Search results for: mobile host
1157 Design and Identification of Mycobacterium tuberculosis Glutamate Racemase (MurI) Inhibitors
Authors: Prasanthi Malapati, R. Reshma, Vijay Soni, Perumal Yogeeswari, Dharmarajan Sriram
Abstract:
In the present study, we attempted to develop Mycobacterium tuberculosis (Mtb) inhibitors by exploring the pharmaceutically underexploited enzyme targets which are majorly involved in cell wall biosynthesis of mycobacteria. For this purpose, glutamate racemase (coded by MurI gene) was selected. This enzyme racemize L-glutamate to D-glutamate required for the construction of peptidoglycan in the bacterial cell wall synthesis process. Furthermore this enzyme is neither expressed nor its product, D-glutamate is normally found in mammals, and hence designing inhibitors against this enzyme will not affect the host system as well act as potential antitubercular drugs. A library of BITS in house compounds were screened against Mtb MurI enzyme. Based on docking score, interactions and synthetic feasibility one hit lead was identified. Further optimization of lead was attempted and its derivatives were synthesized. Forty eight derivatives of 2-phenylbenzo[d]oxazole and 2-phenylbenzo[d]thiazole were synthesized and evaluated for Mtb MurI inhibition study, in vitro activities against Mtb, cytotoxicity against RAW 264.7 cell line. Chemical derivatization of the lead resulted in compounds NR-1213 AND NR-1124 as the potent M. tuberculosis glutamate racemase inhibitors with IC50 of 4-5µM which are remarkable and were found to be non-cytotoxic. Molecular dynamics, dormant models and cardiotoxicity studies of the most active molecules are in process.Keywords: cell wall biosynthesis, dormancy, glutamate racemase, tuberculosis
Procedia PDF Downloads 2731156 Computational Prediction of the Effect of S477N Mutation on the RBD Binding Affinity and Structural Characteristic, A Molecular Dynamics Study
Authors: Mohammad Hossein Modarressi, Mozhgan Mondeali, Khabat Barkhordari, Ali Etemadi
Abstract:
The COVID-19 pandemic, caused by SARS-CoV-2, has led to significant concerns worldwide due to its catastrophic effects on public health. The SARS-CoV-2 infection is initiated with the binding of the receptor-binding domain (RBD) in its spike protein to the ACE2 receptor in the host cell membrane. Due to the error-prone entity of the viral RNA-dependent polymerase complex, the virus genome, including the coding region for the RBD, acquires new mutations, leading to the appearance of multiple variants. These variants can potentially impact transmission, virulence, antigenicity and evasive immune properties. S477N mutation located in the RBD has been observed in the SARS-CoV-2 omicron (B.1.1. 529) variant. In this study, we investigated the consequences of S477N mutation at the molecular level using computational approaches such as molecular dynamics simulation, protein-protein interaction analysis, immunoinformatics and free energy computation. We showed that displacement of Ser with Asn increases the stability of the spike protein and its affinity to ACE2 and thus increases the transmission potential of the virus. This mutation changes the folding and secondary structure of the spike protein. Also, it reduces antibody neutralization, raising concern about re-infection, vaccine breakthrough and therapeutic values.Keywords: S477N, COVID-19, molecular dynamic, SARS-COV2 mutations
Procedia PDF Downloads 1821155 The Role of Vitamin D Supplementation in Augmenting IFN-γ Production in Response to Mycobacterium Tuberculosis Infection: A Randomized Controlled Trial
Authors: Muhammad Imran Hussain, Ramisha Ibtisam, Tayyaba Fatima, Huba Khalid, Ayesha Aziz, Khansa, Adan Sitara, Anam Shahzad, Aymen Jabeen
Abstract:
Vitamin D supports the immune system fight TB by inhibiting Interferon-gamma (IFN-γ) and lowering host inflammation. The purpose of the research was to see if giving the vitamin D supplements to TB patients affected their prognosis. A randomized placebo control study of 200 TB patients was performed among which 106 received 400,000 IU of injectable vitamin D3 and 94 received placebo for 2 doses. Assessment was carried out at the end of every month for 3 months. IFN-γ responses to whole blood stimulation generated by the Mycobacterium tuberculosis sonicate (MTBs) antigen and early secreted and T cell activated 6 kDa (ESAT6) were assessed at 0 and 12 weeks. The statistical analysis used descriptive statistics (mean and standard deviation), Friedman's test and Fisher's test. The vitamin D group gained significantly more weight (+3.90 pounds) and had less persistent lung disease on imaging (1.33 zones vs. 1.84 zones). They also had a 50% decrease in cavity size. Additionally, patients with low baseline serum concentrations of 25-(OH)D had a significant increase in MTB-induced IFN-γ production after taking vitamin D supplements. Vitamin D administration in large amounts can hasten the recovery of TB patients. The findings point is a therapeutically useful activity of Vitamin D's in the management for tuberculosis.Keywords: tuberculosis, vitamin D, interferon gamma, protein, infection
Procedia PDF Downloads 581154 The Awareness of Computer Science Students Regarding the Security of Location Based Games
Authors: Jacques Barnard, Magda Huisman, Gunther R. Drevin
Abstract:
Rapid expansion and development in die mobile technology market has created an opportunity for users to participate in location based games. As a consequence of this fast expanding market and new technology, it is important to be aware of the implications this has on security. This paper measures the impact on the security awareness of games’ participants, as well as on that of students at university level with regards to their various stages of input in years of studying and gamer classification. This serves to provide insight into the matter as to discernible differences in the awareness of the security implications concerning these technologies. The data was accumulated via a web questionnaire that was to be completed yearly by students from respective year groups. Results signify a meaningful disparity in security awareness among students completing the varying study years and research. This awareness, however, does not always impact on gamers.Keywords: gamer classifications, location based games, location based data, security awareness
Procedia PDF Downloads 2961153 Rule-Based Expert System for Headache Diagnosis and Medication Recommendation
Authors: Noura Al-Ajmi, Mohammed A. Almulla
Abstract:
With the increased utilization of technology devices around the world, healthcare and medical diagnosis are critical issues that people worry about these days. Doctors are doing their best to avoid any medical errors while diagnosing diseases and prescribing the wrong medication. Subsequently, artificial intelligence applications that can be installed on mobile devices such as rule-based expert systems facilitate the task of assisting doctors in several ways. Due to their many advantages, the usage of expert systems has increased recently in health sciences. This work presents a backward rule-based expert system that can be used for a headache diagnosis and medication recommendation system. The structure of the system consists of three main modules, namely the input unit, the processing unit, and the output unit.Keywords: headache diagnosis system, prescription recommender system, expert system, backward rule-based system
Procedia PDF Downloads 2241152 Communication in a Heterogeneous Ad Hoc Network
Authors: C. Benjbara, A. Habbani
Abstract:
Wireless networks are getting more and more used in every new technology or feature, especially those without infrastructure (Ad hoc mode) which provide a low cost alternative to the infrastructure mode wireless networks and a great flexibility for application domains such as environmental monitoring, smart cities, precision agriculture, and so on. These application domains present a common characteristic which is the need of coexistence and intercommunication between modules belonging to different types of ad hoc networks like wireless sensor networks, mesh networks, mobile ad hoc networks, vehicular ad hoc networks, etc. This vision to bring to life such heterogeneous networks will make humanity duties easier but its development path is full of challenges. One of these challenges is the communication complexity between its components due to the lack of common or compatible protocols standard. This article proposes a new patented routing protocol based on the OLSR standard in order to resolve the heterogeneous ad hoc networks communication issue. This new protocol is applied on a specific network architecture composed of MANET, VANET, and FANET.Keywords: Ad hoc, heterogeneous, ID-Node, OLSR
Procedia PDF Downloads 2211151 Secure Authentication Scheme Based on Numerical Series Cryptography for Internet of Things
Authors: Maha Aladdin, Khaled Nagaty, Abeer Hamdy
Abstract:
The rapid advancement cellular networks and wireless networks have laid a solid basis for the Internet of Things. IoT has evolved into a unique standard that allows diverse physical devices to collaborate with one another. A service provider gives a variety of services that may be accessed via smart apps anywhere, at any time, and from any location over the Internet. Because of the public environment of mobile communication and the Internet, these services are highly vulnerable to a several malicious attacks, such as unauthorized disclosure by hostile attackers. As a result, the best option for overcoming these vulnerabilities is a strong authentication method. In this paper, a lightweight authentication scheme that is based on numerical series cryptography is proposed for the IoT environments. It allows mutual authentication between IoT devices Parametric study and formal proofs are utilized to illustrate that the pro-posed approach is resistant to a variety of security threats.Keywords: internet of things, authentication, cryptography, security protocol
Procedia PDF Downloads 1261150 Remote Monitoring and Control System of Potentiostat Based on the Internet of Things
Authors: Liang Zhao, Guangwen Wang, Guichang Liu
Abstract:
Constant potometer is an important component of pipeline anti-corrosion systems in the chemical industry. Based on Internet of Things (IoT) technology, Programmable Logic Controller (PLC) technology and database technology, this paper developed a set of a constant potometer remote monitoring management system. The remote monitoring and remote adjustment of the working status of the constant potometer are realized. The system has real-time data display, historical data query, alarm push management, user permission management, and supporting Web access and mobile client application (APP) access. The actual engineering project test results show the stability of the system, which can be widely used in cathodic protection systems.Keywords: internet of things, pipe corrosion protection, potentiostat, remote monitoring
Procedia PDF Downloads 1511149 Parental Monitoring of Learners’ Cell Phone Use in the Eastern Cape, South Africa
Authors: Melikhaya Skhephe, Robert Mawuli Kwasi Boadzo, Zanoxolo Berington Gobingca
Abstract:
This research study sought to examine parental monitoring of learners’ cell phone use in the Eastern Cape, South Africa. To this end, the researchers employed a quantitative approach. Data were obtained through questionnaires, with a sample of 15 parents having been purposively selected. The findings revealed that parents are unaware that they have to monitor the learner’s cell phone. Another finding was that parents in the 21-century did not support the use of mobile phones in education. The researchers recommend that parent’s discussion forums be created to educate parents on how a cell phone can be used in education. Cellphone companies need to be encouraged to educate parents on how they monitor cell phones used by learners. Another recommendation was that network providers need to restrict access to searching on the internet according to age.Keywords: parental monitoring, app blocking services, learner’s cell phone use, cell phone
Procedia PDF Downloads 1651148 Survey on Prevalence of Endo and Ecto-Parasites of Rattus rattus in Mazandaran Province, North of Iran
Authors: Fatemeh Rezaei, Afsaneh Amouei, Iman Bakouei, Mahdi Sharif, Shahabeddin Sarvi, Mohammad Taghi Rahimi, Ahmad Daryani
Abstract:
Background: Rodents act as reservoir host and important potential source for many zoonotic pathogens which pose a public health risk to humans. Therefore, it is necessary to investigate the prevalence of gastrointestinal and ectoparasites among rodents. Materials and Methods: 118 Rattus rattus were captured using snap live traps. Each rat was combed with a fine tooth comb to dislodge ectoparasite and studied. Various samples were collected from feces, examined wet smear, formalin-ether method and stained with modified acid-fast staining and trichrome. Result: The overall prevalence of gastrointestinal parasites of examined rats was 75.4%. Cryptosporidium 30.5%, was the most prevalent protozoan which was followed by Giardia 20.3% and Entamoeba muris 13.5%, Trichomonas muris 10.1% and Spironucleus muris 3.3%. The prevalence of helminth egg was as following Syphacia obvelata 24.5%, Hymenolepis diminuta 10.1% and Trichuris muris 9.3%. 86.4% rodents were found to be infested with ectoparasites including mite 35.6%, flea 28.4%, and lice 42.7%. A significant statistical difference was observed between prevalence and gender of infected individuals. Conclusions: The prevalence of gastrointestinal and ectoparasites of collected rats in studied area is remarkably high. In addition, Rattus rattus can be considered as potential risk for human health.Keywords: prevalence, rodent, intestinal parasites, ecto-parasites, zoonose
Procedia PDF Downloads 5391147 Internet of Things: Route Search Optimization Applying Ant Colony Algorithm and Theory of Computer Science
Authors: Tushar Bhardwaj
Abstract:
Internet of Things (IoT) possesses a dynamic network where the network nodes (mobile devices) are added and removed constantly and randomly, hence the traffic distribution in the network is quite variable and irregular. The basic but very important part in any network is route searching. We have many conventional route searching algorithms like link-state, and distance vector algorithms but they are restricted to the static point to point network topology. In this paper we propose a model that uses the Ant Colony Algorithm for route searching. It is dynamic in nature and has positive feedback mechanism that conforms to the route searching. We have also embedded the concept of Non-Deterministic Finite Automata [NDFA] minimization to reduce the network to increase the performance. Results show that Ant Colony Algorithm gives the shortest path from the source to destination node and NDFA minimization reduces the broadcasting storm effectively.Keywords: routing, ant colony algorithm, NDFA, IoT
Procedia PDF Downloads 4461146 Expert Review on Conceptual Design Model of iTV Advertising towards Impulse Purchase
Authors: Azizah Che Omar
Abstract:
Various studies have proposed factors of impulse purchase in different advertising mediums like website, mobile, traditional retail store and traditional television. However, to the best of researchers’ knowledge, none of the impulse purchase model is dedicated towards impulse purchase tendency for interactive TV (iTV) advertising. Therefore, the proposed model conceptual design model of interactive television advertising toward impulse purchase (iTVAdIP) was developed. The focus of this study is to evaluate the conceptual design model of iTVAdIP through expert review. As a result, the finding showed that majority of expert reviews agreed that the conceptual design model iTVAdIP is applicable to the development of interactive television advertising and it will increase the effectiveness of advertising. This study also shows the conceptual design model of iTVAdIP that has been reviewed.Keywords: impulse purchase, interactive television advertising, persuasive
Procedia PDF Downloads 3581145 Marker Assisted Selection of Rice Genotypes for Xa5 and Xa13 Bacterial Leaf Blight Resistance Genes
Authors: P. Sindhumole, K. Soumya, R. Renjimol
Abstract:
Rice (Oryza sativa L.) is the major staple food crop over the world. It is prone to a number of biotic and abiotic stresses, out of which Bacterial Leaf Blight (BLB), caused by Xanthomonas oryzae pv. oryzae, is the most rampant. Management of this disease through chemicals or any other means is very difficult. The best way to control BLB is by the development of Host Plant Resistance. BLB resistance is not an activity of a single gene but it involves a cluster of more than thirty genes reported. Among these, Xa5 and Xa13 genes are two important ones, which can be diagnosed through marker assisted selection using closely linked molecular markers. During 2014, the first phase of field screening using forty traditional rice genotypes was carried out and twenty resistant symptomless genotypes were identified. Molecular characterisation of these genotypes using RM 122 SSR marker revealed the presence of Xa5 gene in thirteen genotypes. Forty-two traditional rice genotypes were used for the second phase of field screening for BLB resistance. Among these, sixteen resistant genotypes were identified. These genotypes, along with two susceptible check genotypes, were subjected to marker assisted selection for Xa13 gene, using the linked STS marker RG-136. During this process, presence of Xa13 gene could be detected in ten resistant genotypes. In future, these selected genotypes can be directly utilised as donors in Marker assisted breeding programmes for BLB resistance in rice.Keywords: oryza sativa, SSR, STS, marker, disease, breeding
Procedia PDF Downloads 3961144 Novel Method of In-Situ Tracking of Mechanical Changes in Composite Electrodes during Charging-Discharging by QCM-D
Authors: M. D. Levi, Netanel Shpigel, Sergey Sigalov, Gregory Salitra, Leonid Daikhin, Doron Aurbach
Abstract:
We have developed an in-situ method for tracking ions adsorption into composite nanoporous carbon electrodes based on quartz-crystal microbalance (QCM). In these first papers QCM was used as a simple gravimetric probe of compositional changes in carbon porous composite electrodes during their charging since variation of the electrode potential did not change significantly width of the resonance. In contrast, when we passed from nanoporous carbons to a composite Li-ion battery material such as LiFePO4 olivine, the change in the resonance width was comparable with change of the resonance frequency (polymeric binder PVdF was shown to be completely rigid when used in aqueous solutions). We have provided a quantitative hydrodynamic admittance model of ion-insertion processes into electrode host accompanied by intercalation-induced dimensional changes of electrode particles, and hence the entire electrode coating. The change in electrode deformation and the related porosity modify hydrodynamic solid-liquid interactions tracked by QCM with dissipation monitoring. Using admittance modeling, we are able to evaluate the changes of effective thickness and permeability/porosity of composite electrode caused by applied potential and as a function of cycle number. This unique non-destructive technique may have great advantage in early diagnostics of cycling life durability of batteries and supercapacitors.Keywords: Li-ion batteries, particles deformations, QCM-D, viscoelasticity
Procedia PDF Downloads 4471143 Room Level Indoor Localization Using Relevant Channel Impulse Response Parameters
Authors: Raida Zouari, Iness Ahriz, Rafik Zayani, Ali Dziri, Ridha Bouallegue
Abstract:
This paper proposes a room level indoor localization algorithm based on the use Multi-Layer Neural Network (MLNN) classifiers and one versus one strategy. Seven parameters of the Channel Impulse Response (CIR) were used and Gram-Shmidt Orthogonalization was performed to study the relevance of the extracted parameters. Simulation results show that when relevant CIR parameters are used as position fingerprint and when optimal MLNN architecture is selected good room level localization score can be achieved. The current study showed also that some of the CIR parameters are not correlated to the location and can decrease the localization performance of the system.Keywords: mobile indoor localization, multi-layer neural network (MLNN), channel impulse response (CIR), Gram-Shmidt orthogonalization
Procedia PDF Downloads 3641142 Mapping of Alteration Zones in Mineral Rich Belt of South-East Rajasthan Using Remote Sensing Techniques
Authors: Mrinmoy Dhara, Vivek K. Sengar, Shovan L. Chattoraj, Soumiya Bhattacharjee
Abstract:
Remote sensing techniques have emerged as an asset for various geological studies. Satellite images obtained by different sensors contain plenty of information related to the terrain. Digital image processing further helps in customized ways for the prospecting of minerals. In this study, an attempt has been made to map the hydrothermally altered zones using multispectral and hyperspectral datasets of South East Rajasthan. Advanced Space-borne Thermal Emission and Reflection Radiometer (ASTER) and Hyperion (Level1R) dataset have been processed to generate different Band Ratio Composites (BRCs). For this study, ASTER derived BRCs were generated to delineate the alteration zones, gossans, abundant clays and host rocks. ASTER and Hyperion images were further processed to extract mineral end members and classified mineral maps have been produced using Spectral Angle Mapper (SAM) method. Results were validated with the geological map of the area which shows positive agreement with the image processing outputs. Thus, this study concludes that the band ratios and image processing in combination play significant role in demarcation of alteration zones which may provide pathfinders for mineral prospecting studies.Keywords: ASTER, hyperion, band ratios, alteration zones, SAM
Procedia PDF Downloads 2821141 A Structural Constitutive Model for Viscoelastic Rheological Behavior of Human Saphenous Vein Using Experimental Assays
Authors: Rassoli Aisa, Abrishami Movahhed Arezu, Faturaee Nasser, Seddighi Amir Saeed, Shafigh Mohammad
Abstract:
Cardiovascular diseases are one of the most common causes of mortality in developed countries. Coronary artery abnormalities and carotid artery stenosis, also known as silent death, are among these diseases. One of the treatment methods for these diseases is to create a deviatory pathway to conduct blood into the heart through a bypass surgery. The saphenous vein is usually used in this surgery to create the deviatory pathway. Unfortunately, a re-surgery will be necessary after some years due to ignoring the disagreement of mechanical properties of graft tissue and/or applied prostheses with those of host tissue. The objective of the present study is to clarify the viscoelastic behavior of human saphenous tissue. The stress relaxation tests in circumferential and longitudinal direction were done in this vein by exerting 20% and 50% strains. Considering the stress relaxation curves obtained from stress relaxation tests and the coefficients of the standard solid model, it was demonstrated that the saphenous vein has a non-linear viscoelastic behavior. Thereafter, the fitting with Fung’s quasilinear viscoelastic (QLV) model was performed based on stress relaxation time curves. Finally, the coefficients of Fung’s QLV model, which models the behavior of saphenous tissue very well, were presented.Keywords: Viscoelastic behavior, stress relaxation test, uniaxial tensile test, Fung’s quasilinear viscoelastic (QLV) model, strain rate
Procedia PDF Downloads 3381140 Impact of Customer Experience Quality on Loyalty of Mobile and Fixed Broadband Services: Case Study of Telecom Egypt Group
Authors: Nawal Alawad, Passent Ibrahim Tantawi, Mohamed Abdel Salam Ragheb
Abstract:
Providing customers with quality experiences has been confirmed to be a sustainable, competitive advantage with a distinct financial impact for companies. The success of service providers now relies on their ability to provide customer-centric services. The importance of perceived service quality and customer experience is widely recognized. The focus of this research is in the area of mobile and fixed broadband services. This study is of dual importance both academically and practically. Academically, this research applies a new model investigating the impact of customer experience quality on loyalty based on modifying the multiple-item scale for measuring customers’ service experience in a new area and did not depend on the traditional models. The integrated scale embraces four dimensions: service experience, outcome focus, moments of truth and peace of mind. In addition, it gives a scientific explanation for this relationship so this research fill the gap in such relations in which no one correlate or give explanations for these relations before using such integrated model and this is the first time to apply such modified and integrated new model in telecom field. Practically, this research gives insights to marketers and practitioners to improve customer loyalty through evolving the experience quality of broadband customers which is interpreted to suggested outcomes: purchase, commitment, repeat purchase and word-of-mouth, this approach is one of the emerging topics in service marketing. Data were collected through 412 questionnaires and analyzed by using structural equation modeling.Findings revealed that both outcome focus and moments of truth have a significant impact on loyalty while both service experience and peace of mind have insignificant impact on loyalty.In addition, it was found that 72% of the variation occurring in loyalty is explained by the model. The researcher also measured the net prompters score and gave explanation for the results. Furthermore, assessed customer’s priorities of broadband services. The researcher recommends that the findings of this research will extend to be considered in the future plans of Telecom Egypt Group. In addition, to be applied in the same industry especially in the developing countries that have the same circumstances with similar service settings. This research is a positive contribution in service marketing, particularly in telecom industry for making marketing more reliable as managers can relate investments in service experience directly with the performance closest to income for instance, repurchasing behavior, positive word of mouth and, commitment. Finally, the researcher recommends that future studies should consider this model to explain significant marketing outcomes such as share of wallet and ultimately profitability.Keywords: broadband services, customer experience quality, loyalty, net promoters score
Procedia PDF Downloads 2711139 Host Status of Pitaya Genotypes Fruit to Meloidogyne enterolobii and M. incognita
Authors: Freitas Vania Moreira, Rodrigues B. B., Araujo M.B., Silva D. R., Sousa A. C., Araujo K. P., Pimentel R. R., Cares J. E., Junqueira N. T. V.
Abstract:
The Pitahayas are cactus native from America and abundant in arid regions. The cultivation is based mainly on the following species: Hylocereus undatus, H. polyrhizus, H. setaceus and H. megalanthus, being H. undatus the most cultivated in Brazil. The pitahaya cultivation is recent in Brazil and is concentrated in São Paulo. Meloidogyne enterolobii is of unknown origin being distributed in several countries. This nematode has recently been detected in Brazil causing damage in several crops. Similarly, M. incognita is a widely distributed pathogen in Brazil. The objective of this study is to evaluate the following accesses of pitahaya to M. enterolobii: CPAC- Py H. hundatus 01, 02, 03, 04, 05, 06, 07 and 08; CPAC - Py H. costaricense 8A; CPAC - Py Selenicereus setaceus 17 and CPAC - Py S. megalantus 22. And the following accesses to M. incognita: CPAC- Py H. hundatus 05; CPAC - Py H. costaricense 8A; CPAC - Py S. setaceus 17 and CPAC - Py S. megalantus 22. According to the results, CPAC – Py H. hundatus 01, 02, 03, 04 and 07 were considered resistant. While CPAC - Py 05 and 08 was susceptible. CPAC-Py 06 also was considered susceptible, because there was the reaction of susceptibility in one of the trials. Given this wide diversity in H. hundatus and being this species the most cultivated in Brazil it is suggested to work more with this material in Embrapa Cerrados. CPAC - Py H. costaricense 8A behaved as susceptible in one of the trials. CPAC - Py S. setaceus 17 and CPAC – Py S. megalantus 22 were considered highly susceptible. The susceptibility of S. megalantus is widely described in the literature. In relation to M. incognita, there were differences between the results in both experiments, but all behaved as susceptible in at least one of the tests.Keywords: pitaya, meloidogyne, fruit, resistance
Procedia PDF Downloads 1881138 A Review on Web-Based Attendance Management System
Authors: Arvind Lal, Chumphila Bhutia, Bidhan Pradhan, Retika Sharma, Monisha Limboo
Abstract:
There have been many proposals to optimize the students’ management system in higher education. Managing student attendance during lecture periods have become a difficult challenge. Manual calculation of attendance produces errors and wastes a lot of time. This proposed system manages the student’s attendance in a web portal and the records of the attendance will be stored in a database. The attendance of the students will be further forwarded to their HOD (Head OF Department), class teacher and their parents/guardians. This system will use MySQL for the database. The template of the website will be built using HTML and CSS (Cascading StyleSheet) code. JavaScript will be added to improve the use of the system. Student’s details will be stored in the database. Also, it will contain the details of the teachers according to their subjects and the classes they teach. The system will be responsive which can be used in mobile phones. Also, the development of this project will be user-friendly by facilitating with clear and understandable tabs. Hence, this website will be beneficial to institutes.Keywords: website, student's attendance, MySQL database, HTML, CSS, PHP, JavaScript
Procedia PDF Downloads 1891137 The Studies of Client Requirements in Home Stay: A Case Study of Thailand
Authors: Kanamon Suwantada
Abstract:
The purpose of this research is to understand customer’s expectations towards homestays and to establish the precise strategies to increase numbers of tourists for homestay business in Amphawa district, Samutsongkram, Thailand. The researcher aims to ensure that each host provides experiences to travelers who are looking for and determining new targets for homestay business in Amphawa as well as creating sustainable homestay using marketing strategies to increase customers. The methods allow interview and questionnaire to gain both overview data from the tourists and qualitative data from the homestay owner’s perspective to create a GAP analysis. The data was collected from 200 tourists, during 15th May - 30th July, 2011 from homestay in Amphawa Community. The questionnaires were divided into three sections: the demographic profile, customer information and influencing on purchasing position, and customer expectation towards homestay. The analysis, in fact, will be divided into two methods which are percentage and correlation analyses. The result of this research revealed that homestay had already provided customers with reasonable prices in good locations. Antithetically, activities that they offered still could not have met the customer’s requirements. Homestay providers should prepare additional activities such as village tour, local attraction tour, village daily life experiences, local ceremony participation, and interactive conversation with local people. Moreover, the results indicated that a price was the most important factor for choosing homestay.Keywords: ecotourism, homestay, marketing, sufficiency economic philosophy
Procedia PDF Downloads 3131136 Privacy Paradox and the Internet of Medical Things
Authors: Isabell Koinig, Sandra Diehl
Abstract:
In recent years, the health-care context has not been left unaffected by technological developments. In recent years, the Internet of Medical Things (IoMT)has not only led to a collaboration between disease management and advanced care coordination but also to more personalized health care and patient empowerment. With more than 40 % of all health technology being IoMT-related by 2020, questions regarding privacy become more prevalent, even more so during COVID-19when apps allowing for an intensive tracking of people’s whereabouts and their personal contacts cause privacy advocates to protest and revolt. There is a widespread tendency that even though users may express concerns and fears about their privacy, they behave in a manner that appears to contradict their statements by disclosing personal data. In literature, this phenomenon is discussed as a privacy paradox. While there are some studies investigating the privacy paradox in general, there is only scarce research related to the privacy paradox in the health sector and, to the authors’ knowledge, no empirical study investigating young people’s attitudes toward data security when using wearables and health apps. The empirical study presented in this paper tries to reduce this research gap by focusing on the area of digital and mobile health. It sets out to investigate the degree of importance individuals attribute to protecting their privacy and individual privacy protection strategies. Moreover, the question to which degree individuals between the ages of 20 and 30 years are willing to grant commercial parties access to their private data to use digital health services and apps are put to the test. To answer this research question, results from 6 focus groups with 40 participants will be presented. The focus was put on this age segment that has grown up in a digitally immersed environment. Moreover, it is particularly the young generation who is not only interested in health and fitness but also already uses health-supporting apps or gadgets. Approximately one-third of the study participants were students. Subjects were recruited in August and September 2019 by two trained researchers via email and were offered an incentive for their participation. Overall, results indicate that the young generation is well informed about the growing data collection and is quite critical of it; moreover, they possess knowledge of the potential side effects associated with this data collection. Most respondents indicated to cautiously handle their data and consider privacy as highly relevant, utilizing a number of protective strategies to ensure the confidentiality of their information. Their willingness to share information in exchange for services was only moderately pronounced, particularly in the health context, since health data was seen as valuable and sensitive. The majority of respondents indicated to rather miss out on using digital and mobile health offerings in order to maintain their privacy. While this behavior might be an unintended consequence, it is an important piece of information for app developers and medical providers, who have to find a way to find a user base for their products against the background of rising user privacy concerns.Keywords: digital health, privacy, privacy paradox, IoMT
Procedia PDF Downloads 1441135 Exposure Analysis of GSM Base Stations in Industrial Area
Authors: A. D. Usman, W. F. Wan Ahmad, H. H. Danjuma
Abstract:
Exposure due to GSM frequencies is subject of daily debate. Though regulatory bodies provide guidelines for exposure, people still exercise fear on the possible health hazard that may result due to long term usage. In this study, exposure due to electromagnetic field emitted by GSM base stations in industrial areas was investigated. The aimed was to determine whether industrial area exposure is higher as compared to residential as well as compliance with ICNIRP guidelines. Influence of reflection and absorption with respect to inverse square law was also investigated. Measurements from GSM base stations were performed at various distances in far field region. The highest measured peak power densities as well as the calculated values at GSM 1.8 GHz were 6.05 and 90 mW/m2 respectively. This corresponds to 0.07 and 1% of ICNIRP guidelines. The highest peak power densities as well as the calculated values at GSM 0.9 GHz were 11.92 and 49.7 mW/m2 respectively. These values were 0.3 and 1.1% of ICNIRP guidelines.Keywords: Global System for Mobile Communications (GSM), Electromagnetic Field (EMF), far field, power density, Radiofrequency (RF)
Procedia PDF Downloads 4841134 A Novel Peptide Showing Universal Effect against Multiple Viruses in Vitro and in Vivo
Authors: Hanjun Zhao, Ke Zhang, Bojian Zheng
Abstract:
Background: So far, there is no universal antiviral agent which can inhibit multiple viral infections. More and more drug-resistant viral strains emerge after the antiviral drug application for treatment. Defensins are the front line of host innate immunity and have broad spectrum antibacterial and antiviral effects. However, there is limited data to show if these defensins have good antiviral activity in vivo and what the antiviral mechanism is. Subjects: To investigate a peptide with widespread antivirus activity in vitro and in vivo and illustrate the antiviral mechanism. Methods: Antiviral peptide library designed from mouse beta defensins was synthesized by the company. Recombinant beta defensin was obtained from E. coli. Antiviral activity in vitro was assayed by plaque assay, qPCR. Antiviral activity in vivo was detected by animal challenge with 2009 pandemic H1N1 influenza A virus. The antiviral mechanism was assayed by western blot, ELISA, and qPCR. Conclusions: We identify a new peptide which has widespread effects against multiple viruses (H1N1, H5N1, H7N9, MERS-CoV) in vitro and has efficient antivirus activity in vivo. This peptide inhibits viral entry into target cells and subsequently blocks viral replication. The in vivo study of the antiviral peptide against other viral infections and the investigation of its more detail antiviral mechanism are ongoing.Keywords: antiviral peptide, defensin, Influenza A virus, mechanism
Procedia PDF Downloads 4031133 Android Application on Checking Halal Product Based on Augmented Reality
Authors: Saidatul A'isyah Ahmad Shukri, Haslina Arshad
Abstract:
This study was conducted to develop an application that provides Augmented Reality experience in identifying halal food products and beverages based on Malaysian Islamic Development Department (JAKIM) database for Muslim consumers in Malaysia. The applications is operating on the mobile device using the Android platform. This application aims to provide a new experience to the user how to use the Android application implements Augmentation Reality technology The methodology used is object-oriented analysis and design (OOAD). The programming language used is JAVA programming using the Android Software Development Kit (SDK) and XML. Android operating system is selected, and it is an open source operating system. Results from the study are implemented to further enhance diversity in presentation of information contained in this application and so can bring users using these applications from different angles.Keywords: android, augmented reality, food, halal, Malaysia, products, XML
Procedia PDF Downloads 4611132 Arbitration in Foreign Investment: The Need for Equitable Treatment between the Investor and the Host State
Authors: Maria João Mimoso, Bárbara Magalhães Bravo
Abstract:
This study aims to analyse the phenomenon of arbitration as a paradigm in solving emerging controversies of foreign investment. We will present their benefits and demonstrate their contribution to greater legal certainty in economic relations. This article explores the legal relevant concepts under a strictly conceptual methodology, preparing future research to be developed under more developed comparative law methodologies. The review of national and international literature and jurisprudence will reveal the importance of arbitration in the field of international economic relations, presenting it as an alternative dispute resolution. Globalization imposes new forms of investment protection and appeals to other forms of dispute settlement, primarily to prevent, among other problems, the possible bias of the recipient country's investment tribunals. Characterization of foreign investment, its regulatory sources, their characteristics and the need for intervention of an entity capable of resolving disputes between the parties involved: State investor reception; Investor (of a nationality other than the latter); State of the investor's nationality, and sometimes a ‘subsidiary’ local foreign investor. The ICSID (International Settlement of Investment Disputes) arbitration as a means of resolving investment litigations covered by bilateral treaties (BIT) and investment contracts calls for a delimitation of these two figures in order to clarify the scope of the arbitration under the aegis of the World Bank and to make it more secure in the view of the sovereign power of the States.Keywords: arbitration, contract, foreign, investment, disputes
Procedia PDF Downloads 2721131 Speech Enhancement Using Kalman Filter in Communication
Authors: Eng. Alaa K. Satti Salih
Abstract:
Revolutions Applications such as telecommunications, hands-free communications, recording, etc. which need at least one microphone, the signal is usually infected by noise and echo. The important application is the speech enhancement, which is done to remove suppressed noises and echoes taken by a microphone, beside preferred speech. Accordingly, the microphone signal has to be cleaned using digital signal processing DSP tools before it is played out, transmitted, or stored. Engineers have so far tried different approaches to improving the speech by get back the desired speech signal from the noisy observations. Especially Mobile communication, so in this paper will do reconstruction of the speech signal, observed in additive background noise, using the Kalman filter technique to estimate the parameters of the Autoregressive Process (AR) in the state space model and the output speech signal obtained by the MATLAB. The accurate estimation by Kalman filter on speech would enhance and reduce the noise then compare and discuss the results between actual values and estimated values which produce the reconstructed signals.Keywords: autoregressive process, Kalman filter, Matlab, noise speech
Procedia PDF Downloads 3481130 Estrogen Controls Hepatitis C Virus Entry and Spread through the GPR30 Pathway
Authors: Laura Ulitzky, Dougbeh-Chris Nyan, Manuel M. Lafer, Erica Silberstein, Nicoleta Cehan, Deborah R. Taylor
Abstract:
Hepatitis C virus (HCV)-associated hepatocellular carcinoma, fibrosis and cirrhosis are more frequent in men and postmenopausal women than in premenopausal women and women receiving hormone replacement therapy, suggesting that β-estradiol (estrogen) plays an innate role in preventing viral infection and liver disease. Estrogen classically acts through nuclear estrogen receptors or, alternatively, through the membrane-bound G-protein-coupled estrogen receptor (GPR30 or GPER). We observed a marked decrease in detectable virus when HCV-infected human hepatoma cells were treated with estrogen. The effect was mimicked by both Tamoxifen (Tam) and G1, a GPR30-specific agonist, and was reversed by the GPR30-specific antagonist, G15. Through GPR30, estrogen-mediated the down-regulation of occludin; a tight junction protein and HCV receptor, by promoting activation of matrix metalloproteinases (MMPs). Activated MMP-9 was secreted in response to estrogen, cleaving occludin in the extracellular Domain D, the motif required for HCV entry and spread. This pathway gives new insight into a novel innate immune pathway and the disparate host-virus responses to HCV demonstrated by the two sexes. Moreover, these data suggest that hormone replacement therapy may have beneficial antiviral properties for HCV-infected postmenopausal women and show promise for new antiviral treatments for both men and women.Keywords: HCV, estrogen, occludin, MMPs
Procedia PDF Downloads 4401129 Methods Used to Perform Requirements Elicitation for FinTech Application Development
Authors: Zhao Pengcheng, Yin Siyuan
Abstract:
Fintech is the new hot topic of the 21st century, a discipline that combines financial theory with computer modelling. It can provide both digital analysis methods for investment banks and investment decisions for users. Given the variety of services available, it is necessary to provide a superior method of requirements elicitation to ensure that users' needs are addressed in the software development process. The accuracy of traditional software requirements elicitation methods is not sufficient, so this study attempts to use a multi-perspective based requirements heuristic framework. Methods such as interview and questionnaire combination, card sorting, and model driven are proposed. The collection results from PCA show that the new methods can better help with requirements elicitation. However, the method has some limitations and, there are some efficiency issues. However, the research in this paper provides a good theoretical extension that can provide researchers with some new research methods and perspectives viewpoints.Keywords: requirement elicitation, FinTech, mobile application, survey, interview, model-driven
Procedia PDF Downloads 1081128 Electronic-Word of Mouth(e-WoM): Preliminary Study of Malaysian Undergrad Students Smartphone Online Review
Authors: Norshakirah Ab.Aziz, Nurul Atiqah Jamaluddin
Abstract:
Consequently, electronic word-of-mouth (e-WoM) becomes one of the resources in the decision making process and considered a valuable marketing channel for consumers and organizations. Admittedly, there is increasing concern on the accuracy and genuine of e-WoM content because consumers prefer to look out product or service information available online. Thus, the focus of this study is to propose a model and guidelines how to select trusted online review content according to domain chosen –undergrad students smartphone online review. Undeniable, mobile devices like smartphone has now become a necessity in today are daily life to complete our daily chores. The model and guideline focused on product competency review and the message integrity. In other words, this study aims to enable consumers to identify trusted online review content, which helps them in buying decisions.Keywords: electronic word of mouth, e-WoM, WoM, online review
Procedia PDF Downloads 331