Search results for: activation code
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 2327

Search results for: activation code

587 Utilizing Minecraft Java Edition for the Application of Fire Disaster Procedures to Establish Fire Disaster Readiness for Grade 12 STEM students of DLSU-IS

Authors: Aravella Flores, Jose Rafael E. Sotelo, Luis Romulus Phillippe R. Javier, Josh Christian V. Nunez

Abstract:

This study focuses on analyzing the performance of Grade 12 STEM students of De La Salle University - Integrated School that has completed the Disaster Readiness and Risk Reduction course in handling fire hazards through Minecraft Java Edition. This platform is suitable because fire DRRR is challenging to learn in a practical setting as well as questionable with regard to supplementing the successful implementation of textbook knowledge into actual practice. The purpose of this study is to acknowledge whether Minecraft can be a suitable environment to familiarize oneself to fire DRRR. The objectives are achieved through utilizing Minecraft in simulating fire scenarios which allows the participants to freely act upon and practice fire DRRR. The experiment was divided into the grounding and validation phase, where researchers observed the performance of the participants in the simulation. A pre-simulation and post-simulation survey was given to acknowledge the change in participants’ perception of being able to utilize fire DRRR procedures and their vulnerabilities. The paired t-test was utilized, showing significant differences in the pre-simulation and post-simulation survey scores, thus, insinuating improved judgment of DRRR, lessening their vulnerabilities in the possibility of encountering a fire hazard. This research poses a model for future research which can gather more participants and dwell on more complex codes outside just command blocks and into the code lines of Minecraft itself.

Keywords: minecraft, DRRR, fire, disaster, simulation

Procedia PDF Downloads 120
586 Cytotoxicity of 13 South African Macrofungal Species and Mechanism/s of Action against Cancer Cell Lines

Authors: Gerhardt Boukes, Maryna Van De Venter, Sharlene Govender

Abstract:

Macrofungi have been used for the past two thousand years in Asian countries, and more recently in Western countries, for their medicinal properties. Biological activities include antimicrobial, antioxidant, anti-inflammatory, antidiabetic, anticancer and immunomodulatory to name a few. Several biologically active compounds have been identified and isolated. Macrofungal research in Africa is poorly documented and to the best of our knowledge non-existent. South Africa has a rich macrofungal biodiversity, which includes endemic and exotic macrofungal species. Ethanolic extracts of 13 macrofungal species, including mushrooms, bracket fungi and puffballs, were prepared and screened for cytotoxicity against a panel of seven cell lines, including A549 (human lung adenocarcinoma), HeLa (human cervical adenocarcinoma), HT-29 (human colorectal adenocarcinoma), MCF7 (human breast adenocarcinoma), MIA PaCa-2 (human pancreatic ductal adenocarcinoma), PC-3 (human prostate adenocarcinoma) and Vero (African green monkey kidney epithelial) cells using MTT. Cell lines were chosen according to the most prevalent cancer types affecting males and females in South Africa and globally, and the mutations they contain. Preliminary results have shown that three of the macrofungal genera, i.e. Fomitopsis, Gymnopilus and Pycnoporus, have shown cytotoxic activity, ranging between IC50 ~20 and 200 µg/mL. The molecular mechanism of action contributing to cell death investigated and being investigated include apoptosis (i.e. DNA cell cycle arrest, caspase-3 activation and mitochondrial membrane potential), autophagy (i.e. acridine orange and LC3B staining) and ER stress (i.e. thioflavin T staining and caspase-12) in the presence of melphalan, chloroquine and thapsigargin/tuncamycin as positive controls, respectively. The genus, Pycnoporus, has shown the best cytotoxicity of the three macrofungal genera. Future work will focus on the identification and isolation of novel active compounds and elucidating the mechanism/s of action.

Keywords: cancer, cytotoxicity, macrofungi, mechanism/s of action

Procedia PDF Downloads 230
585 Recognition and Counting Algorithm for Sub-Regional Objects in a Handwritten Image through Image Sets

Authors: Kothuri Sriraman, Mattupalli Komal Teja

Abstract:

In this paper, a novel algorithm is proposed for the recognition of hulls in a hand written images that might be irregular or digit or character shape. Identification of objects and internal objects is quite difficult to extract, when the structure of the image is having bulk of clusters. The estimation results are easily obtained while going through identifying the sub-regional objects by using the SASK algorithm. Focusing mainly to recognize the number of internal objects exist in a given image, so as it is shadow-free and error-free. The hard clustering and density clustering process of obtained image rough set is used to recognize the differentiated internal objects, if any. In order to find out the internal hull regions it involves three steps pre-processing, Boundary Extraction and finally, apply the Hull Detection system. By detecting the sub-regional hulls it can increase the machine learning capability in detection of characters and it can also be extend in order to get the hull recognition even in irregular shape objects like wise black holes in the space exploration with their intensities. Layered hulls are those having the structured layers inside while it is useful in the Military Services and Traffic to identify the number of vehicles or persons. This proposed SASK algorithm is helpful in making of that kind of identifying the regions and can useful in undergo for the decision process (to clear the traffic, to identify the number of persons in the opponent’s in the war).

Keywords: chain code, Hull regions, Hough transform, Hull recognition, Layered Outline Extraction, SASK algorithm

Procedia PDF Downloads 332
584 Cache Analysis and Software Optimizations for Faster on-Chip Network Simulations

Authors: Khyamling Parane, B. M. Prabhu Prasad, Basavaraj Talawar

Abstract:

Fast simulations are critical in reducing time to market in CMPs and SoCs. Several simulators have been used to evaluate the performance and power consumed by Network-on-Chips. Researchers and designers rely upon these simulators for design space exploration of NoC architectures. Our experiments show that simulating large NoC topologies take hours to several days for completion. To speed up the simulations, it is necessary to investigate and optimize the hotspots in simulator source code. Among several simulators available, we choose Booksim2.0, as it is being extensively used in the NoC community. In this paper, we analyze the cache and memory system behaviour of Booksim2.0 to accurately monitor input dependent performance bottlenecks. Our measurements show that cache and memory usage patterns vary widely based on the input parameters given to Booksim2.0. Based on these measurements, the cache configuration having least misses has been identified. To further reduce the cache misses, we use software optimization techniques such as removal of unused functions, loop interchanging and replacing post-increment operator with pre-increment operator for non-primitive data types. The cache misses were reduced by 18.52%, 5.34% and 3.91% by employing above technology respectively. We also employ thread parallelization and vectorization to improve the overall performance of Booksim2.0. The OpenMP programming model and SIMD are used for parallelizing and vectorizing the more time-consuming portions of Booksim2.0. Speedups of 2.93x and 3.97x were observed for the Mesh topology with 30 × 30 network size by employing thread parallelization and vectorization respectively.

Keywords: cache behaviour, network-on-chip, performance profiling, vectorization

Procedia PDF Downloads 182
583 The Influence of Immunity on the Behavior and Dignity of Judges

Authors: D. Avnieli

Abstract:

Immunity of judges from liability represents a departure from the principle that all are equal under the law, and that victims may be granted compensation from their offenders. The purpose of the study is to determine if judicial immunity coincides with the need to ensure the existence of highly independent and incorruptible judiciary. Judges are immune from civil and criminal liability for their judicial acts. Judicial immunity is justified by the need to maintain complete independence and discretion of the judiciary. Scholars and judges believe that absolute immunity is needed to shield judges from pressures, threats, or outside interference. It is commonly accepted, that judges should be free to perform their judicial role in accordance with their assessment of the fact and their understanding of the law, without any restrictions, influences, inducements or interferences. In most countries, immunity applies when judges act in excess of jurisdiction. In some countries, it applies even when they act maliciously or corruptly. The only exception to absolute immunity applicable in all judicial systems is when judges act without jurisdiction over the subject matter. The Israeli Supreme Court recently decided to embrace absolute immunity and strike off a lawsuit of a refugee, who was unlawfully incarcerated. The Court ruled that the plaintiff cannot sue the State or the judge for damages. The questions of malice, dignity, and public scrutiny were not discussed. This paper, based on comparative analysis of many cases, aims to determine if immunity affects the dignity and behavior of judges. It demonstrates that most judges maintain their dignity and ethical code of behavior, but sometimes do not hesitate to act consciously in excess of jurisdiction, and in rare cases even corruptly. Therefore, in order to maintain independent and incorruptible judiciary, immunity should not be applied where judges act consciously in excess of jurisdiction or with malicious incentives.

Keywords: incorruptible judiciary, immunity, independent, judicial, judges, jurisdiction

Procedia PDF Downloads 91
582 Linux Security Management: Research and Discussion on Problems Caused by Different Aspects

Authors: Ma Yuzhe, Burra Venkata Durga Kumar

Abstract:

The computer is a great invention. As people use computers more and more frequently, the demand for PCs is growing, and the performance of computer hardware is also rising to face more complex processing and operation. However, the operating system, which provides the soul for computers, has stopped developing at a stage. In the face of the high price of UNIX (Uniplexed Information and Computering System), batch after batch of personal computer owners can only give up. Disk Operating System is too simple and difficult to bring innovation into play, which is not a good choice. And MacOS is a special operating system for Apple computers, and it can not be widely used on personal computers. In this environment, Linux, based on the UNIX system, was born. Linux combines the advantages of the operating system and is composed of many microkernels, which is relatively powerful in the core architecture. Linux system supports all Internet protocols, so it has very good network functions. Linux supports multiple users. Each user has no influence on their own files. Linux can also multitask and run different programs independently at the same time. Linux is a completely open source operating system. Users can obtain and modify the source code for free. Because of these advantages of Linux, it has also attracted a large number of users and programmers. The Linux system is also constantly upgraded and improved. It has also issued many different versions, which are suitable for community use and commercial use. Linux system has good security because it relies on a file partition system. However, due to the constant updating of vulnerabilities and hazards, the using security of the operating system also needs to be paid more attention to. This article will focus on the analysis and discussion of Linux security issues.

Keywords: Linux, operating system, system management, security

Procedia PDF Downloads 97
581 DSC2 Promotes the Proliferation, Metastasis and Drug Resistance of Lung Cancer by Activating the PI3K/AKT Pathway

Authors: Qi LI, Xu Lin, Nengming Lin

Abstract:

Objective: The aim of this study was to investigate the role of desmocollin 2 (DSC2) protein in the proliferation, migration and drug resistance of lung cancer cells. Method: CCK-8 assays and colony formation assays were used to evaluate the effect of dsc2 regulation on cancer cell viability and colony formation. Transwell assays and wound healing assays were also performed. Cell flow double staining was used to detect the apoptosis rate of cells with DSC2, which was added cisplatin. Western blot assay was used to detect cell cycle, PI3k/Akt and apoptosis-related proteins. Results: Our data showed that dsc2 is upregulated in clinical lung cancer tissues compared with pericarcinomatous tissues, and it is differentially expressed in lung cancer cell lines. The down-regulation of dsc2 in A549 and H358 lung cancer cells significantly suppressed the cell proliferation, metastasis, and motility. In contrast, the opposite effects were observed in overexpression of dsc2 both in H23 and PC9 cell lines. In addition to lung adenocarcinoma cell lines, we also examined its expression in lung squamous cell lines, such as H226. Western blotting showed that dsc2 could reduce the level of phosphorylated Akt (Ser 473) and p-mTOR. Thus, it is speculated that dsc2 up-regulation promotes proliferation and invasiveness through activation of the PI3K/AKT pathway. Also, knockdown of dsc2 in A549 and H226 could significantly decreased in the levels of cyclinB and wee1 protein. Additionally, flow cytometry showed that dsc2 knockdown combined with cisplatin could significantly enhance cell apoptosis rate. Conclusion: These data suggest that dsc2 promotes the proliferation and migration of lung cancer cells in vitro. Also, the results suggested that dsc2 could affect the cell cycle and apoptosis of lung cells. Furthermore, knockdown of dsc2 could sensitize cisplatin in both lung adenocarcinoma and lung squamous cell lines. Thus we suggested that dsc2 can be used as a therapeutic target for lung cancer.

Keywords: desmocollin 2, cisplatin, lung cancer, PI3K/AKT, lung squamous cell

Procedia PDF Downloads 67
580 Herbal Medicinal Materials for Health/Functional Foods in Korea

Authors: Chang-Hwan Oh, Young-Jong Lee

Abstract:

In April, 2015, the Ministry of Food and Drug Safety’s announcement that only 10 of the 207 products that list Cynanchum Wilfordii Radix among their ingredients were confirmed to actually contain “iyeobupiso” the counterfeit version of the “baeksuo” raised a fog to consumers who purchased health/functional foods supposedly containing the herbal medicinal material, “baeksuo” in Korean. Baeksuo is the main ingredient of the product “EstroG-100” that contain Phlomis umbrosa and Angelica gigas too (NaturalEndoTech, S.Korea). The hot water extract of the herbal medicinal materials (HMM) was approved as a product specific Health/Functional Food (HFF) having a helpful function to women reaching menopause by Korea Food & Drug Administration (Ministry of Food & Drug Safety at present). The origin of “baeksuo” is the root of Cynanchum wilfordii Hemsley in Korea (But “iyeobupiso, the root of Cynanchum auriculatum Royle ex Wight is considered as the origin of “baeksuo” in China). In Korea, about 116 HMMs are listed as the food materials in Korea Food Code among the total 187 HMMs could be used for food and medicine purpose simultaneously. But there are some chances of the HMMs (shared use for food and medicine purpose) could be misused by the part and HMMs not permitted for HFF such as the “baeksuo” case. In this study, some of HMMs (shared use for food and medicine purpose) are examined to alleviate the misuse chance of HMMs for HFFs in Korea. For the purpose of this study, the origin, shape, edible parts, efficacy and the side effects of the similar HMMs to be misused for HFF are investigated.

Keywords: herbal medicinal materials, healthy/functional foods, misuse, shared use

Procedia PDF Downloads 280
579 Pre and Post IFRS Loss Avoidance in France and the United Kingdom

Authors: T. Miková

Abstract:

This paper analyzes the effect of a single uniform accounting rule on reporting quality by investigating the influence of IFRS on earnings management. This paper examines whether earnings management is reduced after IFRS adoption through the use of “loss avoidance thresholds”, a method that has been verified in earlier studies. This paper concentrates on two European countries: one that represents the continental code law tradition with weak protection of investors (France) and one that represents the Anglo-American common law tradition, which typically implies a strong enforcement system (the United Kingdom). The research investigates a sample of 526 companies (6822 firm-year observations) during the years 2000 – 2013. The results are different for the two jurisdictions. This study demonstrates that a single set of accounting standards contributes to better reporting quality and reduces the pervasiveness of earnings management in France. In contrast, there is no evidence that a reduction in earnings management followed the implementation of IFRS in the United Kingdom. Due to the fact that IFRS benefit France but not the United Kingdom, other political and economic factors, such legal system or capital market strength, must play a significant role in influencing the comparability and transparency cross-border companies’ financial statements. Overall, the result suggests that IFRS moderately contribute to the accounting quality of reported financial statements and bring benefit for stakeholders, though the role played by other economic factors cannot be discounted.

Keywords: accounting standards, earnings management, international financial reporting standards, loss avoidance, reporting quality

Procedia PDF Downloads 189
578 Application of Finite Volume Method for Numerical Simulation of Contaminant Transfer in a Two-Dimensional Reservoir

Authors: Atousa Ataieyan, Salvador A. Gomez-Lopera, Gennaro Sepede

Abstract:

Today, due to the growing urban population and consequently, the increasing water demand in cities, the amount of contaminants entering the water resources is increasing. This can impose harmful effects on the quality of the downstream water. Therefore, predicting the concentration of discharged pollutants at different times and distances of the interested area is of high importance in order to carry out preventative and controlling measures, as well as to avoid consuming the contaminated water. In this paper, the concentration distribution of an injected conservative pollutant in a square reservoir containing four symmetric blocks and three sources using Finite Volume Method (FVM) is simulated. For this purpose, after estimating the flow velocity, classical Advection-Diffusion Equation (ADE) has been discretized over the studying domain by Backward Time- Backward Space (BTBS) scheme. Then, the discretized equations for each node have been derived according to the initial condition, boundary conditions and point contaminant sources. Finally, taking into account the appropriate time step and space step, a computational code was set up in MATLAB. Contaminant concentration was then obtained at different times and distances. Simulation results show how using BTBS differentiating scheme and FVM as a numerical method for solving the partial differential equation of transport is an appropriate approach in the case of two-dimensional contaminant transfer in an advective-diffusive flow.

Keywords: BTBS differentiating scheme, contaminant concentration, finite volume, mass transfer, water pollution

Procedia PDF Downloads 125
577 Traditional Correspondence as Reminiscence Therapy for the Elderly

Authors: Paulina Pergoł, Paulina Pergoł, Tomasz Kryczka

Abstract:

Aging of societies is a phenomenon that is visible all over the world. The above has social, economic, and medical consequences. Many methods of pro-health stimulation of the elderly, improving cognitive functions and quality of life, are described in the world literature. The most frequently used method of activating the elderly is physical activity, in which, in addition to standard exercise programs, activities such as dance, tai chi, and yoga are often introduced. The introduction of physical activity may be limited due to the disability that often accompanies people aged 65+. Other activating methods mentioned in the literature are therapies with the participation of animals - animal therapy or plant therapy - hortitherapy, as well as music therapy, which is increasingly popular. All of the above-mentioned therapeutic methods require the involvement of a person who would conduct the so-called occupational therapist, which can be a financial barrier for many nursing homes. Researchers all over the world are trying to find solutions that can be applied in any care institution, even in those where financial support for running such centers is small. One of the forms of therapy that is recommended in the group of elderly people and which does not require large financial outlays is the so-called reminiscence therapy based on recalling personal experiences and experiences. Thanks to reminiscence therapy, seniors can return to happy moments in their lives. Research shows that reminiscence therapy increases self-esteem and reduces symptoms of depression. The method of activating older people with the use of correspondence can be an effective and low-cost form of therapy, as shown by the pilot study conducted in 2019 as part of the Queen Silvia Nursing Award competition, consisting in a systematic exchange of correspondence between volunteers and residents of the Nursing Home. This study was conducted with the participation of a small group of participants, therefore, in order to identify and prove the beneficial effect of this form of activation, it should be carried out on a larger group of respondents using standardized scales assessing various psychological parameters.

Keywords: nursing, elderly care, psychiatry, psychology

Procedia PDF Downloads 93
576 The DAQ Debugger for iFDAQ of the COMPASS Experiment

Authors: Y. Bai, M. Bodlak, V. Frolov, S. Huber, V. Jary, I. Konorov, D. Levit, J. Novy, D. Steffen, O. Subrt, M. Virius

Abstract:

In general, state-of-the-art Data Acquisition Systems (DAQ) in high energy physics experiments must satisfy high requirements in terms of reliability, efficiency and data rate capability. This paper presents the development and deployment of a debugging tool named DAQ Debugger for the intelligent, FPGA-based Data Acquisition System (iFDAQ) of the COMPASS experiment at CERN. Utilizing a hardware event builder, the iFDAQ is designed to be able to readout data at the average maximum rate of 1.5 GB/s of the experiment. In complex softwares, such as the iFDAQ, having thousands of lines of code, the debugging process is absolutely essential to reveal all software issues. Unfortunately, conventional debugging of the iFDAQ is not possible during the real data taking. The DAQ Debugger is a tool for identifying a problem, isolating the source of the problem, and then either correcting the problem or determining a way to work around it. It provides the layer for an easy integration to any process and has no impact on the process performance. Based on handling of system signals, the DAQ Debugger represents an alternative to conventional debuggers provided by most integrated development environments. Whenever problem occurs, it generates reports containing all necessary information important for a deeper investigation and analysis. The DAQ Debugger was fully incorporated to all processes in the iFDAQ during the run 2016. It helped to reveal remaining software issues and improved significantly the stability of the system in comparison with the previous run. In the paper, we present the DAQ Debugger from several insights and discuss it in a detailed way.

Keywords: DAQ Debugger, data acquisition system, FPGA, system signals, Qt framework

Procedia PDF Downloads 271
575 Large Eddy Simulation with Energy-Conserving Schemes: Understanding Wind Farm Aerodynamics

Authors: Dhruv Mehta, Alexander van Zuijlen, Hester Bijl

Abstract:

Large Eddy Simulation (LES) numerically resolves the large energy-containing eddies of a turbulent flow, while modelling the small dissipative eddies. On a wind farm, these large scales carry the energy wind turbines extracts and are also responsible for transporting the turbines’ wakes, which may interact with downstream turbines and certainly with the atmospheric boundary layer (ABL). In this situation, it is important to conserve the energy that these wake’s carry and which could be altered artificially through numerical dissipation brought about by the schemes used for the spatial discretisation and temporal integration. Numerical dissipation has been reported to cause the premature recovery of turbine wakes, leading to an over prediction in the power produced by wind farms.An energy-conserving scheme is free from numerical dissipation and ensures that the energy of the wakes is increased or decreased only by the action of molecular viscosity or the action of wind turbines (body forces). The aim is to create an LES package with energy-conserving schemes to simulate wind turbine wakes correctly to gain insight into power-production, wake meandering etc. Such knowledge will be useful in designing more efficient wind farms with minimal wake interaction, which if unchecked could lead to major losses in energy production per unit area of the wind farm. For their research, the authors intend to use the Energy-Conserving Navier-Stokes code developed by the Energy Research Centre of the Netherlands.

Keywords: energy-conserving schemes, modelling turbulence, Large Eddy Simulation, atmospheric boundary layer

Procedia PDF Downloads 456
574 Environmental Effect on Corrosion Fatigue Behaviors of Steam Generator Forging in Simulated Pressurized Water Reactor Environment

Authors: Yakui Bai, Chen Sun, Ke Wang

Abstract:

An experimental investigation of environmental effect on fatigue behavior in SA508 Gr.3 Cl.2 Steam Generator Forging CAP1400 nuclear power plant has been carried out. In order to simulate actual loading condition, a range of strain amplitude was applied in different low cycle fatigue (LCF) tests. The current American Society of Mechanical Engineers (ASME) design fatigue code does not take full account of the interactions of environmental, loading, and material's factors. A range of strain amplitude was applied in different low cycle fatigue (LCF) tests at a strain rate of 0.01%s⁻¹. A design fatigue model was constructed by taking environmentally assisted fatigue effects into account, and the corresponding design curves were given for the convenience of engineering applications. The corrosion fatigue experiment was performed in a strain control mode in 320℃ borated and lithiated water environment to evaluate the effects of a mixed environment on fatigue life. Stress corrosion cracking (SCC) in steam generator large forging in primary water of pressurized water reactor was also observed. In addition, it is found that the CF life of SA508 Gr.3 Cl.2 decreases with increasing temperature in the water environment. The relationship between the reciprocal of temperature and the logarithm of fatigue life was found to be linear. Through experiments and subsequent analysis, the mechanisms of reduced low cycle fatigue life have been investigated for steam generator forging.

Keywords: failure behavior, low alloy steel, steam generator forging, stress corrosion cracking

Procedia PDF Downloads 109
573 A Three-Dimensional (3D) Numerical Study of Roofs Shape Impact on Air Quality in Urban Street Canyons with Tree Planting

Authors: Bouabdellah Abed, Mohamed Bouzit, Lakhdar Bouarbi

Abstract:

The objective of this study is to investigate numerically the effect of roof shaped on wind flow and pollutant dispersion in a street canyon with one row of trees of pore volume, Pvol = 96%. A three-dimensional computational fluid dynamics (CFD) model for evaluating air flow and pollutant dispersion within an urban street canyon using Reynolds-averaged Navier–Stokes (RANS) equations and the k-Epsilon EARSM turbulence model as close of the equation system. The numerical model is performed with ANSYS-CFX code. Vehicle emissions were simulated as double line sources along the street. The numerical model was validated against the wind tunnel experiment. Having established this, the wind flow and pollutant dispersion in urban street canyons of six roof shapes are simulated. The numerical simulation agrees reasonably with the wind tunnel data. The results obtained in this work, indicate that the flow in 3D domain is more complicated, this complexity is increased with presence of tree and variability of the roof shapes. The results also indicated that the largest pollutant concentration level for two walls (leeward and windward wall) is observed with the upwind wedge-shaped roof. But the smallest pollutant concentration level is observed with the dome roof-shaped. The results also indicated that the corners eddies provide additional ventilation and lead to lower traffic pollutant concentrations at the street canyon ends.

Keywords: street canyon, pollutant dispersion, trees, building configuration, numerical simulation, k-Epsilon EARSM

Procedia PDF Downloads 346
572 Parameter Identification Analysis in the Design of Rock Fill Dams

Authors: G. Shahzadi, A. Soulaimani

Abstract:

This research work aims to identify the physical parameters of the constitutive soil model in the design of a rockfill dam by inverse analysis. The best parameters of the constitutive soil model, are those that minimize the objective function, defined as the difference between the measured and numerical results. The Finite Element code (Plaxis) has been utilized for numerical simulation. Polynomial and neural network-based response surfaces have been generated to analyze the relationship between soil parameters and displacements. The performance of surrogate models has been analyzed and compared by evaluating the root mean square error. A comparative study has been done based on objective functions and optimization techniques. Objective functions are categorized by considering measured data with and without uncertainty in instruments, defined by the least square method, which estimates the norm between the predicted displacements and the measured values. Hydro Quebec provided data sets for the measured values of the Romaine-2 dam. Stochastic optimization, an approach that can overcome local minima, and solve non-convex and non-differentiable problems with ease, is used to obtain an optimum value. Genetic Algorithm (GA), Particle Swarm Optimization (PSO) and Differential Evolution (DE) are compared for the minimization problem, although all these techniques take time to converge to an optimum value; however, PSO provided the better convergence and best soil parameters. Overall, parameter identification analysis could be effectively used for the rockfill dam application and has the potential to become a valuable tool for geotechnical engineers for assessing dam performance and dam safety.

Keywords: Rockfill dam, parameter identification, stochastic analysis, regression, PLAXIS

Procedia PDF Downloads 133
571 Behavior of the RC Slab Subjected to Impact Loading According to the DIF

Authors: Yong Jae Yu, Jae-Yeol Cho

Abstract:

In the design of structural concrete for impact loading, design or model codes often employ a dynamic increase factor (DIF) to impose dynamic effect on static response. Dynamic increase factors that are obtained from laboratory material test results and that are commonly given as a function of strain rate only are quite different from each other depending on the design concept of design codes like ACI 349M-06, fib Model Code 2010 and ACI 370R-14. Because the dynamic increase factors currently adopted in the codes are too simple and limited to consider a variety of strength of materials, their application in practical design is questionable. In this study, the dynamic increase factors used in the three codes were validated through the finite element analysis of reinforced concrete slab elements which were tested and reported by other researcher. The test was intended to simulate a wall element of the containment building in nuclear power plants that is assumed to be subject to impact scenario that the Pentagon experienced on September 11, 2001. The finite element analysis was performed using the ABAQAUS 6.10 and the plasticity models were employed for the concrete, reinforcement. The dynamic increase factors given in the three codes were applied to the stress-strain curves of the materials. To estimate the dynamic increase factors, strain rate was adopted as a parameter. Comparison of the test and analysis was done with regard to perforation depth, maximum deflection, and surface crack area of the slab. Consequently, it was found that DIF has so great an effect on the behavior of the reinforced concrete structures that selection of DIF should be very careful. The result implies that DIF should be provided in design codes in more delicate format considering various influence factors.

Keywords: impact, strain rate, DIF, slab elements

Procedia PDF Downloads 284
570 The Molecular Analysis of Effect of Phytohormones and Spermidine on Tomato Growth under Biotic Stress

Authors: Rumana Keyani, Haleema Sadia, Asia Nosheen, Rabia Naz, Humaira Yasmin, Sidra Zahoor

Abstract:

Tomato is a significant crop of the world and is one of the staple foods of Pakistan. A vast number of plant pathogens from simple viruses to complex parasites cause diseases in tomatoes but fungal infection in our country is quite high. Sometimes the symptoms are too harsh destroying the crop altogether. Countries like our own with continuously increasing massive population and limited resources cannot afford such an economic loss. There is an array of morphological, genetic, biochemical and molecular processes involved in plant resistance mechanisms to biotic stress. The study of different metabolic pathways like Jasmonic acid (JA) pathways and most importantly signaling molecules like ROS/RNS and their redoxin enzymes i.e. TRX and NRX is crucial to disease management, contributing to healthy plant growth. So, improving tolerance in crop plants against biotic stresses is a dire need of our country and world as whole. In the current study, fungal pathogenic strains Alternaria solani and Rhizoctonia solani were used to inoculate tomatoes to check the defense responses of tomato plant against these pathogens at molecular as well as phenotypic level with jasmonic acid and spermidine pretreatment. All the growth parameters (root and shoot length, dry and weight root, shoot weight measured 7 days post-inoculation, exhibited that infection drastically declined the growth of the plant whereas jasmonic acid and spermidine assisted the plants to cope up with the infection. Thus, JA and Spermidine treatments maintained comparatively better growth factors. Antioxidant assays and expression analysis through real time quantitative PCR following time course experiment at 24, 48 and 72 hours intervals also exhibited that activation of JA defense genes and a polyamine Spermidine helps in mediating tomato responses against fungal infection when used alone but the two treatments combined mask the effect of each other.

Keywords: fungal infection, jasmonic acid defence, tomato, spermidine

Procedia PDF Downloads 111
569 A Three Elements Vector Valued Structure’s Ultimate Strength-Strong Motion-Intensity Measure

Authors: A. Nicknam, N. Eftekhari, A. Mazarei, M. Ganjvar

Abstract:

This article presents an alternative collapse capacity intensity measure in the three elements form which is influenced by the spectral ordinates at periods longer than that of the first mode period at near and far source sites. A parameter, denoted by β, is defined by which the spectral ordinate effects, up to the effective period (2T_1), on the intensity measure are taken into account. The methodology permits to meet the hazard-levelled target extreme event in the probabilistic and deterministic forms. A MATLAB code is developed involving OpenSees to calculate the collapse capacities of the 8 archetype RC structures having 2 to 20 stories for regression process. The incremental dynamic analysis (IDA) method is used to calculate the structure’s collapse values accounting for the element stiffness and strength deterioration. The general near field set presented by FEMA is used in a series of performing nonlinear analyses. 8 linear relationships are developed for the 8structutres leading to the correlation coefficient up to 0.93. A collapse capacity near field prediction equation is developed taking into account the results of regression processes obtained from the 8 structures. The proposed prediction equation is validated against a set of actual near field records leading to a good agreement. Implementation of the proposed equation to the four archetype RC structures demonstrated different collapse capacities at near field site compared to those of FEMA. The reasons of differences are believed to be due to accounting for the spectral shape effects.

Keywords: collapse capacity, fragility analysis, spectral shape effects, IDA method

Procedia PDF Downloads 222
568 Modeling Sediment Transports under Extreme Storm Situation along Persian Gulf North Coast

Authors: Majid Samiee Zenoozian

Abstract:

The Persian Gulf is a bordering sea with an normal depth of 35 m and a supreme depth of 100 m near its narrow appearance. Its lengthen bathymetric axis divorces two main geological shires — the steady Arabian Foreland and the unbalanced Iranian Fold Belt — which are imitated in the conflicting shore and bathymetric morphologies of Arabia and Iran. The sediments were experimented with from 72 offshore positions through an oceanographic cruise in the winter of 2018. Throughout the observation era, several storms and river discharge actions happened, as well as the major flood on record since 1982. Suspended-sediment focus at all three sites varied in reaction to both wave resuspension and advection of river-derived sediments. We used hydrological models to evaluation and associate the wave height and inundation distance required to carriage the rocks inland. Our results establish that no known or possible storm happening on the Makran coast is accomplished of detaching and transporting the boulders. The fluid mud consequently is conveyed seaward due to gravitational forcing. The measured sediment focus and velocity profiles on the shelf provide a strong indication to provision this assumption. The sediment model is joined with a 3D hydrodynamic module in the Environmental Fluid Dynamics Code (EFDC) model that offers data on estuarine rotation and salinity transport under normal temperature conditions. 3-D sediment transport from model simulations specify dynamic sediment resuspension and transport near zones of highly industrious oyster beds.

Keywords: sediment transport, storm, coast, fluid dynamics

Procedia PDF Downloads 100
567 Conceptualizing Psycho-Social Intervention with Juvenile Offenders as Attachment Therapy: A Practical Approach

Authors: Genziana Lay

Abstract:

A wide majority of older children and adolescents who enter the juvenile court system present with an array of problematic symptoms and behaviors including anxiety, depression, aggressive acting out, detachment, and substance abuse. Attachment theory offers a framework for understanding normative and pathological functioning, which during development is influenced by emotional, social and cognitive elements. There is clear evidence that children and adolescents with the highest risk of developing adaptation problems present an insecure attachment profile. Most offending minors have experienced dysfunctional family relationships as well as social and/or economic deprivation. Their maladaptive attachment develops not only through their relationship with caregivers but with the environment at large. Activation of their faulty attachment system leads them to feel emotionally overwhelmed and engage in destructive behaviors and decision-making. A psycho-social intervention with this population conceptualized as attachment therapy is a multi-faceted, practical approach that has shown excellent results in terms of increased psychological well-being and drastically reduced rates of re-offense/ destructive behavior. Through several; components including psychotherapy, monitoring, volunteering, meditation and socialization, the program focuses on seven dimensions: self-efficacy, responsibility, empathy/reparation, autonomy/security, containment/structure, insight building, and relational health. This paper presents the program and illustrates how the framework of attachment theory practically applied to psycho-social intervention has great therapeutic and social reparation potential. Preliminary evidence drawn from the Sassari Juvenile Court is very promising; this paper will illustrate these results and propose an even more comprehensive, applicable approach to psycho-social reparative intervention that leads to greater psychological health and reduced recidivism in the child and adolescent population.

Keywords: attachment, child, adolescent, crime, juvenile, psychosocial

Procedia PDF Downloads 165
566 Preparation and Characterization of Biosorbent from Cactus (Opuntia ficus-indica) cladodes and its Application for Dye Removal from Aqueous Solution

Authors: Manisha Choudhary, Sudarsan Neogi

Abstract:

Malachite green (MG), an organic basic dye, has been widely used for the dyeing purpose, as well as a fungicide and antiseptic in aquaculture industry to control fish parasites and disease. However, MG has now turned out to be an extremely controversial compound due to its adverse impact on living beings. Due to high toxicity, proper treatment of wastewater containing MG is utmost important. Among different available technologies, adsorption process is one of the most efficient and cost-effective treatment method due to its simplicity of design, ease of operation and regeneration of used materials. Nonetheless, commercial activated carbon is expensive leading the researchers to focus on utilizing natural resources. In the present work, a species of cactus, Opuntia ficus-indica (OFI), was used to develop a highly efficient, low-cost powdered activated carbon by chemical activation using NaOH. The biosorbent was characterized by Fourier-transform infrared spectroscopy, field emission scanning electron microscope, energy-dispersive X-ray spectroscopy, Brunauer–Emmett–Teller (BET) and X-ray diffraction analysis. Batch adsorption studies were performed to remove MG from an aqueous solution as a function of contact time, initial solution pH, initial dye concentration, biosorbent dosages, the presence of salt and temperature. By increasing the initial dye concentration from 100 to 500 mg/l, adsorption capacity increased from 165.45 to 831.58 mg/g. The adsorption kinetics followed the pseudo-second-order model and the chemisorption mechanisms were revealed. The electrostatic attractions and chemical interactions were observed between amino and hydroxyl groups of the biosorbent and amine groups of the dye. The adsorption was solely controlled by film diffusion. Different isotherm models were used to fit the adsorption data. The excellent recovery of adsorption efficiency after the regeneration of biosorbent indicated the high potential of this adsorbent to remove MG from aqueous solution and an excellent cost-effective biosorbent for wide application in wastewater treatment.

Keywords: adsorption, biosorbent, cactus, malachite green

Procedia PDF Downloads 356
565 Large Eddy Simulation of Hydrogen Deflagration in Open Space and Vented Enclosure

Authors: T. Nozu, K. Hibi, T. Nishiie

Abstract:

This paper discusses the applicability of the numerical model for a damage prediction method of the accidental hydrogen explosion occurring in a hydrogen facility. The numerical model was based on an unstructured finite volume method (FVM) code “NuFD/FrontFlowRed”. For simulating unsteady turbulent combustion of leaked hydrogen gas, a combination of Large Eddy Simulation (LES) and a combustion model were used. The combustion model was based on a two scalar flamelet approach, where a G-equation model and a conserved scalar model expressed a propagation of premixed flame surface and a diffusion combustion process, respectively. For validation of this numerical model, we have simulated the previous two types of hydrogen explosion tests. One is open-space explosion test, and the source was a prismatic 5.27 m3 volume with 30% of hydrogen-air mixture. A reinforced concrete wall was set 4 m away from the front surface of the source. The source was ignited at the bottom center by a spark. The other is vented enclosure explosion test, and the chamber was 4.6 m × 4.6 m × 3.0 m with a vent opening on one side. Vent area of 5.4 m2 was used. Test was performed with ignition at the center of the wall opposite the vent. Hydrogen-air mixtures with hydrogen concentrations close to 18% vol. were used in the tests. The results from the numerical simulations are compared with the previous experimental data for the accuracy of the numerical model, and we have verified that the simulated overpressures and flame time-of-arrival data were in good agreement with the results of the previous two explosion tests.

Keywords: deflagration, large eddy simulation, turbulent combustion, vented enclosure

Procedia PDF Downloads 233
564 Symmetric Key Encryption Algorithm Using Indian Traditional Musical Scale for Information Security

Authors: Aishwarya Talapuru, Sri Silpa Padmanabhuni, B. Jyoshna

Abstract:

Cryptography helps in preventing threats to information security by providing various algorithms. This study introduces a new symmetric key encryption algorithm for information security which is linked with the "raagas" which means Indian traditional scale and pattern of music notes. This algorithm takes the plain text as input and starts its encryption process. The algorithm then randomly selects a raaga from the list of raagas that is assumed to be present with both sender and the receiver. The plain text is associated with the thus selected raaga and an intermediate cipher-text is formed as the algorithm converts the plain text characters into other characters, depending upon the rules of the algorithm. This intermediate code or cipher text is arranged in various patterns in three different rounds of encryption performed. The total number of rounds in the algorithm is equal to the multiples of 3. To be more specific, the outcome or output of the sequence of first three rounds is again passed as the input to this sequence of rounds recursively, till the total number of rounds of encryption is performed. The raaga selected by the algorithm and the number of rounds performed will be specified at an arbitrary location in the key, in addition to important information regarding the rounds of encryption, embedded in the key which is known by the sender and interpreted only by the receiver, thereby making the algorithm hack proof. The key can be constructed of any number of bits without any restriction to the size. A software application is also developed to demonstrate this process of encryption, which dynamically takes the plain text as input and readily generates the cipher text as output. Therefore, this algorithm stands as one of the strongest tools for information security.

Keywords: cipher text, cryptography, plaintext, raaga

Procedia PDF Downloads 274
563 Hepatocyte-Intrinsic NF-κB Signaling Is Essential to Control a Systemic Viral Infection

Authors: Sukumar Namineni, Tracy O'Connor, Ulrich Kalinke, Percy Knolle, Mathias Heikenwaelder

Abstract:

The liver is one of the pivotal organs in vertebrate animals, serving a multitude of functions such as metabolism, detoxification and protein synthesis and including a predominant role in innate immunity. The innate immune mechanisms pertaining to liver in controlling viral infections have largely been attributed to the Kupffer cells, the locally resident macrophages. However, all the cells of liver are equipped with innate immune functions including, in particular, the hepatocytes. Hence, our aim in this study was to elucidate the innate immune contribution of hepatocytes in viral clearance using mice lacking Ikkβ specifically in the hepatocytes, termed IkkβΔᴴᵉᵖ mice. Blockade of Ikkβ activation in IkkβΔᴴᵉᵖ mice affects the downstream signaling of canonical NF-κB signaling by preventing the nuclear translocation of NF-κB, an important step required for the initiation of innate immune responses. Interestingly, infection of IkkβΔᴴᵉᵖ mice with lymphocytic choriomeningitis virus (LCMV) led to strongly increased hepatic viral titers – mainly confined in clusters of infected hepatocytes. This was due to reduced interferon stimulated gene (ISG) expression during the onset of infection and a reduced CD8+ T-cell-mediated response. Decreased ISG production correlated with increased liver LCMV protein and LCMV in isolated hepatocytes from IkkβΔᴴᵉᵖ mice. A similar phenotype was found in LCMV-infected mice lacking interferon signaling in hepatocytes (IFNARΔᴴᵉᵖ) suggesting a link between NFkB and interferon signaling in hepatocytes. We also observed a failure of interferon-mediated inhibition of HBV replication in HepaRG cells treated with NF-kB inhibitors corroborating our initial findings with LCMV infections. Collectively, these results clearly highlight a previously unknown and influential role of hepatocytes in the induction of innate immune responses leading to viral clearance during a systemic viral infection with LCMV-WE.

Keywords: CD8+ T cell responses, innate immune mechanisms in the liver, interferon signaling, interferon stimulated genes, NF-kB signaling, viral clearance

Procedia PDF Downloads 180
562 Study of the Influence of Refractory Nitride Additives on Hydrogen Storage Properties of Ti6Al4V-Based Materials Produced by Spark Plasma Sintering

Authors: John Olorunfemi Abe, Olawale Muhammed Popoola, Abimbola Patricia Idowu Popoola

Abstract:

Hydrogen is an appealing alternative to fossil fuels because of its abundance, low weight, high energy density, and relative lack of contaminants. However, its low density presents a number of storage challenges. Therefore, this work studies the influence of refractory nitride additives consisting of 5 wt. % each of hexagonal boron nitride (h-BN), titanium nitride (TiN), and aluminum nitride (AlN) on hydrogen storage and electrochemical characteristics of Ti6Al4V-based materials produced by spark plasma sintering. The microstructure and phase constituents of the sintered materials were characterized using scanning electron microscopy (in conjunction with energy-dispersive spectroscopy) and X-ray diffraction, respectively. Pressure-composition-temperature (PCT) measurements were used to assess the hydrogen absorption/desorption behavior, kinetics, and storage capacities of the sintered materials, respectively. The pure Ti6Al4V alloy displayed a two-phase (α+β) microstructure, while the modified composites exhibited apparent microstructural modifications with the appearance of nitride-rich secondary phases. It is found that the diffusion process controls the kinetics of the hydrogen absorption. Thus, a faster rate of hydrogen absorption at elevated temperatures ensued. The additives acted as catalysts, lowered the activation energy and accelerated the rate of hydrogen sorption in the composites relative to the monolithic alloy. Ti6Al4V-5 wt. % h-BN appears to be the most promising candidate for hydrogen storage (2.28 wt. %), followed by Ti6Al4V-5 wt. % TiN (2.09 wt. %), whereas Ti6Al4V-5 wt. % AlN shows the least hydrogen storage performance (1.35 wt. %). Accordingly, the developed hydride system (Ti6Al4V-5h-BN) may be competitive for use in applications involving short-range continuous vehicles (~50-100km) as well as stationary applications such as electrochemical devices, large-scale storage cylinders in hydrogen production locations, and hydrogen filling stations.

Keywords: hydrogen storage, Ti6Al4V hydride system, pressure-composition-temperature measurements, refractory nitride additives, spark plasma sintering, Ti6Al4V-based materials

Procedia PDF Downloads 46
561 A Mixed 3D Finite Element for Highly Deformable Thermoviscoplastic Materials Under Ductile Damage

Authors: João Paulo Pascon

Abstract:

In this work, a mixed 3D finite element formulation is proposed in order to analyze thermoviscoplastic materials under large strain levels and ductile damage. To this end, a tetrahedral element of linear order is employed, considering a thermoviscoplastic constitutive law together with the neo-Hookean hyperelastic relationship and a nonlocal Gurson`s porous plasticity theory The material model is capable of reproducing finite deformations, elastoplastic behavior, void growth, nucleation and coalescence, thermal effects such as plastic work heating and conductivity, strain hardening and strain-rate dependence. The nonlocal character is introduced by means of a nonlocal parameter applied to the Laplacian of the porosity field. The element degrees of freedom are the nodal values of the deformed position, the temperature and the nonlocal porosity field. The internal variables are updated at the Gauss points according to the yield criterion and the evolution laws, including the yield stress of matrix, the equivalent plastic strain, the local porosity and the plastic components of the Cauchy-Green stretch tensor. Two problems involving 3D specimens and ductile damage are numerically analyzed with the developed computational code: the necking problem and a notched sample. The effect of the nonlocal parameter and the mesh refinement is investigated in detail. Results indicate the need of a proper nonlocal parameter. In addition, the numerical formulation can predict ductile fracture, based on the evolution of the fully damaged zone.

Keywords: mixed finite element, large strains, ductile damage, thermoviscoplasticity

Procedia PDF Downloads 73
560 Early Transcriptome Responses to Piscine orthoreovirus-1 in Atlantic salmon Erythrocytes Compared to Salmonid Kidney Cell Lines

Authors: Thomais Tsoulia, Arvind Y. M. Sundaram, Stine Braaen, Øyvind Haugland, Espen Rimstad, Øystein Wessel, Maria K. Dahle

Abstract:

Fish red blood cells (RBC) are nucleated, and in addition to their function in gas exchange, they have been characterized as mediators of immune responses. Salmonid RBC are the major target cells of Piscineorthoreovirus (PRV), a virus associated with heart and skeletal muscle inflammation (HSMI) in farmed Atlantic salmon. The activation of antiviral response genesin RBChas previously been described in ex vivo and in vivo PRV-infection models, but not explored in the initial virus encounter phase. In the present study, mRNA transcriptome responses were explored in erythrocytes from individual fish, kept ex vivo, and exposed to purified PRV for 24 hours. The responses were compared to responses in macrophage-like salmon head kidney (SHK-1) and endothelial-like Atlantic salmon kidney (ASK) cells, none of which support PRV replication. The comparative analysis showed that the antiviral response to PRV was strongest in the SHK-1 cells, with a set of 80 significantly induced genes (≥ 2-fold upregulation). In RBC, 46 genes were significantly upregulated, while ASK cells were not significantly responsive. In particular, the transcriptome analysis of RBC revealed that PRV significantly induced interferon regulatory factor 1 (IRF1) and interferon-induced protein with tetratricopeptide repeats 5-like (IFIT9). However, several interferon-regulated antiviral genes which have previously been reported upregulated in PRV infected RBC in vivo (myxovirus resistance (Mx), interferon-stimulated gene 15 (ISG15), toll-like receptor 3 (TLR3)), were not significantly induced after 24h of virus stimulation. In contrast to RBC, these antiviral response genes were significantly upregulated in SHK-1. These results confirm that RBC are involved in the innate immune response to viruses, but with a delayed antiviral response compared to SHK-1. A notable difference is that interferon regulatory factor 1 (IRF-1) is the most strongly induced gene in RBC, but not among the significantly induced genes in SHK-1. Putative differences in the binding, recognition, and response to PRV, and any link to effects on the ability of PRV to replicate remains to be explored.

Keywords: antiviral responses, atlantic salmon, piscine orthoreovirus-1, red blood cells, RNA-seq

Procedia PDF Downloads 177
559 Neuroprotective Effect of Vildagliptin against Cerebral Ischemia in Rats

Authors: Salma A. El-Marasy, Rehab F. Abdel-Rahman, Reham M. Abd-Elsalam

Abstract:

The burden of stroke is intensely increasing worldwide. Brain injury following transient or permanent focal cerebral ischemia develops ischemic stroke as a consequence of a complex series of pathophysiological events. The aim of this study is to evaluate the possible neuroprotective effect of a dipeptidyl peptidase-4 inhibitor, vildagliptin, independent on its insulinotropic properties in non-diabetic rats subjected to cerebral ischemia. Anaesthetized Wistar rats were subjected to either left middle cerebral artery occlusion (MCAO) or sham operation followed by reperfusion after 30 min of MCAO. The other three groups were orally administered vildagliptin at 3 dose levels (2.5, 5, 10 mg/kg) for 3 successive weeks before subjected to left focal cerebral ischemia/reperfusion and till the end of the study. Neurological deficit scores and motor activity were assessed 24h following reperfusion. 48h following reperfusion, rats were euthanized and their left brain hemispheres were harvested and used in the biochemical, histopathological, and immunohistochemical investigations. Vildagliptin pretreatment improved neurological score deficit, locomotor activity and motor coordination in MCAO rats. Moreover, vildagliptin reduced malondialdehyde (MDA), elevated reduced glutathione (GSH), phosphotylinosital 3 kinase (PI3K), phosphorylated of protein kinase B (p-AKT), and mechanistic target of rapamycin (mTOR) brain contents in addition to reducing protein expression of caspase-3. Also, vildagliptin showed a dose-dependent attenuation in neuronal cell loss and histopathological alterations in MCAO rats. This study proves that vildagliptin exerted the neuroprotective effect in a dose-dependent manner as shown in amelioration of neuronal cell loss and histopathological damage in MCAO rats, which may be mediated by attenuating neuronal and motor deficits, it’s anti-oxidant property, activation of PI3K/AKT/mTOR pathway and its anti-apoptotic effect.

Keywords: caspase-3, cerebral ischemia, dipeptidyl peptidase-4 inhibitor, oxidative stress, PI3K/AKT/mTOR pathway, rats, vildagliptin

Procedia PDF Downloads 144
558 Regulation of Apoptosis in Human Lung Cancer NCI-H226 Cells through Caspase – Dependent Mechanism by Benjakul Extract

Authors: Pintusorn Hansakul, Ruchilak Rattarom, Arunporn Itharat

Abstract:

Background: Benjakul, a Thai traditional herbal formulation, comprises of five plants: Piper chaba, Piper sarmentosum, Piper interruptum, Plumbago indica, and Zingiber officinale. It has been widely used to treat cancer patients in the context of folk medicine in Thailand. This study aimed to investigate the cytotoxic effect of the ethanol extract of Benjakul against three non-small cell lung cancer (NSCLC) cell lines (NCI-H226, A549, COR-L23), small cell lung cancer (SCLC) cell line NCI-H1688 and normal lung fibroblast cell line MRC-5. The study further examined the molecular mechanisms underlying its cytotoxicity via induction of apoptosis in NCI-H226 cells. Methods: The cytotoxic effect of Benjakul was determined by SRB assay. The effect of Benjakul on cell cycle distribution was assessed by flow cytometric analysis. The apoptotic effects of Benjakul were determined by sub-G1 quantitation and Annexin V-FITC/PI flow cytometric analyses as well as by changes in caspase-3 activity. Results: Benjakul exerted potent cytotoxicity on NCI-H226 and A549 cells but lower cytotoxicity on COR-L23 and NCI-H1688 cells without any cytotoxic effect on normal cells. Molecular studies showed that Benjakul extract induced G2/M phase arrest in human NCI-H226 cells in a dose-dependent manner. The highest concentration of Benjakul (150 μg/ml) led to the highest increase in the G2/M population at 12 h, followed by the highest increase in the sub-G1 population (apoptotic cells) at 60 h. Benjakul extract also induced early apoptosis (AnnexinV +/PI−) in NCI-H226 cells in a dose- and time- dependent manner. Moreover, treatment with 150 μg/ml Benjakul extract for 36 h markedly increased caspase-3 activity by 3.5-fold, and pretreatment with the general caspase inhibitor z-VAD-fmk completely abolished such activity. Conclusions: This study reveals for the first time the regulation of apoptosis in human lung cancer NCI-H226 cells through caspase-dependent mechanism by Benjakul extract.

Keywords: apoptosis, Benjakul, caspase activation, cytotoxicity

Procedia PDF Downloads 424