Search results for: global terrorism database
5991 A Dynamic Equation for Downscaling Surface Air Temperature
Authors: Ch. Surawut, D. Sukawat
Abstract:
In order to utilize results from global climate models, dynamical and statistical downscaling techniques have been developed. For dynamical downscaling, usually a limited area numerical model is used, with associated high computational cost. This research proposes dynamic equation for specific space-time regional climate downscaling from the Educational Global Climate Model (EdGCM) for Southeast Asia. The equation is for surface air temperature. These equations provide downscaling values of surface air temperature at any specific location and time without running a regional climate model. In the proposed equations, surface air temperature is approximated from ground temperature, sensible heat flux and 2m wind speed. Results from the application of the equation show that the errors from the proposed equations are less than the errors for direct interpolation from EdGCM.Keywords: dynamic equation, downscaling, inverse distance, weight interpolation
Procedia PDF Downloads 3015990 Improving Fingerprinting-Based Localization System Using Generative Artificial Intelligence
Authors: Getaneh Berie Tarekegn
Abstract:
A precise localization system is crucial for many artificial intelligence Internet of Things (AI-IoT) applications in the era of smart cities. Their applications include traffic monitoring, emergency alarming, environmental monitoring, location-based advertising, intelligent transportation, and smart health care. The most common method for providing continuous positioning services in outdoor environments is by using a global navigation satellite system (GNSS). Due to nonline-of-sight, multipath, and weather conditions, GNSS systems do not perform well in dense urban, urban, and suburban areas.This paper proposes a generative AI-based positioning scheme for large-scale wireless settings using fingerprinting techniques. In this article, we presented a novel semi-supervised deep convolutional generative adversarial network (S-DCGAN)-based radio map construction method for real-time device localization. We also employed a reliable signal fingerprint feature extraction method with t-distributed stochastic neighbor embedding (t-SNE), which extracts dominant features while eliminating noise from hybrid WLAN and long-term evolution (LTE) fingerprints. The proposed scheme reduced the workload of site surveying required to build the fingerprint database by up to 78.5% and significantly improved positioning accuracy. The results show that the average positioning error of GAILoc is less than 39 cm, and more than 90% of the errors are less than 82 cm. That is, numerical results proved that, in comparison to traditional methods, the proposed SRCLoc method can significantly improve positioning performance and reduce radio map construction costs.Keywords: location-aware services, feature extraction technique, generative adversarial network, long short-term memory, support vector machine
Procedia PDF Downloads 705989 Female Fans in Global Football Governance: A Call for Change
Authors: Yaron Covo, Tamar Kofman, Shira Palti
Abstract:
Over the recent decades, debates about the engagement of fans in football governance have focused on the club level and national level, emphasizing the significance of fans’ involvement in increasing the connection of clubs with the community, and in safeguarding the transparency, accountability, and clubs’ financial stability. This paper will offer a different conceptual justification for providing fans with access to decision-making processes in football. First, it will suggest that the participation of fans is necessary for addressing discriminatory practices against women in football stadiums. Second, it will argue that fans’ involvement in football governance is important not only at the club and national level but also at the global level, relying on the principles of Global Administrative Law. In contemporary men’s football, female fans face different forms of discrimination. Iranian women are still prohibited from attending football games at the domestic level; In Saudi Arabia, female fans are only permitted to enter designated family areas; Qatar – the host of the 2022 FIFA world cup – requires women to attend matches wearing modest clothing. Similarly, in Turkey, Lebanon, UAE, and Algeria, women face cultural barriers when attending men’s football games. In other countries, female fans suffer from subtle discrimination, including micro-aggressions, misogyny, sexism, and noninstitutionalized exclusion. Despite the vital role of fans in world football and the importance of football for many women’s lives, little has been done to address this problem. While FIFA recognizes that these discriminatory practices contradict its statutes, this recognition fails to materialize into meaningful change. This paper will argue that FIFA’s omission stems from two interrelated characteristics of world football: (1) the ultra-masculine nature of the game; (2) the insufficient recognition of fans’ significance. While fans have been given a voice in various football bodies on the domestic level, FIFA has yet to allow the representation of fans as stakeholders in world football governance. Since fans are a more heterogeneous group than players, the voices of those fans who do not fit the ultra-masculine model are not heard. Thus, by focusing mainly on male players, FIFA reproduces the hegemonic masculinity that feeds back into fan dynamics and marginalizes female fans. To rectify this problem, we will call on FIFA to provide fans and female fans in particular, with voice mechanisms and access to decision-making processes. In addition to its impact on the formation of fans’ identities, such a move will allow fans to demand better enforcement of existing anti-discrimination norms and new regulations to address their needs. The literature has yet to address the relationship between fans’ gender discrimination and global football governance. Building on Global Administrative Law scholarship and feminist theories, this paper will aim to fill this gap.Keywords: fans, FIFA, football governance, gender discrimination, global administrative law, human rights
Procedia PDF Downloads 1485988 Hsa-miR-192-5p, and Hsa-miR-129-5p Prominent Biomarkers in Regulation Glioblastoma Cancer Stem Cells Genes Microenvironment
Authors: Rasha Ahmadi
Abstract:
Glioblastoma is one of the most frequent brain malignancies, having a high mortality rate and limited survival in individuals with this malignancy. Despite different treatments and surgery, recurrence of glioblastoma cancer stem cells may arise as a subsequent tumor. For this reason, it is crucial to research the markers associated with glioblastoma stem cells and specifically their microenvironment. In this study, using bioinformatics analysis, we analyzed and nominated genes in the microenvironment pathways of glioblastoma stem cells. In this study, an appropriate database was selected for analysis by referring to the GEO database. This dataset comprised gene expression patterns in stem cells derived from glioblastoma patients. Gene clusters were divided as high and low expression. Enrichment databases such as Enrichr, STRING, and GEPIA were utilized to analyze the data appropriately. Finally, we extracted the potential genes 2700 high-expression and 1100 low-expression genes are implicated in the metabolic pathways of glioblastoma cancer progression. Cellular senescence, MAPK, TNF, hypoxia, zimosterol biosynthesis, and phosphatidylinositol metabolism pathways were substantially expressed and the metabolic pathways were downregulated. After assessing the association between protein networks, MSMP, SOX2, FGD4 ,and CNTNAP3 genes with high expression and DMKN and SBSN genes with low were selected. All of these genes were observed in the survival curve, with a survival of fewer than 10 percent over around 15 months. hsa-mir-192-5p, hsa-mir-129-5p, hsa-mir-215-5p, hsa-mir-335-5p, and hsa-mir-340-5p played key function in glioblastoma cancer stem cells microenviroments. We introduced critical genes through integrated and regular bioinformatics studies by assessing the amount of gene expression profile data that can play an important role in targeting genes involved in the energy and microenvironment of glioblastoma cancer stem cells. Have. This study indicated that hsa-mir-192-5p, and hsa-mir-129-5p are appropriate candidates for this.Keywords: Glioblastoma, Cancer Stem Cells, Biomarker Discovery, Gene Expression Profiles, Bioinformatics Analysis, Tumor Microenvironment
Procedia PDF Downloads 1435987 The Covid-19 Pandemic: Transmission, Misinformation, and Implications on Public Health
Authors: Jonathan De Rothewelle
Abstract:
A pandemic, such as that of COVID-19, can be a time of panic and stress; concerns about health supersede others such as work and leisure. With such concern comes the seeking of crucial information— information that, during a global health crisis, could mean the difference between life and death. Whether newspapers, cable news, or radio, media plays an important role in the transmission of medical information to the general public. Moreover, the news media in particular must uphold its obligation to the public to only disseminate factual, useful information. The circulation of misinformation, whether explicit or implicit, may profoundly impact global health. Using a discursive analytic framework founded in linguistics, the images and headlines of top coverage of COVID-19 from the most influential media outlets will be examined. Micro-analyses reveal what may be interpreted as evidence of sensationalism, which may be argued to a form of misinformation, and ultimately a departure from ethical media. Withdrawal from responsible reporting and publishing, expressly in times of epidemic, may cause further confusion and panic.Keywords: public health, pandemic, public education, media
Procedia PDF Downloads 1495986 Global Direct Search Optimization of a Tuned Liquid Column Damper Subject to Stochastic Load
Authors: Mansour H. Alkmim, Adriano T. Fabro, Marcus V. G. De Morais
Abstract:
In this paper, a global direct search optimization algorithm to reduce vibration of a tuned liquid column damper (TLCD), a class of passive structural control device, is presented. The objective is to find optimized parameters for the TLCD under stochastic load from different wind power spectral density. A verification is made considering the analytical solution of an undamped primary system under white noise excitation. Finally, a numerical example considering a simplified wind turbine model is given to illustrate the efficacy of the TLCD. Results from the random vibration analysis are shown for four types of random excitation wind model where the response PSDs obtained showed good vibration attenuation.Keywords: generalized pattern search, parameter optimization, random vibration analysis, vibration suppression
Procedia PDF Downloads 2745985 Identification and Validation of Co-Dominant Markers for Selection of the CO-4 Anthracnose Disease Resistance Gene in Common Bean Cultivar G2333
Authors: Annet Namusoke, Annet Namayanja, Peter Wasswa, Shakirah Nampijja
Abstract:
Common bean cultivar G2333 which offers broad resistance for anthracnose has been widely used as a source of resistance in breeding for anthracnose resistance. The cultivar is pyramided with three genes namely CO-4, CO-5 and CO-7 and of these three genes, the CO-4 gene has been found to offer the broadest resistance. The main aim of this work was to identify and validate easily assayable PCR based co-dominant molecular markers for selection of the CO-4 gene in segregating populations derived from crosses of G2333 with RWR 1946 and RWR 2075, two commercial Andean cultivars highly susceptible to anthracnose. Marker sequences for the study were obtained by blasting the sequence of the COK-4 gene in the Phaseolus gene database. Primer sequence pairs that were not provided from the Phaseolus gene database were designed by the use of Primer3 software. PCR conditions were optimized and the PCR products were run on 6% HPAGE gel. Results of the polymorphism test indicated that out of 18 identified markers, only two markers namely BM588 and BM211 behaved co-dominantly. Phenotypic evaluation for reaction to anthracnose disease was done by inoculating 21days old seedlings of three parents, F1 and F2 populations with race 7 of Colletotrichum lindemuthianum in the humid chamber. DNA testing of the BM588 marker onto the F2 segregating population of the crosses RWR 1946 x G 2333 and RWR 2075 x G2333 further revealed that the marker BM588 co-segregated with disease resistance with co-dominance of two alleles of 200bp and 400bp, fitting the expected segregation ratio of 1:2:1. The BM588 marker was significantly associated with disease resistance and gave promising results for marker assisted selection of the CO-4 gene in the breeding lines. Activities to validate the BM211 marker are also underway.Keywords: codominant, Colletotrichum lindemuthianum, MAS, Phaseolus vulgaris
Procedia PDF Downloads 2905984 Solar-Powered Water Purification Using Ozone and Sand Filtration
Authors: Kayla Youhanaie, Kenneth Dott, Greg Gillis-Smith
Abstract:
Access to clean water is a global challenge that affects nearly one-third of the world’s population. A lack of safe drinking water negatively affects a person’s health, safety, and economic status. However, many regions of the world that face this clean water challenge also have high solar energy potential. To address this worldwide issue and utilize available resources, a solar-powered water purification device was developed that could be implemented in communities around the world that lack access to potable water. The device uses ozone to destroy water-borne pathogens and sand filtration to filter out particulates from the water. To select the best method for this application, a quantitative energy efficiency comparison of three water purification methods was conducted: heat, UV light, and ozone. After constructing an initial prototype, the efficacy of the device was tested using agar petri dishes to test for bacteria growth in treated water samples at various time intervals after applying the device to contaminated water. The results demonstrated that the water purification device successfully removed all bacteria and particulates from the water within three minutes, making it safe for human consumption. These results, as well as the proposed design that utilizes widely available resources in target communities, suggest that the device is a sustainable solution to address the global water crisis and could improve the quality of life for millions of people worldwide.Keywords: clean water, solar powered water purification, ozonation, sand filtration, global water crisis
Procedia PDF Downloads 745983 Political and Economic Transition of People with Disabilities Related to Globalization
Authors: Jihye Jeon
Abstract:
This paper analyzes the political and economic issues that people with disabilities face related to globalization; how people with disabilities have been adapting globalization and surviving under worldwide competition system. It explains that economic globalization exacerbates inequality and deprivation of people with disabilities. The rising tide of neo-liberal welfare policies emphasized efficiency, downsized social expenditure for people with disabilities, excluded people with disabilities against labor market, and shifted them from welfare system to nothing. However, there have been people with disabilities' political responses to globalization, which are characterized by a global network of people with disabilities as well as participation to global governance. Their resistance can be seen as an attempt to tackle the problems that economic globalization has produced. It is necessary paradigm shift of disability policy from dependency represented by disability benefits to independency represented by labor market policies for people with disabilities.Keywords: economic globalization, people with disability, deprivation, welfare cut, disability right movement, resistance
Procedia PDF Downloads 4635982 Expert System: Debugging Using MD5 Process Firewall
Authors: C. U. Om Kumar, S. Kishore, A. Geetha
Abstract:
An Operating system (OS) is software that manages computer hardware and software resources by providing services to computer programs. One of the important user expectations of the operating system is to provide the practice of defending information from unauthorized access, disclosure, modification, inspection, recording or destruction. Operating system is always vulnerable to the attacks of malwares such as computer virus, worm, Trojan horse, backdoors, ransomware, spyware, adware, scareware and more. And so the anti-virus software were created for ensuring security against the prominent computer viruses by applying a dictionary based approach. The anti-virus programs are not always guaranteed to provide security against the new viruses proliferating every day. To clarify this issue and to secure the computer system, our proposed expert system concentrates on authorizing the processes as wanted and unwanted by the administrator for execution. The Expert system maintains a database which consists of hash code of the processes which are to be allowed. These hash codes are generated using MD5 message-digest algorithm which is a widely used cryptographic hash function. The administrator approves the wanted processes that are to be executed in the client in a Local Area Network by implementing Client-Server architecture and only the processes that match with the processes in the database table will be executed by which many malicious processes are restricted from infecting the operating system. The add-on advantage of this proposed Expert system is that it limits CPU usage and minimizes resource utilization. Thus data and information security is ensured by our system along with increased performance of the operating system.Keywords: virus, worm, Trojan horse, back doors, Ransomware, Spyware, Adware, Scareware, sticky software, process table, MD5, CPU usage and resource utilization
Procedia PDF Downloads 4275981 Transcriptomine: The Nuclear Receptor Signaling Transcriptome Database
Authors: Scott A. Ochsner, Christopher M. Watkins, Apollo McOwiti, David L. Steffen Lauren B. Becnel, Neil J. McKenna
Abstract:
Understanding signaling by nuclear receptors (NRs) requires an appreciation of their cognate ligand- and tissue-specific transcriptomes. While target gene regulation data are abundant in this field, they reside in hundreds of discrete publications in formats refractory to routine query and analysis and, accordingly, their full value to the NR signaling community has not been realized. One of the mandates of the Nuclear Receptor Signaling Atlas (NURSA) is to facilitate access of the community to existing public datasets. Pursuant to this mandate we are developing a freely-accessible community web resource, Transcriptomine, to bring together the sum total of available expression array and RNA-Seq data points generated by the field in a single location. Transcriptomine currently contains over 25,000,000 gene fold change datapoints from over 1200 contrasts relevant to over 100 NRs, ligands and coregulators in over 200 tissues and cell lines. Transcriptomine is designed to accommodate a spectrum of end users ranging from the bench researcher to those with advanced bioinformatic training. Visualization tools allow users to build custom charts to compare and contrast patterns of gene regulation across different tissues and in response to different ligands. Our resource affords an entirely new paradigm for leveraging gene expression data in the NR signaling field, empowering users to query gene fold changes across diverse regulatory molecules, tissues and cell lines, target genes, biological functions and disease associations, and that would otherwise be prohibitive in terms of time and effort. Transcriptomine will be regularly updated with gene lists from future genome-wide expression array and expression-sequencing datasets in the NR signaling field.Keywords: target gene database, informatics, gene expression, transcriptomics
Procedia PDF Downloads 2735980 GAILoc: Improving Fingerprinting-Based Localization System Using Generative Artificial Intelligence
Authors: Getaneh Berie Tarekegn
Abstract:
A precise localization system is crucial for many artificial intelligence Internet of Things (AI-IoT) applications in the era of smart cities. Their applications include traffic monitoring, emergency alarming, environmental monitoring, location-based advertising, intelligent transportation, and smart health care. The most common method for providing continuous positioning services in outdoor environments is by using a global navigation satellite system (GNSS). Due to nonline-of-sight, multipath, and weather conditions, GNSS systems do not perform well in dense urban, urban, and suburban areas.This paper proposes a generative AI-based positioning scheme for large-scale wireless settings using fingerprinting techniques. In this article, we presented a novel semi-supervised deep convolutional generative adversarial network (S-DCGAN)-based radio map construction method for real-time device localization. We also employed a reliable signal fingerprint feature extraction method with t-distributed stochastic neighbor embedding (t-SNE), which extracts dominant features while eliminating noise from hybrid WLAN and long-term evolution (LTE) fingerprints. The proposed scheme reduced the workload of site surveying required to build the fingerprint database by up to 78.5% and significantly improved positioning accuracy. The results show that the average positioning error of GAILoc is less than 39 cm, and more than 90% of the errors are less than 82 cm. That is, numerical results proved that, in comparison to traditional methods, the proposed SRCLoc method can significantly improve positioning performance and reduce radio map construction costs.Keywords: location-aware services, feature extraction technique, generative adversarial network, long short-term memory, support vector machine
Procedia PDF Downloads 725979 Methodology for Temporary Analysis of Production and Logistic Systems on the Basis of Distance Data
Authors: M. Mueller, M. Kuehn, M. Voelker
Abstract:
In small and medium-sized enterprises (SMEs), the challenge is to create a well-grounded and reliable basis for process analysis, optimization and planning due to a lack of data. SMEs have limited access to methods with which they can effectively and efficiently analyse processes and identify cause-and-effect relationships in order to generate the necessary database and derive optimization potential from it. The implementation of digitalization within the framework of Industry 4.0 thus becomes a particular necessity for SMEs. For these reasons, the abstract presents an analysis methodology that is subject to the objective of developing an SME-appropriate methodology for efficient, temporarily feasible data collection and evaluation in flexible production and logistics systems as a basis for process analysis and optimization. The overall methodology focuses on retrospective, event-based tracing and analysis of material flow objects. The technological basis consists of Bluetooth low energy (BLE)-based transmitters, so-called beacons, and smart mobile devices (SMD), e.g. smartphones as receivers, between which distance data can be measured and derived motion profiles. The distance is determined using the Received Signal Strength Indicator (RSSI), which is a measure of signal field strength between transmitter and receiver. The focus is the development of a software-based methodology for interpretation of relative movements of transmitters and receivers based on distance data. The main research is on selection and implementation of pattern recognition methods for automatic process recognition as well as methods for the visualization of relative distance data. Due to an existing categorization of the database regarding process types, classification methods (e.g. Support Vector Machine) from the field of supervised learning are used. The necessary data quality requires selection of suitable methods as well as filters for smoothing occurring signal variations of the RSSI, the integration of methods for determination of correction factors depending on possible signal interference sources (columns, pallets) as well as the configuration of the used technology. The parameter settings on which respective algorithms are based have a further significant influence on result quality of the classification methods, correction models and methods for visualizing the position profiles used. The accuracy of classification algorithms can be improved up to 30% by selected parameter variation; this has already been proven in studies. Similar potentials can be observed with parameter variation of methods and filters for signal smoothing. Thus, there is increased interest in obtaining detailed results on the influence of parameter and factor combinations on data quality in this area. The overall methodology is realized with a modular software architecture consisting of independently modules for data acquisition, data preparation and data storage. The demonstrator for initialization and data acquisition is available as mobile Java-based application. The data preparation, including methods for signal smoothing, are Python-based with the possibility to vary parameter settings and to store them in the database (SQLite). The evaluation is divided into two separate software modules with database connection: the achievement of an automated assignment of defined process classes to distance data using selected classification algorithms and the visualization as well as reporting in terms of a graphical user interface (GUI).Keywords: event-based tracing, machine learning, process classification, parameter settings, RSSI, signal smoothing
Procedia PDF Downloads 1295978 Open Source Knowledge Management Approach to Manage and Disseminate Distributed Content in a Global Enterprise
Authors: Rahul Thakur, Onkar Chandel
Abstract:
Red Hat is the world leader in providing open source software and solutions. A global enterprise, like Red Hat, has unique issues of connecting employees with content because of distributed offices, multiple teams spread across geographies, multiple languages, and different cultures. Employees, of a global company, create content that is distributed across departments, teams, regions, and countries. This makes finding the best content difficult since owners keep iterating on the existing content. When employees are unable to find the content, they end up creating it once again and in the process duplicating existing material and effort. Also, employees may not find the relevant content and spend time reviewing obsolete duplicate, or irrelevant content. On an average, a person spends 15 minutes/day in failed searches that might result in missed business opportunities, employee frustration, and substandard deliverables. Red Hat Knowledge Management Office (KMO) applied 'open source strategy' to solve the above problems. Under the Open Source Strategy, decisions are taken collectively. The strategy aims at accomplishing common goals with the help of communities. The objectives of this initiative were to save employees' time, get them authentic content, improve their content search experience, avoid duplicate content creation, provide context based search, improve analytics, improve content management workflows, automate content classification, and automate content upload. This session will describe open source strategy, its applicability in content management, challenges, recommended solutions, and outcome.Keywords: content classification, content management, knowledge management, open source
Procedia PDF Downloads 2105977 Framing the Dynamics and Functioning of Different Variants of Terrorist Organizations: A Business Model Perspective
Authors: Eisa Younes Alblooshi
Abstract:
Counterterrorism strategies, to be effective and efficient, require a sound understanding of the dynamics, the interlinked organizational elements of the terrorist outfits being combated, with a view to having cognizance of their strong points to be guarded against, as well as the vulnerable zones that can be targeted for optimal results in a timely fashion by counterterrorism agencies. A unique model regarding the organizational imperatives was evolved in this research through likening the terrorist organizations with the traditional commercial ones, with a view to understanding in detail the dynamics of interconnectivity and dependencies, and the related compulsions facing the leaderships of such outfits that provide counterterrorism agencies with opportunities for forging better strategies. It involved assessing the evolving organizational dynamics and imperatives of different types of terrorist organizations, to enable the researcher to construct a prototype model that defines the progression and linkages of the related organizational elements of such organizations. It required detailed analysis of how the various elements are connected, with sequencing identified, as any outfit positions itself with respect to its external environment and internal dynamics. A case study focusing on a transnational radical religious state-sponsored terrorist organization was conducted to validate the research findings and to further strengthen the specific counterterrorism strategies. Six different variants of the business model of terrorist organizations were identified, categorized based on their outreach, mission, and status of any state sponsorship. The variants represent vast majority of the range of terrorist organizations acting locally or globally. The model shows the progression and dynamics of these organizations through various dimensions including mission, leadership, outreach, state sponsorship status, resulting in the organizational structure, state of autonomy, preference divergence in its fold, recruitment core, propagation avenues, down to their capacity to adapt, resulting critically in their own life cycles. A major advantage of the model is the utility of mapping terrorist organizations according to their fits to the sundry identified variants, allowing for flexibility and differences within, enabling the researchers and counterterrorism agencies to observe a neat blueprint of the organization’s footprint, along with highlighting the areas to be evaluated for focused target zone selection and timing of counterterrorism interventions. Special consideration is given to the dimension of financing, keeping in context the latest developments regarding cryptocurrencies, hawala, and global anti-money laundering initiatives. Specific counterterrorism strategies and intervention points have been identified for each of the respective model variants, with a view to efficient and effective deployment of resources.Keywords: terrorism, counterterrorism, model, strategy
Procedia PDF Downloads 1575976 An Approach to Spatial Planning for Water Conservation: The Case of Kovada Sub-Watershed (Turkey)
Authors: Aybike Ayfer Karadağ
Abstract:
Today, the amount of water available is decreasing day by day due to global warming, environmental problems and population increase. To protect water resources, it is necessary to take a lot of measures from the global scale to the local scale. Some of these measures are related to spatial planning studies. In this study, the impact of water process analysis was assessed in the development of spatial planning for water conservation. The study was conducted in the Kovada sub-watershed (Isparta, Turkey). By means of water process analysis, the way to reach underground water of surface water in the study area is mapped. In this context, plant cover, soil and rock permeability were evaluated holistically with geographic information systems technologies. Then, on the map, water permeability is classified and this is spatially expressed. The findings show that the permeability of the water is different in the study case. As a result, the water permeability map needs to be included in the planning for water conservation planning.Keywords: water, conservation, spatial planning, water process analysis
Procedia PDF Downloads 2155975 Exploring Simple Sequence Repeats within Conserved microRNA Precursors Identified from Tea Expressed Sequence Tag (EST) Database
Authors: Anjan Hazra, Nirjhar Dasgupta, Chandan Sengupta, Sauren Das
Abstract:
Tea (Camellia sinensis) has received substantial attention from the scientific world time to time, not only for its commercial importance, but also for its demand to the health-conscious people across the world for its extensive use as potential sources of antioxidant supplement. These health-benefit traits primarily rely on some regulatory networks of different metabolic pathways. Development of microsatellite markers from the conserved genomic regions is being worthwhile for studying the genetic diversity of closely related species or self-pollinated species. Although several SSR markers have been reported, in tea the trait-specific Simple Sequence Repeats (SSRs) are yet to be identified, which can be used for marker assisted breeding technique. MicroRNAs are endogenous, noncoding, short RNAs directly involved in regulating gene expressions at the post-transcriptional level. It has been found that diversity in miRNA gene interferes the formation of its characteristic hair pin structure and the subsequent function. In the present study, the precursors of small regulatory RNAs (microRNAs) has been fished out from tea Expressed Sequence Tag (EST) database. Furthermore, the simple sequence repeat motifs within the putative miRNA precursor genes are also identified in order to experimentally validate their existence and function. It is already known that genic-SSR markers are very adept and breeder-friendly source for genetic diversity analysis. So, the potential outcome of this in-silico study would provide some novel clues in understanding the miRNA-triggered polymorphic genic expression controlling specific metabolic pathways, accountable for tea quality.Keywords: micro RNA, simple sequence repeats, tea quality, trait specific marker
Procedia PDF Downloads 3105974 Global Historical Distribution Range of Brown Bear (Ursus Arctos)
Authors: Tariq Mahmood, Faiza Lehrasab, Faraz Akrim, Muhammad Sajid nadeem, Muhammad Mushtaq, Unza waqar, Ayesha Sheraz, Shaista Andleeb
Abstract:
Brown bear (Ursus arctos), a member of the family Ursidae, is distributed in a wide range of habitats in North America, Europe and Asia. Suspectedly, the global distribution range of brown bears is decreasing at the moment due to various factors. The carnivore species is categorized as ‘Least Concern’ globally by the IUCN Red List of Threatened Species. However, there are some fragmented, small populations that are on the verge of extinction, as is in Pakistan, where the species is listed as ‘Critically Endangered’, with a declining population trend. Importantly, the global historical distribution range of brown bears is undocumented. Therefore, in the current study, we reconstructed and estimated the historical distribution range of brown bears using QGIS software and also analyzed the network of protected areas in the past and current ranges of the species. Results showed that brown bear was more widely distributed in historic times, encompassing 52.6 million km² area as compared to their current distribution of 38.8 million km², resulting in a total range contraction of up to approximately 28 %. In the past, a total of N = 62,234 protected Areas, covering approximately 3.89 million km² were present in the distribution range of the species, while now a total of N= 33,313 Protected Areas, covering approximately 2.75 million km² area, are present in the current distribution range of the brown bear. The brown bear distribution range in the protected areas has also contracted by 1.15 million km² and the total percentage reduction of PAs is 29%.Keywords: brown bear, historic distribution, range contraction, protected areas
Procedia PDF Downloads 585973 Global Health Student Selected Components in Undergraduate Medical Education: Analysis of Student Feedback and Reflective Writings
Authors: Harriet Bothwell, Lowri Evans, Kevin Jones
Abstract:
Background: The University of Bristol provides all medical students the opportunity to undertake student selected components (SSCs) at multiple stages of the undergraduate programme. SSCs enable students to explore areas of interest that are not necessarily covered by the curriculum. Students are required to produce a written report and most use SSCs as an opportunity to undertake an audit or small research project. In 2013 Swindon Academy, based at the Great Western Hospital, offered eight students the opportunity of a global health SSC which included a two week trip to rural hospital in Uganda. This SSC has since expanded and in 2017 a total of 20 students had the opportunity to undertake small research projects at two hospitals in rural Uganda. 'Tomorrows Doctors' highlights the importance of understanding healthcare from a 'global perspective' and student feedback from previous SSCs suggests that self-assessed knowledge of global health increases as a result of this SSC. Through the most recent version of this SSC students had the opportunity to undertake projects in a wide range of specialties including paediatrics, palliative care, surgery and medical education. Methods: An anonymous online questionnaire was made available to students following the SSC. There was a response rate of 80% representing 16 out of the 20 students. This questionnaire surveyed students’ satisfaction and experience of the SSC including the level of academic, project and spiritual support provided as well as perceived challenges in completing the project and barriers to healthcare delivery in the low resource setting. This survey had multiple open questions allowing the collection of qualitative data. Further qualitative data was collected from the students’ project report. The suggested format included a reflection and all students completed these. All qualitative data underwent thematic analysis. Results: All respondents rated the overall experience of the SSC as 'good' or 'excellent'. Preliminary data suggest that students’ confidence in their knowledge of global health, diagnosis of tropical diseases and management of tropical diseases improved after completing this SSC. Thematic analysis of students' reflection is ongoing but suggests that students gain far more than improved knowledge of tropical diseases. Students reflect positively on having the opportunity to research in a low resource setting and feel that by completing these projects they will be 'useful' to the hospital. Several students reflect the stark contrast to healthcare delivery in the UK and recognise the 'privilege' of having a healthcare system that is free at the point of access. Some students noted the different approaches that clinicians in Uganda had to train in 'taking ownership' of their own learning. Conclusions: Students completing this SSC report increased knowledge of global health and tropical medicine. However, their reflections reveal much broader learning outcomes and demonstrate considerable insight in multiple topics including conducting research in the low resource setting, training and healthcare inequality.Keywords: global health, medical education, student feedback, undergraduate
Procedia PDF Downloads 1245972 Global Based Histogram for 3D Object Recognition
Authors: Somar Boubou, Tatsuo Narikiyo, Michihiro Kawanishi
Abstract:
In this work, we address the problem of 3D object recognition with depth sensors such as Kinect or Structure sensor. Compared with traditional approaches based on local descriptors, which depends on local information around the object key points, we propose a global features based descriptor. Proposed descriptor, which we name as Differential Histogram of Normal Vectors (DHONV), is designed particularly to capture the surface geometric characteristics of the 3D objects represented by depth images. We describe the 3D surface of an object in each frame using a 2D spatial histogram capturing the normalized distribution of differential angles of the surface normal vectors. The object recognition experiments on the benchmark RGB-D object dataset and a self-collected dataset show that our proposed descriptor outperforms two others descriptors based on spin-images and histogram of normal vectors with linear-SVM classifier.Keywords: vision in control, robotics, histogram, differential histogram of normal vectors
Procedia PDF Downloads 2775971 Binarization and Recognition of Characters from Historical Degraded Documents
Authors: Bency Jacob, S.B. Waykar
Abstract:
Degradations in historical document images appear due to aging of the documents. It is very difficult to understand and retrieve text from badly degraded documents as there is variation between the document foreground and background. Thresholding of such document images either result in broken characters or detection of false texts. Numerous algorithms exist that can separate text and background efficiently in the textual regions of the document; but portions of background are mistaken as text in areas that hardly contain any text. This paper presents a way to overcome these problems by a robust binarization technique that recovers the text from a severely degraded document images and thereby increases the accuracy of optical character recognition systems. The proposed document recovery algorithm efficiently removes degradations from document images. Here we are using the ostus method ,local thresholding and global thresholding and after the binarization training and recognizing the characters in the degraded documents.Keywords: binarization, denoising, global thresholding, local thresholding, thresholding
Procedia PDF Downloads 3425970 A Feminist/Queer Global Bioethics’Perspective on Reproduction: Abortion, MAR and Surrogacy
Authors: Tamara Roma, Emma Capulli
Abstract:
Pregnancy and fertility, in other words, reproduction, has become, in the last half of the century, increasingly and globally controlled, medicalized, and regulated. The reflection proposed starts from the consequences of the inscription of reproduction into the neoliberal economic paradigm. The new biotechnologies developments have raised a new patriarchal justification for State’s control of uterus bodies and a new construction of knowledge about reproductive health. Moral discussion and juridification remove reproduction and non-reproduction from their personal and intimate context and frame them under words like “duties”, “rights”, “family planning”, “demography”, and “population policy”, reinvent them as “States business” and ultimately help to re/confirm a specific construct of fertility, motherhood, and family. Moreover, the interaction between the neoliberal economy and medical biotechnologies brought about a new formulation of the connection between feminine generative potential and value production. The widespread and contemporary debates on Medically Assisted Reproduction (MAR), surrogacy and abortion suggest the need for a “feminist/queer global bioethical discourse” capable of inserting itself into the official bioethical debate characterized by the traditional dichotomy of laic bioethics/Catholic bioethics. The contribution moves from a feminist bioethics perspective on reproductive technologies to introduce a feminist/queer global bioethics point of view on reproductive health. The comparison between reproduction and non-reproduction debates is useful to analyze and demonstrate how restrictive legislations, dichotomic bioethical discussion and medical control confirm and strengthens gender injustice in reproductive life. In fact, MAR, surrogacy, and abortion restrictions stem from a shared social and legal paradigm that depends on traditional gender roles revealing how the stratification of reproduction is based on multiple discrimination along the lines of gender, race, and class. In conclusion, the perspective of feminist/queer global bioethics tries to read the concept of universal reproductive justice, introducing an original point of view on reproductive health access.Keywords: queer bioethics, reproductive health, reproductive justice, reproductive technologies
Procedia PDF Downloads 1225969 A Multifactorial Algorithm to Automate Screening of Drug-Induced Liver Injury Cases in Clinical and Post-Marketing Settings
Authors: Osman Turkoglu, Alvin Estilo, Ritu Gupta, Liliam Pineda-Salgado, Rajesh Pandey
Abstract:
Background: Hepatotoxicity can be linked to a variety of clinical symptoms and histopathological signs, posing a great challenge in the surveillance of suspected drug-induced liver injury (DILI) cases in the safety database. Additionally, the majority of such cases are rare, idiosyncratic, highly unpredictable, and tend to demonstrate unique individual susceptibility; these qualities, in turn, lend to a pharmacovigilance monitoring process that is often tedious and time-consuming. Objective: Develop a multifactorial algorithm to assist pharmacovigilance physicians in identifying high-risk hepatotoxicity cases associated with DILI from the sponsor’s safety database (Argus). Methods: Multifactorial selection criteria were established using Structured Query Language (SQL) and the TIBCO Spotfire® visualization tool, via a combination of word fragments, wildcard strings, and mathematical constructs, based on Hy’s law criteria and pattern of injury (R-value). These criteria excluded non-eligible cases from monthly line listings mined from the Argus safety database. The capabilities and limitations of these criteria were verified by comparing a manual review of all monthly cases with system-generated monthly listings over six months. Results: On an average, over a period of six months, the algorithm accurately identified 92% of DILI cases meeting established criteria. The automated process easily compared liver enzyme elevations with baseline values, reducing the screening time to under 15 minutes as opposed to multiple hours exhausted using a cognitively laborious, manual process. Limitations of the algorithm include its inability to identify cases associated with non-standard laboratory tests, naming conventions, and/or incomplete/incorrectly entered laboratory values. Conclusions: The newly developed multifactorial algorithm proved to be extremely useful in detecting potential DILI cases, while heightening the vigilance of the drug safety department. Additionally, the application of this algorithm may be useful in identifying a potential signal for DILI in drugs not yet known to cause liver injury (e.g., drugs in the initial phases of development). This algorithm also carries the potential for universal application, due to its product-agnostic data and keyword mining features. Plans for the tool include improving it into a fully automated application, thereby completely eliminating a manual screening process.Keywords: automation, drug-induced liver injury, pharmacovigilance, post-marketing
Procedia PDF Downloads 1505968 Challenge of Net-Zero Carbon Construction and Measurement of Energy Consumption and Carbon Emission Reduction to Climate Change, Economy and Job Growths in Hong Kong and Australia
Authors: Kwok Tak Kit
Abstract:
Under the Paris Agreement 2015, the countries committed to address and combat the climate change and its negative impacts and agree to the target of reducing the global greenhouse gas (GHG) emission substantially by limiting the global temperature to 20C above the pre-industrial level in this century. A internationally Submit named “ 26th United Nations Climate Conference” (COP26) was held in Glasgow in 2021 with all committed countries agreed to the finalize the outstanding element in Paris Agreement and Glasgow Climate Pact to keep 1.50C. In this paper, we will focus on the basic approach of waste strategy, recycling policy, circular economy strategy, net-zero strategy and sustainability strategy and the importance of the elements which affect the carbon emission, waste generation and energy conservation will be further reviewed with recommendation for future study.Keywords: net-zero carbon, climate change, carbon emission, energy consumption
Procedia PDF Downloads 1825967 Virtual Marketing Team Leadership and Burnout: Literature Review, Implications for Managers, and Recommendations for Future Research
Authors: Chad A. Roberts
Abstract:
In the digitally connected world, global virtual teams are increasingly becoming the norm at large, multinational companies. Marketing managers see the positives of virtual teams. They also see the negatives. Employees who work from home may feel isolated, unorganized, and distracted by homelife. These complexities create a phenomenon that leaves virtual team members feeling burnout, a significant issue for marketing leaders and their team members. This paper examines remote worker burnout in global virtual marketing team settings. It provides an overview of the benefits and downsides to remote working marketing teams. The paper presents the literature on remote work stress and burnout, discusses ways marketing leaders can help prevent virtual employee burnout and suggests future research studies.Keywords: burnout, COVID-19 pandemic, leadership, marketing, remote work, virtual team
Procedia PDF Downloads 2175966 Research on Health Emergency Management Based on the Bibliometrics
Authors: Meng-Na Dai, Bao-Fang Wen, Gao-Pei Zhu, Chen-Xi Zhang, Jing Sun, Chang-Hai Tang, Zhi-Qiang Feng, Wen-Qiang Yin
Abstract:
Based on the analysis of literature in the health emergency management in China with recent 10 years, this paper discusses the Chinese current research hotspots, development trends and shortcomings in this field, and provides references for scholars to conduct follow-up research. CNKI(China National Knowledge Infrastructure), Weipu, and Wanfang were the databases of this literature. The key words during the database search were health, emergency, and management with the time from 2009 to 2018. The duplicate, non-academic, and unrelated documents were excluded. 901 articles were included in the literature review database. The main indicators of abstraction were, the number of articles published every year, authors, institutions, periodicals, etc. There are some research findings through the analysis of the literature. Overall, the number of literature in the health emergency management in China has shown a fluctuating downward trend in recent 10 years. Specifically, there is a lack of close cooperation between authors, which has not constituted the core team among them yet. Meanwhile, in this field, the number of high-level periodicals and quality literature is scarce. In addition, there are a lot of research hotspots, such as emergency management system, mechanism research, capacity evaluation index system research, plans and capacity-building research, etc. In the future, we should increase the scientific research funding of the health emergency management, encourage collaborative innovation among authors in multi-disciplinary fields, and create high-quality and high-impact journals in this field. The states should encourage scholars in this field to carry out more academic cooperation and communication with the whole world and improve the research in breadth and depth. Generally speaking, the research in health emergency management in China is still insufficient and needs to be improved.Keywords: health emergency management, research situation, bibliometrics, literature
Procedia PDF Downloads 1355965 The International Field Placement: Experience in Vietnam Social Work International Placement Programme
Authors: Ngo Thi Thanh Mai, Nguyen Thu Ha, Frances Crawford
Abstract:
The demand for developing international social work field education is on the rise. Global foreign universities have considered international collaboration and cross-cultural perspective as an essential part of their social work training curriculum. International placement program at Faculty of Social Work (FSW), Hanoi National University of Education (HNUE) has met the need of international social work students, as well as the institutions involved in achieving social work professional social work knowledge in the Vietnamese context. This program has also lead to a long-term collaboration between HNUE and several global institutions in developing social work education, research and practice skill. This paper focuses on the benefits and challenges of students who involved in the global placement programme at Faculty of Social Work (FSW), Hanoi National University of Education (HNUE) and content of international field education provided to the international students based on the experience of the authors. Study results indicated that the participants have opportunity them to explore a new culture and social work system abroad especially in the Vietnamese context. However, there are still difficulties that international students have to face during different phases of the exchange process such as language and communication barriers, cultural value differences, insufficient support and supervision during placement. Basing on these results, the authors intend to propose some recommendations to enhance the programme activities such as pre-departure orientation, support and supervision during placement, cultural exchange and follow-up activities.Keywords: social work education, social work, international placement, field placement, Vietnam
Procedia PDF Downloads 1425964 India’s Foreign Policy toward its South Asian Neighbors: Retrospect and Prospect
Authors: Debasish Nandy
Abstract:
India’s foreign policy towards all of her neighbor countries is determinate on the basis of multi-dimensional factors. India’s relations with its South Asian neighbor can be classified into three categories. In the first category, there are four countries -Sri Lanka, Bangladesh, Nepal, and Afghanistan- whose bilateral relationships have encompassed cooperation, irritants, problems and crisis at different points in time. With Pakistan, the relationship has been perpetually adversarial. The third category includes Bhutan and Maldives whose relations are marked by friendship and cooperation, free of any bilateral problems. It is needless to say that Jawaharlal Nehru emphasized on friendly relations with the neighboring countries. The subsequent Prime Ministers of India especially I.K. Gujral had advocated in making of peaceful and friendly relations with the subcontinental countries. He had given a unique idea to foster bilateral relations with the neighbors. His idea is known as ‘Gujral Doctrine’. A dramatical change has been witnessed in Indian foreign policy since 1991.In the post-Cold War period, India’s national security has been vehemently threatened by terrorism, which originated from Pakistan-Afghanistan and partly Bangladesh. India has required a cooperative security, which can be made by mutual understanding among the South Asian countries. Additionally, the countries of South Asia need to evolve the concept of ‘Cooperative Security’ to explain the underlying logic of regional cooperation. According to C. Rajamohan, ‘cooperative security could be understood, as policies of governments, which see themselves as former adversaries or potential adversaries to shift from or avoid confrontationist policies.’ A cooperative security essentially reflects a policy of dealing peacefully with conflicts, not merely by abstention from violence or threats but by active engagement in negotiation, a search for practical solutions and with a commitment to preventive measures. Cooperative assumes the existence of a condition in which the two sides possess the military capabilities to harm each other. Establishing cooperative security runs into a complex process building confidence. South Asian nations often engaged with hostility to each other. Extra-regional powers have been influencing their powers in this region since a long time. South Asian nations are busy to purchase military equipment. In spite of weakened economic systems, these states are spending a huge amount of money for their security. India is the big power in this region in every aspect. The big states- small states syndrome is a negative factor in this respect. However, India will have to an initiative to extended ‘track II diplomacy’ or soft diplomacy for its security as well as the security of this region.Confidence building measures could help rejuvenate not only SAARC but also build trust and mutual confidence between India and its neighbors in South Asia. In this paper, I will focus on different aspects of India’s policy towards it, South-Asian neighbors. It will also be searched that how India is dealing with these countries by using a mixed type of diplomacy – both idealistic and realistic points of view. Security and cooperation are two major determinants of India’s foreign policy towards its South Asian neighbors.Keywords: bilateral, diplomacy, infiltration, terrorism
Procedia PDF Downloads 5375963 Proximity-Inset Fed Triple Band Antenna for Global Position System with High Gain
Authors: The Nan Chang, Ping-Tang Yu, Jyun-Ming Lin
Abstract:
A triple band circularly polarized antenna covering 1.17, 1.22, and 1.57 GHz is presented. To extend to the triple-band operation, we need to add one more ring while maintaining the mechanism to independently control each ring. The inset-part in the feeding scheme is used to excite the band at 1.22 GHz, while the proximate-part of the feeding scheme is used to excite not only the band at 1.57 GHz but also the band at 1.17 GHz. This is achieved by up-vertically coupled with one ring to radiate at 1.57 GHz and down-vertically coupled another ring to radiate at 1.17 GHz. It is also noted that the inset-part in our feeding scheme is by horizontal coupling. Furthermore, to increase the gain at all three bands, three air-layers are added to make the total height of the antenna be 7.8 mm. The total thickness of the three air-layers is 3 mm. The gains of the three bands are all greater than 5 dBiC after adding the air-layers.Keywords: circular polarization, global position system, high gain, triband antenna
Procedia PDF Downloads 2355962 Loss Function Optimization for CNN-Based Fingerprint Anti-Spoofing
Authors: Yehjune Heo
Abstract:
As biometric systems become widely deployed, the security of identification systems can be easily attacked by various spoof materials. This paper contributes to finding a reliable and practical anti-spoofing method using Convolutional Neural Networks (CNNs) based on the types of loss functions and optimizers. The types of CNNs used in this paper include AlexNet, VGGNet, and ResNet. By using various loss functions including Cross-Entropy, Center Loss, Cosine Proximity, and Hinge Loss, and various loss optimizers which include Adam, SGD, RMSProp, Adadelta, Adagrad, and Nadam, we obtained significant performance changes. We realize that choosing the correct loss function for each model is crucial since different loss functions lead to different errors on the same evaluation. By using a subset of the Livdet 2017 database, we validate our approach to compare the generalization power. It is important to note that we use a subset of LiveDet and the database is the same across all training and testing for each model. This way, we can compare the performance, in terms of generalization, for the unseen data across all different models. The best CNN (AlexNet) with the appropriate loss function and optimizers result in more than 3% of performance gain over the other CNN models with the default loss function and optimizer. In addition to the highest generalization performance, this paper also contains the models with high accuracy associated with parameters and mean average error rates to find the model that consumes the least memory and computation time for training and testing. Although AlexNet has less complexity over other CNN models, it is proven to be very efficient. For practical anti-spoofing systems, the deployed version should use a small amount of memory and should run very fast with high anti-spoofing performance. For our deployed version on smartphones, additional processing steps, such as quantization and pruning algorithms, have been applied in our final model.Keywords: anti-spoofing, CNN, fingerprint recognition, loss function, optimizer
Procedia PDF Downloads 136