Search results for: authentication mechanisms
2169 A Proposal for a Secure and Interoperable Data Framework for Energy Digitalization
Authors: Hebberly Ahatlan
Abstract:
The process of digitizing energy systems involves transforming traditional energy infrastructure into interconnected, data-driven systems that enhance efficiency, sustainability, and responsiveness. As smart grids become increasingly integral to the efficient distribution and management of electricity from both fossil and renewable energy sources, the energy industry faces strategic challenges associated with digitalization and interoperability — particularly in the context of modern energy business models, such as virtual power plants (VPPs). The critical challenge in modern smart grids is to seamlessly integrate diverse technologies and systems, including virtualization, grid computing and service-oriented architecture (SOA), across the entire energy ecosystem. Achieving this requires addressing issues like semantic interoperability, IT/OT convergence, and digital asset scalability, all while ensuring security and risk management. This paper proposes a four-layer digitalization framework to tackle these challenges, encompassing persistent data protection, trusted key management, secure messaging, and authentication of IoT resources. Data assets generated through this framework enable AI systems to derive insights for improving smart grid operations, security, and revenue generation. Furthermore, this paper also proposes a Trusted Energy Interoperability Alliance as a universal guiding standard in the development of this digitalization framework to support more dynamic and interoperable energy markets.Keywords: digitalization, IT/OT convergence, semantic interoperability, VPP, energy blockchain
Procedia PDF Downloads 1832168 Clarification of Taxonomic Confusions among Adulterated Drugs Coffee Seena and Seena Weed through Systematic and Pharmaceutical Markers
Authors: Shabnum Shaheen, Nida Haroon, Farah Khan, Sumera Javad, Mehreen Jalal, Samina Sarwar
Abstract:
Coffee Senna is pharmaceutically very important and used for multiple health disorders such as gastric pains, indigestion, snakebites, asthma and fever, tuberculosis and menstrual problems. However, its immense medicinal value and great demand lead to adulteration issue which could be injurious for users. Some times its adulterant Seena weed (Senna occidentalis L.) is used as its substitute which definitely not as effective as Coffee Senna. Hence, the present study was undertaken to provide some tools for systematic and pharmaceutical authentication of a shrubby plant Coffee Senna (Cassia occidentalis Linn.). These parameters included macro and micro morphological characters, anatomical and palynomorph characterization, solubility, fluorescence and phytochemical analysis. By the application of these parameters acquired results revealed that, these two plants are distinct from each other. The Coffee Seena was found to be an annual shrub with trilobed pollen, diacytic, paracytic and anisocytic stomata whereas the Seena weed stands out as an annual or perennial herb with spheroidal and circular pollen and paracytic type of stomata. The powdered drug of Coffee seena is dark grayish green whereas the powdered drug of Seena weed is light green in color. These findings are constructive in authentic identification of these plants.Keywords: coffee senna, Senna weed, taxonomic evaluation, pharmaceutical markers
Procedia PDF Downloads 5132167 Real Time PCR Analysis of microRNA Expression in Oral Cancer
Authors: Karl Kingsley
Abstract:
Many mechanisms are involved in the control of cellular differentiation and growth, which are often dysregulated in many cancers. Many distinct pathways are involved in these mechanisms of control, including deoxyribonuclease (DNA) methyltransferase and histone deacetylase (HDAC) activation that controls both genetic and epigenetic modifications and micro ribonucleic acid (RNA) expression. Less is known about the expression of DNA methyltransferase (DNMT) and HDAC in oral cancers and the effect on microRNA expression. The primary objective of this study was to evaluate the expression of DNMT and HDAC family members in oral cancer and the concomitant expression of cancer-associated microRNAs. Using commercially available oral cancers, including squamous cell carcinoma (SCC)-4, SCC-9, SCC-15, and SCC-25, RNA was extracted and screened for DNMT, HDAC, and microRNA expression using highly-specific primers and quantitative polymerase chain reaction (qPCR). These data revealed low or absent expression of DNMT-1, which is associated with cellular differentiation but increased expression of DNMT-3a and DNMT-3b in all SCC cell lines compared with normal non-cancerous cell controls. In addition, no expression of HDAC1 and HDAC2 expression was found among the normal, non-cancerous cells but was highly expressed in each of the SCC cell lines examined. Differential expression of oncogenic and cancer-associated microRNAs was also observed among the SCC cell lines, including miR-21, miR-133, miR-149, miR-155, miR-365, and miR-720. These findings also appeared to vary according to observed growth rates among these cells. These data may be the first to demonstrate the expression and association between HDAC and DNMT3 family members among oral cancers. In addition, the differential expression of these epigenetic modifiers may be associated with the expression of specific microRNAs in these cancers, which have not previously been observed to the best of the author's knowledge. In addition, some associations and relationships may exist between the expression of these biomarkers and the rates of growth and proliferation, which may suggest that these expression patterns might represent potentially useful biomarkers to determine tumor aggressiveness and other phenotypic behaviors among oral cancers.Keywords: oral cancer, DNA methyltransferase, histone deacetylase, microRNA
Procedia PDF Downloads 1402166 The Implications of Technological Advancements on the Constitutional Principles of Contract Law
Authors: Laura Çami (Vorpsi), Xhon Skënderi
Abstract:
In today's rapidly evolving technological landscape, the traditional principles of contract law are facing significant challenges. The emergence of new technologies, such as electronic signatures, smart contracts, and online dispute resolution mechanisms, is transforming the way contracts are formed, interpreted, and enforced. This paper examines the implications of these technological advancements on the constitutional principles of contract law. One of the fundamental principles of contract law is freedom of contract, which ensures that parties have the autonomy to negotiate and enter into contracts as they see fit. However, the use of technology in the contracting process has the potential to disrupt this principle. For example, online platforms and marketplaces often offer standard-form contracts, which may not reflect the specific needs or interests of individual parties. This raises questions about the equality of bargaining power between parties and the extent to which parties are truly free to negotiate the terms of their contracts. Another important principle of contract law is the requirement of consideration, which requires that each party receives something of value in exchange for their promise. The use of digital assets, such as cryptocurrencies, has created new challenges in determining what constitutes valuable consideration in a contract. Due to the ambiguity in this area, disagreements about the legality and enforceability of such contracts may arise. Furthermore, the use of technology in dispute resolution mechanisms, such as online arbitration and mediation, may raise concerns about due process and access to justice. The use of algorithms and artificial intelligence to determine the outcome of disputes may also raise questions about the impartiality and fairness of the process. Finally, it should be noted that there are many different and complex effects of technical improvements on the fundamental constitutional foundations of contract law. As technology continues to evolve, it will be important for policymakers and legal practitioners to consider the potential impacts on contract law and to ensure that the principles of fairness, equality, and access to justice are preserved in the contracting process.Keywords: technological advancements, constitutional principles, contract law, smart contracts, online dispute resolution, freedom of contract
Procedia PDF Downloads 1502165 Investigation of Ductile Failure Mechanisms in SA508 Grade 3 Steel via X-Ray Computed Tomography and Fractography Analysis
Authors: Suleyman Karabal, Timothy L. Burnett, Egemen Avcu, Andrew H. Sherry, Philip J. Withers
Abstract:
SA508 Grade 3 steel is widely used in the construction of nuclear pressure vessels, where its fracture toughness plays a critical role in ensuring operational safety and reliability. Understanding the ductile failure mechanisms in this steel grade is crucial for designing robust pressure vessels that can withstand severe nuclear environment conditions. In the present study, round bar specimens of SA508 Grade 3 steel with four distinct notch geometries were subjected to tensile loading while capturing continuous 2D images at 5-second intervals in order to monitor any alterations in their geometries to construct true stress-strain curves of the specimens. 3D reconstructions of X-ray computed tomography (CT) images at high-resolution (a spatial resolution of 0.82 μm) allowed for a comprehensive assessment of the influences of second-phase particles (i.e., manganese sulfide inclusions and cementite particles) on ductile failure initiation as a function of applied plastic strain. Additionally, based on 2D and 3D images, plasticity modeling was executed, and the results were compared to experimental data. A specific ‘two-parameter criterion’ was established and calibrated based on the correlation between stress triaxiality and equivalent plastic strain at failure initiation. The proposed criterion demonstrated substantial agreement with the experimental results, thus enhancing our knowledge of ductile fracture behavior in this steel grade. The implementation of X-ray CT and fractography analysis provided new insights into the diverse roles played by different populations of second-phase particles in fracture initiation under varying stress triaxiality conditions.Keywords: ductile fracture, two-parameter criterion, x-ray computed tomography, stress triaxiality
Procedia PDF Downloads 922164 Evaluating Generative Neural Attention Weights-Based Chatbot on Customer Support Twitter Dataset
Authors: Sinarwati Mohamad Suhaili, Naomie Salim, Mohamad Nazim Jambli
Abstract:
Sequence-to-sequence (seq2seq) models augmented with attention mechanisms are playing an increasingly important role in automated customer service. These models, which are able to recognize complex relationships between input and output sequences, are crucial for optimizing chatbot responses. Central to these mechanisms are neural attention weights that determine the focus of the model during sequence generation. Despite their widespread use, there remains a gap in the comparative analysis of different attention weighting functions within seq2seq models, particularly in the domain of chatbots using the Customer Support Twitter (CST) dataset. This study addresses this gap by evaluating four distinct attention-scoring functions—dot, multiplicative/general, additive, and an extended multiplicative function with a tanh activation parameter — in neural generative seq2seq models. Utilizing the CST dataset, these models were trained and evaluated over 10 epochs with the AdamW optimizer. Evaluation criteria included validation loss and BLEU scores implemented under both greedy and beam search strategies with a beam size of k=3. Results indicate that the model with the tanh-augmented multiplicative function significantly outperforms its counterparts, achieving the lowest validation loss (1.136484) and the highest BLEU scores (0.438926 under greedy search, 0.443000 under beam search, k=3). These results emphasize the crucial influence of selecting an appropriate attention-scoring function in improving the performance of seq2seq models for chatbots. Particularly, the model that integrates tanh activation proves to be a promising approach to improve the quality of chatbots in the customer support context.Keywords: attention weight, chatbot, encoder-decoder, neural generative attention, score function, sequence-to-sequence
Procedia PDF Downloads 782163 Ocular Immunology: In Face of Immune Privilege the Eye Remains Vulnerable to Autoimmune and Inflammatory-Mediated Diseases
Authors: Husham Bayazed
Abstract:
Purpose of Presentation: The eye is one of a few sites in the body with immune privilege (IP). However, this IP is relatively easily bypassed in the face of sufficient strong local or systemic immunological responses. As immune responses are crucial elements of the repair response, the eye has developed distinct mechanisms to deliver immune responses to injury in the avascular regions of the eye. This presentation may cover and provide an overview of the mechanisms that dictate immune cell trafficking to the local ocular microenvironment in response to different autoimmune and inflammatory-mediated diseases. Recent Findings: Literature reviews declare that immune responses and inflammation play a key role in a diverse range of eye diseases. In recent years, our understanding of ocular immune responses has widely spread in ocular surface inflammation, uveitis, age-related macular degeneration (AMD), glaucoma, transplantation rejection, and other ocular diseases. It is becoming increasingly clear that multiple seemingly unrelated diseases involve immune responses with common themes in their ocular pathogenesis. Recent studies are focusing on elucidating the pathogenesis of ocular inflammatory disease to identify new targets for immunotherapy that will not only improve efficacy but also minimize adverse effects from traditional therapy. Summary: While IP was believed to protect the eye from day-to-day inflammatory insults, however, it is relatively easily breached in the face of different strong local or systemic immunological and inflammatory responses. Therefore, the ocular immune response encapsulates the full range of classical and non-classical immune responses and demonstrates many features which are reflected in other tissues, but eye tissues, by modifying these responses, may reveal unexpected and novel findings which are relevant to immune responses generally. This may have therapeutic potential for new targeting immunotherapy, restoring immune tolerance in ocular autoimmune and inflammatory diseases, and preventing rejection such as stem cells, currently being considered for treatment of worldwide blinding diseases such as AMD.Keywords: ocular diseases, immunology, immune privilege, immunotherapy
Procedia PDF Downloads 772162 Detection of Bcl2 Polymorphism in Patient with Hepatocellular carcinoma
Authors: Mohamed Abdel-Hamid, Olfat Gamil Shaker, Doha El-Sayed Ellakwa, Eman Fathy Abdel-Maksoud
Abstract:
Introduction: Despite advances in the knowledge of the molecular virology of hepatitis C virus (HCV), the mechanisms of hepatocellular injury in HCV infection are not completely understood. Hepatitis C viral infection (HCV) influences the susceptibility to apoptosis. This could lead to insufficient antiviral immune response and persistent viral infection. Aim of this study: was to examine whether BCL-2 gene polymorphism at codon 43 (+127G/A or Ala43Thr) has an impact on development of hepatocellular carcinoma caused by chronic hepatitis C Egyptian patients. Subjects and Methods: The study included three groups; group 1: composing of 30 patients with hepatocellular carcinoma (HCC), group 2 composing of 30 patients with HCV, group 3 composing of 30 healthy subjects matching the same age and socioeconomic status were taken as a control group. Gene polymorphism of BCL2 (Ala43Thr) were evaluated by PCR-RFLP technique and measured for all patients and controls. Results: The summed 43Thr genotype was more frequent and statistically significant in HCC patients as compared to control group. This genotype of BCL2 gene may inhibit the programmed cell death which leads to disturbance in tissue and cells homeostasis and reduction in immune regulation. This result leads to viral replication and HCV persistence. Moreover, virus produces variety of mechanisms to block genes participated in apoptosis. This mechanism proves that HCV patients who have 43Thr genotype are more susceptible to HCC. Conclusion: The data suggest for the first time that the BCL2 polymorphism is associated with the susceptibility to HCC in Egyptian populations and might be used as molecular markers for evaluating HCC risk. This study clearly demonstrated that Chronic HCV exhibit a deregulation of apoptosis with the disease progression. This provides an insight into the pathogenesis of chronic HCV infection, and may contribute to the therapy.Keywords: BCL2 gene, Hepatitis C Virus, Hepatocellular carcinoma, sensitivity, specificity, apoptosis
Procedia PDF Downloads 5082161 Traumatic Chiasmal Syndrome Following Traumatic Brain Injury
Authors: Jiping Cai, Ningzhi Wangyang, Jun Shao
Abstract:
Traumatic brain injury (TBI) is one of the major causes of morbidity and mortality that leads to structural and functional damage in several parts of the brain, such as cranial nerves, optic nerve tract or other circuitry involved in vision and occipital lobe, depending on its location and severity. As a result, the function associated with vision processing and perception are significantly affected and cause blurred vision, double vision, decreased peripheral vision and blindness. Here two cases complaining of monocular vision loss (actually temporal hemianopia) due to traumatic chiasmal syndrome after frontal head injury were reported, and were compared the findings with individual case reports published in the literature. Reported cases of traumatic chiasmal syndrome appear to share some common features, such as injury to the frontal bone and fracture of the anterior skull base. The degree of bitemporal hemianopia and visual loss acuity have a variable presentation and was not necessarily related to the severity of the craniocerebral trauma. Chiasmal injury may occur even in the absence bony chip impingement. Isolated bitemporal hemianopia is rare and clinical improvement usually may not occur. Mechanisms of damage to the optic chiasm after trauma include direct tearing, contusion haemorrhage and contusion necrosis, and secondary mechanisms such as cell death, inflammation, edema, neurogenesis impairment and axonal damage associated with TBI. Beside visual field test, MRI evaluation of optic pathways seems to the strong objective evidence to demonstrate the impairment of the integrity of visual systems following TBI. Therefore, traumatic chiasmal syndrome should be considered as a differential diagnosis by both neurosurgeons and ophthalmologists in patients presenting with visual impairment, especially bitemporal hemianopia after head injury causing frontal and anterior skull base fracture.Keywords: bitemporal hemianopia, brain injury, optic chiasma, traumatic chiasmal syndrome.
Procedia PDF Downloads 792160 Cratoxy Formosum (Jack) Dyer Leaf Extract-Induced Human Breast and Liver Cancer Cells Death
Authors: Benjaporn Buranrat, Nootchanat Mairuae
Abstract:
Cratoxylum formosum (Jack) Dyer (CF) has been used for the traditional medicines in South East Asian and Thailand. Normally, northeast Thai vegetables have proven cytotoxic to many cancer cells. Therefore, the present study aims to explore the molecular mechanisms underlying CF-induced cancer cell death and apoptosis on breast and liver cancer cells. The cytotoxicity and antiproliferative effects of CF on the human breast MCF-7 and liver HepG2 cancer cell lines were evaluated using sulforhodamine B assay and colony formation assay. Cell migration assay was measured using wound healing assay. The apoptosis induction mechanisms were investigated through reactive oxygen species formation, caspase 3 activity, and JC-1 activity. Gene expression by real-time PCR and apoptosis related protein levels by Western blot analysis. CF induced MCF-7 and HepG2 cell death by time- and dose-dependent manner. Furthermore, CF had the greater cytotoxic potency on MCF-7 more than HepG2 cells with IC50 values of 85.70+4.52 μM and 219.03±9.96 μM respectively, at 24 h. Treatment with CF also caused a dose-dependent decrease in colony forming ability and cell migration, especially on MCF-7 cells. CF induced ROS formation, increased caspase 3 activities, and decreased the mitochondrial membrane potential, and causing apoptotic body production and DNA fragmentation. CF significantly decreased expression of the cell cycle regulatory protein RAC1 and downstream proteins, cdk6. Additionally, CF enhanced p21 and reduced cyclin D1 protein levels. CF leaf extract induced cell death, apoptosis, antimigration in both of MCF-7 and HepG2 cells. CF could be useful for developing to anticancer drug candidate for breast and liver cancer therapy.Keywords: cratoxylum formosum (jack) dyer, breast cancer, liver cancer, cell death
Procedia PDF Downloads 2112159 Hypoglycemic and Hypolipidemic Effects of Aqueous Flower Extract from Nyctanthes arbor-tristis L.
Authors: Brahmanage S. Rangika, Dinithi C. Peiris
Abstract:
Boiled Aqueous Flower Extract (AFE) of Nyctanthes arbor-tristis L. (Family: Oleaceae) is used in traditional Sri Lankan medicinal system to treat diabetes. However, this is not scientifically proven and the mechanisms by which the flowers reduce diabetes have not been investigated. The present study was carried out to examine the hypoglycemic potential and toxicity effects of aqueous flower extract of N. arbor-tristis. AFE was prepared and mice were treated orally either with 250, 500, and 750 mg/kg of AFE or distilled water (Control). Fasting and random blood glucose levels were determined. In addition, the toxicity of AFE was determined using chronic oral administration. In normoglycemic mice, mid dose (500mg/kg) of AFE significantly (p < 0.01) reduced fasting blood glucose levels by 49% at 4h post treatment. Further, 500mg/kg of AFE significantly (p < 0.01) lowered random blood glucose level of non-fasted normoglycemic mice. AFE significantly lowered total cholesterol and triglyceride levels while increasing the HDL levels in the serum. Further, AFE significantly inhibited the glucose absorption from the lumen of the intestine and it increases the diaphragm uptake of glucose. Alpha-amylase inhibitory activity was also evident. However, AFE did not induce any overt signs of toxicity or hepatotoxicity. There were no adverse effects on food and water intake and body weight of mice during the experimental period. It can be concluded that AFE of N. arbor-tristis posses safe oral anti diabetic potentials mediated via multiple mechanisms. Results of the present study scientifically proved the claims made about the uses of N. arbor-tristis in the treatment of diabetes mellitus in traditional Sri Lankan medicinal system. Further, flowers can also be used for as a remedy to improve blood lipid profile.Keywords: aqueous extract, hypoglycemic hypolipidemic, Nyctanthes arbor-tristis flowers, hepatotoxicity
Procedia PDF Downloads 3702158 Exercise Intensity Increasing Appetite, Energy, Intake Energy Expenditure, and Fat Oxidation in Sedentary Overweight Individuals
Authors: Ghalia Shamlan, M. Denise Robertson, Adam Collins
Abstract:
Appetite control (i.e. control of energy intake) is important for weight maintenance. Exercise contributes to the most variable component of energy expenditure (EE) but its impact is beyond the energy cost of exercise including physiological, behavioural, and appetite effects. Exercise is known to acutely influence effect appetite but evidence as to the independent effect of intensity is lacking. This study investigated the role of exercise intensity on appetite, energy intake (EI), appetite related hormone, fat utilisation and subjective measures of appetite. One hour after a standardised breakfast, 10 sedentary overweight volunteers. Subjects undertook either 8 repeated 60 second bouts of cycling at 95% VO2max (high intensity) or 30 minutes of continuous cycling, at a fixed cadence, equivalent to 50% of the participant’s VO2max (low intensity) in a randomised crossover design. Glucose, NEFA, glucagon-like peptide-1 (GLP-1) were measured fasted, postprandial, and pre and post-exercise. Satiety was assessed subjectively throughout the study using visual analogue scales (VAS). Ad libitum intake of a pasta meal was measured at the end (3-h post-breakfast). Interestingly, there was not significant difference in EE fat oxidation between HI and LI post-exercise. Also, no significant effect of high intensity (HI) was observed on the ad libitum meal, 24h and 48h EI post-exercise. However the mean 24h EI was 3000 KJ lower following HI than low intensity (LI). Despite, no significant differences in hunger score, glucose, NEFA and GLP-1 between both intensities were observed. However, NEFA and GLP-1 plasma level were higher until 30 min post LI. In conclusion, the similarity of EE and oxidation outcomes could give overweight individuals an option to choose between intensities. However, HI could help to reduce EI. There are mechanisms and consequences of exercise in short and long-term appetite control; however, these mechanisms warrant further explanation. These results support the need for future research in to the role of in regulation energy balance, especially for obese people.Keywords: appetite, exercise, food intake, energy expenditure
Procedia PDF Downloads 5052157 Signals Monitored during Anaesthesia
Authors: Launcelot.McGrath
Abstract:
A comprehensive understanding of physiological data is a vital aid to the anaesthesiologist in monitoring and maintaining the well-being of a patient undergoing surgery. Biosignal analysis is one of the most important topics that researchers have tried to develop over the last century to understand numerous human diseases. Understanding which biological signals are most important during anaesthesia is critically important. It is important that the anaesthesiologist understand both the signals themselves and the limitations introduced by the processes of acquisition. In this article, we provide an overview of different types of biological signals as well as the mechanisms applied to acquire them.Keywords: general biosignals, anaesthesia, biological, electroencephalogram
Procedia PDF Downloads 1462156 The Impact of FDI on Economic Growth in Algeria
Authors: Mohammed Yagoub
Abstract:
The new orientation to the market economy sponsored by the Algeria government in the early Nineties of the last century, and its desire to develop investment mechanisms and the promotion of development recently, the access into a partnership with the European Union, and the forthcoming accession to the World Trade Organization, foreign direct investment makes one of the most important means of opening up to foreign markets and bring technology and interact with globalization, this article we will discuss the impact of FDI on economic growth in the Algerian.Keywords: economic, development, markets, FDI, displacement, globalization
Procedia PDF Downloads 3632155 Denoising Convolutional Neural Network Assisted Electrocardiogram Signal Watermarking for Secure Transmission in E-Healthcare Applications
Authors: Jyoti Rani, Ashima Anand, Shivendra Shivani
Abstract:
In recent years, physiological signals obtained in telemedicine have been stored independently from patient information. In addition, people have increasingly turned to mobile devices for information on health-related topics. Major authentication and security issues may arise from this storing, degrading the reliability of diagnostics. This study introduces an approach to reversible watermarking, which ensures security by utilizing the electrocardiogram (ECG) signal as a carrier for embedding patient information. In the proposed work, Pan-Tompkins++ is employed to convert the 1D ECG signal into a 2D signal. The frequency subbands of a signal are extracted using RDWT(Redundant discrete wavelet transform), and then one of the subbands is subjected to MSVD (Multiresolution singular valued decomposition for masking. Finally, the encrypted watermark is embedded within the signal. The experimental results show that the watermarked signal obtained is indistinguishable from the original signals, ensuring the preservation of all diagnostic information. In addition, the DnCNN (Denoising convolutional neural network) concept is used to denoise the retrieved watermark for improved accuracy. The proposed ECG signal-based watermarking method is supported by experimental results and evaluations of its effectiveness. The results of the robustness tests demonstrate that the watermark is susceptible to the most prevalent watermarking attacks.Keywords: ECG, VMD, watermarking, PanTompkins++, RDWT, DnCNN, MSVD, chaotic encryption, attacks
Procedia PDF Downloads 1012154 Models of Environmental, Crack Propagation of Some Aluminium Alloys (7xxx)
Authors: H. A. Jawan
Abstract:
This review describes the models of environmental-related crack propagation of aluminum alloys (7xxx) during the last few decades. Acknowledge on effects of different factors on the susceptibility to SCC permits to propose valuable mechanisms on crack advancement. The reliable mechanism of cracking give a possibility to propose the optimum chemical composition and thermal treatment conditions resulting in microstructure the most suitable for real environmental condition and stress state.Keywords: microstructure, environmental, propagation, mechanism
Procedia PDF Downloads 4182153 Habitat-Specific Divergences in the Gene Repertoire among the Reference Prevotella Genomes of the Human Microbiome
Authors: Vinod Kumar Gupta, Narendrakumar M. Chaudhari, Suchismitha Iskepalli, Chitra Dutta
Abstract:
Background-The community composition of the human microbiome is known to vary at distinct anatomical niches. But little is known about the nature of variations if any, at the genome/sub-genome levels of a specific microbial community across different niches. The present report aims to explore, as a case study, the variations in gene repertoire of 28 Prevotella reference draft genomes derived from different body-sites of human, as reported earlier by the Human Microbiome Consortium. Results-The analysis reveals the exclusive presence of 11798, 3673, 3348 and 934 gene families and exclusive absence of 17, 221, 115 and 645 gene families in Prevotella genomes derived from the human oral cavity, gastro-intestinal tracts (GIT), urogenital tract (UGT) and skin, respectively. The pan-genome for Prevotella remains “open”. Distribution of various functional COG categories differs appreciably among the habitat-specific genes, within Prevotella pan-genome and between the GIT-derived Bacteroides and Prevotella. The skin and GIT isolates of Prevotella are enriched in singletons involved in Signal transduction mechanisms, while the UGT and oral isolates show higher representation of the Defense mechanisms category. No niche-specific variations could be observed in the distribution of KEGG pathways. Conclusion-Prevotella may have developed distinct genetic strategies for adaptation to different anatomical habitats through selective, niche-specific acquisition and elimination of suitable gene-families. In addition, individual microorganisms tend to develop their own distinctive adaptive stratagems through large repertoires of singletons. Such in situ, habitat-driven refurbishment of the genetic makeup can impart substantial intra-lineage genome diversity within the microbes without perturbing their general taxonomic heritage.Keywords: body niche adaptation, human microbiome, pangenome, Prevotella
Procedia PDF Downloads 2472152 Toxicological Effects of Atmospheric Fine Particulate Matter on Human Bronchial Epithelial Cells: Metabolic Activation, Genotoxicity and Epigenetic Modifications
Authors: M. Borgie, Z. Dagher, F. Ledoux, A. Verdin, F. Cazier, H. Greige, P. Shirali, D. Courcot
Abstract:
In October 2013, the International Agency for Research on Cancer (IARC) classified outdoor air pollution and fine particulate matter (PM2.5) as carcinogenic to humans. Despite the clearly relationship established by epidemiological studies between PM exposure and the onset of respiratory and cardiovascular diseases, uncertainties remain about the physiopathological mechanisms responsible for these diseases. The aim of this work was to evaluate the toxicological effects of two samples of atmospheric PM2.5 collected at urban and rural sites on human bronchial epithelial cells, BEAS-2B, especially to investigate the metabolic activation of organic compounds, the alteration of epigenetic mechanisms (i.e. microRNAs genes expression), the phosphorylation of H2AX and the telomerase activity. Our results showed a significant increase in CYP1A1, CYP1B1, and AhRR genes expression, miR-21 gene expression, H2AX phosphorylation and telomerase activity in BEAS-2B cells after their exposure to PM2.5, both in a dose and site-dependent manner. These results showed that PM2.5, especially urban PM, are able to induce the expression of metabolizing enzymes which can provide metabolic biotransformation of organic compounds into more toxic and carcinogenic metabolites, and to induce the expression of the oncomiR miR-21 which promotes cell growth and enhances tumor invasion and metastasis in lung cancer. In addition, our results have highlighted the role of PM2.5 in the activation of telomerase, which can maintain the telomeres length and subsequently preventing cell death, and have also demonstrated the ability of PM2.5 to induce DNA breaks and thus to increase the risk of mutations or chromosomal translocations that lead to genomic instability. All these factors may contribute to cell abnormalities, and thus the development of cancer.Keywords: BEAS-2B cells, carcinogenesis, epigenetic alterations and genotoxicity, PM2.5
Procedia PDF Downloads 3822151 Triple Immunotherapy to Overcome Immune Evasion by Tumors in a Melanoma Mouse Model
Authors: Mary-Ann N. Jallad, Dalal F. Jaber, Alexander M. Abdelnoor
Abstract:
Introduction: Current evidence confirms that both innate and adaptive immune systems are capable of recognizing and abolishing malignant cells. The emergence of cancerous tumors in patients is, therefore, an indication that certain cancer cells can resist elimination by the immune system through a process known as “immune evasion”. In fact, cancer cells often exploit regulatory mechanisms to escape immunity. Such mechanisms normally exist to control the immune responses and prohibit exaggerated or autoimmune reactions. Recently, immunotherapies have shown promising yet limited results. Therefore this study investigates several immunotherapeutic combinations and devises a triple immunotherapy which harnesses the innate and acquired immune responses towards the annihilation of malignant cells through overcoming their ability of immune evasion, consequently hampering malignant progression and eliminating established tumors. The aims of the study are to rule out acute/chronic toxic effects of the proposed treatment combinations, to assess the effect of these combinations on tumor growth and survival rates, and to investigate potential mechanisms underlying the phenotypic results through analyzing serum levels of anti-tumor cytokines, angiogenic factors and tumor progression indicator, and the tumor-infiltrating immune-cells populations. Methodology: For toxicity analysis, cancer-free C57BL/6 mice are randomized into 9 groups: Group 1 untreated, group 2 treated with sterile saline (solvent of used treatments), group 3 treated with Monophosphoryl-lipid-A, group 4 with anti-CTLA4-antibodies, group 5 with 1-Methyl-Tryptophan (Indolamine-Dioxygenase-1 inhibitor), group 6 with both MPLA and anti-CTLA4-antibodies, group 7 with both MPLA and 1-MT, group 8 with both anti-CTLA4-antibodies and 1-MT, and group 9 with all three: MPLA, anti-CTLA4-antibodies and 1-MT. Mice are monitored throughout the treatment period and for three following months. At that point, histological sections from their main organs are assessed. For tumor progression and survival analysis, a murine melanoma model is generated by injecting analogous mice with B16F10 melanoma cells. These mice are segregated into the listed nine groups. Their tumor size and survival are monitored. For a depiction of underlying mechanisms, melanoma-bearing mice from each group are sacrificed at several time-points. Sera are tested to assess the levels of Interleukin-12 (IL-12), Vascular-Endothelial-Growth Factor (VEGF), and S100B. Furthermore, tumors are excised for analysis of infiltrated immune cell populations including T-cells, macrophages, natural killer cells and immune-regulatory cells. Results: Toxicity analysis shows that all treated groups present no signs of neither acute nor chronic toxicity. Their appearance and weights were comparable to those of control groups throughout the treatment period and for the following 3 months. Moreover, histological sections from their hearts, kidneys, lungs, and livers were normal. Work is ongoing for completion of the remaining study aims. Conclusion: Toxicity was the major concern for the success of the proposed comprehensive combinational therapy. Data generated so far ruled out any acute or chronic toxic effects. Consequently, ongoing work is quite promising and may significantly contribute to the development of more effective immunotherapeutic strategies for the treatment of cancer patients.Keywords: cancer immunotherapy, check-point blockade, combination therapy, melanoma
Procedia PDF Downloads 1222150 Face Recognition Using Body-Worn Camera: Dataset and Baseline Algorithms
Authors: Ali Almadan, Anoop Krishnan, Ajita Rattani
Abstract:
Facial recognition is a widely adopted technology in surveillance, border control, healthcare, banking services, and lately, in mobile user authentication with Apple introducing “Face ID” moniker with iPhone X. A lot of research has been conducted in the area of face recognition on datasets captured by surveillance cameras, DSLR, and mobile devices. Recently, face recognition technology has also been deployed on body-worn cameras to keep officers safe, enabling situational awareness and providing evidence for trial. However, limited academic research has been conducted on this topic so far, without the availability of any publicly available datasets with a sufficient sample size. This paper aims to advance research in the area of face recognition using body-worn cameras. To this aim, the contribution of this work is two-fold: (1) collection of a dataset consisting of a total of 136,939 facial images of 102 subjects captured using body-worn cameras in in-door and daylight conditions and (2) evaluation of various deep-learning architectures for face identification on the collected dataset. Experimental results suggest a maximum True Positive Rate(TPR) of 99.86% at False Positive Rate(FPR) of 0.000 obtained by SphereFace based deep learning architecture in daylight condition. The collected dataset and the baseline algorithms will promote further research and development. A downloadable link of the dataset and the algorithms is available by contacting the authors.Keywords: face recognition, body-worn cameras, deep learning, person identification
Procedia PDF Downloads 1632149 Models of Environmental: Cracker Propagation of Some Aluminum Alloys (7xxx)
Authors: H. Jawan
Abstract:
This review describes the models of environmental-related crack propagation of aluminum alloys (7xxx) during the last few decades. Acknowledge on effects of different factors on the susceptibility to SCC permits to propose valuable mechanisms on crack advancement. The reliable mechanism of cracking give a possibility to propose the optimum chemical composition and thermal treatment conditions resulting in microstructure the most suitable for real environmental condition and stress state.Keywords: microstructure, environmental, propagation, mechanism
Procedia PDF Downloads 3902148 Influence of the Induction Program on Novice Teacher Retention In One Specialized School in Nur-Sultan
Authors: Almagul Nurgaliyeva
Abstract:
The phenomenon of novice teacher attrition is an urgent issue. The effective mechanisms to increase the retention rate of novice teachers relate to the nature and level of support provided at an employing site. This study considered novice teacher retention as a motivation-based process, which is based on a variety of support activities employed to satisfy novice teachers’ needs at an early career stage. The purpose of the study was to examine novice teachers’ perceptions of the effectiveness of the induction program and other support structure(s) at a secondary school in Nur-Sultan. The study was guided by Abraham Maslow’s (1943) theory of motivation. Maslow’s hierarchy of needs was used as a theoretical framework to identify the novice teachers’ primary needs and the extent to which the induction programs and other support mechanisms provided by the school administrators fulfill those needs. One school supervisor and eight novice teachers (four current and four former novice teachers) with a maximum of four years of teaching experience took part in the study. To investigate the perspectives and experiences of the participants, an online semi-structured interview was utilized. The responses were collected and analyzed. The study revealed four major challenges: educational, personal-psychological, sociological, and structural which are seen as the main constraints during the adaptation period. Four induction activities, as emerged from the data, are being carried out by the school to address novice teachers’ challenges: socialization activities, mentoring programs, professional development, and administrative support. These activities meet novice teachers’ needs and confront the challenges they face. Sufficient and adequate support structures provided to novice teachers during their first years of working experience is essential, as they may influence their decision to remain in the teaching profession, thereby reducing the attrition rate. The study provides recommendations for policymakers and school administrators about the structure and the content of induction program activities.Keywords: beginning teacher induction, induction programme, orientation programmes, adaptation challenges, novice teacher retention
Procedia PDF Downloads 872147 Management Practices in Holding Pens in Pig’s Slaughterhouses in the Valle De Aburrá, Antioquia and Animal Welfare
Authors: Natalia Uribe Corrales, Santiago Henao Villegas
Abstract:
Introduction: The management of pigs in the holding pens at the slaughterhouses is a key point to minimize levels of stress and fear, improve efficiency, maintain a good quality of meat and avoid economic losses. Holding pens should guarantee drinking water continuously, a minimum space of 1.2 m2/ animal; As well as an adequate management in the conduction of the animals towards stun. Objective: To characterize the management practices in holding pens in slaughterhouses in the Valle de Aburrá. Methods: A descriptive cross - sectional study was carried out in Valle de Aburrá benefit plants, which were authorized by National Institute for Food and Medicine Surveillance (INVIMA). Variables such as management mechanisms to the pens, time of housing, water supply, load density, vocalization, slips and falls of the animals in the pens and mechanism of conduction towards desensitization were analyzed. Results: 225 pigs were analyzed, finding that 35.6% were lowered with slaps from the trucks to the waiting pens; The lairage time was greater than 10 hours in 16% of the animals; 12.9% of pigs had no water permanently; 40.9% was subjected to a high load density, while 19.6% had a low load density. Regarding aspects of animal welfare, 37.3% presented high vocalizations; 29.3% and 14.2% presented slips or falls respectively. Regarding the mechanism of conduction towards desensitization, slapping was used in 56% and electrical prod in 4%. Conclusions: It is necessary to continue promoting the learning of the densities of load, since both high and low densities generate inconveniences in animal welfare, favoring the appearance of lesions and stress in the animals. Also, to promote the rule of permanent water in the pens and a time of housing less than 10 hours. In relation to the driving mechanisms, it is necessary to continue animal husbandry campaigns, encouraging the use of other alternatives such as boards or panels to assist the movement of pigs.Keywords: animal welfare, quality of meat, swine, waiting pens
Procedia PDF Downloads 1962146 Hydroxy Safflower Yellow A (HSYA) Mediated Neuroprotective Effect against Ischemia Reperfusion (I/R) Injury in Cerebral Stroke
Authors: Sruthi Ramagiri, Rajeev T.
Abstract:
Free radical damage has been entailed as the major culprit in the ischemic stroke contributing for oxidative damage. Recent investigations on Hydroxy Safflower Yellow A (HSYA) suggested its role in cerebral ischemia and various neurodegenerative disorders with unidentified molecular mechanisms. The current study was designed to investigate putative therapeutic role and possible molecular mechanisms of HSYA administration during the onset of reperfusion in cerebral ischemia-reperfusion (I/R) injury in cerebral stroke. Cerebral stroke was achieved by focal ischemic model. HSYA (10 mg/kg) was injected intravenously via the tail vein 5 minutes before reperfusion. Losses of sensorimotor abilities were evaluated by neurological scoring, spontaneous locomotor activity, and rotarod performance. Extent of oxidative stress was evaluated by biochemical parameters i.e., malondialdehyde (MDA), Glutathione (GSH), Super Oxide Dismutase (SOD) and catalase levels. The infarct volume of brain was assessed by 2,3,5-triphenyl tetrazolium chloride (TTC) staining technique. Increased cerebral injury (I/R) was evidenced by motor impairment, increased infarct volume and elevation of MDA levels along with significant reduction in antioxidant i.e.,MDA levels along with significant reduction in antioxidant i.e., GSH, SOD and catalase levels when compared to sham control. However, post conditioning with HSYA (10 mg/kg, i.v.) at the onset of reperfusion has significantly ameliorated sensorimotor abilities, attenuated MDA levels and reduced the infarct volume as compared with vehicle treated I/R injury group. Moreover, HSYA treatments improved antioxidant enzyme levels as compared with vehicle treated I/R-injury group. In conclusion, it may be suggested that HSYA post conditioning could be novel therapeutic approach against I/R injury in cerebral stroke possibly through its anti-oxidant mechanism.Keywords: HSYA, Ischemia reperfusion injury, oxidative stress, stroke
Procedia PDF Downloads 4272145 A Practice of Zero Trust Architecture in Financial Transactions
Authors: Liwen Wang, Yuting Chen, Tong Wu, Shaolei Hu
Abstract:
In order to enhance the security of critical financial infrastructure, this study carries out a transformation of the architecture of a financial trading terminal to a zero trust architecture (ZTA), constructs an active defense system for cybersecurity, improves the security level of trading services in the Internet environment, enhances the ability to prevent network attacks and unknown risks, and reduces the industry and security risks brought about by cybersecurity risks. This study introduces the SDP technology of ZTA, adapts and applies it to a financial trading terminal to achieve security optimization and fine-grained business grading control. The upgraded architecture of the trading terminal moves security protection forward to the user access layer, replaces VPN to optimize remote access, and significantly improves the security protection capability of Internet transactions. The study achieves 1. deep integration with the access control architecture of the transaction system; 2. no impact on the performance of terminals and gateways, and no perception of application system upgrades; 3. customized checklist and policy configuration; 4. introduction of industry-leading security technology such as single-packet authorization (SPA) and secondary authentication. This study carries out a successful application of ZTA in the field of financial trading and provides transformation ideas for other similar systems while improving the security level of financial transaction services in the Internet environment.Keywords: zero trust, trading terminal, architecture, network security, cybersecurity
Procedia PDF Downloads 1662144 Voice Liveness Detection Using Kolmogorov Arnold Networks
Authors: Arth J. Shah, Madhu R. Kamble
Abstract:
Voice biometric liveness detection is customized to certify an authentication process of the voice data presented is genuine and not a recording or synthetic voice. With the rise of deepfakes and other equivalently sophisticated spoofing generation techniques, it’s becoming challenging to ensure that the person on the other end is a live speaker or not. Voice Liveness Detection (VLD) system is a group of security measures which detect and prevent voice spoofing attacks. Motivated by the recent development of the Kolmogorov-Arnold Network (KAN) based on the Kolmogorov-Arnold theorem, we proposed KAN for the VLD task. To date, multilayer perceptron (MLP) based classifiers have been used for the classification tasks. We aim to capture not only the compositional structure of the model but also to optimize the values of univariate functions. This study explains the mathematical as well as experimental analysis of KAN for VLD tasks, thereby opening a new perspective for scientists to work on speech and signal processing-based tasks. This study emerges as a combination of traditional signal processing tasks and new deep learning models, which further proved to be a better combination for VLD tasks. The experiments are performed on the POCO and ASVSpoof 2017 V2 database. We used Constant Q-transform, Mel, and short-time Fourier transform (STFT) based front-end features and used CNN, BiLSTM, and KAN as back-end classifiers. The best accuracy is 91.26 % on the POCO database using STFT features with the KAN classifier. In the ASVSpoof 2017 V2 database, the lowest EER we obtained was 26.42 %, using CQT features and KAN as a classifier.Keywords: Kolmogorov Arnold networks, multilayer perceptron, pop noise, voice liveness detection
Procedia PDF Downloads 392143 Cooperative Replenishment through Bidding
Authors: Behzad Hezarkhani, Greys Sosic
Abstract:
Collaborative purchasing and replenishment have proven to be beneficial in supply chain management. This talk addresses the situation where buyers, potentially in possession of private procurement channels, carry out cooperative purchasing by submitting their bids to a coordinator. The collaborative organization is faced with two basic decisions: (1) who will be allocated with the products, and (2) how much each party should pay. We discuss mechanisms that could achieve desirable outcomes in this settings with special attention to the strategic behavior of the buyers.Keywords: supply chain management, group purchasing organizations, game theory, mechanism design
Procedia PDF Downloads 3422142 Competition Law as a “Must Have” Course in Legal Education
Authors: Noemia Bessa Vilela, Jose Caramelo Gomes
Abstract:
All law student are familiarized, in the first years of their bachelor of laws with the concepts of “public goods” and “ private goods”; often, such legal concept does not exactly match such economic concept, and there are consequences are some sort of confusion being created. The list of goods that follow under each category is not exhaustive, nor are students given proper mechanisms to acknowledge that some legal fields can, on its own, be considered as a “public good”; this is the case of Competition. Legal authors consider that “competition law is used to promote public interest” and, as such, it is a “public good”; in economics theory, Competition is the first public good in a market economy, as the enabler of allocation efficiency. Competition law is the legal tool to support the proper functioning of the market economy and democracy itself. It is fact that Competition Law only applies to economic activities, still, competition is object of private litigation as an integral part of Public Law. Still, regardless of the importance of Competition Law in the economic activity and market regulation, most student complete their studies in law, join the Bar Associations and engage in their professional activities never having been given sufficient tools to deal with the increasing demands of a globalized world. The lack of knowledge of economics, market functioning and the mechanisms at their reach in order to ensure proper realization of their duties as lawyers/ attorneys-at-law would be tackled if Competition Law would be included as part of the curricula of Law Schools. Proper teaching of Competition Law would combine the foundations of Competition Law, doctrine, case solving and Case Law study. Students should to understand and apply the analytical model. Special emphasis should be given to EU Competition Law, namely the TFEU Articles 101 to 106. Damages Directive should also be part of the curriculum. Students must in the first place acquire and master the economic rationale as competition and the world of competition law are the cornerstone of sound and efficient market. The teaching of Competition Law in undergraduate programs in Law would contribute to fulfill the potential of the students who will deal with matters related to consumer protection, economic and commercial law issues both in private practice and as in-house lawyers for companies.Keywords: higher education, competition law, legal education, law, market economy, industrial economics
Procedia PDF Downloads 1422141 Preserving Digital Arabic Text Integrity Using Blockchain Technology
Authors: Zineb Touati Hamad, Mohamed Ridda Laouar, Issam Bendib
Abstract:
With the massive development of technology today, the Arabic language has gained a prominent position among the languages most used for writing articles, expressing opinions, and also for citing in many websites, defying its growing sensitivity in terms of structure, language skills, diacritics, writing methods, etc. In the context of the spread of the Arabic language, the Holy Quran represents the most prevalent Arabic text today in many applications and websites for citation purposes or for the reading and learning rituals. The Quranic verses / surahs are published quickly and without cost, which may cause great concern to ensure the safety of the content from tampering and alteration. To protect the content of texts from distortion, it is necessary to refer to the original database and conduct a comparison process to extract the percentage of distortion. The disadvantage of this method is that it takes time, in addition to the lack of any guarantee on the integrity of the database itself as it belongs to one central party. Blockchain technology today represents the best way to maintain immutable content. Blockchain is a distributed database that stores information in blocks linked to each other through encryption, where the modification of each block can be easily known. To exploit these advantages, we seek in this paper to justify the use of this technique in preserving the integrity of Arabic texts sensitive to change by building a decentralized framework to authenticate and verify the integrity of the digital Quranic verses/surahs spread on websites.Keywords: arabic text, authentication, blockchain, integrity, quran, verification
Procedia PDF Downloads 1642140 An Investigation of the Pharmacomechanisms of Shang-Han Lun Formulas as Elucidated in the Qing Dynasty Classic 'Ben-Jing Shu-Zheng'
Authors: William Ceurvels, Dong-Di Zhang
Abstract:
The true nature of the mechanism by which the pharmaceuticals of the Shang-Han Lun act has been a topic of debate since Wuji Cheng published the first commentary during the Northern Song. Subsequent commentaries employed a number of methodologies in their analysis of pharmaceutical mechanisms, but no commentator was able to garner universal acceptance. During the Qing Dynasty, the proliferation and development of Neo-Confucian scholarship produced a new generation of scholars possessed of rigorous and inventive research methods, one of whom was the famed materia medica scholar, Run-an Zou. Run-an Zou and his successor Zhou Yan advocated analyzing the mechanism of Treatise pharmaceuticals based upon the understanding of those pharmaceuticals during the time period in which the Treatise was written and thereby focused on the Han Dynasty materia medica tract Shen-nong Ben-cao Jing (The Divine Husbandman’s Herbal Foundation Canon). Zou Run-an’s commentary, Ben-jing Shu-zheng won nearly universal praise among materia medica scholars for its scholastic rigor and innovative research methods. However, because Ben-jing Shu-zheng only focuses on individual herbs, as opposed to formulas, its value in analyzing the Shang-Han Lun has limitations. The purpose of this study is to combine Zou Run-an’s single-pharmaceutical commentaries to generate theoretical full formula analyses to gain a fuller picture of Zou’s understanding of the healing mechanism of Shang-Han Lun formulas. Commentaries were gathered from Ben-jing Shu-zheng and Zhou Yan’s Ben-cao Si-bian Lun and combined to produce theoretical full formula model mechanisms of Treatise formulas. Through this study, a new picture of the mechanistic basis of Shang-han formulas emerges, which is based on qi-xue changes as opposed to organ or meridian theory. The author hopes that this modest research study will be of service to scholars of the Shang-han and clinical doctors alike in their pursuit of the true pharmacomechanisms of this great Han dynasty tome.Keywords: Materia medica, Shang-han Lun, Shen-nong Ben-cao Jing, neo-Confucian scholarship
Procedia PDF Downloads 318