Search results for: memory isolation
1274 β-Lactamase Inhibitory Effects of Anchusa azurea Extracts
Authors: Naoual Boussoualim, Hayat Trabsa, Iman Krache, Lekhmici Arrar, Abderrahmane Baghiani
Abstract:
Resistance to antibiotics has emerged following their widespread use; the important mechanism of beta-lactam resistance in bacteria is the production of beta-lactamase. In order to find new bioactive beta-lactamase inhibitors, this study investigated the inhibition effect of the extracts of Anchusa azurea (AA) on a beta-lactamase from Bacillus cereus. The extracts exerted inhibitory effects on beta-lactamase in a dose-dependent manner, the results showed that the crude extract (BrE) and the ethyl acetate extract (AcE) of Anchusa azurea showed a very high inhibitory activity at a concentration of 10 mg, the percentage of inhibition was between 58% and 68%. Not all extracts were as potent as the original inhibitors such as clavulanic acid, the isolation and the structural elucidation of the active constituents in these extracts will provide useful means in the development of beta -lactamase inhibitors.Keywords: Anchusa azurea, natural product, resistance, antibiotics, beta-lactamase, inhibitors
Procedia PDF Downloads 5091273 Grid Computing for Multi-Objective Optimization Problems
Authors: Aouaouche Elmaouhab, Hassina Beggar
Abstract:
Solving multi-objective discrete optimization applications has always been limited by the resources of one machine: By computing power or by memory, most often both. To speed up the calculations, the grid computing represents a primary solution for the treatment of these applications through the parallelization of these resolution methods. In this work, we are interested in the study of some methods for solving multiple objective integer linear programming problem based on Branch-and-Bound and the study of grid computing technology. This study allowed us to propose an implementation of the method of Abbas and Al on the grid by reducing the execution time. To enhance our contribution, the main results are presented.Keywords: multi-objective optimization, integer linear programming, grid computing, parallel computing
Procedia PDF Downloads 4831272 Incorporating Anomaly Detection in a Digital Twin Scenario Using Symbolic Regression
Authors: Manuel Alves, Angelica Reis, Armindo Lobo, Valdemar Leiras
Abstract:
In industry 4.0, it is common to have a lot of sensor data. In this deluge of data, hints of possible problems are difficult to spot. The digital twin concept aims to help answer this problem, but it is mainly used as a monitoring tool to handle the visualisation of data. Failure detection is of paramount importance in any industry, and it consumes a lot of resources. Any improvement in this regard is of tangible value to the organisation. The aim of this paper is to add the ability to forecast test failures, curtailing detection times. To achieve this, several anomaly detection algorithms were compared with a symbolic regression approach. To this end, Isolation Forest, One-Class SVM and an auto-encoder have been explored. For the symbolic regression PySR library was used. The first results show that this approach is valid and can be added to the tools available in this context as a low resource anomaly detection method since, after training, the only requirement is the calculation of a polynomial, a useful feature in the digital twin context.Keywords: anomaly detection, digital twin, industry 4.0, symbolic regression
Procedia PDF Downloads 1181271 Elderly in Sub Saharan Africa
Authors: Obinna Benedict Duru
Abstract:
This study focuses on the elderly and the challenges that confront them. The elderly are that particular segment of our population who by virtue of the aging process have attained the stage in most cases where they are confronted with the challenges of economic dependency and social marginality. These challenges are as a result of the physical and biological decline occasioned by social myths and realities which portray the elderly as a dependent population whose members could not and should not work and who need social assistance that the younger population is obliged to provide. From the moment of birth to the moment of death, our bodies are constantly changing. We are all enmeshed in the process of growing old, a transition from youthfulness to elderliness. In youth-oriented modern societies like ours, we tend to attach positive importance and significance to the biological changes that occur early in life and define later physical changes in negative terms. Children growing up and young adults receive more attention, greater responsibilities and more legal rights to reward them on their way. But few people are congratulated on getting old. We commiserate with people who are getting old and make jokes about their supposedly physical, mental and biological decline. Wrinkles, loss of weight and vitality are all parts of the aging process. In almost all parts of the world, earlier researches have shown that about fifty percent of the elderly who suffer from stroke, arthritis, senility and other age related diseases are the disengaged and neglected elderly. Rapid technological changes render the knowledge and skills of the elderly obsolete; education is geared toward the young and the generational competition for jobs leads to pressures on the elderly to retire. Control of initial resources are shifted to the middle-aged and older workers are pushed into positions of economic dependency. This study therefore, among other things tend to discover how some government policies have affected the elderly particularly in Africa. To discover the prospects and possibilities of the elderly for a better living. To make a comparison of the advances in healthcare giving made in the advanced western societies to the practice in Sub Saharan Africa etc. The hypotheses of this study include: that the elderly in Sub Saharan Africa are more vulnerable than their counterparts in Europe and America. The elderly are more prone to social isolation, and that the elderly are mostly affected by age-related sickness etc. With a survey method as the research design, and sample size of about 500 respondents,probability sampling technique was used. Data which were analyzed using chi-square and tables were collected through primary and secondary sources. The findings made include: that the elderly suffer pains of old age especially when disengaged from work or social activity. That loss of income condemn the elderly to a life of vegetable existence, and that those who do not have other means of re-integration usually see old age with regret and despair. It is therefore, recommended among other things that social welfare scheme and the process of re-integration at old age be introduced for the non pensionable elderly in Africa.Keywords: elderly, social isolation, dependency, re-integration
Procedia PDF Downloads 3321270 Secondary Metabolites from Turkish Marine-Derived Fungi Hypocrea nigricans
Authors: H. Heydari, B. Konuklugil, P. Proksch
Abstract:
Marine-derived fungi can produce interesting bioactive secondary metabolites that can be considered the potential for drug development. Turkey is a country of a peninsula surrounded by the Black Sea at the north, the Aegean Sea at the west, and the Mediterranean Sea at the south. Despite the approximately 8400 km of coastline, studies on marine secondary metabolites and their biological activity are limited. In our ongoing search for new natural products with different bioactivities produced by the marine-derived fungi, we have investigated secondary metabolites of Turkish collection of the marine sea slug (Peltodoris atromaculata) associated fungi Hypocrea nigricans collected from Seferihisar in the Egean sea. According to the author’s best knowledge, no study was found on this fungal species in terms of secondary metabolites. Isolated from ethyl acetate extract of the culture of Hypocrea nigricans were (isodihydroauroglaucin,tetrahydroauroglaucin and dihydroauroglaucin. The structures of the compounds were established based on an NMR and MS analysis. Structural elucidation of another isolated secondary metabolite/s continues.Keywords: Hypocrea nigricans, isolation, marine fungi, secondary metabolites
Procedia PDF Downloads 1601269 [Keynote Talk]: The Intoxicated Eyewitness: Effect of Alcohol Consumption on Identification Accuracy in Lineup
Authors: Vikas S. Minchekar
Abstract:
The eyewitness is a crucial source of evidence in the criminal judicial system. However, rely on the reminiscence of an eyewitness especially intoxicated eyewitness is not always judicious. It might lead to some serious consequences. Day by day, alcohol-related crimes or the criminal incidences in bars, nightclubs, and restaurants are increasing rapidly. Tackling such cases is very complicated to any investigation officers. The people in that incidents are violated due to the alcohol consumption hence, their ability to identify the suspects or recall these phenomena is affected. The studies on the effects of alcohol consumption on motor activities such as driving and surgeries have received much attention. However, the effect of alcohol intoxication on memory has received little attention from the psychology, law, forensic and criminology scholars across the world. In the Indian context, the published articles on this issue are equal to none up to present day. This field experiment investigation aimed at to finding out the effect of alcohol consumption on identification accuracy in lineups. Forty adult, social drinkers, and twenty sober adults were randomly recruited for the study. The sober adults were assigned into 'placebo' beverage group while social drinkers were divided into two group e. g. 'low dose' of alcohol (0.2 g/kg) and 'high dose' of alcohol (0.8 g/kg). The social drinkers were divided in such a way that their level of blood-alcohol concentration (BAC) will become different. After administering the beverages for the placebo group and liquor to the social drinkers for 40 to 50 minutes of the period, the five-minute video clip of mock crime is shown to all in a group of four to five members. After the exposure of video, clip subjects were given 10 portraits and asked them to recognize whether they are involved in mock crime or not. Moreover, they were also asked to describe the incident. The subjects were given two opportunities to recognize the portraits and to describe the events; the first opportunity is given immediately after the video clip and the second was 24 hours later. The obtained data were analyzed by one-way ANOVA and Scheffe’s posthoc multiple comparison tests. The results indicated that the 'high dose' group is remarkably different from the 'placebo' and 'low dose' groups. But, the 'placebo' and 'low dose' groups are equally performed. The subjects in a 'high dose' group recognized only 20% faces correctly while the subjects in a 'placebo' and 'low dose' groups are recognized 90 %. This study implied that the intoxicated witnesses are less accurate to recognize the suspects and also less capable of describing the incidents where crime has taken place. Moreover, this study does not assert that intoxicated eyewitness is generally less trustworthy than their sober counterparts.Keywords: intoxicated eyewitness, memory, social drinkers, lineups
Procedia PDF Downloads 2671268 Characterization of Onboard Reliable Error Correction Code FORSDRAM Controller
Authors: N. Pitcheswara Rao
Abstract:
In the process of conveying the information there may be a chance of signal being corrupted which leads to the erroneous bits in the message. The message may consist of single, double and multiple bit errors. In high-reliability applications, memory can sustain multiple soft errors due to single or multiple event upsets caused by environmental factors. The traditional hamming code with SEC-DED capability cannot be address these types of errors. It is possible to use powerful non-binary BCH code such as Reed-Solomon code to address multiple errors. However, it could take at least a couple dozen cycles of latency to complete first correction and run at a relatively slow speed. In order to overcome this drawback i.e., to increase speed and latency we are using reed-Muller code.Keywords: SEC-DED, BCH code, Reed-Solomon code, Reed-Muller code
Procedia PDF Downloads 4251267 Re-interpreting Ruskin with Respect to the Wall
Authors: Anjali Sadanand, R. V. Nagarajan
Abstract:
Architecture morphs with advances in technology and the roof, wall, and floor as basic elements of a building, follow in redefining themselves over time. Their contribution is bound by time and held by design principles that deal with function, sturdiness, and beauty. Architecture engages with people to give joy through its form, material, design structure, and spatial qualities. This paper attempts to re-interpret John Ruskin’s “Seven lamps of Architecture” in the context of the architecture of the modern and present period. The paper focuses on the “wall” as an element of study in this context. Four of Ruskin’s seven lamps will be discussed, namely beauty, truth, life, and memory, through examples of architecture ranging from modernism to contemporary architecture of today. The study will focus on the relevance of Ruskin’s principles to the “wall” in specific, in buildings of different materials and over a range of typologies from all parts of the world. Two examples will be analyzed for each lamp. It will be shown that in each case, there is relevance to the significance of Ruskin’s lamps in modern and contemporary architecture. Nature to which Ruskin alludes to for his lamp of “beauty” is found in the different expressions of interpretation used by Corbusier in his Villa Stein façade based on proportion found in nature and in the direct expression of Toyo Ito in his translation of an understanding of the structure of trees into his façade design of the showroom for a Japanese bag boutique. “Truth” is shown in Mies van der Rohe’s Crown Hall building with its clarity of material and structure and Studio Mumbai’s Palmyra House, which celebrates the use of natural materials and local craftsmanship. “Life” is reviewed with a sustainable house in Kerala by Ashrams Ravi and Alvar Aalto’s summer house, which illustrate walls as repositories of intellectual thought and craft. “Memory” is discussed with Charles Correa’s Jawahar Kala Kendra and Venturi’s Vana Venturi house and discloses facades as text in the context of its materiality and iconography. Beauty is reviewed in Villa Stein and Toyo Ito’s Branded Retail building in Tokyo. The paper thus concludes that Ruskin’s Lamps can be interpreted in today’s context and add richness to meaning to the understanding of architecture.Keywords: beauty, design, facade, modernism
Procedia PDF Downloads 1161266 Design of a Phemt Buffer Amplifier in Mm-Wave Band around 60 GHz
Authors: Maryam Abata, Moulhime El Bekkali, Said Mazer, Catherine Algani, Mahmoud Mehdi
Abstract:
One major problem of most electronic systems operating in the millimeter wave band is the signal generation with a high purity and a stable carrier frequency. This problem is overcome by using the combination of a signal with a low frequency local oscillator (LO) and several stages of frequency multipliers. The use of these frequency multipliers to create millimeter-wave signals is an attractive alternative to direct generation signal. Therefore, the isolation problem of the local oscillator from the other stages is always present, which leads to have various mechanisms that can disturb the oscillator performance, thus a buffer amplifier is often included in oscillator outputs. In this paper, we present the study and design of a buffer amplifier in the mm-wave band using a 0.15μm pHEMT from UMS foundry. This amplifier will be used as a part of a frequency quadrupler at 60 GHz.Keywords: Mm-wave band, local oscillator, frequency quadrupler, buffer amplifier
Procedia PDF Downloads 5421265 Faults Diagnosis by Thresholding and Decision tree with Neuro-Fuzzy System
Authors: Y. Kourd, D. Lefebvre
Abstract:
The monitoring of industrial processes is required to ensure operating conditions of industrial systems through automatic detection and isolation of faults. This paper proposes a method of fault diagnosis based on a neuro-fuzzy hybrid structure. This hybrid structure combines the selection of threshold and decision tree. The validation of this method is obtained with the DAMADICS benchmark. In the first phase of the method, a model will be constructed that represents the normal state of the system to fault detection. Signatures of the faults are obtained with residuals analysis and selection of appropriate thresholds. These signatures provide groups of non-separable faults. In the second phase, we build faulty models to see the flaws in the system that cannot be isolated in the first phase. In the latest phase we construct the tree that isolates these faults.Keywords: decision tree, residuals analysis, ANFIS, fault diagnosis
Procedia PDF Downloads 6251264 Mindfulness and Motivational Based Intervention for Pregnant Women with Tobacco Dependency: Pilot Study
Authors: Ilona Krone
Abstract:
Maternal smoking during pregnancy increases the risk of perinatal/postnatal negative health outcomes; however, only 1 in 5 pregnant smokers quit smoking. That is a clinical and public health problem. Pregnant smokers have negative paternal support, and higher levels of perceived stress than non-smokers and quitters return to smoking in a stressful situation. A crisis like the COVID-19 outbreak causes significant uncertainty and stress. For pregnant women, additional stress may increase due to concerns for their fetus. Strategies targeting maternal stress and isolation may be particularly useful to prevent negative outcomes for women and their fetuses. Within the post-doctoral study, cooperating with leading specialists, an innovative program for pregnant smokers will be developed. Feasibility for reducing craving, distress intolerance, Covid 19 related stress, and fear in pregnant women in Latvia will be assessed.Keywords: COVID 19, mindfulness, motivation, pregnancy, smoking cessation
Procedia PDF Downloads 2161263 Who Killed Kalief? Examining the Effects of Solitary Confinement on Juvenile Detainees in the United States
Authors: Esther Baldwin
Abstract:
It is well settled that the use of solitary confinement can cause psychological and physical harm to detainees. For juveniles, who are more susceptible to irreparable harm due to their underdeveloped psyches, the risks are exacerbated. Despite these risks, across the United States juvenile detainees are regularly held in isolation for prolonged periods of time. This essay will examine the broad impact of solitary confinement on juvenile detainees while giving particular focus to the story of Kalief Browder, a juvenile awaiting trial on Rikers Island in New York for a period of three years, nearly two years of which were spent in solitary confinement. Although sadly, his story is not uncommon, Kalief’s story offers a unique perspective in that it provides first-hand insight on the effects of solitary confinement on juveniles. It is our hope that by sharing his story, we will demand better detention practices and policies for juveniles under correctional control in the United States.Keywords: criminal justice system, juveniles, Kalief browder, solitary confinement
Procedia PDF Downloads 3221262 Test of Biological Control against Brachytrupes Megacephalus Lefèbre, 1827 (Orthoptera, Gryllinae) by Using Entomopathogenic Fungi
Authors: W. Lakhdari, B. Doumendji-Mitich, A. Dahliz, S. Doumendji, Y. Bouchikh, R. M'lik, H. Hammi, A. Soud
Abstract:
This work was done in order to fight against Brachytrupes megacephalus, a major pest in the Algerian oasis and promote one aspect of biological control against it. He wears a hand on the isolation and identification of indigenous fungi on imagos of this insect harvested in the station of INRAA Touggourt and secondly, the study of the pathogenicity of these strains fungal on this orthoptère adults. The results obtained showed the presence of six different species of entomopathogenic fungi, it is: Aspergillus flavus, Fusarium sp, Beauveria bassiana, Penicillium sp, Metharizium anisopliae and Aspergillus Niger. The pathogenicity test using fungi Beauveria bassiana strains and Metharizium anisopliae. On adult of B. megacephalus highlights the effectiveness of these strains of predatory adults, with a mortality rate approaching 100% after 11 days.Keywords: biological control, brachytrupes megacephalus, entomopathogenic fungi, Southeastern Algeria
Procedia PDF Downloads 4091261 A New Resonance Solution to Suppress the Voltage Stresses in the Forward Topology Used in a Switch Mode Power Supply
Authors: Maamar Latroch, Mohamed Bourahla
Abstract:
Forward topology used in switch mode power supply (SMPS) is one of the most famous configuration feeding DC systems such as telecommunication systems and other specific applications where the galvanic isolation is required. This configuration benefits of the high frequency feature of the transformer to provide a small size and light weight of the over all system. However, the stresses existing on the power switch during an ON/OFF commutation limit the transmitted power to the DC load. This paper investigates the main causes of the stresses in voltage existing during a commutation cycle and suggest a low cost solution that eliminates the overvoltage. As a result, this configuration will yield the possibility of the use of this configuration in higher power applications. Simulation results will show the efficiency of the presented method.Keywords: switch mode power supply, forward topology, resonance topology, high frequency commutation
Procedia PDF Downloads 4361260 Characterization of Onboard Reliable Error Correction Code for SDRAM Controller
Authors: Pitcheswara Rao Nelapati
Abstract:
In the process of conveying the information there may be a chance of signal being corrupted which leads to the erroneous bits in the message. The message may consist of single, double and multiple bit errors. In high-reliability applications, memory can sustain multiple soft errors due to single or multiple event upsets caused by environmental factors. The traditional hamming code with SEC-DED capability cannot be address these types of errors. It is possible to use powerful non-binary BCH code such as Reed-Solomon code to address multiple errors. However, it could take at least a couple dozen cycles of latency to complete first correction and run at a relatively slow speed. In order to overcome this drawback i.e., to increase speed and latency we are using reed-Muller code.Keywords: SEC-DED, BCH code, Reed-Solomon code, Reed-Muller code
Procedia PDF Downloads 4261259 Analysis of Probiotic Properties of Lactobacillus Acidophilus from Commercial Yoghurt
Authors: Anwar Ali Abdulla, Thekra Abdulaali Abed Al-Chaabawi, Anwar Kadhim Al-Saffar, Hussein Kadhim Al-Saffar
Abstract:
Lactic acid bacteria are very significant to human health due to the production of some antimicrobial substances and ability to inhibit pathogenic bacteria. Furthermore, the bacteria are also used as starter culture in the production of various foods. The present study was focused on isolation and characterization of Lactobacillus acidophilus from yogurt and to demonstrate some of probiotic properties of these isolates. All isolates were phenotypically characterized including studying, biochemical, effect of sodium chloride and pH during growth, carbohydrates test and characterizing the antimicrobial activity of Lactobacillus acidophilus against pathogens. The present study demonstrates that Lactobacillus acidophilus produced a bacteriocin- like inhibitory substance with a broad spectrum of antimicrobial activity directed against pathogenic indicator organism suggesting its protective value against enteric pathogens.Keywords: lactobacillus acidophilus, bacteriocin, antimicrobial activity, probiotic
Procedia PDF Downloads 5361258 An Investigation into the Use of Overset Mesh for a Vehicle Aerodynamics Case When Driving in Close Proximity
Authors: Kushal Kumar Chode, Remus Miahi Cirstea
Abstract:
In recent times, the drive towards more efficient vehicles and the increase in the number of vehicle on the roads has driven the aerodynamic researchers from studying the vehicle in isolation towards understanding the benefits of vehicle platooning. Vehicle platooning is defined as a series of vehicles traveling in close proximity. Due to the limitations in size and load measurement capabilities for the wind tunnels facilities, it is very difficult to perform this investigation experimentally. In this paper, the use of chimera or overset meshing technique is used within the STARCCM+ software to model the flow surrounding two identical vehicle models travelling in close proximity and also during an overtaking maneuver. The results are compared with data obtained from a polyhedral mesh and identical physics conditions. The benefits in terms of computational time and resources and the accuracy of the overset mesh approach are investigated.Keywords: chimera mesh, computational accuracy, overset mesh, platooning vehicles
Procedia PDF Downloads 3491257 Performance Evaluation of the Classic seq2seq Model versus a Proposed Semi-supervised Long Short-Term Memory Autoencoder for Time Series Data Forecasting
Authors: Aswathi Thrivikraman, S. Advaith
Abstract:
The study is aimed at designing encoders for deciphering intricacies in time series data by redescribing the dynamics operating on a lower-dimensional manifold. A semi-supervised LSTM autoencoder is devised and investigated to see if the latent representation of the time series data can better forecast the data. End-to-end training of the LSTM autoencoder, together with another LSTM network that is connected to the latent space, forces the hidden states of the encoder to represent the most meaningful latent variables relevant for forecasting. Furthermore, the study compares the predictions with those of a traditional seq2seq model.Keywords: LSTM, autoencoder, forecasting, seq2seq model
Procedia PDF Downloads 1521256 Misleading Node Detection and Response Mechanism in Mobile Ad-Hoc Network
Authors: Earleen Jane Fuentes, Regeene Melarese Lim, Franklin Benjamin Tapia, Alexis Pantola
Abstract:
Mobile Ad-hoc Network (MANET) is an infrastructure-less network of mobile devices, also known as nodes. These nodes heavily rely on each other’s resources such as memory, computing power, and energy. Thus, some nodes may become selective in forwarding packets so as to conserve their resources. These nodes are called misleading nodes. Several reputation-based techniques (e.g. CORE, CONFIDANT, LARS, SORI, OCEAN) and acknowledgment-based techniques (e.g. TWOACK, S-TWOACK, EAACK) have been proposed to detect such nodes. These techniques do not appropriately punish misleading nodes. Hence, this paper addresses the limitations of these techniques using a system called MINDRA.Keywords: acknowledgment-based techniques, mobile ad-hoc network, selfish nodes, reputation-based techniques
Procedia PDF Downloads 3831255 Efficacy and Safety of COVID-19 Vaccination in Patients with Multiple Sclerosis: Looking Forward to Post-COVID-19
Authors: Achiron Anat, Mathilda Mandel, Mayust Sue, Achiron Reuven, Gurevich Michael
Abstract:
Introduction: As coronavirus disease 2019 (COVID-19) vaccination is currently spreading around the world, it is of importance to assess the ability of multiple sclerosis (MS) patients to mount an appropriate immune response to the vaccine in the context of disease-modifying treatments (DMT’s). Objectives: Evaluate immunity generated following COVID-19 vaccination in MS patients, and assess factors contributing to protective humoral and cellular immune responses in MS patients vaccinated against severe acute respiratory syndrome coronavirus 2 (SARS-CoV2) virus infection. Methods: Review our recent data related to (1) the safety of PfizerBNT162b2 COVID-19 mRNA vaccine in adult MS patients; (2) the humoral post-vaccination SARS-CoV2 IgG response in MS vaccinees using anti-spike protein-based serology; and (3) the cellular immune response of memory B-cells specific for SARS-CoV-2 receptor-binding domain (RBD) and memory T-cells secreting IFN-g and/or IL-2 in response to SARS-CoV2 peptides using ELISpot/Fluorospot assays in MS patients either untreated or under treatment with fingolimod, cladribine, or ocrelizumab; (4) covariate parameters related to mounting protective immune responses. Results: COVID-19 vaccine proved safe in MS patients, and the adverse event profile was mainly characterised by pain at the injection site, fatigue, and headache. Not any increased risk of relapse activity was noted and the rate of patients with acute relapse was comparable to the relapse rate in non-vaccinated patients during the corresponding follow-up period. A mild increase in the rate of adverse events was noted in younger MS patients, among patients with lower disability, and in patients treated with DMTs. Following COVID-19 vaccination protective humoral immune response was significantly decreased in fingolimod- and ocrelizumab- treated MS patients. SARS-CoV2 specific B-cell and T-cell cellular responses were respectively decreased. Untreated MS patients and patients treated with cladribine demonstrated protective humoral and cellular immune responses, similar to healthy vaccinated subjects. Conclusions: COVID-19 BNT162b2 vaccine proved as safe for MS patients. No increased risk of relapse activity was noted post-vaccination. Although COVID-19 vaccination is new, accumulated data demonstrate differences in immune responses under various DMT’s. This knowledge can help to construct appropriate COVID-19 vaccine guidelines to ensure proper immune responses for MS patients.Keywords: covid-19, vaccination, multiple sclerosis, IgG
Procedia PDF Downloads 1381254 Block Mining: Block Chain Enabled Process Mining Database
Authors: James Newman
Abstract:
Process mining is an emerging technology that looks to serialize enterprise data in time series data. It has been used by many companies and has been the subject of a variety of research papers. However, the majority of current efforts have looked at how to best create process mining from standard relational databases. This paper is the first pass at outlining a database custom-built for the minimal viable product of process mining. We present Block Miner, a blockchain protocol to store process mining data across a distributed network. We demonstrate the feasibility of storing process mining data on the blockchain. We present a proof of concept and show how the intersection of these two technologies helps to solve a variety of issues, including but not limited to ransomware attacks, tax documentation, and conflict resolution.Keywords: blockchain, process mining, memory optimization, protocol
Procedia PDF Downloads 1011253 Isolation and Structural Elucidation of 20 Hydroxyecdystone from Vitex doniana Sweet Stem Bark
Authors: Mustapha A. Tijjani, Fanna I. Abdulrahman, Irfan Z. Khan, Umar K. Sandabe, Cong Li
Abstract:
Air dried sample V. doniana after collection and identification was extracted with ethanol and further partition with chloroform, ethyl acetate and n-butanol. Ethanolic extract (11.9g) was fractionated on a silica gel accelerated column chromatography using solvents such as n-hexane, ethyl acetate and methanol. Each eluent fractions (150ml aliquots) were collected and monitored with thin layer chromatography. Fractions with similar Rf values from same solvents system were pooled together. Phytochemical test of all the fractions were performed using standard procedure. Complete elution yielded 48 fractions (150ml/fraction) which were pooled to 24 fractions base on the Rf values. It was further recombined and 12 fractions were obtained on the basis on Rf values and coded Vd1 to Vd12 fractions. Vd8 was further eluted with ethylacetate and methanol and gave fourteen sub fractions Vd8-a, -Vd8-m. Fraction Vd8-a (56mg) gave a white crystal compound coded V1. It was further checked on TLC and observed under ultraviolet lamp and was found to give a single spot. The Rf values were calculated to be 0.433. The melting point was determined using Gallenkamp capillary melting point apparatus and found to be 241-243°C uncorrected. Characterization of the isolated compound coded V1 was done using FT-infra-red spectroscopy, HNMR, 13CNMR(1and 2D) and HRESI-MS. The IR spectrum of compound V1 shows prominent peaks that corresponds to OHstr (3365cm-1) and C=0 (1652cm-1) etc. This spectrum suggests that among the functional moiety in compound V1 are the carbonyl and hydroxyl group. The 1H NMR (400 MHz) spectrum of compound V1 in DMSO-d6 displayed five singlet signals at δ 0.72 (3H, s, H-18), 0.79 (3H, s, H-19), 1.03 (3H, s, H-21), 1.04 (3H, s, H-26), 1.06 (3H, s, H-27) each integrating for three protons indicating the five methyl functional groups present in the compound. It further showed a broad singlet at δ 5.58 integrated for 1 H due to an olefinic H-atom adjacent to the carbonyl carbon atom. Three signals at δ 3.10 (d, J = 9.0 Hz, H-22), 3.59 (m, 1H, 2H-a) and 3.72 (m, 1H, 3H-e), each integrating for one proton is due to oxymethine protons indicating that three oxymethine H-atoms are present in the compound. These all signals are characteristic to the ecdysteroid skeletons. The 13C-NMR spectrum showed the presence of 27 carbon atoms, suggesting that may be steroid skeleton. The DEPT-135 experiment showed the presence of five CH3, eight CH2, and seven CH groups, and seven quaternary C-atoms. The molecular formula was established as C27H44O7 by high resolution electron spray ionization-mass spectroscopy (HRESI-MS) positive ion mode m/z 481.3179. The signals in mass spectrum are 463, 445, and 427 peaks corresponding to losses of one, two, three, or four water molecules characteristic for ecdysterone skeleton reported in the literature. Based on the spectral analysis (HNMR, 13CNMR, DEPT, HMQC, IR, HRESI-MS) the compound V1 is thus concluded to have ecdysteriod skeleton and conclusively conforms with 2β, 3β 14α, 20R, 22R, 25-hexahydroxy-5 β cholest-7-ene-6- one, or 2, 3, 14, 20, 22, 25 hexahydroxy cholest-7-ene-6-one commonly known as 20-hydroxyecdysone.Keywords: vitex, phytochemical, purification, isolation, chromatography, spectroscopy
Procedia PDF Downloads 3541252 The Relationship Between Sleep Characteristics and Cognitive Impairment in Patients with Alzheimer’s Disease
Authors: Peng Guo
Abstract:
Objective: This study investigates the clinical characteristics of sleep disorders (SD) in patients with Alzheimer's disease (AD) and their relationship with cognitive impairment. Methods: According to the inclusion and exclusion criteria of AD, 460 AD patients were consecutively included in Beijing Tiantan Hospital from January 2016 to April 2022. Demographic data, including gender, age, age of onset, course of disease, years of education and body mass index, were collected. The Pittsburgh sleep quality index (PSQI) scale was used to evaluate the overall sleep status. AD patients with PSQI ≥7 was divided into AD with SD (AD-SD) group, and those with PSQI < 7 were divided into AD with no SD (AD-nSD) group. The overall cognitive function of AD patients was evaluated by the scales of Mini-mental state examination (MMSE) and Montreal cognitive assessment (MoCA), memory was evaluated by the AVLT-immediate recall, AVLT-delayed recall and CFT-delayed memory scales, the language was evaluated by BNT scale, visuospatial ability was evaluated by CFT-imitation, executive function was evaluated by Stroop-A, Stroop-B and Stroop-C scales, attention was evaluated by TMT-A, TMT-B, and SDMT scales. The correlation between cognitive function and PSQI score in AD-SD group was analyzed. Results: Among the 460 AD patients, 173 cases (37.61%) had SD. There was no significant difference in gender, age, age of onset, course of disease, years of education and body mass index between AD-SD and AD-nSD groups (P>0.05). The factors with significant difference in PSQI scale between AD-SD and AD-nSD groups include sleep quality, sleep latency, sleep duration, sleep efficiency, sleep disturbance, use of sleeping medication and daytime dysfunction (P<0.05). Compared with AD-nSD group, the total scores of MMSE, MoCA, AVLT-immediate recall and CFT-imitation scales in AD-SD group were significantly lower(P<0.01,P<0.01,P<0.01,P<0.05). In AD-SD group, subjective sleep quality was significantly and negatively correlated with the scores of MMSE, MoCA, AVLT-immediate recall and CFT-imitation scales (r=-0.277,P=0.000; r=-0.216,P=0.004; r=-0.253,P=0.001; r=-0.239, P=0.004), daytime dysfunction was significantly and negatively correlated with the score of AVLT-immediate recall scale (r=-0.160,P=0.043). Conclusion The incidence of AD-SD is 37.61%. AD-SD patients have worse subjective sleep quality, longer time to fall asleep, shorter sleep time, lower sleep efficiency, severer nighttime SD, more use of sleep medicine, and severer daytime dysfunction. The overall cognitive function, immediate recall and visuospatial ability of AD-SD patients are significantly impaired and are closely correlated with the decline of subjective sleep quality. The impairment of immediate recall is highly correlated with daytime dysfunction in AD-SD patients.Keywords: Alzheimer's disease, sleep disorders, cognitive impairment, correlation
Procedia PDF Downloads 301251 Cultural Studies in the Immigration Movements: Memories and Social Collectives
Authors: María Eugenia Peltzer, María Estela Rodríguez
Abstract:
This work presents an approach to the cultural aspects of the Immigrants as part of the Cultural Intangible Heritage of Argentina. The intangible cultural heritage consists of the manifestations, practices, uses, representations, expressions, knowledge, techniques and cultural spaces that communities and groups recognize as an integral part of their cultural heritage. This heritage generates feelings of identity and establishes links with the collective memory, as well as being transmitted and recreated over time according to its environment, its interaction with nature and its history contributing to promote respect for cultural diversity and Human creativity. The Immigrants brings together those who came from other lands and their descendants, thus maintaining their traditions through time and linking the members of each cultural group with a strong sense of belonging through a communicative and effective process.Keywords: cultural, immigration, memories, social
Procedia PDF Downloads 4361250 Impact of Network Workload between Virtualization Solutions on a Testbed Environment for Cybersecurity Learning
Authors: Kevin Fernagut, Olivier Flauzac, Erick M. G. Robledo, Florent Nolot
Abstract:
The adoption of modern lightweight virtualization often comes with new threats and network vulnerabilities. This paper seeks to assess this with a different approach studying the behavior of a testbed built with tools such as Kernel-Based Virtual Machine (KVM), Linux Containers (LXC) and Docker, by performing stress tests within a platform where students experiment simultaneously with cyber-attacks, and thus observe the impact on the campus network and also find the best solution for cyber-security learning. Interesting outcomes can be found in the literature comparing these technologies. It is, however, difficult to find results of the effects on the global network where experiments are carried out. Our work shows that other physical hosts and the faculty network were impacted while performing these trials. The problems found are discussed, as well as security solutions and the adoption of new network policies.Keywords: containerization, containers, cybersecurity, cyberattacks, isolation, performance, virtualization, virtual machines
Procedia PDF Downloads 1471249 Thermodynamic Trends in Co-Based Alloys via Inelastic Neutron Scattering
Authors: Paul Stonaha, Mariia Romashchenko, Xaio Xu
Abstract:
Magnetic shape memory alloys (MSMAs) are promising technological materials for a range of fields, from biomaterials to energy harvesting. We have performed inelastic neutron scattering on two powder samples of cobalt-based high-entropy MSMAs across a range of temperatures in an effort to compare calculations of thermodynamic properties (entropy, specific heat, etc.) to the measured ones. The measurements were correct for multiphonon scattering and multiple scattering contributions. We present herein the neutron-weighted vibrational density of states. Future work will utilize DFT calculations of the disordered lattice to correct for the neutron weighting and retrieve the true thermodynamical properties.Keywords: neutron scattering, vibrational dynamics, computational physics, material science
Procedia PDF Downloads 311248 Research on the Optimization of Satellite Mission Scheduling
Authors: Pin-Ling Yin, Dung-Ying Lin
Abstract:
Satellites play an important role in our daily lives, from monitoring the Earth's environment and providing real-time disaster imagery to predicting extreme weather events. As technology advances and demands increase, the tasks undertaken by satellites have become increasingly complex, with more stringent resource management requirements. A common challenge in satellite mission scheduling is the limited availability of resources, including onboard memory, ground station accessibility, and satellite power. In this context, efficiently scheduling and managing the increasingly complex satellite missions under constrained resources has become a critical issue that needs to be addressed. The core of Satellite Onboard Activity Planning (SOAP) lies in optimizing the scheduling of the received tasks, arranging them on a timeline to form an executable onboard mission plan. This study aims to develop an optimization model that considers the various constraints involved in satellite mission scheduling, such as the non-overlapping execution periods for certain types of tasks, the requirement that tasks must fall within the contact range of specified types of ground stations during their execution, onboard memory capacity limits, and the collaborative constraints between different types of tasks. Specifically, this research constructs a mixed-integer programming mathematical model and solves it with a commercial optimization package. Simultaneously, as the problem size increases, the problem becomes more difficult to solve. Therefore, in this study, a heuristic algorithm has been developed to address the challenges of using commercial optimization package as the scale increases. The goal is to effectively plan satellite missions, maximizing the total number of executable tasks while considering task priorities and ensuring that tasks can be completed as early as possible without violating feasibility constraints. To verify the feasibility and effectiveness of the algorithm, test instances of various sizes were generated, and the results were validated through feedback from on-site users and compared against solutions obtained from a commercial optimization package. Numerical results show that the algorithm performs well under various scenarios, consistently meeting user requirements. The satellite mission scheduling algorithm proposed in this study can be flexibly extended to different types of satellite mission demands, achieving optimal resource allocation and enhancing the efficiency and effectiveness of satellite mission execution.Keywords: mixed-integer programming, meta-heuristics, optimization, resource management, satellite mission scheduling
Procedia PDF Downloads 241247 Aesthetics and Semiotics in Theatre Performance
Authors: Păcurar Diana Istina
Abstract:
Structured in three chapters, the article attempts an X-ray of the theatrical aesthetics, correctly understood through the emotions generated in the intimate structure of the spectator that precedes the triggering of the viewer’s perception and not through the superposition, unfortunately common, of the notion of aesthetics with the style in which a theater show is built. The first chapter contains a brief history of the appearance of the word aesthetic, the formulation of definitions for this new term, as well as its connections with the notions of semiotics, in particular with the perception of the message transmitted. Starting with Aristotle and Plato, and reaching Magritte, their interventions should not be interpreted in the sense that the two scientific concepts can merge into one discipline. The perception that is the object of everyone’s analysis, the understanding of meaning, the decoding of the messages sent, and the triggering of feelings that culminate in pleasure, shaping the aesthetic vision, are some elements that keep semiotics and aesthetics distinct, even though they share many methods of analysis. The compositional processes of aesthetic representation and symbolic formation are analyzed in the second part of the paper from perspectives that include or do not include historical, cultural, social, and political processes. Aesthetics and the organization of its symbolic process are treated, taking into account expressive activity. The last part of the article explores the notion of aesthetics in applied theater, more specifically in the theater show. Taking the postmodern approach that aesthetics applies to the creation of an artifact and the reception of that artifact, the intervention of these elements in the theatrical system must be emphasized –that is, the analysis of the problems arising in the stages of the creation, presentation, and reception, by the public, of the theater performance. The aesthetic process is triggered involuntarily, simultaneously, or before the moment when people perceive the meaning of the messages transmitted by the work of art. The finding of this fact makes the mental process of aesthetics similar or related to that of semiotics. No matter how perceived individually, beauty, the mechanism of production can be reduced to two. The first step presents similarities to Peirce’s model, but the process between signified and signified additionally stimulates the related memory of the evaluation of beauty, adding to the meanings related to the signification itself. Then, the second step, a process of comparison, is followed, in which one examines whether the object being looked at matches the accumulated memory of beauty. Therefore, even though aesthetics is derived from the conceptual part, the judgment of beauty and, more than that, moral judgment come to be so important to the social activities of human beings that it evolves as a visible process independent of other conceptual contents.Keywords: aesthetics, semiotics, symbolic composition, subjective joints, signifying, signified
Procedia PDF Downloads 1091246 Inhibitory Effect on TNF-Alpha Release of Dioscorea membranacea and Its Compounds
Authors: Arunporn Itharat, Srisopa Ruangnoo, Pakakrong Thongdeeying
Abstract:
The rhizomes of Dioscorea membranacea (DM) has long been used in Thai Traditional medicine to treat cancer and inflammatory conditions such as rheumatism. The objective of this study was to investigate anti-inflammatory activity by determining the inhibitory effect on LPS-induced TNF-α from RAW264.7 cells of crude extracts and pure isolated compounds from DM. Three known dihydrophenantrene compounds were isolated by a bioassay guided isolation method from DM ethanolic extract [2,4 dimethoxy-5,6-dihydroxy-9,10-dihydrophenanthrene (1) and 5-hydroxy-2,4,6-trimethoxy-9,10-dihydrophenanthrene(2) and 5,6,2 -trihydroxy 3,4-methoxy, 9,10- dihydrophenanthrene (3)]. 1 showed the highest inhibitory effect on PGE2, followed by 3 and 1 (IC50 = 2.26, 4.97 and >20 μg/ml or 8.31,17.25 and > 20 µM respectively). These findings suggest that this plant showed anti-inflamatory effects by displaying an inhibitory effect on TNF-α release, hence, this result supports the usage of Thai traditional medicine to treat inflammation related diseases.Keywords: Dioscorea membranacea, anti-inflammatory activity, TNF-Alpha , dihidrophenantrene compound
Procedia PDF Downloads 5011245 My Dress, My Body and My Choice Politics in Kenya
Authors: Emmy Kipsoi
Abstract:
Kenya legalized the Sexual offence bill (2001), after vigorous campaigning and lobbying by feminist both in and out of parliament to ensure that the bill passed with minimal amendments. The sexual offense act provides for a good description on what constitutes sexual offences and the penalties that follow. It is from this context that the paper explores and interrogated the lived experiences of women living and working in Kenyan urban towns, who had experienced some form of sexual harassment. The study employed phenomenology to interpret the experiences of twenty (20) women in an urban town between the ages of 20 to 65 years women who had received at least some formal education and where engaged in some formal form of employment. The findings indicated that various forms of sexual harassment were experienced in the Kenyan town. Secondly, the knowledge about the contents of the bill wanting most of the women interviews were not aware of the protection accorded by law. The number of reported cases of sexual harassment shed light on the isolation, frustration and fear that women live despite a progressive law in printKeywords: Kenya, phenomenology, sexual harassment, women
Procedia PDF Downloads 307