Search results for: computers in library
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 972

Search results for: computers in library

612 Efficient Reconstruction of DNA Distance Matrices Using an Inverse Problem Approach

Authors: Boris Melnikov, Ye Zhang, Dmitrii Chaikovskii

Abstract:

We continue to consider one of the cybernetic methods in computational biology related to the study of DNA chains. Namely, we are considering the problem of reconstructing the not fully filled distance matrix of DNA chains. When applied in a programming context, it is revealed that with a modern computer of average capabilities, creating even a small-sized distance matrix for mitochondrial DNA sequences is quite time-consuming with standard algorithms. As the size of the matrix grows larger, the computational effort required increases significantly, potentially spanning several weeks to months of non-stop computer processing. Hence, calculating the distance matrix on conventional computers is hardly feasible, and supercomputers are usually not available. Therefore, we started publishing our variants of the algorithms for calculating the distance between two DNA chains; then, we published algorithms for restoring partially filled matrices, i.e., the inverse problem of matrix processing. In this paper, we propose an algorithm for restoring the distance matrix for DNA chains, and the primary focus is on enhancing the algorithms that shape the greedy function within the branches and boundaries method framework.

Keywords: DNA chains, distance matrix, optimization problem, restoring algorithm, greedy algorithm, heuristics

Procedia PDF Downloads 119
611 A Comprehensive Framework to Ensure Data Security in Cloud Computing: Analysis, Solutions, and Approaches

Authors: Loh Fu Quan, Fong Zi Heng, Burra Venkata Durga Kumar

Abstract:

Cloud computing has completely transformed the way many businesses operate. Traditionally, confidential data of a business is stored in computers located within the premise of the business. Therefore, a lot of business capital is put towards maintaining computing resources and hiring IT teams to manage them. The advent of cloud computing changes everything. Instead of purchasing and managing their infrastructure, many businesses have started to shift towards working with the cloud with the help of a cloud service provider (CSP), leading to cost savings. However, it also introduces security risks. This research paper focuses on the security risks that arise during data migration and user authentication in cloud computing. To overcome this problem, this paper provides a comprehensive framework that includes Transport Layer Security (TLS), user authentication, security tokens and multi-level data encryption. This framework aims to prevent authorized access to cloud resources and data leakage, ensuring the confidentiality of sensitive information. This framework can be used by cloud service providers to strengthen the security of their cloud and instil confidence in their users.

Keywords: Cloud computing, Cloud security, Cloud security issues, Cloud security framework

Procedia PDF Downloads 121
610 The Impact of Technology on Computer Systems and Technology

Authors: Bishoy Abouelsoud Saad Amin

Abstract:

This paper examines the use of computer and its related health hazard among computer users in South-Western zone of Nigeria. Two hundred and eighteen (218) computer users constituted the population used to evaluate association between posture, extensive computer use and related health hazard. The instruments for the study are a questionnaire on demographics, lifestyle, body features and work ability index while mean rating, standard deviation and t test were used for data analysis. Identified health related hazard include damages to the eyesight, bad posture, arthritis, musculoskeletal disorders, headache, stress and so on. The results showed that factors such as work demand, posture, closeness to computer screen and excessive working hours on computers constitute health hazards in both old and young computer users of various gender. It is therefore recommended that total number of hours spent with computer should be monitored and controlled.

Keywords: computer game, metaphor, middle school students, virtual environments computer auditing, risk, measures to prevent, information management computer-related health hazard, musculoskeletal disorders, computer usage, work ability index

Procedia PDF Downloads 68
609 Thermal Comfort and Energy Saving Evaluation of a Combined System in an Office Room Using Displacement Ventilation

Authors: A. Q. Ahmed, S. Gao

Abstract:

In this paper, the energy saving and human thermal comfort in a typical office room are investigated. The impact of a combined system of exhaust inlet air with light slots located at the ceiling level in a room served by displacement ventilation system is numerically modelled. Previous experimental data are used to validate the computational fluid dynamic (CFD) model. A case study of simulated office room includes two seating occupants, two computers, two data loggers and four lamps. The combined system is located at the ceiling level above the heat sources. A new method of calculation for the cooling coil load in stratified air distribution (STRAD) system is used in this study. The results show that 47.4 % energy saving of space cooling load can be achieved by combing the exhaust inlet air with light slots at the ceiling level above the heat sources.

Keywords: air conditioning, displacement ventilation, energy saving, thermal comfort

Procedia PDF Downloads 483
608 In Online and Laboratory We Trust: Comparing Trust Game Behavior in Three Environments

Authors: Kaisa M. Herne, Hanna E. Björkstedt

Abstract:

Comparisons of online and laboratory environments are important for assessing whether the environment influences behavioral results. Trust game behavior was examined in three environments: 1) The standard laboratory setting with physically present participants (laboratory), 2) An online environment with an online meeting before playing the trust game (online plus a meeting); and 3) An online environment without a meeting (online without a meeting). In laboratory, participants were present in a classroom and played the trust game anonymously via computers. Online plus a meeting mimicked the laboratory in that participants could see each other in an online meeting before sessions started, whereas online without a meeting was a standard online experiment in which participants did not see each other at any stages of the experiment. Participants were recruited through pools of student subjects at two universities. The trust game was identical in all conditions; it was played with the same software, anonymously, and with stranger matching. There were no statistically significant differences between the treatment conditions regarding trust or trustworthiness. Results suggest that conducting trust game experiments online will yield similar results to experiments implemented in a laboratory.

Keywords: laboratory vs. online experiment, trust behavior, trust game, trustworthiness behavior

Procedia PDF Downloads 78
607 Stability of Essential Oils in Pang-Rum by Gas Chromatography-Mass Spectrometry

Authors: K. Jarmkom, P. Eakwaropas, W. Khobjai, S. Techaeoi

Abstract:

Ancient Thai perfumed powder was used as a fragrance for clothing, food, and the body. Plant-based natural Thai perfume products are known as Pang-Rum. The objective of this study was to evaluate the stability of essential oils after six months of incubation. The chemical compositions were determined by gas chromatography-mass spectrometry (GC-MS), in terms of the qualitative composition of the isolated essential oil. The isolation of the essential oil of natural products by incubate sample for 5 min at 40 ºC is described. The volatile components were identified by percentage of total peak areas comparing their retention times of GC chromatograph with NIST mass spectral library. The results show no significant difference in the seven chromatograms of perfumed powder (Pang-Rum) both with binder and without binder. Further identification was done by GC-MS. Some components of Pang-Rum with/without binder were changed by temperature and time.

Keywords: GC-MS analysis, essential oils, stability, Pang-Rum

Procedia PDF Downloads 272
606 System Identification and Controller Design for a DC Electrical Motor

Authors: Armel Asongu Nkembi, Ahmad Fawad

Abstract:

The aim of this paper is to determine in a concise way the transfer function that characterizes a DC electrical motor with a helix. In practice it can be obtained by applying a particular input to the system and then, based on the observation of its output, determine an approximation to the transfer function of the system. In our case, we use a step input and find the transfer function parameters that give the simulated first-order time response. The simulation of the system is done using MATLAB/Simulink. In order to determine the parameters, we assume a first order system and use the Broida approximation to determine the parameters and then its Mean Square Error (MSE). Furthermore, we design a PID controller for the control process first in the continuous time domain and tune it using the Ziegler-Nichols open loop process. We then digitize the controller to obtain a digital controller since most systems are implemented using computers, which are digital in nature.

Keywords: transfer function, step input, MATLAB, Simulink, DC electrical motor, PID controller, open-loop process, mean square process, digital controller, Ziegler-Nichols

Procedia PDF Downloads 56
605 Joint Space Hybrid Force/Position Control of 6-DoF Robot Manipulator Using Neural Network

Authors: Habtemariam Alemu

Abstract:

It has been known that the performance of position and force control is highly affected by both robot dynamic and environment stiffness uncertainties. In this paper, joint space hybrid force and position control strategy with self-selecting matrix using artificial neural network compensator is proposed. The objective of the work is to improve controller robustness by applying a neural network technique in order to compensate the effect of uncertainties in the robot model. Simulation results for a 6 degree of freedom (6-DoF) manipulator and different types of environments showed the effectiveness of the suggested approach. 6-DoF Puma 560 family robot manipulator is chosen as industrial robot and its efficient dynamic model is designed using Matlab/SimMechanics library.

Keywords: robot manipulator, force/position control, artificial neural network, Matlab/Simulink

Procedia PDF Downloads 517
604 The Consequences of Cyberbullying and School Violence: Risk and Protective Factors

Authors: Ifigenia Stylianou

Abstract:

As more than three-quarters of students going online daily via computers, tablets, and smartphones, the phenomenon of cyberbullying is growing rapidly. Knowing that victims of online bullying are often also victims of traditional bullying and that traditional bullying is considered as an extension of cyberbullying. In this study, we aim to identify (1) whether cyberbullying lead to more intense forms of school bullying, and (2) whether some biological and environmental factors mediate between this relation, and act protectively to bullying and inappropriate behaviour in school. To answer this questions, a sample of X students, aged X, were asked to complete eight questionnaires (Personal Experiences Checklist, Inventory of Peers Attachment, Questionnaire on Teacher Interaction, School Climate Survey for Bullying, Strengths and Difficulties Questionnaire, Youth Psychopathic Traits Inventory-Short Form, Barratt Impulsiveness Scale-11) in X time periods. Results can provide us important information to improve understanding the factors that are related to bullying. In addition, the results can assist in developing intervention programs to tangle the issue of bullying at schools. All data have been collected and are currently being processed for statistical analyses.

Keywords: cyberbullying, bullying, school climate, psychopathy traits, attachment, mediation factors

Procedia PDF Downloads 234
603 Improvement of Heat Dissipation Ability of Polyimide Composite Film

Authors: Jinyoung Kim, Jinuk Kwon, Haksoo Han

Abstract:

Polyimide is widely used in electronic industries, and heat dissipation of polyimide film is important for its application in electric devices for high-temperature resistance heat dissipation film. In this study, we demonstrated a new way to increase heat dissipating rate by adding carbon black as filler. This type of polyimide composite film was produced by pyromellitic dianhydride (PMDA) and 4,4’-oxydianiline (ODA). Carbon black (CB) is added in different loading, shows increasing heat dissipation rate for increase of Carbon black. The polyimide-carbon black composite film is synthesized with high dissipation rate to ~8W∙m−1K−1. Its high thermal decomposition temperature and glass transition temperature were maintained with carbon filler verified by thermogravimetric analysis (TGA) and differential scanning calorimetric (DSC), the polyimidization reaction of polyi(amide-mide) was confirmed by Fourier transform infrared spectroscopy (FT-IR). The polyimide composite film with carbon black with high heat dissipating rate could be used in various applications such as computers, mobile phone industries, integrated circuits, coating materials, semiconductor etc.

Keywords: polyimide, heat dissipation, electric device, filler

Procedia PDF Downloads 679
602 The Role of Human Beings as Caliphs in Preserving Nature

Authors: Firdaus Khairi Abdul Kadir, Nazihah Rusli, Noor Aisyah Abdul Aziz

Abstract:

Islam is a comprehensive religion encompassing all aspects of society’s life such as social, economic, political, cultural and environmental. The environment is part of the manifestation of God’s greatness which has pearls of wisdom, bestowed upon human beings to make them realize that everything is in the hands of God (Allah SWT). However, the equilibrium of nature could be disturbed from the excessive exploitation by humans’ hands. As a caliph on this earth, it is the responsibility of human beings to look after the environment proactively. Besides, Islam calls for the execution of accountable development and respecting the principles of sustainability. Therefore, this study focuses on the role of human beings as caliphs on this earth who are responsible for nature and their acts in conserving and preserving the environment based on the approach of religious education. This study also used the research method of the survey library.

Keywords: environment, human beings, caliph, tauhid, Allah SWT

Procedia PDF Downloads 129
601 Scalable Learning of Tree-Based Models on Sparsely Representable Data

Authors: Fares Hedayatit, Arnauld Joly, Panagiotis Papadimitriou

Abstract:

Many machine learning tasks such as text annotation usually require training over very big datasets, e.g., millions of web documents, that can be represented in a sparse input space. State-of the-art tree-based ensemble algorithms cannot scale to such datasets, since they include operations whose running time is a function of the input space size rather than a function of the non-zero input elements. In this paper, we propose an efficient splitting algorithm to leverage input sparsity within decision tree methods. Our algorithm improves training time over sparse datasets by more than two orders of magnitude and it has been incorporated in the current version of scikit-learn.org, the most popular open source Python machine learning library.

Keywords: big data, sparsely representable data, tree-based models, scalable learning

Procedia PDF Downloads 263
600 Modeling of Transformer Winding for Transients: Frequency-Dependent Proximity and Skin Analysis

Authors: Yazid Alkraimeen

Abstract:

Precise prediction of dielectric stresses and high voltages of power transformers require the accurate calculation of frequency-dependent parameters. A lack of accuracy can result in severe damages to transformer windings. Transient conditions is stuided by digital computers, which require the implementation of accurate models. This paper analyzes the computation of frequency-dependent skin and proximity losses included in the transformer winding model, using analytical equations and Finite Element Method (FEM). A modified formula to calculate the proximity and the skin losses is presented. The results of the frequency-dependent parameter calculations are verified using the Finite Element Method. The time-domain transient voltages are obtained using Numerical Inverse Laplace Transform. The results show that the classical formula for proximity losses is overestimating the transient voltages when compared with the results obtained from the modified method on a simple transformer geometry.

Keywords: fast front transients, proximity losses, transformer winding modeling, skin losses

Procedia PDF Downloads 139
599 Utilization of Hybrid Teaching Methods to Improve Writing Skills of Undergraduate Students

Authors: Tahira Zaman

Abstract:

The paper intends to discover the utility of hybrid teaching methods to aid undergraduate students to improve their English academic writing skills. A total of 45 undergraduate students were selected randomly from three classes from varying language abilities, with the research design of monitoring and rubrics evaluation as a means of measure. Language skills of the students were upgraded with the help of experiential learning methods using reflective writing technique, guided method in which students were merely directed to correct form of writing techniques along with self-guided method for the students to produce a library research-based article measured through a standardized rubrics provided. The progress of the students was monitored and checked through rubrics and self-evaluation and concluded that a change was observed in the students’ writing abilities.

Keywords: self evaluation, hybrid, self evaluation, reflective writing

Procedia PDF Downloads 162
598 Historical Analysis of the First Lady of the Silent Screen: Exploring Parallels between Media Portrayals and Fan Letters to Film Star Lillian Gish

Authors: Annette Davies

Abstract:

This paper examines a collection of four fan letters written by two fans to the early film star, Lillian Gish. The letters were sent to Gish between 1929 and 1962 and were later archived at the New York Library of Performing Arts in Manhattan, New York. This paper also analyzes the media's portrayal of Gish during the time period of these written letters in order to identify parallels between the portrayal of Gish in the media and the perception of Gish by her fans, which is espoused in these fan letters. The media analyzed includes newspapers, fan magazines, Paine's 1932 biography Life and Lillian Gish, a film publicity poster for Gish's film Intolerance, and the film roles performed by Gish. Several parallels are found and assessed using the four processes of audience involvement with a media persona-transportation, parasocial interaction, identification, and worship.

Keywords: celebrity, congruency, fan, persona

Procedia PDF Downloads 146
597 Characterization of Crustin from Litopenaeus vannamei

Authors: Suchao Donpudsa, Anchalee Tassanakajon, Vichien Rimphanitchayakit

Abstract:

A crustin gene, LV-SWD1, previously found in the hemocyte cDNA library of Litopenaeus vannamei, contains the open reading frames of 288 bp encoding a putative protein of 96 amino acid residues. The putative signal peptides of the LV-SWD1 were identified using the online SignalP 3.0 with predicted cleavage sites between Ala24-Val25, resulting in 72 residue mature protein with calculated molecular mass of 7.4 kDa and predicted pI of 8.5. This crustin contains a Arg-Pro rich region at the amino-terminus and a single whey acidic protein (WAP) domain at the carboxyl-terminus. In order to characterize their properties and biological activities, the recombinant crustin protein was produced in the Escherichia coli expression system. Antimicrobial assays showed that the growth of Bacillus subtilis was inhibited by this recombinant crustin with MIC of about 25-50 µM.

Keywords: crustin, single whey acidic protein, Litopenaeus vannamei, antimicrobial activity

Procedia PDF Downloads 244
596 Designing Teaching Aids for Dyslexia Students in Mathematics Multiplication

Authors: Mohini Mohamed, Nurul Huda Mas’od

Abstract:

This study was aimed at designing and developing an assistive mathematical teaching aid (courseware) in helping dyslexic students in learning multiplication. Computers and multimedia interactive courseware has benefits students in terms of increase learner’s motivation and engage them to stay on task in classroom. Most disability student has short attention span thus with the advantage offered by multimedia interactive courseware allows them to retain the learning process for longer period as compared to traditional chalk and talk method. This study was conducted in a public school at a primary level with the help of three special education teachers and six dyslexic students as participants. Qualitative methodology using interview with special education teachers and observations in classes were conducted. The development of the multimedia interactive courseware in this study was divided to three processes which were analysis and design, development and evaluation. The courseware was evaluated by using User Acceptance Survey Form and interview. Feedbacks from teachers were used to alter, correct and develop the application for a better multimedia interactive courseware.

Keywords: disability students, dyslexia, mathematics teaching aid, multimedia interactive courseware

Procedia PDF Downloads 403
595 A Generalized Space-Efficient Algorithm for Quantum Bit String Comparators

Authors: Khuram Shahzad, Omar Usman Khan

Abstract:

Quantum bit string comparators (QBSC) operate on two sequences of n-qubits, enabling the determination of their relationships, such as equality, greater than, or less than. This is analogous to the way conditional statements are used in programming languages. Consequently, QBSCs play a crucial role in various algorithms that can be executed or adapted for quantum computers. The development of efficient and generalized comparators for any n-qubit length has long posed a challenge, as they have a high-cost footprint and lead to quantum delays. Comparators that are efficient are associated with inputs of fixed length. As a result, comparators without a generalized circuit cannot be employed at a higher level, though they are well-suited for problems with limited size requirements. In this paper, we introduce a generalized design for the comparison of two n-qubit logic states using just two ancillary bits. The design is examined on the basis of qubit requirements, ancillary bit usage, quantum cost, quantum delay, gate operations, and circuit complexity and is tested comprehensively on various input lengths. The work allows for sufficient flexibility in the design of quantum algorithms, which can accelerate quantum algorithm development.

Keywords: quantum comparator, quantum algorithm, space-efficient comparator, comparator

Procedia PDF Downloads 16
594 Integrating ICT in Teaching and Learning English in the Algerian Classroom

Authors: A. Tahar Djebbar

Abstract:

Modern technologies have penetrated all spheres of human life, education being one of them. This paper focuses the attention on the integration of technology-based education in the Algerian classroom in teaching foreign languages. It sheds light on a specific area of ICT application: ICT in English learning and teaching. Some Algerian teachers or tutors of English face many challenges among which the lack of teaching materials which are indispensable for transmitting knowledge to learners. Thus, they find themselves compelled to use online e-books or download them in PDF form to support their lessons. Teachers even download such teaching materials like pictures, videos, audios, podcasts, and flash cards from the internet and store them in their Flash USBs to shape up the teaching-learning conditions. They use computers, data shows, and the internet so as to facilitate the teaching–learning process in the classroom. Hence, technology has become a must in the Algerian classroom especially in teaching English which has become a very important language in a national and an international level. This study aims at showing that Algerian tutors/teachers who take up the challenge of getting involved in the technology-enhanced language learning and teaching in the Algerian schools and universities face many obstacles.

Keywords: computer, communication, English, internet, learners, language acquisition, teaching, technology

Procedia PDF Downloads 644
593 Study on the Influence of Cladding and Finishing Materials of Apartment Buildings on the Architectural Identity of Amman

Authors: Asil Zureigat, Ayat Odat

Abstract:

Analyzing the old and bringing in the new is an ever ongoing process in driving innovations in architecture. This paper looks at the excessive use of stone in apartment buildings in Amman and speculates on the existing possibilities of changing the cladding material. By looking at architectural exceptions present in Amman the paper seeks to make the exception, the rule by adding new materials to the architectural library of Amman and in turn, project a series of possible new identities to the existing stone scape. Through distributing a survey, conducting a photographic study on exceptional buildings and shedding light on the historical narrative of stone, the paper highlights the ways in which new finishing materials such as plaster, paint and stone variations could be introduced in an attempt to project a new architectural identity to Amman.

Keywords: architectural city identity, cladding materials, façade architecture, image of the city

Procedia PDF Downloads 225
592 The Effectiveness of a Hybrid Diffie-Hellman-RSA-Advanced Encryption Standard Model

Authors: Abdellahi Cheikh

Abstract:

With the emergence of quantum computers with very powerful capabilities, the security of the exchange of shared keys between two interlocutors poses a big problem in terms of the rapid development of technologies such as computing power and computing speed. Therefore, the Diffie-Hellmann (DH) algorithm is more vulnerable than ever. No mechanism guarantees the security of the key exchange, so if an intermediary manages to intercept it, it is easy to intercept. In this regard, several studies have been conducted to improve the security of key exchange between two interlocutors, which has led to interesting results. The modification made on our model Diffie-Hellman-RSA-AES (DRA), which encrypts the information exchanged between two users using the three-encryption algorithms DH, RSA and AES, by using stenographic photos to hide the contents of the p, g and ClesAES values that are sent in an unencrypted state at the level of DRA model to calculate each user's public key. This work includes a comparative study between the DRA model and all existing solutions, as well as the modification made to this model, with an emphasis on the aspect of reliability in terms of security. This study presents a simulation to demonstrate the effectiveness of the modification made to the DRA model. The obtained results show that our model has a security advantage over the existing solution, so we made these changes to reinforce the security of the DRA model.

Keywords: Diffie-Hellmann, DRA, RSA, advanced encryption standard

Procedia PDF Downloads 93
591 Study on the Transition to Pacemaker of Two Coupled Neurons

Authors: Sun Zhe, Ruggero Micheletto

Abstract:

The research of neural network is very important for the development of advanced next generation intelligent devices and the medical treatment. The most important part of the neural network research is the learning. The process of learning in our brain is essentially several adjustment processes of connection strength between neurons. It is very difficult to figure out how this mechanism works in the complex network and how the connection strength influences brain functions. For this reason, we made a model with only two coupled neurons and studied the influence of connection strength between them. To emulate the neuronal activity of realistic neurons, we prefer to use the Izhikevich neuron model. This model can simulate the neuron variables accurately and it’s simplicity is very suitable to implement on computers. In this research, the parameter ρ is used to estimate the correlation coefficient between spike train of two coupling neurons.We think the results is very important for figuring out the mechanism between synchronization of coupling neurons and synaptic plasticity. The result also presented the importance of the spike frequency adaptation in complex systems.

Keywords: neural networks, noise, stochastic processes, coupled neurons, correlation coefficient, synchronization, pacemaker, synaptic plasticity

Procedia PDF Downloads 284
590 Toward Understanding the Glucocorticoid Receptor Network in Cancer

Authors: Swati Srivastava, Mattia Lauriola, Yuval Gilad, Adi Kimchi, Yosef Yarden

Abstract:

The glucocorticoid receptor (GR) has been proposed to play important, but incompletely understood roles in cancer. Glucocorticoids (GCs) are widely used as co-medication of various carcinomas, due to their ability to reduce the toxicity of chemotherapy. Furthermore, GR antagonism has proven to be a strategy to treat triple negative breast cancer and castration-resistant prostate cancer. These observations suggest differential GR involvement in cancer subtypes. The goal of our study has been to elaborate the current understanding of GR signaling in tumor progression and metastasis. Our study involves two cellular models, non-tumorigenic breast epithelial cells (MCF10A) and Ewing sarcoma cells (CHLA9). In our breast cell model, the results indicated that the GR agonist dexamethasone inhibits EGF-induced mammary cell migration, and this effect was blocked when cells were stimulated with a GR antagonist, namely RU486. Microarray analysis for gene expression revealed that the mechanism underlying inhibition involves dexamenthasone-mediated repression of well-known activators of EGFR signaling, alongside with enhancement of several EGFR’s negative feedback loops. Because GR mainly acts primarily through composite response elements (GREs), or via a tethering mechanism, our next aim has been to find the transcription factors (TFs) which can interact with GR in MCF10A cells.The TF-binding motif overrepresented at the promoter of dexamethasone-regulated genes was predicted by using bioinformatics. To validate the prediction, we performed high-throughput Protein Complementation Assays (PCA). For this, we utilized the Gaussia Luciferase PCA strategy, which enabled analysis of protein-protein interactions between GR and predicted TFs of mammary cells. A library comprising both nuclear receptors (estrogen receptor, mineralocorticoid receptor, GR) and TFs was fused to fragments of GLuc, namely GLuc(1)-X, X-GLuc(1), and X-GLuc(2), where GLuc(1) and GLuc(2) correspond to the N-terminal and C-terminal fragments of the luciferase gene.The resulting library was screened, in human embryonic kidney 293T (HEK293T) cells, for all possible interactions between nuclear receptors and TFs. By screening all of the combinations between TFs and nuclear receptors, we identified several positive interactions, which were strengthened in response to dexamethasone and abolished in response to RU486. Furthermore, the interactions between GR and the candidate TFs were validated by co-immunoprecipitation in MCF10A and in CHLA9 cells. Currently, the roles played by the uncovered interactions are being evaluated in various cellular processes, such as cellular proliferation, migration, and invasion. In conclusion, our assay provides an unbiased network analysis between nuclear receptors and other TFs, which can lead to important insights into transcriptional regulation by nuclear receptors in various diseases, in this case of cancer.

Keywords: epidermal growth factor, glucocorticoid receptor, protein complementation assay, transcription factor

Procedia PDF Downloads 227
589 Mapping Protein Selectivity Landscapes

Authors: Niv Papo

Abstract:

Characterizing the binding selectivity landscape of interacting proteins is crucial both for elucidating the underlying mechanisms of their interaction and for developing selective inhibitors. However, current mapping methods are laborious and cannot provide a sufficiently comprehensive description of the landscape. Here, we introduce a distinct and efficient strategy for comprehensively mapping the binding landscape of proteins using a combination of experimental multi-target selective library screening and in silico next-generation sequencing analysis. We map the binding landscape of a non-selective trypsin inhibitor, the amyloid protein precursor inhibitor (APPI), to each of four human serine proteases (kallikrein-6, mesotrypsin, and anionic and cationic trypsins). We then use this map to dissect and improve the affinity and selectivity of APPI variants toward each of the four proteases. Our strategy can be used as a platform for the development of a new generation of target-selective probes and therapeutic agents based on selective protein–protein interactions.

Keywords: drug design, directed evolution, protein engineering, protease inhibition.

Procedia PDF Downloads 25
588 In Response to Worldwide Disaster: Academic Libraries’ Functioning During COVID-19 Pandemic Without a Policy

Authors: Dalal Albudaiwi, Mike Allen, Talal Alhaji, Shahnaz Khadimehzadah

Abstract:

As a pandemic, COVID-19 has impacted the whole world since November 2019. In other words, every organization, industry, and institution has been negatively affected by the Coronavirus. The uncertainty of how long the pandemic will last caused chaos at all levels. As with any other institution, public libraries were affected and transmitted into online services and resources. As internationally, have been witnessed that some public libraries were well-prepared for such disasters as the pandemic, and therefore, collections, users, services, technologies, staff, and budgets were all influenced. Public libraries’ policies did not mention any plan regarding such a pandemic. Instead, there are several rules in the guidelines about disasters in general, such as natural disasters. In this pandemic situation, libraries have been involved in different uneasy circumstances. However, it has always been apparent to public libraries the role they play in serving their communities in excellent and critical times. It dwells into the traditional role public libraries play in providing information services and sources to satisfy their information-based community needs. Remarkably increasing people’s awareness of the importance of informational enrichment and enhancing society’s skills in dealing with information and information sources. Under critical circumstances, libraries play a different role. It goes beyond the traditional part of information providers to the untraditional role of being a social institution that serves the community with whatever capabilities they have. This study takes two significant directions. The first focuses on investigating how libraries have responded to COVID-19 and how they manage disasters within their organization. The second direction focuses on how libraries help their communities to act during disasters and how to recover from the consequences. The current study examines how libraries prepare for disasters and the role of public libraries during disasters. We will also propose “measures” to be a model that libraries can use to evaluate the effectiveness of their response to disasters. We intend to focus on how libraries responded to this new disaster. Therefore, this study aims to develop a comprehensive policy that includes responding to a crisis such as Covid-19. An analytical lens inside the libraries as an organization and outside the organization walls will be documented based on analyzing disaster-related literature published in the LIS publication. The study employs content analysis (CA) methodology. CA is widely used in the library and information science. The critical contribution of this work is to propose solutions it provides to libraries and planers to prepare crisis management plans/ policies, specifically to face a new global disaster such as the COVID-19 pandemic. Moreover, the study will help library directors to evaluate their strategies and to improve them properly. The significance of this study lies in guiding libraries’ directors to enhance the goals of the libraries to guarantee crucial issues such as: saving time, avoiding loss, saving budget, acting quickly during a crisis, maintaining libraries’ role during pandemics, finding out the best response to disasters, and creating plan/policy as a sample for all libraries.

Keywords: Covid-19, policy, preparedness, public libraries

Procedia PDF Downloads 80
587 Forecasting the Influences of Information and Communication Technology on the Structural Changes of Japanese Industrial Sectors: A Study Using Statistical Analysis

Authors: Ubaidillah Zuhdi, Shunsuke Mori, Kazuhisa Kamegai

Abstract:

The purpose of this study is to forecast the influences of Information and Communication Technology (ICT) on the structural changes of Japanese economies based on Leontief Input-Output (IO) coefficients. This study establishes a statistical analysis to predict the future interrelationships among industries. We employ the Constrained Multivariate Regression (CMR) model to analyze the historical changes of input-output coefficients. Statistical significance of the model is then tested by Likelihood Ratio Test (LRT). In our model, ICT is represented by two explanatory variables, i.e. computers (including main parts and accessories) and telecommunications equipment. A previous study, which analyzed the influences of these variables on the structural changes of Japanese industrial sectors from 1985-2005, concluded that these variables had significant influences on the changes in the business circumstances of Japanese commerce, business services and office supplies, and personal services sectors. The projected future Japanese economic structure based on the above forecast generates the differentiated direct and indirect outcomes of ICT penetration.

Keywords: forecast, ICT, industrial structural changes, statistical analysis

Procedia PDF Downloads 375
586 An Exploratory Research on Childhood Sexual Victimization and Its Psychological Impacts

Authors: Urwah Ali

Abstract:

The aim of this study is to carry out a meta-analysis in order to establish an overall international figure and to summarize the evidence relating to the possible relationship between child sexual abuse and subsequent mental and physical health outcomes. A systematic review was conducted using the HEC Digital Library, Pub Med, PsycINFO and SAHIL databases published after 2010 containing empirical data pertaining to CSA. Out of 124 articles assessed for eligibility, 32 studies provided evidence of a relationship between sexual child maltreatment and various health outcomes for use in subsequent meta-analyses. Statistical significance associations were observed between childhood sexual victimization and psychological problems in their adulthood [odds ratio (OR) = 1.5; 95%Cl 3.07–4.43]. For most studies included for meta-analysis, the odds ratio falls above 1.00, indicating that patients having history of childhood sexual victimization were more likely to develop psychological disorders.

Keywords: abuse, sexual abuse, childhood sexual abuse, mental health

Procedia PDF Downloads 408
585 Optimized Road Lane Detection Through a Combined Canny Edge Detection, Hough Transform, and Scaleable Region Masking Toward Autonomous Driving

Authors: Samane Sharifi Monfared, Lavdie Rada

Abstract:

Nowadays, autonomous vehicles are developing rapidly toward facilitating human car driving. One of the main issues is road lane detection for a suitable guidance direction and car accident prevention. This paper aims to improve and optimize road line detection based on a combination of camera calibration, the Hough transform, and Canny edge detection. The video processing is implemented using the Open CV library with the novelty of having a scale able region masking. The aim of the study is to introduce automatic road lane detection techniques with the user’s minimum manual intervention.

Keywords: hough transform, canny edge detection, optimisation, scaleable masking, camera calibration, improving the quality of image, image processing, video processing

Procedia PDF Downloads 96
584 The Effects of Spatial Dimensions and Relocation and Dimensions of Sound Absorbers in a Space on the Objective Parameters of Sound

Authors: Mustafa Kavraz

Abstract:

This study investigated the differences in the objective parameters of sound depending on the changes in the lengths of the lateral surfaces of a space and on the replacement of the sound absorbers that are placed on these surfaces. To this end, three models of room were chosen. The widths and heights of these rooms were the same but the lengths of the rooms were changed. The smallest room was 8 m. wide and 10 m. long. The lengths of the other two rooms were 15 m. and 20 m. For each model, the differences in the objective parameters of sound were determined by keeping all the material in the space intact and by changing only the positions of the sound absorbers that were placed on the walls. The sound absorbers that were used on the walls were of two different sizes. The sound absorbers that were placed on the walls were 4 m and 8 m. long and story-height (3 m.). In all model room types, the sound absorbers were placed on the long walls in three different ways: at the end of the long walls where the long walls meet the front wall; at the end of the long walls where the long walls meet the back wall; and in the middle part of the long walls. Except for the specially placed sound absorbers, the ground, wall and ceiling surfaces were covered with three different materials. There were no constructional elements such as doors and windows on the walls. On the surfaces, the materials specified in the Odeon 10 material library were used as coating material. Linoleum was used as flooring material, painted plaster as wall coating material and gypsum boards as ceiling covering (2 layers with a total of 32 mm. thickness). These were preferred due to the fact that they are the commonly used materials for these purposes. This study investigated the differences in the objective parameters of sound depending on the changes in the lengths of the lateral surfaces of a space and on the replacement of the sound absorbers that are placed on these surfaces. To this end, three models of room were chosen. The widths and heights of these rooms were the same but the lengths of the rooms were changed. The smallest room was 8 m. wide and 10 m. long. The lengths of the other two rooms were 15 m. and 20 m. For each model, the differences in the objective parameters of sound were determined by keeping all the material in the space intact and by changing only the positions of the sound absorbers that were placed on the walls. The sound absorbers that were used on the walls were of two different sizes. The sound absorbers that were placed on the walls were 4 m and 8 m. long and story-height (3 m.). In all model room types, the sound absorbers were placed on the long walls in three different ways: at the end of the long walls where the long walls meet the front wall; at the end of the long walls where the long walls meet the back wall; and in the middle part of the long walls. Except for the specially placed sound absorbers, the ground, wall and ceiling surfaces were covered with three different materials. There were no constructional elements such as doors and windows on the walls. On the surfaces, the materials specified in the Odeon 10 material library were used as coating material. Linoleum was used as flooring material, painted plaster as wall coating material and gypsum boards as ceiling covering (2 layers with a total of 32 mm. thickness). These were preferred due to the fact that they are the commonly used materials for these purposes.

Keywords: sound absorber, room model, objective parameters of sound, jnd

Procedia PDF Downloads 375
583 Incorporating Anomaly Detection in a Digital Twin Scenario Using Symbolic Regression

Authors: Manuel Alves, Angelica Reis, Armindo Lobo, Valdemar Leiras

Abstract:

In industry 4.0, it is common to have a lot of sensor data. In this deluge of data, hints of possible problems are difficult to spot. The digital twin concept aims to help answer this problem, but it is mainly used as a monitoring tool to handle the visualisation of data. Failure detection is of paramount importance in any industry, and it consumes a lot of resources. Any improvement in this regard is of tangible value to the organisation. The aim of this paper is to add the ability to forecast test failures, curtailing detection times. To achieve this, several anomaly detection algorithms were compared with a symbolic regression approach. To this end, Isolation Forest, One-Class SVM and an auto-encoder have been explored. For the symbolic regression PySR library was used. The first results show that this approach is valid and can be added to the tools available in this context as a low resource anomaly detection method since, after training, the only requirement is the calculation of a polynomial, a useful feature in the digital twin context.

Keywords: anomaly detection, digital twin, industry 4.0, symbolic regression

Procedia PDF Downloads 120