Search results for: privacy preserving mechanisms
2854 Carvedilol Ameliorates Potassium Dichromate-Induced Acute Renal Injury in Rats: Plausible Role of Inflammation and Apoptosis
Authors: Bidya Dhar Sahu, Meghana Koneru, R. Shyam Sunder, Ramakrishna Sistla
Abstract:
Environmental and occupational exposure to hexavalent chromium [Cr(VI)] via textile manufacture, metallurgy, spray paints, stainless steel industries, drinking water containing chromium are often known to cause acute renal injury in humans and animals. Nephrotoxicity is the major effect of chromium poisoning. In the present study, we investigated the potential renoprotective effect and underlying mechanisms of carvedilol using rat model of potassium dichromate (K2Cr2O7)-induced nephrotoxicity. Exploration of the underlying mechanisms of carvedilol revealed that carvedilol attenuated nuclear translocation and DNA binding activity of NF-κB (p65), restored antioxidant and mitochondrial respiratory enzyme activities and attenuated apoptosis related protein expressions in kidney tissues. The serum levels of TNF-α, the renal iNOS and myeloperoxidase activity were significantly decreased in carvedilol pre-treated K2Cr2O7-induced nephrotoxic rats. These results were further supported and confirmed by histological findings. In conclusion, the findings of the present study demonstrated that carvedilol is an effective chemoprotectant against K2Cr2O7-induced nephrotoxicity in rats.Keywords: apoptosis, carvedilol, inflammation, potassium dichromate-induced nephrotoxicity, applied pharmacology
Procedia PDF Downloads 2842853 Critical Realism as a Bridge between Critical Pedagogy and Queer Theory
Authors: Mike Seal
Abstract:
This paper explores the traditions of critical and queer pedagogy, its intersections, tensions and paradoxes. Critical pedagogy, with a materialist realist ontology, and queer theory, which is often post-modern, post-structural and anti-essential, may not seem compatible. Similarly, there are tensions between activist orientations, often enacted through essential sexual identities, and a queer approach that questions such identities and subjectivities. It will argue that critical realism gives us a bridge between critical and queer pedagogy in preserving a realist materialist ontology, where economic forces are real, and independent of consciousness and hermeneutic constructions of them. At the same time, it offers an epistemology that does not necessitate a binary view of the roles of the oppressed, liberator, or even oppressor. It accepts that our knowledge is contingent, partial and contestable, but has the potential, and enough validity, to demand action and potentially inform the actions of others.Keywords: critical pedagogy, queer pedagogy, critical realsim, heteronormativity
Procedia PDF Downloads 1912852 A Review on Various Approaches for Energy Conservation in Green Cloud Computing
Authors: Sumati Manchanda
Abstract:
Cloud computing is one of the most recent developing engineering and is consistently utilized as a part of different IT firms so as to make benefits like expense sparing or financial minimization, it must be eco cordial also. In this manner, Green Cloud Computing is the need of the today's current situation. It is an innovation that is rising as data correspondence engineering. This paper surveys the unequivocal endeavors made by different specialists to make Cloud Computing more vitality preserving, to break down its vitality utilization focused around sorts of administrations gave furthermore to diminish the carbon foot shaped impression rate by colossal methodologies furthermore edify virtualization idea alongside different diverse methodologies which utilize virtual machines scheduling and migration. The summary of the proposed work by various authors that we have reviewed is also presented in the paper.Keywords: cloud computing, green cloud computing, scheduling, migration, virtualization, energy efficiency
Procedia PDF Downloads 3932851 Sustainability Index for REDD-Plus Implementation in Central Kalimantan, Indonesia
Authors: Febrina Natalia, Noriyuki Tanaka, Mitsuru Osaki
Abstract:
Sustainability Index for REDD-plus implementation was constructed to evaluate the sustainability of different communities in 5 villages (Taruna Jaya, Tumbang Nusa, Marang, Terantang, and Seragam Jaya) in Central Kalimantan, Indonesia based on the main objectives of REDD-plus project (reducing emission from deforestation and forest degradation, increasing carbon stock, preserving biodiversity and sustaining forest management). This index was separately composed of 3 different components; (1) ecology, (2) economy, and (3) society. The index of sustainability was determined into four categories; 3,3-4,0 (excellent), 2,5-3,2 (good), 1,8-2,4 (fair), and 1,0-1,7 (poor). Overall, this technique aims to assist all stakeholders and local government in particular in providing information of villages’ sustainability index before implementing REDD-plus project that the assistance and benefits given to villages will be beneficial, effective and efficient.Keywords: central kalimantan, Indonesia, REDD-plus, sustainability index
Procedia PDF Downloads 4402850 Phase Synchronization of Skin Blood Flow Oscillations under Deep Controlled Breathing in Human
Authors: Arina V. Tankanag, Gennady V. Krasnikov, Nikolai K. Chemeris
Abstract:
The development of respiration-dependent oscillations in the peripheral blood flow may occur by at least two mechanisms. The first mechanism is related to the change of venous pressure due to mechanical activity of lungs. This phenomenon is known as ‘respiratory pump’ and is one of the mechanisms of venous return of blood from the peripheral vessels to the heart. The second mechanism is related to the vasomotor reflexes controlled by the respiratory modulation of the activity of centers of the vegetative nervous system. Early high phase synchronization of respiration-dependent blood flow oscillations of left and right forearm skin in healthy volunteers at rest was shown. The aim of the work was to study the effect of deep controlled breathing on the phase synchronization of skin blood flow oscillations. 29 normotensive non-smoking young women (18-25 years old) of the normal constitution without diagnosed pathologies of skin, cardiovascular and respiratory systems participated in the study. For each of the participants six recording sessions were carried out: first, at the spontaneous breathing rate; and the next five, in the regimes of controlled breathing with fixed breathing depth and different rates of enforced breathing regime. The following rates of controlled breathing regime were used: 0.25, 0.16, 0.10, 0.07 and 0.05 Hz. The breathing depth amounted to 40% of the maximal chest excursion. Blood perfusion was registered by laser flowmeter LAKK-02 (LAZMA, Russia) with two identical channels (wavelength 0.63 µm; emission power, 0.5 mW). The first probe was fastened to the palmar surface of the distal phalanx of left forefinger; the second probe was attached to the external surface of the left forearm near the wrist joint. These skin zones were chosen as zones with different dominant mechanisms of vascular tonus regulation. The degree of phase synchronization of the registered signals was estimated from the value of the wavelet phase coherence. The duration of all recording was 5 min. The sampling frequency of the signals was 16 Hz. The increasing of synchronization of the respiratory-dependent skin blood flow oscillations for all controlled breathing regimes was obtained. Since the formation of respiration-dependent oscillations in the peripheral blood flow is mainly caused by the respiratory modulation of system blood pressure, the observed effects are most likely dependent on the breathing depth. It should be noted that with spontaneous breathing depth does not exceed 15% of the maximal chest excursion, while in the present study the breathing depth was 40%. Therefore it has been suggested that the observed significant increase of the phase synchronization of blood flow oscillations in our conditions is primarily due to an increase of breathing depth. This is due to the enhancement of both potential mechanisms of respiratory oscillation generation: venous pressure and sympathetic modulation of vascular tone.Keywords: deep controlled breathing, peripheral blood flow oscillations, phase synchronization, wavelet phase coherence
Procedia PDF Downloads 2132849 Evaluating Radiative Feedback Mechanisms in Coastal West Africa Using Regional Climate Models
Authors: Akinnubi Rufus Temidayo
Abstract:
Coastal West Africa is highly sensitive to climate variability, driven by complex ocean-atmosphere interactions that shape temperature, precipitation, and extreme weather. Radiative feedback mechanisms—such as water vapor feedback, cloud-radiation interactions, and surface albedo—play a critical role in modulating these patterns. Yet, limited research addresses these feedbacks in climate models specific to West Africa’s coastal zones, creating challenges for accurate climate projections and adaptive planning. This study aims to evaluate the influence of radiative feedbacks on the coastal climate of West Africa by quantifying the effects of water vapor, cloud cover, and sea surface temperature (SST) on the region’s radiative balance. The study uses a regional climate model (RCM) to simulate feedbacks over a 20-year period (2005-2025) with high-resolution data from CORDEX and satellite observations. Key mechanisms investigated include (1) Water Vapor Feedback—the amplifying effect of humidity on warming, (2) Cloud-Radiation Interactions—the impact of cloud cover on radiation balance, especially during the West African Monsoon, and (3) Surface Albedo and Land-Use Changes—effects of urbanization and vegetation on the radiation budget. Preliminary results indicate that radiative feedbacks strongly influence seasonal climate variability in coastal West Africa. Water vapor feedback amplifies dry-season warming, cloud-radiation interactions moderate surface temperatures during monsoon seasons, and SST variations in the Atlantic affect the frequency and intensity of extreme rainfall events. The findings suggest that incorporating these feedbacks into climate planning can strengthen resilience to climate impacts in West African coastal communities. Further research should refine regional models to capture anthropogenic influences like greenhouse gas emissions, guiding sustainable urban and resource planning to mitigate climate risks.Keywords: west africa, radiative, climate, resilence, anthropogenic
Procedia PDF Downloads 82848 Sharing Personal Information for Connection: The Effect of Social Exclusion on Consumer Self-Disclosure to Brands
Authors: Jiyoung Lee, Andrew D. Gershoff, Jerry Jisang Han
Abstract:
Most extant research on consumer privacy concerns and their willingness to share personal data has focused on contextual factors (e.g., types of information collected, type of compensation) that lead to consumers’ personal information disclosure. Unfortunately, the literature lacks a clear understanding of how consumers’ incidental psychological needs may influence consumers’ decisions to share their personal information with companies or brands. In this research, we investigate how social exclusion, which is an increasing societal problem, especially since the onset of the COVID-19 pandemic, leads to increased information disclosure intentions for consumers. Specifically, we propose and find that when consumers become socially excluded, their desire for social connection increases, and this desire leads to a greater willingness to disclose their personal information with firms. The motivation to form and maintain interpersonal relationships is one of the most fundamental human needs, and many researchers have found that deprivation of belongingness has negative consequences. Given the negative effects of social exclusion and the universal need to affiliate with others, people respond to exclusion with a motivation for social reconnection, resulting in various cognitive and behavioral consequences, such as paying greater attention to social cues and conforming to others. Here, we propose personal information disclosure as another form of behavior that can satisfy such social connection needs. As self-disclosure can serve as a strategic tool in creating and developing social relationships, those who have been socially excluded and thus have greater social connection desires may be more willing to engage in self-disclosure behavior to satisfy such needs. We conducted four experiments to test how feelings of social exclusion can influence the extent to which consumers share their personal information with brands. Various manipulations and measures were used to demonstrate the robustness of our effects. Through the four studies, we confirmed that (1) consumers who have been socially excluded show greater willingness to share their personal information with brands and that (2) such an effect is driven by the excluded individuals’ desire for social connection. Our findings shed light on how the desire for social connection arising from exclusion influences consumers’ decisions to disclose their personal information to brands. We contribute to the consumer disclosure literature by uncovering a psychological need that influences consumers’ disclosure behavior. We also extend the social exclusion literature by demonstrating that exclusion influences not only consumers’ choice of products but also their decision to disclose personal information to brands.Keywords: consumer-brand relationship, consumer information disclosure, consumer privacy, social exclusion
Procedia PDF Downloads 1232847 Security Issues in Long Term Evolution-Based Vehicle-To-Everything Communication Networks
Authors: Mujahid Muhammad, Paul Kearney, Adel Aneiba
Abstract:
The ability for vehicles to communicate with other vehicles (V2V), the physical (V2I) and network (V2N) infrastructures, pedestrians (V2P), etc. – collectively known as V2X (Vehicle to Everything) – will enable a broad and growing set of applications and services within the intelligent transport domain for improving road safety, alleviate traffic congestion and support autonomous driving. The telecommunication research and industry communities and standardization bodies (notably 3GPP) has finally approved in Release 14, cellular communications connectivity to support V2X communication (known as LTE – V2X). LTE – V2X system will combine simultaneous connectivity across existing LTE network infrastructures via LTE-Uu interface and direct device-to-device (D2D) communications. In order for V2X services to function effectively, a robust security mechanism is needed to ensure legal and safe interaction among authenticated V2X entities in the LTE-based V2X architecture. The characteristics of vehicular networks, and the nature of most V2X applications, which involve human safety makes it significant to protect V2X messages from attacks that can result in catastrophically wrong decisions/actions include ones affecting road safety. Attack vectors include impersonation attacks, modification, masquerading, replay, MiM attacks, and Sybil attacks. In this paper, we focus our attention on LTE-based V2X security and access control mechanisms. The current LTE-A security framework provides its own access authentication scheme, the AKA protocol for mutual authentication and other essential cryptographic operations between UEs and the network. V2N systems can leverage this protocol to achieve mutual authentication between vehicles and the mobile core network. However, this protocol experiences technical challenges, such as high signaling overhead, lack of synchronization, handover delay and potential control plane signaling overloads, as well as privacy preservation issues, which cannot satisfy the adequate security requirements for majority of LTE-based V2X services. This paper examines these challenges and points to possible ways by which they can be addressed. One possible solution, is the implementation of the distributed peer-to-peer LTE security mechanism based on the Bitcoin/Namecoin framework, to allow for security operations with minimal overhead cost, which is desirable for V2X services. The proposed architecture can ensure fast, secure and robust V2X services under LTE network while meeting V2X security requirements.Keywords: authentication, long term evolution, security, vehicle-to-everything
Procedia PDF Downloads 1672846 Understanding the Mechanisms of Salmonella Typhimurium Resistance to Cannabidiol (CDB)
Authors: Iddrisu Ibrahim, Joseph Atia Ayariga, Junhuan Xu, Daniel A. Abugri, Robertson K. Boakai, Olufemi S. Ajayi
Abstract:
The recalcitrance of pathogenic bacteria indicates that millions of people who are at risk of infection arising from chronic diseases, surgery, organ transplant, diabetes, and several other debilitating diseases present an aura of potentially untreatable illness due to resistance development. Antimicrobial resistance has successfully become a global health menace, and resistances are often acquired by bacteria through health-care-related incidence (HRI) orchestrated by multi-drug resistant (MDR) and extended drug-resistant pathogens (EDRP). To understand the mechanisms S. Typhimurium uses to resist CDB, we study the abundance of LPS modification, Ergosterols, Mysristic palmitic resistance, Oleic acid resistance of susceptible and resistant S. Typhimurium. Using qPCR, we also analyzed the expression of selected genes known for enabling resistance in S. Typhimurium. We found high abundance of LPS, Ergosterols, Mysristic palmitic resistance, Oleic acid resistance of and high expression of resistant genes in S. Typhimurium compared to the susceptible strain. LPS modification, Ergosterols, Mysristic palmitic resistance, Oleic acid and genes such as Fims, integrons, blaTEM are important indicators of resistance development of S. typhimurium.Keywords: antimicrobials, resistance, Cannabidiol, Salmonella, blaTEM, fimA, Lipopolysaccharide, Ergosterols
Procedia PDF Downloads 852845 Characterization of Shrinkage-Induced Cracking of Clay Soils
Authors: Ahmad El Hajjar, Joanna Eid, Salima Bouchemella, Tariq Ouahbi, Benoit Duchemin, Said Taibi
Abstract:
In our present society, raw earth presents an alternative as an energy-saving building material for dealing with climate and environmental issues. Nevertheless, it has a sensitivity to water, due to the presence of fines, which has a direct effect on its consistency. This can be expressed during desiccation, by shrinkage deformations resulting in cracking that begins once the internal tensile stresses developed, due to suction, exceed the tensile strength of the material. This work deals with the evolution of the strain of clay samples, from the beginning of shrinkage until the initiation of crack, using the DIC (Digital Image Correlation) technique. In order to understand the origin of cracking, desiccation is studied for different boundary conditions and depending on the intrinsic characteristics of the material. On the other hand, a study of restrained shrinkage is carried out on the ring test to investigate the ultimate tensile strength from which the crack begins in the dough of clay. The purpose of this test is to find the type of reinforcement adapted to thwart in the cracking of the material. A microscopic analysis of the damaged area is necessary to link the macroscopic mechanisms of cracking to the various physicochemical phenomena at the microscopic scale in order to understand the different microstructural mechanisms and their impact on the macroscopic shrinkage.Keywords: clayey soil, shrinkage, strain, cracking, digital image correlation
Procedia PDF Downloads 1612844 RFID and Intelligence: A Smart Authentication Method for Blind People
Authors: V. Vishu, R. Manimegalai
Abstract:
A combination of Intelligence and Radio frequency identification to bring an enhanced authentication method for the improvement of visually challenged people. The main goal is to provide an improved authentication by combining Advanced Encryption Standard algorithm and Intelligence. Here the encryption key will be generated as a combination of intelligent information from sensors and tag values. The main challenges are security, privacy and cost. Besides, the method was created to evaluate the amount of interaction between sensors and significant influence on the level of visually challenged people’s mental and physical states. The proposal is to apply various ideas on independent living or to assist them for a good life.Keywords: AES, encryption, intelligence, smart key
Procedia PDF Downloads 2412843 Fouling of Regenerated Ultrafiltration Membrane in Treatment of Oily Wastewater of Palm Oil Refinery
Authors: K. F. Md Yunos, N. S. Pajar, N. S. Azmi
Abstract:
Oily wastewater in Malaysian refinery has become a big issue of water and environment pollution to be solved urgently. The results of an experimental study on separation of oily wastewaters are presented. The characteristic of filtration behavior of commercial polymer ultrafiltration (UF) membranes was evaluated in the treatment of oily wastewater from palm oil refinery. The performance of different molecular weight cut off 5kDa and 10kDa regenerated cellulose membrane were evaluated and compared and the fouling behavior were analyzed by scanning electron microscopy (SEM). The effect of pressure (0.5, 1.0, 1.5, 2.0, 2.5 bar) and sample concentration (100%, 75%, 50%, 25%) on fouling of 5kDa and 10kDa membrane were evaluated. The characteristic of the sample solutions were analyzed for turbidity, total dissolved solid (TDS), total suspended solid (TSS), BOD, and COD. The results showed that the best fit to experimental data corresponds to the cake layer formation followed by the intermediate blocking for the experimental conditions tested. A more detailed analysis of the fouling mechanisms was studied by dividing the filtration curves into different regions corresponding to the different fouling mechanisms. Intermediate blocking and cake layer formation or combinations of them were found to occur during the UF experiments depending on the operating conditions.Keywords: fouling, oily wastewater, regenerated cellulose, ultrafiltration
Procedia PDF Downloads 4192842 Extending BDI Multiagent Systems with Agent Norms
Authors: Francisco José Plácido da Cunha, Tassio Ferenzini Martins Sirqueira, Marx Leles Viana, Carlos José Pereira de Lucena
Abstract:
Open Multiagent Systems (MASs) are societies in which heterogeneous and independently designed entities (agents) work towards similar, or different ends. Software agents are autonomous and the diversity of interests among different members living in the same society is a fact. In order to deal with this autonomy, these open systems use mechanisms of social control (norms) to ensure a desirable social order. This paper considers the following types of norms: (i) obligation — agents must accomplish a specific outcome; (ii) permission — agents may act in a particular way, and (iii) prohibition — agents must not act in a specific way. All of these characteristics mean to encourage the fulfillment of norms through rewards and to discourage norm violation by pointing out the punishments. Once the software agent decides that its priority is the satisfaction of its own desires and goals, each agent must evaluate the effects associated to the fulfillment of one or more norms before choosing which one should be fulfilled. The same applies when agents decide to violate a norm. This paper also introduces a framework for the development of MASs that provide support mechanisms to the agent’s decision-making, using norm-based reasoning. The applicability and validation of this approach is demonstrated applying a traffic intersection scenario.Keywords: BDI agent, BDI4JADE framework, multiagent systems, normative agents
Procedia PDF Downloads 2312841 Syntactic Analyzer for Tamil Language
Authors: Franklin Thambi Jose.S
Abstract:
Computational Linguistics is a branch of linguistics, which deals with the computer and linguistic levels. It is also said, as a branch of language studies which applies computer techniques to linguistics field. In Computational Linguistics, Natural Language Processing plays an important role. This came to exist because of the invention of Information Technology. In computational syntax, the syntactic analyser breaks a sentence into phrases and clauses and identifies the sentence with the syntactic information. Tamil is one of the major Dravidian languages, which has a very long written history of more than 2000 years. It is mainly spoken in Tamilnadu (in India), Srilanka, Malaysia and Singapore. It is an official language in Tamilnadu (in India), Srilanka, Malaysia and Singapore. In Malaysia Tamil speaking people are considered as an ethnic group. In Tamil syntax, the sentences in Tamil are classified into four for this research, namely: 1. Main Sentence 2. Interrogative Sentence 3. Equational Sentence 4. Elliptical Sentence. In computational syntax, the first step is to provide required information regarding the head and its constituent of each sentence. This information will be incorporated to the system using programming languages. Now the system can easily analyse a given sentence with the criteria or mechanisms given to it. Providing needful criteria or mechanisms to the computer to identify the basic types of sentences using Syntactic parser in Tamil language is the major objective of this paper.Keywords: tamil, syntax, criteria, sentences, parser
Procedia PDF Downloads 5172840 Generalized Synchronization in Systems with a Complex Topology of Attractor
Authors: Olga I. Moskalenko, Vladislav A. Khanadeev, Anastasya D. Koloskova, Alexey A. Koronovskii, Anatoly A. Pivovarov
Abstract:
Generalized synchronization is one of the most intricate phenomena in nonlinear science. It can be observed both in systems with a unidirectional and mutual type of coupling including the complex networks. Such a phenomenon has a number of practical applications, for example, for the secure information transmission through the communication channel with a high level of noise. Known methods for the secure information transmission needs in the increase of the privacy of data transmission that arises a question about the observation of such phenomenon in systems with a complex topology of chaotic attractor possessing two or more positive Lyapunov exponents. The present report is devoted to the study of such phenomenon in two unidirectionally and mutually coupled dynamical systems being in chaotic (with one positive Lyapunov exponent) and hyperchaotic (with two or more positive Lyapunov exponents) regimes, respectively. As the systems under study, we have used two mutually coupled modified Lorenz oscillators and two unidirectionally coupled time-delayed generators. We have shown that in both cases the generalized synchronization regime can be detected by means of the calculation of Lyapunov exponents and phase tube approach whereas due to the complex topology of attractor the nearest neighbor method is misleading. Moreover, the auxiliary system approaches being the standard method for the synchronous regime observation, for the mutual type of coupling results in incorrect results. To calculate the Lyapunov exponents in time-delayed systems we have proposed an approach based on the modification of Gram-Schmidt orthogonalization procedure in the context of the time-delayed system. We have studied in detail the mechanisms resulting in the generalized synchronization regime onset paying a great attention to the field where one positive Lyapunov exponent has already been become negative whereas the second one is a positive yet. We have found the intermittency here and studied its characteristics. To detect the laminar phase lengths the method based on a calculation of local Lyapunov exponents has been proposed. The efficiency of the method has been verified using the example of two unidirectionally coupled Rössler systems being in the band chaos regime. We have revealed the main characteristics of intermittency, i.e. the distribution of the laminar phase lengths and dependence of the mean length of the laminar phases on the criticality parameter, for all systems studied in the report. This work has been supported by the Russian President's Council grant for the state support of young Russian scientists (project MK-531.2018.2).Keywords: complex topology of attractor, generalized synchronization, hyperchaos, Lyapunov exponents
Procedia PDF Downloads 2752839 Visualization of Wave Propagation in Monocoupled System with Effective Negative Stiffness, Effective Negative Mass, and Inertial Amplifier
Authors: Abhigna Bhatt, Arnab Banerjee
Abstract:
A periodic system with only a single coupling degree of freedom is called a monocoupled system. Monocoupled systems with mechanisms like mass in the mass system generates effective negative mass, mass connected with rigid links generates inertial amplification, and spring-mass connected with a rigid link generateseffective negative stiffness. In this paper, the representative unit cell is introduced, considering all three mechanisms combined. Further, the dynamic stiffness matrix of the unit cell is constructed, and the dispersion relation is obtained by applying the Bloch theorem. The frequency response function is also calculated for the finite length of periodic unit cells. Moreover, the input displacement signal is given to the finite length of periodic structure and using inverse Fourier transform to visualize the wave propagation in the time domain. This visualization explains the sudden attenuation in metamaterial due to energy dissipation by an embedded resonator at the resonance frequency. The visualization created for wave propagation is found necessary to understand the insights of physics behind the attenuation characteristics of the system.Keywords: mono coupled system, negative effective mass, negative effective stiffness, inertial amplifier, fourier transform
Procedia PDF Downloads 1262838 Multi-omics Integrative Analysis with Genome-Scale Metabolic Model Simulation Reveals Reaction Essentiality data in Human Astrocytes Under the Lipotoxic Effect of Palmitic Acid
Authors: Janneth Gonzalez, Andres Pinzon Velasco, Maria Angarita, Nicolas Mendoza
Abstract:
Astrocytes play an important role in various processes in the brain, including pathological conditions such as neurodegenerative diseases. Recent studies have shown that the increase in saturated fatty acids such as palmitic acid (PA) triggers pro-inflammatory pathways in the brain. The use of synthetic neurosteroids such as tibolone has demonstrated neuro-protective mechanisms. However, there are few studies on the neuro-protective mechanisms of tibolone, especially at the systemic (omic) level. In this study, we performed the integration of multi-omic data (transcriptome and proteome) into a human astrocyte genomic scale metabolic model to study the astrocytic response during palmitate treatment. We evaluated metabolic fluxes in three scenarios (healthy, induced inflammation by PA, and tibolone treatment under PA inflammation). We also use control theory to identify those reactions that control the astrocytic system. Our results suggest that PA generates a modulation of central and secondary metabolism, showing a change in energy source use through inhibition of folate cycle and fatty acid β-oxidation and upregulation of ketone bodies formation.We found 25 metabolic switches under PA-mediated cellular regulation, 9 of which were critical only in the inflammatory scenario but not in the protective tibolone one. Within these reactions, inhibitory, total, and directional coupling profiles were key findings, playing a fundamental role in the (de)regulation in metabolic pathways that increase neurotoxicity and represent potential treatment targets. Finally, this study framework facilitates the understanding of metabolic regulation strategies, andit can be used for in silico exploring the mechanisms of astrocytic cell regulation, directing a more complex future experimental work in neurodegenerative diseases.Keywords: astrocytes, data integration, palmitic acid, computational model, multi-omics, control theory
Procedia PDF Downloads 1212837 Tourism Management of the Heritage and Archaeological Sites in Egypt
Authors: Sabry A. El Azazy
Abstract:
The archaeological heritage sites are one of the most important touristic attractions worldwide. Egypt has various archaeological sites and historical locations that are classified within the list of the archaeological heritage destinations in the world, such as Cairo, Luxor, Aswan, Alexandria, and Sinai. This study focuses on how to manage the archaeological sites and provide them with all services according to the traveler's needs. Tourism management depends on strategic planning for supporting the national economy and sustainable development. Additionally, tourism management has to utilize highly effective standards of security, promotion, advertisement, sales, and marketing while taking into consideration the preservation of monuments. In Egypt, the archaeological heritage sites must be well-managed and protected, which would assist tourism management, especially in times of crisis. Recently, the monumental places and archeological heritage sites were affected by unstable conditions and were threatened. It is essential to focus on preserving our heritage. Moreover, more efforts and cooperation between the tourism organizations and ministry of archaeology have to be done in order to protect the archaeology and promote the tourism industry. Methodology: Qualitative methods have been used as the overall approach to this study. Interviews and observations have provided the researcher with the required in-depth insight to the research subject. The researcher was a lecturer of tourist guidance that allows visiting all historical sites in Egypt. Additionally, the researcher had the privilege to communicate with tourism specialists and attend meetings, conferences, and events that were focused on the research subject. Objectives: The main purpose of the research was gaining information in order to develop theoretical research on how to effectively benefit out of those historical sights both economically and culturally, and pursue further researches and scientific studies to be well-suited for tourism and hospitality sector. The researcher works hard to present further studies in a field related to tourism and archaeological heritage using previous experience. Pursing this course of study enables the researcher to acquire the necessary abilities and competencies to achieve the set goal successfully. Results: The professional tourism management focus on making Egypt one of the most important destinations in the world, and provide the heritage and archaeological sites with all services that will place those locations into the international map of tourism. Tourists interested in visiting Egypt and making tourism flourish supports and strengths Egypt's national economy and the local community, taking into consideration preserving our heritage and archaeology. Conclusions: Egypt has many tourism attractions represented in the heritage, archaeological sites, and touristic places. These places need more attention and efforts to be included in tourism programs and be opened for visitors from all over the world. These efforts will encourage both local and international tourism to see our great civilization and provide different touristic activities.Keywords: archaeology, archaeological sites, heritage, ministry of archaeology, national economy, touristic attractions, tourism management, tourism organizations
Procedia PDF Downloads 1442836 The Response of 4-Hydroxybenzoic Acid on Kv1.4 Potassium Channel Subunit Expressed in Xenopus laevis Oocytes
Authors: Fatin H. Mohamad, Jia H. Wong, Muhammad Bilal, Abdul A. Mohamed Yusoff, Jafri M. Abdullah, Jingli Zhang
Abstract:
Kv1.4 is a Shaker-related member of voltage-gated potassium channel which can be associated with cardiac action potential but can also be found in Schaffer collateral and dentate gyrus. It has two inactivation mechanisms; the fast N-type and slow C-type. Kv1.4 produces rapid current inactivation. This A type potential of Kv1.4 makes it as a target in antiepileptic drugs (AEDs) selection. In this study, 4-hydroxybenzoic acid, which can be naturally found in bamboo shoots, were tested on its enhancement effect on potassium current of Kv1.4 channel expressed in Xenopus laevis oocytes using the two-microelectrode voltage clamp method. Current obtained were recorded and analyzed with pClamp software whereas statistical analysis were done by student t-test. The ratio of final / peak amplitude is an index of the activity of the Kv1.4 channel. The less the ratio, the greater the function of Kv1.4. The decrease of ratio of which by 1µM 4-hydroxybenzoic acid (n= 7), compared with 0.1% DMSO (vehicle), was mean= 47.62%, SE= 13.76%, P= 0.026 (statistically significant). It indicated more opening of Kv1.4 channels under 4-hydroxybenzoic acid. In conclusion, 4-hydroxybenzoic acid can enhance the function of Kv1.4 potassium channels, which is regarded as one of the mechanisms of antiepileptic treatment.Keywords: antiepileptic, Kv1.4 potassium channel, two-microelectrode voltage clamp, Xenopus laevis oocytes, 4-hydroxybenzoic acid
Procedia PDF Downloads 3612835 Pathways and Mechanisms of Lymphocytes Emigration from Newborn Thymus
Authors: Olena Grygorieva
Abstract:
Nowadays mechanisms of thymocytes emigration from the thymus to the periphery are investigated actively. We have proposed a hypothesis of thymocytes’ migration from the thymus through lymphatic vessels during periodical short-term local edema. By morphological, hystochemical methods we have examined quantity of lymphocytes, epitelioreticulocytes, mast cells, blood and lymphatic vessels in morpho-functional areas of rats’ thymuses during the first week after birth in 4 hours interval. In newborn and beginning from 8 hour after birth every 12 hours specific density of the thymus, absolute quantity of microcirculatory vessels, especially of lymphatic ones, lymphcyte-epithelial index, quantity of mast cells and their degranulative forms increase. Structure of extracellular matrix, intrathymical microenvironment and lymphocytes’ adhesive properties change. Absolute quantity of small lymphocytes in thymic cortex changes wavy. All these changes are straightly expressed from 0 till 2, from 12 till 16, from 108 till 120 hours of postnatal life. During this periods paravasal lymphatic vessels are stuffed with lymphocytes, i.e. discrete migration of lymphocytes from the thymus occurs. After rapid edema reduction, quantity of lymphatic vessels decrease, they become empty. Therefore, in the thymus of newborn periodical short-term local edema is observed, on its top discrete migration of lymphocytes from the thymus occurs.Keywords: lymphocytes, lymphatic vessels, mast cells, thymus
Procedia PDF Downloads 2252834 Suicide in Late-Life Major Depressive Disorder: A Review of Structural and Functional Neuroimaging Studies
Authors: Wenqiu Cao
Abstract:
Suicide prevention is a global problem that needs to be taken seriously. Investigating the mechanisms of suicide in major depressive disorder (MDD) separately through neuroimaging technology is essential for effective suicide prevention. And it’s particularly urgent in geriatric depressive patients since older adults are more likely to use rapidly deadly means, and suicidal behavior is more lethal for older adults. The current study reviews five studies related to suicide in geriatric MDD that uses neuroimaging methodology in order to analyze the relevant neurobiological mechanisms. The majority of the studies found significant white matter and grey matter reduction or lesion widespread in multiple brain regions, including the frontal and parietal regions, the midbrain, the external capsule, and the cerebellum. Regarding the cognitive impairment in geriatric MDD, the reward signals were found weakened in the paralimbic cortex. The functional magnetic resonance imaging (fMRI) studies also found hemodynamic changes in the right dorsolateral prefrontal cortex (DLPFC), orbitofrontal cortex (OFC), and right frontopolar cortex (FPC) regions in late-life MDD patients with suicidal ideation. Future studies should consider the age of depression onset, more accurate measurements of suicide, larger sample size, and longitudinal design.Keywords: brain imaging, geriatric major depressive disorder, suicidality, suicide
Procedia PDF Downloads 1352833 Environmental Modeling of Storm Water Channels
Authors: L. Grinis
Abstract:
Turbulent flow in complex geometries receives considerable attention due to its importance in many engineering applications. It has been the subject of interest for many researchers. Some of these interests include the design of storm water channels. The design of these channels requires testing through physical models. The main practical limitation of physical models is the so called “scale effect”, that is, the fact that in many cases only primary physical mechanisms can be correctly represented, while secondary mechanisms are often distorted. These observations form the basis of our study, which centered on problems associated with the design of storm water channels near the Dead Sea, in Israel. To help reach a final design decision we used different physical models. Our research showed good coincidence with the results of laboratory tests and theoretical calculations, and allowed us to study different effects of fluid flow in an open channel. We determined that problems of this nature cannot be solved only by means of theoretical calculation and computer simulation. This study demonstrates the use of physical models to help resolve very complicated problems of fluid flow through baffles and similar structures. The study applies these models and observations to different construction and multiphase water flows, among them, those that include sand and stone particles, a significant attempt to bring to the testing laboratory a closer association with reality.Keywords: open channel, physical modeling, baffles, turbulent flow
Procedia PDF Downloads 2842832 Independent Encryption Technique for Mobile Voice Calls
Authors: Nael Hirzalla
Abstract:
The legality of some countries or agencies’ acts to spy on personal phone calls of the public became a hot topic to many social groups’ talks. It is believed that this act is considered an invasion to someone’s privacy. Such act may be justified if it is singling out specific cases but to spy without limits is very unacceptable. This paper discusses the needs for not only a simple and light weight technique to secure mobile voice calls but also a technique that is independent from any encryption standard or library. It then presents and tests one encrypting algorithm that is based of frequency scrambling technique to show fair and delay-free process that can be used to protect phone calls from such spying acts.Keywords: frequency scrambling, mobile applications, real-time voice encryption, spying on calls
Procedia PDF Downloads 4792831 Artificial Intelligence Ethics: What Business Leaders Need to Consider for the Future
Authors: Kylie Leonard
Abstract:
Investment in artificial intelligence (AI) can be an attractive opportunity for business leaders as there are many easy-to-see benefits. These benefits include task completion rates, overall cost, and better forecasting. Business leaders are often unaware of the challenges that can accompany AI, such as data center costs, access to data, employee acceptance, and privacy concerns. In addition to the benefits and challenges of AI, it is important to practice AI ethics to ensure the safe creation of AI. AI ethics include aspects of algorithm bias, limits in transparency, and surveillance. To be a good business leader, it is critical to address all the considerations involving the challenges of AI and AI ethics.Keywords: artificial intelligence, artificial intelligence ethics, business leaders, business concerns
Procedia PDF Downloads 1472830 Open Consent And Artificial Intelligence For Health Research in South Africa
Authors: Amy Gooden
Abstract:
Various modes of consent have been utilized in health research, but open consent has not been explored in South Africa’s AI research context. Open consent entails the sharing of data without assurances of privacy and may be seen as an attempt to marry open science with informed consent. Because all potential uses of data are unknown, it has been questioned whether consent can be informed. Instead of trying to adapt existing modes of consent, why not adopt a new perspective? This is what open consent proposes and what this research will explore in AI health research in South Africa.Keywords: artificial intelligence, consent, health, law, research, South Africa
Procedia PDF Downloads 1602829 Optimal Health and Older Adults: The Existential Health Dimension as a Health-Promoting Potential
Authors: Jessica Hemberg, Anna K. Forsman, Johanna Nordmyr
Abstract:
With a considerable increase in the aging population in the Nordic countries there is a call for a deeper understanding of healthy aging and its underlying mechanisms. The aim of this study is to uncover health and well-being for older adults according to their own views and understand what role the existential dimension play? The study uses a hermeneutical approach. Material was collected through focus group interviews with 18 older adults. The texts were interpreted through hermeneutical reading. The underlying mechanisms of health among older adults are described, illustrating the key prerequisites for health as being in the present. This implies ‘living on the continuums of life and death’ and in this field of forces also ‘living on the continuum of the past and the future’. Important aspects for being in the present was balancing ambivalent emotions, considering existential issues, and being in connectedness. Health for older adults may be understood in the light of the metaphor of taking it one day at a time. Being in the present was emphasized as a health potential for older adults highlighting the existential health dimension. From a societal point of view, this implies that health promotion should focus on highlighting the importance of the existential dimension of health since it holds health-promoting potentials for older adults. Optimal health for older adults requires awareness of one’s attitude to life through being in the present as a basis for a positive and healthy outlook on life.Keywords: focus group interviews, hermeneutics, life experiences, older adults
Procedia PDF Downloads 1882828 Comprehensive Review of Adversarial Machine Learning in PDF Malware
Authors: Preston Nabors, Nasseh Tabrizi
Abstract:
Portable Document Format (PDF) files have gained significant popularity for sharing and distributing documents due to their universal compatibility. However, the widespread use of PDF files has made them attractive targets for cybercriminals, who exploit vulnerabilities to deliver malware and compromise the security of end-user systems. This paper reviews notable contributions in PDF malware detection, including static, dynamic, signature-based, and hybrid analysis. It presents a comprehensive examination of PDF malware detection techniques, focusing on the emerging threat of adversarial sampling and the need for robust defense mechanisms. The paper highlights the vulnerability of machine learning classifiers to evasion attacks. It explores adversarial sampling techniques in PDF malware detection to produce mimicry and reverse mimicry evasion attacks, which aim to bypass detection systems. Improvements for future research are identified, including accessible methods, applying adversarial sampling techniques to malicious payloads, evaluating other models, evaluating the importance of features to malware, implementing adversarial defense techniques, and conducting comprehensive examination across various scenarios. By addressing these opportunities, researchers can enhance PDF malware detection and develop more resilient defense mechanisms against adversarial attacks.Keywords: adversarial attacks, adversarial defense, adversarial machine learning, intrusion detection, PDF malware, malware detection, malware detection evasion
Procedia PDF Downloads 392827 Climate Change and Perceived Socialization: The Role of Parents’ Climate Change Coping Style and Household Communication
Authors: Estefanya Vazquez-Casaubon, Veroline Cauberghe, Dieneke Van de Sompel, Hayley Pearce
Abstract:
Working together to reduce the anthropogenic impact should be a collective action, including effort within the household. In the matter, children are considered to have an important role in influencing the household to reduce the environmental impact through reversed socialization where children motivate and increase the concern of the parents towards environmental protection. Previous studies reveal that communication between parents and kids is key for effective reversed socialization. However, multiple barriers have been identified in the literature, such as the acceptance of the influence from the kids, the properties of the communication, among other factors. Based on the previous evidence, the present study aims to assess barriers and facilitators of communication at the household level that have an impact on reversed socialization. More precisely, the study examines how parents’ climate change coping strategy (problem-focused, meaning-focused, disregarding) influences the valence and the type of the communication related to climate change, and eventually the extent to which they report their beliefs and behaviours to be influenced by the pro-environmental perspectives of their children; i.e. reversed socialization. Via an online survey, 723 Belgian parents self-reported on communication about environmental protection and risk within their household (such as the frequency of exchange about topics related to climate change sourced from school, the household rules, imparting knowledge to the children, and outer factors like media or peer pressure, the emotional valence of the communication), their perceived socialization, and personal factors (coping mechanisms towards climate change). The results, using structural equation modelling, revealed that parents applying a problem-solving coping strategy related to climate change, appear to communicate more often in a positive than in a negative manner. Parents with a disregarding coping style towards climate change appear to communicate less often in a positive way within the household. Parents that cope via meaning-making of climate change showed to communicate less often in either a positive or negative way. Moreover, the perceived valence of the communication (positive or negative) influenced the frequency and type of household communication. Positive emotions increased the frequency of the communication overall. However, the direct effect of neither of the coping mechanisms on the reversed socialization was significant. High frequency of communication about the media, environmental views of the household members among other external topics had a positive impact on the perceived socialization, followed by discussions school-related; while parental instructing had a negative impact on the perceived socialization. Moreover, the frequency of communication was strongly affected by the perceived valence of the communication (positive or negative). The results go in line with previous evidence that a higher frequency of communication facilitates reversed socialization. Hence the results outstand how the coping mechanisms of the parents can be either a facilitator when they cope via problem-solving, while parents that disregard might avert frequent communication about climate change at the household.Keywords: communication, parents’ coping mechanisms, environmental protection, household, perceived socialization
Procedia PDF Downloads 842826 Intellectual Property Protection of CRISPR Related Technologies
Authors: Zheng Miao, Dennis Fernandez
Abstract:
CRISPR research has the potential to completely transform life science, agriculture, live-stock and the health care industry. The Intellectual Property derived from its research has raised significant attention in the academic as well as the biopharmaceutical industry culminating an urgent need for strategic IP protection. We review the rudimentary concepts and key competitors of CRISPR technologies as well as the paramount strategies for intellectual property protection. Further, we elaborate on prosecution issues related to CRISPR patents as well as possible solutions to various patent laws, interferences and litigation. Finally, we address how the bioinformatics of the CRISPR technology begs an inquiry into issues of privacy and a host of ethical concerns.Keywords: bioinformatics, CRISPR, biotechnology, intellectual property
Procedia PDF Downloads 2522825 Novel Molecular Mechanisms Involved in Macrophage Phenotypic Polarization
Authors: Mansi Srivastava, Uzma Saqib, Adnan Naim, Anjali Roy, Dongfang Liu, Deepak Bhatnagar, Ravinder Ravinder, Mirza S. Baig
Abstract:
Macrophages polarize to proinflammatory M1 or anti-inflammatory M2 states with distinct physiological functions. This transition within the M1 to M2 phenotypes decides the nature, duration, and severity of an inflammatory response. However, inspite of a substantial understanding of the fate of these phenotypes, the underlying molecular mechanisms are not well understood. We have investigated the role of Neuronal nitric oxide synthase (NOS1) mediated regulation of Activator protein 1 (AP-1) transcription factor in macrophages as a critical effector of macrophage phenotypic change. Activator protein 1 (AP-1) is a group of dimeric transcription factors composed of jun, Fos, and ATF family proteins. We determined that NOS1-derived nitric oxide (NO) facilitate Fos and jun interaction which induces IL12 & IL23 expression. Pharmacological inhibition of NOS1 inhibits Fos and jun interaction but increases ATF2 and Fos dimerization. Switching of Fos and jun dimer to ATF2 and jun dimerization switches phenotype from IL–12high IL-23high IL-10low to IL–12low IL-23lowIL-10high phenotype, respectively. Together, these findings highlight a key role of the TLR4-NOS1-AP1 signaling axis in regulating macrophage polarization.Keywords: inflammation, macrophage, lipopolysaccharide (LPS), proinflammatory cytokines, activator protein 1 (AP-1), neuronal nitric oxide synthase (NOS1)
Procedia PDF Downloads 284