Search results for: dynamic host client protocol
6049 Universiti Sains Malaysia
Authors: Eisa A. Alsafran, Francis T. Edum-Fotwe, Wayne E. Lord
Abstract:
The degree to which a public client actively participates in Public Private Partnership (PPP) schemes, is seen as a determinant of the success of the arrangement, and in particular, efficiency in the delivery of the assets of any infrastructure development. The asset delivery is often an early barometer for judging the overall performance of the PPP. Currently, there are no defined descriptors for the degree of such participation. The lack of defined descriptors makes the association between the degree of participation and efficiency of asset delivery, difficult to establish. This is particularly so if an optimum effect is desired. In addition, such an association is important for the strategic decision to embark on any PPP initiative. This paper presents a conceptual model of different levels of participation that characterise PPP schemes. The modelling was achieved by a systematic review of reported sources that address essential aspects and structures of PPP schemes, published from 2001 to 2015. As a precursor to the modelling, the common areas of Public Client Participation (PCP) were investigated. Equity and risk emerged as two dominant factors in the common areas of PCP, and were therefore adopted to form the foundation of the modelling. The resultant conceptual model defines the different states of combined PCP. The defined states provide a more rational basis for establishing how the degree of PCP affects the efficiency of asset delivery in PPP schemes.Keywords: asset delivery, infrastructure development, public private partnership, public client participation
Procedia PDF Downloads 2656048 Client Importance and Audit Quality under Civil Law versus Common Law Societies
Authors: Kelly Grani Yuen
Abstract:
Accounting scandals and auditing frauds are perceived to be driven by aggressive companies and misrepresentation of audit reports. However, local legal systems and law enforcements may affect the services auditors provide to their ‘important’ clients. Under the civil law and common law jurisdictions, the standard setters, the government, and the regulatory bodies treat cases differently. As such, whether or not different forms of legal systems and extent of law enforcement plays an important role in auditor’s Audit Quality is a question this paper attempts to explore. The paper focuses on the investigation in Asia, where Hong Kong represents the common-law jurisdiction, while Taiwan and China represent the civil law jurisdiction. Only the ten reputable accounting firms are used in this study due to the differences in rankings and establishments of some of the small local audit firms. This will also contribute to the data collected between the years 2007-2013. By focusing on the use of multiple regression based on the dependent (Audit Quality) and independent variables (Client Importance, Law Enforcement, and Press Freedom), six different models are established. Results demonstrate that since different jurisdictions have different legal systems and market regulations, auditor’s treatment on ‘important’ clients will vary. However, with the moderators in place (law enforcement and press freedom), the relationship between client importance and audit quality may be smoothed out. With that in mind, this study contributes to local governments and standard setters’ consideration on legal reform and proper law enforcement in the market. Perhaps, with such modifications on the economic systems, collusion between companies and auditors can finally be put to a halt.Keywords: audit quality, client importance, jurisdiction, modified audit opinions
Procedia PDF Downloads 4106047 Dynamic of an Invasive Insect Gut Microbiome When Facing to Abiotic Stress
Authors: Judith Mogouong, Philippe Constant, Robert Lavallee, Claude Guertin
Abstract:
The emerald ash borer (EAB) is an exotic wood borer insect native from China, which is associated with important environmental and economic damages in North America. Beetles are known to be vectors of microbial communities related to their adaptive capacities. It is now established that environmental stress factors may induce physiological events on the host trees, such as phytochemical changes. Consequently, that may affect the establishment comportment of herbivorous insect. Considering the number of insects collected on ash trees (insects’ density) as an abiotic factor related to stress damage, the aim of our study was to explore the dynamic of EAB gut microbial community genome (microbiome) when facing that factor and to monitor its diversity. Insects were trapped using specific green Lindgren© traps. A gradient of the captured insect population along the St. Lawrence River was used to create three levels of insects’ density (low, intermediate, and high). After dissection, total DNA extracted from insect guts of each level has been sent for amplicon sequencing of bacterial 16S rRNA gene and fungal ITS2 region. The composition of microbial communities among sample appeared largely diversified with the Simpson index significantly different across the three levels of density for bacteria. Add to that; bacteria were represented by seven phyla and twelve classes, whereas fungi were represented by two phyla and seven known classes. Using principal coordinate analysis (PCoA) based on Bray Curtis distances of 16S rRNA sequences, we observed a significant variation between the structure of the bacterial communities depending on insects’ density. Moreover, the analysis showed significant correlations between some bacterial taxa and the three classes of insects’ density. This study is the first to present a complete overview of the bacterial and fungal communities associated with the gut of EAB base on culture-independent methods, and to correlate those communities with a potential stress factor of the host trees.Keywords: gut microbiome, DNA, 16S rRNA sequences, emerald ash borer
Procedia PDF Downloads 4036046 Impact Evaluation of Discriminant Analysis on Epidemic Protocol in Warships’s Scenarios
Authors: Davi Marinho de Araujo Falcão, Ronaldo Moreira Salles, Paulo Henrique Maranhão
Abstract:
Disruption Tolerant Networks (DTN) are an evolution of Mobile Adhoc Networks (MANET) and work good in scenarioswhere nodes are sparsely distributed, with low density, intermittent connections and an end-to-end infrastructure is not possible to guarantee. Therefore, DTNs are recommended for high latency applications that can last from hours to days. The maritime scenario has mobility characteristics that contribute to a DTN network approach, but the concern with data security is also a relevant aspect in such scenarios. Continuing the previous work, which evaluated the performance of some DTN protocols (Epidemic, Spray and Wait, and Direct Delivery) in three warship scenarios and proposed the application of discriminant analysis, as a classification technique for secure connections, in the Epidemic protocol, thus, the current article proposes a new analysis of the directional discriminant function with opening angles smaller than 90 degrees, demonstrating that the increase in directivity influences the selection of a greater number of secure connections by the directional discriminant Epidemic protocol.Keywords: DTN, discriminant function, epidemic protocol, security, tactical messages, warship scenario
Procedia PDF Downloads 1916045 An Enhanced AODV Routing Protocol for Wireless Sensor and Actuator Networks
Authors: Apidet Booranawong, Wiklom Teerapabkajorndet
Abstract:
An enhanced ad-hoc on-demand distance vector routing (E-AODV) protocol for control system applications in wireless sensor and actuator networks (WSANs) is proposed. Our routing algorithm is designed by considering both wireless network communication and the control system aspects. Control system error and network delay are the main selection criteria in our routing protocol. The control and communication performance is evaluated on multi-hop IEEE 802.15.4 networks for building-temperature control systems. The Gilbert-Elliott error model is employed to simulate packet loss in wireless networks. The simulation results demonstrate that the E-AODV routing approach can significantly improve the communication performance better than an original AODV routing under various packet loss rates. However, the control performance result by our approach is not much improved compared with the AODV routing solution.Keywords: WSANs, building temperature control, AODV routing protocol, control system error, settling time, delay, delivery ratio
Procedia PDF Downloads 3396044 An Efficient Mitigation Plan to Encounter Various Vulnerabilities in Internet of Things Enterprises
Authors: Umesh Kumar Singh, Abhishek Raghuvanshi, Suyash Kumar Singh
Abstract:
As IoT networks gain popularity, they are more susceptible to security breaches. As a result, it is crucial to analyze the IoT platform as a whole from the standpoint of core security concepts. The Internet of Things relies heavily on wireless networks, which are well-known for being susceptible to a wide variety of attacks. This article provides an analysis of many techniques that may be used to identify vulnerabilities in the software and hardware associated with the Internet of Things (IoT). In the current investigation, an experimental setup is built with the assistance of server computers, client PCs, Internet of Things development boards, sensors, and cloud subscriptions. Through the use of network host scanning methods and vulnerability scanning tools, raw data relating to IoT-based applications and devices may be collected. Shodan is a tool that is used for scanning, and it is also used for effective vulnerability discovery in IoT devices as well as penetration testing. This article presents an efficient mitigation plan for encountering vulnerabilities in the Internet of Things.Keywords: internet of things, security, privacy, vulnerability identification, mitigation plan
Procedia PDF Downloads 406043 Molecular Characterization of Arginine Sensing Response in Unravelling Host-Pathogen Interactions in Leishmania
Authors: Evanka Madan, Madhu Puri, Dan Zilberstein, Rohini Muthuswami, Rentala Madhubala
Abstract:
The extensive interaction between the host and pathogen metabolic networks decidedly shapes the outcome of infection. Utilization of arginine by the host and pathogen is critical for determining the outcome of pathogenic infection. Infections with L. donovani, an intracellular parasite, will lead to an extensive competition of arginine between the host and the parasite donovani infection. One of the major amino acid (AA) sensing signaling pathways in mammalian cells are the mammalian target of rapamycin complex I (mTORC1) pathway. mTORC1, as a sensor of nutrient, controls numerous metabolic pathways. Arginine is critical for mTORC1 activation. SLC38A9 is the arginine sensor for the mTORC1, being activated during arginine sufficiency. L. donovani transport arginine via a high-affinity transporter (LdAAP3) that is rapidly up-regulated by arginine deficiency response (ADR) in intracellular amastigotes. This study, to author’s best knowledge, investigates the interaction between two arginine sensing systems that act in the same compartment, the lysosome. One is important for macrophage defense, and the other is essential for pathogen virulence. We hypothesize that the latter modulates lysosome arginine to prevent host defense response. The work presented here identifies an upstream regulatory role of LdAAP3 in regulating the expression of SLC38A9-mTORC1 pathway, and consequently, their function in L. donovani infected THP-1 cells cultured in 0.1 mM and 1.5 mM arginine. It was found that in physiological levels of arginine (0.1 mM), infecting THP-1 with Leishmania leads to increased levels of SLC38A9 and mTORC1 via an increase in the expression of RagA. However, the reversal was observed with LdAAP3 mutants, reflecting the positive regulatory role of LdAAP3 on the host SLC38A9. At the molecular level, upon infection, mTORC1 and RagA were found to be activated at the surface of phagolysosomes which was found to form a complex with phagolysosomal localized SLC38A9. To reveal the relevance of SLC38A9 under physiological levels of arginine, endogenous SLC38A9 was depleted and a substantial reduction in the expression of host mTORC1, its downstream active substrate, p-P70S6K1 and parasite LdAAP3, was observed, thereby showing that silencing SLC38A9 suppresses ADR. In brief, to author’s best knowledge, these results reveal an upstream regulatory role of LdAAP3 in manipulating SLC38A9 arginine sensing in host macrophages. Our study indicates that intra-macrophage survival of L. donovani depends on the availability and transport of extracellular arginine. An understanding of the sensing pathway of both parasite and host will open a new perspective on the molecular mechanism of host-parasite interaction and consequently, as a treatment for Leishmaniasis.Keywords: arginine sensing, LdAAP3, L. donovani, mTORC1, SLC38A9, THP-1
Procedia PDF Downloads 1246042 The Life Skills Project: Client-Centered Approaches to Life Skills Acquisition for Homeless and At-Risk Populations
Authors: Leah Burton, Sara Cumming, Julianne DiSanto
Abstract:
Homelessness is a widespread and complex problem in Canada and around the globe. Many Canadians will face homelessness at least once in their lifetime, with several experiencing subsequent bouts or cyclical patterns of housing precarity. While a Housing First approach to homelessness is a long-standing and widely accepted best practice, it is also recognized that the acquisition of life skills is an effective way to reduce cycles of homelessness. Indeed, when individuals are provided with a range of life skills—such as (but not limited to) financial literacy, household management, interpersonal skills, critical thinking, and resource management—they are given the tools required to maintain long-term Housing for a lifetime; thus reducing a repetitive need for services. However, there is limited research regarding the best ways to teach life skills, a problem that has been further complicated in a post-pandemic world, where services are being delivered online or in a hybrid model of care. More than this, it is difficult to provide life skills on a large scale without losing a client-centered approach to services. This lack of client-centeredness is also seen in the lack of attention to culturally sensitive life skills, which consider the diverse needs of individuals and imbed equity, diversity, and inclusion (EDI) within the skills being taught. This study aims to fill these identified gaps in the literature by employing a community-engaged (CER) approach. Academic, government, funders, front-line staff, and clients at 15 not-for-profits from across the Greater Toronto Area in Ontario, Canada, collaborated to co-create a virtual, client-centric, EDI-informed life skill learning management system. A triangulation methodology was utilized for this research. An environmental scan was conducted for current best practices, and over 100 front-line staff (including workers, managers, and executive directors who work with homeless populations) participated in two separate Creative Problem Solving Sessions. Over 200 individuals with experience in homelessness completed quantitative and open-ended surveys. All sections of this research aimed to discover the areas of skills that individuals need to maintain Housing and to ascertain what a more client-driven EDI approach to life skills training should include. This presentation will showcase the findings on which life skills are deemed essential for homeless and precariously housed individuals.Keywords: homelessness, housing first, life skills, community engaged research, client- centered
Procedia PDF Downloads 1016041 Potentials and Influencing Factors of Dynamic Pricing in Business: Empirical Insights of European Experts
Authors: Christopher Reichstein, Ralf-Christian Härting, Martina Häußler
Abstract:
With a continuously increasing speed of information exchange on the World Wide Web, retailers in the E-Commerce sector are faced with immense possibilities regarding different online purchase processes like dynamic price settings. By use of Dynamic Pricing, retailers are able to set short time price changes in order to optimize producer surplus. The empirical research illustrates the basics of Dynamic Pricing and identifies six influencing factors of Dynamic Pricing. The results of a structural equation modeling approach show five main drivers increasing the potential of dynamic price settings in the E-Commerce. Influencing factors are the knowledge of customers’ individual willingness to pay, rising sales, the possibility of customization, the data volume and the information about competitors’ pricing strategy.Keywords: e-commerce, empirical research, experts, dynamic pricing (DP), influencing factors, potentials
Procedia PDF Downloads 2626040 Performance Evaluation of Dynamic Signal Control System for Mixed Traffic Conditions
Authors: Aneesh Babu, S. P. Anusha
Abstract:
A dynamic signal control system combines traditional traffic lights with an array of sensors to intelligently control vehicle and pedestrian traffic. The present study focus on evaluating the performance of dynamic signal control systems for mixed traffic conditions. Data collected from four different approaches to a typical four-legged signalized intersection at Trivandrum city in the Kerala state of India is used for the study. Performance of three other dynamic signal control methods, namely (i) Non-sequential method (ii) Webster design for consecutive signal cycle using flow as input, and (iii) dynamic signal control using RFID delay as input, were evaluated. The evaluation of the dynamic signal control systems was carried out using a calibrated VISSIM microsimulation model. Python programming was used to integrate the dynamic signal control algorithm through the COM interface in VISSIM. The intersection delay obtained from different dynamic signal control methods was compared with the delay obtained from fixed signal control. Based on the study results, it was observed that the intersection delay was reduced significantly by using dynamic signal control methods. The dynamic signal control method using delay from RFID sensors resulted in a higher percentage reduction in delay and hence is a suitable choice for implementation under mixed traffic conditions. The developed dynamic signal control strategies can be implemented in ITS applications under mixed traffic conditions.Keywords: dynamic signal control, intersection delay, mixed traffic conditions, RFID sensors
Procedia PDF Downloads 1076039 Developing the Methods for the Study of Static and Dynamic Balance
Authors: K. Abuzayan, H. Alabed, J. Ezarrugh, M. Agila
Abstract:
Static and dynamic balance are essential in daily and sports life. Many factors have been identified as influencing static balance control. Therefore, the aim of this study was to apply the (XCoM) method and other relevant variables (CoP, CoM, Fh, KE, P, Q, and, AI) to investigate sport related activities such as hopping and jumping. Many studies have represented the CoP data without mentioning its accuracy, so several experiments were done to establish the agreement between the CoP and the projected CoM in a static condition. Five male healthy (Mean ± SD:- age 24.6 years ±4.5, height 177 cm ± 6.3, body mass 72.8 kg ± 6.6) participated in this study. Results found that The implementation of the XCoM method was found to be practical for evaluating both static and dynamic balance. The general findings were that the CoP, the CoM, the XCoM, Fh, and Q were more informative than the other variables (e.g. KE, P, and AI) during static and dynamic balance. The XCoM method was found to be applicable to dynamic balance as well as static balance.Keywords: centre of mass, static balance, dynamic balance, extrapolated centre of mass
Procedia PDF Downloads 4206038 Conceptualizing Notions of Poverty in Graduate Social Work Education: Contextualizing the Formation of the ‘Social Worker’ Subjectivity
Authors: Emily Carrothers
Abstract:
This research takes a critical look at the development of the social worker subjectivity, particularly in Canada. Through an interrogation of required graduate course texts, this paper explicates the discursive formation, orientation, and maintenance of the social worker subject and the conceptualizations of poverty in graduate social work education. This research aims to advance understandings of power and ideology in social work graduate texts and formations of particular dominant constructions of poverty and social worker subjectivity. Guiding questions for this inquiry include: What are social workers being oriented to? What are social workers being oriented away from? How is poverty theorized, discussed and/or attached to social location in social work education? And, how are social workers implicated in contesting or reinforcing poverty? Using critical discourse analysis, 6 texts were analyzed with a particular focus on ways in which notions of poverty are discursively represented and ways in which notions of the formation of the social worker were approached. This revealed that discursively underpinning social work in anti-oppressive practice (AOP) can work to reify hierarchal structures of power that orient social workers away from structural poverty reduction strategies and towards punitive interactions with those that experience poverty and multiple forms of marginalization. This highlights that the social worker subjectivity is formed in opposition to the client, with graduate texts constructing the social worker as an expert in client’s lives and experiences even more so than the client.Keywords: Canada, education, social work, subjectivity
Procedia PDF Downloads 1616037 Programmed Speech to Text Summarization Using Graph-Based Algorithm
Authors: Hamsini Pulugurtha, P. V. S. L. Jagadamba
Abstract:
Programmed Speech to Text and Text Summarization Using Graph-based Algorithms can be utilized in gatherings to get the short depiction of the gathering for future reference. This gives signature check utilizing Siamese neural organization to confirm the personality of the client and convert the client gave sound record which is in English into English text utilizing the discourse acknowledgment bundle given in python. At times just the outline of the gathering is required, the answer for this text rundown. Thus, the record is then summed up utilizing the regular language preparing approaches, for example, solo extractive text outline calculationsKeywords: Siamese neural network, English speech, English text, natural language processing, unsupervised extractive text summarization
Procedia PDF Downloads 2186036 Improvement of Data Transfer over Simple Object Access Protocol (SOAP)
Authors: Khaled Ahmed Kadouh, Kamal Ali Albashiri
Abstract:
This paper presents a designed algorithm involves improvement of transferring data over Simple Object Access Protocol (SOAP). The aim of this work is to establish whether using SOAP in exchanging XML messages has any added advantages or not. The results showed that XML messages without SOAP take longer time and consume more memory, especially with binary data.Keywords: JAX-WS, SMTP, SOAP, web service, XML
Procedia PDF Downloads 4956035 Facial Biometric Privacy Using Visual Cryptography: A Fundamental Approach to Enhance the Security of Facial Biometric Data
Authors: Devika Tanna
Abstract:
'Biometrics' means 'life measurement' but the term is usually associated with the use of unique physiological characteristics to identify an individual. It is important to secure the privacy of digital face image that is stored in central database. To impart privacy to such biometric face images, first, the digital face image is split into two host face images such that, each of it gives no idea of existence of the original face image and, then each cover image is stored in two different databases geographically apart. When both the cover images are simultaneously available then only we can access that original image. This can be achieved by using the XM2VTS and IMM face database, an adaptive algorithm for spatial greyscale. The algorithm helps to select the appropriate host images which are most likely to be compatible with the secret image stored in the central database based on its geometry and appearance. The encryption is done using GEVCS which results in a reconstructed image identical to the original private image.Keywords: adaptive algorithm, database, host images, privacy, visual cryptography
Procedia PDF Downloads 1306034 Secure Distance Bounding Protocol on Ultra-WideBand Based Mapping Code
Authors: Jamel Miri, Bechir Nsiri, Ridha Bouallegue
Abstract:
Ultra WidBand-IR physical layer technology has seen a great development during the last decade which makes it a promising candidate for short range wireless communications, as they bring considerable benefits in terms of connectivity and mobility. However, like all wireless communication they suffer from vulnerabilities in terms of security because of the open nature of the radio channel. To face these attacks, distance bounding protocols are the most popular counter measures. In this paper, we presented a protocol based on distance bounding to thread the most popular attacks: Distance Fraud, Mafia Fraud and Terrorist fraud. In our work, we study the way to adapt the best secure distance bounding protocols to mapping code of ultra-wideband (TH-UWB) radios. Indeed, to ameliorate the performances of the protocol in terms of security communication in TH-UWB, we combine the modified protocol to ultra-wideband impulse radio technology (IR-UWB). The security and the different merits of the protocols are analyzed.Keywords: distance bounding, mapping code ultrawideband, terrorist fraud, physical layer technology
Procedia PDF Downloads 2996033 A Review of Routing Protocols for Mobile Ad-Hoc NETworks (MANET)
Authors: Hafiza Khaddija Saman, Muhammad Sufyan
Abstract:
The increase in availability and popularity of mobile wireless devices has led researchers to develop a wide variety of Mobile Ad-hoc Networking (MANET) protocols to exploit the unique communication opportunities presented by these devices. Devices are able to communicate directly using the wireless spectrum in a peer-to-peer fashion, and route messages through intermediate nodes, however, the nature of wireless shared communication and mobile devices result in many routing and security challenges which must be addressed before deploying a MANET. In this paper, we investigate the range of MANET routing protocols available and discuss the functionalities of several ranging from early protocols such as DSDV to more advanced such as MAODV, our protocol study focuses upon works by Perkins in developing and improving MANET routing. A range of literature relating to the field of MANET routing was identified and reviewed, we also reviewed literature on the topic of securing AODV based MANETs as this may be the most popular MANET protocol. The literature review identified a number of trends within research papers such as exclusive use of the random waypoint mobility model, excluding key metrics from simulation results and not comparing protocol performance against available alternatives.Keywords: protocol, MANET, ad-Hoc, communication
Procedia PDF Downloads 2616032 Genome-Wide Identification of Genes Resistance to Nitric Oxide in Vibrio parahaemolyticus
Abstract:
Food poison caused by consumption of contaminated food, especially seafood, is one of most serious public health threats worldwide. Vibrio parahaemolyticus is emerging bacterial pathogen and the leading cause of human gastroenteritis associated with food poison, especially in the southern coastal region of China. To successfully cause disease in host, bacterial pathogens need to overcome the host-derived stresses encountered during infection. One of the toxic chemical species elaborated by the host is nitric oxide (NO). NO is generated by acidified nitrite in the stomach and by enzymes of the inducible NO synthase (iNOS) in the host cell, and is toxic to bacteria. Bacterial pathogens have evolved some mechanisms to battle with this toxic stress. Such mechanisms include genes to sense NO produced from immune system and activate others to detoxify NO toxicity, and genes to repair the damage caused by toxic reactive nitrogen species (RNS) generated during NO toxic stress. However, little is known about the NO resistance in V. parahaemolyticus. In this study, a transposon coupled with next generation sequencing (Tn-seq) technology will be utilized to identify genes for NO resistance in V. parahaemolyticus. Our strategy will include construction the saturating transposon insertion library, transposon library challenging with NO, next generation sequencing (NGS), bioinformatics analysis and verification of the identified genes in vitro and in vivo.Keywords: vibrio parahaemolyticus, nitric oxide, tn-seq, virulence
Procedia PDF Downloads 2646031 A Study of Effect of Yoga on Choice Visual Reaction Time of Soccer Players
Authors: Vikram Singh, Parmod Kumar Sethi
Abstract:
The objective of the study was to study the effectiveness of common yoga protocol on reaction time (choice visual reaction time, measured in milliseconds/seconds) of male football players in the age group of 16 to 21 years. The 40 boys were measured initially on parameters of years of experience, level of participation. They were randomly assigned into two groups i.e. control and experimental. CVRT for both the groups was measured on day-1 and post intervention (common yoga protocol here) was measured after 45 days of training to the experimental group after they had finished with their regular fitness and soccer skill training. One way ANOVA (Univariate analysis) and Independent t-test using SPSS 23 statistical package were applied to get and analyze the results. The experimental yoga protocol group showed a significant reduction in CVRT, whereas the insignificant difference in reaction times was observed for control group after 45 days. The effect size was more than 52% for CVRT indicating that the effect of treatment was large. Power of the study was also found to be high (> .80). There was a significant difference after 45 days of yoga protocol in choice visual reaction time of experimental group (p = .000), t (21.93) = 6.410, p = .000 (two-tailed). The null hypothesis (that there would be no difference in reaction times of control and experimental groups) was rejected. Where p< .05. Therefore alternate hypothesis was accepted.Keywords: reaction time, yoga protocol, t-test, soccer players
Procedia PDF Downloads 2366030 Evaluation of Gene Expression after in Vitro Differentiation of Human Bone Marrow-Derived Stem Cells to Insulin-Producing Cells
Authors: Mahmoud M. Zakaria, Omnia F. Elmoursi, Mahmoud M. Gabr, Camelia A. AbdelMalak, Mohamed A. Ghoneim
Abstract:
Many protocols were publicized for differentiation of human mesenchymal stem cells (MSCS) into insulin-producing cells (IPCs) in order to excrete insulin hormone ingoing to treat diabetes disease. Our aim is to evaluate relative gene expression for each independent protocol. Human bone marrow cells were derived from three volunteers that suffer diabetes disease. After expansion of mesenchymal stem cells, differentiation of these cells was done by three different protocols (the one-step protocol was used conophylline protein, the two steps protocol was depending on trichostatin-A, and the three-step protocol was started by beta-mercaptoethanol). Evaluation of gene expression was carried out by real-time PCR: Pancreatic endocrine genes, transcription factors, glucose transporter, precursor markers, pancreatic enzymes, proteolytic cleavage, extracellular matrix and cell surface protein. Quantitation of insulin secretion was detected by immunofluorescence technique in 24-well plate. Most of the genes studied were up-regulated in the in vitro differentiated cells, and also insulin production was observed in the three independent protocols. There were some slight increases in expression of endocrine mRNA of two-step protocol and its insulin production. So, the two-step protocol was showed a more efficient in expressing of pancreatic endocrine genes and its insulin production than the other two protocols.Keywords: mesenchymal stem cells, insulin producing cells, conophylline protein, trichostatin-A, beta-mercaptoethanol, gene expression, immunofluorescence technique
Procedia PDF Downloads 2156029 Information Sharing with Potential Users of Traditional Knowledge under Provisions of Nagoya Protocol: Issues of Participation of Indigenous People and Local Communities
Authors: Hasrat Arjjumend, Sabiha Alam
Abstract:
The Nagoya Protocol is landmark international legislation governing access to genetic resources and benefit sharing from utilization of genetic resource and traditional knowledge. The field implications of the international law have been assessed by surveying academic/ research institutions, civil society organizations (CSOs) and concerned individuals, who gave their opinions on whether the provider parties (usually developing countries) would ensure effective participation of Indigenous people and local communities (ILCs) in establishing the mechanisms to inform the potential users of traditional knowledge (TK) about their obligations under art. 12.2 of Nagoya Protocol. First of all, involvement and participation of ILCs in suggested clearing-house mechanisms of the Parties are seldom witnessed. Secondly, as respondents expressed, it is doubtful that developing countries would ensure effective participation of ILCs in establishing the mechanisms to inform the potential users of TK about their obligations. Yet, as most of ILCs speak and understand local or indigenous languages, whether the Nagoya Protocol provides or not, it is a felt need that the Parties should disclose information in a language understandable to ILCs. Alternative opinions indicate that if TK held by ILCs is disclosed, the value is gone. Therefore, it should be protected by the domestic law first and should be disclosed then.Keywords: genetic resources, indigenous people, language, Nagoya protocol, participation, traditional knowledge
Procedia PDF Downloads 1496028 Importance-Performance Analysis of Volunteer Tourism in Ethiopia: Host and Guest Case Study
Authors: Zita Fomukong Andam
Abstract:
With a general objective of evaluating the importance and Performance attributes of Volunteer Tourism in Ethiopia and also specifically intending to rank out the importance to evaluate the competitive performance of Ethiopia to host volunteer tourists, laying them in a four quadrant grid and conduct the IPA Iso-Priority Line comparison of Volunteer Tourism in Ethiopia. From hosts and guests point of view, a deeper research discourse was conducted with a randomly selected 384 guests and 165 hosts in Ethiopia. Findings of the discourse through an exploratory research design on both the hosts and the guests confirm that attributes of volunteer tourism generally and marginally fall in the South East quadrant of the matrix where their importance is relatively higher than their performance counterpart, also referred as ‘Concentrate Here’ quadrant. The fact that there are more items in this particular place in both the host and guest study, where they are highly important, but their relative performance is low, strikes a message that the country has more to do. Another focus point of this study is mapping the scores of attributes regarding the guest and host importance and performance against the Iso-Priority Line. Results of Iso-Priority Line Analysis of the IPA of Volunteer Tourism in Ethiopia from the Host’s Perspective showed that there are no attributes where their importance is exactly the same as their performance. With this being found, the fact that this research design inhabits many characters of exploratory nature, it is not confirmed research output. This paper reserves from prescribing anything to the applied world before further confirmatory research is conducted on the issue and rather calls the scientific community to augment this study through comprehensive, exhaustive, extensive and extended works of inquiry in order to get a refined set of recommended items to the applied world.Keywords: volunteer tourism, competitive performance importance-performance analysis, Ethiopian tourism
Procedia PDF Downloads 2336027 A Background Subtraction Based Moving Object Detection Around the Host Vehicle
Authors: Hyojin Lim, Cuong Nguyen Khac, Ho-Youl Jung
Abstract:
In this paper, we propose moving object detection method which is helpful for driver to safely take his/her car out of parking lot. When moving objects such as motorbikes, pedestrians, the other cars and some obstacles are detected at the rear-side of host vehicle, the proposed algorithm can provide to driver warning. We assume that the host vehicle is just before departure. Gaussian Mixture Model (GMM) based background subtraction is basically applied. Pre-processing such as smoothing and post-processing as morphological filtering are added.We examine “which color space has better performance for detection of moving objects?” Three color spaces including RGB, YCbCr, and Y are applied and compared, in terms of detection rate. Through simulation, we prove that RGB space is more suitable for moving object detection based on background subtraction.Keywords: gaussian mixture model, background subtraction, moving object detection, color space, morphological filtering
Procedia PDF Downloads 6176026 The Design and Modeling of Intelligent Learners Assistance System (ILASS)
Authors: Jelili Kunle Adedeji, Toeb Akorede Akinbola
Abstract:
The problem of vehicle mishap as a result of miscalculation, recklessness, or malfunction of some part in a vehicle is acknowledged to be a global issue. In most of the cases, it results into death or life injuries, all over the world; the issue becomes a nightmare to the stakeholders on how to curb mishaps on our roads due to these endemic factors. Hence this research typically examined the design of a device, specifically for learners that can lead to a society of intelligent vehicles (traffic) without withdrawing the driving authority from them, unlike pre-existing systems. Though ILASS shears a lot of principle with existing advance drivers assistance systems, yet there are two fundamental differences between ILASS system and existing systems. Firstly ILASS is meant to accept continuous input from the throttle at all time such that the devices will not constraint the driving process unnecessarily and ensure a change of speed at any point in time. Secondly, it made use of a variable threshold distance between the host vehicle and front vehicle which can be set by the host driver under the constraint of road maintenance agency, who communicates the minimum possible threshold for a different lane to the host vehicle. The results obtained from the simulation of the ILASS system concluded that ILASS is a good solution to road accidents, particularly road accident which occurs as a result of driving at high speed.Keywords: front-vehicle, host-speed, threshold-distance, ILASS
Procedia PDF Downloads 1816025 A Dynamic Cardiac Single Photon Emission Computer Tomography Using Conventional Gamma Camera to Estimate Coronary Flow Reserve
Authors: Maria Sciammarella, Uttam M. Shrestha, Youngho Seo, Grant T. Gullberg, Elias H. Botvinick
Abstract:
Background: Myocardial perfusion imaging (MPI) is typically performed with static imaging protocols and visually assessed for perfusion defects based on the relative intensity distribution. Dynamic cardiac SPECT, on the other hand, is a new imaging technique that is based on time varying information of radiotracer distribution, which permits quantification of myocardial blood flow (MBF). In this abstract, we report a progress and current status of dynamic cardiac SPECT using conventional gamma camera (Infinia Hawkeye 4, GE Healthcare) for estimation of myocardial blood flow and coronary flow reserve. Methods: A group of patients who had high risk of coronary artery disease was enrolled to evaluate our methodology. A low-dose/high-dose rest/pharmacologic-induced-stress protocol was implemented. A standard rest and a standard stress radionuclide dose of ⁹⁹ᵐTc-tetrofosmin (140 keV) was administered. The dynamic SPECT data for each patient were reconstructed using the standard 4-dimensional maximum likelihood expectation maximization (ML-EM) algorithm. Acquired data were used to estimate the myocardial blood flow (MBF). The correspondence between flow values in the main coronary vasculature with myocardial segments defined by the standardized myocardial segmentation and nomenclature were derived. The coronary flow reserve, CFR, was defined as the ratio of stress to rest MBF values. CFR values estimated with SPECT were also validated with dynamic PET. Results: The range of territorial MBF in LAD, RCA, and LCX was 0.44 ml/min/g to 3.81 ml/min/g. The MBF between estimated with PET and SPECT in the group of independent cohort of 7 patients showed statistically significant correlation, r = 0.71 (p < 0.001). But the corresponding CFR correlation was moderate r = 0.39 yet statistically significant (p = 0.037). The mean stress MBF value was significantly lower for angiographically abnormal than that for the normal (Normal Mean MBF = 2.49 ± 0.61, Abnormal Mean MBF = 1.43 ± 0. 0.62, P < .001). Conclusions: The visually assessed image findings in clinical SPECT are subjective, and may not reflect direct physiologic measures of coronary lesion. The MBF and CFR measured with dynamic SPECT are fully objective and available only with the data generated from the dynamic SPECT method. A quantitative approach such as measuring CFR using dynamic SPECT imaging is a better mode of diagnosing CAD than visual assessment of stress and rest images from static SPECT images Coronary Flow Reserve.Keywords: dynamic SPECT, clinical SPECT/CT, selective coronary angiograph, ⁹⁹ᵐTc-Tetrofosmin
Procedia PDF Downloads 1516024 Analyzing the Effectiveness of Communication Practices and Processes within Project-Based Firms
Authors: Paul Saah, Charles Mbohwa, Nelson Sizwe Madonsela
Abstract:
The capacity to deliver projects on schedule, within budget, and to the pleasure of the client depends on effective communication, which is the lifeblood of project-based businesses. In order to pinpoint areas for development and shed light on the crucial role that communication plays in project success, the aim of this study is to evaluate the efficacy of communication practises and processes inside project-based organisations. In order to analyse concepts and get a greater grasp of their theoretical basis, this study's methodology combines a careful review of the relevant literature with a conceptual analysis of the subject. Data from a varied sample of project-based businesses spanning all industries and sizes were collected via document analysis. The relationship between communication practises, and processes were investigated in connection to key performance measures such as project outcomes, client satisfaction, and team dynamics. According to the study's findings, project-based businesses that adopt effective communication practises, and procedures experience a reduction in unfavourable experiences, stronger integration, and coordination, clarity of purpose, and practises that can hasten problem resolution. However, failing to adopt effective communication practises and procedures in project-based company result in counter issues, including project derailment from the schedule, failure to meet goals, inefficient use of existing resources, and failure to meet organisational goals. Therefore, optimising their communication practises, and procedures are crucial for sustainable growth and competitive advantage as project-based enterprises continue to play a crucial part in today's dynamic business scene.Keywords: effective communication, project-based firms, communication practices, project success, communication strategies
Procedia PDF Downloads 706023 Nearest Neighbor Investigate Using R+ Tree
Authors: Rutuja Desai
Abstract:
Search engine is fundamentally a framework used to search the data which is pertinent to the client via WWW. Looking close-by spot identified with the keywords is an imperative concept in developing web advances. For such kind of searching, extent pursuit or closest neighbor is utilized. In range search the forecast is made whether the objects meet to query object. Nearest neighbor is the forecast of the focuses close to the query set by the client. Here, the nearest neighbor methodology is utilized where Data recovery R+ tree is utilized rather than IR2 tree. The disadvantages of IR2 tree is: The false hit number can surpass the limit and the mark in Information Retrieval R-tree must have Voice over IP bit for each one of a kind word in W set is recouped by Data recovery R+ tree. The inquiry is fundamentally subordinate upon the key words and the geometric directions.Keywords: information retrieval, nearest neighbor search, keyword search, R+ tree
Procedia PDF Downloads 2916022 Assessment of Breast, Lung and Liver Effective Doses in Heart Imaging by CT-Scan 128 Dual Sources with Use of TLD-100 in RANDO Phantom
Authors: Seyedeh Sepideh Amini, Navideh Aghaei Amirkhizi, Seyedeh Paniz Amini, Seyed Soheil Sayyahi, Mohammad Reza Davar Panah
Abstract:
CT-Scan is one of the lateral and sectional imaging methods that produce 3D-images with use of rotational x-ray tube around central axis. This study is about evaluation and calculation of effective doses around heart organs such as breast, lung and liver with CT-Scan 128 dual sources with TLD_100 and RANDO Phantom by spiral, flash and conventional protocols. In results, it is showed that in spiral protocol organs have maximum effective dose and minimum in flash protocol. Thus flash protocol advised for children and risk persons.Keywords: X-ray computed tomography, dosimetry, TLD-100, RANDO, phantom
Procedia PDF Downloads 4746021 Host Range and Taxonomy of Hairy Caterpillars (Erebidae: Lepidoptera) in Different Cropping Ecosystems
Authors: Mallikarjun Warad, C. M. Kalleshwaraswamy, P. R. Shashank
Abstract:
Studies were conducted to record the occurrence of different species of hairy caterpillar on different host plants in and around Shivamogga, Karnataka, India. Twelve genera of hairy caterpillars belonging to Arctiinae and Lymantriinae were recorded on different host plants and reared to adults in laboratory on their respective hosts. The Porthesia sp. feed on castor, Creatonotus gangis on cocoa, Perina nuda on fig, Pericalia ricini on pigeon pea, Utetheisa pulchella on sunhemp and Euproctis sp. on paddy and banana. Illustrations of immature and adults were made to associate them. Along with this, light traps were also set during the rainy season, to capture adults of hairy caterpillars. An illustrated identification key was provided for easy and accurate identification of adult of hairy caterpillars based on their morphological (male genitalial) characters. The study through a light on the existence of sexual dimorphism, polyphagous nature and diapause are the major hindrance in taxonomic identification. Hence, attempts were made to address these issues in the study.Keywords: Erebidae, hairy caterpillars, male genitalia, taxonomy
Procedia PDF Downloads 2066020 Forced Displacement and Mental Health Problems in Refugees Residing in Quetta for Decades
Authors: Silsila Sherzad, Hazrat Ali Khan, Tabasum Sherzad, Hazratullah, Sanaullah
Abstract:
Objective: To study the prevalence of common Mental health disorders among forcibly displaced people and to compare with the common mental health disorders among host community members. Study design: Analytical Study. Place of study: Balochistan institute of psychiatry and behavioral sciences, Quetta, Baluchistan, Pakistan. Methodology: Data from the Outpatient department were analyzed to numerate both the host community and refugees. Out of 4120, 354 refugee patients were identified using their proof registration (POR) card and for 3776 of the host community using their computerized national identity card (CNIC), data was analyzed for the prevalence of mental health disorders among them. Results: This study states that Afghan Refugees presented to OPD services of Balochistan institute of psychiatry and behavioral sciences, 47% were diagnosed as Major depressive disorder with/without psychosis, 19% with Generalized anxiety disorder, 5% were diagnosed as Bipolar Affective disorder, 5% With schizophrenia, 4% as Post-traumatic stress disorder, 3% as migraine, 3% conversion disorder, 2% Obsessive-compulsive disorder, 1% somatoform disorder and 10% of them presented with other psychiatric disorders, while in host community 21% were diagnosed as Major depressive disorder with/without psychosis, 24% as Generalized anxiety disorder, 12% as somatoform disorder, 10% as Obsessive-compulsive disorder, 8% as migraine, 7% as conversion disorder, 4% as Bipolar Affective disorder, 3% as schizophrenia, 3% as Mental and behavioral disorder due to substance misuse and rest of 7% presented with other psychiatric disorders. Conclusion: The conclusion of this study states that mental health disorders are more common among refugees than in other populations. The result of this study shows that there is a big difference in the prevalence of mental health disorders among displaced people and the rest of the population. Some Mental health disorders are present in a higher percentage among displaced people rather than among the host community, while some other disorders are present in a lower percentage among displaced people rather than among the host community. This study also highlights that further studies are needed to determine risk and protective factors within the host community.Keywords: forced displacement, mental health, Afghan refugees, depression
Procedia PDF Downloads 111