Search results for: node MCU
93 O-LEACH: The Problem of Orphan Nodes in the LEACH of Routing Protocol for Wireless Sensor Networks
Authors: Wassim Jerbi, Abderrahmen Guermazi, Hafedh Trabelsi
Abstract:
The optimum use of coverage in wireless sensor networks (WSNs) is very important. LEACH protocol called Low Energy Adaptive Clustering Hierarchy, presents a hierarchical clustering algorithm for wireless sensor networks. LEACH is a protocol that allows the formation of distributed cluster. In each cluster, LEACH randomly selects some sensor nodes called cluster heads (CHs). The selection of CHs is made with a probabilistic calculation. It is supposed that each non-CH node joins a cluster and becomes a cluster member. Nevertheless, some CHs can be concentrated in a specific part of the network. Thus, several sensor nodes cannot reach any CH. to solve this problem. We created an O-LEACH Orphan nodes protocol, its role is to reduce the sensor nodes which do not belong the cluster. The cluster member called Gateway receives messages from neighboring orphan nodes. The gateway informs CH having the neighboring nodes that not belong to any group. However, Gateway called (CH') attaches the orphaned nodes to the cluster and then collected the data. O-Leach enables the formation of a new method of cluster, leads to a long life and minimal energy consumption. Orphan nodes possess enough energy and seeks to be covered by the network. The principal novel contribution of the proposed work is O-LEACH protocol which provides coverage of the whole network with a minimum number of orphaned nodes and has a very high connectivity rates.As a result, the WSN application receives data from the entire network including orphan nodes. The proper functioning of the Application requires, therefore, management of intelligent resources present within each the network sensor. The simulation results show that O-LEACH performs better than LEACH in terms of coverage, connectivity rate, energy and scalability.Keywords: WSNs; routing; LEACH; O-LEACH; Orphan nodes; sub-cluster; gateway; CH’
Procedia PDF Downloads 37192 Epidemiological profile of Tuberculosis Disease in Meknes, Morocco. Descriptive analysis, 2016-2020
Authors: Authors: A. Lakhal, M. Bahalou, A. Khattabi
Abstract:
Introduction: Tuberculosis is one of the world's deadliest infectious diseases. In Morocco, a total of 30,636 cases of Tuberculosis, all forms combined, were reported in 2015, representing an incidence of 89 cases per 100,000 population. The number of deaths from tuberculosis (TB) was 656 cases. In the prefecture of Meknes, its incidence remains high compared to the national level. The objective of this work is to describe the epidemiological profile of tuberculosis in the prefecture of Meknes. Methods: It is a descriptive analysis of TB cases reported between 2016 and 2020 at the regional diagnostic center of tuberculosis and respiratory diseases. We performed analysis by using Microsoft Excel and EpiInfo 7. Results: Epidemiological data from 2016 to 2020 report a total of 4100 new cases of all forms of tuberculosis, with an average of 820 new cases per year. The median age is 32 years. There is a clear male predominance, on average 58% of cases are male and 42% female. The incidence rate of bacteriologically confirmed tuberculosis per 100,000 inhabitants has increased from 35 cases per 100,000 inhabitants in 2016 to 39.4 cases per 100,000 inhabitants in 2020. The confirmation rate for pulmonary tuberculosis decreased from 84% in 2016 to 75% in 2020. Pulmonary involvement predominates by an average of 46%, followed by lymph node involvement 29%and pleural involvement by an average of 10%. Digestive, osteoarticular, genitourinary, and meningeal involvement occurs in 8% of cases. Primary tuberculosis infection occurs in an average of 0.5% of cases. The proportion of HIV-TB co-infections was 2.8 in 2020. Conclusion: The incidence of tuberculosis in Meknes remains high compared to the national level. Thus, it is imperative to reinforce the earlier detection; improve the contact tracing, detection methods of cases for their confirmation and treatment, and to reduce the proportion of the lost to follow up as well.Keywords: tuberculosis, epidemiological profile, meknes, morocco
Procedia PDF Downloads 15791 Comparative Analysis of Data Gathering Protocols with Multiple Mobile Elements for Wireless Sensor Network
Authors: Bhat Geetalaxmi Jairam, D. V. Ashoka
Abstract:
Wireless Sensor Networks are used in many applications to collect sensed data from different sources. Sensed data has to be delivered through sensors wireless interface using multi-hop communication towards the sink. The data collection in wireless sensor networks consumes energy. Energy consumption is the major constraints in WSN .Reducing the energy consumption while increasing the amount of generated data is a great challenge. In this paper, we have implemented two data gathering protocols with multiple mobile sinks/elements to collect data from sensor nodes. First, is Energy-Efficient Data Gathering with Tour Length-Constrained Mobile Elements in Wireless Sensor Networks (EEDG), in which mobile sinks uses vehicle routing protocol to collect data. Second is An Intelligent Agent-based Routing Structure for Mobile Sinks in WSNs (IAR), in which mobile sinks uses prim’s algorithm to collect data. Authors have implemented concepts which are common to both protocols like deployment of mobile sinks, generating visiting schedule, collecting data from the cluster member. Authors have compared the performance of both protocols by taking statistics based on performance parameters like Delay, Packet Drop, Packet Delivery Ratio, Energy Available, Control Overhead. Authors have concluded this paper by proving EEDG is more efficient than IAR protocol but with few limitations which include unaddressed issues likes Redundancy removal, Idle listening, Mobile Sink’s pause/wait state at the node. In future work, we plan to concentrate more on these limitations to avail a new energy efficient protocol which will help in improving the life time of the WSN.Keywords: aggregation, consumption, data gathering, efficiency
Procedia PDF Downloads 49790 Innovation of a New Plant Tissue Culture Medium for Large Scale Plantlet Production in Potato (Solanum tuberosum L.)
Authors: Ekramul Hoque, Zinat Ara Eakut Zarin, Ershad Ali
Abstract:
The growth and development of explants is governed by the effect of nutrient medium. Ammonium nitrate (NH4NO3) as a major salt of stock solution-1 for the preparation of tissue culture medium. But, it has several demerits on human civilization. It is use for the preparation of bomb and other destructive activities. Hence, it is totally ban in our country. A new chemical was identified as a substitute of ammonium nitrate. The concentrations of the other ingredients of major and minor salt were modified from the MS medium. The formulation of new medium is totally different from the MS nutrient composition. The most widely use MS medium composition was used as first check treatment and MS powder (Duchefa Biocheme, The Netherland) was used as second check treatment. The experiments were carried out at the Department of Biotechnology, Sher-e-Bangla Agricultural University, Dhaka, Bangladesh. Two potato varieties viz. Diamant and Asterix were used as experimental materials. The regeneration potentiality of potato onto new medium was best as compare with the two check treatments. The traits -node number, leaf number, shoot length, root lengths were highest in new medium. The plantlets were healthy, robust and strong as compare to plantlets regenerated from check treatments. Three subsequent sub-cultures were made in the new medium to observe the growth pattern of plantlet. It was also showed the best performance in all the parameter under studied. The regenerated plantlet produced good quality minituber under field condition. Hence, it is concluded that, a new plant tissue culture medium as discovered from the Department of Biotechnology, Sher-e-Bangla Agricultural University, Dhaka, Bangladesh under the leadership of Professor Dr. Md. Ekramul Hoque.Keywords: new medium, potato, regeneration, ammonium nitrate
Procedia PDF Downloads 9589 Sensor and Actuator Fault Detection in Connected Vehicles under a Packet Dropping Network
Authors: Z. Abdollahi Biron, P. Pisu
Abstract:
Connected vehicles are one of the promising technologies for future Intelligent Transportation Systems (ITS). A connected vehicle system is essentially a set of vehicles communicating through a network to exchange their information with each other and the infrastructure. Although this interconnection of the vehicles can be potentially beneficial in creating an efficient, sustainable, and green transportation system, a set of safety and reliability challenges come out with this technology. The first challenge arises from the information loss due to unreliable communication network which affects the control/management system of the individual vehicles and the overall system. Such scenario may lead to degraded or even unsafe operation which could be potentially catastrophic. Secondly, faulty sensors and actuators can affect the individual vehicle’s safe operation and in turn will create a potentially unsafe node in the vehicular network. Further, sending that faulty sensor information to other vehicles and failure in actuators may significantly affect the safe operation of the overall vehicular network. Therefore, it is of utmost importance to take these issues into consideration while designing the control/management algorithms of the individual vehicles as a part of connected vehicle system. In this paper, we consider a connected vehicle system under Co-operative Adaptive Cruise Control (CACC) and propose a fault diagnosis scheme that deals with these aforementioned challenges. Specifically, the conventional CACC algorithm is modified by adding a Kalman filter-based estimation algorithm to suppress the effect of lost information under unreliable network. Further, a sliding mode observer-based algorithm is used to improve the sensor reliability under faults. The effectiveness of the overall diagnostic scheme is verified via simulation studies.Keywords: fault diagnostics, communication network, connected vehicles, packet drop out, platoon
Procedia PDF Downloads 23988 Sensitivity Analysis of the Thermal Properties in Early Age Modeling of Mass Concrete
Authors: Farzad Danaei, Yilmaz Akkaya
Abstract:
In many civil engineering applications, especially in the construction of large concrete structures, the early age behavior of concrete has shown to be a crucial problem. The uneven rise in temperature within the concrete in these constructions is the fundamental issue for quality control. Therefore, developing accurate and fast temperature prediction models is essential. The thermal properties of concrete fluctuate over time as it hardens, but taking into account all of these fluctuations makes numerical models more complex. Experimental measurement of the thermal properties at the laboratory conditions also can not accurately predict the variance of these properties at site conditions. Therefore, specific heat capacity and the heat conductivity coefficient are two variables that are considered constant values in many of the models previously recommended. The proposed equations demonstrate that these two quantities are linearly decreasing as cement hydrates, and their value are related to the degree of hydration. The effects of changing the thermal conductivity and specific heat capacity values on the maximum temperature and the time it takes for concrete to reach that temperature are examined in this study using numerical sensibility analysis, and the results are compared to models that take a fixed value for these two thermal properties. The current study is conducted in 7 different mix designs of concrete with varying amounts of supplementary cementitious materials (fly ash and ground granulated blast furnace slag). It is concluded that the maximum temperature will not change as a result of the constant conductivity coefficient, but variable specific heat capacity must be taken into account, also about duration when a concrete's central node reaches its max value again variable specific heat capacity can have a considerable effect on the final result. Also, the usage of GGBFS has more influence compared to fly ash.Keywords: early-age concrete, mass concrete, specific heat capacity, thermal conductivity coefficient
Procedia PDF Downloads 7787 Analysis of Underground Logistics Transportation Technology and Planning Research: Based on Xiong'an New Area, China
Authors: Xia Luo, Cheng Zeng
Abstract:
Under the promotion of the Central Committee of the Communist Party of China and the State Council in 2017, Xiong'an New Area is the third crucial new area in China established after Shenzhen and Shanghai. Its constructions' significance lies in mitigating Beijing's non-capital functions and exploring a new mode of optimizing development in densely populated and economically intensive areas. For this purpose, developing underground logistics can assume the role of goods distribution in the capital, relieve the road transport pressure in Beijing-Tianjin-Hebei Urban Agglomeration, adjust and optimize the urban layout and spatial structure of it. Firstly, the construction planning of Xiong'an New Area and underground logistics development are summarized, especially the development status abroad, the development trend, and bottlenecks of underground logistics in China. This paper explores the technicality, feasibility, and necessity of four modes of transportation. There are pneumatic capsule pipeline (PCP) technology, the CargoCap technology, cable hauled mule, and automatic guided vehicle (AGV). The above technical parameters and characteristics are introduced to relevant experts or scholars. Through establishing an indicator system, carrying out a questionnaire survey with the Delphi method, the final suggestion is obtained: China should develop logistics vehicles similar to CargoCap, adopting rail mode and driverless mode. Based on China's temporal and spatial logistics demand and the geographical pattern of Xiong'an New Area, the construction scale, technical parameters, node location, and other vital parameters of underground logistics are planned. In this way, we hope to speed up the new area's construction and the logistics industry's innovation.Keywords: the Xiong'an new area, underground logistics, contrastive analysis, CargoCap, logistics planning
Procedia PDF Downloads 12986 Wearable Heart Rate Sensor Based on Wireless System for Heart Health Monitoring
Authors: Murtadha Kareem, Oliver Faust
Abstract:
Wearable biosensor systems can be designed and developed for health monitoring. There is much interest in both scientific and industrial communities established since 2007. Fundamentally, the cost of healthcare has increased dramatically and the world population is aging. That creates the need to harvest technological improvements with small bio-sensing devices, wireless-communication, microelectronics and smart textiles, that leads to non-stop developments of wearable sensor based systems. There has been a significant demand to monitor patient's health status while the patient leaves the hospital in his/her personal environment. To address this need, there are numerous system prototypes which has been launched in the medical market recently, the aim of that is to provide real time information feedback about patient's health status, either to the patient himself/herself or direct to the supervising medical centre station, while being capable to give a notification for the patient in case of possible imminent health threatening conditions. Furthermore, wearable health monitoring systems comprise new techniques to address the problem of managing and monitoring chronic heart diseases for elderly people. Wearable sensor systems for health monitoring include various types of miniature sensors, either wearable or implantable. To be specific, our proposed system able to measure essential physiological parameter, such as heart rate signal which could be transmitted through Bluetooth to the cloud server in order to store, process, analysis and visualise the data acquisition. The acquired measurements are connected through internet of things to a central node, for instance an android smart phone or tablet used for visualising the collected information on application or transmit it to a medical centre.Keywords: Wearable sensor, Heart rate, Internet of things, Chronic heart disease
Procedia PDF Downloads 16185 Structural Protein-Protein Interactions Network of Breast Cancer Lung and Brain Metastasis Corroborates Conformational Changes of Proteins Lead to Different Signaling
Authors: Farideh Halakou, Emel Sen, Attila Gursoy, Ozlem Keskin
Abstract:
Protein–Protein Interactions (PPIs) mediate major biological processes in living cells. The study of PPIs as networks and analyze the network properties contribute to the identification of genes and proteins associated with diseases. In this study, we have created the sub-networks of brain and lung metastasis from primary tumor in breast cancer. To do so, we used seed genes known to cause metastasis, and produced their interactions through a network-topology based prioritization method named GUILDify. In order to have the experimental support for the sub-networks, we further curated them using STRING database. We proceeded by modeling structures for the interactions lacking complex forms in Protein Data Bank (PDB). The functional enrichment analysis shows that KEGG pathways associated with the immune system and infectious diseases, particularly the chemokine signaling pathway, are important for lung metastasis. On the other hand, pathways related to genetic information processing are more involved in brain metastasis. The structural analyses of the sub-networks vividly demonstrated their difference in terms of using specific interfaces in lung and brain metastasis. Furthermore, the topological analysis identified genes such as RPL5, MMP2, CCR5 and DPP4, which are already known to be associated with lung or brain metastasis. Additionally, we found 6 and 9 putative genes that are specific for lung and brain metastasis, respectively. Our analysis suggests that variations in genes and pathways contributing to these different breast metastasis types may arise due to change in tissue microenvironment. To show the benefits of using structural PPI networks instead of traditional node and edge presentation, we inspect two case studies showing the mutual exclusiveness of interactions and effects of mutations on protein conformation which lead to different signaling.Keywords: breast cancer, metastasis, PPI networks, protein conformational changes
Procedia PDF Downloads 24484 LTE Performance Analysis in the City of Bogota Northern Zone for Two Different Mobile Broadband Operators over Qualipoc
Authors: Víctor D. Rodríguez, Edith P. Estupiñán, Juan C. Martínez
Abstract:
The evolution in mobile broadband technologies has allowed to increase the download rates in users considering the current services. The evaluation of technical parameters at the link level is of vital importance to validate the quality and veracity of the connection, thus avoiding large losses of data, time and productivity. Some of these failures may occur between the eNodeB (Evolved Node B) and the user equipment (UE), so the link between the end device and the base station can be observed. LTE (Long Term Evolution) is considered one of the IP-oriented mobile broadband technologies that work stably for data and VoIP (Voice Over IP) for those devices that have that feature. This research presents a technical analysis of the connection and channeling processes between UE and eNodeB with the TAC (Tracking Area Code) variables, and analysis of performance variables (Throughput, Signal to Interference and Noise Ratio (SINR)). Three measurement scenarios were proposed in the city of Bogotá using QualiPoc, where two operators were evaluated (Operator 1 and Operator 2). Once the data were obtained, an analysis of the variables was performed determining that the data obtained in transmission modes vary depending on the parameters BLER (Block Error Rate), performance and SNR (Signal-to-Noise Ratio). In the case of both operators, differences in transmission modes are detected and this is reflected in the quality of the signal. In addition, due to the fact that both operators work in different frequencies, it can be seen that Operator 1, despite having spectrum in Band 7 (2600 MHz), together with Operator 2, is reassigning to another frequency, a lower band, which is AWS (1700 MHz), but the difference in signal quality with respect to the establishment with data by the provider Operator 2 and the difference found in the transmission modes determined by the eNodeB in Operator 1 is remarkable.Keywords: BLER, LTE, network, qualipoc, SNR.
Procedia PDF Downloads 11483 Effects of Aerodynamic on Suspended Cables Using Non-Linear Finite Element Approach
Authors: Justin Nwabanne, Sam Omenyi, Jeremiah Chukwuneke
Abstract:
This work presents structural nonlinear static analysis of a horizontal taut cable using Finite Element Analysis (FEA) method. The FEA was performed analytically to determine the tensions at each nodal point and subsequently, performed based on finite element displacement method computationally using the FEA software, ANSYS 14.0 to determine their behaviour under the influence of aerodynamic forces imposed on the cable. The convergence procedure is adapted into the method to prevent excessive displacements through the computations. The work compared the two FEA cases by examining the effectiveness of the analytical model in describing the response with few degrees of freedom and the ability of the nonlinear finite element procedure adopted to capture the complex features of cable dynamics with reference to the aerodynamic external influence. Results obtained from this work explain that the analytic FEM results without aerodynamic influence show a parabolic response with an optimum deflection at nodal points 12 and 13 with the cable weight at nodes 12 and 13 having the value -1.002936N while for the cable tension shows an optimum deflection value for nodes 12 and 13 at -189396.97kg/km. The maximum displacement for the cable system was obtained from ANSYS 14.0 as 4483.83 mm for X, Y and Z components of displacements at node number 2 while the maximum displacement obtained is 4218.75mm for all the directional components. The dynamic behaviour of a taut cable investigated has application in a typical power transmission line. Aerodynamic influences on the cables were considered using FEA approach by employing ANSYS 14.0 showed a complex modal behaviour as expected.Keywords: aerodynamics, cable tension and weight, finite element analysis, nodal, non-linear model, optimum deflection, suspended cable, transmission line
Procedia PDF Downloads 27882 Increasing Power Transfer Capacity of Distribution Networks Using Direct Current Feeders
Authors: Akim Borbuev, Francisco de León
Abstract:
Economic and population growth in densely-populated urban areas introduce major challenges to distribution system operators, planers, and designers. To supply added loads, utilities are frequently forced to invest in new distribution feeders. However, this is becoming increasingly more challenging due to space limitations and rising installation costs in urban settings. This paper proposes the conversion of critical alternating current (ac) distribution feeders into direct current (dc) feeders to increase the power transfer capacity by a factor as high as four. Current trends suggest that the return of dc transmission, distribution, and utilization are inevitable. Since a total system-level transformation to dc operation is not possible in a short period of time due to the needed huge investments and utility unreadiness, this paper recommends that feeders that are expected to exceed their limits in near future are converted to dc. The increase in power transfer capacity is achieved through several key differences between ac and dc power transmission systems. First, it is shown that underground cables can be operated at higher dc voltage than the ac voltage for the same dielectric stress in the insulation. Second, cable sheath losses, due to induced voltages yielding circulation currents, that can be as high as phase conductor losses under ac operation, are not present under dc. Finally, skin and proximity effects in conductors and sheaths do not exist in dc cables. The paper demonstrates that in addition to the increased power transfer capacity utilities substituting ac feeders by dc feeders could benefit from significant lower costs and reduced losses. Installing dc feeders is less expensive than installing new ac feeders even when new trenches are not needed. Case studies using the IEEE 342-Node Low Voltage Networked Test System quantify the technical and economic benefits of dc feeders.Keywords: DC power systems, distribution feeders, distribution networks, power transfer capacity
Procedia PDF Downloads 12881 Quality of Service Based Routing Algorithm for Real Time Applications in MANETs Using Ant Colony and Fuzzy Logic
Authors: Farahnaz Karami
Abstract:
Routing is an important, challenging task in mobile ad hoc networks due to node mobility, lack of central control, unstable links, and limited resources. An ant colony has been found to be an attractive technique for routing in Mobile Ad Hoc Networks (MANETs). However, existing swarm intelligence based routing protocols find an optimal path by considering only one or two route selection metrics without considering correlations among such parameters making them unsuitable lonely for routing real time applications. Fuzzy logic combines multiple route selection parameters containing uncertain information or imprecise data in nature, but does not have multipath routing property naturally in order to provide load balancing. The objective of this paper is to design a routing algorithm using fuzzy logic and ant colony that can solve some of routing problems in mobile ad hoc networks, such as nodes energy consumption optimization to increase network lifetime, link failures rate reduction to increase packet delivery reliability and providing load balancing to optimize available bandwidth. In proposed algorithm, the path information will be given to fuzzy inference system by ants. Based on the available path information and considering the parameters required for quality of service (QoS), the fuzzy cost of each path is calculated and the optimal paths will be selected. NS2.35 simulation tools are used for simulation and the results are compared and evaluated with the newest QoS based algorithms in MANETs according to packet delivery ratio, end-to-end delay and routing overhead ratio criterions. The simulation results show significant improvement in the performance of these networks in terms of decreasing end-to-end delay, and routing overhead ratio, and also increasing packet delivery ratio.Keywords: mobile ad hoc networks, routing, quality of service, ant colony, fuzzy logic
Procedia PDF Downloads 6480 LTF Expression Profiling Which is Essential for Cancer Cell Proliferation and Metastasis, Correlating with Clinical Features, as Well as Early Stages of Breast Cancer
Authors: Azar Heidarizadi, Mahdieh Salimi, Hossein Mozdarani
Abstract:
Introduction: As a complex disease, breast cancer results from several genetic and epigenetic changes. Lactoferrin, a member of the transferrin family, is reported to have a number of biological functions, including DNA synthesis, immune responses, iron transport, etc., any of which could play a role in tumor progression. The aim of this study was to investigate the bioinformatics data and experimental assay to find the pattern of promoter methylation and gene expression of LTF in breast cancer in order to study its potential role in cancer management. Material and Methods: In order to evaluate the methylation status of the LTF promoter, we studied the MS-PCR and Real-Time PCR on samples from patients with breast cancer and normal cases. 67 patient samples were conducted for this study, including tumoral, plasma, and normal tissue adjacent samples, as well as 30 plasma from normal cases and 10 tissue breast reduction cases. Subsequently, bioinformatics analyses such as cBioPortal databases, string, and genomatix were conducted to disclose the prognostic value of LTF in breast cancer progression. Results: The analysis of LTF expression showed an inverse relationship between the expression level of LTF and the stages of tissues of breast cancer patients (p<0.01). In fact, stages 1 and 2 had a high expression in LTF, while, in stages 3 and 4, a significant reduction was observable (p < 0.0001). LTF expression frequently alters with a decrease in the expression in ER⁺, PR⁺, and HER2⁺ patients (P < 0.01) and an increase in the expression in the TNBC, LN¯, ER¯, and PR- patients (P < 0.001). Also, LTF expression is significantly associated with metastasis and lymph node involvement factors (P < 0.0001). The sensitivity and specificity of LTF were detected, respectively. A negative correlation was detected between the results of level expression and methylation of the LTF promoter. Conclusions: The altered expression of LTF observed in breast cancer patients could be considered as a promotion in cell proliferation and metastasis even in the early stages of cancer.Keywords: LTF, expression, methylation, breast cancer
Procedia PDF Downloads 7179 Correlation of Leptin with Clinico-Pathological Features of Breast Cancer
Authors: Saad Al-Shibli, Nasser Amjad, Muna Al Kubaisi, Norra Harun, Shaikh Mizan
Abstract:
Leptin is a multifunctional hormone produced mainly by adipocyte. Leptin and its receptor have long been found associated with breast cancer. The main aim of this study is to investigate the correlation between Leptin/Leptin receptor and the clinicopathological features of breast cancer. Blood samples for ELISA, tissue samples from tumors and adjacent breast tissue were taken from 51 women with breast cancer with a control group of 40 women with a negative mammogram. Leptin and Leptin receptor in the tissues were estimated by immunohistochemistry (IHC). They were localized at the subcellular level by immunocytochemistry using transmission electron microscopy (TEM). Our results showed significant difference in serum leptin level between control and the patient group, but no difference between pre and post-operative serum leptin levels in the patient group. By IHC, we found that the majority of the breast cancer cells studied, stained positively for leptin and leptin receptors with co-expression of leptin and its receptors. No significant correlation was found between leptin/leptin receptors expression with the race, menopausal status, lymph node metastasis, estrogen receptor expression, progesterone receptor expression, HER2 expression and tumor size. Majority of the patients with distant metastasis were associated with high leptin and leptin receptor expression. TEM views both Leptin and Leptin receptor were found highly concentrated within and around the nucleus of the cancer breast cells, indicating nucleus is their principal seat of actions while the adjacent breast epithelial cells showed that leptin gold particles are scattered all over the cell with much less than that of the cancerous cells. However, presence of high concentration of leptin does not necessarily prove its over-expression, because it could be internalized from outside by leptin receptor in the cells. In contrast, leptin receptor is definitely over-expressed in the ductal breast cancer cells. We conclude that reducing leptin levels, blocking its downstream tissue specific signal transduction, and/or blocking the upstream leptin receptor pathway might help in prevention and therapy of breast cancer.Keywords: breast cancer, expression, leptin, leptin receptors
Procedia PDF Downloads 13978 Cooperative Agents to Prevent and Mitigate Distributed Denial of Service Attacks of Internet of Things Devices in Transportation Systems
Authors: Borhan Marzougui
Abstract:
Road and Transport Authority (RTA) is moving ahead with the implementation of the leader’s vision in exploring all avenues that may bring better security and safety services to the community. Smart transport means using smart technologies such as IoT (Internet of Things). This technology continues to affirm its important role in the context of Information and Transportation Systems. In fact, IoT is a network of Internet-connected objects able to collect and exchange different data using embedded sensors. With the growth of IoT, Distributed Denial of Service (DDoS) attacks is also growing exponentially. DDoS attacks are the major and a real threat to various transportation services. Currently, the defense mechanisms are mainly passive in nature, and there is a need to develop a smart technique to handle them. In fact, new IoT devices are being used into a botnet for DDoS attackers to accumulate for attacker purposes. The aim of this paper is to provide a relevant understanding of dangerous types of DDoS attack related to IoT and to provide valuable guidance for the future IoT security method. Our methodology is based on development of the distributed algorithm. This algorithm manipulates dedicated intelligent and cooperative agents to prevent and to mitigate DDOS attacks. The proposed technique ensure a preventive action when a malicious packets start to be distributed through the connected node (Network of IoT devices). In addition, the devices such as camera and radio frequency identification (RFID) are connected within the secured network, and the data generated by it are analyzed in real time by intelligent and cooperative agents. The proposed security system is based on a multi-agent system. The obtained result has shown a significant reduction of a number of infected devices and enhanced the capabilities of different security dispositives.Keywords: IoT, DDoS, attacks, botnet, security, agents
Procedia PDF Downloads 14377 Reducing the Urban Heat Island Effect by Urban Design Strategies: Case Study of Aksaray Square in Istanbul
Authors: Busra Ekinci
Abstract:
Urban heat island term becomes one of the most important problem in urban areas as a reflection of global warming in local scale last years. Many communities and governments are taking action to reduce heat island effects on urban areas where the half of the world's population live today. At this point, urban design turned out to be an important practice and research area for providing an environmentally sensitive urban development. In this study, mitigating strategies of urban heat island effects by urban design are investigated in Aksaray Square and surroundings in Istanbul. Aksaray is an important historical and commercial center of Istanbul, which has an increasing density due to be the node of urban transportation. Also, Istanbul Metropolitan Municipality prepared an urban design project to respond the needs of growing population in the area for 2018. The purpose of the study is emphasizing the importance of urban design objectives and strategies that are developed to reduce the heat island effects on urban areas. Depending on this, the urban heat island effect of the area was examined based on the albedo (reflectivity) parameter which is the most effective parameter in the formation of the heat island effect in urban areas. Albedo values were calculated by Albedo Viewer web application model that was developed by Energy and Environmental Engineering Department of Kyushu University in Japan. Albedo parameter had examined for the present situation and the planned situation with urban design project. The results show that, the current area has urban heat island potential. With the Aksaray Square Project, the heat island effect on the area can be reduced, but would not be completely prevented. Therefore, urban design strategies had been developed to reduce the island effect in addition to the urban design project of the area. This study proves that urban design objectives and strategies are quite effective to reduce the heat island effects, which negatively affect the social environment and quality of life in urban areas.Keywords: Albedo, urban design, urban heat island, sustainable design
Procedia PDF Downloads 58076 99mTc Scintimammography in an Equivocal Breast Lesion
Authors: Malak Shawky Matter Elyas
Abstract:
Introduction: Early detection of breast cancer is the main tool to decrease morbidity and mortality rates. Many diagnostic tools are used, such as mammograms, ultrasound and magnetic resonance imaging, but none of them is conclusive, especially in very small sizes, less than 1 cm. So, there is a need for more accurate tools. Patients and methods: This study involved 13 patients with different breast lesions. 6 Patients had breast cancer, and one of them had metastatic axillary lymph nodes without clinically nor mammographically detected breast mass proved by biopsy and histopathology. Of the other 7 Patients, 4 of them had benign breast lesions proved by biopsy and histopathology, and 3 Patients showed Equivocal breast lesions on a mammogram. A volume of 370-444Mbq of (99m) Tc/ bombesin was injected. Dynamic 1-min images by Gamma Camera were taken for 20 minutes immediately after injection in the anterior view. Thereafter, two static images in anterior and prone lateral views by Gamma Camera were taken for 5 minutes. Finally, single-photon emission computed tomography images were taken for each patient. The definitive diagnosis was based on biopsy and histopathology. Results: 6 Patients with breast cancer proved by biopsy and histopathology showed Positive findings on Sestamibi (Scintimammography). 1 out of 4 Patients with benign breast lesions proved by biopsy and histopathology showed Positive findings on Sestamibi (Scintimammography) while the other 3 Patients showed Negative findings on Sestamibi. 3 Patients out of 3 Patients with equivocal breast findings on mammogram showed Positive Findings on Sestamibi (Scintimammography) and proved by biopsy and histopathology. Conclusions: While we agree that Scintimammography will not replace mammograms as a mass screening tool, we believe that many patients will benefit from Scintimammography, especially women with dense breast tissues and in the presence of breast implants that are difficult to diagnose by mammogram, wherein its sensitivity is low and in women with metastatic axillary lymph nodes without clinically nor mammographically findings. We can use Scintimammography in sentinel lymph node mapping as a more accurate tool, especially since it is non-invasive.Keywords: breast., radiodiagnosis, lifestyle, surgery
Procedia PDF Downloads 3175 PYURF and ZED9 Have a Prominent Role in Association with Molecular Pathways in Bortezomib in Myeloma Cells in Acute Myeloid Leukemia
Authors: Atena Sadat Hosseini, Mohammadhossein Habibi
Abstract:
Acute myeloid leukemia (AML) is the most typically diagnosed leukemia. In older adults, AML imposes a dismal outcome. AML originates with a dominant mutation, then adds collaborative, transformative mutations leading to myeloid transformation and clinical/biological heterogeneity. Several chemotherapeutic drugs are used for this cancer. These drugs are naturally associated with several side effects, and finding a more accurate molecular mechanism of these drugs can have a significant impact on the selection and better candidate of drugs for treatment. In this study, we evaluated bortezomibin myeloma cells using bioinformatics analysis and evaluation of RNA-Seq data. Then investigated the molecular pathways proteins- proteins interactions associated with this chemotherapy drug. A total of 658upregulated genes and 548 downregulated genes were sorted.AUF1 (hnRNP D0) binds and destabilizes mRNA, degradation of GLI2 by the proteasome, the role of GTSE1 in G2/M progression after G2 checkpoint, TCF dependent signaling in response to WNT demonstrated in upregulated genes. Besides insulin resistance, AKT phosphorylates targets in the nucleus, cytosine methylation, Longevity regulating pathway, and Signal Transduction of S1P Receptor were related to low expression genes. With respect to this results, HIST2H2AA3, RP11-96O20.4, ZED9, PRDX1, and DOK2, according to node degrees and betweenness elements candidates from upregulated genes. in the opposite side, PYURF, NRSN1, FGF23, UPK3BL, and STAG3 were a prominent role in downregulated genes. Sum up, Using in silico analysis in the present study, we conducted a precise study ofbortezomib molecular mechanisms in myeloma cells. so that we could take further evaluation to discovermolecular cancer therapy. Naturally, more additional experimental and clinical procedures are needed in this survey.Keywords: myeloma cells, acute myeloid leukemia, bioinformatics analysis, bortezomib
Procedia PDF Downloads 9374 A Computational Framework for Decoding Hierarchical Interlocking Structures with SL Blocks
Authors: Yuxi Liu, Boris Belousov, Mehrzad Esmaeili Charkhab, Oliver Tessmann
Abstract:
This paper presents a computational solution for designing reconfigurable interlocking structures that are fully assembled with SL Blocks. Formed by S-shaped and L-shaped tetracubes, SL Block is a specific type of interlocking puzzle. Analogous to molecular self-assembly, the aggregation of SL blocks will build a reversible hierarchical and discrete system where a single module can be numerously replicated to compose semi-interlocking components that further align, wrap, and braid around each other to form complex high-order aggregations. These aggregations can be disassembled and reassembled, responding dynamically to design inputs and changes with a unique capacity for reconfiguration. To use these aggregations as architectural structures, we developed computational tools that automate the configuration of SL blocks based on architectural design objectives. There are three critical phases in our work. First, we revisit the hierarchy of the SL block system and devise a top-down-type design strategy. From this, we propose two key questions: 1) How to translate 3D polyominoes into SL block assembly? 2) How to decompose the desired voxelized shapes into a set of 3D polyominoes with interlocking joints? These two questions can be considered the Hamiltonian path problem and the 3D polyomino tiling problem. Then, we derive our solution to each of them based on two methods. The first method is to construct the optimal closed path from an undirected graph built from the voxelized shape and translate the node sequence of the resulting path into the assembly sequence of SL blocks. The second approach describes interlocking relationships of 3D polyominoes as a joint connection graph. Lastly, we formulate the desired shapes and leverage our methods to achieve their reconfiguration within different levels. We show that our computational strategy will facilitate the efficient design of hierarchical interlocking structures with a self-replicating geometric module.Keywords: computational design, SL-blocks, 3D polyomino puzzle, combinatorial problem
Procedia PDF Downloads 12973 A Multi-Agent System for Accelerating the Delivery Process of Clinical Diagnostic Laboratory Results Using GSM Technology
Authors: Ayman M. Mansour, Bilal Hawashin, Hesham Alsalem
Abstract:
Faster delivery of laboratory test results is one of the most noticeable signs of good laboratory service and is often used as a key performance indicator of laboratory performance. Despite the availability of technology, the delivery time of clinical laboratory test results continues to be a cause of customer dissatisfaction which makes patients feel frustrated and they became careless to get their laboratory test results. The Medical Clinical Laboratory test results are highly sensitive and could harm patients especially with the severe case if they deliver in wrong time. Such results affect the treatment done by physicians if arrived at correct time efforts should, therefore, be made to ensure faster delivery of lab test results by utilizing new trusted, Robust and fast system. In this paper, we proposed a distributed Multi-Agent System to enhance and faster the process of laboratory test results delivery using SMS. The developed system relies on SMS messages because of the wide availability of GSM network comparing to the other network. The software provides the capability of knowledge sharing between different units and different laboratory medical centers. The system was built using java programming. To implement the proposed system we had many possible techniques. One of these is to use the peer-to-peer (P2P) model, where all the peers are treated equally and the service is distributed among all the peers of the network. However, for the pure P2P model, it is difficult to maintain the coherence of the network, discover new peers and ensure security. Also, security is a quite important issue since each node is allowed to join the network without any control mechanism. We thus take the hybrid P2P model, a model between the Client/Server model and the pure P2P model using GSM technology through SMS messages. This model satisfies our need. A GUI has been developed to provide the laboratory staff with the simple and easy way to interact with the system. This system provides quick response rate and the decision is faster than the manual methods. This will save patients life.Keywords: multi-agent system, delivery process, GSM technology, clinical laboratory results
Procedia PDF Downloads 24972 The Use of Correlation Difference for the Prediction of Leakage in Pipeline Networks
Authors: Mabel Usunobun Olanipekun, Henry Ogbemudia Omoregbee
Abstract:
Anomalies such as water pipeline and hydraulic or petrochemical pipeline network leakages and bursts have significant implications for economic conditions and the environment. In order to ensure pipeline systems are reliable, they must be efficiently controlled. Wireless Sensor Networks (WSNs) have become a powerful network with critical infrastructure monitoring systems for water, oil and gas pipelines. The loss of water, oil and gas is inevitable and is strongly linked to financial costs and environmental problems, and its avoidance often leads to saving of economic resources. Substantial repair costs and the loss of precious natural resources are part of the financial impact of leaking pipes. Pipeline systems experts have implemented various methodologies in recent decades to identify and locate leakages in water, oil and gas supply networks. These methodologies include, among others, the use of acoustic sensors, measurements, abrupt statistical analysis etc. The issue of leak quantification is to estimate, given some observations about that network, the size and location of one or more leaks in a water pipeline network. In detecting background leakage, however, there is a greater uncertainty in using these methodologies since their output is not so reliable. In this work, we are presenting a scalable concept and simulation where a pressure-driven model (PDM) was used to determine water pipeline leakage in a system network. These pressure data were collected with the use of acoustic sensors located at various node points after a predetermined distance apart. We were able to determine with the use of correlation difference to determine the leakage point locally introduced at a predetermined point between two consecutive nodes, causing a substantial pressure difference between in a pipeline network. After de-noising the signal from the sensors at the nodes, we successfully obtained the exact point where we introduced the local leakage using the correlation difference model we developed.Keywords: leakage detection, acoustic signals, pipeline network, correlation, wireless sensor networks (WSNs)
Procedia PDF Downloads 10971 Prevalence, Isolation and Identification of Feline Panleukopaenia Virus from Wild Felids in Nandankanan Zoo, Odisha
Authors: Arun Kharate, Sarata Kumar Sahu, Susen Kumar Panda, Niranjan Sahoo, H. K. Panda
Abstract:
In the present study, an attempt has been made for isolation and identification of feline panleukopaenia virus (FPLV) from wild felids of Nandankanan zoo, Odisha, India, along with prevalence study of FPLV. Fecal samples collected from wild felids (26 tigers, 22 lions, 5 leopards, 3 hyenas, 1 jaguar, 2 foxes and 1 wild cat) were subjected to hemagglutinnation test and fluorescent antibody test. In hemagglutinnation test 13 (50%) samples from tiger, 14 (63.63%) samples from lions, 1 (20%) sample from leopards, 1 (50%) from fox, 3 (100%) samples from hyenas and 1 (100%) sample from wild cat were positive. On fluorescent antibody test (FAT), 15 (57.69%) samples from tiger, 18 (81.81%) from lions, 2 (40%) from leopards, 1 (50%) from fox, 3 (100%) from hyenas and 1 (100%) from wild cat were positive. FPLV was isolated using MDBK cell line and preliminary characterization was done on the basis of characteristic cytopathic effect. The virus samples were quantified through titration in MDBK cells. Serological confirmation of FPLV isolates was carried out by HI test, micro-SNT and indirect-ELISA. Physico-chemical characters like pH and temperature resistance along molecular identification using specific FPLV primers was carried out. Seroprevalence study of 36 serum samples employing HI test, micro SNT and indirect-ELISA revealed prevalence of 38.8, 44.4 and 72.2% respectively. During study period an adult tigress and a tiger cub died suspected of feline panleukopenia. The necropsy findings in both animals showed hemorrhagic gastroenteritis. The cytological examination revealed presence of intranuclear inclusion bodies in the intestinal epithelial cells. Spleen, mesenteric lymph node and intestine were positive for feline panleukopenia by FAT. The investigation revealed that feline panleukopenia was prevalent in wild felines of Nandankanan zoo.Keywords: Feline panleukopenia, fluorescent antibody test, hemagglutination test, indirect-ELISA, Nandankanan zoo
Procedia PDF Downloads 32670 A Distributed Mobile Agent Based on Intrusion Detection System for MANET
Authors: Maad Kamal Al-Anni
Abstract:
This study is about an algorithmic dependence of Artificial Neural Network on Multilayer Perceptron (MPL) pertaining to the classification and clustering presentations for Mobile Adhoc Network vulnerabilities. Moreover, mobile ad hoc network (MANET) is ubiquitous intelligent internetworking devices in which it has the ability to detect their environment using an autonomous system of mobile nodes that are connected via wireless links. Security affairs are the most important subject in MANET due to the easy penetrative scenarios occurred in such an auto configuration network. One of the powerful techniques used for inspecting the network packets is Intrusion Detection System (IDS); in this article, we are going to show the effectiveness of artificial neural networks used as a machine learning along with stochastic approach (information gain) to classify the malicious behaviors in simulated network with respect to different IDS techniques. The monitoring agent is responsible for detection inference engine, the audit data is collected from collecting agent by simulating the node attack and contrasted outputs with normal behaviors of the framework, whenever. In the event that there is any deviation from the ordinary behaviors then the monitoring agent is considered this event as an attack , in this article we are going to demonstrate the signature-based IDS approach in a MANET by implementing the back propagation algorithm over ensemble-based Traffic Table (TT), thus the signature of malicious behaviors or undesirable activities are often significantly prognosticated and efficiently figured out, by increasing the parametric set-up of Back propagation algorithm during the experimental results which empirically shown its effectiveness for the ratio of detection index up to 98.6 percentage. Consequently it is proved in empirical results in this article, the performance matrices are also being included in this article with Xgraph screen show by different through puts like Packet Delivery Ratio (PDR), Through Put(TP), and Average Delay(AD).Keywords: Intrusion Detection System (IDS), Mobile Adhoc Networks (MANET), Back Propagation Algorithm (BPA), Neural Networks (NN)
Procedia PDF Downloads 19469 Expression of DNMT Enzymes-Regulated miRNAs Involving in Epigenetic Event of Tumor and Margin Tissues in Patients with Breast Cancer
Authors: Fatemeh Zeinali Sehrig
Abstract:
Background: miRNAs play an important role in the post-transcriptional regulation of genes, including genes involved in DNA methylation (DNMTs), and are also important regulators of oncogenic pathways. The study of microRNAs and DNMTs in breast cancer allows the development of targeted treatments and early detection of this cancer. Methods and Materials: Clinical Patients and Samples: Institutional guidelines, including ethical approval and informed consent, were followed by the Ethics Committee (Ethics code: IR.IAU.TABRIZ.REC.1401.063) of Tabriz Azad University, Tabriz, Iran. In this study, tissues of 100 patients with breast cancer and tissues of 100 healthy women were collected from Noor Nejat Hospital in Tabriz. The basic characteristics of the patients with breast cancer included: 1)Tumor grade(Grade 3 = 5%, Grade 2 = 87.5%, Grade 1 = 7.5%), 2)Lymph node(Yes = 87.5%, No = 12.5%), 3)Family cancer history(Yes = 47.5%, No = 41.3%, Unknown = 11.2%), 4) Abortion history(Yes = 36.2%).In silico methods (data gathering, process, and build networks): Gene Expression Omnibus (GEO), a high-throughput genomic database, was queried for miRNAs expression profiles in breast cancer. For Experimental protocol Tissue Processing, Total RNA isolation, complementary DNA(cDNA) synthesis, and quantitative real time PCR (QRT-PCR) analysis were performed. Results: In the present study, we found significant (p.value<0.05) changes in the expression level of miRNAs and DNMTs in patients with breast cancer. In bioinformatics studies, the GEO microarray data set, similar to qPCR results, showed a decreased expression of miRNAs and increased expression of DNMTs in breast cancer. Conclusion: According to the results of the present study, which showed a decrease in the expression of miRNAs and DNMTs in breast cancer, it can be said that these genes can be used as important diagnostic and therapeutic biomarkers in breast cancer.Keywords: gene expression omnibus, microarray dataset, breast cancer, miRNA, DNMT (DNA methyltransferases)
Procedia PDF Downloads 3468 Dido: An Automatic Code Generation and Optimization Framework for Stencil Computations on Distributed Memory Architectures
Authors: Mariem Saied, Jens Gustedt, Gilles Muller
Abstract:
We present Dido, a source-to-source auto-generation and optimization framework for multi-dimensional stencil computations. It enables a large programmer community to easily and safely implement stencil codes on distributed-memory parallel architectures with Ordered Read-Write Locks (ORWL) as an execution and communication back-end. ORWL provides inter-task synchronization for data-oriented parallel and distributed computations. It has been proven to guarantee equity, liveness, and efficiency for a wide range of applications, particularly for iterative computations. Dido consists mainly of an implicitly parallel domain-specific language (DSL) implemented as a source-level transformer. It captures domain semantics at a high level of abstraction and generates parallel stencil code that leverages all ORWL features. The generated code is well-structured and lends itself to different possible optimizations. In this paper, we enhance Dido to handle both Jacobi and Gauss-Seidel grid traversals. We integrate temporal blocking to the Dido code generator in order to reduce the communication overhead and minimize data transfers. To increase data locality and improve intra-node data reuse, we coupled the code generation technique with the polyhedral parallelizer Pluto. The accuracy and portability of the generated code are guaranteed thanks to a parametrized solution. The combination of ORWL features, the code generation pattern and the suggested optimizations, make of Dido a powerful code generation framework for stencil computations in general, and for distributed-memory architectures in particular. We present a wide range of experiments over a number of stencil benchmarks.Keywords: stencil computations, ordered read-write locks, domain-specific language, polyhedral model, experiments
Procedia PDF Downloads 12767 Breast Cancer in Very Young (Less Than 25 Yeras) Women: An Institutional Analysis from Developing Country
Authors: Ajay Gogia, Svs Deo, Dn Sharma, Atul Batra, Ashutash Mishra
Abstract:
Background and Aims: Breast cancer in women aged less than 25 years (defined as very young breast cancer, VYBC) is rare and accounts for 0.25% of all breast cancer in the West. There is no data available on VYBC from developing countries. The aim of this study was to analyze the clinical, pathological, and prognostic factors and outcomes in VYBC. Methods: This retrospective analysis was performed on 80 patients aged 25 years or less (screened 8000 files of female BC) who were registered at All India Institute of Medical Sciences (AIIMS), New Delhi, India, over a 15-year period between 2011 and 2023. Results: The median age was 21.5 years (range 16-25). A positive family history (siblings and parents) was elicited in 30% of cases, and breast cancer gene (BRCA1/2) mutation was found in 33% of cases patients. Ten patients (12.5%) patients have pregnancy-associated breast cancer (BC detected during pregnancy or 1 year after postpartum period). The TNM stage distribution was Stage I was 0, stage II -30%, stage III –60% and Stage IV -10 %patients. Seventy percent of tumors were high grade, and 90% had pathological node-positive disease. Estrogen, Progesterone, and human epidermal growth factor receptor 2 (HER2)/neu positivity were 25%,25% and 35%, respectively. Triple-negative breast cancer constituted 40% of patients. With a median follow-up of 42 months, 3 years, relapse-free survival (nonmetastatic disease), progression-free survival (metastatic disease) and overall survival were 30%, 15% and 50%, respectively. Conclusions: Very young women constituted 1% of all breast cancer cases. Advanced disease at presentation and high-risk pathological features result in poor outcomes. One-third of VYBCs are associated with BRCA mutation, which requires genetic counseling and risk reduction surgery if required. Due to the aggressive behavior of BC in this age group, need early diagnosis and prompt treatmentKeywords: very young, breast cancer, outcome, developing country, India
Procedia PDF Downloads 2866 Grade and Maximum Tumor Dimension as Determinants of Lymphadenectomy in Patients with Endometrioid Endometrial Cancer (EEC)
Authors: Ali A. Bazzi, Ameer Hamza, Riley O’Hara, Kimberly Kado, Karen H. Hagglund, Lamia Fathallah, Robert T. Morris
Abstract:
Introduction: Endometrial Cancer is a common gynecologic malignancy primarily treated with complete surgical staging, which may include complete pelvic and para-aortic lymphadenectomy. The role of lymphadenectomy is controversial, especially the intraoperative indications for the procedure. Three factors are important in decision to proceed with lymphadenectomy: Myometrial invasion, maximum tumor dimension, and histology. Many institutions incorporate these criteria in varying degrees in the decision to proceed with lymphadenectomy. This investigation assesses the use of intraoperatively measured MTD with and without pre-operative histologic grade. Methods: This study compared retrospectively EEC patients with intraoperatively measured MTD ≤2 cm to those with MTD >2 cm from January 1, 2002 to August 31, 2017. This assessment compared those with MTD ≤ 2cm with endometrial biopsy (EB) grade 1-2 to patients with MTD > 2cm with EB grade 3. Lymph node metastasis (LNM), recurrence, and survival were compared in these groups. Results: This study reviewed 222 patient cases. In tumors > 2 cm, LNM occurred in 20% cases while in tumors ≤ 2 cm, LNM was found in 6% cases (p=0.04). Recurrence and mean survival based on last follow up visit in these two groups were not statistically different (p=0.78 and 0.36 respectively). Data demonstrated a trend that when combined with preoperative EB International Federation of Gynecology and Obstetrics (FIGO) grade, a higher proportion of patients with EB FIGO Grade 3 and MTD > 2 cm had LNM compared to those with EB FIGO Grade 1-2 and MTD ≤ 2 cm (43% vs, 11%, p=0.06). LNM was found in 15% of cases in which lymphadenectomy was performed based on current practices, whereas if the criteria of EB FIGO 3 and MTD > 2 cm were used the incidence of LNM would have been 44% cases. However, using this criterion, two patients would not have had their nodal metastases detected. Compared to the current practice, the sensitivity and specificity of the proposed criteria would be 60% and 81%, respectively. The PPV and NPV would be 43% and 90%, respectively. Conclusion: The results indicate that MTD combined with EB FIGO grade can detect LNM in a higher proportion of cases when compared to current practice. MTD combined with EB FIGO grade may eliminate the need of frozen section sampling in a substantial number of cases.Keywords: endometrial cancer, FIGO grade, lymphadenectomy, tumor size
Procedia PDF Downloads 18265 A Contemporary Advertising Strategy on Social Networking Sites
Authors: M. S. Aparna, Pushparaj Shetty D.
Abstract:
Nowadays social networking sites have become so popular that the producers or the sellers look for these sites as one of the best options to target the right audience to market their products. There are several tools available to monitor or analyze the social networks. Our task is to identify the right community web pages and find out the behavior analysis of the members by using these tools and formulate an appropriate strategy to market the products or services to achieve the set goals. The advertising becomes more effective when the information of the product/ services come from a known source. The strategy explores great buying influence in the audience on referral marketing. Our methodology proceeds with critical budget analysis and promotes viral influence propagation. In this context, we encompass the vital bits of budget evaluation such as the number of optimal seed nodes or primary influential users activated onset, an estimate coverage spread of nodes and maximum influence propagating distance from an initial seed to an end node. Our proposal for Buyer Prediction mathematical model arises from the urge to perform complex analysis when the probability density estimates of reliable factors are not known or difficult to calculate. Order Statistics and Buyer Prediction mapping function guarantee the selection of optimal influential users at each level. We exercise an efficient tactics of practicing community pages and user behavior to determine the product enthusiasts on social networks. Our approach is promising and should be an elementary choice when there is little or no prior knowledge on the distribution of potential buyers on social networks. In this strategy, product news propagates to influential users on or surrounding networks. By applying the same technique, a user can search friends who are capable to advise better or give referrals, if a product interests him.Keywords: viral marketing, social network analysis, community web pages, buyer prediction, influence propagation, budget constraints
Procedia PDF Downloads 26264 Integrated On-Board Diagnostic-II and Direct Controller Area Network Access for Vehicle Monitoring System
Authors: Kavian Khosravinia, Mohd Khair Hassan, Ribhan Zafira Abdul Rahman, Syed Abdul Rahman Al-Haddad
Abstract:
The CAN (controller area network) bus is introduced as a multi-master, message broadcast system. The messages sent on the CAN are used to communicate state information, referred as a signal between different ECUs, which provides data consistency in every node of the system. OBD-II Dongles that are based on request and response method is the wide-spread solution for extracting sensor data from cars among researchers. Unfortunately, most of the past researches do not consider resolution and quantity of their input data extracted through OBD-II technology. The maximum feasible scan rate is only 9 queries per second which provide 8 data points per second with using ELM327 as well-known OBD-II dongle. This study aims to develop and design a programmable, and latency-sensitive vehicle data acquisition system that improves the modularity and flexibility to extract exact, trustworthy, and fresh car sensor data with higher frequency rates. Furthermore, the researcher must break apart, thoroughly inspect, and observe the internal network of the vehicle, which may cause severe damages to the expensive ECUs of the vehicle due to intrinsic vulnerabilities of the CAN bus during initial research. Desired sensors data were collected from various vehicles utilizing Raspberry Pi3 as computing and processing unit with using OBD (request-response) and direct CAN method at the same time. Two types of data were collected for this study. The first, CAN bus frame data that illustrates data collected for each line of hex data sent from an ECU and the second type is the OBD data that represents some limited data that is requested from ECU under standard condition. The proposed system is reconfigurable, human-readable and multi-task telematics device that can be fitted into any vehicle with minimum effort and minimum time lag in the data extraction process. The standard operational procedure experimental vehicle network test bench is developed and can be used for future vehicle network testing experiment.Keywords: CAN bus, OBD-II, vehicle data acquisition, connected cars, telemetry, Raspberry Pi3
Procedia PDF Downloads 203