Search results for: memory isolation
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 2057

Search results for: memory isolation

947 Chemical Analysis and Cytotoxic Evaluation of Asphodelus Aestivus Brot. Flowers

Authors: Mai M. Farid, Mona El-Shabrawy, Sameh R. Hussein, Ahmed Elkhateeb, El-Said S. Abdel-Hameed, Mona M. Marzouk

Abstract:

Asphodelus aestivus Brot. Is a wild plant distributed in Egypt and is considered one of the five Asphodelus spp. from the family Asphodelaceae; it grows in dry grasslands and on rocky or sandy soil. The chemical components of A. aestivus flowers extract were analyzed using different chromatographic and spectral techniques and led to the isolation of two anthraquinones identified as emodin and emodin-O-glucoside. In addition to, five flavonoid compounds;kaempferol,Kaempferol-3-O-glucoside,Apigenin-6-C-glucoside-7-O-glucoside (Saponarine), luteolin 7-O-β-glucopyranoside, Isoorientin-O-malic acid which is a new compound in nature. The LC-ESI-MS/MS analysis of the flower extract of A. aestivus led to the identification of twenty- two compounds characterized by the presence of flavones, flavonols, and flavone C-glycosides. While GC/MS analysis led to the identification of 24 compounds comprising 98.32% of the oil, the major components of the oil were 9, 12, 15-Octadecatrieoic acid methyl ester 28.72%, and 9, 12-Octadecadieroic acid (Z, Z)-methyl ester 19.96%. In vitro cytotoxic activity of the aqueous methanol extract of A. aestivus flowers against HEPG2, HCT-116, MCF-7, and A549 culture was examined and showed moderate inhibition (62.3±1.1)% on HEPG2 cell line followed by (36.8±0.2)% inhibition on HCT-116 and a weak inhibition (5.7± 0.0.2) on MCF-7 cell line followed by (4.5± 0.4) % inhibition on A549 cell line and this is considered the first cytotoxic report of A. aestivus flowers.

Keywords: Anthraquinones, Asphodelus aestivus, Cytotoxic activity, Flavonoids, LC-ESI-MS/MS

Procedia PDF Downloads 222
946 Emergence of Carbapenemase Escherichia Coli Isolates from the Little Egret (Egretta Garzetta) in Algeria

Authors: Bouaziz Amira, Zaatout Nawel

Abstract:

Background: Antimicrobial resistance is an urgent global health challenge in human and veterinary medicine, where migratory birds play a major role in the dissemination of multi-drug-resistant bacteria. The aim of this study was to screen for the presence of carbapenemase-producing Gram-negative bacteria (GNB) in the little egret (Egrettagarzetta) migratory bird stools in Algeria. Materials/Methods: In January 2014, 12 feacal samples were collected in Garaet El-Tarf, Oum El-Bouaghi city, Algeria. Samples were subjected to selective isolation of carbapenem-resistant GNB. Representative colonies were identified using the VITEK system. The obtained isolates were subjected to antibiotic susceptibility testing using the disc-diffusion method as well as carbapenemase production was verified by the modified Carba NP test. Results: In total, ten E. coli were obtained and were resistant to amoxicillin/clavulanic acid (100%), ertapenem (70%), cefoxitin (60%) cefotaxime (20%), cefepime (20%), ciprofloxacin (20%) and aztreonam (10%). The phenotypic detection results revealed that six out of the obtained strains were positive for the modified Carba NP test. Conclusion: The present study suggests that the little egret (Egretta garzetta) could be considered a reservoir of carbapenem-resistant Gram-negative bacteria.

Keywords: antimicrobial resistance, E. coli, Egretta garzetta, carbapenem resistance, dissemination

Procedia PDF Downloads 7
945 Verbal Prefix Selection in Old Japanese: A Corpus-Based Study

Authors: Zixi You

Abstract:

There are a number of verbal prefixes in Old Japanese. However, the selection or the compatibility of verbs and verbal prefixes is among the least investigated topics on Old Japanese language. Unlike other types of prefixes, verbal prefixes in dictionaries are more often than not listed with very brief information such as ‘unknown meaning’ or ‘rhythmic function only’. To fill in a part of this knowledge gap, this paper presents an exhaustive investigation based on the newly developed ‘Oxford Corpus of Old Japanese’ (OCOJ), which included nearly all existing resource of Old Japanese language, with detailed linguistics information in TEI-XML tags. In this paper, we propose the possibility that the following three prefixes, i-, sa-, ta- (with ta- being considered as a variation of sa-), are relevant to split intransitivity in Old Japanese, with evidence that unergative verbs favor i- and that unergative verbs favor sa-(ta-). This might be undermined by the fact that transitives are also found to follow i-. However, with several manifestations of split intransitivity in Old Japanese discussed, the behavior of transitives in verbal prefix selection is no longer as surprising as it may seem to be when one look at the selection of verbal prefix in isolation. It is possible that there are one or more features that played essential roles in determining the selection of i-, and the attested transitive verbs happen to have these features. The data suggest that this feature is a sense of ‘change’ of location or state involved in the event donated by the verb, which is a feature of typical unaccusatives. This is further discussed in the ‘affectedness’ hierarchy. The presentation of this paper, which includes a brief demonstration of the OCOJ, is expected to be of the interest of both specialists and general audiences.

Keywords: old Japanese, split intransitivity, unaccusatives, unergatives, verbal prefix selection

Procedia PDF Downloads 415
944 A Brief of Survey on Use of Videoconferencing in Teaching during Quarantine Conducted in Sao Paulo

Authors: Fernanda Laureti T. Ferreira, Kazuo Nishimoto

Abstract:

This paper presents a summary of the experience on videoconferencing tools that have been used to teach regular classes during this pandemic period in educational institutions in São Paulo, which tools and applications are most used and the challenges related to this mode of delivery. At this moment, the massive online education is not a choice of students or a structured development of education system, but a solution that emerged to attend urgent needs and it presents the opportunity to teach and learning available for the most students in this single time of social isolation that forced among others, this significant change for education, students, teachers, institutions and families. Distance education enables synchronous and asynchronous mode classes, and even though the current circumstances generate discomfort and uncertainty, on the other hand, there is a chance to promote a 'learning to learn'. The videoconference is a preferred choice of schools because synchronous mode to give more interaction between a group of students and teachers, but this mode requires specifics teacher competencies and skills, in addition to equipment and provision of adequate internet signal for all participants of the process. The approach is making use of known technical information about video conference tools and the results of search answered by a group of students, teachers, schools, and parents. The results presented refer to the perspectives of students and parents as respondents.

Keywords: distance education, interaction on education, online classes, synchronous e-learning, videoconference

Procedia PDF Downloads 122
943 Isolation and Identification of Novel Escherichia Marmotae Spp.: Their Enzymatic Biodegradation of Zearalenone and Deep-oxidation of Deoxynivalenol

Authors: Bilal Murtaza, Xiaoyu Li, Liming Dong, Muhammad Kashif Saleemi, Gen Li, Bowen Jin, Lili Wang, Yongping Xu

Abstract:

Fusarium spp. produce numerous mycotoxins, such as zearalenone (ZEN), deoxynivalenol (DON), and its acetylated compounds, 3-acetyl-deoxynivalenol (3-ADON) and 15-acetyl-deoxynivalenol (15-ADON) (15-ADON). In a co-culture system, the soil-derived Escherichia marmotae strain degrades ZEN and DON into 3-keto-DON and DOM-1 via enzymatic deep-oxidation. When pure mycotoxins were subjected to Escherichia marmotae in culture flasks, degradation, and detoxification were also attained. DON and ZEN concentrations, ambient pH, incubation temperatures, bacterium concentrations, and the impact of acid treatment on degradation were all evaluated. The results of the ELISA and high-performance liquid chromatography-electrospray ionization-high resolution mass spectrometry (HPLC-ESI-HRMS) tests demonstrated that the concentration of mycotoxins exposed to Escherichia marmotae was significantly lower than the control. ZEN levels were reduced by 43.9%, while zearalenone sulfate ([M/z 397.1052 C18H21O8S1) was discovered as a derivative of ZEN converted by microbes to a less toxic molecule. Furthermore, Escherichia marmotae appeared to metabolize DON 35.10% into less toxic derivatives (DOM-1 at m/z 281 of [DON - O]+ and 3-keto-DON at m/z 295 of [DON - 2H]+). These results show that Escherichia marmotae can reduce Fusarium mycotoxins production, degrade pure mycotoxins, and convert them to less harmful compounds, opening up new possibilities for study and innovation in mycotoxin detoxification.

Keywords: mycotoxins, zearalenone, deoxynivalenol, bacterial degradation

Procedia PDF Downloads 99
942 Stenotrophomonas maltophilia: The Major Carbapenem Resistance Bacteria from Waste Water Treatment Plant of Pig Farm

Authors: Young-Ji Kim, Jin-Hyeong Park, Hong-Seok Kim, Jung-Whan Chon, Kwang-Yeop Kim, Dong-Hyeon Kim, Il-Byeong Kang, Da-Na Jeong, Jin-Hyeok Yim, Ho-Seok Jang, Kwang-Young Song, Kun-Ho Seo

Abstract:

Stenotrophomonas maltophilia is one of the emerging opportunistic pathogens, and also known to have extensive drug resistance intrinsically including carbepenems which is last resort for most serious infections. One possible way for S. maltophilia to infect human is via wastewater treatment plant (WWTP). In the period between October 2016 and February 2017, effluent samples of WWTP from 3 different pig farms were collected once a month and screened for isolation of S. maltophilia. Total 16 strains of S. maltophilia were isolated and, the antibiotic susceptibility phenotypes were determined by Vitek 2 system for 16 antibiotics, ampicillin (AMP), amoxicillin/clavulanic acid (AMC), piperacillin/tazobactam (TZP), cefazolin (CZ), cefoxitin (FOX), cefotaxime (CTX), ceftazidime (CAZ), cefepime (FEP), aztreonam (AZT), ertapenem (ETP), imipenem (IMP), amikacin (AK), gentamicin (GN), ciprofloxacin (CIP), tigecycline (TGC) and trimethoprim/sulfamethoxazole (SXT). All isolates showed high resistance to AMP (100%), CZ (100%), FOX (100%), CTX (100%), CAZ (100%), FEP (94%), AZT (100%), ETP (100%), IMP (100%), AK (100%), GN (100%) whereas were susceptible to CIP (0%), TGC (0%), SXT (6%). All strains harbored at least one of the antibiotic resistance determinant such as spgM, rmlA, and rpfF. Some isolates had similar MLST (multilocus sequence typing) types with clinical isolates, suggesting WWTP could have potential role in the transmission of S. maltophilia to aquatic environment and, possibly, to humans.

Keywords: Stenotrophomonas maltophilia, Carbapenem resistance, waste water treatment plant, pig farm

Procedia PDF Downloads 463
941 Variations of Metaphors: Wittgenstein's Contribution to Literary Studies

Authors: Dorit Lemberger

Abstract:

Wittgenstein directly used the term "metaphor" only infrequently and with reservations, but his writings include a number of metaphors that have become imprinted in the philosophical memory of Western thought. For example, the ladder in his book Tractatus, or in Philosophical investigations - the ancient city, the beetle in a box, the fly in the fly-bottle, and the duck-rabbit. In light of Wittgenstein's stressing, throughout his investigations, that the only language that exists is ordinary language, and that there is no "second-order" language, the question should be asked: How do these metaphors function, specifically, and in general, how are we to relate to language use that exceeds the normal? Wittgenstein did not disregard such phenomena, but he proposed viewing them in a different way, that would enable understanding them as uses in ordinary language, without necessarily exceeding such language. Two important terms that he coined in this context are "secondary sense" and "experience of meaning". Each denotes language use as reflective of a subjective element characteristic of the speaker, such as intent, experience, or emphasis of a certain aspect. More recent Wittgenstein scholars added the term "quasi-metaphor", that refers to his discussion of the possibility of aesthetic judgment. This paper will examine how, according to Wittgenstein, these terms function without exceeding ordinary language, and will illustrate how they can be applied, in an analysis of the poem "Butterfly" by Nelly Sachs.

Keywords: metaphor, quasi-metaphor, secondary sense, experience of meaning

Procedia PDF Downloads 437
940 Child Rights in the Context of Psychiatric Power

Authors: Dmytro D. Buiadzhy

Abstract:

The modern psychiatric discourse proves the existence of the direct ties between the children's mental health and their success in life as adults. The unresolved mental health problems in childhood are likely to lead individuals to poverty, isolation, and social exclusion as stated by Marcus Richards. Such an approach justifies the involvement of children in the view of supervision and control of power. The discourse, related to the mental health of children, provides a tight impact of family, educational institutions and medical authorities on the child through any manifestations of his psychic, having signs of "abnormality.” Throughout the adult life, the individual continues to feel the pressure of power through legal, political, and economic institutions that also appeal to the mental health regulation. The juvenile law declares the equality of a child and an adult, but in fact simply delegates the powers of parents to impersonal social institutions of the guardianship, education, and social protection. The psychiatric power in this study is considered in accordance with the Michel Foucault’s concept of power as a manifestation of "positive" technologies of power, which include various manifestations of subjectivity, in particular children’s one, in a view of supervision and control of the state power. The main issue disclosed in this paper is how weakening of the parental authority, in the context of legislative ratification of the child rights, strengthens the other forms of power over children, especially the psychiatric power, which justifies and affects the children mancipation.

Keywords: child rights, psychiatric power, discourse, parental authority

Procedia PDF Downloads 344
939 Dynamic Fault Diagnosis for Semi-Batch Reactor Under Closed-Loop Control via Independent RBFNN

Authors: Abdelkarim M. Ertiame, D. W. Yu, D. L. Yu, J. B. Gomm

Abstract:

In this paper, a new robust fault detection and isolation (FDI) scheme is developed to monitor a multivariable nonlinear chemical process called the Chylla-Haase polymerization reactor when it is under the cascade PI control. The scheme employs a radial basis function neural network (RBFNN) in an independent mode to model the process dynamics and using the weighted sum-squared prediction error as the residual. The recursive orthogonal Least Squares algorithm (ROLS) is employed to train the model to overcome the training difficulty of the independent mode of the network. Then, another RBFNN is used as a fault classifier to isolate faults from different features involved in the residual vector. The several actuator and sensor faults are simulated in a nonlinear simulation of the reactor in Simulink. The scheme is used to detect and isolate the faults on-line. The simulation results show the effectiveness of the scheme even the process is subjected to disturbances and uncertainties including significant changes in the monomer feed rate, fouling factor, impurity factor, ambient temperature and measurement noise. The simulation results are presented to illustrate the effectiveness and robustness of the proposed method.

Keywords: Robust fault detection, cascade control, independent RBF model, RBF neural networks, Chylla-Haase reactor, FDI under closed-loop control

Procedia PDF Downloads 498
938 Isolation, Identification and Antimicrobial Susceptibility of Mycobacterium tuberculosis among Pulmonary Tuberculosis Patients

Authors: Naima Nur, Safa Islam, Saeema Islam, Faridul Alam

Abstract:

Background: Drug-resistant pulmonary tuberculosis (DR-PTB), particularly multidrug-resistant tuberculosis (MDR-TB) and pre-extensive drug-resistant (pre-XDR), is a major challenge in effectively controlling TB, especially in developing. This study aimed to identify the strains of M. tuberculosis complex (MTC) and drug resistance patterns among the pulmonary tuberculosis patients. Methods: The study used a cross-sectional design, and 815 patients were recruited randomly in three study periods. In the first-period, 210 treated PTB patients, who were completed their treatment, received their diagnoses using light microscopy, fluorescence microscopy and cultured on Lowenstein-Jensen (L-J) slant, and then strains were identified as MTC by biochemical tests, and then sensitivity test in National Institute of Diseases of the Chest and Hospital. In the second-period, 220 re-treated PTB patients, who were completed their treatment, received their diagnoses using culture on L-J slant, line probe assay (LPA), and GeneXpert in the same hospital. In the last-period, during treatment, 385 MDR-PTB patients received their diagnoses using culture on L-J slant and LPA in the same hospital. Results: Among sixty-two (29.5%) PTB patients, 13% were sensitive to all first-line anti-TB drugs, 26% were MDR-TB patients, and 14.2% were pre-XDR-TB among 14 MDR-TB patients. After three years, 31% were MDR-TB among 220 re-treated PTB patients. After five years, 16.4% was pre-XDR-TB among 385 MDR-TB patients. Compared to females, male patients were significantly higher at all times. Conclusion: The current study demonstrated that in three study periods, the proportions of DR-TB, MDR-TB, and pre-XDR patients were an alarming issue and increasing daily.

Keywords: multi-drug resistant, drug-resistant, pre-extensive drug resistant, pulmonary tuberculosis

Procedia PDF Downloads 55
937 The Underground Ecosystem of Credit Card Frauds

Authors: Abhinav Singh

Abstract:

Point Of Sale (POS) malwares have been stealing the limelight this year. They have been the elemental factor in some of the biggest breaches uncovered in past couple of years. Some of them include • Target: A Retail Giant reported close to 40 million credit card data being stolen • Home Depot : A home product Retailer reported breach of close to 50 million credit records • Kmart: A US retailer recently announced breach of 800 thousand credit card details. Alone in 2014, there have been reports of over 15 major breaches of payment systems around the globe. Memory scrapping malwares infecting the point of sale devices have been the lethal weapon used in these attacks. These malwares are capable of reading the payment information from the payment device memory before they are being encrypted. Later on these malwares send the stolen details to its parent server. These malwares are capable of recording all the critical payment information like the card number, security number, owner etc. All these information are delivered in raw format. This Talk will cover the aspects of what happens after these details have been sent to the malware authors. The entire ecosystem of credit card frauds can be broadly classified into these three steps: • Purchase of raw details and dumps • Converting them to plastic cash/cards • Shop! Shop! Shop! The focus of this talk will be on the above mentioned points and how they form an organized network of cyber-crime. The first step involves buying and selling of the stolen details. The key point to emphasize are : • How is this raw information been sold in the underground market • The buyer and seller anatomy • Building your shopping cart and preferences • The importance of reputation and vouches • Customer support and replace/refunds These are some of the key points that will be discussed. But the story doesn’t end here. As of now the buyer only has the raw card information. How will this raw information be converted to plastic cash? Now comes in picture the second part of this underground economy where-in these raw details are converted into actual cards. There are well organized services running underground that can help you in converting these details into plastic cards. We will discuss about this technique in detail. At last, the final step involves shopping with the stolen cards. The cards generated with the stolen details can be easily used to swipe-and-pay for purchased goods at different retail shops. Usually these purchases are of expensive items that have good resale value. Apart from using the cards at stores, there are underground services that lets you deliver online orders to their dummy addresses. Once the package is received it will be delivered to the original buyer. These services charge based on the value of item that is being delivered. The overall underground ecosystem of credit card fraud works in a bulletproof way and it involves people working in close groups and making heavy profits. This is a brief summary of what I plan to present at the talk. I have done an extensive research and have collected good deal of material to present as samples. Some of them include: • List of underground forums • Credit card dumps • IRC chats among these groups • Personal chat with big card sellers • Inside view of these forum owners. The talk will be concluded by throwing light on how these breaches are being tracked during investigation. How are credit card breaches tracked down and what steps can financial institutions can build an incidence response over it.

Keywords: POS mawalre, credit card frauds, enterprise security, underground ecosystem

Procedia PDF Downloads 439
936 The Effects of Normal Aging on Reasoning Ability: A Dual-Process Approach

Authors: Jamie A. Prowse Turner, Jamie I. D. Campbell, Valerie A. Thompson

Abstract:

The objective of the current research was to use a dual-process theory framework to explain these age-related differences in reasoning. Seventy-two older (M = 80.0 years) and 72 younger (M = 24.6 years) adults were given a variety of reasoning tests (i.e., a syllogistic task, base rate task, the Cognitive Reflection Test, and a perspective manipulation), as well as independent tests of capacity (working memory, processing speed, and inhibition), thinking styles, and metacognitive ability, to account for these age-related differences. It was revealed that age-related differences were limited to problems that required Type 2 processing and were related to differences in cognitive capacity, individual difference factors, and strategy choice. Furthermore, older adults’ performance can be improved by reasoning from another’s’ perspective and cannot, at this time, be explained by metacognitive differences between young and older adults. All of these findings fit well within a dual-process theory of reasoning, which provides an integrative framework accounting for previous findings and the findings presented in the current manuscript.

Keywords: aging, dual-process theory, performance, reasoning ability

Procedia PDF Downloads 191
935 Cyber Security Enhancement via Software Defined Pseudo-Random Private IP Address Hopping

Authors: Andre Slonopas, Zona Kostic, Warren Thompson

Abstract:

Obfuscation is one of the most useful tools to prevent network compromise. Previous research focused on the obfuscation of the network communications between external-facing edge devices. This work proposes the use of two edge devices, external and internal facing, which communicate via private IPv4 addresses in a software-defined pseudo-random IP hopping. This methodology does not require additional IP addresses and/or resources to implement. Statistical analyses demonstrate that the hopping surface must be at least 1e3 IP addresses in size with a broad standard deviation to minimize the possibility of coincidence of monitored and communication IPs. The probability of breaking the hopping algorithm requires a collection of at least 1e6 samples, which for large hopping surfaces will take years to collect. The probability of dropped packets is controlled via memory buffers and the frequency of hops and can be reduced to levels acceptable for video streaming. This methodology provides an impenetrable layer of security ideal for information and supervisory control and data acquisition systems.

Keywords: moving target defense, cybersecurity, network security, hopping randomization, software defined network, network security theory

Procedia PDF Downloads 185
934 Bioactive Molecules Isolated for the First Time from Hyoscyamus albus L. and their Mechanisms Underlying the Anticancer Effects

Authors: Benhouda Afaf, Yahia Massinissa, Paolo Grieco

Abstract:

Hyoscyamus albus L. is a small genus from Solanaceae family known by its use in old traditional medicine in the east of Algeria. Aim: This study aimed to characterize bioactive molecules from H. albus, evaluate their anticancer activity in several cancer cells and investigate their possible molecular mechanism. Materials and Methods: Different compounds (Peak h of fraction F), (Peak 3 of Fraction F), (Peak 1 of fraction C) were isolated from H.albus L by using high-performance chromatography (HPLC), mass spectrometry (MS) and proton NMR (NMR H1). All isolated compounds were subjected to cytotoxicity and antiproliferative assays against a panel of the four cell lines: DU-145, U-2 OS, U-87 MG and LN-229 cell lines and were determined using MTT assay, Annexin V and propodium iodide were used to evaluate apoptosis. Results: The phytochemical study of H. albus Fractions led to the isolation of quercetin-3-O-β-dglucopyranosyl-( 1 → 6)-β-d-glucopyranosid, N-trans-feruloyltyramine, Hydrocaffeoyl-N8- caffeoylspermidine.The biological results indicated that all cell lines were consistently sensitive to P1 FC in a dose-dependent manner. This difference in cytotoxic sensitivity was more pronounced in osteosarcoma cell line, U-2 OS, when compared to prostate cancer and U-87 MG. Cell viability data also demonstrated that only U-87 MG cells were responsive to treatment with Ph FF. compounds P1 FC and Ph FF have induced necrosis and apoptosis in a large part of LN-229 cells. Conclusion: The overall results of the present study provided evidence that isolated compounds are potential therapeutic entities against cancer.

Keywords: hyoscyamus albus, cancer cells, coumpounds, HPLC

Procedia PDF Downloads 9
933 A Machine Learning Based Method to Detect System Failure in Resource Constrained Environment

Authors: Payel Datta, Abhishek Das, Abhishek Roychoudhury, Dhiman Chattopadhyay, Tanushyam Chattopadhyay

Abstract:

Machine learning (ML) and deep learning (DL) is most predominantly used in image/video processing, natural language processing (NLP), audio and speech recognition but not that much used in system performance evaluation. In this paper, authors are going to describe the architecture of an abstraction layer constructed using ML/DL to detect the system failure. This proposed system is used to detect the system failure by evaluating the performance metrics of an IoT service deployment under constrained infrastructure environment. This system has been tested on the manually annotated data set containing different metrics of the system, like number of threads, throughput, average response time, CPU usage, memory usage, network input/output captured in different hardware environments like edge (atom based gateway) and cloud (AWS EC2). The main challenge of developing such system is that the accuracy of classification should be 100% as the error in the system has an impact on the degradation of the service performance and thus consequently affect the reliability and high availability which is mandatory for an IoT system. Proposed ML/DL classifiers work with 100% accuracy for the data set of nearly 4,000 samples captured within the organization.

Keywords: machine learning, system performance, performance metrics, IoT, edge

Procedia PDF Downloads 195
932 The Integration of Patient Health Record Generated from Wearable and Internet of Things Devices into Health Information Exchanges

Authors: Dalvin D. Hill, Hector M. Castro Garcia

Abstract:

A growing number of individuals utilize wearable devices on a daily basis. The usage and functionality of these wearable devices vary from user to user. One popular usage of said devices is to track health-related activities that are typically stored on a device’s memory or uploaded to an account in the cloud; based on the current trend, the data accumulated from the wearable device are stored in a standalone location. In many of these cases, this health related datum is not a factor when considering the holistic view of a user’s health lifestyle or record. This health-related data generated from wearable and Internet of Things (IoT) devices can serve as empirical information to a medical provider, as the standalone data can add value to the holistic health record of a patient. This paper proposes a solution to incorporate the data gathered from these wearable and IoT devices, with that a patient’s Personal Health Record (PHR) stored within the confines of a Health Information Exchange (HIE).

Keywords: electronic health record, health information exchanges, internet of things, personal health records, wearable devices, wearables

Procedia PDF Downloads 128
931 Isolating Refugees in Mountains: The Case of the Austrian Border Regime

Authors: Deike Janssen

Abstract:

In the scenery of the Tyrolean mountains, at an altitude of 1300 meters, stands a building. Residents and activists call it a prison. However, it is not a prison -according to authorities, it is a 'Return Counseling Facility' where migrants and refugees should be "motivated" to return "voluntary" to their countries of origin. This paper argues that the geographical location of the camp functions as a site of exclusion, isolation, and coercion where no one can decide “voluntary” to return, but where people are brought to despair to leave Austria. Through a qualitative case study, this paper documents the heavy impact of offshore detention on the mental, physical and social state of the residents and a variety of human rights problems in the centre. Different developments at the Return Counselling Facility and the law that back up the centre uncover a worrying dynamic that deliberately accepts human rights problems in order to enforce borders, a policy that disregards humanitarian, legal, and ethical stands in order to deport people at all hazards. It, therefore, can be seen as a creative and ultimate exercise of state power, which uses isolated locations to control migration. While the analysis revises the micro and macro implications of the facility and, therefore, the legal and political facets, it also sheds light on the role of the civil society, which tries to increase through constant and collective efforts the human rights efforts of the government.

Keywords: deportation, human rights, migration, refugee detention, voluntary return

Procedia PDF Downloads 136
930 Development of a Real-Time Brain-Computer Interface for Interactive Robot Therapy: An Exploration of EEG and EMG Features during Hypnosis

Authors: Maryam Alimardani, Kazuo Hiraki

Abstract:

This study presents a framework for development of a new generation of therapy robots that can interact with users by monitoring their physiological and mental states. Here, we focused on one of the controversial methods of therapy, hypnotherapy. Hypnosis has shown to be useful in treatment of many clinical conditions. But, even for healthy people, it can be used as an effective technique for relaxation or enhancement of memory and concentration. Our aim is to develop a robot that collects information about user’s mental and physical states using electroencephalogram (EEG) and electromyography (EMG) signals and performs costeffective hypnosis at the comfort of user’s house. The presented framework consists of three main steps: (1) Find the EEG-correlates of mind state before, during, and after hypnosis and establish a cognitive model for state changes, (2) Develop a system that can track the changes in EEG and EMG activities in real time and determines if the user is ready for suggestion, and (3) Implement our system in a humanoid robot that will talk and conduct hypnosis on users based on their mental states. This paper presents a pilot study in regard to the first stage, detection of EEG and EMG features during hypnosis.

Keywords: hypnosis, EEG, robotherapy, brain-computer interface (BCI)

Procedia PDF Downloads 256
929 Improvements and Implementation Solutions to Reduce the Computational Load for Traffic Situational Awareness with Alerts (TSAA)

Authors: Salvatore Luongo, Carlo Luongo

Abstract:

This paper discusses the implementation solutions to reduce the computational load for the Traffic Situational Awareness with Alerts (TSAA) application, based on Automatic Dependent Surveillance-Broadcast (ADS-B) technology. In 2008, there were 23 total mid-air collisions involving general aviation fixed-wing aircraft, 6 of which were fatal leading to 21 fatalities. These collisions occurred during visual meteorological conditions, indicating the limitations of the see-and-avoid concept for mid-air collision avoidance as defined in the Federal Aviation Administration’s (FAA). The commercial aviation aircraft are already equipped with collision avoidance system called TCAS, which is based on classic transponder technology. This system dramatically reduced the number of mid-air collisions involving air transport aircraft. In general aviation, the same reduction in mid-air collisions has not occurred, so this reduction is the main objective of the TSAA application. The major difference between the original conflict detection application and the TSAA application is that the conflict detection is focused on preventing loss of separation in en-route environments. Instead TSAA is devoted to reducing the probability of mid-air collision in all phases of flight. The TSAA application increases the flight crew traffic situation awareness providing alerts of traffic that are detected in conflict with ownship in support of the see-and-avoid responsibility. The relevant effort has been spent in the design process and the code generation in order to maximize the efficiency and performances in terms of computational load and memory consumption reduction. The TSAA architecture is divided into two high-level systems: the “Threats database” and the “Conflict detector”. The first one receives the traffic data from ADS-B device and provides the memorization of the target’s data history. Conflict detector module estimates ownship and targets trajectories in order to perform the detection of possible future loss of separation between ownship and each target. Finally, the alerts are verified by additional conflict verification logic, in order to prevent possible undesirable behaviors of the alert flag. In order to reduce the computational load, a pre-check evaluation module is used. This pre-check is only a computational optimization, so the performances of the conflict detector system are not modified in terms of number of alerts detected. The pre-check module uses analytical trajectories propagation for both target and ownship. This allows major accuracy and avoids the step-by-step propagation, which requests major computational load. Furthermore, the pre-check permits to exclude the target that is certainly not a threat, using an analytical and efficient geometrical approach, in order to decrease the computational load for the following modules. This software improvement is not suggested by FAA documents, and so it is the main innovation of this work. The efficiency and efficacy of this enhancement are verified using fast-time and real-time simulations and by the execution on a real device in several FAA scenarios. The final implementation also permits the FAA software certification in compliance with DO-178B standard. The computational load reduction allows the installation of TSAA application also on devices with multiple applications and/or low capacity in terms of available memory and computational capabilities

Keywords: traffic situation awareness, general aviation, aircraft conflict detection, computational load reduction, implementation solutions, software certification

Procedia PDF Downloads 285
928 Right to Return and Narrative in Refugee Camps: Case Study in Palestinian Displacement

Authors: Naomi I. Austin

Abstract:

Following WWII, the Geneva Conventions and Universal Declaration of Human Rights declared the right to return an unalienable right. The right to return has been disputed by the Israeli government and upheld as an individual by prominent Palestinian activists. Those who contest the Palestinian right to return argue that it would effectively end the state of Israel. After the conquest of Lebanon, the concept of a two-state solution has been effectively shut down. This research paper will seek to utilize interviews from NGO actors and those displaced to be gathered from fieldwork conducted in refugee camps and bases of international actors, exploring durable and multilateral solutions for not only the refugee crisis but the forced displacement of Palestinians that go beyond state actors and government entities. The research will center on the perspective of those displaced to generate a plausible solution to mitigate negative effects on displaced persons. This paper will seek to address whether the right to return is plausible with the expansion of Israeli territorial conquest and the impact of the Israeli expansion on migrations within the Mediterranean region and the EU, especially with policies of integration into the host community.

Keywords: durable solutions, forced displacement, protracted conflict, refugee studies, narrative building, memory, right to return

Procedia PDF Downloads 15
927 Pathogen Identification of Fusarium Spp. And Chemotypes Associated With Wheat Crown Rot in Hebei Province of China

Authors: Kahsay Tadesse Mawcha, Na Zhang, Xu Yiying, Chang Jiaying, Wenxiang Yang

Abstract:

Fusarium crown rot (FCR) diseased wheat seedlings were collected from different wheat-growing counties in seven different regions (Baoding, Cangzhou, Handan, Hengshui, Langfang, Shijiazhuang, and Xingtai) in Hebei province, China from 2019 to 2020. One-hundred twenty-two Fusarium isolates were isolated from crown rot diseased wheat seedlings and identified morphologically, confirmation was undertaken molecularly, and species-specific PCR was utilized to verify the morphological identification of F. psuedograminearum, F. graminearum, F. asiaticum, and F. culmorum. The predominant Fusarium species associated with wheat crown rot in the Hebei province were F. psuedograminearum, F. graminearum, F. asiaticum, and F. culmorum with isolation frequency of 85.25%, 12.30%, 1.64%, and 0.81%, respectively. All the Fusarium strains isolated from the different wheat-growing fields were qualitatively tested for toxigenic chemotypes using toxin-specific primers and chemotaxonomically classified into DON, 3-ADON, 15-ADON, and NIV. Among F. psuedograminearum identified, 84.62% were classified as DON chemotypes, 6.73% as 15-ADON chemotypes, 3.84% as 3-ADON chemotypes, and 4.81% of them had NIV as detected by the toxin-specific PCR results. Most of the F. graminearum isolates produced 15-ADON, and only two isolates had NIV chemotypes. F. asiaticum and F. culmorum produce chemotype of 15-ADON and 3-ADON, respectively. Pathogenicity test results showed that F. pseudograminearum and F. graminearum had strong pathogenicity, and F. asiaticum and F. culmorum had moderate pathogenicity to wheat in Hebei province.

Keywords: crown rot, pathogen, wheat, Fusarium species, mycotoxin

Procedia PDF Downloads 135
926 Design of a Computer Vision Based Exercise Video Game for Senior Citizens

Authors: June Tay, Ivy Chia

Abstract:

There are numerous changes, both mental and physical, taking place when people age. We need to understand the different aspects required for healthy living, including meeting nutritional needs, regular physical activities to keep agility, sufficient rest and sleep to have physical and mental well-being, social engagement to avoid the risk of social isolation and depression, and access to healthcare to detect and manage chronic conditions. Promoting physical activities for an ageing population is necessary as many may have enjoyed sedentary lifestyles for some time. In our study, we evaluate the considerations when designing a computer vision video game for the elderly. We need to design some low-impact activities, such as stretching and gentle movements, because some elderly individuals may have joint pains or mobility issues. The exercise game should consist of simple movements that are easy to follow and remember. It should be fun and enjoyable so that they can be motivated to do some exercise. Social engagement can keep the elderly motivated and competitive, and they are more willing to engage in game exercises. Elderly citizens can compare their game scores and try to improve them. We propose a computer vision-based video game for the elderly that will capture and track the movement of the elderly hand pushing a ball on the screen into a circle. It can be easily set up using a PC laptop with a webcam. Our video game adhered to the design framework we employed, and it encompassed ease of use, a simple graphical interface, easy-to-play game exercise, and fun gameplay.

Keywords: about computer vision, video games, gerontology technology, caregiving

Procedia PDF Downloads 81
925 Voices of Dissent: Case Study of a Digital Archive of Testimonies of Political Oppression

Authors: Andrea Scapolo, Zaya Rustamova, Arturo Matute Castro

Abstract:

The “Voices in Dissent” initiative aims at collecting and making available in a digital format, testimonies, letters, and other narratives produced by victims of political oppression from different geographical spaces across the Atlantic. By recovering silenced voices behind the official narratives, this open-access online database will provide indispensable tools for rewriting the history of authoritarian regimes from the margins as memory debates continue to provoke controversy among academic and popular transnational circles. In providing an extensive database of non-hegemonic discourses in a variety of political and social contexts, the project will complement the existing European and Latin-American studies, and invite further interdisciplinary and trans-national research. This digital resource will be available to academic communities and the general audience and will be organized geographically and chronologically. “Voices in Dissent” will offer a first comprehensive study of these personal accounts of persecution and repression against determined historical backgrounds and their impact on collective memory formation in contemporary societies. The digitalization of these texts will allow to run metadata analyses and adopt comparatist approaches for a broad range of research endeavors. Most of the testimonies included in our archive are testimonies of trauma: the trauma of exile, imprisonment, torture, humiliation, censorship. The research on trauma has now reached critical mass and offers a broad spectrum of critical perspectives. By putting together testimonies from different geographical and historical contexts, our project will provide readers and scholars with an extraordinary opportunity to investigate how culture shapes individual and collective memories and provides or denies resources to make sense and cope with the trauma. For scholars dealing with the epistemological and rhetorical analysis of testimonies, an online open-access archive will prove particularly beneficial to test theories on truth status and the formation of belief as well as to study the articulation of discourse. An important aspect of this project is also its pedagogical applications since it will contribute to the creation of Open Educational Resources (OER) to support students and educators worldwide. Through collaborations with our Library System, the archive will form part of the Digital Commons database. The texts collected in this online archive will be made available in the original languages as well as in English translation. They will be accompanied by a critical apparatus that will contextualize them historically by providing relevant background information and bibliographical references. All these materials can serve as a springboard for a broad variety of educational projects and classroom activities. They can also be used to design specific content courses or modules. In conclusion, the desirable outcomes of the “Voices in Dissent” project are: 1. the collections and digitalization of political dissent testimonies; 2. the building of a network of scholars, educators, and learners involved in the design, development, and sustainability of the digital archive; 3. the integration of the content of the archive in both research and teaching endeavors, such as publication of scholarly articles, design of new upper-level courses, and integration of the materials in existing courses.

Keywords: digital archive, dissent, open educational resources, testimonies, transatlantic studies

Procedia PDF Downloads 106
924 Detection of Arcobacter and Helicobacter pylori Contamination in Organic Vegetables by Cultural and Polymerase Chain Reaction (PCR) Methods

Authors: Miguel García-Ferrús, Ana González, María A. Ferrús

Abstract:

The most demanded organic foods worldwide are those that are consumed fresh, such as fruits and vegetables. However, there is a knowledge gap about some aspects of organic food microbiological quality and safety. Organic fruits and vegetables are more exposed to pathogenic microorganisms due to surface contact with natural fertilizers such as animal manure, wastes and vermicompost used during farming. It has been suggested that some emergent pathogens, such as Helicobacter pylori or Arcobacter spp., could reach humans through the consumption of raw or minimally processed vegetables. Therefore, the objective of this work was to study the contamination of organic fresh green leafy vegetables by Arcobacter spp. and Helicobacter pylori. For this purpose, a total of 24 vegetable samples, 13 lettuce and 11 spinach were acquired from 10 different ecological supermarkets and greengroceries and analyzed by culture and PCR. Arcobacter spp. was detected in 5 samples (20%) by PCR, 4 spinach and one lettuce. One spinach sample was found to be also positive by culture. For H. pylori, the H. pylori VacA gene-specific band was detected in 12 vegetable samples (50%), 10 lettuces and 2 spinach. Isolation in the selective medium did not yield any positive result, possibly because of low contamination levels together with the presence of the organism in its viable but non-culturable form. Results showed significant levels of H. pylori and Arcobacter contamination in organic vegetables that are generally consumed raw, which seems to confirm that these foods can act as transmission vehicles to humans.

Keywords: Arcobacter sp., Helicobacter pylori, Organic Vegetables, Polymerase Chain Reaction (PCR)

Procedia PDF Downloads 164
923 DCASH: Dynamic Cache Synchronization Algorithm for Heterogeneous Reverse Y Synchronizing Mobile Database Systems

Authors: Gunasekaran Raja, Kottilingam Kottursamy, Rajakumar Arul, Ramkumar Jayaraman, Krithika Sairam, Lakshmi Ravi

Abstract:

The synchronization server maintains a dynamically changing cache, which contains the data items which were requested and collected by the mobile node from the server. The order and presence of tuples in the cache changes dynamically according to the frequency of updates performed on the data, by the server and client. To synchronize, the data which has been modified by client and the server at an instant are collected, batched together by the type of modification (insert/ update/ delete), and sorted according to their update frequencies. This ensures that the DCASH (Dynamic Cache Synchronization Algorithm for Heterogeneous Reverse Y synchronizing Mobile Database Systems) gives priority to the frequently accessed data with high usage. The optimal memory management algorithm is proposed to manage data items according to their frequency, theorems were written to show the current mobile data activity is reverse Y in nature and the experiments were tested with 2g and 3g networks for various mobile devices to show the reduced response time and energy consumption.

Keywords: mobile databases, synchronization, cache, response time

Procedia PDF Downloads 405
922 Wakala Buildings of Mamluk Era in Cairo, Egypt and Its Rating According to Rating Criteria of Leadership in Energy and Environmental Design V4

Authors: M. Fathy, I. Maarouf, S. El-Sayary

Abstract:

Our buildings are responsible for around 50% of energy consumption and most of this consumption because of spaces design, low heat isolation building material and occupant presence and behavior in buildings beside non-efficient architectural treatments. It has been shown to have large impact on heating, cooling and ventilation demand, energy consumption of lighting and appliances, and building controls. This paper aims to focus on passive treatments in Wakala Buildings in Cairo and how far it meets the LEED Criteria as the LEED – Leadership in Energy and Environmental Design – considered the widest spread rating system in the world. By studying Wakala buildings in Cairo, there are a lot of environmental potentials in it in the field of passive treatments and energy efficiency that could be found in examples by surveying and analyzing Wakala buildings. Besides the environmental treatments through the natural materials and façade architectural treatments, there is a measuring phase to declare the efficiency of the Wakala building through temperature decline between outdoor and indoor the Wakala building. Also, measuring how far the indoor conditions matched the thermal comfort for occupants. After measuring the Wakala buildings, it is the role of applying the criteria of LEED rating system to find out how fare Wakala buildings meet the LEED rating system criteria. After all, the building technologies used in Wakala buildings in the field of passive design and caused that energy efficiency would be clear and what is needed for Wakala buildings to have a LEED Certification.

Keywords: energy awareness, historical commercial buildings, LEED, Wakala buildings

Procedia PDF Downloads 203
921 Exploring the Visual Roots of Classical Rhetoric and Its Implication for Gender Politics: Reflection upon Roman Rhetoric from a Bakhtin's Perspective

Authors: Hsiao-Yung Wang

Abstract:

This study aims to explore the visual roots of classical rhetoric and its implication for gender politics by the constant reference to Mikhail Bakhtin’s theory of novelist time. First, it attempts to clarify the argument that “visuality always has been integral to rhetorical consciousness” by critically re-reading the rhetorical theories of roman rhetorician such as Cicero and Quintilian. Thereby, the vague clues of visuality would be realized from the so-called ‘five canons of rhetoric’ (invention, arrangement, style, memory, and delivery), which originally deriving from verbal and spoken rhetorical tradition. Drawing on Mikhail Bakhtin’s elaboration of novelist time in contrast to epic time, it addresses the specific timeline inherent in the dynamics of visual rhetoric involves the refusing the ‘absolute past’, the focusing on unfinalized contemporary reality, and the expecting for open future. Taking the primary visions of Taipei LGBT parade over the past 13 years as research cases, it mentions that visuality could not only activate the rhetorical functions of classical rhetoric, but also inspire gender politics in the contemporary era.

Keywords: classical rhetoric, gender politics, Mikhail Bakhtin, visuality

Procedia PDF Downloads 379
920 Memory Types in Hemodialysis (HD) Patients; A Study Based on Hemodialysis Duration, Zahedan: South East of Iran

Authors: Behnoush Sabayan, Ali Alidadi, Saeid Ebarhimi, N. M. Bakhshani

Abstract:

Hemodialysis (HD) patients are at a high risk of atherosclerotic and vascular disease; also little information is available for the HD impact on brain structure of these patients. We studied the brain abnormalities in HD patients. The aim of this study was to investigate the effect of long term HD on brain structure of HD patients. Non-contrast MRI was used to evaluate imaging findings. Our study included 80 HD patients of whom 39 had less than six months of HD and 41 patients had a history of HD more than six months. The population had a mean age of 51.60 years old and 27.5% were female. According to study, HD patients who have been hemodialyzed for a long time (median time of HD was up to 4 years) had small vessel ischemia than the HD patients who underwent HD for a shorter term, which the median time was 3 to 5 months. Most of the small vessel ischemia was located in pre-ventricular, subcortical and white matter (1.33± .471, 1.23± .420 and 1.39±.490). However, the other brain damages like: central pons abnormality, global brain atrophy, thinning of corpus callosum and frontal lobe atrophy were found (P<0.01). The present study demonstrated that HD patients who were under HD for a longer time had small vessel ischemia and we conclude that this small vessel ischemia might be a causative mechanism of brain atrophy in chronic hemodialysis patients. However, additional researches are needed in this area.

Keywords: Hemodialysis Patients, Duration of Hemodialysis, MRI, Zahedan

Procedia PDF Downloads 213
919 Review on Low Actuation Voltage RF Mems Switches

Authors: Hassan Saffari, Reza Askari Moghadam

Abstract:

In modern communication systems, it is highly demanded to achieve high performance with minimal power consumption. Low actuation voltage RF MEMS (Micro-Electro-Mechanical Systems) switches represent a significant advancement in this regard. These switches, with their ability to operate at lower voltages, offer promising solutions for enhancing connectivity while minimizing energy consumption. Microelectromechanical switches are good alternatives for electronic and mechanical switches due to their low insertion loss, high isolation, and fast switching speeds. They have attracted more attention in recent years. Most of the presented RF MEMS switches use electrostatic actuators due to their low power consumption. Low actuation voltage RF MEMS switches are among the important issues that have been investigated in research articles. The actuation voltage can be reduced by different methods. One usually implemented method is low spring constant structures. However, despite their numerous benefits, challenges remain in the widespread adoption of low-actuation voltage RF MEMS switches. Issues related to reliability, durability, and manufacturing scalability need to be addressed to realize their full potential in commercial applications. While overcoming certain challenges, their exceptional performance characteristics and compatibility with miniaturized electronic systems make them a promising choice for next-generation wireless communication and RF applications. In this paper, some previous works that proposed low-voltage actuation RF MEMS switches are investigated and analyzed.

Keywords: RF MEMS switches, low actuation voltage, small spring constant structures, electrostatic actuation

Procedia PDF Downloads 47
918 Computational Fluid Dynamics Simulations of Thermal and Flow Fields inside a Desktop Personal Computer Cabin

Authors: Mohammad Salehi, Mohammad Erfan Doraki

Abstract:

In this paper, airflow analysis inside a desktop computer case is performed by simulating computational fluid dynamics. The purpose is to investigate the cooling process of the central processing unit (CPU) with thermal capacities of 80 and 130 watts. The airflow inside the computer enclosure, selected from the microATX model, consists of the main components of heat production such as CPU, hard disk drive, CD drive, floppy drive, memory card and power supply unit; According to the amount of thermal power produced by the CPU with 80 and 130 watts of power, two different geometries have been used for a direct and radial heat sink. First, the independence of the computational mesh and the validation of the solution were performed, and after ensuring the correctness of the numerical solution, the results of the solution were analyzed. The simulation results showed that changes in CPU temperature and other components linearly increased with increasing CPU heat output. Also, the ambient air temperature has a significant effect on the maximum processor temperature.

Keywords: computational fluid dynamics, CPU cooling, computer case simulation, heat sink

Procedia PDF Downloads 122