Search results for: mobile genetic elements
5821 Association Analysis of Putative Loci with Coronary Artery Disease
Authors: Asma Naseer Cheema, Attya Bhatti, Jabar Ali, John Peter
Abstract:
Background: High cholesterol levels, endothelial dysfunction, inefficient coagulation cascade and hyper inflammatory response all are the basis of coronary artery disease (CAD). Several studies are carried out to see the genetic influence of these factors on disease outcome. Objective: The objective of our study was to see the association of 10 putative loci with coronary artery disease in our population. Materials & Methods: We screened our population for 10 putative loci of CAD showing significant association (p < 5x10-8) with candidate genes (regulating the cholesterol metabolism, endothelial function, coagulation cascade and inflammatory response of body). Hardy-Weinberg equilibrium and linkage disequilibrium in cases and controls s were estimated separately. Approximately 5-10 ng of dried DNA in 384 well plate format was used to genotype each sample on the Sequenom iPLEX assay at University of Pittsburgh Genomics and Proteomics Core Laboratories. It was built on single-base primer extension with the MALDI-TOF MS detection possessing high sensitivity and specificity. The SNPs were genotyped through Taqman assay. Hardy Weinberg test was applied. The 10 SNPs were selected as genetic markers for this study (rs579459, rs1561198, rs2954029, rs1122608, rs17114036, rs9515203, rs10947789, rs7173743, rs2895811, rs2075650). Results: Mean age of the patient was 52 ± 11 years. Blood pressure and positive family history was found a significant risk factor for CAD. None of the selected SNPs showed significant association with coronary artery disease in our population (p>0.05). Conclusion: rs579459, rs1561198, rs2954029, rs1122608, rs17114036, rs9515203, rs10947789, rs7173743, rs2895811, rs2075650 are not significant genetic markers for CAD in our population.Keywords: CAD, genetic markers, loci, risk factors
Procedia PDF Downloads 3715820 Printing Imperfections: Development of Buckling Patterns to Improve Strength of 3D Printed Steel Plated Elements
Authors: Ben Chater, Jingbang Pan, Mark Evernden, Jie Wang
Abstract:
Traditional structural steel manufacturing routes normally produce prismatic members with flat plate elements. In these members, plate instability in the lowest buckling mode often dominates failure. It is proposed in the current study to use a new technology of metal 3D printing to print steel-plated elements with predefined imperfection patterns that can lead to higher modes of failure with increased buckling resistances. To this end, a numerical modeling program is carried out to explore various combinations of predefined buckling waves with different amplitudes in stainless steel square hollow section stub columns. Their stiffness, strength, and material consumption against the traditional structural steel members with the same nominal dimensions are assessed. It is found that depending on the slenderness of the plate elements; it is possible for an ‘imperfect’ steel member to achieve up to a 30% increase in strength with just a 3% increase in the material consumption. The obtained results shed some light on the significant potential of the new metal 3D printing technology in achieving unprecedented material efficiency and economical design in the future steel construction industry.Keywords: 3D printing, additive manufacturing, buckling resistance, steel plate buckling, structural optimisation
Procedia PDF Downloads 1465819 A Survey on Genetic Algorithm for Intrusion Detection System
Authors: Prikhil Agrawal, N. Priyanka
Abstract:
With the increase of millions of users on Internet day by day, it is very essential to maintain highly reliable and secured data communication between various corporations. Although there are various traditional security imparting techniques such as antivirus software, password protection, data encryption, biometrics and firewall etc. But still network security has become the main issue in various leading companies. So IDSs have become an essential component in terms of security, as it can detect various network attacks and respond quickly to such occurrences. IDSs are used to detect unauthorized access to a computer system. This paper describes various intrusion detection techniques using GA approach. The intrusion detection problem has become a challenging task due to the conception of miscellaneous computer networks under various vulnerabilities. Thus the damage caused to various organizations by malicious intrusions can be mitigated and even be deterred by using this powerful tool.Keywords: genetic algorithm (GA), intrusion detection system (IDS), dataset, network security
Procedia PDF Downloads 2995818 The Environmental Effects of Amalgam Tooth Fillings
Authors: Abdulsalam I. Rafida, Abdulhmid M. Alkout, Abdultif M. Alroba
Abstract:
This study investigates the heavy metal content in the saliva of persons with amalgam tooth fillings. For this purpose, samples of saliva have been collected based on two factors i.e. the number of amalgam fillings in the mouth (one, two or three fillings), and the time factor i.e. the time since the fillings have been in place (less than a year and more than a year). Samples of saliva have also been collected from persons with no amalgam tooth fillings for control. The samples that have been collected so far, have been examined for the basic heavy metal content featuring amalgam, which include mercury (Hg) and silver (Ag). However, all the above mentioned elements have been detected in the samples of saliva of the persons with amalgam tooth fillings, though with varying amounts depending on the number of fillings. Thus, for persons with only one filling the average quantities were found to be 0.00061 ppm and 0.033 ppm for Hg and Ag respectively. On the other hand for persons with two fillings the average quantities were found to be 0.0012 ppm and 0.029 ppm for each of the two elements respectively. However, in order to understand the chemical reactions associated with amalgam tooth fillings in the mouth, the material have been treated outside the mouth using some nutrient media. Those media included drinking water, fizzy drinks and hot tea. All three media have been found to contain the three elements after amalgam treatment. Yet, the fizzy drink medium was found to contain the highest levels of those elements.Keywords: amalgam, mercury, silver, fizzy drinks, media
Procedia PDF Downloads 1985817 Juvenile Paget’s Disease(JPD) of Bone
Authors: Aftab Ahmed, Ghulam Mehboob
Abstract:
The object of presentation is to highlight the importance of condition which is a very rare genetic disorder although Paget’s disease is common but its juvenile type is very rare and a late presentation due to very slow onset and lack of earlier standard management. We present a case of 25 years old male with a chronic history of bone pain and a slow onset of mild swelling, later on diagnosed as juvenile Paget disease of bone. Rarity of this condition with inaccessibility for standard health treatment can lead to a significant delay in presentation and its management. There have been 50 reported cases worldwide according to Genetic Home Reference. There is increased osteoclastic activity along with osteoblastic activity related to gene alteration and osteoprotegrin deficiency. Morbidity of disease is very significant which lead children to become immobilize.Keywords: juvenile, Paget’s disease, bone, Northern Area of Pakistan
Procedia PDF Downloads 3295816 Shovadan; A Historical Heritage in the Architecture of the South West of Iran (Case Study: Dezfoul City)
Authors: Farnaz Nazem
Abstract:
Iranian architects had creative ways for constructing the buildings in each climate. Some of these architectural elements were made under the ground. Shovadan is one of these underground spaces in hot- humid regions in Dezfoul and Shoushtar city that had special functions and characteristics. In this paper some subjects such as the history of Shovadan, its elements and effective factors in the formation of Shovadan in Dezfool city are discussed.Keywords: architecture, dezfoul city, Shovadan, south west of Iran
Procedia PDF Downloads 4705815 Application of Industrial Ergonomics in Vehicle Service System Design
Authors: Zhao Yu, Zhi-Nan Zhang
Abstract:
More and more interactive devices are used in the transportation service system. Our mobile phones, on-board computers, and Head-Up Displays (HUDs) can all be used as the tools of the in-car service system. People can access smart systems with different terminals such as mobile phones, computers, pads and even their cars and watches. Different forms of terminals bring the different quality of interaction by the various human-computer Interaction modes. The new interactive devices require good ergonomics design at each stage of the whole design process. According to the theory of human factors and ergonomics, this paper compared three types of interactive devices by four driving tasks. Forty-eight drivers were chosen to experience these three interactive devices (mobile phones, on-board computers, and HUDs) by a simulate driving process. The subjects evaluated ergonomics performance and subjective workload after the process. And subjects were encouraged to support suggestions for improving the interactive device. The result shows that different interactive devices have different advantages in driving tasks, especially in non-driving tasks such as information and entertainment fields. Compared with mobile phones and onboard groups, the HUD groups had shorter response times in most tasks. The tasks of slow-up and the emergency braking are less accurate than the performance of a control group, which may because the haptic feedback of these two tasks is harder to distinguish than the visual information. Simulated driving is also helpful in improving the design of in-vehicle interactive devices. The paper summarizes the ergonomics characteristics of three in-vehicle interactive devices. And the research provides a reference for the future design of in-vehicle interactive devices through an ergonomic approach to ensure a good interaction relationship between the driver and the in-vehicle service system.Keywords: human factors, industrial ergonomics, transportation system, usability, vehicle user interface
Procedia PDF Downloads 1415814 Phytoremediation-A Plant Based Cleansing Method to Obtain Quality Medicinal Plants and Natural Products
Authors: Hannah S. Elizabeth, D. Gnanasekaran, M. R. Manju Gowda, Antony George
Abstract:
Phytoremediation a new technology of remediating the contaminated soil, water and air using plants and serves as a green technology with environmental friendly approach. The main aim of this technique is cleansing and detoxifying of organic compounds, organo-phosphorous pesticides, heavy metals like arsenic, iron, cadmium, gold, radioactive elements which cause teratogenic and life threatening diseases to mankind and animal kingdom when consume the food crops, vegetables, fruits, cerals, and millets obtained from the contaminated soil. Also, directly they may damage the genetic materials thereby alters the biosynthetic pathways of secondary metabolites and other phytoconstituents which may have different pharmacological activities which lead to lost their efficacy and potency as well. It would reflect in mutagenicity, drug resistance and affect other antagonistic properties of normal metabolism. Is the technology for real clean-up of contaminated soils and the contaminants which are potentially toxic. It reduces the risks produced by a contaminated soil by decreasing contaminants using plants as a source. The advantages are cost-effectiveness and less ecosystem disruption. Plants may also help to stabilize contaminants by accumulating and precipitating toxic trace elements in the roots. Organic pollutants can potentially be chemically degraded and ultimately mineralized into harmless biological compounds. Hence, the use of plants to revitalize contaminated sites is gaining more attention and preferred for its cost-effective when compared to other chemical methods. The introduction of harmful substances into the environment has been shown to have many adverse effects on human health, agricultural productivity, and natural ecosystems. Because the costs of growing a crop are minimal compared to those of soil removal and replacement, the use of plants to remediate hazardous soils is seen as having great promise.Keywords: cost effective, eco-friendly, phytoremediation, secondary metabolites
Procedia PDF Downloads 2815813 An Investigation on Smartphone-Based Machine Vision System for Inspection
Authors: They Shao Peng
Abstract:
Machine vision system for inspection is an automated technology that is normally utilized to analyze items on the production line for quality control purposes, it also can be known as an automated visual inspection (AVI) system. By applying automated visual inspection, the existence of items, defects, contaminants, flaws, and other irregularities in manufactured products can be easily detected in a short time and accurately. However, AVI systems are still inflexible and expensive due to their uniqueness for a specific task and consuming a lot of set-up time and space. With the rapid development of mobile devices, smartphones can be an alternative device for the visual system to solve the existing problems of AVI. Since the smartphone-based AVI system is still at a nascent stage, this led to the motivation to investigate the smartphone-based AVI system. This study is aimed to provide a low-cost AVI system with high efficiency and flexibility. In this project, the object detection models, which are You Only Look Once (YOLO) model and Single Shot MultiBox Detector (SSD) model, are trained, evaluated, and integrated with the smartphone and webcam devices. The performance of the smartphone-based AVI is compared with the webcam-based AVI according to the precision and inference time in this study. Additionally, a mobile application is developed which allows users to implement real-time object detection and object detection from image storage.Keywords: automated visual inspection, deep learning, machine vision, mobile application
Procedia PDF Downloads 1245812 The Image of Saddam Hussein and Collective Memory: The Semiotics of Ba'ath Regime's Mural in Iraq (1980-2003)
Authors: Maryam Pirdehghan
Abstract:
During the Ba'ath Party's rule in Iraq, propaganda was utilized to justify and to promote Saddam Hussein's image in the collective memory as the greatest Arab leader. Consequently, urban walls were routinely covered with images of Saddam. Relying on these images, the regime aimed to provide a basis for evoking meanings in the public opinion, which would supposedly strengthen Saddam’s power and reconstruct facts to legitimize his political ideology. Nonetheless, Saddam was not always portrayed with common and explicit elements but in certain periods of his rule, the paintings depicted him in an unusual context, where various historical and contemporary elements were combined in a narrative background. Therefore, an understanding of the implied socio-political references of these elements is required to fully elucidate the impact of these images on forming the memory and collective unconscious of the Iraqi people. To obtain such understanding, one needs to address the following questions: a) How Saddam Hussein is portrayed in mural during his rule? b) What of elements and mythical-historical narratives are found in the paintings? c) Which Saddam's political views were subject to the collective memory through mural? Employing visual semiotics, this study reveals that during Saddam Hussein's regime, the paintings were initially simple portraits but gradually transformed into narrative images, characterized by a complex network of historical, mythical and religious elements. These elements demonstrate the transformation of a secular-nationalist politician into a Muslim ruler who tried to instill three major policies in domestic and international relations i.e. the arabization of Iraq, as well as the propagation of pan-arabism ideology (first period), the implementation of anti-Israel policy (second period) and the implementation of anti-American-British policy (last period).Keywords: Ba'ath Party, Saddam Hussein, mural, Iraq, propaganda, collective memory
Procedia PDF Downloads 3285811 Genetic Analysis of the Endangered Mangrove Species Avicennia Marina in Qatar Detected by Inter-Simple Sequence Repeat DNA Markers
Authors: Talaat Ahmed, Amna Babssail
Abstract:
Mangroves are evergreen trees and grow along the coastal areas of Qatar. The largest and oldest area of mangroves can be found around Al-Thakhira and Al-Khor. Other mangrove areas originate from fairly recent plantings by the government, although unfortunately the picturesque mangrove lake in Al-Wakra has now been uprooted. Avicinnia marina is the predominant mangrove species found in the region. Mangroves protect and stabilize low lying coastal land, and provide protection and food sources for estuarine and coastal fishery food chains. They also serve as feeding, breeding and nursery grounds for a variety of fish, crustaceans, reptiles, birds and other wildlife. A total of 21 individuals of A. marina, representing seven diverse Natural and artificial populations, were sampled throughout its range in Qatar. Leaves from 2-3 randomly selected trees at each location were collected. The locations are as follows: Al-Rawis, Ras-Madpak, Fuwairt, Summaseima, Al-khour, AL-Mafjar and Zekreet. Total genomic DNA was extracted using commercial DNeasy Plant System (Qiagen, Inc., Valencia, CA) kit to be used for genetic diversity analysis. Total of 12 (Inter-Simple Sequence Repeat) ISSR primers were used to amplify DNA fragments using genomic DNA. The 12 ISSR primers amplified polymorphic bands among mangrove samples in different areas as well as within each area indicating the existing of variation within each area and among the different areas of mangrove in Qatar. The results could characterize Avicinnia marina populations exist in different areas of Qatar and establish DNA fingerprint documentations for mangrove population to be used in further studies. Moreover, existing of genetic variation within and among Avicinnia marina populations is a strong indication for the ability of such populations to adapt different environmental conditions in Qatar. This study could be a warning to save mangrove in Qatar and save the environment as well.Keywords: DNA fingerprint, Avicinnia marina, genetic analysis, Qatar
Procedia PDF Downloads 4065810 Levels of Heavy Metals and Arsenic in Sediment and in Clarias Gariepinus, of Lake Ngami
Authors: Nashaat Mazrui, Oarabile Mogobe, Barbara Ngwenya, Ketlhatlogile Mosepele, Mangaliso Gondwe
Abstract:
Over the last several decades, the world has seen a rapid increase in activities such as deforestation, agriculture, and energy use. Subsequently, trace elements are being deposited into our water bodies, where they can accumulate to toxic levels in aquatic organisms and can be transferred to humans through fish consumption. Thus, though fish is a good source of essential minerals and omega-3 fatty acids, it can also be a source of toxic elements. Monitoring trace elements in fish is important for the proper management of aquatic systems and the protection of human health. The aim of this study was to determine concentrations of trace elements in sediment and muscle tissues of Clarias gariepinus at Lake Ngami, in the Okavango Delta in northern Botswana, during low floods. The fish were bought from local fishermen, and samples of muscle tissue were acid-digested and analyzed for iron, zinc, copper, manganese, molybdenum, nickel, chromium, cadmium, lead, and arsenic using inductively coupled plasma optical emission spectroscopy (ICP-OES). Sediment samples were also collected and analyzed for the elements and for organic matter content. Results show that in all samples, iron was found in the greatest amount while cadmium was below the detection limit. Generally, the concentrations of elements in sediment were higher than in fish except for zinc and arsenic. While the concentration of zinc was similar in the two media, arsenic was almost 3 times higher in fish than sediment. To evaluate the risk to human health from fish consumption, the target hazard quotient (THQ) and cancer risk for an average adult in Botswana, sub-Saharan Africa, and riparian communities in the Okavango Delta was calculated for each element. All elements were found to be well below regulatory limits and do not pose a threat to human health except arsenic. The results suggest that other benthic feeding fish species could potentially have high arsenic levels too. This has serious implications for human health, especially riparian households to whom fish is a key component of food and nutrition security.Keywords: Arsenic, African sharp tooth cat fish, Okavango delta, trace elements
Procedia PDF Downloads 1935809 Application of Human Biomonitoring and Physiologically-Based Pharmacokinetic Modelling to Quantify Exposure to Selected Toxic Elements in Soil
Authors: Eric Dede, Marcus Tindall, John W. Cherrie, Steve Hankin, Christopher Collins
Abstract:
Current exposure models used in contaminated land risk assessment are highly conservative. Use of these models may lead to over-estimation of actual exposures, possibly resulting in negative financial implications due to un-necessary remediation. Thus, we are carrying out a study seeking to improve our understanding of human exposure to selected toxic elements in soil: arsenic (As), cadmium (Cd), chromium (Cr), nickel (Ni), and lead (Pb) resulting from allotment land-use. The study employs biomonitoring and physiologically-based pharmacokinetic (PBPK) modelling to quantify human exposure to these elements. We recruited 37 allotment users (adults > 18 years old) in Scotland, UK, to participate in the study. Concentrations of the elements (and their bioaccessibility) were measured in allotment samples (soil and allotment produce). Amount of produce consumed by the participants and participants’ biological samples (urine and blood) were collected for up to 12 consecutive months. Ethical approval was granted by the University of Reading Research Ethics Committee. PBPK models (coded in MATLAB) were used to estimate the distribution and accumulation of the elements in key body compartments, thus indicating the internal body burden. Simulating low element intake (based on estimated ‘doses’ from produce consumption records), predictive models suggested that detection of these elements in urine and blood was possible within a given period of time following exposure. This information was used in planning biomonitoring, and is currently being used in the interpretation of test results from biological samples. Evaluation of the models is being carried out using biomonitoring data, by comparing model predicted concentrations and measured biomarker concentrations. The PBPK models will be used to generate bioavailability values, which could be incorporated in contaminated land exposure models. Thus, the findings from this study will promote a more sustainable approach to contaminated land management.Keywords: biomonitoring, exposure, PBPK modelling, toxic elements
Procedia PDF Downloads 3215808 Identity Verification Using k-NN Classifiers and Autistic Genetic Data
Authors: Fuad M. Alkoot
Abstract:
DNA data have been used in forensics for decades. However, current research looks at using the DNA as a biometric identity verification modality. The goal is to improve the speed of identification. We aim at using gene data that was initially used for autism detection to find if and how accurate is this data for identification applications. Mainly our goal is to find if our data preprocessing technique yields data useful as a biometric identification tool. We experiment with using the nearest neighbor classifier to identify subjects. Results show that optimal classification rate is achieved when the test set is corrupted by normally distributed noise with zero mean and standard deviation of 1. The classification rate is close to optimal at higher noise standard deviation reaching 3. This shows that the data can be used for identity verification with high accuracy using a simple classifier such as the k-nearest neighbor (k-NN).Keywords: biometrics, genetic data, identity verification, k nearest neighbor
Procedia PDF Downloads 2585807 Joint Optimization of Carsharing Stations with Vehicle Relocation and Demand Selection
Authors: Jiayuan Wu. Lu Hu
Abstract:
With the development of the sharing economy and mobile technology, carsharing becomes more popular. In this paper, we focus on the joint optimization of one-way station-based carsharing systems. We model the problem as an integer linear program with six elements: station locations, station capacity, fleet size, initial vehicle allocation, vehicle relocation, and demand selection. A greedy-based heuristic is proposed to address the model. Firstly, initialization based on the location variables relaxation using Gurobi solver is conducted. Then, according to the profit margin and demand satisfaction of each station, the number of stations is downsized iteratively. This method is applied to real data from Chengdu, Sichuan taxi data, and it’s efficient when dealing with a large scale of candidate stations. The result shows that with vehicle relocation and demand selection, the profit and demand satisfaction of carsharing systems are increased.Keywords: one-way carsharing, location, vehicle relocation, demand selection, greedy algorithm
Procedia PDF Downloads 1375806 Study the Relationship amongst Digital Finance, Renewable Energy, and Economic Development of Least Developed Countries
Authors: Fatima Sohail, Faizan Iftikhar
Abstract:
This paper studies the relationship between digital finance, renewable energy, and the economic development of Pakistan and least developed countries from 2000 to 2022. The paper used panel analysis and generalized method of moments Arellano-Bond approaches. The findings show that under the growth model, renewable energy (RE) has a strong and favorable link with fixed broadband and mobile subscribers. However, FB and MD have a strong but negative association with the uptake of renewable energy (RE) in the average and simple model. This paper provides valuable insights for policymakers, investors of the digital economy.Keywords: digital finance, renewable energy, economic development, mobile subscription, fixed broadband
Procedia PDF Downloads 435805 Analysis of OPG Gene Polymorphism T245G (rs3134069) in Slovak Postmenopausal Women
Authors: I. Boroňová, J. Bernasovská, J. Kľoc, Z. Tomková, E. Petrejčíková, S. Mačeková, J. Poráčová, M. M. Blaščáková
Abstract:
Osteoporosis is a common multifactorial disease with a strong genetic component characterized by reduced bone mass and increased risk of fractures. Genetic factors play an important role in the pathogenesis of osteoporosis. The aim of our study was to identify the genotype and allele distribution of T245G polymorphism in OPG gene in Slovak postmenopausal women. A total of 200 unrelated Slovak postmenopausal women with diagnosed osteoporosis and 200 normal controls were genotyped for T245G (rs3134069) polymorphism of OPG gene. Genotyping was performed using the Custom Taqman®SNP Genotyping assays. Genotypes and alleles frequencies showed no significant differences (p=0.5551; p=0.6022). The results of the present study confirm the importance of T245G polymorphism in OPG gene in the pathogenesis of osteoporosis.Keywords: OPG gene, T245G polymorphism, osteoporosis, T245G polymorphism, real-time PCR
Procedia PDF Downloads 4125804 Path loss Signals Determination in a Selected Buildings in Kazaure
Authors: Musefiu Aderinola, F. A. Amuda
Abstract:
Outages of GSM signals may be experienced at some indoor locations even when there are strong outdoor receptions. This is often traced to the building penetration loss, which account for increased attenuation of received GSM signals level when a mobile signal device is moved indoor from outdoor. In this work, measurement of two existing GSM operators signal level were made outside and inside two selected buildings- mud and block which represent the prevalent building types in Kazaure, Jigawa State, Nigeria. A gionee P2 mobile phone with RF signal tracker software installed in it was used and the result shows that an average loss of 10.62dBm and 4.25dBm for mud and block buildings respectively.Keywords: penetration loss, outdoor reception, Gionee P2, RF signal tracker, mud and block building
Procedia PDF Downloads 3025803 An Exponential Field Path Planning Method for Mobile Robots Integrated with Visual Perception
Authors: Magdy Roman, Mostafa Shoeib, Mostafa Rostom
Abstract:
Global vision, whether provided by overhead fixed cameras, on-board aerial vehicle cameras, or satellite images can always provide detailed information on the environment around mobile robots. In this paper, an intelligent vision-based method of path planning and obstacle avoidance for mobile robots is presented. The method integrates visual perception with a new proposed field-based path-planning method to overcome common path-planning problems such as local minima, unreachable destination and unnecessary lengthy paths around obstacles. The method proposes an exponential angle deviation field around each obstacle that affects the orientation of a close robot. As the robot directs toward, the goal point obstacles are classified into right and left groups, and a deviation angle is exponentially added or subtracted to the orientation of the robot. Exponential field parameters are chosen based on Lyapunov stability criterion to guarantee robot convergence to the destination. The proposed method uses obstacles' shape and location, extracted from global vision system, through a collision prediction mechanism to decide whether to activate or deactivate obstacles field. In addition, a search mechanism is developed in case of robot or goal point is trapped among obstacles to find suitable exit or entrance. The proposed algorithm is validated both in simulation and through experiments. The algorithm shows effectiveness in obstacles' avoidance and destination convergence, overcoming common path planning problems found in classical methods.Keywords: path planning, collision avoidance, convergence, computer vision, mobile robots
Procedia PDF Downloads 1965802 Genetic Diversity Analysis in Embelia Ribes by RAPD Markers
Authors: Sabitha Rani A., Nagamani V.
Abstract:
Embelia ribes Burm.f (Family-Myrsinaceae) commonly known as Vidanga or Baibirang, is one of the important medicinal plants of India. The seed extract is reported to be antidiabetic, antitumour, analgesic, anti-inflammatory, antispermatogenic, free radical scavenging activities and widely used in more than 75 Ayurvedic commercial formulations. Among the 100 different species of Embelia, E. ribes is considered as a major source of Embelin, a bioactive compound. Because of high demand and low availability, the seeds of E. ribes are substituted with many cheaper alternatives. Therefore, the present study of RAPD-PCR analysis was undertaken to develop molecular markers for identification of E. ribes. A total of 13 different seed samples of Embelia were collected from different agro-climatic regions of India. The seeds of E.ribes were collected from Kalpetta, Kerala and three different seed samples were collected from traders of Odisha, Madhya Pradesh, Maharastra. The other nine seed samples were collected from local traders which they have collected from different regions of India. Genomic DNA was isolated from different seed samples E. ribes and RAPD-PCR was performed on 13 different seed samples using 47 random primers. Out of all the primers, only 22 primers produced clear and highly-reproducible banding patterns. The 22 selected RAPD primers generated a total of 280 alleles with an average of 12 alleles per primer pair. In the present study, we have identified three RAPD-PCR markers i.e. OPF5_480 bp, OPH11_520 bp and OPH4_530 bp which can be used for genetic fingerprinting of E. ribes. This methodology can be employed for identification of original E. ribes and also distinguishing it from other substitutes and adulterants.Keywords: Embelia ribes, RAPD-PCR, primers, genetic analysis
Procedia PDF Downloads 2995801 Genetic Diversity of Mycobacterium bovis and Its Zoonotic Potential in Ethiopia: A Systematic Review
Authors: Begna Tulu, Gobena Ameni
Abstract:
Understanding the types of Mycobacterium bovis (M. bovis) strains circulating in a country and exploring its zoonotic potential has significant contribution in the effort to design control strategies. The main aim of this study was to review and compile the results of studies conducted on M. bovis genotyping and its zoonotic potential of M. bovis in Ethiopia. A systematic search and review of articles published on M. bovis strains in Ethiopia were made. PubMed and Google Scholar databases were considered for the search while the keywords used were 'Mycobacteria,' 'Mycobacterium bovis,' 'Bovine Tuberculosis' and 'Ethiopia.' Fourteen studies were considered in this review and a total of 31 distinct strains of M. bovis (N=211) were obtained; the most dominant strains were SB0133 (N=62, 29.4%), SB1176 (N=61, 28.9%), and followed by SB0134 and SB1476 each (N=18, 8.5%). The clustering rate of M. bovis strains was found to be 42.0%. On the other hand, 6 strains of M. bovis were reported from human namely; SB0665 (N=4), SB0303 (N=2), SB0982 (N=2), SB0133 (N=1), SB1176 (N=1), and 1 new strain. Similarly, a total of 8 strains (N=13) of M. tuberculosis bacteria were also identified from animal subjects; namely SIT149 (N=3), SIT1 (N=2), SIT1688 (n=2), SIT262 (N=2), SIT53 (N=1), SIT59 (N=1), and one new-Ethiopian strain. The result showed that the genetic diversity of M. bovis strains reported from Ethiopia are less diversified and highly clustered. And also the result underlines that there is an ongoing active transmission of M. bovis and M. tuberculosis between human and animals in Ethiopia because a significant number strains of both type of bacteria were reported from human and animals.Keywords: mycobacterium bovis, Mycobacterium tuberculosis, zoonotic potential, genetic diversity, Ethiopia
Procedia PDF Downloads 1405800 Application of the Mobile Phone for Occupational Self-Inspection Program in Small-Scale Industries
Authors: Jia-Sin Li, Ying-Fang Wang, Cheing-Tong Yan
Abstract:
In this study, an integrated approach of Google Spreadsheet and QR code which is free internet resources was used to improve the inspection procedure. The mobile phone Application(App)was also designed to combine with a web page to create an automatic checklist in order to provide a new integrated information of inspection management system. By means of client-server model, the client App is developed for Android mobile OS and the back end is a web server. It can set up App accounts including authorized data and store some checklist documents in the website. The checklist document URL could generate QR code first and then print and paste on the machine. The user can scan the QR code by the app and filled the checklist in the factory. In the meanwhile, the checklist data will send to the server, it not only save the filled data but also executes the related functions and charts. On the other hand, it also enables auditors and supervisors to facilitate the prevention and response to hazards, as well as immediate report data checks. Finally, statistics and professional analysis are performed using inspection records and other relevant data to not only improve the reliability, integrity of inspection operations and equipment loss control, but also increase plant safety and personnel performance. Therefore, it suggested that the traditional paper-based inspection method could be replaced by the APP which promotes the promotion of industrial security and reduces human error.Keywords: checklist, Google spreadsheet, APP, self-inspection
Procedia PDF Downloads 1205799 A Method for Identifying Unusual Transactions in E-commerce Through Extended Data Flow Conformance Checking
Authors: Handie Pramana Putra, Ani Dijah Rahajoe
Abstract:
The proliferation of smart devices and advancements in mobile communication technologies have permeated various facets of life with the widespread influence of e-commerce. Detecting abnormal transactions holds paramount significance in this realm due to the potential for substantial financial losses. Moreover, the fusion of data flow and control flow assumes a critical role in the exploration of process modeling and data analysis, contributing significantly to the accuracy and security of business processes. This paper introduces an alternative approach to identify abnormal transactions through a model that integrates both data and control flows. Referred to as the Extended Data Petri net (DPNE), our model encapsulates the entire process, encompassing user login to the e-commerce platform and concluding with the payment stage, including the mobile transaction process. We scrutinize the model's structure, formulate an algorithm for detecting anomalies in pertinent data, and elucidate the rationale and efficacy of the comprehensive system model. A case study validates the responsive performance of each system component, demonstrating the system's adeptness in evaluating every activity within mobile transactions. Ultimately, the results of anomaly detection are derived through a thorough and comprehensive analysis.Keywords: database, data analysis, DPNE, extended data flow, e-commerce
Procedia PDF Downloads 575798 Proposed Terminal Device for End-to-End Secure SMS in Cellular Networks
Authors: Neetesh Saxena, Narendra S. Chaudhari
Abstract:
Nowadays, SMS is a very popular mobile service and even the poor, illiterate people and those living in rural areas use SMS service very efficiently. Although many mobile operators have already started 3G and 4G services, 2G services are still being used by the people in many countries. In 2G (GSM), only encryption provided is between the MS and the BTS, there is no end-to-end encryption available. Sometimes we all need to send some confidential message to other person containing bank account number, some password, financial details, etc. Normally, a message is sent in plain text only to the recipient and it is not an acceptable standard for transmitting such important and confidential information. Authors propose an end-to-end encryption approach by proposing a terminal for sending/receiving a secure message. An asymmetric key exchange algorithm is used in order to transmit secret shared key securely to the recipient. The proposed approach with terminal device provides authentication, confidentiality, integrity and non-repudiation.Keywords: AES, DES, Diffie-Hellman, ECDH, A5, SMS
Procedia PDF Downloads 4195797 Association of Xeroderma pigmentosum Group D Gene Polymorphism with Colorectal Cancer Risk in Kashmiri Population
Authors: Syed Sameer Aga, Saniya Nissar
Abstract:
The Xeroderma pigmentosum group D gene (XPD) plays a key role in nucleotide excision repair (NER) pathway of the damaged DNA. Genetic polymorphisms in the coding region of the XPD gene may alter DNA repair capacity of the protein and hence can modulate the risk of colorectal cancer (CRC) risk. The aim of the study was to determine the genetic association of XPD Lys751Gln polymorphism with the risk of colorectal cancer (CRC) development. 120 CRC patients and 160 normal controls were assessed for genotype frequencies of XPD Lys751Gln polymorphism using PCR-RFLP technique. We observed a significant association (p < 0.05) between the XPD Lys751Gln polymorphism and the risk of developing CRC (p < 0.05). Additionally, Gln/Gln genotype of the XPD gene doubled the risk for the development of CRC [p < 0.05; OR=2.25 95% CI (1.07-4.7)]. Our results suggest that there is a significant association between the XPD Lys751Gln polymorphism and the risk of CRC.Keywords: colorectal cancer, polymorphism, RFLP, DNA Repair, NER, XPD
Procedia PDF Downloads 2175796 Distribution Network Optimization by Optimal Placement of Photovoltaic-Based Distributed Generation: A Case Study of the Nigerian Power System
Authors: Edafe Lucky Okotie, Emmanuel Osawaru Omosigho
Abstract:
This paper examines the impacts of the introduction of distributed energy generation (DEG) technology into the Nigerian power system as an alternative means of energy generation at distribution ends using Otovwodo 15 MVA, 33/11kV injection substation as a case study. The overall idea is to increase the generated energy in the system, improve the voltage profile and reduce system losses. A photovoltaic-based distributed energy generator (PV-DEG) was considered and was optimally placed in the network using Genetic Algorithm (GA) in Mat. Lab/Simulink environment. The results of simulation obtained shows that the dynamic performance of the network was optimized with DEG-grid integration.Keywords: distributed energy generation (DEG), genetic algorithm (GA), power quality, total load demand, voltage profile
Procedia PDF Downloads 865795 Accidents and Close Call Situations Due to Cell Phone Use While Moving, Driving, and Working
Authors: L. Korpinen, R. Pääkkönen, F. Gobba
Abstract:
Accidents and close call situations involving cell phones are nowadays possible. The objective of this study was to investigate the accidents and close call situations due to cell phone use while moving, driving, and working among Finns aged between 18 and 65. This work is part of a large cross-sectional study that was carried out on 15,000 working-age Finns. About 26% of people who had an accident, and about half of the people including close call situation with the mobile phone, answered that use of the phone influenced. In the future, it is important to take into account that the use of a mobile phone can be distracting while driving.Keywords: blue-collar workers, accident, cell phone, close call situation
Procedia PDF Downloads 3085794 Water Quality, Risk, Management and Distribution in Abeokuta, Ogun State
Authors: Ayedun Hassan, Ayadi Odunayo Peter
Abstract:
The ancient city of Abeokuta has been supplied with pipe borne water since 1911, yet, a continuous increase in population and unplanned city expansion makes water a very precious and scarce commodity. The government reserved areas (GRA’s) are well planned, and public water supply is available; however, the sub-urban areas consist of scattered structures with individuals trying to source water by digging wells and boreholes. The geology of the city consists of basement rock which makes digging wells and boreholes very difficult. The present study was conducted to assess the risk arising from the consumption of toxic elements in the groundwater of Abeokuta, Ogun State, Nigeria. Forty-five groundwater samples were collected from nine different areas of Abeokuta and analyzed for physicochemical parameters and toxic elements. The physicochemical parameters were determined using standard methods, while the toxic elements were determined using Inductively Coupled Plasma-Mass Spectrometer (ICP/MS). Ninety-six percent (96%) of the water sample has pH < 6.5, and 11% has conductivity > 250 µSCm⁻¹ limits in drinking water as recommended by WHO. Seven percent (7%) of the samples have Pb concentration >10 µgL⁻¹ while 75% have Al concentration >200 µgL⁻¹ recommended by WHO. The order for risk of cancer from different area of Abeokuta are Cd²⁺ > As³⁺ > Pb²⁺ > Cr⁶⁺ for Funaab, Camp and Obantoko; As³⁺ > Cd²⁺ > Pb²⁺ > Cr⁶⁺ for Ita Osin, Isale Igbein, Ake and Itoku; Cd²⁺ >As > Cr⁶⁺ > Pb²⁺ for Totoro; Pb²⁺ > Cd²⁺ > As³⁺ > Cr⁶⁺ for Idiaba. The order of non-cancer hazard index (HI) calculated for groundwater of Abeokuta City are Cd²⁺ > As³⁺ > Mn²⁺ > Pb²⁺ > Ni²⁺ and were all greater than one, which implies susceptibility to other illnesses. The sources of these elements are the rock and inappropriate waste disposal method, which leached the elements into the groundwater. A combination of sources from food will accumulate these elements in the human body system. Treatment to remove Al and Pb is necessary, while the method of water distribution should be reviewed to ensure access to potable water by the residents.Keywords: Abeokuta, groundwater, Nigeria, risk
Procedia PDF Downloads 955793 Heritability and Diversity Analysis of Blast Resistant Upland Rice Genotypes Based on Quantitative Traits
Authors: Mst. Tuhina-Khatun, Mohamed Hanafi Musa, Mohd Rafii Yosup, Wong Mui Yun, Md. Aktar-Uz-Zaman, Mahbod Sahebi
Abstract:
Rice is a staple crop of economic importance of most Asian people, and blast is the major constraints for its higher yield. Heritability of plants traits helps plant breeders to make an appropriate selection and to assess the magnitude of genetic improvement through hybridization. Diversity of crop plants is necessary to manage the continuing genetic erosion and address the issues of genetic conservation for successfully meet the future food requirements. Therefore, an experiment was conducted to estimate heritability and to determine the diversity of 27 blast resistant upland rice genotypes based on 18 quantitative traits using randomized complete block design. Heritability value was found to vary from 38 to 93%. The lowest heritability belonged to the character total number of tillers/plant (38%). In contrast, number of filled grains/panicle, and yield/plant (g) was recorded for their highest heritability value viz. 93 and 91% correspondingly. Cluster analysis based on 18 traits grouped 27 rice genotypes into six clusters. Cluster I was the biggest, which comprised 17 genotypes, accounted for about 62.96% of total population. The multivariate analysis suggested that the genotype ‘Chokoto 14’ could be hybridized with ‘IR 5533-55-1-11’ and ‘IR 5533-PP 854-1’ for broadening the gene pool of blast resistant upland rice germplasms for yield and other favorable characters.Keywords: blast resistant, diversity analysis, heritability, upland rice
Procedia PDF Downloads 3695792 Reductive Control in the Management of Redundant Actuation
Authors: Mkhinini Maher, Knani Jilani
Abstract:
We present in this work the performances of a mobile omnidirectional robot through evaluating its management of the redundancy of actuation. Thus we come to the predictive control implemented. The distribution of the wringer on the robot actions, through the inverse pseudo of Moore-Penrose, corresponds to a -geometric- distribution of efforts. We will show that the load on vehicle wheels would not be equi-distributed in terms of wheels configuration and of robot movement. Thus, the threshold of sliding is not the same for the three wheels of the vehicle. We suggest exploiting the redundancy of actuation to reduce the risk of wheels sliding and to ameliorate, thereby, its accuracy of displacement. This kind of approach was the subject of study for the legged robots.Keywords: mobile robot, actuation, redundancy, omnidirectional, inverse pseudo moore-penrose, reductive control
Procedia PDF Downloads 513