Search results for: time driven activity based costing
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 43364

Search results for: time driven activity based costing

26084 Security Issues in Long Term Evolution-Based Vehicle-To-Everything Communication Networks

Authors: Mujahid Muhammad, Paul Kearney, Adel Aneiba

Abstract:

The ability for vehicles to communicate with other vehicles (V2V), the physical (V2I) and network (V2N) infrastructures, pedestrians (V2P), etc. – collectively known as V2X (Vehicle to Everything) – will enable a broad and growing set of applications and services within the intelligent transport domain for improving road safety, alleviate traffic congestion and support autonomous driving. The telecommunication research and industry communities and standardization bodies (notably 3GPP) has finally approved in Release 14, cellular communications connectivity to support V2X communication (known as LTE – V2X). LTE – V2X system will combine simultaneous connectivity across existing LTE network infrastructures via LTE-Uu interface and direct device-to-device (D2D) communications. In order for V2X services to function effectively, a robust security mechanism is needed to ensure legal and safe interaction among authenticated V2X entities in the LTE-based V2X architecture. The characteristics of vehicular networks, and the nature of most V2X applications, which involve human safety makes it significant to protect V2X messages from attacks that can result in catastrophically wrong decisions/actions include ones affecting road safety. Attack vectors include impersonation attacks, modification, masquerading, replay, MiM attacks, and Sybil attacks. In this paper, we focus our attention on LTE-based V2X security and access control mechanisms. The current LTE-A security framework provides its own access authentication scheme, the AKA protocol for mutual authentication and other essential cryptographic operations between UEs and the network. V2N systems can leverage this protocol to achieve mutual authentication between vehicles and the mobile core network. However, this protocol experiences technical challenges, such as high signaling overhead, lack of synchronization, handover delay and potential control plane signaling overloads, as well as privacy preservation issues, which cannot satisfy the adequate security requirements for majority of LTE-based V2X services. This paper examines these challenges and points to possible ways by which they can be addressed. One possible solution, is the implementation of the distributed peer-to-peer LTE security mechanism based on the Bitcoin/Namecoin framework, to allow for security operations with minimal overhead cost, which is desirable for V2X services. The proposed architecture can ensure fast, secure and robust V2X services under LTE network while meeting V2X security requirements.

Keywords: authentication, long term evolution, security, vehicle-to-everything

Procedia PDF Downloads 162
26083 Code Embedding for Software Vulnerability Discovery Based on Semantic Information

Authors: Joseph Gear, Yue Xu, Ernest Foo, Praveen Gauravaran, Zahra Jadidi, Leonie Simpson

Abstract:

Deep learning methods have been seeing an increasing application to the long-standing security research goal of automatic vulnerability detection for source code. Attention, however, must still be paid to the task of producing vector representations for source code (code embeddings) as input for these deep learning models. Graphical representations of code, most predominantly Abstract Syntax Trees and Code Property Graphs, have received some use in this task of late; however, for very large graphs representing very large code snip- pets, learning becomes prohibitively computationally expensive. This expense may be reduced by intelligently pruning this input to only vulnerability-relevant information; however, little research in this area has been performed. Additionally, most existing work comprehends code based solely on the structure of the graph at the expense of the information contained by the node in the graph. This paper proposes Semantic-enhanced Code Embedding for Vulnerability Discovery (SCEVD), a deep learning model which uses semantic-based feature selection for its vulnerability classification model. It uses information from the nodes as well as the structure of the code graph in order to select features which are most indicative of the presence or absence of vulnerabilities. This model is implemented and experimentally tested using the SARD Juliet vulnerability test suite to determine its efficacy. It is able to improve on existing code graph feature selection methods, as demonstrated by its improved ability to discover vulnerabilities.

Keywords: code representation, deep learning, source code semantics, vulnerability discovery

Procedia PDF Downloads 147
26082 Big Data Analytics and Data Security in the Cloud via Fully Homomorphic Encryption

Authors: Waziri Victor Onomza, John K. Alhassan, Idris Ismaila, Noel Dogonyaro Moses

Abstract:

This paper describes the problem of building secure computational services for encrypted information in the Cloud Computing without decrypting the encrypted data; therefore, it meets the yearning of computational encryption algorithmic aspiration model that could enhance the security of big data for privacy, confidentiality, availability of the users. The cryptographic model applied for the computational process of the encrypted data is the Fully Homomorphic Encryption Scheme. We contribute theoretical presentations in high-level computational processes that are based on number theory and algebra that can easily be integrated and leveraged in the Cloud computing with detail theoretic mathematical concepts to the fully homomorphic encryption models. This contribution enhances the full implementation of big data analytics based cryptographic security algorithm.

Keywords: big data analytics, security, privacy, bootstrapping, homomorphic, homomorphic encryption scheme

Procedia PDF Downloads 372
26081 Purification of Eicosapentaenoic Acid (EPA) and Docosahexaenoic Acid (DHA) from Fish Oil Using HPLC Method and Investigation of Their Antibacterial Effects on Some Pathogenic Bacteria

Authors: Yılmaz Uçar, Fatih Ozogul, Mustafa Durmuş, Yesim Ozogul, Ali Rıza Köşker, Esmeray Kuley Boğa, Deniz Ayas

Abstract:

The aim of this study was to purified eicosapentaenoic acid (EPA) and docosahexaenoic acid (DHA), that are essential oils from trout oil, using high-performance liquid chromatography (HPLC) method, bioconverted EPA and DHA into bioconverted EPA (bEPA), bioconverted DHA (bDHA) extracts by P. aeruginosa PR3. Moreover, in vitro antibacterial activity of bEPA and bDHA was investigated using disc diffusion methods and minimum inhibitory concentration (MIC). EPA and DHA concentration of 11.1% and 15.9% in trout oil increased in 58.64% and 40.33% after HPLC optimisation, respectively. In this study, EPA and DHA enriched products were obtained which are to be used as valuable supplements for food and pharmaceutical purposes. The bioconverted EPA and DHA exhibited antibacterial activities against two Gram-positive bacteria (Listeria monocytogenes ATCC 7677 and Staphylococcus aureus ATCC 29213) and six Gram-negative bacteria (Pseudomonas aeruginosa ATCC 27853, Escherichia coli ATCC 25922, Klebsiella pneumoniae ATCC700603, Enterococcus faecalis ATCC 29212, Aeromonas hydrophila NCIMB 1135, and Salmonella Paratyphi A NCTC 13). Inhibition zones and MIC value of bEPA and bDHA against bacterial strains ranged from 7 to 12 mm and from 350 to 2350 μg/mL, respectively. Our results suggested that the crude extracts of bioconversion of EPA and DHA by P. aeruginosa PR3 can be considered as promising antimicrobials in improving food safety by controlling foodborne pathogens.

Keywords: High-Performance Liquid Chromatography (HPLC), docosahexaenoic acid, DHA, eicosapentaenoic acid, EPA, minimum inhibitory concentration, MIC, Pseudomonas aeruginosa PR3

Procedia PDF Downloads 485
26080 Study of the Anaerobic Degradation Potential of High Strength Molasses Wastewater

Authors: M. Mischopoulou, P. Naidis, S. Kalamaras, T. Kotsopoulos, P. Samaras

Abstract:

The treatment of high strength wastewater by an Upflow Anaerobic Sludge Blanket (UASB) reactor has several benefits, such as high organic removal efficiency, short hydraulic retention time along with low operating costs. In addition, high volumes of biogas are released in these reactors, which can be utilized in several industrial facilities for energy production. This study aims at the examination of the application potential of anaerobic treatment of wastewater, with high molasses content derived from yeast manufacturing, by a lab-scale UASB reactor. The molasses wastewater and the sludge used in the experiments were collected from the wastewater treatment plant of a baker’s yeast manufacturing company. The experimental set-up consisted of a 15 L thermostated UASB reactor at 37 ◦C. Before the reactor start-up, the reactor was filled with sludge and molasses wastewater at a ratio 1:1 v/v. Influent was fed to the reactor at a flowrate of 12 L/d, corresponding to a hydraulic residence time of about 30 h. Effluents were collected from the system outlet and were analyzed for the determination of the following parameters: COD, pH, total solids, volatile solids, ammonium, phosphates and total nitrogen according to the standard methods of analysis. In addition, volatile fatty acid (VFA) composition of the effluent was determined by a gas chromatograph equipped with a flame ionization detector (FID), as an indicator to evaluate the process efficiency. The volume of biogas generated in the reactor was daily measured by the water displacement method, while gas composition was analyzed by a gas chromatograph equipped with a thermal conductivity detector (TCD). The effluent quality was greatly enhanced due to the use of the UASB reactor and high rate of biogas production was observed. The anaerobic treatment of the molasses wastewater by the UASB reactor improved the biodegradation potential of the influent, resulting at high methane yields and an effluent with better quality than the raw wastewater.

Keywords: anaerobic digestion, biogas production, molasses wastewater, UASB reactor

Procedia PDF Downloads 267
26079 The Term of Intellectual Property and Artificial Intelligence

Authors: Yusuf Turan

Abstract:

Definition of Intellectual Property Rights according to the World Intellectual Property Organization: " Intellectual property (IP) refers to creations of the mind, such as inventions; literary and artistic works; designs; and symbols, names and images used in commerce." It states as follows. There are 2 important points in the definition; we can say that it is the result of intellectual activities that occur by one or more than one PERSON and as INNOVATION. When the history and development of the relevant definitions are briefly examined, it is realized that these two points have remained constant and Intellectual Property law and rights have been shaped around these two points. With the expansion of the scope of the term Intellectual Property as a result of the development of technology, especially in the field of artificial intelligence, questions such as "Can "Artificial Intelligence" be an inventor?" need to be resolved within the expanding scope. In the past years, it was ruled that the artificial intelligence named DABUS seen in the USA did not meet the definition of "individual" and therefore would be an inventor/inventor. With the developing technology, it is obvious that we will encounter such situations much more frequently in the field of intellectual property. While expanding the scope, we should definitely determine the boundaries of how we should decide who performs the mental activity or creativity that we call indispensable on the inventor/inventor according to these problems. As a result of all these problems and innovative situations, it is clearly realized that not only Intellectual Property Law and Rights but also their definitions need to be updated and improved. Ignoring the situations that are outside the scope of the current Intellectual Property Term is not enough to solve the problem and brings uncertainty. The fact that laws and definitions that have been operating on the same theories for years exclude today's innovative technologies from the scope contradicts intellectual property, which is expressed as a new and innovative field. Today, as a result of the innovative creation of poetry, painting, animation, music and even theater works with artificial intelligence, it must be recognized that the definition of Intellectual Property must be revised.

Keywords: artificial intelligence, innovation, the term of intellectual property, right

Procedia PDF Downloads 66
26078 Network Functions Virtualization-Based Virtual Routing Function Deployment under Network Delay Constraints

Authors: Kenichiro Hida, Shin-Ichi Kuribayashi

Abstract:

NFV-based network implements a variety of network functions with software on general-purpose servers, and this allows the network operator to select any capabilities and locations of network functions without any physical constraints. In this paper, we evaluate the influence of the maximum tolerable network delay on the virtual routing function deployment guidelines which the authors proposed previously. Our evaluation results have revealed the following: (1) the more the maximum tolerable network delay condition becomes severe, the more the number of areas where the route selection function is installed increases and the total network cost increases, (2) the higher the routing function cost relative to the circuit bandwidth cost, the increase ratio of total network cost becomes larger according to the maximum tolerable network delay condition.

Keywords: NFV (Network Functions Virtualization), resource allocation, virtual routing function, minimum total network cost

Procedia PDF Downloads 241
26077 Improving Vocabulary and Listening Comprehension via Watching French Films without Subtitles: Positive Results

Authors: Yelena Mazour-Matusevich, Jean-Robert Ancheta

Abstract:

This study is based on more than fifteen years of experience of teaching a foreign language, in my case French, to the English-speaking students. It represents a qualitative research on foreign language learners’ reaction and their gains in terms of vocabulary and listening comprehension through repeatedly viewing foreign feature films with the original sountrack but without English subtitles. The initial idea emerged upon realization that the first challenge faced by my students when they find themselves in a francophone environment has been their lack of listening comprehension. Their inability to understand colloquial speech affects not only their academic performance, but their psychological health as well. To remedy this problem, I have designed and applied for many years my own teaching method based on one particular French film, exceptionally suited, for the reasons described in detail in the paper, for the intermediate-advanced level foreign language learners. This project, conducted together with my undergraduate assistant and mentoree J-R Ancheta, aims at showing how the paralinguistic features, such as characters’ facial expressions, settings, music, historical background, images provided before the actual viewing, etc., offer crucial support and enhance students’ listening comprehension. The study, based on students’ interviews, also offers special pedagogical techniques, such as ‘anticipatory’ vocabulary lists and exercises, drills, quizzes and composition topics that have proven to boost students’ performance. For this study, only the listening proficiency and vocabulary gains of the interviewed participants were assessed.

Keywords: comprehension, film, listening, subtitles, vocabulary

Procedia PDF Downloads 618
26076 Speedup Breadth-First Search by Graph Ordering

Authors: Qiuyi Lyu, Bin Gong

Abstract:

Breadth-First Search(BFS) is a core graph algorithm that is widely used for graph analysis. As it is frequently used in many graph applications, improve the BFS performance is essential. In this paper, we present a graph ordering method that could reorder the graph nodes to achieve better data locality, thus, improving the BFS performance. Our method is based on an observation that the sibling relationships will dominate the cache access pattern during the BFS traversal. Therefore, we propose a frequency-based model to construct the graph order. First, we optimize the graph order according to the nodes’ visit frequency. Nodes with high visit frequency will be processed in priority. Second, we try to maximize the child nodes overlap layer by layer. As it is proved to be NP-hard, we propose a heuristic method that could greatly reduce the preprocessing overheads. We conduct extensive experiments on 16 real-world datasets. The result shows that our method could achieve comparable performance with the state-of-the-art methods while the graph ordering overheads are only about 1/15.

Keywords: breadth-first search, BFS, graph ordering, graph algorithm

Procedia PDF Downloads 131
26075 In vivo Antidiarrheal and ex-vivo Spasmolytic Activities of the Aqueous Extract of the Roots of Echinops kebericho Mesfin in Rodents and Isolated Guinea-Pig Ileum

Authors: Fisseha Shiferie (Bpharm, Mpharm)

Abstract:

Diarrhea is a common gastrointestinal disorder characterized by an increase in stool frequency and a change in stool consistency. Inspite of the availability of many drugs as antidiarrheal agents, the search for a drug with affordable cost and better efficacy is essential to overcome diarrheal problems. The root extract of Echinops kebericho, is used by traditional practitioners for the treatment of diarrhea. However, the scientific basis for this usage has not been yet established. The purpose of the present study was to evaluate the antidiarrheal and spasmolytic activities of the aqueous extract of the roots of E. kebericho in rodents and isolated guinea-pig ileum preparations. In the castor oil induced intestinal transit test, E. kebericho produced a significant (p < 0.01) dose dependent decrease in propulsion with peristaltic index values of 45.05±3.3, 42.71±2.25 and 33.17±3.3%, respectively at doses of 100, 200 and 400 mg/kg compared with 63.43±7.3% for control. In the castor oil-induced diarrhea test, the mean defecation was reduced from 1.81±0.18 to 0.99 ± 0.21 compared with 2.59 ±0.81 for control. The extract (at doses stated above) significantly decreased the volume of intestinal fluid secretion induced by castor oil (2.31±0.1 to 2.01±0.2) in relation to 3.28±0.3 for control. When tested on a guinea-pig ileum, root extract of Echinops kebericho exhibited a dose dependent spasmolytic effect, 23.07 % being its highest inhibitory effect. The results obtained in this study give some scientific support to the use of Echinops kebericho as an antidiarrheal agent due to its inhibitory effects on the different diarrheal parameters used in this study.

Keywords: antidiarrheal activity, E. kebericho, traditional medicine, diarrhea, enteropooling, and intestinal transit

Procedia PDF Downloads 309
26074 Collaboration During Planning and Reviewing in Writing: Effects on L2 Writing

Authors: Amal Sellami, Ahlem Ammar

Abstract:

Writing is acknowledged to be a cognitively demanding and complex task. Indeed, the writing process is composed of three iterative sub-processes, namely planning, translating (writing), and reviewing. Not only do second or foreign language learners need to write according to this process, but they also need to respect the norms and rules of language and writing in the text to-be-produced. Accordingly, researchers have suggested to approach writing as a collaborative task in order to al leviate its complexity. Consequently, collaboration has been implemented during the whole writing process or only during planning orreviewing. Researchers report that implementing collaboration during the whole process might be demanding in terms of time in comparison to individual writing tasks. Consequently, because of time constraints, teachers may avoid it. For this reason, it might be pedagogically more realistic to limit collaboration to one of the writing sub-processes(i.e., planning or reviewing). However, previous research implementing collaboration in planning or reviewing is limited and fails to explore the effects of the seconditionson the written text. Consequently, the present study examines the effects of collaboration in planning and collaboration in reviewing on the written text. To reach this objective, quantitative as well as qualitative methods are deployed to examine the written texts holistically and in terms of fluency, complexity, and accuracy. Participants of the study include 4 pairs in each group (n=8). They participated in two experimental conditions, which are: (1) collaborative planning followed by individual writing and individual reviewing and (2) individual planning followed by individual writing and collaborative reviewing. The comparative research findings indicate that while collaborative planning resulted in better overall text quality (precisely better content and organization ratings), better fluency, better complexity, and fewer lexical errors, collaborative reviewing produces better accuracy and less syntactical and mechanical errors. The discussion of the findings suggests the need to conduct more comparative research in order to further explore the effects of collaboration in planning or in reviewing. Pedagogical implications of the current study include advising teachers to choose between implementing collaboration in planning or in reviewing depending on their students’ need and what they need to improve.

Keywords: collaboration, writing, collaborative planning, collaborative reviewing

Procedia PDF Downloads 92
26073 Ensemble-Based SVM Classification Approach for miRNA Prediction

Authors: Sondos M. Hammad, Sherin M. ElGokhy, Mahmoud M. Fahmy, Elsayed A. Sallam

Abstract:

In this paper, an ensemble-based Support Vector Machine (SVM) classification approach is proposed. It is used for miRNA prediction. Three problems, commonly associated with previous approaches, are alleviated. These problems arise due to impose assumptions on the secondary structural of premiRNA, imbalance between the numbers of the laboratory checked miRNAs and the pseudo-hairpins, and finally using a training data set that does not consider all the varieties of samples in different species. We aggregate the predicted outputs of three well-known SVM classifiers; namely, Triplet-SVM, Virgo and Mirident, weighted by their variant features without any structural assumptions. An additional SVM layer is used in aggregating the final output. The proposed approach is trained and then tested with balanced data sets. The results of the proposed approach outperform the three base classifiers. Improved values for the metrics of 88.88% f-score, 92.73% accuracy, 90.64% precision, 96.64% specificity, 87.2% sensitivity, and the area under the ROC curve is 0.91 are achieved.

Keywords: MiRNAs, SVM classification, ensemble algorithm, assumption problem, imbalance data

Procedia PDF Downloads 338
26072 Preference Aggregation and Mechanism Design in the Smart Grid

Authors: Zaid Jamal Saeed Almahmoud

Abstract:

Smart Grid is the vision of the future power system that combines advanced monitoring and communication technologies to provide energy in a smart, efficient, and user-friendly manner. This proposal considers a demand response model in the Smart Grid based on utility maximization. Given a set of consumers with conflicting preferences in terms of consumption and a utility company that aims to minimize the peak demand and match demand to supply, we study the problem of aggregating these preferences while modelling the problem as a game. We also investigate whether an equilibrium can be reached to maximize the social benefit. Based on such equilibrium, we propose a dynamic pricing heuristic that computes the equilibrium and sets the prices accordingly. The developed approach was analysed theoretically and evaluated experimentally using real appliances data. The results show that our proposed approach achieves a substantial reduction in the overall energy consumption.

Keywords: heuristics, smart grid, aggregation, mechanism design, equilibrium

Procedia PDF Downloads 104
26071 Rebamipide Retards CCL4 Induced Hepatic Fibrosis: A Role of PGE2

Authors: Alaa E. El-sisi, Sherin Zakaria

Abstract:

Rebamipide is an antiulcer drug with unique properties such as anti-inflammatory action. It induces endogenous prostaglandin e2 (PGE2). PGE2 is considered as a potent physiological suppressor of liver fibrosis. Aim of study: This study investigated the effect of rebamipide on hepatic fibrosis. Material and Method: Hepatic fibrosis was induced by intraperitoneal injections (IP) injection of CCl4 (0.45 mL/kg) in corn oil 1:5 twice a week for 4 weeks. Rats were divided into four groups as follow: Group 1 treated with CCL4 only, group 2 and 3 treated with CCL4 and rebamipide 60 mg/kg/day (group2) or 100 mg/kg/day (group3), and the fourth group was considered as control group and treated with vehicles. ALT, AST, and Bilirubin were assayed in serum. Antioxidant markers such as malondialdhyde (MDA) and superoxide dismutase (SOD) and fibrotic markers such as hyaluronic acid (HA) and procollagen-III (procol-III) were evaluated in liver tissues. IL-10 as well as PGE2 were also assayed in liver tissues. Pathologic changes in the liver were detected by hematoxylin and eosin staining. Collagen precipitation in liver tissues was visualized using masson trichrom stain. Results: Rebamipide inhibit CCL4 induced increase in ALT and AST significantly (p < 0.05). Rebamipide exerted an antioxidant effect as it inhibits CCL4 induced increased MDA level and decreased SOD activity. Fibrotic markers assay revealed that repamipide (60 or 100 mg/kg/day) decreased the level of procol-III and HA compared to CCl4 (p < 0.05). Oral administration of Rebamipide was associated with a significant increase (p < 0.05) of PGE2 and IL-10. Rebamipide especially at the dose of (100 mg/kg/day) restores liver histology structure and abolish collagen precipitation in liver tissues. Conclusion: Rebamipide retards hepatic fibrosis induced by CCL4 may be through the induction of PGE2 level.

Keywords: fibrotic markers, hepatic fibrosis, PGE2, rebamipide

Procedia PDF Downloads 482
26070 Emile Meyerson's Philosophy of Science in Lacan's Early Theories

Authors: Hugo T. Jorge, Richard T. Simanke

Abstract:

Lacan’s work addresses overarching issues concerning the scientific intelligibility of the subject in its philosophical sense. Even though his reflection is not, strictly speaking, philosophy of science, it contains many traits that are typical of this branch of philosophy. However, the relation between Lacan’s early thought and the philosophy of science of the time is often disregarded or only incompletely accounted for in Lacanian scholarship. French philosopher of science Emile Meyerson was often implicitly or explicitly referred to in Lacan’s works, yet few publications can be found on their relationship. The objective of this paper is to contribute to the analysis of this relationship, indicating some of its possible implications. For this, the convergence between Meyerson’s doctrine of science and Lacan’s works between 1936 and 1953 is discussed, as well as the conditions under which Lacan’s reception of Meyerson’s ideas take place. In conclusion, it is argued that this convergence allows for the clarification of important issues in Lacan’s early work, such as the concept of imago, his views on the nature of truth, and his thesis of the anthropomorphism of natural sciences. Meyerson’s argument for the permanence of common sense within science makes Lacan’s claims on the anthropomorphism of natural sciences more understandable. Similarly, Meyerson’s views on the epistemological shortfall of the Principle of Identity sheds some light on Lacan’s 1936 critique of associationistic concepts of engram and truth and may be at the origins of his antirealist and anti-idealist stances. Meyerson’s Principle of Identity is also related to some aspects of Lacan’s concept of imago. The imago understood as the unconscious condition for the identity in time of family figures in childhood, would be an excellent expression of the Principle of Identity. In this sense, the Principle of Identity may be linked to the concept of imaginary as developed by Lacan in the 1950s. However, Lacan considerably distorts Meyerson’s views in his 1936 critique of Freud’s concept of libido. Finally, a possible relationship between Lacan’s late concept of the real and Meyerson’s concept of the irrational is suggested.

Keywords: imaginary, Lacan, Meyerson, philosophy of science, real

Procedia PDF Downloads 167
26069 An Improved C-Means Model for MRI Segmentation

Authors: Ying Shen, Weihua Zhu

Abstract:

Medical images are important to help identifying different diseases, for example, Magnetic resonance imaging (MRI) can be used to investigate the brain, spinal cord, bones, joints, breasts, blood vessels, and heart. Image segmentation, in medical image analysis, is usually the first step to find out some characteristics with similar color, intensity or texture so that the diagnosis could be further carried out based on these features. This paper introduces an improved C-means model to segment the MRI images. The model is based on information entropy to evaluate the segmentation results by achieving global optimization. Several contributions are significant. Firstly, Genetic Algorithm (GA) is used for achieving global optimization in this model where fuzzy C-means clustering algorithm (FCMA) is not capable of doing that. Secondly, the information entropy after segmentation is used for measuring the effectiveness of MRI image processing. Experimental results show the outperformance of the proposed model by comparing with traditional approaches.

Keywords: magnetic resonance image (MRI), c-means model, image segmentation, information entropy

Procedia PDF Downloads 221
26068 Targeted Photoactivatable Multiagent Nanoconjugates for Imaging and Photodynamic Therapy

Authors: Shazia Bano

Abstract:

Nanoconjugates that integrate photo-based therapeutics and diagnostics within a single platform promise great advances in revolutionizing cancer treatments. However, to achieve high therapeutic efficacy, designing functionally efficacious nanocarriers to tightly retain the drug, promoting selective drug localization and release, and the validation of the efficacy of these nanoconjugates is a great challenge. Here we have designed smart multiagent, liposome based targeted photoactivatable multiagent nanoconjugates, doped with a photoactivatable chromophore benzoporphyrin derivative (BPD) labelled with an active targeting ligand cetuximab to target the EGFR receptor (over expressed in various cancer cells) to deliver a combination of therapeutic agents. This study establishes a tunable nanoplatform for the delivery of the photoactivatable multiagent nanoconjugates for tumor-specific accumulation and targeted destruction of cancer cells in complex cancer model to enhance the therapeutic index of the administrated drugs.

Keywords: targeting, photodynamic therapy, photoactivatable, nanoconjugates

Procedia PDF Downloads 133
26067 Optimizing Availability of Marine Knowledge Repository with Cloud-Based Framework

Authors: Ahmad S. Mohd Noor, Emma A. Sirajudin, Nur F. Mat Zain

Abstract:

Reliability is an important property for knowledge repository system. National Marine Bioinformatics System or NABTICS is a marine knowledge repository portal aimed to provide a baseline for marine biodiversity and a tool for researchers and developers. It is intended to be a large and growing online database and also a metadata system for inputs of research analysis. The trends of present large distributed systems such as Cloud computing are the delivery of computing as a service rather than a product. The goal of this research is to make NABTICS a system of greater availability by integrating it with Cloud based Neighbor Replication and Failure Recovery (NRFR). This can be achieved by implementation of NABTICS into distributed environment. As a result, the user can experience minimum downtime while using the system should the server is having a failure. Consequently the online database application is said to be highly available.

Keywords: cloud, availability, distributed system, marine repository, database replication

Procedia PDF Downloads 463
26066 A Mutually Exclusive Task Generation Method Based on Data Augmentation

Authors: Haojie Wang, Xun Li, Rui Yin

Abstract:

In order to solve the memorization overfitting in the meta-learning MAML algorithm, a method of generating mutually exclusive tasks based on data augmentation is proposed. This method generates a mutex task by corresponding one feature of the data to multiple labels, so that the generated mutex task is inconsistent with the data distribution in the initial dataset. Because generating mutex tasks for all data will produce a large number of invalid data and, in the worst case, lead to exponential growth of computation, this paper also proposes a key data extraction method, that only extracts part of the data to generate the mutex task. The experiments show that the method of generating mutually exclusive tasks can effectively solve the memorization overfitting in the meta-learning MAML algorithm.

Keywords: data augmentation, mutex task generation, meta-learning, text classification.

Procedia PDF Downloads 89
26065 Challenges for Competency-Based Learning Design in Primary School Mathematics in Mozambique

Authors: Satoshi Kusaka

Abstract:

The term ‘competency’ is attracting considerable scholarly attention worldwide with the advance of globalization in the 21st century and with the arrival of a knowledge-based society. In the current world environment, familiarity with varied disciplines is regarded to be vital for personal success. The idea of a competency-based educational system was mooted by the ‘Definition and Selection of Competencies (DeSeCo)’ project that was conducted by the Organization for Economic Cooperation and Development (OECD). Further, attention to this topic is not limited to developed countries; it can also be observed in developing countries. For instance, the importance of a competency-based curriculum was mentioned in the ‘2013 Harmonized Curriculum Framework for the East African Community’, which recommends key competencies that should be developed in primary schools. The introduction of such curricula and the reviews of programs are actively being executed, primarily in the East African Community but also in neighboring nations. Taking Mozambique as a case in point, the present paper examines the conception of ‘competency’ as a target of frontline education in developing countries. It also aims to discover the manner in which the syllabus, textbooks and lessons, among other things, in primary-level math education are developed and to determine the challenges faced in the process. This study employs the perspective of competency-based education design to analyze how the term ‘competency’ is defined in the primary-level math syllabus, how it is reflected in the textbooks, and how the lessons are actually developed. ‘Practical competency’ is mentioned in the syllabus, and the description of the term lays emphasis on learners' ability to interactively apply socio-cultural and technical tools, which is one of the key competencies that are advocated in OECD's ‘Definition and Selection of Competencies’ project. However, most of the content of the textbooks pertains to ‘basic academic ability’, and in actual classroom practice, teachers often impart lessons straight from the textbooks. It is clear that the aptitude of teachers and their classroom routines are greatly dependent on the cultivation of their own ‘practical competency’ as it is defined in the syllabus. In other words, there is great divergence between the ‘syllabus’, which is the intended curriculum, and the content of the ‘textbooks’. In fact, the material in the textbooks should serve as the bridge between the syllabus, which forms the guideline, and the lessons, which represent the ‘implemented curriculum’. Moreover, the results obtained from this investigation reveal that the problem can only be resolved through the cultivation of ‘practical competency’ in teachers, which is currently not sufficient.

Keywords: competency, curriculum, mathematics education, Mozambique

Procedia PDF Downloads 184
26064 Gender Equality: A Constitutional Myth When Featured with Domestic Violence

Authors: Suja S. Nayar, Mayuri Pandya

Abstract:

The foundation of legal system of any nation is its constitution and the strive to achieve equality amongst different classes prevailing in the social system. The most traditional form of inequality that is prevailing in the society is the gender inequality. The existence of inequality on the basis of gender prevails since the ancient era which has with the passing time merely continued and aggravated to a great extent. The founding fathers of our constitution were well aware of the then prevailing situation and being concerned about the future if this inequality continued to prevail, and in such view, the provisions of Article 14, 15, 38 and 44 of our Constitution were enacted with specific intent for the upliftment of women. The strive for equality is the rule of law embodied with the principle of foreseeability which is necessitated in the stability of justice system of any nation, and when it comes to equality, the first form of equality we need to achieve is gender equality. Time and again various initiatives have been announced and attempted to achieve the objective of gender equality, but analysis of the ground reality always have yielded disappointing results. The research that is proposed to be undertaken intends to cover all the above issues concerning the failures ineffective implementation of the gender-specific laws especially the provisions concerning the protection provided under Domestic Violence Act. The researchers will analyze the judgment of last five years' judgments of Supreme Court of India. In Hiral P. Harsora and ors. v Kusum Narottamdas Harsora and Ors. the Hon'ble Supreme Court recently deleting the words 'adult male' from the definition of respondent disclosed it is intent and understanding that domestic violence is being caused by a female on female also and not only restricted to males on females only. The procedure as prescribed under the act for claiming reliefs though is as per the criminal mandate, but the reliefs are of civil nature and so same needs to deal emphatically which now makes it a lengthier process. The pros and cons of such pronouncements are being weighed on the balance of constitution and social equality that is strived by the entire women fraternity.

Keywords: domestic, violence, constitution, gender, equality, women

Procedia PDF Downloads 499
26063 Monetary Evaluation of Dispatching Decisions in Consideration of Choice of Transport

Authors: Marcel Schneider, Nils Nießen

Abstract:

Microscopic simulation programs enable the description of the two processes of railway operation and the previous timetabling. Occupation conflicts are often solved based on defined train priorities on both process levels. These conflict resolutions produce knock-on delays for the involved trains. The sum of knock-on delays is commonly used to evaluate the quality of railway operations. It is either compared to an acceptable level-of-service or the delays are evaluated economically by linearly monetary functions. It is impossible to properly evaluate dispatching decisions without a well-founded objective function. This paper presents a new approach for evaluation of dispatching decisions. It uses models of choice of transport and considers the behaviour of the end-costumers. These models evaluate the knock-on delays in more detail than linearly monetary functions and consider other competing modes of transport. The new approach pursues the coupling of a microscopic model of railway operation with the macroscopic model of choice of transport. First it will be implemented for the railway operations process, but it can also be used for timetabling. The evaluation considers the possibility to change over to other transport modes by the end-costumers. The new approach first looks at the rail-mounted and road transport, but it can also be extended to air transport. The split of the end-costumers is described by the modal-split. The reactions by the end-costumers have an effect on the revenues of the railway undertakings. Various travel purposes has different pavement reserves and tolerances towards delays. Longer journey times affect besides revenue changes also additional costs. The costs depend either on time or track and arise from circulation of workers and vehicles. Only the variable values are summarised in the contribution margin, which is the base for the monetary evaluation of the delays. The contribution margin is calculated for different resolution decisions of the same conflict. The conflict resolution is improved until the monetary loss becomes minimised. The iterative process therefore determines an optimum conflict resolution by observing the change of the contribution margin. Furthermore, a monetary value of each dispatching decision can also be determined.

Keywords: choice of transport, knock-on delays, monetary evaluation, railway operations

Procedia PDF Downloads 320
26062 Relay Node Selection Algorithm for Cooperative Communications in Wireless Networks

Authors: Sunmyeng Kim

Abstract:

IEEE 802.11a/b/g standards support multiple transmission rates. Even though the use of multiple transmission rates increase the WLAN capacity, this feature leads to the performance anomaly problem. Cooperative communication was introduced to relieve the performance anomaly problem. Data packets are delivered to the destination much faster through a relay node with high rate than through direct transmission to the destination at low rate. In the legacy cooperative protocols, a source node chooses a relay node only based on the transmission rate. Therefore, they are not so feasible in multi-flow environments since they do not consider the effect of other flows. To alleviate the effect, we propose a new relay node selection algorithm based on the transmission rate and channel contention level. Performance evaluation is conducted using simulation, and shows that the proposed protocol significantly outperforms the previous protocol in terms of throughput and delay.

Keywords: cooperative communications, MAC protocol, relay node, WLAN

Procedia PDF Downloads 324
26061 Factors Associated with Risky Sexual Behaviour in Adolescent Girls and Young Women in Cambodia: A Systematic Review

Authors: Farwa Rizvi, Joanne Williams, Humaira Maheen, Elizabeth Hoban

Abstract:

There is an increase in risky sexual behavior and unsafe sex in adolescent girls and young women aged 15 to 24 years in Cambodia, which negatively affects their reproductive health by increasing the risk of contracting sexually transmitted infections and unintended pregnancies. Risky sexual behavior includes ‘having sex at an early age, having multiple sexual partners, having sex while under the influence of alcohol or drugs, and unprotected sexual behaviors’. A systematic review of quantitative research conducted in Cambodia was undertaken, using the theoretical framework of the Social Ecological Model to identify the personal, social and cultural factors associated with risky sexual behavior and unsafe sex in young Cambodian women. PRISMA guidelines were used to search databases including Medline Complete, PsycINFO, CINAHL Complete, Academic Search Complete, Global Health, and Social Work Abstracts. Additional searches were conducted in Science Direct, Google Scholar and in the grey literature sources. A risk-of-bias tool developed explicitly for the systematic review of cross-sectional studies was used. Summary item on the overall risk of study bias after the inter-rater response showed that the risk-of-bias was high in two studies, moderate in one study and low in one study. The search strategy included a combination of subject terms and free text terms. The medical subject headings (MeSH) terms included were; contracept* or ‘birth control’ or ‘family planning’ or pregnan* or ‘safe sex’ or ‘protected intercourse’ or ‘unprotected intercourse’ or ‘protected sex’ or ‘unprotected sex’ or ‘risky sexual behaviour*’ or ‘abort*’ or ‘planned parenthood’ or ‘unplanned pregnancy’ AND ( barrier* or obstacle* or challenge* or knowledge or attitude* or factor* or determinant* or choic* or uptake or discontinu* or acceptance or satisfaction or ‘needs assessment’ or ‘non-use’ or ‘unmet need’ or ‘decision making’ ) AND Cambodia*. Initially, 300 studies were identified by using key words and finally, four quantitative studies were selected based on the inclusion criteria. The four studies were published between 2010 and 2016. The study participants ranged in age from 10-24 years, single or married, with 3 to 10 completed years of education. The mean age at sexual debut was reported to be 18 years. Using the perspective of the Social Ecological Model, risky sexual behavior was associated with individual-level factors including young age at sexual debut, low education, unsafe sex under the influence of alcohol and substance abuse, multiple sexual partners or transactional sex. Family level factors included living away from parents, orphan status and low levels of family support. Peer and partner level factors included peer delinquency and lack of condom use. Low socioeconomic status at the society level was also associated with risky sexual behaviour. There is scant research on sexual and reproductive health of adolescent girls and young women in Cambodia. Individual, family and social factors were significantly associated with risky sexual behaviour. More research is required to inform potential preventive strategies and policies that address young women’s sexual and reproductive health.

Keywords: adolescents, high-risk sex, sexual activity, unplanned pregnancies

Procedia PDF Downloads 239
26060 In-Vitro Dextran Synthesis and Characterization of an Intracellular Glucosyltransferase from Leuconostoc Mesenteroides AA1

Authors: Afsheen Aman, Shah Ali Ul Qader

Abstract:

Dextransucrase [EC 2.4.1.5] is a glucosyltransferase that catalysis the biosynthesis of a natural biopolymer called dextran. It can catalyze the transfer of D-glucopyranosyl residues from sucrose to the main chain of dextran. This unique biopolymer has multiple applications in several industries and the key utilization of dextran lies on its molecular weight and the type of branching. Extracellular dextransucrase from Leuconostoc mesenteroides is most extensively studied and characterized. Limited data is available regarding cell-bound or intracellular dextransucrase and on the characterization of dextran produced by in-vitro reaction of intracellular dextransucrase. L. mesenteroides AA1 is reported to produce extracellular dextransucrase that catalyzes biosynthesis of a high molecular weight dextran with only α-(1→6) linkage. Current study deals with the characterization of an intracellular dextransucrase and in vitro biosynthesis of low molecular weight dextran from L. mesenteroides AA1. Intracellular dextransucrase was extracted from cytoplasm and purified to homogeneity for characterization. Kinetic constants, molecular weight and N-terminal sequence analysis of intracellular dextransucrase reveal unique variation with previously reported extracellular dextransucrase from the same strain. In vitro synthesized biopolymer was characterized using NMR spectroscopic techniques. Intracellular dextransucrase exhibited Vmax and Km values of 130.8 DSU ml-1 hr-1 and 221.3 mM, respectively. Optimum catalytic activity was detected at 35°C in 0.15 M citrate phosphate buffer (pH-5.5) in 05 minutes. Molecular mass of purified intracellular dextransucrase is approximately 220.0 kDa on SDS-PAGE. N-terminal sequence of the intracellular enzyme is: GLPGYFGVN that showed no homology with previously reported sequence for the extracellular dextransucrase. This intracellular dextransucrase is capable of in vitro synthesis of dextran under specific conditions. This intracellular dextransucrase is capable of in vitro synthesis of dextran under specific conditions and this biopolymer can be hydrolyzed into different molecular weight fractions for various applications.

Keywords: characterization, dextran, dextransucrase, leuconostoc mesenteroides

Procedia PDF Downloads 391
26059 Willingness of Spanish Wineries to Implement Renewable Energies in Their Vineyards and Wineries, as Well as the Limitations They Perceive for Their Implementation

Authors: Javier Carroquino, Nieves García-Casarejos, Pilar Gargallo

Abstract:

Climate change, depletion of non-renewable resources in the current energies, pollution from them, the greater ecological awareness of the population, are factors that suggest the change of energy sources in business. The agri-food industry is a growth sector, concerned about product innovation, process and with a clear awareness of what climate change may mean for it. This sector is supposed to have a high receptivity to the implementation of clean energy, as this favors not only the environment but also the essence of its business. This work, through surveys, aims to know the willingness of Spanish wineries to implement renewable energies in their vineyards, as well as the limitations they perceive for their implementation. This questionnaire allows the characterization of the sector in terms of its geographical typologies, their activity levels, their perception of environmental issues, the degree of implementation of measures to mitigate climate change and improve energy efficiency, and its uses and energy consumption. The analysis of data proves that the penetration of renewable energies is still at low levels, being the most used energies, solar thermal, photovoltaic and biomass. The initial investment seems to be at the origin of the lack of implantation of this type of energy in the wineries, and not so much the costs of operations and maintenance. The environmental management of the wineries is still at an embryonic stage within the company's organization chart, because these services are either outsourced or, if technicians are available, they are not exclusively dedicated to these tasks. However, there is a strong environmental awareness, as evidenced by the number of climate change mitigation and energy efficiency measures already adopted. The gap between high awareness and low achievement is probably due to the lack of knowledge about how to do it or the perception of a high cost.

Keywords: survey, renewable energy, winery, Spanish case

Procedia PDF Downloads 247
26058 Review of Cyber Security in Oil and Gas Industry with Cloud Computing Perspective: Taxonomy, Issues and Future Direction

Authors: Irfan Mohiuddin, Ahmad Al Mogren

Abstract:

In recent years, cloud computing has earned substantial attention in the Oil and Gas Industry and provides services in all the phases of the industry lifecycle. Oil and gas supply infrastructure, in particular, is more vulnerable to accidental, natural and intentional threats because of its widespread distribution. Numerous surveys have been conducted on cloud security and privacy. However, to the best of our knowledge, hardly any survey is carried out that reviews cyber security in all phases with a cloud computing perspective. Moreover, a distinctive classification is performed for all the cloud-based cyber security measures based on the cloud component in use. The classification approach will enable researchers to identify the required technique used to enhance the security in specific cloud components. Also, the limitation of each component will allow the researchers to design optimal algorithms. Lastly, future directions are given to point out the imminent challenges that can pave the way for researchers to further enhance the resilience to cyber security threats in the oil and gas industry.

Keywords: cyber security, cloud computing, safety and security, oil and gas industry, security threats, oil and gas pipelines

Procedia PDF Downloads 136
26057 Flood Management Plans in Different Flooding Zones of Gujranwala and Rawalpindi Divisions, Punjab, Pakistan

Authors: Muhammad Naveed

Abstract:

In this paper, flood issues in Gujranwala and Rawalpindi divisions are discussed as a primary importance as these zones are affected continuously from flooding in recent years, provincial variability of the issue, introduce status of the continuous administration measures, their adequacy and future needs in flood administration are secured. Flood issues in these zones are exhibited by Chenab River Basin, Jhelum Rivers Basin. Some unique problems, related to floods in these divisions is lack of major dams on Chenab and Jhelum rivers and also mismanagement of rivers and canal water like dam break stream, and water signing in Tal zones, are additionally mentioned. There are major Nalaas in these regions like Nalaa Lai of Rawalpindi and Nalaa Daik, Nalaa Palkhu, Nalaa Aik of Gujranwala are major cause of floods in these regions other than rivers. Proper management of these Nalaas and moving of nearby population well in time could reduce impacts from flood in these regions. Progress of different flood administration measures, both auxiliary and non-basic, are discussed. Likewise, future needs to accomplish proficient and fruitful flood management measures in Pakistan are additionally brought up. In this paper, we describe different hard and soft engineering techniques to overcome flood situations in these zones as these zones are more vulnerable due to lack of management in canal and river water. Effective management and use of hard and soft techniques are need of time in coming future for controlling greater flooding in flood risk zones to overcome or minimize people’s death as well as agricultural and financial resources as flood and other natural disasters are a major drawback in the economic prosperity of the country.

Keywords: flood management, rivers, major dams, agricultural and financial loss, future management and control

Procedia PDF Downloads 190
26056 Dynamics of Parent to Adolescent Communication on Sexual and Reproductive Health in Sub-Saharan Africa: A Focus on Barriers and Policy Implications

Authors: Douglas Nyathi, Mxolisi Sibanda, Joram Ndlovuu, Thulani Dube, Innocent T. Mahiya

Abstract:

Communication of sexual matters between the parents and adolescents has been seen as one of the strategies that could play a cardinal role in encouraging adolescents to be responsible and delay sexual debut or avoid unprotected sexual intercourse. The increasing rate of teenage pregnancies and new HIV/AIDS infections among adolescents in Sub-Saharan Africa makes the phenomenon worth analysis. The purpose of this paper is to interrogate the dynamics of parent-adolescent communication on sexual and reproductive health in Sub-Sahara. Specifically the paper focuses on barriers to communication between parents and adolescents on sexual and reproductive health and its policy implications. It emanates from the paper that communication on sexual and reproductive health at household level is triggered by death of a relative from a sexual related illness, suspicion on sexual activity, radio programmes and in some instances fliers. Literature engagement reveals that communication between parents and adolescents on sexual and reproductive health is made difficult by economic factors (poverty, lack of privacy and low self-esteem), household demographics (age, sex, class, death), socio-cultural factors (beliefs and religious values) as well as social media. We argue that there is need to use broadcast mediato come up with radio and television programmes that create family environments in which sexual and reproductive health issues are discussed. We also recommend that government departments and Non-Governmental Organisations concerned with sexuality issues need to undertake studies that can help dismantle taboos, prejudices and stereotypes that impede sexual and reproductive health communication between parents and adolescents.

Keywords: parent, adolecsent, communication, sexual and reproductive health

Procedia PDF Downloads 454
26055 Drawings Reveal Beliefs of Japanese University Students

Authors: Sakae Suzuki

Abstract:

Although Japanese students study English for six years in secondary schools, they demonstrate little success with it when they enter higher education. Learners’ beliefs can predict the future behavior of students, so it may be effective to investigate how learners’ beliefs limit their success and how beliefs might be nudged in a positive direction. While many researchers still depend on a questionnaire called BALLI to reveal explicit beliefs, alternative approaches, especially those designed to reveal implicit beliefs, might be helpful for promoting learning. The present study seeks to identify beliefs with a discursive approach using visual metaphors and narratives. Employing a sociocultural framework, this study investigates how students’ beliefs are revealed by drawings of themselves and their surrounding environments and artifacts while they are engaged in language learning. Research questions are: (1) Can we identify beliefs through an analysis of students’ visual narratives? (2) What environments and artifacts can be found in students’ drawings, and what do they mean? (3) To what extent do students see language learning as a solitary, rather than a social, activity? Participants are university students majoring in science and technology in Japan. The questionnaire was administered to 70 entering students in April, 2014. Data included students drawings of themselves as learners of English as well as written descriptions of students’ backgrounds, English-learning experiences, and analogies and metaphors that they used in written descriptions of themselves as learners. Data will be analyzed qualitatively and quantitatively. Anticipated results include students’ perceptions of themselves as language learners, including their sense of agency, awareness of artifacts, and social contexts of language learning. Comments will be made on implications for teaching, as well as the use of visual narratives as research tools, and recommended further research.

Keywords: drawings, learners' beliefs, metaphors, BALLI

Procedia PDF Downloads 488