Search results for: mesenteric lymph node
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 538

Search results for: mesenteric lymph node

88 Time and Cost Prediction Models for Language Classification Over a Large Corpus on Spark

Authors: Jairson Barbosa Rodrigues, Paulo Romero Martins Maciel, Germano Crispim Vasconcelos

Abstract:

This paper presents an investigation of the performance impacts regarding the variation of five factors (input data size, node number, cores, memory, and disks) when applying a distributed implementation of Naïve Bayes for text classification of a large Corpus on the Spark big data processing framework. Problem: The algorithm's performance depends on multiple factors, and knowing before-hand the effects of each factor becomes especially critical as hardware is priced by time slice in cloud environments. Objectives: To explain the functional relationship between factors and performance and to develop linear predictor models for time and cost. Methods: the solid statistical principles of Design of Experiments (DoE), particularly the randomized two-level fractional factorial design with replications. This research involved 48 real clusters with different hardware arrangements. The metrics were analyzed using linear models for screening, ranking, and measurement of each factor's impact. Results: Our findings include prediction models and show some non-intuitive results about the small influence of cores and the neutrality of memory and disks on total execution time, and the non-significant impact of data input scale on costs, although notably impacts the execution time.

Keywords: big data, design of experiments, distributed machine learning, natural language processing, spark

Procedia PDF Downloads 88
87 Using Cyclic Structure to Improve Inference on Network Community Structure

Authors: Behnaz Moradijamei, Michael Higgins

Abstract:

Identifying community structure is a critical task in analyzing social media data sets often modeled by networks. Statistical models such as the stochastic block model have proven to explain the structure of communities in real-world network data. In this work, we develop a goodness-of-fit test to examine community structure's existence by using a distinguishing property in networks: cyclic structures are more prevalent within communities than across them. To better understand how communities are shaped by the cyclic structure of the network rather than just the number of edges, we introduce a novel method for deciding on the existence of communities. We utilize these structures by using renewal non-backtracking random walk (RNBRW) to the existing goodness-of-fit test. RNBRW is an important variant of random walk in which the walk is prohibited from returning back to a node in exactly two steps and terminates and restarts once it completes a cycle. We investigate the use of RNBRW to improve the performance of existing goodness-of-fit tests for community detection algorithms based on the spectral properties of the adjacency matrix. Our proposed test on community structure is based on the probability distribution of eigenvalues of the normalized retracing probability matrix derived by RNBRW. We attempt to make the best use of asymptotic results on such a distribution when there is no community structure, i.e., asymptotic distribution under the null hypothesis. Moreover, we provide a theoretical foundation for our statistic by obtaining the true mean and a tight lower bound for RNBRW edge weights variance.

Keywords: hypothesis testing, RNBRW, network inference, community structure

Procedia PDF Downloads 119
86 Research on “Three Ports in One” Comprehensive Transportation System of Sea, Land and Airport in Nantong City under the Background of a New Round of Territorial Space Planning

Authors: Ying Sun, Yuxuan Lei

Abstract:

Based on the analysis of the current situation of Nantong's comprehensive transportation system, the interactive relationship between the transportation system and the economy and society is clarified, and then the development strategy for the planning and implementation of the "three ports in one" comprehensive transportation system of ocean, land, and airport is proposed for this round of territorial spatial planning. The research findings are as follows: (1) The comprehensive transportation network system of Nantong City is beginning to take shape, but the lack of a unified and complete system planning makes it difficult to establish a "multi-port integration" pattern with transportation hubs. (2) At the Yangtze River Delta level and Nantong City level, a connected transport node integrating ocean, land, and airport should be built in the transportation construction planning to effectively meet the guidance of the overall territorial space planning of Nantong City. (3) Nantong's comprehensive transportation system and economic society have experienced three interactive development relations in different stages: mutual promotion, geographical separation, and high-level driving. Therefore, the current planning of Nantong's comprehensive transportation system needs to be optimized. The four levels of Nantong city, Shanghai metropolitan area, Yangtze River Delta, and each district, county, and city should be comprehensively considered, and the four development strategies of accelerating construction, dislocation development, active docking, and innovative implementation should be adopted.

Keywords: master plan for territorial space, Integrated transportation system, Nantong, sea, land and air, "Three ports in one"

Procedia PDF Downloads 117
85 Nanomechanical Characterization of Healthy and Tumor Lung Tissues at Cell and Extracellular Matrix Level

Authors: Valeria Panzetta, Ida Musella, Sabato Fusco, Paolo Antonio Netti

Abstract:

The study of the biophysics of living cells drew attention to the pivotal role of the cytoskeleton in many cell functions, such as mechanics, adhesion, proliferation, migration, differentiation and neoplastic transformation. In particular, during the complex process of malignant transformation and invasion cell cytoskeleton devolves from a rigid and organized structure to a more compliant state, which confers to the cancer cells a great ability to migrate and adapt to the extracellular environment. In order to better understand the malignant transformation process from a mechanical point of view, it is necessary to evaluate the direct crosstalk between the cells and their surrounding extracellular matrix (ECM) in a context which is close to in vivo conditions. In this study, human biopsy tissues of lung adenocarcinoma were analyzed in order to define their mechanical phenotype at cell and ECM level, by using particle tracking microrheology (PTM) technique. Polystyrene beads (500 nm) were introduced into the sample slice. The motion of beads was obtained by tracking their displacements across cell cytoskeleton and ECM structures and mean squared displacements (MSDs) were calculated from bead trajectories. It has been already demonstrated that the amplitude of MSD is inversely related to the mechanical properties of intracellular and extracellular microenvironment. For this reason, MSDs of particles introduced in cytoplasm and ECM of healthy and tumor tissues were compared. PTM analyses showed that cancerous transformation compromises mechanical integrity of cells and extracellular matrix. In particular, the MSD amplitudes in cells of adenocarcinoma were greater as compared to cells of normal tissues. The increased motion is probably associated to a less structured cytoskeleton and consequently to an increase of deformability of cells. Further, cancer transformation is also accompanied by extracellular matrix stiffening, as confirmed by the decrease of MSDs of matrix in tumor tissue, a process that promotes tumor proliferation and invasiveness, by activating typical oncogenic signaling pathways. In addition, a clear correlation between MSDs of cells and tumor grade was found. MSDs increase when tumor grade passes from 2 to 3, indicating that cells undergo to a trans-differentiation process during tumor progression. ECM stiffening is not dependent on tumor grade, but the tumor stage resulted to be strictly correlated with both cells and ECM mechanical properties. In fact, a greater stage is assigned to tumor spread to regional lymph nodes and characterized by an up-regulation of different ECM proteins, such as collagen I fibers. These results indicate that PTM can be used to get nanomechanical characterization at different scale levels in an interpretative and diagnostic context.

Keywords: cytoskeleton, extracellular matrix, mechanical properties, particle tracking microrheology, tumor

Procedia PDF Downloads 252
84 A Prediction Model for Dynamic Responses of Building from Earthquake Based on Evolutionary Learning

Authors: Kyu Jin Kim, Byung Kwan Oh, Hyo Seon Park

Abstract:

The seismic responses-based structural health monitoring system has been performed to prevent seismic damage. Structural seismic damage of building is caused by the instantaneous stress concentration which is related with dynamic characteristic of earthquake. Meanwhile, seismic response analysis to estimate the dynamic responses of building demands significantly high computational cost. To prevent the failure of structural members from the characteristic of the earthquake and the significantly high computational cost for seismic response analysis, this paper presents an artificial neural network (ANN) based prediction model for dynamic responses of building considering specific time length. Through the measured dynamic responses, input and output node of the ANN are formed by the length of specific time, and adopted for the training. In the model, evolutionary radial basis function neural network (ERBFNN), that radial basis function network (RBFN) is integrated with evolutionary optimization algorithm to find variables in RBF, is implemented. The effectiveness of the proposed model is verified through an analytical study applying responses from dynamic analysis for multi-degree of freedom system to training data in ERBFNN.

Keywords: structural health monitoring, dynamic response, artificial neural network, radial basis function network, genetic algorithm

Procedia PDF Downloads 281
83 Application of Finite Volume Method for Numerical Simulation of Contaminant Transfer in a Two-Dimensional Reservoir

Authors: Atousa Ataieyan, Salvador A. Gomez-Lopera, Gennaro Sepede

Abstract:

Today, due to the growing urban population and consequently, the increasing water demand in cities, the amount of contaminants entering the water resources is increasing. This can impose harmful effects on the quality of the downstream water. Therefore, predicting the concentration of discharged pollutants at different times and distances of the interested area is of high importance in order to carry out preventative and controlling measures, as well as to avoid consuming the contaminated water. In this paper, the concentration distribution of an injected conservative pollutant in a square reservoir containing four symmetric blocks and three sources using Finite Volume Method (FVM) is simulated. For this purpose, after estimating the flow velocity, classical Advection-Diffusion Equation (ADE) has been discretized over the studying domain by Backward Time- Backward Space (BTBS) scheme. Then, the discretized equations for each node have been derived according to the initial condition, boundary conditions and point contaminant sources. Finally, taking into account the appropriate time step and space step, a computational code was set up in MATLAB. Contaminant concentration was then obtained at different times and distances. Simulation results show how using BTBS differentiating scheme and FVM as a numerical method for solving the partial differential equation of transport is an appropriate approach in the case of two-dimensional contaminant transfer in an advective-diffusive flow.

Keywords: BTBS differentiating scheme, contaminant concentration, finite volume, mass transfer, water pollution

Procedia PDF Downloads 115
82 Internet of Things Networks: Denial of Service Detection in Constrained Application Protocol Using Machine Learning Algorithm

Authors: Adamu Abdullahi, On Francisca, Saidu Isah Rambo, G. N. Obunadike, D. T. Chinyio

Abstract:

The paper discusses the potential threat of Denial of Service (DoS) attacks in the Internet of Things (IoT) networks on constrained application protocols (CoAP). As billions of IoT devices are expected to be connected to the internet in the coming years, the security of these devices is vulnerable to attacks, disrupting their functioning. This research aims to tackle this issue by applying mixed methods of qualitative and quantitative for feature selection, extraction, and cluster algorithms to detect DoS attacks in the Constrained Application Protocol (CoAP) using the Machine Learning Algorithm (MLA). The main objective of the research is to enhance the security scheme for CoAP in the IoT environment by analyzing the nature of DoS attacks and identifying a new set of features for detecting them in the IoT network environment. The aim is to demonstrate the effectiveness of the MLA in detecting DoS attacks and compare it with conventional intrusion detection systems for securing the CoAP in the IoT environment. Findings: The research identifies the appropriate node to detect DoS attacks in the IoT network environment and demonstrates how to detect the attacks through the MLA. The accuracy detection in both classification and network simulation environments shows that the k-means algorithm scored the highest percentage in the training and testing of the evaluation. The network simulation platform also achieved the highest percentage of 99.93% in overall accuracy. This work reviews conventional intrusion detection systems for securing the CoAP in the IoT environment. The DoS security issues associated with the CoAP are discussed.

Keywords: algorithm, CoAP, DoS, IoT, machine learning

Procedia PDF Downloads 48
81 Bluetooth Communication Protocol Study for Multi-Sensor Applications

Authors: Joao Garretto, R. J. Yarwood, Vamsi Borra, Frank Li

Abstract:

Bluetooth Low Energy (BLE) has emerged as one of the main wireless communication technologies used in low-power electronics, such as wearables, beacons, and Internet of Things (IoT) devices. BLE’s energy efficiency characteristic, smart mobiles interoperability, and Over the Air (OTA) capabilities are essential features for ultralow-power devices, which are usually designed with size and cost constraints. Most current research regarding the power analysis of BLE devices focuses on the theoretical aspects of the advertising and scanning cycles, with most results being presented in the form of mathematical models and computer software simulations. Such computer modeling and simulations are important for the comprehension of the technology, but hardware measurement is essential for the understanding of how BLE devices behave in real operation. In addition, recent literature focuses mostly on the BLE technology, leaving possible applications and its analysis out of scope. In this paper, a coin cell battery-powered BLE Data Acquisition Device, with a 4-in-1 sensor and one accelerometer, is proposed and evaluated with respect to its Power Consumption. First, evaluations of the device in advertising mode with the sensors turned off completely, followed by the power analysis when each of the sensors is individually turned on and data is being transmitted, and concluding with the power consumption evaluation when both sensors are on and respectively broadcasting the data to a mobile phone. The results presented in this paper are real-time measurements of the electrical current consumption of the BLE device, where the energy levels that are demonstrated are matched to the BLE behavior and sensor activity.

Keywords: bluetooth low energy, power analysis, BLE advertising cycle, wireless sensor node

Procedia PDF Downloads 68
80 Load Balancing Technique for Energy - Efficiency in Cloud Computing

Authors: Rani Danavath, V. B. Narsimha

Abstract:

Cloud computing is emerging as a new paradigm of large scale distributed computing. Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., three service models, and four deployment networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. This cloud model is composed of five essential characteristics models. Load balancing is one of the main challenges in cloud computing, which is required to distribute the dynamic workload across multiple nodes, to ensure that no single node is overloaded. It helps in optimal utilization of resources, enhancing the performance of the system. The goal of the load balancing is to minimize the resource consumption and carbon emission rate, that is the direct need of cloud computing. This determined the need of new metrics energy consumption and carbon emission for energy-efficiency load balancing techniques in cloud computing. Existing load balancing techniques mainly focuses on reducing overhead, services, response time and improving performance etc. In this paper we introduced a Technique for energy-efficiency, but none of the techniques have considered the energy consumption and carbon emission. Therefore, our proposed work will go towards energy – efficiency. So this energy-efficiency load balancing technique can be used to improve the performance of cloud computing by balancing the workload across all the nodes in the cloud with the minimum resource utilization, in turn, reducing energy consumption, and carbon emission to an extent, which will help to achieve green computing.

Keywords: cloud computing, distributed computing, energy efficiency, green computing, load balancing, energy consumption, carbon emission

Procedia PDF Downloads 423
79 Eco-Friendly Control of Bacterial Speck on Solanum lycopersicum by Azadirachta indica Extract

Authors: Navodit Goel, Prabir K. Paul

Abstract:

Tomato (Solanum lycopersicum) is attacked by Pseudomonas syringae pv. tomato causing speck lesions on the leaves leading to severe economic casualty. In the present study, aqueous fruit extracts of Azadirachta indica (neem) were sprayed on a single node of tomato plants grown under controlled contamination-free conditions. The treatment of plants was performed with neem fruit extract either alone or along with the pathogen. The parameters of observation were activities of polyphenol oxidase (PPO) and lysozyme, and isoform analysis of PPO; both at the treated leaves as well as untreated leaves away from the site of extract application. Polyphenol oxidase initiates phenylpropanoid pathway resulting in the synthesis of quinines from cytoplasmic phenols and production of reactive oxygen species toxic to broad spectrum microbes. Lysozyme is responsible for the breakdown of bacterial cell wall. The results indicate the upregulation of PPO and lysozyme activities in both the treated and untreated leaves along with de novo expression of newer PPO isoenzymes (which were absent in control samples). The appearance of additional PPO isoenzymes in bioelicitor-treated plants indicates that either the isoenzymes were expressed after bioelicitor application or the already expressed but inactive isoenzymes were activated by it. Lysozyme activity was significantly increased in the plants when treated with the bioelicitor or the pathogen alone. However, no new isoenzymes of lysozyme were expressed upon application of the extract. Induction of resistance by neem fruit extract could be a potent weapon in eco-friendly plant protection strategies.

Keywords: Azadirachta indica, lysozyme, polyphenol oxidase, Solanum lycopersicum

Procedia PDF Downloads 260
78 Learning Dynamic Representations of Nodes in Temporally Variant Graphs

Authors: Sandra Mitrovic, Gaurav Singh

Abstract:

In many industries, including telecommunications, churn prediction has been a topic of active research. A lot of attention has been drawn on devising the most informative features, and this area of research has gained even more focus with spread of (social) network analytics. The call detail records (CDRs) have been used to construct customer networks and extract potentially useful features. However, to the best of our knowledge, no studies including network features have yet proposed a generic way of representing network information. Instead, ad-hoc and dataset dependent solutions have been suggested. In this work, we build upon a recently presented method (node2vec) to obtain representations for nodes in observed network. The proposed approach is generic and applicable to any network and domain. Unlike node2vec, which assumes a static network, we consider a dynamic and time-evolving network. To account for this, we propose an approach that constructs the feature representation of each node by generating its node2vec representations at different timestamps, concatenating them and finally compressing using an auto-encoder-like method in order to retain reasonably long and informative feature vectors. We test the proposed method on churn prediction task in telco domain. To predict churners at timestamp ts+1, we construct training and testing datasets consisting of feature vectors from time intervals [t1, ts-1] and [t2, ts] respectively, and use traditional supervised classification models like SVM and Logistic Regression. Observed results show the effectiveness of proposed approach as compared to ad-hoc feature selection based approaches and static node2vec.

Keywords: churn prediction, dynamic networks, node2vec, auto-encoders

Procedia PDF Downloads 292
77 Code Embedding for Software Vulnerability Discovery Based on Semantic Information

Authors: Joseph Gear, Yue Xu, Ernest Foo, Praveen Gauravaran, Zahra Jadidi, Leonie Simpson

Abstract:

Deep learning methods have been seeing an increasing application to the long-standing security research goal of automatic vulnerability detection for source code. Attention, however, must still be paid to the task of producing vector representations for source code (code embeddings) as input for these deep learning models. Graphical representations of code, most predominantly Abstract Syntax Trees and Code Property Graphs, have received some use in this task of late; however, for very large graphs representing very large code snip- pets, learning becomes prohibitively computationally expensive. This expense may be reduced by intelligently pruning this input to only vulnerability-relevant information; however, little research in this area has been performed. Additionally, most existing work comprehends code based solely on the structure of the graph at the expense of the information contained by the node in the graph. This paper proposes Semantic-enhanced Code Embedding for Vulnerability Discovery (SCEVD), a deep learning model which uses semantic-based feature selection for its vulnerability classification model. It uses information from the nodes as well as the structure of the code graph in order to select features which are most indicative of the presence or absence of vulnerabilities. This model is implemented and experimentally tested using the SARD Juliet vulnerability test suite to determine its efficacy. It is able to improve on existing code graph feature selection methods, as demonstrated by its improved ability to discover vulnerabilities.

Keywords: code representation, deep learning, source code semantics, vulnerability discovery

Procedia PDF Downloads 132
76 hsa-miR-1204 and hsa-miR-639 Prominent Role in Tamoxifen's Molecular Mechanisms on the EMT Phenomenon in Breast Cancer Patients

Authors: Mahsa Taghavi

Abstract:

In the treatment of breast cancer, tamoxifen is a regularly prescribed medication. The effect of tamoxifen on breast cancer patients' EMT pathways was studied. In this study to see if it had any effect on the cancer cells' resistance to tamoxifen and to look for specific miRNAs associated with EMT. In this work, we used continuous and integrated bioinformatics analysis to choose the optimal GEO datasets. Once we had sorted the gene expression profile, we looked at the mechanism of signaling, the ontology of genes, and the protein interaction of each gene. In the end, we used the GEPIA database to confirm the candidate genes. after that, I investigated critical miRNAs related to candidate genes. There were two gene expression profiles that were categorized into two distinct groups. Using the expression profile of genes that were lowered in the EMT pathway, the first group was examined. The second group represented the polar opposite of the first. A total of 253 genes from the first group and 302 genes from the second group were found to be common. Several genes in the first category were linked to cell death, focal adhesion, and cellular aging. Two genes in the second group were linked to cell death, focal adhesion, and cellular aging. distinct cell cycle stages were observed. Finally, proteins such as MYLK, SOCS3, and STAT5B from the first group and BIRC5, PLK1, and RAPGAP1 from the second group were selected as potential candidates linked to tamoxifen's influence on the EMT pathway. hsa-miR-1204 and hsa-miR-639 have a very close relationship with the candidates genes according to the node degrees and betweenness index. With this, the action of tamoxifen on the EMT pathway was better understood. It's important to learn more about how tamoxifen's target genes and proteins work so that we can better understand the drug.

Keywords: tamoxifen, breast cancer, bioinformatics analysis, EMT, miRNAs

Procedia PDF Downloads 106
75 Analysis of Network Connectivity for Ship-To-Ship Maritime Communication Using IEEE 802.11 on Maritime Environment of Tanjung Perak, Indonesia

Authors: Ahmad Fauzi Makarim, Okkie Puspitorini, Hani'ah Mahmudah, Nur Adi Siswandari, Ari Wijayanti

Abstract:

As a maritime country, Indonesia needs a solution in maritime connectivity which can assist the maritime communication system which including communication from harbor to the ship or ship to ship. The needs of many application services for maritime communication, whether for safety reasons until voyage service to help the process of voyage activity needs connection with a high bandwith. To support the government efforts in handling that kind of problem, a research is conducted in maritime communication issue by applying the new developed technology in Indonesia, namely IEEE 802.11. In this research, 3 outdoor WiFi devices are used in which have a frequency of 5.8 GHz. Maritime of Tanjung Perak harbor in Surabaya until Karang Jamuang Island are used as the location of the research with defining permission of ship node spreading by Navigation District Class 1. That maritime area formed by state 1 and state 2 areas which are the narrow area with average wave height of 0.7 meter based on the data from BMKG S urabaya. After that, wave height used as one of the parameters which are used in analyzing characteristic of signal propagation at sea surface, so it can be determined on the coverage area of transmitter system. In this research has been used three samples of outdoor wifi, there is the coverage of device A can be determined about 2256 meter, device B 4000 meter, and device C 1174 meter. Then to analyze of network connectivity for the ship to ship is used AODV routing algorithm system based on the value of the power transmit was smallest of all nodes within the transmitter coverage.

Keywords: maritime of Indonesia, maritime communications, outdoor wifi, coverage, AODV

Procedia PDF Downloads 329
74 Data Compression in Ultrasonic Network Communication via Sparse Signal Processing

Authors: Beata Zima, Octavio A. Márquez Reyes, Masoud Mohammadgholiha, Jochen Moll, Luca de Marchi

Abstract:

This document presents the approach of using compressed sensing in signal encoding and information transferring within a guided wave sensor network, comprised of specially designed frequency steerable acoustic transducers (FSATs). Wave propagation in a damaged plate was simulated using commercial FEM-based software COMSOL. Guided waves were excited by means of FSATs, characterized by the special shape of its electrodes, and modeled using PIC255 piezoelectric material. The special shape of the FSAT, allows for focusing wave energy in a certain direction, accordingly to the frequency components of its actuation signal, which makes available a larger monitored area. The process begins when a FSAT detects and records reflection from damage in the structure, this signal is then encoded and prepared for transmission, using a combined approach, based on Compressed Sensing Matching Pursuit and Quadrature Amplitude Modulation (QAM). After codification of the signal is in binary chars the information is transmitted between the nodes in the network. The message reaches the last node, where it is finally decoded and processed, to be used for damage detection and localization purposes. The main aim of the investigation is to determine the location of detected damage using reconstructed signals. The study demonstrates that the special steerable capabilities of FSATs, not only facilitate the detection of damage but also permit transmitting the damage information to a chosen area in a specific direction of the investigated structure.

Keywords: data compression, ultrasonic communication, guided waves, FEM analysis

Procedia PDF Downloads 105
73 On the Existence of Homotopic Mapping Between Knowledge Graphs and Graph Embeddings

Authors: Jude K. Safo

Abstract:

Knowledge Graphs KG) and their relation to Graph Embeddings (GE) represent a unique data structure in the landscape of machine learning (relative to image, text and acoustic data). Unlike the latter, GEs are the only data structure sufficient for representing hierarchically dense, semantic information needed for use-cases like supply chain data and protein folding where the search space exceeds the limits traditional search methods (e.g. page-rank, Dijkstra, etc.). While GEs are effective for compressing low rank tensor data, at scale, they begin to introduce a new problem of ’data retreival’ which we observe in Large Language Models. Notable attempts by transE, TransR and other prominent industry standards have shown a peak performance just north of 57% on WN18 and FB15K benchmarks, insufficient practical industry applications. They’re also limited, in scope, to next node/link predictions. Traditional linear methods like Tucker, CP, PARAFAC and CANDECOMP quickly hit memory limits on tensors exceeding 6.4 million nodes. This paper outlines a topological framework for linear mapping between concepts in KG space and GE space that preserve cardinality. Most importantly we introduce a traceable framework for composing dense linguistic strcutures. We demonstrate performance on WN18 benchmark this model hits. This model does not rely on Large Langauge Models (LLM) though the applications are certainy relevant here as well.

Keywords: representation theory, large language models, graph embeddings, applied algebraic topology, applied knot theory, combinatorics

Procedia PDF Downloads 47
72 A Case of Myelofibrosis-Related Arthropathy: A Rare and Underrecognized Entity

Authors: Geum Yeon Sim, Jasal Patel, Anand Kumthekar, Stanley Wainapel

Abstract:

A 65-year-old right-hand dominant African-American man, formerly employed as a security guard, was referred to Rehabilitation Medicine with bilateral hand stiffness and weakness. His past medical history was only significant for myelofibrosis, diagnosed 4 years earlier, for which he was receiving scheduled blood transfusions. Approximately 2 years ago, he began to notice stiffness and swelling in his non-dominant hand that progressed to pain and decreased strength, limiting his hand function. Similar but milder symptoms developed in his right hand several months later. There was no history of prior injury or exposure to cold. Physical examination showed enlargement of metacarpophalangeal (MCP) and proximal interphalangeal (PIP) joints with finger flexion contractures, Swan-neck and Boutonniere deformities, and associated joint tenderness. Changes were more prominent in the left hand. X-rays showed mild osteoarthritis of several bilateral PIP joints. Anti-nuclear antibodies, rheumatoid factor, and cyclic citrullinated peptide antibodies were negative. MRI of the hand showed no erosions or synovitis. A rheumatology consultation was obtained, and the cause of his symptoms was attributed to myelofibrosis-related arthropathy with secondary osteoarthritis. The patient was tried on diclofenac cream and received a few courses of Occupational Therapy with limited functional improvement. Primary myelofibrosis (PMF) is a rare myeloproliferative neoplasm characterized by clonal proliferation of myeloid cells with variable morphologic maturity and hematopoietic efficiency. Rheumatic manifestations of malignancies include direct invasion, paraneoplastic presentations, secondary gout, or hypertrophic osteoarthropathy. PMF causes gradual bone marrow fibrosis with extramedullary metaplastic hematopoiesis in the liver, spleen, or lymph nodes. Musculoskeletal symptoms are not common and are not well described in the literature. The first reported case of myelofibrosis related arthritis was seronegative arthritis due to synovial invasion of myeloproliferative elements. Myelofibrosis has been associated with autoimmune diseases such as systemic lupus erythematosus, progressive systemic sclerosis, and rheumatoid arthritis. Gout has been reported in patients with myelofibrosis, and the underlying mechanism is thought to be related to the high turnover of nucleic acids that is greatly augmented in this disease. X-ray findings in these patients usually include erosive arthritis with synovitis. Treatment of underlying PMF is the treatment of choice, along with anti-inflammatory medications. Physicians should be cognizant of recognizing this rare entity in patients with PMF while maintaining clinical suspicion for more common causes of joint deformities, such as rheumatic diseases.

Keywords: myelofibrosis, arthritis, arthralgia, malignancy

Procedia PDF Downloads 68
71 Modeling Loads Applied to Main and Crank Bearings in the Compression-Ignition Two-Stroke Engine

Authors: Marcin Szlachetka, Mateusz Paszko, Grzegorz Baranski

Abstract:

This paper discusses the AVL EXCITE Designer simulation research into loads applied to main and crank bearings in the compression-ignition two-stroke engine. There was created a model of engine lubrication system which covers the part of this system related to particular nodes of a bearing system, i.e. a connection of main bearings in an engine block with a crankshaft, a connection of crank pins with a connecting rod. The analysis focused on the load given as a distribution of hydrodynamic oil film pressure corresponding different values of radial internal clearance. There was also studied the impact of gas force on minimal oil film thickness in main and crank bearings versus crankshaft rotational speed. Our model calculates oil film parameters, an oil film pressure distribution, an oil temperature change and dimensions of bearings as well as an oil temperature distribution on surfaces of bearing seats. Accordingly, it was possible to select, for example, a correct clearance for each of the node bearings. The research was performed for several values of engine crankshaft speed ranging from 800 RPM to 4000 RPM. Bearing oil pressure was changed according to engine speed ranging between 1 bar and 5 bar and an oil temperature of 90°C. The main bearing clearances made initially for the calculation and research were: 0.015 mm, 0.025 mm, 0.035 mm, 0.05 mm, 0.1 mm. The oil used for the research corresponded the SAE 5W-40 classification. The paper presents the selected research results referring to certain specific operating points and bearing radial internal clearances. Acknowledgement: This work has been realized in the cooperation with The Construction Office of WSK ‘PZL-KALISZ’ S.A. and is part of Grant Agreement No. POIR.01.02.00-00-0002/15 financed by the Polish National Centre for Research and Development.

Keywords: crank bearings, diesel engine, oil film, two-stroke engine

Procedia PDF Downloads 186
70 O-LEACH: The Problem of Orphan Nodes in the LEACH of Routing Protocol for Wireless Sensor Networks

Authors: Wassim Jerbi, Abderrahmen Guermazi, Hafedh Trabelsi

Abstract:

The optimum use of coverage in wireless sensor networks (WSNs) is very important. LEACH protocol called Low Energy Adaptive Clustering Hierarchy, presents a hierarchical clustering algorithm for wireless sensor networks. LEACH is a protocol that allows the formation of distributed cluster. In each cluster, LEACH randomly selects some sensor nodes called cluster heads (CHs). The selection of CHs is made with a probabilistic calculation. It is supposed that each non-CH node joins a cluster and becomes a cluster member. Nevertheless, some CHs can be concentrated in a specific part of the network. Thus, several sensor nodes cannot reach any CH. to solve this problem. We created an O-LEACH Orphan nodes protocol, its role is to reduce the sensor nodes which do not belong the cluster. The cluster member called Gateway receives messages from neighboring orphan nodes. The gateway informs CH having the neighboring nodes that not belong to any group. However, Gateway called (CH') attaches the orphaned nodes to the cluster and then collected the data. O-Leach enables the formation of a new method of cluster, leads to a long life and minimal energy consumption. Orphan nodes possess enough energy and seeks to be covered by the network. The principal novel contribution of the proposed work is O-LEACH protocol which provides coverage of the whole network with a minimum number of orphaned nodes and has a very high connectivity rates.As a result, the WSN application receives data from the entire network including orphan nodes. The proper functioning of the Application requires, therefore, management of intelligent resources present within each the network sensor. The simulation results show that O-LEACH performs better than LEACH in terms of coverage, connectivity rate, energy and scalability.

Keywords: WSNs; routing; LEACH; O-LEACH; Orphan nodes; sub-cluster; gateway; CH’

Procedia PDF Downloads 346
69 A Mother’s Silent Adversary: A Case of Pregnant Woman with Cervical Cancer

Authors: Paola Millare, Nelinda Catherine Pangilinan

Abstract:

Background and Aim: Cervical cancer is the most commonly diagnosed gynecological malignancy during pregnancy. Owing to the rarity of the disease, and the complexity of all factors that have to be taken into consideration, standardization of treatment is very difficult. Cervical cancer is the second most common malignancy among women. The treatment of cancer during pregnancy is most challenging in the case of cervical cancer, since the pregnant uterus itself is affected. This report aims to present a case of cervical cancer in a pregnant woman and how to manage this case and several issues accompanied with it. Methods: This is a case of a 28 year-old, Gravida 4 Para 2 (1111), who presented with watery to mucoid, whitish, non-foul smelling and increasing in amount. Internal examination revealed normal external genitalia, parous outlet, cervix was transformed into a fungating mass measuring 5x4 cm, with left parametrial involvement, body of uterus was enlarged to 24 weeks size, no adnexal mass or tenderness. She had cervical punch biopsy, which revealed, adenocarcinoma, well-differentiated cervical tissue. Standard management for cases with stage 2B cervical carcinoma was to start radiation or radical hysterectomy. In the case of patients diagnosed with cervical cancer and currently pregnant, these kind of management will result to fetal loss. The patient still declined the said management and opted to delay the treatment and wait for her baby to reach at least term and proceed to cesarean section as route of delivery. Results: The patient underwent an elective cesarean section at 37th weeks age of gestation, with an outcome of a term, live baby boy APGAR score 7,9 birthweight 2600 grams. One month postpartum, the patient followed up and completed radiotherapy, chemotherapy and brachytherapy. She was advised to go back after 6 months for monitoring. On her last check up, an internal examination was done which revealed normal external genitalia, vagina admits 2 fingers with ease, there is a palpable fungating mass at the cervix measuring 2x2 cm. A repeat gynecologic oncologic ultrasound was done revealing cervical mass, endophytic, grade 1 color score with stromal invasion 35% post radiation reactive lymph nodes with intact paracolpium, pericervical, and parametrial involvement. The patient was then advised to undergo pelvic boost and for close monitoring of the cervical mass. Conclusion: Cervical cancer in pregnancy is rare but is a dilemma for women and their physicians. Treatment should be multidisciplinary and individualized following careful counseling. In this case, the treatment was clearly on the side of preventing the progression of cervical cancer while she is pregnant, however due to ethical reasons, the management deviates on the right of the patient to decide for her own health and her unborn child. The collaborative collection of data relating to treatment and outcome is strongly encouraged.

Keywords: cancer, cervical, ethical, pregnancy

Procedia PDF Downloads 215
68 Comparative Analysis of Data Gathering Protocols with Multiple Mobile Elements for Wireless Sensor Network

Authors: Bhat Geetalaxmi Jairam, D. V. Ashoka

Abstract:

Wireless Sensor Networks are used in many applications to collect sensed data from different sources. Sensed data has to be delivered through sensors wireless interface using multi-hop communication towards the sink. The data collection in wireless sensor networks consumes energy. Energy consumption is the major constraints in WSN .Reducing the energy consumption while increasing the amount of generated data is a great challenge. In this paper, we have implemented two data gathering protocols with multiple mobile sinks/elements to collect data from sensor nodes. First, is Energy-Efficient Data Gathering with Tour Length-Constrained Mobile Elements in Wireless Sensor Networks (EEDG), in which mobile sinks uses vehicle routing protocol to collect data. Second is An Intelligent Agent-based Routing Structure for Mobile Sinks in WSNs (IAR), in which mobile sinks uses prim’s algorithm to collect data. Authors have implemented concepts which are common to both protocols like deployment of mobile sinks, generating visiting schedule, collecting data from the cluster member. Authors have compared the performance of both protocols by taking statistics based on performance parameters like Delay, Packet Drop, Packet Delivery Ratio, Energy Available, Control Overhead. Authors have concluded this paper by proving EEDG is more efficient than IAR protocol but with few limitations which include unaddressed issues likes Redundancy removal, Idle listening, Mobile Sink’s pause/wait state at the node. In future work, we plan to concentrate more on these limitations to avail a new energy efficient protocol which will help in improving the life time of the WSN.

Keywords: aggregation, consumption, data gathering, efficiency

Procedia PDF Downloads 471
67 Head and Neck Extranodal Rosai-Dorfman Disease- Utility of immunohistochemistry

Authors: Beverly Wang

Abstract:

Background: Rosai-Dorfman disease (RDD), aka sinus histiocytosis with massive lymphadenopathy, is a rare, idiopathic histiocytic proliferative disorder. Although RDD can be seen involving the head and neck lymph nodes, rarely it can affect other extranodal sites. It present 3 unique cases of RDD affecting the nasal cavity, paranasal sinuses, and ear canal. The initial clinical presentation on two cases mimicked a malignant neoplasm. The 3rd case of RDD co-existed with a cholesteatoma of the ear canal. The clinical presentation, histology and immunohistochemical stains, and radiographic findings are discussed. Design: An overview of 3 cases of RDD affected sinonasal cavity and ear canal from UCI Medical Center was conducted. Case 1: A 61 year old male complaining of breathing difficulty presented with bilateral polypoid sinonasal masses and severe nasal obstruction. The masses elevated the nasal floor, and involved the anterior nasal septum to lateral wall. It was endoscopically excised. At intraoperative consultation, frozen section reported a pleomorphic spindle cell neoplasm with scattered large atypical spindle cells, resembling a high grade sarcoma. Case 2: A 46 year old male presented with recurrent bilateral maxillary chronic sinusitis with mass formation, clinically suspicious for malignant lymphoma. Excisional tissue sample showed large irregular spindled histiocytes with abundant granular and vacuolated cytoplasm. Case 3: A 36 year old female with a history of asthma initially presented with left-sided chronic otalgia, occasional nausea, vertigo, and fluctuating pain exacerbated by head movement and temperature changes. CT scan revealed an external auditory canal mass extending to the middle ear, coexisting with a small cholesteatoma. Results: The morphology of all cases revealed large atypical spindled histiocytes resembling fibrohistiocytic or myofibroblastic proliferative neoplasms. Scattered emperipolesis was seen. All 3 cases were confirmed as extranodal sinus RDD, confirmed by immunohistochemistry. The large atypical cells were positive for S100, CD68, and CD163. No evidence for malignancy was identified. Case 3 showed concurrent RDD co-existing with a cholesteatoma. Conclusion: Due to its rarity and variable clinical presentations, the diagnosis of RDD is seldom clinically considered. Extranodal sinus RDD morphologically can be pitfall as mimicker of spindly neoplasm, especially at intraoperative consultation. It can create diagnostic and therapeutic challenges. Correlation of radiological findings with histologic features will help to reach the diagnosis.

Keywords: head and neck, extranodal, rosai-dorfman disease, mimicker, immunohistochemistry

Procedia PDF Downloads 38
66 Innovation of a New Plant Tissue Culture Medium for Large Scale Plantlet Production in Potato (Solanum tuberosum L.)

Authors: Ekramul Hoque, Zinat Ara Eakut Zarin, Ershad Ali

Abstract:

The growth and development of explants is governed by the effect of nutrient medium. Ammonium nitrate (NH4NO3) as a major salt of stock solution-1 for the preparation of tissue culture medium. But, it has several demerits on human civilization. It is use for the preparation of bomb and other destructive activities. Hence, it is totally ban in our country. A new chemical was identified as a substitute of ammonium nitrate. The concentrations of the other ingredients of major and minor salt were modified from the MS medium. The formulation of new medium is totally different from the MS nutrient composition. The most widely use MS medium composition was used as first check treatment and MS powder (Duchefa Biocheme, The Netherland) was used as second check treatment. The experiments were carried out at the Department of Biotechnology, Sher-e-Bangla Agricultural University, Dhaka, Bangladesh. Two potato varieties viz. Diamant and Asterix were used as experimental materials. The regeneration potentiality of potato onto new medium was best as compare with the two check treatments. The traits -node number, leaf number, shoot length, root lengths were highest in new medium. The plantlets were healthy, robust and strong as compare to plantlets regenerated from check treatments. Three subsequent sub-cultures were made in the new medium to observe the growth pattern of plantlet. It was also showed the best performance in all the parameter under studied. The regenerated plantlet produced good quality minituber under field condition. Hence, it is concluded that, a new plant tissue culture medium as discovered from the Department of Biotechnology, Sher-e-Bangla Agricultural University, Dhaka, Bangladesh under the leadership of Professor Dr. Md. Ekramul Hoque.

Keywords: new medium, potato, regeneration, ammonium nitrate

Procedia PDF Downloads 60
65 An Australian Tertiary Centre Experience of Complex Endovascular Aortic Repairs

Authors: Hansraj Bookun, Rachel Xuan, Angela Tan, Kejia Wang, Animesh Singla, David Kim, Christopher Loupos, Jim Iliopoulos

Abstract:

Introduction: Complex endovascular aortic aneursymal repairs with fenestrated and branched endografts require customised devices to exclude the pathology while reducing morbidity and mortality, which was historically associated with open repair of complex aneurysms. Such endovascular procedures have predominantly been performed in a large volume dedicated tertiary centres. We present here our nine year multidisciplinary experience with this technology in an Australian tertiary centre. Method: This was a cross-sectional, single-centre observational study of 670 patients who had undergone complex endovascular aortic aneurysmal repairs with conventional endografts, fenestrated endografts, and iliac-branched devices from January 2010 to July 2019. Descriptive statistics were used to characterise our sample with regards to demographic and perioperative variables. Homogeneity of the sample was tested using multivariant regression, which did not identify any statistically significant confounding variables. Results: 670 patients of mean age 74, were included (592 males) and the comorbid burden was as follows: ischemic heart disease (55%), diabetes (18%), hypertension (90%), stage four or greater kidney impairment (8%) and current or ex-smoking (78%). The main indications for surgery were elective aneurysms (86%), symptomatic aneurysms (5%), and rupture aneurysms (5%). 106 patients (16%) underwent fenestrated or branched endograft repairs. The mean length of stay was 7.6 days. 2 patients experienced reactionary bleeds, 11 patients had access wound complications (6 lymph fistulae, 5 haematoms), 11 patients had cardiac complications (5 arrhythmias, 3 acute myocadial infarctions, 3 exacerbation of congestive cardiac failure), 10 patients had respiratory complications, 8 patients had renal impairment, 4 patients had gastrointestinal complications, 2 patients suffered from paraplegia, 1 major stroke, 1 minor stroke, and 1 acute brain syndrome. There were 4 vascular occlusions requiring further arterial surgery, 4 type I endoleaks, 4 type II endoleaks, 3 episodes of thromboembolism, and 2 patients who required further arterial operations in the setting of patient vessels. There were 9 unplanned returns to the theatre. Discussion: Our numbers of 10 years suggest that we are not a dedicated high volume centre focusing on aortic repairs. However, we have achieved significantly low complication rates. This can be attributed to our multidisciplinary approach with the intraoperative involvement of skilled interventional radiologists and vascular surgeons as well as postoperative protocols with particular attention to spinal cord protection. Additionally, we have a ratified perioperative pathway that involves multidisciplinary team discussions of patient-related factors and lesion-centered characteristics, which allows for holistic, patient-centered care.

Keywords: aneurysm, aortic, endovascular, fenestrated

Procedia PDF Downloads 93
64 Sensor and Actuator Fault Detection in Connected Vehicles under a Packet Dropping Network

Authors: Z. Abdollahi Biron, P. Pisu

Abstract:

Connected vehicles are one of the promising technologies for future Intelligent Transportation Systems (ITS). A connected vehicle system is essentially a set of vehicles communicating through a network to exchange their information with each other and the infrastructure. Although this interconnection of the vehicles can be potentially beneficial in creating an efficient, sustainable, and green transportation system, a set of safety and reliability challenges come out with this technology. The first challenge arises from the information loss due to unreliable communication network which affects the control/management system of the individual vehicles and the overall system. Such scenario may lead to degraded or even unsafe operation which could be potentially catastrophic. Secondly, faulty sensors and actuators can affect the individual vehicle’s safe operation and in turn will create a potentially unsafe node in the vehicular network. Further, sending that faulty sensor information to other vehicles and failure in actuators may significantly affect the safe operation of the overall vehicular network. Therefore, it is of utmost importance to take these issues into consideration while designing the control/management algorithms of the individual vehicles as a part of connected vehicle system. In this paper, we consider a connected vehicle system under Co-operative Adaptive Cruise Control (CACC) and propose a fault diagnosis scheme that deals with these aforementioned challenges. Specifically, the conventional CACC algorithm is modified by adding a Kalman filter-based estimation algorithm to suppress the effect of lost information under unreliable network. Further, a sliding mode observer-based algorithm is used to improve the sensor reliability under faults. The effectiveness of the overall diagnostic scheme is verified via simulation studies.

Keywords: fault diagnostics, communication network, connected vehicles, packet drop out, platoon

Procedia PDF Downloads 215
63 Sensitivity Analysis of the Thermal Properties in Early Age Modeling of Mass Concrete

Authors: Farzad Danaei, Yilmaz Akkaya

Abstract:

In many civil engineering applications, especially in the construction of large concrete structures, the early age behavior of concrete has shown to be a crucial problem. The uneven rise in temperature within the concrete in these constructions is the fundamental issue for quality control. Therefore, developing accurate and fast temperature prediction models is essential. The thermal properties of concrete fluctuate over time as it hardens, but taking into account all of these fluctuations makes numerical models more complex. Experimental measurement of the thermal properties at the laboratory conditions also can not accurately predict the variance of these properties at site conditions. Therefore, specific heat capacity and the heat conductivity coefficient are two variables that are considered constant values in many of the models previously recommended. The proposed equations demonstrate that these two quantities are linearly decreasing as cement hydrates, and their value are related to the degree of hydration. The effects of changing the thermal conductivity and specific heat capacity values on the maximum temperature and the time it takes for concrete to reach that temperature are examined in this study using numerical sensibility analysis, and the results are compared to models that take a fixed value for these two thermal properties. The current study is conducted in 7 different mix designs of concrete with varying amounts of supplementary cementitious materials (fly ash and ground granulated blast furnace slag). It is concluded that the maximum temperature will not change as a result of the constant conductivity coefficient, but variable specific heat capacity must be taken into account, also about duration when a concrete's central node reaches its max value again variable specific heat capacity can have a considerable effect on the final result. Also, the usage of GGBFS has more influence compared to fly ash.

Keywords: early-age concrete, mass concrete, specific heat capacity, thermal conductivity coefficient

Procedia PDF Downloads 51
62 Vision and Challenges of Developing VR-Based Digital Anatomy Learning Platforms and a Solution Set for 3D Model Marking

Authors: Gizem Kayar, Ramazan Bakir, M. Ilkay Koşar, Ceren U. Gencer, Alperen Ayyildiz

Abstract:

Anatomy classes are crucial for general education of medical students, whereas learning anatomy is quite challenging and requires memorization of thousands of structures. In traditional teaching methods, learning materials are still based on books, anatomy mannequins, or videos. This results in forgetting many important structures after several years. However, more interactive teaching methods like virtual reality, augmented reality, gamification, and motion sensors are becoming more popular since such methods ease the way we learn and keep the data in mind for longer terms. During our study, we designed a virtual reality based digital head anatomy platform to investigate whether a fully interactive anatomy platform is effective to learn anatomy and to understand the level of teaching and learning optimization. The Head is one of the most complicated human anatomy structures, with thousands of tiny, unique structures. This makes the head anatomy one of the most difficult parts to understand during class sessions. Therefore, we developed a fully interactive digital tool with 3D model marking, quiz structures, 2D/3D puzzle structures, and VR support so as to integrate the power of VR and gamification. The project has been developed in Unity game engine with HTC Vive Cosmos VR headset. The head anatomy 3D model has been selected with full skeletal, muscular, integumentary, head, teeth, lymph, and vein system. The biggest issue during the development was the complexity of our model and the marking of it in the 3D world system. 3D model marking requires to access to each unique structure in the counted subsystems which means hundreds of marking needs to be done. Some parts of our 3D head model were monolithic. This is why we worked on dividing such parts to subparts which is very time-consuming. In order to subdivide monolithic parts, one must use an external modeling tool. However, such tools generally come with high learning curves, and seamless division is not ensured. Second option was to integrate tiny colliders to all unique items for mouse interaction. However, outside colliders which cover inner trigger colliders cause overlapping, and these colliders repel each other. Third option is using raycasting. However, due to its own view-based nature, raycasting has some inherent problems. As the model rotate, view direction changes very frequently, and directional computations become even harder. This is why, finally, we studied on the local coordinate system. By taking the pivot point of the model into consideration (back of the nose), each sub-structure is marked with its own local coordinate with respect to the pivot. After converting the mouse position to the world position and checking its relation with the corresponding structure’s local coordinate, we were able to mark all points correctly. The advantage of this method is its applicability and accuracy for all types of monolithic anatomical structures.

Keywords: anatomy, e-learning, virtual reality, 3D model marking

Procedia PDF Downloads 68
61 Analysis of Underground Logistics Transportation Technology and Planning Research: Based on Xiong'an New Area, China

Authors: Xia Luo, Cheng Zeng

Abstract:

Under the promotion of the Central Committee of the Communist Party of China and the State Council in 2017, Xiong'an New Area is the third crucial new area in China established after Shenzhen and Shanghai. Its constructions' significance lies in mitigating Beijing's non-capital functions and exploring a new mode of optimizing development in densely populated and economically intensive areas. For this purpose, developing underground logistics can assume the role of goods distribution in the capital, relieve the road transport pressure in Beijing-Tianjin-Hebei Urban Agglomeration, adjust and optimize the urban layout and spatial structure of it. Firstly, the construction planning of Xiong'an New Area and underground logistics development are summarized, especially the development status abroad, the development trend, and bottlenecks of underground logistics in China. This paper explores the technicality, feasibility, and necessity of four modes of transportation. There are pneumatic capsule pipeline (PCP) technology, the CargoCap technology, cable hauled mule, and automatic guided vehicle (AGV). The above technical parameters and characteristics are introduced to relevant experts or scholars. Through establishing an indicator system, carrying out a questionnaire survey with the Delphi method, the final suggestion is obtained: China should develop logistics vehicles similar to CargoCap, adopting rail mode and driverless mode. Based on China's temporal and spatial logistics demand and the geographical pattern of Xiong'an New Area, the construction scale, technical parameters, node location, and other vital parameters of underground logistics are planned. In this way, we hope to speed up the new area's construction and the logistics industry's innovation.

Keywords: the Xiong'an new area, underground logistics, contrastive analysis, CargoCap, logistics planning

Procedia PDF Downloads 108
60 Wearable Heart Rate Sensor Based on Wireless System for Heart Health Monitoring

Authors: Murtadha Kareem, Oliver Faust

Abstract:

Wearable biosensor systems can be designed and developed for health monitoring. There is much interest in both scientific and industrial communities established since 2007. Fundamentally, the cost of healthcare has increased dramatically and the world population is aging. That creates the need to harvest technological improvements with small bio-sensing devices, wireless-communication, microelectronics and smart textiles, that leads to non-stop developments of wearable sensor based systems. There has been a significant demand to monitor patient's health status while the patient leaves the hospital in his/her personal environment. To address this need, there are numerous system prototypes which has been launched in the medical market recently, the aim of that is to provide real time information feedback about patient's health status, either to the patient himself/herself or direct to the supervising medical centre station, while being capable to give a notification for the patient in case of possible imminent health threatening conditions. Furthermore, wearable health monitoring systems comprise new techniques to address the problem of managing and monitoring chronic heart diseases for elderly people. Wearable sensor systems for health monitoring include various types of miniature sensors, either wearable or implantable. To be specific, our proposed system able to measure essential physiological parameter, such as heart rate signal which could be transmitted through Bluetooth to the cloud server in order to store, process, analysis and visualise the data acquisition. The acquired measurements are connected through internet of things to a central node, for instance an android smart phone or tablet used for visualising the collected information on application or transmit it to a medical centre.

Keywords: Wearable sensor, Heart rate, Internet of things, Chronic heart disease

Procedia PDF Downloads 140
59 Structural Protein-Protein Interactions Network of Breast Cancer Lung and Brain Metastasis Corroborates Conformational Changes of Proteins Lead to Different Signaling

Authors: Farideh Halakou, Emel Sen, Attila Gursoy, Ozlem Keskin

Abstract:

Protein–Protein Interactions (PPIs) mediate major biological processes in living cells. The study of PPIs as networks and analyze the network properties contribute to the identification of genes and proteins associated with diseases. In this study, we have created the sub-networks of brain and lung metastasis from primary tumor in breast cancer. To do so, we used seed genes known to cause metastasis, and produced their interactions through a network-topology based prioritization method named GUILDify. In order to have the experimental support for the sub-networks, we further curated them using STRING database. We proceeded by modeling structures for the interactions lacking complex forms in Protein Data Bank (PDB). The functional enrichment analysis shows that KEGG pathways associated with the immune system and infectious diseases, particularly the chemokine signaling pathway, are important for lung metastasis. On the other hand, pathways related to genetic information processing are more involved in brain metastasis. The structural analyses of the sub-networks vividly demonstrated their difference in terms of using specific interfaces in lung and brain metastasis. Furthermore, the topological analysis identified genes such as RPL5, MMP2, CCR5 and DPP4, which are already known to be associated with lung or brain metastasis. Additionally, we found 6 and 9 putative genes that are specific for lung and brain metastasis, respectively. Our analysis suggests that variations in genes and pathways contributing to these different breast metastasis types may arise due to change in tissue microenvironment. To show the benefits of using structural PPI networks instead of traditional node and edge presentation, we inspect two case studies showing the mutual exclusiveness of interactions and effects of mutations on protein conformation which lead to different signaling.

Keywords: breast cancer, metastasis, PPI networks, protein conformational changes

Procedia PDF Downloads 214