Search results for: activation code
1803 IL-33 Production in Murine Macrophages via PGE2-E Prostanoid Receptor 2/4 Signaling
Authors: Sachin K. Samuchiwal, Barbara Balestrieri, Amanda Paskavitz, Hannah Raff, Joshua A. Boyce
Abstract:
IL-33, a recently discovered member of the IL-1 cytokine family, binds to the TLR/IL1R super family receptor ST2 and induces type 2 immune responses. IL-33 is constitutively expressed in structural cells at barrier sites such as skin, lung, and intestine, and also inducibly expressed by hematopoietic cells including macrophages. Stimulation of macrophages by Lipopolysaccharide (LPS) can induce de novo IL-33 expression, and also causes the production of prostaglandin-E2 (PGE2) via cyclooxygenase (COX)-2 and microsomal PGE2 synthase-1 (mPGES-1). Because PGE2 can regulate macrophage functions through both autocrine and paracrine mechanisms, the potential interplay of endogenous PGE2 on IL-33 production was explored. Bone-marrow derived murine macrophages (bmMF) that lack either mPGES-1 or EP2 receptor expression were stimulated with LPS in the absence or presence of exogenous PGE2 along with pharmacological agonists and antagonists. The study results demonstrate that endogenous PGE2 markedly enhances LPS-induced IL-33 production by bmMFs via EP2 receptors. Moreover, exogenous PGE2 can amplify LPS-induced IL-33 expression dominantly by EP2 and partly by EP4 receptors by a pathway involving cAMP and exchange protein activated by cAMP (EPAC), but not protein kinase A (PKA). Though both IL-33 production and PGE2 generation in response to LPS require activation of both p38 MAPK and NF-κB, PGE2 did not influence this activation. In conclusion, it is demonstrated that endogenous PGE2 signaling through EP2 and EP4 receptors is a prerequisite for LPS-induced IL-33 production in bmMFs and the underlying cAMP mediated pathway involves EPAC. Since IL-33 is a critical pro-inflammatory cytokine in various pathological disorders, this PGE2-EP2/EP4-cAMP mediated pathway can be exploited to intervene in IL-33 driven pathologies.Keywords: bone marrow macrophages, EPAC, IL-33, PGE2
Procedia PDF Downloads 1911802 Streamlining .NET Data Access: Leveraging JSON for Data Operations in .NET
Authors: Tyler T. Procko, Steve Collins
Abstract:
New features in .NET (6 and above) permit streamlined access to information residing in JSON-capable relational databases, such as SQL Server (2016 and above). Traditional methods of data access now comparatively involve unnecessary steps which compromise system performance. This work posits that the established ORM (Object Relational Mapping) based methods of data access in applications and APIs result in common issues, e.g., object-relational impedance mismatch. Recent developments in C# and .NET Core combined with a framework of modern SQL Server coding conventions have allowed better technical solutions to the problem. As an amelioration, this work details the language features and coding conventions which enable this streamlined approach, resulting in an open-source .NET library implementation called Codeless Data Access (CODA). Canonical approaches rely on ad-hoc mapping code to perform type conversions between the client and back-end database; with CODA, no mapping code is needed, as JSON is freely mapped to SQL and vice versa. CODA streamlines API data access by improving on three aspects of immediate concern to web developers, database engineers and cybersecurity professionals: Simplicity, Speed and Security. Simplicity is engendered by cutting out the “middleman” steps, effectively making API data access a whitebox, whereas traditional methods are blackbox. Speed is improved because of the fewer translational steps taken, and security is improved as attack surfaces are minimized. An empirical evaluation of the speed of the CODA approach in comparison to ORM approaches ] is provided and demonstrates that the CODA approach is significantly faster. CODA presents substantial benefits for API developer workflows by simplifying data access, resulting in better speed and security and allowing developers to focus on productive development rather than being mired in data access code. Future considerations include a generalization of the CODA method and extension outside of the .NET ecosystem to other programming languages.Keywords: API data access, database, JSON, .NET core, SQL server
Procedia PDF Downloads 671801 Learning Mandarin Chinese as a Foreign Language in a Bilingual Context: Adult Learners’ Perceptions of the Use of L1 Maltese and L2 English in Mandarin Chinese Lessons in Malta
Authors: Christiana Gauci-Sciberras
Abstract:
The first language (L1) could be used in foreign language teaching and learning as a pedagogical tool to scaffold new knowledge in the target language (TL) upon linguistic knowledge that the learner already has. In a bilingual context, code-switching between the two languages usually occurs in classrooms. One of the reasons for code-switching is because both languages are used for scaffolding new knowledge. This research paper aims to find out why both the L1 (Maltese) and the L2 (English) are used in the classroom of Mandarin Chinese as a foreign language (CFL) in the bilingual context of Malta. This research paper also aims to find out the learners’ perceptions of the use of a bilingual medium of instruction. Two research methods were used to collect qualitative data; semi-structured interviews with adult learners of Mandarin Chinese and lesson observations. These two research methods were used so that the data collected in the interviews would be triangulated with data collected in lesson observations. The L1 (Maltese) is the language of instruction mostly used. The teacher and the learners switch to the L2 (English) or to any other foreign language according to the need at a particular instance during the lesson.Keywords: Chinese, bilingual, pedagogical purpose of L1 and L2, CFL acquisition
Procedia PDF Downloads 2061800 Immunomodulatory Role of Heat Killed Mycobacterium indicus pranii against Cervical Cancer
Authors: Priyanka Bhowmik, Subrata Majumdar, Debprasad Chattopadhyay
Abstract:
Background: Cervical cancer is the third major cause of cancer in women and the second most frequent cause of cancer related deaths causing 300,000 deaths annually worldwide. Evasion of immune response by Human Papilloma Virus (HPV), the key contributing factor behind cancer and pre-cancerous lesions of the uterine cervix, makes immunotherapy a necessity to treat this disease. Objective: A Heat killed fraction of Mycobacterium indicus pranii (MIP), a non-pathogenic Mycobacterium has been shown to exhibit cytotoxic effects on different cancer cells, including human cervical carcinoma cell line HeLa. However, the underlying mechanisms remain unknown. The aim of this study is to decipher the mechanism of MIP induced HeLa cell death. Methods: The cytotoxicity of Mycobacterium indicus pranii against HeLa cells was evaluated by 3-(4,5-dimethylthiazol-2-yl)-2,5-diphenyltetrazolium bromide (MTT) assay. Apoptosis was detected by annexin V and Propidium iodide (PI) staining. The assessment of reactive oxygen species (ROS) generation and cell cycle analysis were measured by flow cytometry. The expression of apoptosis associated genes was analyzed by real time PCR. Result: MIP could inhibit the proliferation of HeLa cell in a time and dose dependent manner but caused minor damage to normal cells. The induction of apoptosis was confirmed by the cell surface presentation of phosphatidyl serine, DNA fragmentation, and mitochondrial damage. MIP caused very early (as early as 30 minutes) transcriptional activation of p53, followed by a higher activation (32 fold) at 24 hours suggesting prime importance of p53 in MIP-induced apoptosis in HeLa cell. The up regulation of p53 dependent pro-apoptotic genes Bax, Bak, PUMA, and Noxa followed a lag phase that was required for the transcriptional p53 program. MIP also caused the transcriptional up regulation of Toll like receptor 2 and 4 after 30 minutes of MIP treatment suggesting recognition of MIP by toll like receptors. Moreover, MIP caused the inhibition of expression of HPV anti apoptotic gene E6, which is known to interfere with p53/PUMA/Bax apoptotic cascade. This inhibition might have played a role in transcriptional up regulation of PUMA and subsequently apoptosis. ROS was generated transiently which was concomitant with the highest transcription activation of p53 suggesting a plausible feedback loop network of p53 and ROS in the apoptosis of HeLa cells. Scavenger of ROS, such as N-acetyl-L-cysteine, decreased apoptosis suggesting ROS is an important effector of MIP induced apoptosis. Conclusion: Taken together, MIP possesses full potential to be a novel therapeutic agent in the clinical treatment of cervical cancer.Keywords: cancer, mycobacterium, immunity, immunotherapy.
Procedia PDF Downloads 2491799 Solid Particles Transport and Deposition Prediction in a Turbulent Impinging Jet Using the Lattice Boltzmann Method and a Probabilistic Model on GPU
Authors: Ali Abdul Kadhim, Fue Lien
Abstract:
Solid particle distribution on an impingement surface has been simulated utilizing a graphical processing unit (GPU). In-house computational fluid dynamics (CFD) code has been developed to investigate a 3D turbulent impinging jet using the lattice Boltzmann method (LBM) in conjunction with large eddy simulation (LES) and the multiple relaxation time (MRT) models. This paper proposed an improvement in the LBM-cellular automata (LBM-CA) probabilistic method. In the current model, the fluid flow utilizes the D3Q19 lattice, while the particle model employs the D3Q27 lattice. The particle numbers are defined at the same regular LBM nodes, and transport of particles from one node to its neighboring nodes are determined in accordance with the particle bulk density and velocity by considering all the external forces. The previous models distribute particles at each time step without considering the local velocity and the number of particles at each node. The present model overcomes the deficiencies of the previous LBM-CA models and, therefore, can better capture the dynamic interaction between particles and the surrounding turbulent flow field. Despite the increasing popularity of LBM-MRT-CA model in simulating complex multiphase fluid flows, this approach is still expensive in term of memory size and computational time required to perform 3D simulations. To improve the throughput of each simulation, a single GeForce GTX TITAN X GPU is used in the present work. The CUDA parallel programming platform and the CuRAND library are utilized to form an efficient LBM-CA algorithm. The methodology was first validated against a benchmark test case involving particle deposition on a square cylinder confined in a duct. The flow was unsteady and laminar at Re=200 (Re is the Reynolds number), and simulations were conducted for different Stokes numbers. The present LBM solutions agree well with other results available in the open literature. The GPU code was then used to simulate the particle transport and deposition in a turbulent impinging jet at Re=10,000. The simulations were conducted for L/D=2,4 and 6, where L is the nozzle-to-surface distance and D is the jet diameter. The effect of changing the Stokes number on the particle deposition profile was studied at different L/D ratios. For comparative studies, another in-house serial CPU code was also developed, coupling LBM with the classical Lagrangian particle dispersion model. Agreement between results obtained with LBM-CA and LBM-Lagrangian models and the experimental data is generally good. The present GPU approach achieves a speedup ratio of about 350 against the serial code running on a single CPU.Keywords: CUDA, GPU parallel programming, LES, lattice Boltzmann method, MRT, multi-phase flow, probabilistic model
Procedia PDF Downloads 2071798 RNAseq Reveals Hypervirulence-Specific Host Responses to M. tuberculosis Infection
Authors: Gina Leisching, Ray-Dean Pietersen, Carel Van Heerden, Paul Van Helden, Ian Wiid, Bienyameen Baker
Abstract:
The distinguishing factors that characterize the host response to infection with virulent Mycobacterium tuberculosis (M.tb) are largely confounding. We present an infection study with two genetically closely related M.tb strains that have vastly different pathogenic characteristics. The early host response to infection with these detergent-free cultured strains was analyzed through RNAseq in an attempt to provide information on the subtleties which may ultimately contribute to the virulent phenotype. Murine bone marrow-derived macrophages (BMDMs) were infected with either a hyper- (R5527) or hypovirulent (R1507) Beijing M. tuberculosis clinical isolate. RNAseq revealed 69 differentially expressed host genes in BMDMs during comparison of these two transcriptomes. Pathway analysis revealed activation of the stress-induced and growth inhibitory Gadd45 signaling pathway in hypervirulent infected BMDMs. Upstream regulators of interferon activation such as and IRF3 and IRF7 were predicted to be upregulated in hypovirulent-infected BMDMs. Additional analysis of the host immune response through ELISA and qPCR included the use of human THP-1 macrophages where a robust proinflammatory response was observed after infection with the hypervirulent strain. RNAseq revealed two early-response genes (IER3 and SAA3) and two host-defence genes (OASL1 and SLPI) that were significantly upregulated by the hypervirulent strain. The role of these genes under M.tb infection conditions are largely unknown but here we provide validation of their presence with use of qPCR and Western blot. Further analysis into their biological role under infection with virulent M.tb is required.Keywords: host-response, Mycobacterium tuberculosis, RNAseq, virulence
Procedia PDF Downloads 2111797 Inviscid Steady Flow Simulation Around a Wing Configuration Using MB_CNS
Authors: Muhammad Umar Kiani, Muhammad Shahbaz, Hassan Akbar
Abstract:
Simulation of a high speed inviscid steady ideal air flow around a 2D/axial-symmetry body was carried out by the use of mb_cns code. mb_cns is a program for the time-integration of the Navier-Stokes equations for two-dimensional compressible flows on a multiple-block structured mesh. The flow geometry may be either planar or axisymmetric and multiply-connected domains can be modeled by patching together several blocks. The main simulation code is accompanied by a set of pre and post-processing programs. The pre-processing programs scriptit and mb_prep start with a short script describing the geometry, initial flow state and boundary conditions and produce a discretized version of the initial flow state. The main flow simulation program (or solver as it is sometimes called) is mb_cns. It takes the files prepared by scriptit and mb_prep, integrates the discrete form of the gas flow equations in time and writes the evolved flow data to a set of output files. This output data may consist of the flow state (over the whole domain) at a number of instants in time. After integration in time, the post-processing programs mb_post and mb_cont can be used to reformat the flow state data and produce GIF or postscript plots of flow quantities such as pressure, temperature and Mach number. The current problem is an example of supersonic inviscid flow. The flow domain for the current problem (strake configuration wing) is discretized by a structured grid and a finite-volume approach is used to discretize the conservation equations. The flow field is recorded as cell-average values at cell centers and explicit time stepping is used to update conserved quantities. MUSCL-type interpolation and one of three flux calculation methods (Riemann solver, AUSMDV flux splitting and the Equilibrium Flux Method, EFM) are used to calculate inviscid fluxes across cell faces.Keywords: steady flow simulation, processing programs, simulation code, inviscid flux
Procedia PDF Downloads 4291796 Appraisal of Trace Elements in Scalp Hair of School Children in Kandal Province, Cambodia
Authors: Alireza Yavar, Sukiman Sarmani, Kok Siong Khoo
Abstract:
Trace element analysis of human hair has the potential to disclose retroactive information about an individual’s nutritional status and exposure. The residents of villages in Kandal province of Cambodia, due to dietary habits, lifestyle and ecological conditions, are unprotected from toxic elements particularly arsenic (As). The purpose of this research was to valuation levels of toxic and vital elements in scalp human hair. Scalp hair samples of 12-17 school children from three villages of Anglong Romiot (AR), Svay Romiot (SR) and Kampong Kong (KK) in the Kandal province of Cambodia were evaluated using k0- instrumental neutron activation method (k0-INAA). The samples were irradiated 6 hours in a Malaysian nuclear agency (MNA) research reactor and afterward, an HPGe detector was utilized to obtain gamma peaks of radionuclides in samples. We achieved profiles of 31 elements in human hair in our studied area, namely, As, Au, Br, Ca, Ce, Co, Dy, Eu152m, Hg197, Hg203, Ho, Ir, K, La, Lu, Mn, Na, Pa, Pt195m, Pt197, Sb, Sc46, Sc47, Sm, Sn117m, W181, W187, Yb169, Yb175, Zn and Zn69m. The precision of the method was assessed by evaluating ERM-DB001-human hair as certified reference materials (CRMs), and which experimental result of ERM-DB001 was consistent with certified values. Whereas Arsenic (As) pollution is major contamination in our studied area, correlation between the concentration of As and other elements were determined by Pearson’s correlation test that it may be useful as a database source for toxic and essential elements in the hair of teenage individuals in our studied areaKeywords: scalp human hair, toxic and essential elements, Kandal province of Cambodia, k₀- instrumental neutron activation method
Procedia PDF Downloads 1191795 Using Optical Character Recognition to Manage the Unstructured Disaster Data into Smart Disaster Management System
Authors: Dong Seop Lee, Byung Sik Kim
Abstract:
In the 4th Industrial Revolution, various intelligent technologies have been developed in many fields. These artificial intelligence technologies are applied in various services, including disaster management. Disaster information management does not just support disaster work, but it is also the foundation of smart disaster management. Furthermore, it gets historical disaster information using artificial intelligence technology. Disaster information is one of important elements of entire disaster cycle. Disaster information management refers to the act of managing and processing electronic data about disaster cycle from its’ occurrence to progress, response, and plan. However, information about status control, response, recovery from natural and social disaster events, etc. is mainly managed in the structured and unstructured form of reports. Those exist as handouts or hard-copies of reports. Such unstructured form of data is often lost or destroyed due to inefficient management. It is necessary to manage unstructured data for disaster information. In this paper, the Optical Character Recognition approach is used to convert handout, hard-copies, images or reports, which is printed or generated by scanners, etc. into electronic documents. Following that, the converted disaster data is organized into the disaster code system as disaster information. Those data are stored in the disaster database system. Gathering and creating disaster information based on Optical Character Recognition for unstructured data is important element as realm of the smart disaster management. In this paper, Korean characters were improved to over 90% character recognition rate by using upgraded OCR. In the case of character recognition, the recognition rate depends on the fonts, size, and special symbols of character. We improved it through the machine learning algorithm. These converted structured data is managed in a standardized disaster information form connected with the disaster code system. The disaster code system is covered that the structured information is stored and retrieve on entire disaster cycle such as historical disaster progress, damages, response, and recovery. The expected effect of this research will be able to apply it to smart disaster management and decision making by combining artificial intelligence technologies and historical big data.Keywords: disaster information management, unstructured data, optical character recognition, machine learning
Procedia PDF Downloads 1301794 Review and Comparison of Iran`s Sixteenth Topic of the Building with the Ranking System of the Water Sector Lead to Improve the Criteria of the Sixteenth Topic
Authors: O. Fatemi
Abstract:
Considering growing building construction industry in developing countries and sustainable development concept, as well as the importance of taking care of the future generations, codifying buildings scoring system based on environmental criteria, has always been a subject for discussion. The existing systems cannot be used for all the regions due to several reasons, including but not limited to variety in regional variables. In this article, the most important common LEED (Leadership in Energy and Environmental Design) and BREEAM (Building Research Establishment Environmental Assessment Method) common and Global environmental scoring systems, used in UK, USA, and Japan, respectively, have been discussed and compared with a special focus on CASBEE (Comprehensive Assessment System for Built Environment Efficiency), to credit assigning field (weighing and scores systems) as well as sustainable development criteria in each system. Then, converging and distinct fields of the foregoing systems are examined considering National Iranian Building Code. Furthermore, the common credits in the said systems not mentioned in National Iranian Building Code have been identified. These credits, which are generally included in well-known fundamental principles in sustainable development, may be considered as offered options for the Iranian building environmental scoring system. It is suggested that one of the globally and commonly accepted systems is chosen considering national priorities in order to offer an effective method for buildings environmental scoring, and then, a part of credits is added and/or removed, or a certain credit score is changed, and eventually, a new scoring system with a new title is developed for the country. Evidently, building construction industry highly affects the environment, economy, efficiency, and health of the relevant occupants. Considering the growing trend of cities and construction, achieving building scoring systems based on environmental criteria has always been a matter of discussion. The existing systems cannot be used for all the regions due to several reasons, including but not limited to variety in regional variables.Keywords: scoring system, sustainability assessment, water efficiency, national Iranian building code
Procedia PDF Downloads 1821793 Family Homicide: A Comparison of Rural and Urban Communities in California
Authors: Bohsiu Wu
Abstract:
This study compares the differences in social dynamics between rural and urban areas in California to explain homicides involving family members. It is hypothesized that rural homicides are better explained by social isolation and lack of intervention resources, whereas urban homicides are attributed to social disadvantage factors. Several critical social dynamics including social isolation, social disadvantages, acculturation, and intervention resources were entered in a hierarchical linear model (HLM) to examine whether county-level factors affect how each specific dynamic performs at the ZIP code level, a proxy measure for communities. Homicide data are from the Supplementary Homicide Report for all 58 counties in California from 1997 to 1999. Predictors at both the county and ZIP code levels are derived from the 2000 US census. Preliminary results from a HLM analysis show that social isolation is a significant but moderate predictor to explain rural family homicide and various social disadvantage factors are significant factors accounting for urban family homicide. Acculturation has little impact. Rurality and urbanity appear to interact with various social dynamics in explaining family homicide. The implications for prevention at both the county and community level as well as directions for future study on the differences between rural and urban locales are explored in the paper.Keywords: communities, family, HLM, homicide, rural, urban
Procedia PDF Downloads 3261792 A Case Study on the Collapse Assessment of the Steel Moment-Frame Setback High-Rise Tower
Authors: Marzie Shahini, Rasoul Mirghaderi
Abstract:
This paper describes collapse assessments of a steel moment-frame high-rise tower with setback irregularity, designed per the 2010 ASCE7 code, under spectral-matched ground motion records. To estimate a safety margin against life-threatening collapse, an analytical model of the tower is subjected to a suite of ground motions with incremental intensities from maximum considered earthquake hazard level to the incipient collapse level. Capability of the structural system to collapse prevention is evaluated based on the similar methodology reported in FEMA P695. Structural performance parameters in terms of maximum/mean inter-story drift ratios, residual drift ratios, and maximum plastic hinge rotations are also compared to the acceptance criteria recommended by the TBI Guidelines. The results demonstrate that the structural system satisfactorily safeguards the building against collapse. Moreover, for this tower, the code-specified requirements in ASCE7-10 are reasonably adequate to satisfy seismic performance criteria developed in the TBI Guidelines for the maximum considered earthquake hazard level.Keywords: high-rise buildings, set back, residual drift, seismic performance
Procedia PDF Downloads 2611791 Cognitive Dysfunctioning and the Fronto-Limbic Network in Bipolar Disorder Patients: A Fmri Meta-Analysis
Authors: Rahele Mesbah, Nic Van Der Wee, Manja Koenders, Erik Giltay, Albert Van Hemert, Max De Leeuw
Abstract:
Introduction: Patients with bipolar disorder (BD), characterized by depressive and manic episodes, often suffer from cognitive dysfunction. An up-to-date meta-analysis of functional Magnetic Resonance Imaging (fMRI) studies examining cognitive function in BD is lacking. Objective: The aim of the current fMRI meta-analysis is to investigate brain functioning of bipolar patients compared with healthy subjects within three domains of emotion processing, reward processing, and working memory. Method: Differences in brain regions activation were tested within whole-brain analysis using the activation likelihood estimation (ALE) method. Separate analyses were performed for each cognitive domain. Results: A total of 50 fMRI studies were included: 20 studies used an emotion processing (316 BD and 369 HC) task, 9 studies a reward processing task (215 BD and 213 HC), and 21 studies used a working memory task (503 BD and 445 HC). During emotion processing, BD patients hyperactivated parts of the left amygdala and hippocampus as compared to HC’s, but showed hypoactivation in the inferior frontal gyrus (IFG). Regarding reward processing, BD patients showed hyperactivation in part of the orbitofrontal cortex (OFC). During working memory, BD patients showed increased activity in the prefrontal cortex (PFC) and anterior cingulate cortex (ACC). Conclusions: This meta-analysis revealed evidence for activity disturbances in several brain areas involved in the cognitive functioning of BD patients. Furthermore, most of the found regions are part of the so-called fronto-limbic network which is hypothesized to be affected as a result of BD candidate genes' expression.Keywords: cognitive functioning, fMRI analysis, bipolar disorder, fronto-limbic network
Procedia PDF Downloads 4631790 Precipitation Kinetics of Al-7%Mg Alloy Studied by DSC and XRD
Authors: M. Fatmi, T. Chihi, M. A. Ghebouli, B. Ghebouli
Abstract:
This work presents the experimental results of the differential scanning calorimetry (DSC), hardness measurements (Hv) and XRD analysis, for order to investigate the kinetics of precipitation phenomena in Al-7%wt. Mg alloy. In the XRD and DSC curves indicates the formation of the intermediate precipitation of β-(Al3Mg2) phase respectively. The activation energies associated with the processes have been determined according to the three models proposed by Kissinger, Ozawa, and Boswell. Consequently, the nucleation mechanism of the precipitates can be explained. These phases are confirmed by XRD analysis.Keywords: discontinuous precipitation, hardening, Al–Mg alloys, mechanical and mechatronics engineering
Procedia PDF Downloads 4141789 Acanthopanax koreanum and Major Ingredient, Impressic Acid, Possess Matrix Metalloproteinase-13 Down-Regulating Capacity and Protect Cartilage Destruction
Authors: Hyun Lim, Dong Sook Min, Han Eul Yun, Kil Tae Kim, Ya Nan Sun, Young Ho Kim, Hyun Pyo Kim
Abstract:
Matrix metalloproteinase (MMP)-13 has an important role for degrading cartilage materials under inflammatory conditions such as arthritis. Since the 70% ethanol extract of Acanthopanax koreanum inhibited MMP-13 expression in IL-1β-treated human chondrocyte cell line, SW1353, two major constituents including acanthoic acid and impressic acid were initially isolated from the same plant materials and their MMP-13 down-regulating capacity was examined. In IL-1β-treated SW1353 cells, acanthoic acid and impressic acid significantly and concentration-dependently inhibited MMP-13 expression at 10 – 100 μM and 0.5 – 10 μM, respectively. The potent one, impressic acid, was found to inhibit MMP-13 expression by blocking the phosphorylation of signal transducer and activator of transcription-1/-2 (STAT-1/-2) and activation of c-Jun and c-Fos among cellular signaling pathway involved, but did not affect the activation of mitogen-activated protein kinases (MAPKs) and nuclear transcription factor-κB (NF-κB). Further, impressic acid was also found to inhibit the expression of MMP-13 mRNA (47.7% inhibition at 10 μM), the glycosaminoglycan release (42.2% reduction at 10 μM) and proteoglycan loss in IL-1-treated rabbit cartilage explants culture. For a further study, 21 impressic acid derivatives were isolated from the same plant materials and their suppressive activities against MMP-13 expression were examined. Among the derivatives, 3α-hydroxy-lup-20(29)-en-23-oxo,28-oic acid, (20R)-3α-hydroxy-29-dimethoxylupan-23,28-dioic acid, acankoreoside F and acantrifoside A clearly down-regulated MMP-13 expression, but impressic acid being most potent. All these results suggest that impressic acid, 3α-hydroxy-lup-20(29)-en-23-oxo,28-oic acid, (20R)-3α-hydroxy-29-dimethoxylupan-23,28-dioic acid, acankoreoside F, acantrifoside A and A. koreanum may have a potential for therapeutic agents to prevent cartilage degradation possibly by inhibiting matrix protein degradation.Keywords: acanthoic acid, Acanthopanax koreanum, cartilage, impressic acid, matrix metalloproteinase
Procedia PDF Downloads 3641788 Modeling and Analysis of DFIG Based Wind Power System Using Instantaneous Power Components
Authors: Jaimala Ghambir, Tilak Thakur, Puneet Chawla
Abstract:
As per the statistical data, the Doubly-fed Induction Generator (DFIG) based wind turbine with variable speed and variable pitch control is the most common wind turbine in the growing wind market. This machine is usually used on the grid connected wind energy conversion system to satisfy grid code requirements such as grid stability, fault ride through (FRT), power quality improvement, grid synchronization and power control etc. Though the requirements are not fulfilled directly by the machine, the control strategy is used in both the stator as well as rotor side along with power electronic converters to fulfil the requirements stated above. To satisfy the grid code requirements of wind turbine, usually grid side converter is playing a major role. So in order to improve the operation capacity of wind turbine under critical situation, the intensive study of both machine side converter control and grid side converter control is necessary In this paper DFIG is modeled using power components as variables and the performance of the DFIG system is analysed under grid voltage fluctuations. The voltage fluctuations are made by lowering and raising the voltage values in the utility grid intentionally for the purpose of simulation keeping in view of different grid disturbances.Keywords: DFIG, dynamic modeling, DPC, sag, swell, voltage fluctuations, FRT
Procedia PDF Downloads 4631787 Fusion Models for Cyber Threat Defense: Integrating Clustering, Random Forests, and Support Vector Machines to Against Windows Malware
Authors: Azita Ramezani, Atousa Ramezani
Abstract:
In the ever-escalating landscape of windows malware the necessity for pioneering defense strategies turns into undeniable this study introduces an avant-garde approach fusing the capabilities of clustering random forests and support vector machines SVM to combat the intricate web of cyber threats our fusion model triumphs with a staggering accuracy of 98.67 and an equally formidable f1 score of 98.68 a testament to its effectiveness in the realm of windows malware defense by deciphering the intricate patterns within malicious code our model not only raises the bar for detection precision but also redefines the paradigm of cybersecurity preparedness this breakthrough underscores the potential embedded in the fusion of diverse analytical methodologies and signals a paradigm shift in fortifying against the relentless evolution of windows malicious threats as we traverse through the dynamic cybersecurity terrain this research serves as a beacon illuminating the path toward a resilient future where innovative fusion models stand at the forefront of cyber threat defense.Keywords: fusion models, cyber threat defense, windows malware, clustering, random forests, support vector machines (SVM), accuracy, f1-score, cybersecurity, malicious code detection
Procedia PDF Downloads 721786 Medical Image Watermark and Tamper Detection Using Constant Correlation Spread Spectrum Watermarking
Authors: Peter U. Eze, P. Udaya, Robin J. Evans
Abstract:
Data hiding can be achieved by Steganography or invisible digital watermarking. For digital watermarking, both accurate retrieval of the embedded watermark and the integrity of the cover image are important. Medical image security in Teleradiology is one of the applications where the embedded patient record needs to be extracted with accuracy as well as the medical image integrity verified. In this research paper, the Constant Correlation Spread Spectrum digital watermarking for medical image tamper detection and accurate embedded watermark retrieval is introduced. In the proposed method, a watermark bit from a patient record is spread in a medical image sub-block such that the correlation of all watermarked sub-blocks with a spreading code, W, would have a constant value, p. The constant correlation p, spreading code, W and the size of the sub-blocks constitute the secret key. Tamper detection is achieved by flagging any sub-block whose correlation value deviates by more than a small value, ℇ, from p. The major features of our new scheme include: (1) Improving watermark detection accuracy for high-pixel depth medical images by reducing the Bit Error Rate (BER) to Zero and (2) block-level tamper detection in a single computational process with simultaneous watermark detection, thereby increasing utility with the same computational cost.Keywords: Constant Correlation, Medical Image, Spread Spectrum, Tamper Detection, Watermarking
Procedia PDF Downloads 1971785 Structural Geology along the Jhakri-Wangtu Road (Jutogh Section) Himachal Pradesh, NW Higher Himalaya, India
Authors: Rajkumar Ghosh
Abstract:
The paper presents a comprehensive study of the structural analysis of the Chaura Thrust in Himachal Pradesh, India. The research focuses on several key aspects, including the activation timing of the Main Central Thrust (MCT) and the South Tibetan Detachment System (STDS), the identification and characterization of mylonitised zones through microscopic examination, and the understanding of box fold characteristics and their implications in the regional geology of the Himachal Himalaya. The primary objective of the study is to provide field documentation of the Chaura Thrust, which was previously considered a blind thrust with limited field evidence. Additionally, the research aims to characterize box folds and their signatures within the broader geological context of the Himachal Himalaya, document the temperature range associated with grain boundary migration (GBM), and explore the overprinting structures related to multiple sets of Higher Himalayan Out-of-Sequence Thrusts (OOSTs). The research methodology employed geological field observations and microscopic studies. Samples were collected along the Jhakri-Chaura transect at regular intervals of approximately 1 km to conduct strain analysis. Microstructural studies at the grain scale along the Jhakri-Wangtu transect were used to document the GBM-associated temperature range. The study reveals that the MCT activated in two parts, as did the STDS, and provides insights into the activation ages of the Main Boundary Thrust (MBT) and the Main Frontal Thrust (MFT). Under microscopic examination, the study identifies two mylonitised zones characterized by S-C fabric, and it documents dynamic and bulging recrystallization, as well as sub-grain formation. Various types of crenulated schistosity are observed in photomicrographs, including a rare occurrence where crenulation cleavage and sigmoid Muscovite are found juxtaposed. The study also notes the presence of S/SE-verging meso- and micro-scale box folds around Chaura, which may indicate structural upliftment. Kink folds near Chaura are visible, while asymmetric shear sense indicators in augen mylonite are predominantly observed under microscopic examination. Moreover, the research highlights the documentation of the Higher Himalayan Out-of-Sequence Thrust (OOST) in Himachal Pradesh, which activated the MCT and occurred within a zone south of the Main Central Thrust Upper (MCTU). The presence of multiple sets of OOSTs suggests a zigzag pattern of strain accumulation in the area. The study emphasizes the significance of understanding the overprinting structures associated with OOSTs. Overall, this study contributes to the understanding of the structural analysis of the Chaura Thrust and its implications in the regional geology of the Himachal Himalaya. The research underscores the importance of microscopic studies in identifying mylonitised zones and various types of crenulated schistosity. Additionally, the study documents the GBM-associated temperature range and provides insights into the activation of the Higher Himalayan Out-of-Sequence Thrust (OOST) in Himachal Pradesh. The findings of the study were obtained through geological field observations, microscopic studies, and strain analysis, offering valuable insights into the activation timing, mylonitization characteristics, and overprinting structures related to the Chaura Thrust and the broader tectonic framework of the region.Keywords: Main Central Thrust, Jhakri Thrust, Chaura Thrust, Higher Himalaya, Out-of-Sequence Thrust, Sarahan Thrust
Procedia PDF Downloads 1031784 Penalization of Transnational Crimes in the Domestic Legal Order: The Case of Poland
Authors: Magda Olesiuk-Okomska
Abstract:
The degree of international interdependence has grown significantly. Poland is a party to nearly 1000 binding multilateral treaties, including international legal instruments devoted to criminal matters and obliging the state to penalize certain crimes. The paper presents results of a theoretical research conducted as a part of doctoral research. The main hypothesis assumed that there was a separate category of crimes to penalization of which Poland was obliged under international legal instruments; that a catalogue of such crimes and a catalogue of international legal instruments providing for Poland’s international obligations had never been compiled in the domestic doctrine, thus there was no mechanism for monitoring implementation of such obligations. In the course of the research, a definition of transnational crimes was discussed and confronted with notions of international crimes, treaty crimes, as well as cross-border crimes. A list of transnational crimes penalized in the Polish Penal Code as well as in non-code criminal law regulations was compiled; international legal instruments, obliging Poland to criminalize and penalize specific conduct, were enumerated and catalogued. It enabled the determination whether Poland’s international obligations were implemented in domestic legislation, as well as the formulation of de lege lata and de lege ferenda postulates. Implemented research methods included inter alia a dogmatic and legal method, an analytical method and desk research.Keywords: international criminal law, transnational crimes, transnational criminal law, treaty crimes
Procedia PDF Downloads 2231783 Automation of AAA Game Development Using AI
Authors: Branden Heng, Harsheni Siddharthan, Allison Tseng, Paul Toprac, Sarah Abraham, Etienne Vouga
Abstract:
The goal of this project was to evaluate and document the capabilities and limitations of AI tools for empowering small teams to create high-budget, high-profile (AAA) 3D games typically developed by large studios. Two teams of novice game developers attempted to create two different games using AI and Unreal Engine 5.3. First, the teams evaluated 60 AI art, design, sound, and programming tools by considering their capability, ease of use, cost, and license restrictions. Then, the teams used a shortlist of 12 AI tools for game development. During this process, the following tools were found to be the most productive: (i) ChatGPT 4.0 for both game and narrative concepts and documentation; (ii) Dall-E 3 and OpenArt for concept art; (iii) Beatoven for music drafting; (iv) ChatGPT 4.0 and Github Copilot for generating simple code and to complement human-made tutorials as an additional learning resource. While current generative AI may appear impressive at first glance, the assets they produce fall short of AAA industry standards. Generative AI tools are helpful when brainstorming ideas such as concept art and basic storylines, but they still cannot replace human input or creativity at this time. Regarding programming, AI can only effectively generate simple code and act as an additional learning resource. Thus, generative AI tools are, at best, tools to enhance developer productivity rather than as a system to replace developers.Keywords: AAA games, AI, automation tools, game development
Procedia PDF Downloads 281782 Legal Provisions on Child Pornography in Bangladesh: A Comparative Study on South Asian Landscape
Authors: Monira Nazmi Jahan, Nusrat Jahan Nishat
Abstract:
'Child Pornography' is a sex crime that portrays illegal images and videos of a minor over the Internet and now has become a social concern with the increase of commission of this crime. The major objective of this paper is to identify and examine the laws relating to child pornography in Bangladesh and to compare this with other South Asian countries. In Bangladesh to prosecute under child pornography, provisions have been made in ‘Digital Security Act, 2018’ where it has been defined as involving child in areas of child sexuality or in sexuality and whoever commits the crime will be punished for 10 years imprisonment or 10 lac taka fine. In India, the crime is dealt with ‘The Protection of Children from Sexual Offences Act, 2012’ (POSCO) where the offenders for commission of this crime has been divided separately and has provision for punishments starting from three years to rigorous life imprisonment and shall also be liable to fine. In the Maldives, there is ‘Special Provisions Act to Deal with Child Sex Abuse Offenders, Act number 12/2009’. In this act it has been provided that a person is guilty of such an act if intentionally runs child prostitution, involves child in the creation of pornography or displays child’s sexual organ in pornography then shall be punished between 20 to 25 years of imprisonment. Nepal prosecutes this crime through ‘Act Relating to Children, 2018’ and the conviction of using child in prostitution or sexual services is imprisonment up to fifteen years and fine up to one hundred fifty thousand rupees. In Pakistan, child pornography is prosecuted with ‘Pakistan Penal Code Child Abuse Amendment Act, 2016’. This provides that one is guilty of this offence if he involves child with or without consent in such activities. It provides punishment for two to seven years of imprisonment or fine from two hundred thousand to seven hundred thousand rupees. In Bhutan child pornography is not explicitly addressed under the municipal laws. The Penal Code of Bhutan penalizes all kinds of pornography including child pornography under the provisions of computer pornography and the offence shall be a misdemeanor. Child Pornography is also prohibited under the ‘Child Care and Protection Act’. In Sri Lanka, ‘The Penal Code’ de facto criminalizes child prohibition and has a penalty of two to ten years and may also be liable to fine. The most shocking scenario exists in Afghanistan. There is no specific law for the protection of children from pornography, whereas this serious crime is present there. This paper will be conducted through a qualitative research method that is, the primary sources will be laws, and secondary sources will be journal articles and newspapers. The conclusion that can be drawn is except Afghanistan all other South Asian countries have laws for controlling this crime but still have loopholes. India has the most amended provisions. Nepal has no provision for fine, and Bhutan does not mention any specific punishment. Bangladesh compared to these countries, has a good piece of law; however, it also has space to broaden the laws for controlling child pornography.Keywords: child abuse, child pornography, life imprisonment, penal code, South Asian countries
Procedia PDF Downloads 2291781 Simultaneous Adsorption and Characterization of NOx and SOx Emissions from Power Generation Plant on Sliced Porous Activated Carbon Prepared by Physical Activation
Authors: Muhammad Shoaib, Hassan M. Al-Swaidan
Abstract:
Air pollution has been a major challenge for the scientists today, due to the release of toxic emissions from various industries like power plants, desalination plants, industrial processes and transportation vehicles. Harmful emissions into the air represent an environmental pressure that reflects negatively on human health and productivity, thus leading to a real loss in the national economy. Variety of air pollutants in the form of carbon oxides, hydrocarbons, nitrogen oxides, sulfur oxides, suspended particulate material etc. are present in air due to the combustion of different types of fuels like crude oil, diesel oil and natural gas. Among various pollutants, NOx and SOx emissions are considered as highly toxic due to its carcinogenicity and its relation with various health disorders. In Kingdom of Saudi Arabia electricity is generated by burning of crude, diesel or natural gas in the turbines of electricity stations. Out of these three, crude oil is used extensively for electricity generation. Due to the burning of the crude oil there are heavy contents of gaseous pollutants like sulfur dioxides (SOx) and nitrogen oxides (NOx), gases which are ultimately discharged in to the environment and is a serious environmental threat. The breakthrough point in case of lab studies using 1 gm of sliced activated carbon adsorbant comes after 20 and 30 minutes for NOx and SOx, respectively, whereas in case of PP8 plant breakthrough point comes in seconds. The saturation point in case of lab studies comes after 100 and 120 minutes and for actual PP8 plant it comes after 60 and 90 minutes for NOx and SOx adsorption, respectively. Surface characterization of NOx and SOx adsorption on SAC confirms the presence of peaks in the FT-IR spectrum. CHNS study verifies that the SAC is suitable for NOx and SOx along with some other C and H containing compounds coming out from stack emission stream from the turbines of a power plant.Keywords: activated carbon, flue gases, NOx and SOx adsorption, physical activation, power plants
Procedia PDF Downloads 3481780 The Decision-Making Mechanisms of Tax Regulations
Authors: Nino Pailodze, Malkhaz Sulashvili, Vladimer Kekenadze, Tea Khutsishvili, Irma Makharashvili, Aleksandre Kekenadze
Abstract:
In the nearest future among the important problems which Georgia has solve the most important is economic stability, that bases on fiscal policy and the proper definition of the its directions. The main source of the Budget revenue is the national income. The State uses taxes, loans and emission in order to create national income, were the principal weapon are taxes. As well as fiscal function of the fulfillment of the budget, tax systems successfully implement economic and social development and the regulatory functions of foreign economic relations. A tax is a mandatory, unconditional monetary payment to the budget made by a taxpayer in accordance with this Code, based on the necessary, nonequivalent and gratuitous character of the payment. Taxes shall be national and local. National taxes shall be the taxes provided for under this Code, the payment of which is mandatory across the whole territory of Georgia. Local taxes shall be the taxes provided for under this Code, introduced by normative acts of local self-government representative authorities (within marginal rates), the payment of which is mandatory within the territory of the relevant self-governing unit. National taxes have the leading role in tax systems, but also the local taxes have an importance role in tax systems. Exactly in the means of local taxes, the most part of the budget is formatted. National taxes shall be: income tax, profit tax, value added tax (VAT), excise tax, import duty, property tax shall be a local tax The property tax is one of the significant taxes in Georgia. The paper deals with the taxation mechanism that has been operated in Georgia. The above mention has the great influence in financial accounting. While comparing foreign legislation towards Georgian legislation we discuss the opportunity of using their experience. Also, we suggested recommendations in order to improve the tax system in financial accounting. In addition to accounting, which is regulated according the International Accounting Standards we have tax accounting, which is regulated by the Tax Code, various legal orders / regulations of the Minister of Finance. The rules are controlled by the tax authority, Revenue Service. The tax burden from the tax values are directly related to expenditures of the state from the emergence of the first day. Fiscal policy of the state is as well as expenditure of the state and decisions of taxation. In order to get the best and the most effective mobilization of funds, Government’s primary task is to decide the kind of taxation rules. Tax function is to reveal the substance of the act. Taxes have the following functions: distribution or the fiscal function; Control and regulatory functions. Foreign tax systems evolved in the different economic, political and social conditions influence. The tax systems differ greatly from each other: taxes, their structure, typing means, rates, the different levels of fiscal authority, the tax base, the tax sphere of action, the tax breaks.Keywords: international accounting standards, financial accounting, tax systems, financial obligations
Procedia PDF Downloads 2431779 Ecological and Historical Components of the Cultural Code of the City of Florence as Part of the Edutainment Project Velonotte International
Authors: Natalia Zhabo, Sergey Nikitin, Marina Avdonina, Mariya Nikitina
Abstract:
The analysis of the activities of one of the events of the international educational and entertainment project Velonotte is provided: an evening bicycle tour with children around Florence. The aim of the project is to develop methods and techniques for increasing the sensitivity of the cycling participants and listeners of the radio broadcasts to the treasures of the national heritage, in this case, to the historical layers of the city and the ecology of the Renaissance epoch. The block of educational tasks is considered, and the issues of preserving the identity of the city are discussed. Methods. The Florentine event was prepared during more than a year. First of all the creative team selected such events of the history of the city which seem to be important for revealing the specifics of the city, its spirit - from antiquity to our days – including the forums of Internet with broad public opinion. Then a route (seven kilometers) was developed, which was proposed to the authorities and organizations of the city. The selection of speakers was conducted according to several criteria: they should be authors of books, famous scientists, connoisseurs in a certain sphere (toponymy, history of urban gardens, art history), capable and willing to talk with participants directly at the points of stops, in order to make a dialogue and so that performances could be organized with their participation. The music was chosen for each part of the itinerary to prepare the audience emotionally. Cards for coloring with images of the main content of each stop were created for children. A site was done to inform the participants and to keep photos, videos and the audio files with speakers’ speech afterward. Results: Held in April 2017, the event was dedicated to the 640th Anniversary of the Filippo Brunelleschi, Florentine architect, and to the 190th anniversary of the publication of Florence guide by Stendhal. It was supported by City of Florence and Florence Bike Festival. Florence was explored to transfer traditional elements of culture, sometimes unfairly forgotten from ancient times to Brunelleschi and Michelangelo and Tschaikovsky and David Bowie with lectures by professors of Universities. Memorable art boards were installed in public spaces. Elements of the cultural code are deeply internalized in the minds of the townspeople, the perception of the city in everyday life and human communication is comparable to such fundamental concepts of the self-awareness of the townspeople as mental comfort and the level of happiness. The format of a fun and playful walk with the ICT support gives new opportunities for enriching the city's cultural code of each citizen with new components, associations, connotations.Keywords: edutainment, cultural code, cycling, sensitization Florence
Procedia PDF Downloads 2211778 Effect of Birks Constant and Defocusing Parameter on Triple-to-Double Coincidence Ratio Parameter in Monte Carlo Simulation-GEANT4
Authors: Farmesk Abubaker, Francesco Tortorici, Marco Capogni, Concetta Sutera, Vincenzo Bellini
Abstract:
This project concerns with the detection efficiency of the portable triple-to-double coincidence ratio (TDCR) at the National Institute of Metrology of Ionizing Radiation (INMRI-ENEA) which allows direct activity measurement and radionuclide standardization for pure-beta emitter or pure electron capture radionuclides. The dependency of the simulated detection efficiency of the TDCR, by using Monte Carlo simulation Geant4 code, on the Birks factor (kB) and defocusing parameter has been examined especially for low energy beta-emitter radionuclides such as 3H and 14C, for which this dependency is relevant. The results achieved in this analysis can be used for selecting the best kB factor and the defocusing parameter for computing theoretical TDCR parameter value. The theoretical results were compared with the available ones, measured by the ENEA TDCR portable detector, for some pure-beta emitter radionuclides. This analysis allowed to improve the knowledge of the characteristics of the ENEA TDCR detector that can be used as a traveling instrument for in-situ measurements with particular benefits in many applications in the field of nuclear medicine and in the nuclear energy industry.Keywords: Birks constant, defocusing parameter, GEANT4 code, TDCR parameter
Procedia PDF Downloads 1481777 Curcumin Reduces the Expression of Main Fibrogenic Genes and Phosphorylation of Smad3C Signaling Pathway in TGFB-Activated Human HSCs. A New Remedy for Liver Fibrosis
Authors: Elham Shakerian, Reza Afarin
Abstract:
The hepatic disease causes approximately 2 million deaths/year worldwide. Liver fibrosis is the last stage of numerous chronic liver diseases, and until now there is no definite cure or drug for it. Activation of hepatic stellate cells (HSCs) is the main reason for fibrosis. Transforming growth factor (TGF-β), as a main profibrogenic cytokine, if increased in these cells, leads to liver fibrosis through smad3 signaling pathways and increasing the expressions of Collagen type I and III, and actin-alpha smooth muscle (αSMA) genes. Curcumin (CUR) is a polyphenolic compound and an active ingredient derived from the rhizome of the turmeric plant that exerts effective antioxidant, anti-inflammatory, and antimicrobial activity. It has been shown that daily consumption of curcumin may have a protective effect on the liver against oxidative stress associated with alcohol consumption. In this study, we investigate the role of Curcumin in decreasing HSC activation and treating liver fibrosis. First, the human HSCs were treated with 2 ng/ml of (TGF-β) for 24 hours to become activated, then with Silibinin for 24 hours. Total RNAs were extracted, reversely transcribed into cDNA, Quantitative Real-time PCR, and western blot were performed. The mRNA expression levels of Collagen type I and III, αSMA genes, and the level of smad3 phosphorylation in TGF-β activated human HSCs treated with Curcumin were significantly reduced compared to human HSCs untreated with Curcumin. Curcumin is effective in reducing the expression of fibrogenic genes in the activated human HSCs treated with TGFB through downregulation of the TGF-β/smad3 signaling pathway. Therefore, Curcumin possesses significant antifibrotic properties in hepatic fibrosisKeywords: hepatic fibrosis, human HSCs, curcumin, fibrogenic genes
Procedia PDF Downloads 1231776 Pharmacological Mechanisms of an Indolic Compound in Chemoprevention of Colonic Acf Formation in Azoxymethane-Induced Colon Cancer Rat Model and Cell Lines
Authors: Nima Samie, Sekaran Muniandy, Zahurin Mohamed, M. S. Kanthimathi
Abstract:
Although number of indole containing compounds have been reported to have anticancer properties in vitro but only a few of them show potential as anticancer compounds in vivo. The current study was to evaluate the mechanism of cytotoxicity of selected indolic compound in vivo and in vitro. In this context, we determined the potency of the compound in the induction of apoptosis, cell cycle arrest, and cytoskeleton rearrangement. HT-29, WiDr, CCD-18Co, human monocyte/macrophage CRL-9855, and B lymphocyte CCL-156 cell lines were used to determine the IC50 of the compound using the MTT assay. Analysis of apoptosis was carried out using immunofluorescence, acridine orange/ propidium iodide double staining, Annexin-V-FITC assay, evaluation of the translocation of NF-kB, oxygen radical antioxidant capacity, quenching of reactive oxygen species content, measurement of LDH release, caspase-3/-7, -8 and -9 assays and western blotting. The cell cycle arrest was examined using flowcytometry and gene expression was assessed using qPCR array. Results displayed a potent suppressive effect on HT-29 and WiDr after 24 h of treatment with IC50 value of 2.52±0.34 µg/ml and 2.13±0.65 µg/ml respectively. This cytotoxic effect on normal, monocyte/macrophage and B-cells was insignificant. Dipping in the mitochondrial membrane potential and increased release of cytochrome c from the mitochondria indicated induction of the intrinsic apoptosis pathway by the compound. Activation of this pathway was further evidenced by significant activation of caspase-9 and 3/7. The compound was also shown to activate the extrinsic pathways of apoptosis via activation of caspase-8 which is linked to the suppression of NF-kB translocation to the nucleus. Cell cycle arrest in the G1 phase and up-regulation of glutathione reductase, based on excessive ROS production were also observed. These findings were further investigated for inhibitory efficiency of the compound on colonic aberrant crypt foci in male rats. Rats were divided in to 5 groups: vehicle, cancer control, positive control groups and the groups treated with 25 and 50 mg/kg of compounds for 10 weeks. Administration of compound suppressed total colonic ACF formation up to 73.4%. The results also showed that treatment with the compound significantly reduced the level of malondialdehyde while increasing superoxide dismutase and catalase activities. Furthermore, the down-regulation of PCNA and Bcl2 and the up-regulation of Bax was confirmed by immunohistochemical staining. The outcome of this study suggest sthat the indolic compound is a potent anti-cancer agent against colon cancer and can be further evaluated by animal trial.Keywords: indolic compound, chemoprevention, crypt, azoxymethane, colon cancer
Procedia PDF Downloads 3481775 Utilization of Activated Carbon for the Extraction and Separation of Methylene Blue in the Presence of Acid Yellow 61 Using an Inclusion Polymer Membrane
Authors: Saâd Oukkass, Abderrahim Bouftou, Rachid Ouchn, L. Lebrun, Miloudi Hlaibi
Abstract:
We invariably exist in a world steeped in colors, whether in our clothing, food, cosmetics, or even medications. However, most of the dyes we use pose significant problems, being both harmful to the environment and resistant to degradation. Among these dyes, methylene blue and acid yellow 61 stand out, commonly used to dye various materials such as cotton, wood, and silk. Fortunately, various methods have been developed to treat and remove these polluting dyes, among which membrane processes play a prominent role. These methods are praised for their low energy consumption, ease of operation, and their ability to achieve effective separation of components. Adsorption on activated carbon is also a widely employed technique, complementing the basic processes. It proves particularly effective in capturing and removing organic compounds from water due to its substantial specific surface area while retaining its properties unchanged. In the context of our study, we examined two crucial aspects. Firstly, we explored the possibility of selectively extracting methylene blue from a mixture containing another dye, acid yellow 61, using a polymer inclusion membrane (PIM) made of PVA. After characterizing the morphology and porosity of the membrane, we applied kinetic and thermodynamic models to determine the values of permeability (P), initial flux (J0), association constant (Kass), and apparent diffusion coefficient (D*). Subsequently, we measured activation parameters (activation energy (Ea), enthalpy (ΔH#ass), entropy (ΔS#)). Finally, we studied the effect of activated carbon on the processes carried out through the membrane, demonstrating a clear improvement. These results make the membrane developed in this study a potentially pivotal player in the field of membrane separation.Keywords: dyes, methylene blue, membrane, activated carbon
Procedia PDF Downloads 821774 Performance Evaluation of Wideband Code Division Multiplication Network
Authors: Osama Abdallah Mohammed Enan, Amin Babiker A/Nabi Mustafa
Abstract:
The aim of this study is to evaluate and analyze different parameters of WCDMA (wideband code division multiplication). Moreover, this study also incorporates brief yet throughout analysis of WCDMA’s components as well as its internal architecture. This study also examines different power controls. These power controls may include open loop power control, closed or inner group loop power control and outer loop power control. Different handover techniques or methods of WCDMA are also illustrated in this study. These handovers may include hard handover, inter system handover and soft and softer handover. Different duplexing techniques are also described in the paper. This study has also presented an idea about different parameters of WCDMA that leads the system towards QoS issues. This may help the operator in designing and developing adequate network configuration. In addition to this, the study has also investigated various parameters including Bit Energy per Noise Spectral Density (Eb/No), Noise rise, and Bit Error Rate (BER). After simulating these parameters, using MATLAB environment, it was investigated that, for a given Eb/No value the system capacity increase by increasing the reuse factor. Besides that, it was also analyzed that, noise rise is decreasing for lower data rates and for lower interference levels. Finally, it was examined that, BER increase by using one type of modulation technique than using other type of modulation technique.Keywords: duplexing, handover, loop power control, WCDMA
Procedia PDF Downloads 216