Search results for: protein interaction network
9670 Clarifying the Possible Symptomatic Pathway of Comorbid Depression, Anxiety, and Stress Among Adolescents Exposed to Childhood Trauma: Insight from the Network Approach
Authors: Xinyuan Zou, Qihui Tang, Shujian Wang, Yulin Huang, Jie Gui, Xiangping Liu, Gang Liu, Yanqiang Tao
Abstract:
Childhood trauma can have a long-lasting influence on individuals and contribute to mental disorders, including depression and anxiety. The current study aimed to explore the symptomatic and developmental patterns of depression, anxiety, and stress among adolescents who have suffered from childhood trauma. A total of 3,598 college students (female = 1,617 (44.94%), Mean Age = 19.68, SD Age = 1.35) in China completed the Childhood Trauma Questionnaire (CTQ) and the Depression, Anxiety, and Stress Scales (DASS-21), and 2,337 participants met the selection standard based on the cut-off scores of the CTQ. The symptomatic network and directed acyclic graph (DAG) network approaches were used. The results revealed that males reported experiencing significantly more physical abuse, physical neglect, emotional neglect, and sexual abuse compared to females. However, females scored significantly higher than males on all items of DASS-21, except for “Worthless”. No significant difference between the two genders was observed in the network structure and global strength. Meanwhile, among all participants, “Down-hearted” and “Agitated” appeared to be the most interconnected symptoms, the bridge symptoms in the symptom network, as well as the most vital symptoms in the DAG network. Apart from that, “No-relax” also served as the most prominent symptom in the DAG network. The results suggested that intervention targeted at assisting adolescents in developing more adaptive coping strategies with stress and regulating emotion could benefit the alleviation of comorbid depression, anxiety, and stress.Keywords: symptom network, childhood trauma, depression, anxiety, stress
Procedia PDF Downloads 599669 Improved Performance Using Adaptive Pre-Coding in the Cellular Network
Authors: Yong-Jun Kim, Jae-Hyun Ro, Chang-Bin Ha, Hyoung-Kyu Song
Abstract:
This paper proposes the cooperative transmission scheme with pre-coding because the cellular communication requires high reliability. The cooperative transmission scheme uses pre-coding method with limited feedback information among small cells. Particularly, the proposed scheme has adaptive mode according to the position of mobile station. Thus, demand of recent wireless communication is resolved by this scheme. From the simulation results, the proposed scheme has better performance compared to the conventional scheme in the cellular network.Keywords: CDD, cellular network, pre-coding, SPC
Procedia PDF Downloads 5699668 Development of Non-frozen Vegan Burger Patty Using Tender Jackfruit (Artocarpus Heterophyllus) as a Meat Substitute: Evaluation of Textural, Physico-Chemical, and Sensory Characteristics
Authors: O. D. A. N. Perera, H. G. Wanigasinghe
Abstract:
Tender jackfruit is an underutilized biomass, which still has a good consumer demand. Valorization of this ingredient into meat analog would obtain greater consumer acceptance due to concerns about health, the environment, and living sustainably of mankind have increased significantly in this decade, opening the market for meat substitutes. The objective of this research was to create a plant-based meat substitute with a structure similar to meat products. In this study, three different combinations of tender jackfruit were used to create vegan burger patties, which were then examined for their textural, physico-chemical, and sensory qualities. The developed burger patties have been compared with store-bought chicken patties. The developed vegan burger patties P1, P2, and P3 had a comparable flavor preference to the control and demonstrated considerable general acceptability (p >.05). P3 has a high quantity of protein (17.10 ± 0.02%) and fiber (6.40 ± 0.06%). At the same time, the vegan burger patty resulted in less fat, high fiber, and high protein which meets the vegan consumer requirements.Keywords: underutilized, high fibre, soya protein isolate, cooking yield
Procedia PDF Downloads 659667 Estimation of Residual Stresses in Thick Walled Cylinder by Radial Basis Artificial Neural
Authors: Mohammad Heidari
Abstract:
In this paper a method for high strength steel is proposed of residual stresses in autofrettaged tubes by combination of artificial neural networks is presented. Many different thick walled cylinders that were subjected to different conditions were studied. At first, the residual stress is calculated by analytical solution. Then by changing of the parameters that influenced in residual stresses such as percentage of autofrettage, internal pressure, wall ratio of cylinder, material property of cylinder, bauschinger and hardening effect factor, a neural network is created. These parameters are the input of network. The output of network is residual stress. Numerical data, employed for training the network and capabilities of the model in predicting the residual stress has been verified. The output obtained from neural network model is compared with numerical results, and the amount of relative error has been calculated. Based on this verification error, it is shown that the radial basis function of neural network has the average error of 2.75% in predicting residual stress of thick wall cylinder. Further analysis of residual stress of thick wall cylinder under different input conditions has been investigated and comparison results of modeling with numerical considerations shows a good agreement, which also proves the feasibility and effectiveness of the adopted approach.Keywords: thick walled cylinder, residual stress, radial basis, artificial neural network
Procedia PDF Downloads 4169666 Simplified 3R2C Building Thermal Network Model: A Case Study
Authors: S. M. Mahbobur Rahman
Abstract:
Whole building energy simulation models are widely used for predicting future energy consumption, performance diagnosis and optimum control. Black box building energy modeling approach has been heavily studied in the past decade. The thermal response of a building can also be modeled using a network of interconnected resistors (R) and capacitors (C) at each node called R-C network. In this study, a model building, Case 600, as described in the “Standard Method of Test for the Evaluation of Building Energy Analysis Computer Program”, ASHRAE standard 140, is studied along with a 3R2C thermal network model and the ASHRAE clear sky solar radiation model. Although building an energy model involves two important parts of building component i.e., the envelope and internal mass, the effect of building internal mass is not considered in this study. All the characteristic parameters of the building envelope are evaluated as on Case 600. Finally, monthly building energy consumption from the thermal network model is compared with a simple-box energy model within reasonable accuracy. From the results, 0.6-9.4% variation of monthly energy consumption is observed because of the south-facing windows.Keywords: ASHRAE case study, clear sky solar radiation model, energy modeling, thermal network model
Procedia PDF Downloads 1469665 Grid Based Traffic Vulnerability Model Using Betweenness Centrality for Urban Disaster Management Information
Authors: Okyu Kwon, Dongho Kang, Byungsik Kim, Seungkwon Jung
Abstract:
We propose a technique to measure the impact of loss of traffic function in a particular area to surrounding areas. The proposed method is applied to the city of Seoul, which is the capital of South Korea, with a population of about ten million. Based on the actual road network in Seoul, we construct an abstract road network between 1kmx1km grid cells. The link weight of the abstract road network is re-adjusted considering traffic volume measured at several survey points. On the modified abstract road network, we evaluate the traffic vulnerability by calculating a network measure of betweenness centrality (BC) for every single grid cells. This study analyzes traffic impacts caused by road dysfunction due to heavy rainfall in urban areas. We could see the change of the BC value in all other grid cells by calculating the BC value once again when the specific grid cell lost its traffic function, that is, when the node disappeared on the grid-based road network. The results show that it is appropriate to use the sum of the BC variation of other cells as the influence index of each lattice cell on traffic. This research was supported by a grant (2017-MOIS31-004) from Fundamental Technology Development Program for Extreme Disaster Response funded by Korean Ministry of Interior and Safety (MOIS).Keywords: vulnerability, road network, beweenness centrality, heavy rainfall, road impact
Procedia PDF Downloads 959664 Analysis of the Impact of Suez Canal on the Robustness of Global Shipping Networks
Abstract:
The Suez Canal plays an important role in global shipping networks and is one of the most frequently used waterways in the world. The 2021 canal obstruction by ship Ever Given in March 2021, however, completed blocked the Suez Canal for a week and caused significant disruption to world trade. Therefore, it is very important to quantitatively analyze the impact of the accident on the robustness of the global shipping network. However, the current research on maritime transportation networks is usually limited to local or small-scale networks in a certain region. Based on the complex network theory, this study establishes a global shipping complex network covering 2713 nodes and 137830 edges by using the real trajectory data of the global marine transport ship automatic identification system in 2018. At the same time, two attack modes, deliberate (Suez Canal Blocking) and random, are defined to calculate the changes in network node degree, eccentricity, clustering coefficient, network density, network isolated nodes, betweenness centrality, and closeness centrality under the two attack modes, and quantitatively analyze the actual impact of Suez Canal Blocking on the robustness of global shipping network. The results of the network robustness analysis show that Suez Canal blocking was more destructive to the shipping network than random attacks of the same scale. The network connectivity and accessibility decreased significantly, and the decline decreased with the distance between the port and the canal, showing the phenomenon of distance attenuation. This study further analyzes the impact of the blocking of the Suez Canal on Chinese ports and finds that the blocking of the Suez Canal significantly interferes withChina's shipping network and seriously affects China's normal trade activities. Finally, the impact of the global supply chain is analyzed, and it is found that blocking the canal will seriously damage the normal operation of the global supply chain.Keywords: global shipping networks, ship AIS trajectory data, main channel, complex network, eigenvalue change
Procedia PDF Downloads 1829663 Numerical Study of Sloshing in a Flexible Tank
Authors: Wissem Tighidet, Faïçal Naït Bouda, Moussa Allouche
Abstract:
The numerical study of the Fluid-Structure Interaction (FSI) in a partially filled flexible tank submitted to a horizontal harmonic excitation motion. It is investigated by using two-way Fluid-Structure Interaction (FSI) in a flexible tank by Coupling between the Transient Structural (Mechanical) and Fluid Flow (Fluent) in ANSYS-Workbench Student version. The Arbitrary Lagrangian-Eulerian (ALE) formulation is adopted to solve with the finite volume method, the Navier-Stokes equations in two phases in a moving domain. The Volume of Fluid (VOF) method is applied to track the free surface. However, the equations of the dynamics of the structure are solved with the finite element method assuming a linear elastic behavior. To conclude, the Fluid-Structure Interaction (IFS) has a vital role in the analysis of the dynamic behavior of the rectangular tank. The results indicate that the flexibility of the tank walls has a significant impact on the amplitude of tank sloshing and the deformation of the free surface as well as the effect of liquid sloshing on wall deformation.Keywords: arbitrary lagrangian-eulerian, fluid-structure interaction, sloshing, volume of fluid
Procedia PDF Downloads 1059662 The Overexpression of Horsegram MURLK Improves Regulation of Cell Death and Defense Responses to Microbial Pathogens
Authors: Shikha Masand, Sudesh Kumar Yadav
Abstract:
Certain protein kinases have been shown to be crucial for plant cell signaling pathways associated with plant immune responses. Here we identified a horsegram [Macrotyloma uniflorum (Lam.) Verdc.] malectin-like leucine rich receptor-like protein kinase (RLK) gene MuRLK. The functional MuRLK protein preferentially binds to mannose and N-acetyl glucosamine residues. MuRLK exists in the cytoplasm and also localizes to the plasma membrane of plant cells via its N-terminus. Over-expression of MuRLK in Arabidopsis enhances the basal resistance to infection with Pseudomonas syringae pv. tomato, Alternaria brassicicola and Hyaloperonospora arabidopsidis, are associated with elevated ROS bursts, MAPK activation, thus ultimately leading to hypersensitive cell death. Moreover, salicylic acid-dependent and jasmonic acid-dependent defense responses are also enhanced in the MuRLK-overexpressed plants that lead to HR-induced cell death. Together, these results suggest that MuRLK plays a key role in the regulation of plant cell death, early and late defense responses after the recognition of microbial pathogens.Keywords: horsegram, Pseudomonas syringae pv. tomato, MuRLK, ROS burst, cell death, plant defense
Procedia PDF Downloads 2489661 ELISA Based hTSH Assessment Using Two Sensitive and Specific Anti-hTSH Polyclonal Antibodies
Authors: Maysam Mard-Soltani, Mohamad Javad Rasaee, Saeed Khalili, Abdol Karim Sheikhi, Mehdi Hedayati
Abstract:
Production of specific antibody responses against hTSH is a cumbersome process due to the high identity between the hTSH and the other members of the glycoprotein hormone family (FSH, LH and HCG) and the high identity between the human hTSH and host animals for antibody production. Therefore, two polyclonal antibodies were purified against two recombinant proteins. Four possible ELISA tests were designed based on these antibodies. These ELISA tests were checked against hTSH and other glycoprotein hormones, and their sensitivity and specificity were assessed. Bioinformatics tools were used to analyze the immunological properties. After the immunogen region selection from hTSH protein, c terminal of B hTSH was selected and applied. Two recombinant genes, with these cut pieces (first: two repeats of C terminal of B hTSH, second: tetanous toxin+B hTSH C terminal), were designed and sub-cloned into the pET32a expression vector. Standard methods were used for protein expression, purification, and verification. Thereafter, immunizations of the white New Zealand rabbits were performed and the serums of them were used for antibody titration, purification and characterization. Then, four ELISA tests based on two antibodies were employed to assess the hTSH and other glycoprotein hormones. The results of these assessments were compared with standard amounts. The obtained results indicated that the desired antigens were successfully designed, sub-cloned, expressed, confirmed and used for in vivo immunization. The raised antibodies were capable of specific and sensitive hTSH detection, while the cross reactivity with the other members of the glycoprotein hormone family was minimum. Among the four designed tests, the test in which the antibody against first protein was used as capture antibody, and the antibody against second protein was used as detector antibody did not show any hook effect up to 50 miu/l. Both proteins have the ability to induce highly sensitive and specific antibody responses against the hTSH. One of the antibody combinations of these antibodies has the highest sensitivity and specificity in hTSH detection.Keywords: hTSH, bioinformatics, protein expression, cross reactivity
Procedia PDF Downloads 1899660 Deproteination and Demineralization of Shrimp Waste Using Lactic Acid Bacteria for the Production of Crude Chitin and Chitosan
Authors: Farramae Francisco, Rhoda Mae Simora, Sharon Nunal
Abstract:
Deproteination and demineralization efficiencies of shrimp waste using two Lactobacillus species treated with different carbohydrate sources for chitin production, its chemical conversion to chitosan and the quality of chitin and chitosan produced were determined. Using 5% glucose and 5% cassava starch as carbohydrate sources, pH slightly increased from the initial pH of 6.0 to 6.8 and 7.2, respectively after 24 h and maintained their pH at 6.7 to 7.3 throughout the treatment period. Demineralization (%) in 5 % glucose and 5 % cassava was highest during the first day of treatment which was 82% and 83%, respectively. Deproteination (%) was highest in 5% cassava starch on the 3rd day of treatment at 84.4%. The obtained chitin from 5% cassava and 5% glucose had a residual ash and protein below 1% and solubility of 59% and 44.3%, respectively. Chitosan produced from 5% cassava and 5% glucose had protein content below 0.05%; residual ash was 1.1% and 0.8%, respectively. Chitosan solubility and degree of deacetylation were 56% and 33% in 5% glucose and 48% and 29% in 5% cassava, respectively. The advantage this alternative technology offers over that of chemical extraction is large reduction in chemicals needed thus less effluent production and generation of a protein-rich liquor, although the demineralization process should be improved to achieve greater degree of deacetylation.Keywords: alternative carbon source, bioprocessing, lactic acid bacteria, waste utilization
Procedia PDF Downloads 4859659 Development of Algorithms for the Study of the Image in Digital Form for Satellite Applications: Extraction of a Road Network and Its Nodes
Authors: Zineb Nougrara
Abstract:
In this paper, we propose a novel methodology for extracting a road network and its nodes from satellite images of Algeria country. This developed technique is a progress of our previous research works. It is founded on the information theory and the mathematical morphology; the information theory and the mathematical morphology are combined together to extract and link the road segments to form a road network and its nodes. We, therefore, have to define objects as sets of pixels and to study the shape of these objects and the relations that exist between them. In this approach, geometric and radiometric features of roads are integrated by a cost function and a set of selected points of a crossing road. Its performances were tested on satellite images of Algeria country.Keywords: satellite image, road network, nodes, image analysis and processing
Procedia PDF Downloads 2749658 The Role of Micro-Ribonucleic Acid-182 and Micro-Ribonucleic Acid-214 in Cisplatin Resistance of Triple-Negative Breast Cancer Cells
Authors: Bahadir Batar, Elif Serdal, Berna Erdal, Hasan Ogul
Abstract:
Micro-ribonucleic acids (miRNAs) are small short non-coding ribonucleic acid molecules about 22 nucleotides long. miRNAs play a key role in response to chemotherapeutic agents. WW domain-containing oxidoreductase (WWOX) gene encodes a tumor suppressor protein. Loss or reduction of Wwox protein is observed in many breast cancer cases. WWOX protein deficiency is increased in triple-negative breast cancer (TNBC). TNBC is a heterogeneous, highly aggressive, and difficult to treat tumor type. WWOX loss contributes to resistance to cisplatin therapy in patients with TNBC. Here, the aim of the study was to investigate the potential role of miRNAs in cisplatin therapy resistance of WWOX-deficient TNBC cells. This was a cell culture study. miRNA expression profiling was analyzed by LightCycler 480 system. miRNA Set Enrichment Analysis tool was used to integrate experimental data with literature-based biological knowledge to infer a new hypothesis. Increased miR-182 and decreased miR-214 were significantly correlated with cisplatin resistance in WWOX-deficient TNBC cells. miR-182 and miR-214 may involve in cisplatin resistance of WWOX-deficient TNBC cells by deregulating the DNA repair, apoptosis, or protein kinase B signaling pathways. These data highlight the mechanism by which WWOX regulates cisplatin resistance of TNBC and the potential use of WWOX as a predictor biomarker for cisplatin resistance.Keywords: cisplatin, microRNA, triple-negative breast cancer, WWOX
Procedia PDF Downloads 1319657 Anticancer Activity of Calyx of Diospyros kaki Thunb. through Downregulation of Cyclin D1 Protein Level in Human Colorectal Cancer Cells
Authors: Jin Boo Jeong
Abstract:
In this study, we elucidated anti-cancer activity and potential molecular mechanism of DKC against human colorectal cancer cells. DKC-E70 suppressed the proliferation of human colorectal cancer cell lines such as HCT116, SW480, LoVo and HT-29. Although DKC-E70 decreased cyclin D1 expression in protein and mRNA level, decreased level of cyclin D1 protein by DKC-E70 occurred at the earlier time than that of cyclin D1 mRNA, which indicates that DKC-E70-mediated downregulation of cyclin D1 protein may be a consequence of the induction of degradation and transcriptional inhibition of cyclin D1. In cyclin D1 degradation, we found that cyclin D1 downregulation by DKC-E70 was attenuated in presence of MG132. In addition, DKC-E70 phosphorylated threonine-286 (T286) of cyclin D1 and T286A abolished cyclin D1 downregulation by DKC-E70. We also observed that DKC-E70-mediated T286 phosphorylation and subsequent cyclin D1 degradation was blocked in presence of the inhibitors of ERK1/2, p38 or GSK3β. In cyclin D1 transcriptional inhibition, DKC-E70 inhibited the expression of β-catenin and TCF4, and β–catenin/TCF-dependent luciferase activity. Our results suggest that DKC-E70 may downregulate cyclin D1 as one of the potential anti-cancer targets through cyclin D1 degradation by T286 phosphorylation dependent on ERK1/2, p38 or GSK3β, and cyclin D1 transcriptional inhibition through Wnt signaling. From these findings, DKC-E70 has potential to be a candidate for the development of chemoprevention or therapeutic agents for human colorectal cancer. This research was supported by Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Education (NRF-2016R1D1A3B03931713).Keywords: anticancer, calyx of persimmon, cyclin D1, Diospyros kaki Thunb., human colorectal cancer
Procedia PDF Downloads 3129656 Network Connectivity Knowledge Graph Using Dwave Quantum Hybrid Solvers
Authors: Nivedha Rajaram
Abstract:
Hybrid Quantum solvers have been given prime focus in recent days by computation problem-solving domain industrial applications. D’Wave Quantum Computers are one such paragon of systems built using quantum annealing mechanism. Discrete Quadratic Models is a hybrid quantum computing model class supplied by D’Wave Ocean SDK - a real-time software platform for hybrid quantum solvers. These hybrid quantum computing modellers can be employed to solve classic problems. One such problem that we consider in this paper is finding a network connectivity knowledge hub in a huge network of systems. Using this quantum solver, we try to find out the prime system hub, which acts as a supreme connection point for the set of connected computers in a large network. This paper establishes an innovative problem approach to generate a connectivity system hub plot for a set of systems using DWave ocean SDK hybrid quantum solvers.Keywords: quantum computing, hybrid quantum solver, DWave annealing, network knowledge graph
Procedia PDF Downloads 1279655 A Sensor Placement Methodology for Chemical Plants
Authors: Omid Ataei Nia, Karim Salahshoor
Abstract:
In this paper, a new precise and reliable sensor network methodology is introduced for unit processes and operations using the Constriction Coefficient Particle Swarm Optimization (CPSO) method. CPSO is introduced as a new search engine for optimal sensor network design purposes. Furthermore, a Square Root Unscented Kalman Filter (SRUKF) algorithm is employed as a new data reconciliation technique to enhance the stability and accuracy of the filter. The proposed design procedure incorporates precision, cost, observability, reliability together with importance-of-variables (IVs) as a novel measure in Instrumentation Criteria (IC). To the best of our knowledge, no comprehensive approach has yet been proposed in the literature to take into account the importance of variables in the sensor network design procedure. In this paper, specific weight is assigned to each sensor, measuring a process variable in the sensor network to indicate the importance of that variable over the others to cater to the ultimate sensor network application requirements. A set of distinct scenarios has been conducted to evaluate the performance of the proposed methodology in a simulated Continuous Stirred Tank Reactor (CSTR) as a highly nonlinear process plant benchmark. The obtained results reveal the efficacy of the proposed method, leading to significant improvement in accuracy with respect to other alternative sensor network design approaches and securing the definite allocation of sensors to the most important process variables in sensor network design as a novel achievement.Keywords: constriction coefficient PSO, importance of variable, MRMSE, reliability, sensor network design, square root unscented Kalman filter
Procedia PDF Downloads 1609654 Framework for Incorporating Environmental Performance in Network-Level Pavement Maintenance Program
Authors: Jessica Achebe, Susan Tighe
Abstract:
The reduction of material consumption and greenhouse gas emission when maintain and rehabilitating road networks can achieve added benefits including improved life cycle performance of pavements, reduced climate change impacts and human health effect due to less air pollution, improved productivity due to an optimal allocation of resources and reduced road user cost. This is the essence of incorporating environmental sustainability into pavement management. The functionality of performance measurement approach has made it one of the most valuable tool to Pavement Management Systems (PMSs) to account for different criteria in the decision-making process. However measuring the environmental performance of road network is still a far-fetched practice in road network management, more so an ostensive agency-wide environmental sustainability or sustainable maintenance specifications is missing. To address this challenge, this present research focuses on the environmental sustainability performance of network-level pavement management. The ultimate goal is to develop a framework to incorporate environmental sustainability in pavement management systems for network-level maintenance programming. In order to achieve this goal, this paper present the first step, the intention is to review the previous studies that employed environmental performance measures, as well as the suitability of environmental performance indicators for the evaluation of the sustainability of network-level pavement maintenance strategies. Through an industry practice survey, this paper provides a brief forward regarding the pavement manager motivations and barriers to making more sustainable decisions, and data needed to support the network-level environmental sustainability. The trends in network-level sustainable pavement management are also presented, existing gaps are highlighted, and ideas are proposed for network-level sustainable maintenance and rehabilitation programming.Keywords: pavement management, environment sustainability, network-level evaluation, performance measures
Procedia PDF Downloads 3069653 New Approach to Interactional Dynamics of E-mail Correspondence
Authors: Olga Karamalak
Abstract:
The paper demonstrates a research about theoretical understanding of writing in the electronic environment as dynamic, interactive, dialogical, and distributed activity aimed at “other-orientation” and consensual domain creation. The purpose is to analyze the personal e-mail correspondence in the academic environment from this perspective. The focus is made on the dynamics of interaction between the correspondents such as contact setting, orientation and co-functions; and the text of an e-letter is regarded as indices of the write’s state or affordances in terms of ecological linguistics. The establishment of consensual domain of interaction brings about a new stage of cognition emergence which may lead to distributed learning. The research can play an important part in the series of works dedicated to writing in the electronic environment.Keywords: consensual domain of interactions, distributed writing and learning, e-mail correspondence, interaction, orientation, co-function
Procedia PDF Downloads 5799652 Intrusion Detection System Based on Peer to Peer
Authors: Alireza Pour Ebrahimi, Vahid Abasi
Abstract:
Recently by the extension of internet usage, Research on the intrusion detection system takes a significant importance. Many of improvement systems prevent internal and external network attacks by providing security through firewalls and antivirus. In recently years, intrusion detection systems gradually turn from host-based systems and depend on O.S to the distributed systems which are running on multiple O.S. In this work, by considering the diversity of computer networks whit respect to structure, architecture, resource, services, users and also security goals requirement a fully distributed collaborative intrusion detection system based on peer to peer architecture is suggested. in this platform each partner device (matched device) considered as a peer-to-peer network. All transmitted information to network are visible only for device that use security scanning of a source. Experimental results show that the distributed architecture is significantly upgradeable in respect to centralized approach.Keywords: network, intrusion detection system, peer to peer, internal and external network
Procedia PDF Downloads 5479651 Evaluation and Analysis of ZigBee-Based Wireless Sensor Network: Home Monitoring as Case Study
Authors: Omojokun G. Aju, Adedayo O. Sule
Abstract:
ZigBee wireless sensor and control network is one of the most popularly deployed wireless technologies in recent years. This is because ZigBee is an open standard lightweight, low-cost, low-speed, low-power protocol that allows true operability between systems. It is built on existing IEEE 802.15.4 protocol and therefore combines the IEEE 802.15.4 features and newly added features to meet required functionalities thereby finding applications in wide variety of wireless networked systems. ZigBee‘s current focus is on embedded applications of general-purpose, inexpensive, self-organising networks which requires low to medium data rates, high number of nodes and very low power consumption such as home/industrial automation, embedded sensing, medical data collection, smart lighting, safety and security sensor networks, and monitoring systems. Although the ZigBee design specification includes security features to protect data communication confidentiality and integrity, however, when simplicity and low-cost are the goals, security is normally traded-off. A lot of researches have been carried out on ZigBee technology in which emphasis has mainly been placed on ZigBee network performance characteristics such as energy efficiency, throughput, robustness, packet delay and delivery ratio in different scenarios and applications. This paper investigate and analyse the data accuracy, network implementation difficulties and security challenges of ZigBee network applications in star-based and mesh-based topologies with emphases on its home monitoring application using the ZigBee ProBee ZE-10 development boards for the network setup. The paper also expose some factors that need to be considered when designing ZigBee network applications and suggest ways in which ZigBee network can be designed to provide more resilient to network attacks.Keywords: home monitoring, IEEE 802.14.5, topology, wireless security, wireless sensor network (WSN), ZigBee
Procedia PDF Downloads 3839650 Subspace Rotation Algorithm for Implementing Restricted Hopfield Network as an Auto-Associative Memory
Authors: Ci Lin, Tet Yeap, Iluju Kiringa
Abstract:
This paper introduces the subspace rotation algorithm (SRA) to train the Restricted Hopfield Network (RHN) as an auto-associative memory. Subspace rotation algorithm is a gradient-free subspace tracking approach based on the singular value decomposition (SVD). In comparison with Backpropagation Through Time (BPTT) on training RHN, it is observed that SRA could always converge to the optimal solution and BPTT could not achieve the same performance when the model becomes complex, and the number of patterns is large. The AUTS case study showed that the RHN model trained by SRA could achieve a better structure of attraction basin with larger radius(in general) than the Hopfield Network(HNN) model trained by Hebbian learning rule. Through learning 10000 patterns from MNIST dataset with RHN models with different number of hidden nodes, it is observed that an several components could be adjusted to achieve a balance between recovery accuracy and noise resistance.Keywords: hopfield neural network, restricted hopfield network, subspace rotation algorithm, hebbian learning rule
Procedia PDF Downloads 1179649 The Risk and Prevention of Peer-To-Peer Network Lending in China
Authors: Zhizhong Yuan, Lili Wang, Chenya Zheng, Wuqi Yang
Abstract:
How to encourage and support peer-to-peer (P2P) network lending, and effectively monitor the risk of P2P network lending, has become the focus of the Chinese government departments, industrialists, experts and scholars in recent years. The reason is that this convenient online micro-credit service brings a series of credit risks and other issues. Avoiding the risks brought by the P2P network lending model, it can better play a benign role and help China's small and medium-sized private enterprises with vigorous development to solve the capital needs; otherwise, it will bring confusion to the normal financial order. As a form of financial services, P2P network lending has injected new blood into China's non-government finance in the past ten years, and has found a way out for idle funds and made up for the shortage of traditional financial services in China. However, it lacks feasible measures in credit evaluation and government supervision. This paper collects a large amount of data about P2P network lending of China. The data collection comes from the official media of the Chinese government, the public achievements of existing researchers and the analysis and collation of correlation data by the authors. The research content of this paper includes literature review; the current situation of China's P2P network lending development; the risk analysis of P2P network lending in China; the risk prevention strategy of P2P network lending in China. The focus of this paper is to try to find a specific program to strengthen supervision and avoid risks from the perspective of government regulators, operators of P2P network lending platform, investors and users of funds. These main measures include: China needs to develop self-discipline organization of P2P network lending industry and formulate self-discipline norms as soon as possible; establish a regular information disclosure system of P2P network lending platform; establish censorship of credit rating of borrowers; rectify the P2P network lending platform in compliance through the implementation of bank deposition. The results and solutions will benefit all the P2P network lending platforms, creditors, debtors, bankers, independent auditors and government agencies of China and other countries.Keywords: peer-to-peer(P2P), regulation, risk prevention, supervision
Procedia PDF Downloads 1669648 Slice Bispectrogram Analysis-Based Classification of Environmental Sounds Using Convolutional Neural Network
Authors: Katsumi Hirata
Abstract:
Certain systems can function well only if they recognize the sound environment as humans do. In this research, we focus on sound classification by adopting a convolutional neural network and aim to develop a method that automatically classifies various environmental sounds. Although the neural network is a powerful technique, the performance depends on the type of input data. Therefore, we propose an approach via a slice bispectrogram, which is a third-order spectrogram and is a slice version of the amplitude for the short-time bispectrum. This paper explains the slice bispectrogram and discusses the effectiveness of the derived method by evaluating the experimental results using the ESC‑50 sound dataset. As a result, the proposed scheme gives high accuracy and stability. Furthermore, some relationship between the accuracy and non-Gaussianity of sound signals was confirmed.Keywords: environmental sound, bispectrum, spectrogram, slice bispectrogram, convolutional neural network
Procedia PDF Downloads 1269647 Communication through Offline and Online Social Network of Thai Football Premier League Supporters
Authors: Krisana Chueachainat
Abstract:
The study is about the identity, typology and symbol using in communication through offline and online social network of each Thai football Premier League supporters. Also, study is about the factors that affected the sport to become the growing business and the communication factors that play the important role in the growth of the sport business. The Thai Premier League communicated with supporters in order to show the identity of each supporter and club in different ways. The expression of the identity was shown through online social network and offline told other people who they were. The study also about the factor that impacted the roles and communication factors that make football become the growing business. The factor that impact to the growth of football to the business, if clubs can action, the sport business would be to higher level and also push Thailand’s football to be effective and equal to other countries.Keywords: online social network, offline social network, Thai football, supporters
Procedia PDF Downloads 2999646 A Multicopy Strategy for Improved Security Wireless Sensor Network
Authors: Tuğçe Yücel
Abstract:
A Wireless Sensor Network(WSN) is a collection of sensor nodes which are deployed randomly in an area for surveillance. Efficient utilization of limited battery energy of sensors for increased network lifetime as well as data security are major design objectives for WSN. Moreover secure transmission of data sensed to a base station for further processing. Producing multiple copies of data packets and sending them on different paths is one of the strategies for this purpose, which leads to redundant energy consumption and hence reduced network lifetime. In this work we develop a restricted multi-copy multipath strategy where data move through ‘frequently’ or ‘heavily’ used sensors is copied by the sensor incident to such central nodes and sent on node-disjoint paths. We develop a mixed integer programing(MIP) model and heuristic approach present some preleminary test results.Keywords: MIP, sensor, telecommunications, WSN
Procedia PDF Downloads 5109645 Different Cultures, Different Communication Styles: Dating Interaction in Australian and Chinese TV Dating Shows
Authors: Ping Yang
Abstract:
Dating interaction between males and females remains an interesting and mysterious event, particularly in different cultural contexts. This paper focuses on a comparative study of different communication styles males and females use while engaged in dating interaction in the Australian and Chinese contexts. Using communication accommodation theory (CAT) as an analytical framework, the researcher studies how the Australian males and females used a generally different communication style in an Australian dating show (Married at First Sight) than that used by their Chinese counterparts in a Chinese one (非诚勿扰, You Are the One). Based on the qualitative data analysis through NVivo 12 as a research tool, the researcher finds that Australian males and females generally use a divergent communication style characterized by self-orientation, directness, and confrontation, while Chinese counterparts use a convergent communication style characterized by other-orientation, indirectness, and non-confrontation. The researcher concludes with two possible reasons behind the similar TV dating event but with different dramas. One is due to different cultures with varying styles of communication, and the other is because of different drama effect designs suitable for different audience expectations in different cultural contexts.Keywords: communication styles, cultural contexts, face-to-face interaction, TV dating.
Procedia PDF Downloads 909644 Intra-miR-ExploreR, a Novel Bioinformatics Platform for Integrated Discovery of MiRNA:mRNA Gene Regulatory Networks
Authors: Surajit Bhattacharya, Daniel Veltri, Atit A. Patel, Daniel N. Cox
Abstract:
miRNAs have emerged as key post-transcriptional regulators of gene expression, however identification of biologically-relevant target genes for this epigenetic regulatory mechanism remains a significant challenge. To address this knowledge gap, we have developed a novel tool in R, Intra-miR-ExploreR, that facilitates integrated discovery of miRNA targets by incorporating target databases and novel target prediction algorithms, using statistical methods including Pearson and Distance Correlation on microarray data, to arrive at high confidence intragenic miRNA target predictions. We have explored the efficacy of this tool using Drosophila melanogaster as a model organism for bioinformatics analyses and functional validation. A number of putative targets were obtained which were also validated using qRT-PCR analysis. Additional features of the tool include downloadable text files containing GO analysis from DAVID and Pubmed links of literature related to gene sets. Moreover, we are constructing interaction maps of intragenic miRNAs, using both micro array and RNA-seq data, focusing on neural tissues to uncover regulatory codes via which these molecules regulate gene expression to direct cellular development.Keywords: miRNA, miRNA:mRNA target prediction, statistical methods, miRNA:mRNA interaction network
Procedia PDF Downloads 5109643 Evaluating Performance of an Anomaly Detection Module with Artificial Neural Network Implementation
Authors: Edward Guillén, Jhordany Rodriguez, Rafael Páez
Abstract:
Anomaly detection techniques have been focused on two main components: data extraction and selection and the second one is the analysis performed over the obtained data. The goal of this paper is to analyze the influence that each of these components has over the system performance by evaluating detection over network scenarios with different setups. The independent variables are as follows: the number of system inputs, the way the inputs are codified and the complexity of the analysis techniques. For the analysis, some approaches of artificial neural networks are implemented with different number of layers. The obtained results show the influence that each of these variables has in the system performance.Keywords: network intrusion detection, machine learning, artificial neural network, anomaly detection module
Procedia PDF Downloads 3429642 Finite Element Modeling of Integral Abutment Bridge for Lateral Displacement
Authors: M. Naji, A. R. Khalim, M. Naji
Abstract:
Integral Abutment Bridges (IAB) are defined as simple or multiple span bridges in which the bridge deck is cast monolithically with the abutment walls. This kind of bridges are becoming very popular due to different aspects such as good response under seismic loading, low initial costs, elimination of bearings and less maintenance. However, the main issue related to the analysis of this type of structures is dealing with soil-structure interaction of the abutment walls and the supporting piles. A two-dimensional, non-linear finite element (FE) model of an integral abutment bridge has been developed to study the effect of lateral time history displacement loading on the soil system.Keywords: integral abutment bridge, soil structure interaction, finite element modeling, soil-pile interaction
Procedia PDF Downloads 2899641 Investigation of Chord Protocol in Peer to Peer Wireless Mesh Network with Mobility
Authors: P. Prasanna Murali Krishna, M. V. Subramanyam, K. Satya Prasad
Abstract:
File sharing in networks are generally achieved using Peer-to-Peer (P2P) applications. Structured P2P approaches are widely used in adhoc networks due to its distributed and scalability features. Efficient mechanisms are required to handle the huge amount of data distributed to all peers. The intrinsic characteristics of P2P system makes for easier content distribution when compared to client-server architecture. All the nodes in a P2P network act as both client and server, thus, distributing data takes lesser time when compared to the client-server method. CHORD protocol is a resource routing based where nodes and data items are structured into a 1- dimensional ring. The structured lookup algorithm of Chord is advantageous for distributed P2P networking applications. Though, structured approach improves lookup performance in a high bandwidth wired network it could contribute to unnecessary overhead in overlay networks leading to degradation of network performance. In this paper, the performance of existing CHORD protocol on Wireless Mesh Network (WMN) when nodes are static and dynamic is investigated.Keywords: wireless mesh network (WMN), structured P2P networks, peer to peer resource sharing, CHORD Protocol, DHT
Procedia PDF Downloads 480