Search results for: event sequence
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 2368

Search results for: event sequence

1978 CompPSA: A Component-Based Pairwise RNA Secondary Structure Alignment Algorithm

Authors: Ghada Badr, Arwa Alturki

Abstract:

The biological function of an RNA molecule depends on its structure. The objective of the alignment is finding the homology between two or more RNA secondary structures. Knowing the common functionalities between two RNA structures allows a better understanding and a discovery of other relationships between them. Besides, identifying non-coding RNAs -that is not translated into a protein- is a popular application in which RNA structural alignment is the first step A few methods for RNA structure-to-structure alignment have been developed. Most of these methods are partial structure-to-structure, sequence-to-structure, or structure-to-sequence alignment. Less attention is given in the literature to the use of efficient RNA structure representation and the structure-to-structure alignment methods are lacking. In this paper, we introduce an O(N2) Component-based Pairwise RNA Structure Alignment (CompPSA) algorithm, where structures are given as a component-based representation and where N is the maximum number of components in the two structures. The proposed algorithm compares the two RNA secondary structures based on their weighted component features rather than on their base-pair details. Extensive experiments are conducted illustrating the efficiency of the CompPSA algorithm when compared to other approaches and on different real and simulated datasets. The CompPSA algorithm shows an accurate similarity measure between components. The algorithm gives the flexibility for the user to align the two RNA structures based on their weighted features (position, full length, and/or stem length). Moreover, the algorithm proves scalability and efficiency in time and memory performance.

Keywords: alignment, RNA secondary structure, pairwise, component-based, data mining

Procedia PDF Downloads 459
1977 The Structural Pattern: An Event-Related Potential Study on Tang Poetry

Authors: ShuHui Yang, ChingChing Lu

Abstract:

Measuring event-related potentials (ERPs) has been fundamental to our understanding of how people process language. One specific ERP component, a P600, has been hypothesized to be associated with syntactic reanalysis processes. We, however, propose that the P600 is not restricted to reanalysis processes, but is the index of the structural pattern processing. To investigate the structural pattern processing, we utilized the effects of stimulus degradation in structural priming. To put it another way, there was no P600 effect if the structure of the prime was the same with the structure of the target. Otherwise, there would be a P600 effect if the structure were different between the prime and the target. In the experiment, twenty-two participants were presented with four sentences of Tang poetry. All of the first two sentences, being prime, were conducted with SVO+VP. The last two sentences, being the target, were divided into three types. Type one of the targets was SVO+VP. Type two of the targets was SVO+VPVP. Type three of the targets was VP+VP. The result showed that both of the targets, SVO+VPVP and VP+VP, elicited positive-going brainwave, a P600 effect, at 600~900ms time window. Furthermore, the P600 component was lager for the target’ VP+VP’ than the target’ SVO+VPVP’. That meant the more dissimilar the structure was, the lager the P600 effect we got. These results indicate that P600 was the index of the structure processing, and it would affect the P600 effect intensity with the degrees of structural heterogeneity.

Keywords: ERPs, P600, structural pattern, structural priming, Tang poetry

Procedia PDF Downloads 140
1976 Two-Level Graph Causality to Detect and Predict Random Cyber-Attacks

Authors: Van Trieu, Shouhuai Xu, Yusheng Feng

Abstract:

Tracking attack trajectories can be difficult, with limited information about the nature of the attack. Even more difficult as attack information is collected by Intrusion Detection Systems (IDSs) due to the current IDSs having some limitations in identifying malicious and anomalous traffic. Moreover, IDSs only point out the suspicious events but do not show how the events relate to each other or which event possibly cause the other event to happen. Because of this, it is important to investigate new methods capable of performing the tracking of attack trajectories task quickly with less attack information and dependency on IDSs, in order to prioritize actions during incident responses. This paper proposes a two-level graph causality framework for tracking attack trajectories in internet networks by leveraging observable malicious behaviors to detect what is the most probable attack events that can cause another event to occur in the system. Technically, given the time series of malicious events, the framework extracts events with useful features, such as attack time and port number, to apply to the conditional independent tests to detect the relationship between attack events. Using the academic datasets collected by IDSs, experimental results show that the framework can quickly detect the causal pairs that offer meaningful insights into the nature of the internet network, given only reasonable restrictions on network size and structure. Without the framework’s guidance, these insights would not be able to discover by the existing tools, such as IDSs. It would cost expert human analysts a significant time if possible. The computational results from the proposed two-level graph network model reveal the obvious pattern and trends. In fact, more than 85% of causal pairs have the average time difference between the causal and effect events in both computed and observed data within 5 minutes. This result can be used as a preventive measure against future attacks. Although the forecast may be short, from 0.24 seconds to 5 minutes, it is long enough to be used to design a prevention protocol to block those attacks.

Keywords: causality, multilevel graph, cyber-attacks, prediction

Procedia PDF Downloads 157
1975 Performance Evaluation of Production Schedules Based on Process Mining

Authors: Kwan Hee Han

Abstract:

External environment of enterprise is rapidly changing majorly by global competition, cost reduction pressures, and new technology. In these situations, production scheduling function plays a critical role to meet customer requirements and to attain the goal of operational efficiency. It deals with short-term decision making in the production process of the whole supply chain. The major task of production scheduling is to seek a balance between customer orders and limited resources. In manufacturing companies, this task is so difficult because it should efficiently utilize resource capacity under the careful consideration of many interacting constraints. At present, many computerized software solutions have been utilized in many enterprises to generate a realistic production schedule to overcome the complexity of schedule generation. However, most production scheduling systems do not provide sufficient information about the validity of the generated schedule except limited statistics. Process mining only recently emerged as a sub-discipline of both data mining and business process management. Process mining techniques enable the useful analysis of a wide variety of processes such as process discovery, conformance checking, and bottleneck analysis. In this study, the performance of generated production schedule is evaluated by mining event log data of production scheduling software system by using the process mining techniques since every software system generates event logs for the further use such as security investigation, auditing and error bugging. An application of process mining approach is proposed for the validation of the goodness of production schedule generated by scheduling software systems in this study. By using process mining techniques, major evaluation criteria such as utilization of workstation, existence of bottleneck workstations, critical process route patterns, and work load balance of each machine over time are measured, and finally, the goodness of production schedule is evaluated. By using the proposed process mining approach for evaluating the performance of generated production schedule, the quality of production schedule of manufacturing enterprises can be improved.

Keywords: data mining, event log, process mining, production scheduling

Procedia PDF Downloads 280
1974 Socioeconomic Burden of Life Long Disease: A Case of Diabetes Care in Bangladesh

Authors: Samira Humaira Habib

Abstract:

Diabetes has profound effects on individuals and their families. If diabetes is not well monitored and managed, then it leads to long-term complications and a large and growing cost to the health care system. Prevalence and socioeconomic burden of diabetes and relative return of investment for the elimination or the reduction of the burden are much more important regarding its cost burden. Various studies regarding the socioeconomic cost burden of diabetes are well explored in developed countries but almost absent in developing countries like Bangladesh. The main objective of the study is to estimate the total socioeconomic burden of diabetes. It is a prospective longitudinal follow up study which is analytical in nature. Primary and secondary data are collected from patients who are undergoing treatment for diabetes at the out-patient department of Bangladesh Institute of Research & Rehabilitation in Diabetes, Endocrine & Metabolic Disorders (BIRDEM). Of the 2115 diabetic subjects, females constitute around 50.35% of the study subject, and the rest are male (49.65%). Among the subjects, 1323 are controlled, and 792 are uncontrolled diabetes. Cost analysis of 2115 diabetic patients shows that the total cost of diabetes management and treatment is US$ 903018 with an average of US$ 426.95 per patient. In direct cost, the investigation and medical treatment at hospital along with investigation constitute most of the cost in diabetes. The average cost of a hospital is US$ 311.79, which indicates an alarming warn for diabetic patients. The indirect cost shows that cost of productivity loss (US$ 51110.1) is higher among the all indirect item. All constitute total indirect cost as US$ 69215.7. The incremental cost of intensive management of uncontrolled diabetes is US$ 101.54 per patient and event-free time gained in this group is 0.55 years and the life years gain is 1.19 years. The incremental cost per event-free year gained is US$ 198.12. The incremental cost of intensive management of the controlled group is US$ 89.54 per patient and event-free time gained is 0.68 years, and the life year gain is 1.12 years. The incremental cost per event-free year gained is US$ 223.34. The EuroQoL difference between the groups is found to be 64.04. The cost-effective ratio is found to be US$ 1.64 cost per effect in case of controlled diabetes and US$ 1.69 cost per effect in case of uncontrolled diabetes. So management of diabetes is much more cost-effective. Cost of young type 1 diabetic patient showed upper socioeconomic class, and with the increase of the duration of diabetes, the cost increased also. The dietary pattern showed macronutrients intake and cost are significantly higher in the uncontrolled group than their counterparts. Proper management and control of diabetes can decrease the cost of care for the long term.

Keywords: cost, cost-effective, chronic diseases, diabetes care, burden, Bangladesh

Procedia PDF Downloads 147
1973 Modification of Escherichia coli PtolT Expression Vector via Site-Directed Mutagenesis

Authors: Yakup Ulusu, Numan Eczacıoğlu, İsa Gökçe, Helen Waller, Jeremy H. Lakey

Abstract:

Besides having the appropriate amino acid sequence to perform the function of proteins, it is important to have correct conformation after this sequence to process. To consist of this conformation depends on the amino acid sequence at the primary structure, hydrophobic interaction, chaperones and enzymes in charge of folding etc. Misfolded proteins are not functional and tend to be aggregated. Cysteine originating disulfide cross-links make stable this conformation of functional proteins. When two of the cysteine amino acids come side by side, disulfide bond is established that forms a cystine bridge. Due to this feature cysteine plays an important role on the formation of three-dimensional structure of many proteins. There are two cysteine amino acids (C44, C69) in the Tol-A-III protein. Unlike protein disulfide bonds from within his own, any non-specific cystine bridge causes a change in the three dimensional structure of the protein. Proteins can be expressed in various host cells as directly or fusion (chimeric). As a result of overproduction of the recombinant proteins, aggregation of insoluble proteins in the host cell can occur by forming a crystal structure called inclusion body. In general fusion proteins are produced for provide affinity tags to make proteins more soluble and production of some toxic proteins via fusion protein expression system like pTolT. Proteins can be modified by using a site-directed mutagenesis. By this way, creation of non-specific disulfide crosslinks can be prevented at fusion protein expression system via the present cysteine replaced by another amino acid such as serine, glycine or etc. To do this, we need; a DNA molecule that contains the gene that encodes for the target protein, required primers for mutation to be designed according to site directed mutagenesis reaction. This study was aimed to be replaced cysteine encoding codon TGT with serine encoding codon AGT. For this sense and reverse primers designed (given below) and used site-directed mutagenesis reaction. Several new copy of the template plasmid DNA has been formed with above mentioned mutagenic primers via polymerase chain reaction (PCR). PCR product consists of both the master template DNA (wild type) and the new DNA sequences containing mutations. Dpn-l endonuclease restriction enzyme which is specific for methylated DNA and cuts them to the elimination of the master template DNA. E. coli cells obtained after transformation were incubated LB medium with antibiotic. After purification of plasmid DNA from E. coli, the presence of the mutation was determined by DNA sequence analysis. Developed this new plasmid is called PtolT-δ.

Keywords: site directed mutagenesis, Escherichia coli, pTolT, protein expression

Procedia PDF Downloads 376
1972 Causes and Impacts of Marine Heatwaves in the Bay of Bengal Region in the Recent Period

Authors: Sudhanshu Kumar, Raghvendra Chandrakar, Arun Chakraborty

Abstract:

In the ocean, the temperature extremes have the potential to devastate marine habitats, ecosystems together with ensuing socioeconomic consequences. In recent years, these extreme events are more frequent and intense globally and their increasing trend is expected to continue in the upcoming decades. It recently attracted public interest, as well as scientific researchers, which motivates us to analyze the current marine heatwave (MHW) events in the Bay of Bengal region. we have isolated 107 MHW events (above 90th percentile threshold) in this region of the Indian Ocean and investigated the variation in duration, intensity, and frequency of MHW events during our test period (1982-2021). Our study reveals that in the study region the average of three MHW events per year with an increasing linear trend of 1.11 MHW events per decade. In the analysis, we found the longest MHW event which lasted about 99 days, which is far greater than an average MHW event duration. The maximum intensity was 5.29°C (above the climatology-mean), while the mean intensity was 2.03°C. In addition, we observed net heat flux accompanied by anticyclonic eddies to be the primary cause of these events. Moreover, we concluded that these events affect sea surface height and oceanic productivity, highlighting the adverse impact of MHWs on marine ecosystems.

Keywords: marine heatwaves, global warming, climate change, sea surface temperature, marine ecosystem

Procedia PDF Downloads 124
1971 Human Factors Integration of Chemical, Biological, Radiological and Nuclear Response: Systems and Technologies

Authors: Graham Hancox, Saydia Razak, Sue Hignett, Jo Barnes, Jyri Silmari, Florian Kading

Abstract:

In the event of a Chemical, Biological, Radiological and Nuclear (CBRN) incident rapidly gaining, situational awareness is of paramount importance and advanced technologies have an important role to play in improving detection, identification, monitoring (DIM) and patient tracking. Understanding how these advanced technologies can fit into current response systems is essential to ensure they are optimally designed, usable and meet end-users’ needs. For this reason, Human Factors (Ergonomics) methods have been used within an EU Horizon 2020 project (TOXI-Triage) to firstly describe (map) the hierarchical structure in a CBRN response with adapted Accident Map (AcciMap) methodology. Secondly, Hierarchical Task Analysis (HTA) has been used to describe and review the sequence of steps (sub-tasks) in a CBRN scenario response as a task system. HTA methodology was then used to map one advanced technology, ‘Tag and Trace’, which tags an element (people, sample and equipment) with a Near Field Communication (NFC) chip in the Hot Zone to allow tracing of (monitoring), for example casualty progress through the response. This HTA mapping of the Tag and Trace system showed how the provider envisaged the technology being used, allowing for review and fit with the current CBRN response systems. These methodologies have been found to be very effective in promoting and supporting a dialogue between end-users and technology providers. The Human Factors methods have given clear diagrammatic (visual) representations of how providers see their technology being used and how end users would actually use it in the field; allowing for a more user centered approach to the design process. For CBRN events usability is critical as sub-optimum design of technology could add to a responders’ workload in what is already a chaotic, ambiguous and safety critical environment.

Keywords: AcciMap, CBRN, ergonomics, hierarchical task analysis, human factors

Procedia PDF Downloads 222
1970 Development of Trigger Tool to Identify Adverse Drug Events From Warfarin Administered to Patient Admitted in Medical Wards of Chumphae Hospital

Authors: Puntarikorn Rungrattanakasin

Abstract:

Objectives: To develop the trigger tool to warn about the risk of bleeding as an adverse event from warfarin drug usage during admission in Medical Wards of Chumphae Hospital. Methods: A retrospective study was performed by reviewing the medical records for the patients admitted between June 1st,2020- May 31st, 2021. ADEs were evaluated by Naranjo’s algorithm. The international normalized ratio (INR) and events of bleeding during admissions were collected. Statistical analyses, including Chi-square test and Reciever Operating Characteristic (ROC) curve for optimal INR threshold, were used for the study. Results: Among the 139 admissions, the INR range was found to vary between 0.86-14.91, there was a total of 15 bleeding events, out of which 9 were mild, and 6 were severe. The occurrence of bleeding started whenever the INR was greater than 2.5 and reached the statistical significance (p <0.05), which was in concordance with the ROC curve and yielded 100 % sensitivity and 60% specificity in the detection of a bleeding event. In this regard, the INR greater than 2.5 was considered to be an optimal threshold to alert promptly for bleeding tendency. Conclusions: The INR value of greater than 2.5 (>2.5) would be an appropriate trigger tool to warn of the risk of bleeding for patients taking warfarin in Chumphae Hospital.

Keywords: trigger tool, warfarin, risk of bleeding, medical wards

Procedia PDF Downloads 148
1969 Performance Analysis of PAPR Reduction in OFDM Systems based on Partial Transmit Sequence (PTS) Technique

Authors: Alcardo Alex Barakabitze, Tan Xiaoheng

Abstract:

Orthogonal Frequency Division Multiplexing (OFDM) is a special case of Multi-Carrier Modulation (MCM) technique which transmits a stream of data over a number of lower data rate subcarriers. OFDM splits the total transmission bandwidth into a number of orthogonal and non-overlapping subcarriers and transmit the collection of bits called symbols in parallel using these subcarriers. This paper explores the Peak to Average Power Reduction (PAPR) using the Partial Transmit Sequence technique. We provide the distribution analysis and the basics of OFDM signals and then show how the PAPR increases as the number of subcarriers increases. We provide the performance analysis of CCDF and PAPR expressed in decibels through MATLAB simulations. The simulation results show that, in PTS technique, the performance of PAPR reduction in OFDM systems improves significantly as the number of sub-blocks increases. However, by keeping the same number of sub-blocks variation, oversampling factor and the number of OFDM blocks’ iteration for generating the CCDF, the OFDM systems with 128 subcarriers have an improved performance in PAPR reduction compared to OFDM systems with 256, 512 or >512 subcarriers.

Keywords: OFDM, peak to average power reduction (PAPR), bit error rate (BER), subcarriers, wireless communications

Procedia PDF Downloads 515
1968 Storyboarding for VR: Towards A Conceptual Framework for Transitioning Traditional Storyboarded Narrative Sequences to Immersive 3D VR Experiences

Authors: Sorin Oancea

Abstract:

More than half a century after Ivan Sutherland’s seminal essay, ‘The Ultimate Display’ (1965), 3D Virtual Reality is still an emergent and exploratory medium in terms of its narrative potential, production methodology, and market penetration. Traditionally positioned in front of the screen/canvas as a ‘window-on-the-world’, the storyboarder and animation director transcend the medium and its narrative reality entirely while designing a linear cinematic sequence. This paper proposes a gradual transition from the traditional linear sequence design process based on a transcendent position of the storyboarder and animation director to an increasingly immersed one characterized by a sense of unmediated presence and immanence. Employing a quaitative analysis of the current exploratory storyboarding processes for 3D VR, this research uses a practice-based methodology based on producing a short-form 3D VR narrative experience to derive its findings. The original contribution to knowledge is charting an empirically derived conceptual framework for VR storyboarding and animation directing, with the documented reflective and reflexive process as a map for directorial transitioning between converging mediums by articulating the new VR lexical categories and expounding links to allied performative arts, such as film and theatre.

Keywords: storyboarding, immersive, virtual reality, transitioning

Procedia PDF Downloads 101
1967 Initial Palaeotsunami and Historical Tsunami in the Makran Subduction Zone of the Northwest Indian Ocean

Authors: Mohammad Mokhtari, Mehdi Masoodi, Parvaneh Faridi

Abstract:

history of tsunami generating earthquakes along the Makran Subduction Zone provides evidence of the potential tsunami hazard for the whole coastal area. In comparison with other subduction zone in the world, the Makran region of southern Pakistan and southeastern Iran remains low seismicity. Also, it is one of the least studied area in the northwest of the Indian Ocean regarding tsunami studies. We present a review of studies dealing with the historical /and ongoing palaeotsunamis supported by IGCP of UNESCO in the Makran Subduction Zone. The historical tsunami presented here includes about nine tsunamis in the Makran Subduction Zone, of which over 7 tsunamis occur in the eastern Makran. Tsunami is not as common in the western Makran as in the eastern Makran, where a database of historical events exists. The historically well-documented event is related to the 1945 earthquake with a magnitude of 8.1moment magnitude and tsunami in the western and eastern Makran. There are no details as to whether a tsunami was generated by a seismic event before 1945 off western Makran. But several potentially large tsunamigenic events in the MSZ before 1945 occurred in 325 B.C., 1008, 1483, 1524, 1765, 1851, 1864, and 1897. Here we will present new findings from a historical point of view, immediately, we would like to emphasize that the area needs to be considered with higher research investigation. As mentioned above, a palaeotsunami (geological evidence) is now being planned, and here we will present the first phase result. From a risk point of view, the study shows as preliminary achievement within 20 minutes the wave reaches to Iranian as well Pakistan and Oman coastal zone with very much destructive tsunami waves capable of inundating destructive effect. It is important to note that all the coastal areas of all states surrounding the MSZ are being developed very rapidly, so any event would have a devastating effect on this region. Although several papers published about modelling, seismology, tsunami deposits in the last decades; as Makran is a forgotten subduction zone, more data such as the main crustal structure, fault location, and its related parameter are required.

Keywords: historical tsunami, Indian ocean, makran subduction zone, palaeotsunami

Procedia PDF Downloads 132
1966 Sequence Analysis of the Effect of HPV-16 E1 Variation on Cervical Carcinogenesis

Authors: Fern Baedyananda, Arkom Chaiwongkot, Somchai Niruthisard, Nakarin Kitkumthorn, Parvapan Bhattarakosol

Abstract:

High-risk human papillomavirus (HPV) infections cause transformation of the host cells by down-regulating and inhibiting host regulatory proteins such as p53 and pRb by overexpressing the viral oncoproteins E6 and E7. However, the E1 protein which is the only enzyme encoded by HPV has also been shown to cause DNA instability leading to the integration of the virus into the host genome and triggering carcinogenic events. A 63bp duplication in the E1 helicase region has been detected in European patients. However, the clinical prognosis of these patients is still controversial. This study was performed to determine the presence of the HPV-16 E1 63bp duplication in patient cervical samples in Thai women and determine the sequence of the variant in the Thai population. Detection of the HPV-16 E1 duplication in the helicase region was performed in 90 patient cell samples across normal, cervical intraepithelial neoplasia I-III, and squamous cervical carcinoma stages by PCR. The PCR products were purified and sequenced to determine the presence of duplication variants.The variant form was found in 10% of all CIN 1 patients. In this study, the presence of the 63 bp duplication variant in the Thai population was found to be present and was further characterized. Interestingly, all samples that exhibited the variant form of HPV-16 E1 were classified as CIN I. Presence of the variant, constricted to mild dysplasia signifies the importance of HPV-16 E1 in carcinogenesis.

Keywords: carcinogenesis, cervical cancer, human papillomavirus, HPV-16 E1

Procedia PDF Downloads 237
1965 Pharmacovigilance: An Empowerment in Safe Utilization of Pharmaceuticals

Authors: Pankaj Prashar, Bimlesh Kumar, Ankita Sood, Anamika Gautam

Abstract:

Pharmacovigilance (PV) is a rapidly growing discipline in pharmaceutical industries as an integral part of clinical research and drug development over the past few decades. PV carries a breadth of scope from drug manufacturing to its regulation with safer utilization. The fundamental steps of PV not only includes data collection and verification, coding of drugs with adverse drug reactions, causality assessment and timely reporting to the authorities but also monitoring drug manufacturing, safety issues, product quality and conduction of due diligence. Standardization of adverse event information, collaboration of multiple departments in different companies, preparation of documents in accordance to both governmental as well as non-governmental organizations (FDA, EMA, GVP, ICH) are the advancements in discipline of PV. De-harmonization, lack of predictive drug safety models, improper funding by government, non-reporting, and non-acceptability of ADRs by developing countries and reports directly from patients to the monitoring centres respectively are the major road backs of PV. Mandatory pharmacovigilance reporting, frequent inspections, funding by government, educating and training medical students, pharmacists and nurses in this segment can bring about empowerment in PV. This area needs to be addressed with a sense of urgency for the safe utilization of pharmaceuticals.

Keywords: pharmacovigilance, regulatory, adverse event, drug safety

Procedia PDF Downloads 124
1964 Comparison of the Isolation Rates and Characteristics of Salmonella Isolated from Antibiotic-Free and Conventional Chicken Meat Samples

Authors: Jin-Hyeong Park, Hong-Seok Kim, Jin-Hyeok Yim, Young-Ji Kim, Dong-Hyeon Kim, Jung-Whan Chon, Kun-Ho Seo

Abstract:

Salmonella contamination in chicken samples can cause major health problems in humans. However, not only the effects of antibiotic treatment during growth but also the impacts of poultry slaughter line on the prevalence of Salmonella in final chicken meat sold to consumers are unknown. In this study, we compared the isolation rates and antimicrobial resistance of Salmonella between antibiotic-free, conventional, conventional Korean native retail chicken meat samples and clonal divergence of Salmonella isolates by multilocus sequence typing. In addition, the distribution of extended-spectrum β-lactamase (ESBL) genes in ESBL-producing Salmonella isolates was analyzed. A total of 72 retail chicken meat samples (n = 24 antibiotic-free broiler [AFB] chickens, n = 24 conventional broiler [CB] chickens, and n = 24 conventional Korean native [CK] chickens) were collected from local retail markets in Seoul, South Korea. The isolation rates of Salmonella were 66.6% in AFB chickens, 45.8% in CB chickens, and 25% in CK chickens. By analyzing the minimum inhibitory concentrations of β -lactam antibiotics with the disc-diffusion test, we found that 81.2% of Salmonella isolates from AFB chickens, 63.6% of isolates from CB chickens, and 50% of isolates from CK chickens were ESBL producers; all ESBL-positive isolates had the CTX-M-15 genotype. Interestingly, all ESBL-producing Salmonella were revealed as ST16 by multilocus sequence typing. In addition, all CTX-M-15-positive isolates had the genetic platform of blaCTX-M gene (IS26-ISEcp1-blaCTX-M-15-IS903), to the best of our knowledge, this is the first report in Salmonella around the world. The Salmonella ST33 strain (S. Hadar) isolated in this study has never been reported in South Korea. In conclusion, our findings showed that antibiotic-free retail chicken meat products were also largely contaminated with ESBL-producing Salmonella and that their ESBL genes and genetic platforms were the same as those isolated from conventional retail chicken meat products.

Keywords: antibiotic-free poultry, conventional poultry, multilocus sequence typing, extended-spectrum β-lactamase, antimicrobial resistance

Procedia PDF Downloads 277
1963 Speed Breaker/Pothole Detection Using Hidden Markov Models: A Deep Learning Approach

Authors: Surajit Chakrabarty, Piyush Chauhan, Subhasis Panda, Sujoy Bhattacharya

Abstract:

A large proportion of roads in India are not well maintained as per the laid down public safety guidelines leading to loss of direction control and fatal accidents. We propose a technique to detect speed breakers and potholes using mobile sensor data captured from multiple vehicles and provide a profile of the road. This would, in turn, help in monitoring roads and revolutionize digital maps. Incorporating randomness in the model formulation for detection of speed breakers and potholes is crucial due to substantial heterogeneity observed in data obtained using a mobile application from multiple vehicles driven by different drivers. This is accomplished with Hidden Markov Models, whose hidden state sequence is found for each time step given the observables sequence, and are then fed as input to LSTM network with peephole connections. A precision score of 0.96 and 0.63 is obtained for classifying bumps and potholes, respectively, a significant improvement from the machine learning based models. Further visualization of bumps/potholes is done by converting time series to images using Markov Transition Fields where a significant demarcation among bump/potholes is observed.

Keywords: deep learning, hidden Markov model, pothole, speed breaker

Procedia PDF Downloads 145
1962 Purity Monitor Studies in Medium Liquid Argon TPC

Authors: I. Badhrees

Abstract:

This paper is an attempt to describe some of the results that had been found through a journey of study in the field of particle physics. This study consists of two parts, one about the measurement of the cross section of the decay of the Z particle in two electrons, and the other deals with the measurement of the cross section of the multi-photon absorption process using a beam of laser in the Liquid Argon Time Projection Chamber. The first part of the paper concerns the results based on the analysis of a data sample containing 8120 ee candidates to reconstruct the mass of the Z particle for each event where each event has an ee pair with PT(e) > 20GeV, and η(e) < 2.5. Monte Carlo templates of the reconstructed Z particle were produced as a function of the Z mass scale. The distribution of the reconstructed Z mass in the data was compared to the Monte Carlo templates, where the total cross section is calculated to be equal to 1432 pb. The second part concerns the Liquid Argon Time Projection Chamber, LAr TPC, the results of the interaction of the UV Laser, Nd-YAG with λ= 266mm, with LAr and through the study of the multi-photon ionization process as a part of the R&D at Bern University. The main result of this study was the cross section of the process of the multi-photon ionization process of the LAr, σe = 1.24±0.10stat±0.30sys.10 -56cm4.

Keywords: ATLAS, CERN, KACST, LArTPC, particle physics

Procedia PDF Downloads 347
1961 Molecular Characterisation and Expression of Glutathione S-Transferase of Fasciola Gigantica

Authors: J. Adeppa, S. Samanta, O. K. Raina

Abstract:

Fasciolosis is a widespread economically important parasitic infection throughout the world caused by Fasciola hepatica and F. gigantica. In order to identify novel immunogen conferring significant protection against fasciolosis, currently, research has been focused on the defined antigens viz. glutathione S-transferase, fatty acid binding protein, cathepsin-L, fluke hemoglobin, paramyosin, myosin and F. hepatica- Kunitz Type Molecule. Among various antigens, GST which plays a crucial role in detoxification processes, i.e. phase II defense mechanism of this parasite, has a unique position as a novel vaccine candidate and a drug target in the control of this disease. For producing the antigens in large quantities and their purification to complete homogeneity, the recombinant DNA technology has become an important tool to achieve this milestone. RT- PCR was carried out using F. gigantica total RNA as template, and an amplicon of 657 bp GST gene was obtained. TA cloning vector was used for cloning of this gene, and the presence of insert was confirmed by blue-white selection for recombinant colonies. Sequence analysis of the present isolate showed 99.1% sequence homology with the published sequence of the F. gigantica GST gene of cattle origin (accession no. AF112657), with six nucleotide changes at 72, 74, 423, 513, 549 and 627th bp found in the present isolate, causing an overall change of 4 amino acids. The 657 bp GST gene was cloned at BamH1 and HindIII restriction sites of the prokaryotic expression vector pPROEXHTb in frame with six histidine residues and expressed in E. coli DH5α. Recombinant protein was purified from the bacterial lysate under non-denaturing conditions by the process of sonication after lysozyme treatment and subjecting the soluble fraction of the bacterial lysate to Ni-NTA affinity chromatography. Western blotting with rabbit hyper-immune serum showed immuno-reactivity with 25 kDa recombinant GST. Recombinant protein detected F. gigantica experimental as well as field infection in buffaloes by dot-ELISA. However, cross-reactivity studies on Fasciola gigantica GST antigen are needed to evaluate the utility of this protein in the serodiagnosis of fasciolosis.

Keywords: fasciola gigantic, fasciola hepatica, GST, RT- PCR

Procedia PDF Downloads 187
1960 JaCoText: A Pretrained Model for Java Code-Text Generation

Authors: Jessica Lopez Espejel, Mahaman Sanoussi Yahaya Alassan, Walid Dahhane, El Hassane Ettifouri

Abstract:

Pretrained transformer-based models have shown high performance in natural language generation tasks. However, a new wave of interest has surged: automatic programming language code generation. This task consists of translating natural language instructions to a source code. Despite the fact that well-known pre-trained models on language generation have achieved good performance in learning programming languages, effort is still needed in automatic code generation. In this paper, we introduce JaCoText, a model based on Transformer neural network. It aims to generate java source code from natural language text. JaCoText leverages the advantages of both natural language and code generation models. More specifically, we study some findings from state of the art and use them to (1) initialize our model from powerful pre-trained models, (2) explore additional pretraining on our java dataset, (3) lead experiments combining the unimodal and bimodal data in training, and (4) scale the input and output length during the fine-tuning of the model. Conducted experiments on CONCODE dataset show that JaCoText achieves new state-of-the-art results.

Keywords: java code generation, natural language processing, sequence-to-sequence models, transformer neural networks

Procedia PDF Downloads 287
1959 e-Learning Security: A Distributed Incident Response Generator

Authors: Bel G Raggad

Abstract:

An e-Learning setting is a distributed computing environment where information resources can be connected to any public network. Public networks are very unsecure which can compromise the reliability of an e-Learning environment. This study is only concerned with the intrusion detection aspect of e-Learning security and how incident responses are planned. The literature reported great advances in intrusion detection system (ids) but neglected to study an important ids weakness: suspected events are detected but an intrusion is not determined because it is not defined in ids databases. We propose an incident response generator (DIRG) that produces incident responses when the working ids system suspects an event that does not correspond to a known intrusion. Data involved in intrusion detection when ample uncertainty is present is often not suitable to formal statistical models including Bayesian. We instead adopt Dempster and Shafer theory to process intrusion data for the unknown event. The DIRG engine transforms data into a belief structure using incident scenarios deduced by the security administrator. Belief values associated with various incident scenarios are then derived and evaluated to choose the most appropriate scenario for which an automatic incident response is generated. This article provides a numerical example demonstrating the working of the DIRG system.

Keywords: decision support system, distributed computing, e-Learning security, incident response, intrusion detection, security risk, statefull inspection

Procedia PDF Downloads 438
1958 Assessing Flexural Damage Mechanisms Induced by Mesoscopic Buckle Defects in Textile-Reinforced Polymer Matrix Composites Using Acoustic Emission Analysis

Authors: Christopher Okechukwu Ndukwe

Abstract:

This paper investigates and categorizes the flexural damage mechanisms in composite materials caused by mesoscopic out-of-plane buckle defects that occur during the initial stage of the resin transfer molding (RTM) process. The findings of this study have significant practical implications for the manufacturing and use of composite materials, as they provide a deeper understanding of these damage mechanisms and their analysis. During the initial stage of shaping a preform, alterations, and distortions in the reinforcement sample can significantly lead to defects, such as buckling, especially when forming double-curvature geometries. These recurring mesoscopic defects have been investigated using a specialized laboratory bench designed to reproduce buckle defects like those found in complex geometric shapes, such as tetrahedrons. The study examined two sample configurations with buckle defects in the longitudinal and transverse directions alongside a reference sample for comparison. An acoustic emission (AE) system, a well-regarded non-contact method for monitoring structural health, was used to analyze the mechanical behavior of material samples in detail. An unsupervised K-means algorithm was employed to classify the damage mechanisms—such as matrix cracking, interface damage, and fiber breakage linked to the samples' failure. A standard was established based on three AE parameters: absolute energy, amplitude, and the number of AE events. This standard helped identify the origin and sequence of damage propagation. Initially, the results of the AE parameters were superimposed with the flexural loading curves to pinpoint the loading phases during which damage began and the specific points at which the samples ultimately failed. The normalized density of AE events related to different damage mechanisms was evaluated by analyzing the number of AE events within the amplitude domain of the AE signals. The ranges of the identified damage mechanisms in the amplitude plane illustrate the progression and order of load transfer among the elements of the composite material. In the reference sample, the AE event signals corresponding to the three classes of damage mechanisms partially overlap with adjacent signals. In contrast, the two defective sample configurations showed that the overlapping AE event signals for the respective damage mechanisms converged within the intermediate damage mode area at specific points, depending on the sample configuration. The convergence points in the samples with transverse defects were identified relatively earlier than in the other samples. Low and high amplitude ranges characterize the matrix cracking and fiber breakage damage mechanisms. The low amplitude damage occurred over a more extended length, while the high amplitude damage began much earlier. This results in the signals from both damage mechanisms converging at the center of the interface damage zone. This convergence suggests that all individual composite components fail concurrently at specific points in the defective samples, resulting in rapid fragmentation and ultimately contributing to failure. Overall, the results show that mesoscopic out-of-plane buckling in all directions affects the composite's flexural response, with more severe effects observed when the load is applied transversely.

Keywords: acoustic emission, composite reinforcement, damage mechanisms, mesoscopic buckle defects

Procedia PDF Downloads 11
1957 Evaluation of Flood Events in Respect of Disaster Management in Turkey

Authors: Naci Büyükkaracığan, Hasan Uzun

Abstract:

Flood is the event which damage to the surrounding lands, residential places, infrastructure and vibrant, because of the streams overflow events from its bed for several reasons. Flood is a natural formation which develops due to its region's climatic conditions, technical and topographical characteristics. However, factors causing floods with global warming caused by human activity are events such as uncontrolled urbanization. Floods in Turkey are natural disasters which cause huge economic losses after the earthquake. At the same time, the flood disaster is one of the most observed hydrometeorological disasters, compared to 30%, in Turkey. Every year, there are around 200 flood-flood disasters and the disaster as a result of financial losses of $ 100 million per year are reported to occur in public institutions. The amount allocated for carrying out investment-project activities for reducing and controlling of flood damage control are around US $ 30 million per year. The existence of a linear increase in the number of flood disasters is noteworthy due to various reasons in the last 50 years of observation. In this study, first of all, big events of the flood in Turkey and their reasons were examined. And then, the information about the work to be done in order to prevent flooding by government was given with examples. Meteorological early warning systems, flood risk maps and regulation of urban development studies are described for this purpose. As a result, recommendations regarding in the event of the occurrence of floods disaster management were issues raised.

Keywords: flood, disaster, disaster management, Türkiye

Procedia PDF Downloads 332
1956 Antibacterial Activity of Salvadora persica Extracts against Oral Cavity Bacteria

Authors: Sulaiman A. Alrumman, Abd El-Latif Hesham

Abstract:

Despite medical progress worldwide, dental caries are still widespread. Miswak is derived from the plant arak (Salvadora persica). It is used by Muslim people as a natural product for the cleansing of teeth, to ensure oral and dental hygiene. This study was designed to evaluate the antimicrobial effects of ethanol, methanol, and ethanol/methanol extracts of miswak against three bacterial pathogens of the oral cavity. The pathogens were isolated from the oral cavity of volunteers/patients and were identified on the basis of 16S rRNA gene amplification data. Sequence comparisons were made with 16S rRNA gene sequences available in the GenBank database. The results of sequence alignment and phylogenetic analysis identified the three pathogens as being Staphylococcus aureus strain KKU-020, Enterococcus faecalis strain KKU-021 and Klebsiella pneumoniae strain KKU-022. All miswak extracts showed powerful antimicrobial activity against the three pathogens. The maximum zone of inhibition (40.67±0.88 mm) was observed against E. faecalis with ethanolic extracts whilst methanolic extracts showed the minimum zone of inhibition (10.33±0.88 mm) against K. pneumonia KKU-022. Based on the significant effects of the miswak extracts against the oral cavity pathogens in our study, we recommend that miswak is to be used as a dental hygiene method to prevent tooth caries.

Keywords: antibacterial, miswak, Salvadora persica, oral cavity pathogens

Procedia PDF Downloads 296
1955 Mining the Proteome of Fusobacterium nucleatum for Potential Therapeutics Discovery

Authors: Abdul Musaweer Habib, Habibul Hasan Mazumder, Saiful Islam, Sohel Sikder, Omar Faruk Sikder

Abstract:

The plethora of genome sequence information of bacteria in recent times has ushered in many novel strategies for antibacterial drug discovery and facilitated medical science to take up the challenge of the increasing resistance of pathogenic bacteria to current antibiotics. In this study, we adopted subtractive genomics approach to analyze the whole genome sequence of the Fusobacterium nucleatum, a human oral pathogen having association with colorectal cancer. Our study divulged 1499 proteins of Fusobacterium nucleatum, which has no homolog in human genome. These proteins were subjected to screening further by using the Database of Essential Genes (DEG) that resulted in the identification of 32 vitally important proteins for the bacterium. Subsequent analysis of the identified pivotal proteins, using the KEGG Automated Annotation Server (KAAS) resulted in sorting 3 key enzymes of F. nucleatum that may be good candidates as potential drug targets, since they are unique for the bacterium and absent in humans. In addition, we have demonstrated the 3-D structure of these three proteins. Finally, determination of ligand binding sites of the key proteins as well as screening for functional inhibitors that best fitted with the ligands sites were conducted to discover effective novel therapeutic compounds against Fusobacterium nucleatum.

Keywords: colorectal cancer, drug target, Fusobacterium nucleatum, homology modeling, ligands

Procedia PDF Downloads 389
1954 Investigating Salience Theory’s Implications for Real-Life Decision Making: An Experimental Test for Whether the Allais Paradox Exists under Subjective Uncertainty

Authors: Christoph Ostermair

Abstract:

We deal with the effect of correlation between prospects on human decision making under uncertainty as proposed by the comparatively new and promising model of “salience theory of choice under risk”. In this regard, we show that the theory entails the prediction that the inconsistency of choices, known as the Allais paradox, should not be an issue in the context of “real-life decision making”, which typically corresponds to situations of subjective uncertainty. The Allais paradox, probably the best-known anomaly regarding expected utility theory, would then essentially have no practical relevance. If, however, empiricism contradicts this prediction, salience theory might suffer a serious setback. Explanations of the model for variable human choice behavior are mostly the result of a particular mechanism that does not come to play under perfect correlation. Hence, if it turns out that correlation between prospects – as typically found in real-world applications – does not influence human decision making in the expected way, this might to a large extent cost the theory its explanatory power. The empirical literature regarding the Allais paradox under subjective uncertainty is so far rather moderate. Beyond that, the results are hard to maintain as an argument, as the presentation formats commonly employed, supposably have generated so-called event-splitting effects, thereby distorting subjects’ choice behavior. In our own incentivized experimental study, we control for such effects by means of two different choice settings. We find significant event-splitting effects in both settings, thereby supporting the suspicion that the so far existing empirical results related to Allais paradoxes under subjective uncertainty may not be able to answer the question at hand. Nevertheless, we find that the basic tendency behind the Allais paradox, which is a particular switch of the preference relation due to a modified common consequence, shared by two prospects, is still existent both under an event-splitting and a coalesced presentation format. Yet, the modal choice pattern is in line with the prediction of salience theory. As a consequence, the effect of correlation, as proposed by the model, might - if anything - only weaken the systematic choice pattern behind the Allais paradox.

Keywords: Allais paradox, common consequence effect, models of decision making under risk and uncertainty, salience theory

Procedia PDF Downloads 201
1953 Identifying the Strength of Cyclones and Earthquakes Requiring Military Disaster Response

Authors: Chad A. Long

Abstract:

The United States military is now commonly responding to complex humanitarian emergencies and natural disasters around the world. From catastrophic earthquakes in Haiti to typhoons devastating the Philippines, U.S. military assistance is requested when the event exceeds the local government's ability to assist the population. This study assesses the characteristics of catastrophes that surpass a nation’s individual ability to respond and recover from the event. The paper begins with a historical summary of military aid and then analyzes over 40 years of the United States military humanitarian response. Over 300 military operations were reviewed and coded based on the nature of the disaster. This in-depth study reviewed the U.S. military’s deployment events for cyclones and earthquakes to determine the strength of the natural disaster requiring external assistance. The climatological data for cyclone landfall and magnitude data for earthquake epicenters were identified, grouped into regions and analyzed for time-based trends. The results showed that foreign countries will likely request the U.S. military for cyclones with speeds greater or equal to 125 miles an hour and earthquakes at the magnitude of 7.4 or higher. These results of this study will assist the geographic combatant commands in determining future military response requirements.

Keywords: military, natural disasters, earthquakes, cyclone

Procedia PDF Downloads 121
1952 A Kernel-Based Method for MicroRNA Precursor Identification

Authors: Bin Liu

Abstract:

MicroRNAs (miRNAs) are small non-coding RNA molecules, functioning in transcriptional and post-transcriptional regulation of gene expression. The discrimination of the real pre-miRNAs from the false ones (such as hairpin sequences with similar stem-loops) is necessary for the understanding of miRNAs’ role in the control of cell life and death. Since both their small size and sequence specificity, it cannot be based on sequence information alone but requires structure information about the miRNA precursor to get satisfactory performance. Kmers are convenient and widely used features for modeling the properties of miRNAs and other biological sequences. However, Kmers suffer from the inherent limitation that if the parameter K is increased to incorporate long range effects, some certain Kmer will appear rarely or even not appear, as a consequence, most Kmers absent and a few present once. Thus, the statistical learning approaches using Kmers as features become susceptible to noisy data once K becomes large. In this study, we proposed a Gapped k-mer approach to overcome the disadvantages of Kmers, and applied this method to the field of miRNA prediction. Combined with the structure status composition, a classifier called imiRNA-GSSC was proposed. We show that compared to the original imiRNA-kmer and alternative approaches. Trained on human miRNA precursors, this predictor can achieve an accuracy of 82.34 for predicting 4022 pre-miRNA precursors from eleven species.

Keywords: gapped k-mer, imiRNA-GSSC, microRNA precursor, support vector machine

Procedia PDF Downloads 163
1951 High-Throughput Artificial Guide RNA Sequence Design for Type I, II and III CRISPR/Cas-Mediated Genome Editing

Authors: Farahnaz Sadat Golestan Hashemi, Mohd Razi Ismail, Mohd Y. Rafii

Abstract:

A huge revolution has emerged in genome engineering by the discovery of CRISPR (clustered regularly interspaced palindromic repeats) and CRISPR-associated system genes (Cas) in bacteria. The function of type II Streptococcus pyogenes (Sp) CRISPR/Cas9 system has been confirmed in various species. Other S. thermophilus (St) CRISPR-Cas systems, CRISPR1-Cas and CRISPR3-Cas, have been also reported for preventing phage infection. The CRISPR1-Cas system interferes by cleaving foreign dsDNA entering the cell in a length-specific and orientation-dependant manner. The S. thermophilus CRISPR3-Cas system also acts by cleaving phage dsDNA genomes at the same specific position inside the targeted protospacer as observed in the CRISPR1-Cas system. It is worth mentioning, for the effective DNA cleavage activity, RNA-guided Cas9 orthologs require their own specific PAM (protospacer adjacent motif) sequences. Activity levels are based on the sequence of the protospacer and specific combinations of favorable PAM bases. Therefore, based on the specific length and sequence of PAM followed by a constant length of target site for the three orthogonals of Cas9 protein, a well-organized procedure will be required for high-throughput and accurate mining of possible target sites in a large genomic dataset. Consequently, we created a reliable procedure to explore potential gRNA sequences for type I (Streptococcus thermophiles), II (Streptococcus pyogenes), and III (Streptococcus thermophiles) CRISPR/Cas systems. To mine CRISPR target sites, four different searching modes of sgRNA binding to target DNA strand were applied. These searching modes are as follows: i) coding strand searching, ii) anti-coding strand searching, iii) both strand searching, and iv) paired-gRNA searching. The output of such procedure highlights the power of comparative genome mining for different CRISPR/Cas systems. This could yield a repertoire of Cas9 variants with expanded capabilities of gRNA design, and will pave the way for further advance genome and epigenome engineering.

Keywords: CRISPR/Cas systems, gRNA mining, Streptococcus pyogenes, Streptococcus thermophiles

Procedia PDF Downloads 257
1950 Contesting Blind Obedience in Islam within the Malay-Language Media: Case Study of 'I Want to Touch a Dog' Event

Authors: Aisya Zaharin

Abstract:

The reporting of Islam in the Malaysian government-controlled press is complicated and occurs almost daily. This is due to the Islamisation process that has been heavily politicized in recent years. This article analyses media representations of Islam in the Malaysian media through the social responsibility theory. A provocative case study of media reporting on the “I want to touch a dog” event was analysed since dog’s saliva is ritually considered unhygienic by Muslims. This paper will not question the Islamic ruling on the dog’s issue. Instead, it calls for discussions in relation to openness and maturity in religious discourse with respect to the dog’s saliva dialogue in 1937. It applies Hage’s “minor and major reality” to explain the increasing percentage of Muslim who define their own understandings of Islam vs the government’s dogmatic versions. This paper employs Alatas’s method of “sociological investigation in Southeast Asia” by using ethnographic examination on selected mass media. Through Asiacentricity approach, this paper revisited the local framework of Alatas’s New Man encouraging Muslims to engage in knowledge and to appreciate diversities in Islamic jurisprudences. Despite government’s control, findings showed that non-Malay languages and online media are more comprehensive in reporting the news about Islam. Clearly, there has to be a re-conceptualization of Islamic discourses in the Malay-language media.

Keywords: dog, Fiqh, Islamic jurisprudence, Malaysian media, New Man, social responsibility

Procedia PDF Downloads 320
1949 Transcription Skills and Written Composition in Chinese

Authors: Pui-sze Yeung, Connie Suk-han Ho, David Wai-ock Chan, Kevin Kien-hoa Chung

Abstract:

Background: Recent findings have shown that transcription skills play a unique and significant role in Chinese word reading and spelling (i.e. word dictation), and written composition development. The interrelationships among component skills of transcription, word reading, word spelling, and written composition in Chinese have rarely been examined in the literature. Is the contribution of component skills of transcription to Chinese written composition mediated by word level skills (i.e., word reading and spelling)? Methods: The participants in the study were 249 Chinese children in Grade 1, Grade 3, and Grade 5 in Hong Kong. They were administered measures of general reasoning ability, orthographic knowledge, stroke sequence knowledge, word spelling, handwriting fluency, word reading, and Chinese narrative writing. Orthographic knowledge- orthographic knowledge was assessed by a task modeled after the lexical decision subtest of the Hong Kong Test of Specific Learning Difficulties in Reading and Writing (HKT-SpLD). Stroke sequence knowledge: The participants’ performance in producing legitimate stroke sequences was measured by a stroke sequence knowledge task. Handwriting fluency- Handwriting fluency was assessed by a task modeled after the Chinese Handwriting Speed Test. Word spelling: The stimuli of the word spelling task consist of fourteen two-character Chinese words. Word reading: The stimuli of the word reading task consist of 120 two-character Chinese words. Written composition: A narrative writing task was used to assess the participants’ text writing skills. Results: Analysis of covariance results showed that there were significant between-grade differences in the performance of word reading, word spelling, handwriting fluency, and written composition. Preliminary hierarchical multiple regression analysis results showed that orthographic knowledge, word spelling, and handwriting fluency were unique predictors of Chinese written composition even after controlling for age, IQ, and word reading. The interaction effects between grade and each of these three skills (orthographic knowledge, word spelling, and handwriting fluency) were not significant. Path analysis results showed that orthographic knowledge contributed to written composition both directly and indirectly through word spelling, while handwriting fluency contributed to written composition directly and indirectly through both word reading and spelling. Stroke sequence knowledge only contributed to written composition indirectly through word spelling. Conclusions: Preliminary hierarchical regression results were consistent with previous findings about the significant role of transcription skills in Chinese word reading, spelling and written composition development. The fact that orthographic knowledge contributed both directly and indirectly to written composition through word reading and spelling may reflect the impact of the script-sound-meaning convergence of Chinese characters on the composing process. The significant contribution of word spelling and handwriting fluency to Chinese written composition across elementary grades highlighted the difficulty in attaining automaticity of transcription skills in Chinese, which limits the working memory resources available for other composing processes.

Keywords: orthographic knowledge, transcription skills, word reading, writing

Procedia PDF Downloads 425