitor, tetrahydroquinoline

Procedia PDF Downloads 193
317 A Privacy Protection Scheme Supporting Fuzzy Search for NDN Routing Cache Data Name

Authors: Feng Tao, Ma Jing, Guo Xian, Wang Jing

Abstract:

Named Data Networking (NDN) replaces IP address of traditional network with data name, and adopts dynamic cache mechanism. In the existing mechanism, however, only one-to-one search can be achieved because every data has a unique name corresponding to it. There is a certain mapping relationship between data content and data name, so if the data name is intercepted by an adversary, the privacy of the data content and user’s interest can hardly be guaranteed. In order to solve this problem, this paper proposes a one-to-many fuzzy search scheme based on order-preserving encryption to reduce the query overhead by optimizing the caching strategy. In this scheme, we use hash value to ensure the user’s query safe from each node in the process of search, so does the privacy of the requiring data content.

Keywords: NDN, order-preserving encryption, fuzzy search, privacy

Procedia PDF Downloads 484
316 Microbiome Role in Tumor Environment

Authors: Chro Kavian

Abstract:

The studies conducted show that cancer is a disease caused by populations of microbes, a notion gaining traction as the interaction between the human microbiome and the tumor microenvironment (TME) increasingly shows how environment and microbes dictate the progress and treatment of neoplastic diseases. A person’s human microbiome is defined as a collection of bacteria, fungi, viruses, and other microorganisms whose structure and composition influence biological processes like immune system modulation and nutrient metabolism, which, in turn, affect how susceptible a person is to neoplastic diseases, and response to different therapies. Recent reports demonstrated the influence specific microbiome bacterial populations have on the TME, thereby altering tumoral behaviors and the TME’s contributing factors that impact patients' lives. In addition, gut microbes and their SCFA products are important determinants of the inflammatory landscape of tumors and augment anti-tumor immunity, which can influence immunotherapy outcomes. Studies have also found that dysbiosis, or microbial imbalance, correlates with biological processes such as cancer progression, metastasis, and therapy resistance, leading scientists to explore the use of microbiome deficiencies as adjunctive approaches to chemotherapy and other, more traditional treatments. Nonetheless, mental health practitioners struggling to comprehend the existent gap between cancer patients with pronounced resolutive capabilities and the profound clinical impact Microbiome-targeted cancer therapy has been proven to possess.

Keywords: microbiome, cancer, tumor, immune system

Procedia PDF Downloads 18
315 Antiangiogenic Potential of Phellodendron amurense Bark Extract Observed on Chorioallantoic Membrane

Authors: Ľudmila Ballová, Slavomír Kurhajec, Eva Petrovová, Jarmila Eftimová

Abstract:

Angiogenesis, a formation of new blood vessels from a pre-existing vasculature, plays an important role in pathologic processes such as the growth and metastasis of tumours. Tumours cannot grow beyond a few millimetres without blood supply from the newly formed blood vessels from the host tissue, a process called tumour-induced angiogenesis. The successful research of antiangiogenic treatment of cancer has focused on nutraceuticals with angiogenesis-modulating properties. Berberine, as a major active component of the bark of Phellodendron amurense Rupr., has shown antitumour activity by intervening into different steps of carcinogenesis. The influence of ethanolic extract of Phellodendron amurese bark on the angiogenesis was tested in vivo on chick chorioallantoic membrane (CAM). The irritancy of the CAM after the application of the crude bark extract dissolved in normal saline (10 mg/mL) was investigated on embryonic day 7. No significant signs of the irritancy, such as vasoconstriction, hyperaemia, haemorrhage or coagulation were observed which indicates the harmless character of the extract. A significant reduction in vessel sprouting and higher percentage of avascular zone was observed in the case of CAM treated with the extract in comparison with non-treated CAM (control), which is a proof of the antiangiogenic potential of the extract. These results could contribute to the development of novel drugs for the treatment of cancer or other diseases, in which angiogenesis plays a significant role.

Keywords: angiogenesis, berberine, chorioallantoic membrane, irritancy, phellodendron amurense

Procedia PDF Downloads 383
314 Night Patrolling Robot for Suspicious Activity Detection

Authors: Amruta Amune, Rohit Agrawal, Yashashree Shastri, Syeda Zarah Aiman, Rutuja Rathi, Vaishnav Suryawanshi, Sameer Sumbhe

Abstract:

Every human being needs a sense of security. The requirement for security has risen in proportion with the population growth. However, because of a scarcity of resources, effective protection is not possible. It costs a lot of money to get appropriate security that not many can handle or afford. The goal of the study was to find a solution to the issue by developing a system capable of providing strong protection at a very low cost when long-term benefits are taken into account. The objective was to design and develop a robot that could travel around and survey the region and inform the command center if anything unusual was found. The system will be controlled manually on the server to find out its workplace's paths. The system is outfitted with a camera so that it can be used to capture built-in live video of the attacker and display it on the server.

Keywords: night patrolling, node MCU, server, security

Procedia PDF Downloads 158
313 A Research on Inference from Multiple Distance Variables in Hedonic Regression Focus on Three Variables

Authors: Yan Wang, Yasushi Asami, Yukio Sadahiro

Abstract:

In urban context, urban nodes such as amenity or hazard will certainly affect house price, while classic hedonic analysis will employ distance variables measured from each urban nodes. However, effects from distances to facilities on house prices generally do not represent the true price of the property. Distance variables measured on the same surface are suffering a problem called multicollinearity, which is usually presented as magnitude variance and mean value in regression, errors caused by instability. In this paper, we provided a theoretical framework to identify and gather the data with less bias, and also provided specific sampling method on locating the sample region to avoid the spatial multicollinerity problem in three distance variable’s case.

Keywords: hedonic regression, urban node, distance variables, multicollinerity, collinearity

Procedia PDF Downloads 464
312 Deep Feature Augmentation with Generative Adversarial Networks for Class Imbalance Learning in Medical Images

Authors: Rongbo Shen, Jianhua Yao, Kezhou Yan, Kuan Tian, Cheng Jiang, Ke Zhou

Abstract:

This study proposes a generative adversarial networks (GAN) framework to perform synthetic sampling in feature space, i.e., feature augmentation, to address the class imbalance problem in medical image analysis. A feature extraction network is first trained to convert images into feature space. Then the GAN framework incorporates adversarial learning to train a feature generator for the minority class through playing a minimax game with a discriminator. The feature generator then generates features for minority class from arbitrary latent distributions to balance the data between the majority class and the minority class. Additionally, a data cleaning technique, i.e., Tomek link, is employed to clean up undesirable conflicting features introduced from the feature augmentation and thus establish well-defined class clusters for the training. The experiment section evaluates the proposed method on two medical image analysis tasks, i.e., mass classification on mammogram and cancer metastasis classification on histopathological images. Experimental results suggest that the proposed method obtains superior or comparable performance over the state-of-the-art counterparts. Compared to all counterparts, our proposed method improves more than 1.5 percentage of accuracy.

Keywords: class imbalance, synthetic sampling, feature augmentation, generative adversarial networks, data cleaning

Procedia PDF Downloads 127
311 UAV’s Enhanced Data Collection for Heterogeneous Wireless Sensor Networks

Authors: Kamel Barka, Lyamine Guezouli, Assem Rezki

Abstract:

In this article, we propose a protocol called DataGA-DRF (a protocol for Data collection using a Genetic Algorithm through Dynamic Reference Points) that collects data from Heterogeneous wireless sensor networks. This protocol is based on DGA (Destination selection according to Genetic Algorithm) to control the movement of the UAV (Unmanned aerial vehicle) between dynamic reference points that virtually represent the sensor node deployment. The dynamics of these points ensure an even distribution of energy consumption among the sensors and also improve network performance. To determine the best points, DataGA-DRF uses a classification algorithm such as K-Means.

Keywords: heterogeneous wireless networks, unmanned aerial vehicles, reference point, collect data, genetic algorithm

Procedia PDF Downloads 82
310 Solid Particles Transport and Deposition Prediction in a Turbulent Impinging Jet Using the Lattice Boltzmann Method and a Probabilistic Model on GPU

Authors: Ali Abdul Kadhim, Fue Lien

Abstract:

Solid particle distribution on an impingement surface has been simulated utilizing a graphical processing unit (GPU). In-house computational fluid dynamics (CFD) code has been developed to investigate a 3D turbulent impinging jet using the lattice Boltzmann method (LBM) in conjunction with large eddy simulation (LES) and the multiple relaxation time (MRT) models. This paper proposed an improvement in the LBM-cellular automata (LBM-CA) probabilistic method. In the current model, the fluid flow utilizes the D3Q19 lattice, while the particle model employs the D3Q27 lattice. The particle numbers are defined at the same regular LBM nodes, and transport of particles from one node to its neighboring nodes are determined in accordance with the particle bulk density and velocity by considering all the external forces. The previous models distribute particles at each time step without considering the local velocity and the number of particles at each node. The present model overcomes the deficiencies of the previous LBM-CA models and, therefore, can better capture the dynamic interaction between particles and the surrounding turbulent flow field. Despite the increasing popularity of LBM-MRT-CA model in simulating complex multiphase fluid flows, this approach is still expensive in term of memory size and computational time required to perform 3D simulations. To improve the throughput of each simulation, a single GeForce GTX TITAN X GPU is used in the present work. The CUDA parallel programming platform and the CuRAND library are utilized to form an efficient LBM-CA algorithm. The methodology was first validated against a benchmark test case involving particle deposition on a square cylinder confined in a duct. The flow was unsteady and laminar at Re=200 (Re is the Reynolds number), and simulations were conducted for different Stokes numbers. The present LBM solutions agree well with other results available in the open literature. The GPU code was then used to simulate the particle transport and deposition in a turbulent impinging jet at Re=10,000. The simulations were conducted for L/D=2,4 and 6, where L is the nozzle-to-surface distance and D is the jet diameter. The effect of changing the Stokes number on the particle deposition profile was studied at different L/D ratios. For comparative studies, another in-house serial CPU code was also developed, coupling LBM with the classical Lagrangian particle dispersion model. Agreement between results obtained with LBM-CA and LBM-Lagrangian models and the experimental data is generally good. The present GPU approach achieves a speedup ratio of about 350 against the serial code running on a single CPU.

Keywords: CUDA, GPU parallel programming, LES, lattice Boltzmann method, MRT, multi-phase flow, probabilistic model

Procedia PDF Downloads 207
309 Femtocell Stationed Flawless Handover in High Agility Trains

Authors: S. Dhivya, M. Abirami, M. Farjana Parveen, M. Keerthiga

Abstract:

The development of high-speed railway makes people’s lives more and more convenient; meanwhile, handover is the major problem on high-speed railway communication services. In order to overcome that drawback the architecture of Long-Term Evolution (LTE) femtocell networks is used to improve network performance, and the deployment of a femtocell is a key for bandwidth limitation and coverage issues in conventional mobile network system. To increase the handover performance this paper proposed a multiple input multiple output (MIMO) assisted handoff (MAHO) algorithm. It is a technique used in mobile telecom to transfer a mobile phone to a new radio channel with stronger signal strength and improved channel quality.

Keywords: flawless handover, high-speed train, home evolved Node B, LTE, mobile femtocell, RSS

Procedia PDF Downloads 473
308 Hyaluronic Acid Binding to Link Domain of Stabilin-2 Receptor

Authors: Aleksandra Twarda, Dobrosława Krzemień, Grzegorz Dubin, Tad A. Holak

Abstract:

Stabilin-2 belongs to the group of scavenger receptors and plays a crucial role in clearance of more than 10 ligands from the bloodstream, including hyaluronic acid, products of degradation of extracellular matrix and metabolic products. The Link domain, a defining feature of stabilin-2, has a sequence similar to Link domains in other hyaluronic acid receptors, such as CD44 or TSG-6, and is responsible for most of ligands binding. Present knowledge of signal transduction by stabilin-2, as well as ligands’ recognition and binding mechanism, is limited. Until now, no experimental structures have been solved for any segments of stabilin-2. It has recently been demonstrated that the stabilin-2 knock-out or blocking of the receptor by an antibody effectively opposes cancer metastasis by elevating the level of circulating hyaluronic acid. Moreover, loss of expression of stabilin-2 in a peri-tumourous liver correlates with increased survival. Solving of the crystal structure of stabilin-2 and elucidation of the binding mechanism of hyaluronic acid could enable the precise characterization of the interactions in the binding site. These results may allow for designing specific small-molecule inhibitors of stabilin-2 that could be used in cancer therapy. To carry out screening for crystallization of stabilin-2, we cloned constructs of the Link domain of various lengths with or without surrounding domains. The folding properties of the constructs were checked by nuclear magnetic resonance (NMR). It is planned to show the binding of hyaluronic acid to the Link domain using several biochemical methods, i.a. NMR, isothermal titration calorimetry and fluorescence polarization assay.

Keywords: stabilin-2, Link domain, X-ray crystallography, NMR, hyaluronic acid, cancer

Procedia PDF Downloads 403
307 Mobility Management via Software Defined Networks (SDN) in Vehicular Ad Hoc Networks (VANETs)

Authors: Bilal Haider, Farhan Aadil

Abstract:

A Vehicular Ad hoc Network (VANET) provides various services to end-users traveling on the road at high speeds. However, this high-speed mobility of mobile nodes can cause frequent service disruptions. Various mobility management protocols exist for managing node mobility, but due to their centralized nature, they tend to suffer in the VANET environment. In this research, we proposed a distributed mobility management protocol using software-defined networks (SDN) for VANETs. Instead of relying on a centralized mobility anchor, the mobility functionality is distributed at multiple infrastructural nodes. The protocol is based on the classical Proxy Mobile IP version 6 (PMIPv6). It is evident from simulation results that this work has improved the network performance with respect to nodes throughput, delay, and packet loss.

Keywords: SDN, VANET, mobility management, optimization

Procedia PDF Downloads 169
306 A Multicopy Strategy for Improved Security Wireless Sensor Network

Authors: Tuğçe Yücel

Abstract:

A Wireless Sensor Network(WSN) is a collection of sensor nodes which are deployed randomly in an area for surveillance. Efficient utilization of limited battery energy of sensors for increased network lifetime as well as data security are major design objectives for WSN. Moreover secure transmission of data sensed to a base station for further processing. Producing multiple copies of data packets and sending them on different paths is one of the strategies for this purpose, which leads to redundant energy consumption and hence reduced network lifetime. In this work we develop a restricted multi-copy multipath strategy where data move through ‘frequently’ or ‘heavily’ used sensors is copied by the sensor incident to such central nodes and sent on node-disjoint paths. We develop a mixed integer programing(MIP) model and heuristic approach present some preleminary test results.

Keywords: MIP, sensor, telecommunications, WSN

Procedia PDF Downloads 510
305 Demonstration of Powering up Low Power Wireless Sensor Network by RF Energy Harvesting System

Authors: Lim Teck Beng, Thiha Kyaw, Poh Boon Kiat, Lee Ngai Meng

Abstract:

This work presents discussion on the possibility of merging two emerging technologies in microwave; wireless power transfer (WPT) and RF energy harvesting. The current state of art of the two technologies is discussed and the strength and weakness of the two technologies is also presented. The equivalent circuit of wireless power transfer is modeled and explained as how the range and efficiency can be further increased by controlling certain parameters in the receiver. The different techniques of harvesting the RF energy from the ambient are also extensive study. Last but not least, we demonstrate that a low power wireless sensor network (WSN) can be power up by RF energy harvesting. The WSN is designed to transmit every 3 minutes of information containing the temperature of the environment and also the voltage of the node. One thing worth mention is both the sensors that are used for measurement are also powering up by the RF energy harvesting system.

Keywords: energy harvesting, wireless power transfer, wireless sensor network and magnetic coupled resonator

Procedia PDF Downloads 519