Search results for: exact functions
1321 A Comparative Study between FEM and Meshless Methods
Authors: Jay N. Vyas, Sachin Daxini
Abstract:
Numerical simulation techniques are widely used now in product development and testing instead of expensive, time-consuming and sometimes dangerous laboratory experiments. Numerous numerical methods are available for performing simulation of physical problems of different engineering fields. Grid based methods, like Finite Element Method, are extensively used in performing various kinds of static, dynamic, structural and non-structural analysis during product development phase. Drawbacks of grid based methods in terms of discontinuous secondary field variable, dealing fracture mechanics and large deformation problems led to development of a relatively a new class of numerical simulation techniques in last few years, which are popular as Meshless methods or Meshfree Methods. Meshless Methods are expected to be more adaptive and flexible than Finite Element Method because domain descretization in Meshless Method requires only nodes. Present paper introduces Meshless Methods and differentiates it with Finite Element Method in terms of following aspects: Shape functions used, role of weight function, techniques to impose essential boundary conditions, integration techniques for discrete system equations, convergence rate, accuracy of solution and computational effort. Capabilities, benefits and limitations of Meshless Methods are discussed and concluded at the end of paper.Keywords: numerical simulation, Grid-based methods, Finite Element Method, Meshless Methods
Procedia PDF Downloads 3861320 The Multifunctional Medical Centers’ Architectural Shaping
Authors: Griaznova Svetlana, Umedov Mekhroz
Abstract:
The current healthcare facilities trend is the creation of multidisciplinary large-scale centers to provide the maximum possible services in one place, minimizing the number of possible instances in the path of patient treatment. The multifunctional medical centers are mainly designed in urban infrastructure for good accessibility. However, many functions and connections define the building shape, often make it inharmonious, that greatly destroys the city's appearance. The purpose of the research is to scientifically substantiate the factors influencing the shaping, the formation of architectural solutions principles, the formation of recommendations and principles for the multifunctional medical centers' design. The result of the research is the elaboration of architectural and planning solutions principles and the determination of factors affecting the multifunctional healthcare facilities shaping. Research method: Study and generalization of international experience in scientific research, literature, standards, teaching aids, and design materials on the topic of research. An integrated approach to the study of existing international experience of multidisciplinary medical centers. Elaboration of graphical analysis and diagrams based on the system analysis of the processed information. Identification of methods and principles of functional zoning of nuclear medicine centers.Keywords: health care, multifunctionality, form, medical center, hospital, PET, CT scan
Procedia PDF Downloads 1031319 Effect of Degree of Phosphorylation on Electrospinning and In vitro Cell Behavior of Phosphorylated Polymers as Biomimetic Materials for Tissue Engineering Applications
Authors: Pallab Datta, Jyotirmoy Chatterjee, Santanu Dhara
Abstract:
Over the past few years, phosphorous containing polymers have received widespread attention for applications such as high performance optical fibers, flame retardant materials, drug delivery and tissue engineering. Being pentavalent, phosphorous can exist in different chemical environments in these polymers which increase their versatility. In human biochemistry, phosphorous based compounds exert their functions both in soluble and insoluble form occurring as inorganic or as organophosphorous compounds. Specifically in case of biomacromolecules, phosphates are critical for functions of DNA, ATP, phosphoproteins, phospholipids, phosphoglycans and several coenzymes. Inspired by the role of phosphorous in functional biomacromolecules, design and synthesis of biomimetic materials are thus carried out by several authors to study macromolecular function or as substitutes in clinical tissue regeneration conditions. In addition, many regulatory signals of the body are controlled by phoshphorylation of key proteins present either in form of growth factors or matrix-bound scaffold proteins. This inspires works on synthesis of phospho-peptidomimetic amino acids for understanding key signaling pathways and this is extended to obtain molecules with potentially useful biological properties. Apart from above applications, phosphate groups bound to polymer backbones have also been demonstrated to improve function of osteoblast cells and augment performance of bone grafts. Despite the advantages of phosphate grafting, however, there is limited understanding on effect of degree of phosphorylation on macromolecular physicochemical and/or biological properties. Such investigations are necessary to effectively translate knowledge of macromolecular biochemistry into relevant clinical products since they directly influence processability of these polymers into suitable scaffold structures and control subsequent biological response. Amongst various techniques for fabrication of biomimetic scaffolds, nanofibrous scaffolds fabricated by electrospinning technique offer some special advantages in resembling the attributes of natural extracellular matrix. Understanding changes in physico-chemical properties of polymers as function of phosphorylation is therefore going to be crucial in development of nanofiber scaffolds based on phosphorylated polymers. The aim of the present work is to investigate the effect of phosphorous grafting on the electrospinning behavior of polymers with aim to obtain biomaterials for bone regeneration applications. For this purpose, phosphorylated derivatives of two polymers of widely different electrospinning behaviors were selected as starting materials. Poly(vinyl alcohol) is a conveniently electrospinnable polymer at different conditions and concentrations. On the other hand, electrospinning of chitosan backbone based polymers have been viewed as a critical challenge. The phosphorylated derivatives of these polymers were synthesized, characterized and electrospinning behavior of various solutions containing these derivatives was compared with electrospinning of pure poly (vinyl alcohol). In PVA, phosphorylation adversely impacted electrospinnability while in NMPC, higher phosphate content widened concentration range for nanofiber formation. Culture of MG-63 cells on electrospun nanofibers, revealed that degree of phosphate modification of a polymer significantly improves cell adhesion or osteoblast function of cultured cells. It is concluded that improvement of cell response parameters of nanofiber scaffolds can be attained as a function of controlled degree of phosphate grafting in polymeric biomaterials with implications for bone tissue engineering applications.Keywords: bone regeneration, chitosan, electrospinning, phosphorylation
Procedia PDF Downloads 2181318 Records of Lepidopteron Borers (Lepidoptera) on Stored Seeds of Indian Himalayan Conifers
Authors: Pawan Kumar, Pitamber Singh Negi
Abstract:
Many of the regeneration failures in conifers are often being attributed to heavy insect attack and pathogens during the period of seed formation and under storage conditions. Conifer berries and seed insects occur throughout the known range of the hosts and also limit the production of seed for nursery stock. On occasion, even entire seed crops are lost due to insect attacks. The berry and seeds of both the species have been found to be infected with insects. Recently, heavy damage to the berry and seeds of Juniper and Chilgoza Pine was observed in the field as well as in stored conditions, leading to reduction in the viability of seeds to germinate. Both the species are under great threat and regeneration of the species is very low. Due to lack of adequate literature, the study on the damage potential of seed insects was urgently required to know the exact status of the insect-pests attacking seeds/berries of both the pine species so as to develop pest management practices against the insect pests attack. As both the species are also under threat and are fighting for survival, so the study is important to develop management practices for the insect-pests of seeds/berries of Juniper and Chilgoza pine so as to evaluate in the nursery, as these species form major vegetation of their distribution zones. A six-year study on the management of insect pests of seeds of Chilgoza revealed that seeds of this species are prone to insect pests mainly borers. During present investigations, it was recorded that cones of are heavily attacked only by Dioryctria abietella (Lepidoptera: Pyralidae) in natural conditions, but seeds which are economically important are heavily infected, (sometimes up to 100% damage was also recorded) by insect borer, Plodia interpunctella (Lepidoptera: Pyralidae) and is recorded for the first time ‘to author’s best knowledge’ infesting the stored Chilgoza seeds. Similarly, Juniper berries and seeds were heavily attacked only by a single borer, Homaloxestis cholopis (Lepidoptera: Lecithoceridae) recorded as a new report in natural habitat as well as in stored conditions. During the present investigation details of insect pest attack on Juniper and Chilgoza pine seeds and berries was observed and suitable management practices were also developed to contain the insect-pests attack.Keywords: borer, chilgozapine, cones, conifer, Lepidoptera, juniper, management, seed
Procedia PDF Downloads 1461317 Forecasting Optimal Production Program Using Profitability Optimization by Genetic Algorithm and Neural Network
Authors: Galal H. Senussi, Muamar Benisa, Sanja Vasin
Abstract:
In our business field today, one of the most important issues for any enterprises is cost minimization and profit maximization. Second issue is how to develop a strong and capable model that is able to give us desired forecasting of these two issues. Many researches deal with these issues using different methods. In this study, we developed a model for multi-criteria production program optimization, integrated with Artificial Neural Network. The prediction of the production cost and profit per unit of a product, dealing with two obverse functions at same time can be extremely difficult, especially if there is a great amount of conflict information about production parameters. Feed-Forward Neural Networks are suitable for generalization, which means that the network will generate a proper output as a result to input it has never seen. Therefore, with small set of examples the network will adjust its weight coefficients so the input will generate a proper output. This essential characteristic is of the most important abilities enabling this network to be used in variety of problems spreading from engineering to finance etc. From our results as we will see later, Feed-Forward Neural Networks has a strong ability and capability to map inputs into desired outputs.Keywords: project profitability, multi-objective optimization, genetic algorithm, Pareto set, neural networks
Procedia PDF Downloads 4451316 The Artificial Intelligence (AI) Impact on Project Management: A Destructive or Transformative Agent
Authors: Kwame Amoah
Abstract:
Artificial intelligence (AI) has the prospect of transforming project management, significantly improving efficiency and accuracy. By automating specific tasks with defined guidelines, AI can assist project managers in making better decisions and allocating resources efficiently, with possible risk mitigation. This study explores how AI is already impacting project management and likely future AI's impact on the field. The AI's reaction has been a divided opinion; while others picture it as a destroyer of jobs, some welcome it as an innovation advocate. Both sides agree that AI will be disruptive and revolutionize PM's functions. If current research is to go by, AI or some form will replace one-third of all learning graduate PM jobs by as early as 2030. A recent survey indicates AI spending will reach $97.9 billion by the end of 2023. Considering such a profound impact, the project management profession will also see a paradigm shift driven by AI. The study examines what the project management profession will look like in the next 5-10 years after this technological disruption. The research methods incorporate existing literature, develop trend analysis, and conduct structured interviews with project management stakeholders from North America to gauge the trend. PM professionals can harness the power of AI, ensuring a smooth transition and positive outcomes. AI adoption will maximize benefits, minimize adverse consequences, and uphold ethical standards, leading to improved project performance.Keywords: project management, disruptive teacnologies, project management function, AL applications, artificial intelligence
Procedia PDF Downloads 821315 Uncontrolled Urbanization Leads to Main Challenge for Sustainable Development of Mongolia
Authors: Davaanyam Surenjav, Chinzolboo Dandarbaatar, Ganbold Batkhuyag
Abstract:
Primate city induced rapid urbanization has been become one of the main challenges in sustainable development in Mongolia like other developing countries since transition to market economy in 1990. According due to statistical yearbook, population number of Ulaanbaatar city has increased from 0.5 million to 1.5 million for last 30 years and contains now almost half (47%) of total Mongolian population. Rural-Ulaanbaatar and local Cities-Ulaanbaatar city migration leads to social issues like uncontrolled urbanization, income inequality, poverty, overwork of public service, economic over cost for redevelopment and limitation of transport and environmental degradation including air, noise, water and soil pollution. Most thresholds of all of the sustainable urban development main and sub-indicators over exceeded from safety level to unsafety level in Ulaanbaatar. So, there is an urgent need to remove migration pull factors including some administrative and high education functions from Ulaanbaatar city to its satellite cities or secondary cities. Moreover, urban smart transport system and green and renewable energy technologies should be introduced to urban development master plan of Ulaanbaatar city.Keywords: challenge for sustainable urban development, migration factors, primate city , urban safety thresholds
Procedia PDF Downloads 1301314 Intracranial Hypotension: A Brief Review of the Pathophysiology and Diagnostic Algorithm
Authors: Ana Bermudez de Castro Muela, Xiomara Santos Salas, Silvia Cayon Somacarrera
Abstract:
The aim of this review is to explain what is the intracranial hypotension and its main causes, and also to approach to the diagnostic management in the different clinical situations, understanding radiological findings, and physiopathological substrate. An approach to the diagnostic management is presented: what are the guidelines to follow, the different tests available, and the typical findings. We review the myelo-CT and myelo-RM studies in patients with suspected CSF fistula or hypotension of unknown cause during the last 10 years in three centers. Signs of intracranial hypotension (subdural hygromas/hematomas, pachymeningeal enhancement, venous sinus engorgement, pituitary hyperemia, and lowering of the brain) that are evident in baseline CT and MRI are also sought. The intracranial hypotension is defined as a lower opening pressure of 6 cmH₂O. It is a relatively rare disorder with an annual incidence of 5 per 100.000, with a female to male ratio 2:1. The clinical features it’s an orthostatic headache, which is defined as development or aggravation of headache when patients move from a supine to an upright position and disappear or typically relieve after lay down. The etiology is a decrease in the amount of cerebrospinal fluid (CSF), usually by loss of it, either spontaneous or secondary (post-traumatic, post-surgical, systemic disease, post-lumbar puncture etc.) and rhinorrhea and/or otorrhea may exist. The pathophysiological mechanisms of hypotension and CSF hypertension are interrelated, as a situation of hypertension may lead to hypotension secondary to spontaneous CSF leakage. The diagnostic management of intracranial hypotension in our center includes, in the case of being spontaneous and without rhinorrhea and/or otorrhea and according to necessity, a range of available tests, which will be performed from less to more complex: cerebral CT, cerebral MRI and spine without contrast and CT/MRI with intrathecal contrast. If we are in a situation of intracranial hypotension with the presence of rhinorrhea/otorrhea, a sample can be obtained for the detection of b2-transferrin, which is found in the CSF physiologically, as well as sinus CT and cerebral MRI including constructive interference steady state (CISS) sequences. If necessary, cisternography studies are performed to locate the exact point of leakage. It is important to emphasize the significance of myelo-CT / MRI to establish the diagnosis and location of CSF leak, which is indispensable for therapeutic planning (whether surgical or not) in patients with more than one lesion or doubts in the baseline tests.Keywords: cerebrospinal fluid, neuroradiology brain, magnetic resonance imaging, fistula
Procedia PDF Downloads 1251313 Context Aware Anomaly Behavior Analysis for Smart Home Systems
Authors: Zhiwen Pan, Jesus Pacheco, Salim Hariri, Yiqiang Chen, Bozhi Liu
Abstract:
The Internet of Things (IoT) will lead to the development of advanced Smart Home services that are pervasive, cost-effective, and can be accessed by home occupants from anywhere and at any time. However, advanced smart home applications will introduce grand security challenges due to the increase in the attack surface. Current approaches do not handle cybersecurity from a holistic point of view; hence, a systematic cybersecurity mechanism needs to be adopted when designing smart home applications. In this paper, we present a generic intrusion detection methodology to detect and mitigate the anomaly behaviors happened in Smart Home Systems (SHS). By utilizing our Smart Home Context Data Structure, the heterogeneous information and services acquired from SHS are mapped in context attributes which can describe the context of smart home operation precisely and accurately. Runtime models for describing usage patterns of home assets are developed based on characterization functions. A threat-aware action management methodology, used to efficiently mitigate anomaly behaviors, is proposed at the end. Our preliminary experimental results show that our methodology can be used to detect and mitigate known and unknown threats, as well as to protect SHS premises and services.Keywords: Internet of Things, network security, context awareness, intrusion detection
Procedia PDF Downloads 1901312 Greener Minds: Understanding Students' Perceptions of Environmental Sustainability in Higher Education, Sultan Qaboos University
Authors: Aisha Alshdefat, Lina Shakman
Abstract:
Objective: With environmental sustainability (ES) emerging as a critical concern due to its global impact, higher education institutions play a vital role in promoting ES through curricula and campus operations. This study examines the perceptions, attitudes, and behaviors related to ES among students at Sultan Qaboos University, aiming to identify areas for improved integration of sustainability practices in higher education. Design: A descriptive cross-sectional survey was conducted with 300 students from Sultan Qaboos University using an online questionnaire as the primary data collection instrument. The survey assessed six key areas: awareness, concern, attitude, willingness to participate, current behaviors, and recommendations for enhancing campus sustainability initiatives. Data was analyzed using SPSS Version 23, employing Pearson’s correlation, chi-square, and Fisher's exact test to explore associations among key variables. Findings: Preliminary analysis reveals that 68% of participants are familiar with core ES concepts, including the Sustainable Development Goals (SDGs), with high levels of concern expressed regarding environmental issues. However, only 47% reported active involvement in campus-led ES initiatives, highlighting an engagement gap. Over 70% of respondents indicated that sustainability should be a university policy priority, and 62% expressed willingness to participate in additional ES-related programs. Despite this interest, 58% advocated for more courses on sustainability within their curriculum, suggesting that current offerings are insufficient. Statistical analysis identified a significant positive correlation between ES awareness levels and willingness to engage in sustainable practices (p < 0.05). These findings emphasize the need for enhanced institutional efforts, including targeted programs and curriculum integration, to foster a more sustainability-focused culture among students. Conclusion: The results underscore that while there is a strong foundational awareness of ES among students, greater institutional support is essential to translate this awareness into actionable engagement. Integrating sustainability more fully into academic programs and campus life could substantially advance students’ involvement and commitment to environmental stewardship.Keywords: environmental sustainability, higher education, students, perceptions, Sultan Qaboos University.
Procedia PDF Downloads 61311 The Use of Network Tool for Brain Signal Data Analysis: A Case Study with Blind and Sighted Individuals
Authors: Cleiton Pons Ferreira, Diana Francisca Adamatti
Abstract:
Advancements in computers technology have allowed to obtain information for research in biology and neuroscience. In order to transform the data from these surveys, networks have long been used to represent important biological processes, changing the use of this tools from purely illustrative and didactic to more analytic, even including interaction analysis and hypothesis formulation. Many studies have involved this application, but not directly for interpretation of data obtained from brain functions, asking for new perspectives of development in neuroinformatics using existent models of tools already disseminated by the bioinformatics. This study includes an analysis of neurological data through electroencephalogram (EEG) signals, using the Cytoscape, an open source software tool for visualizing complex networks in biological databases. The data were obtained from a comparative case study developed in a research from the University of Rio Grande (FURG), using the EEG signals from a Brain Computer Interface (BCI) with 32 eletrodes prepared in the brain of a blind and a sighted individuals during the execution of an activity that stimulated the spatial ability. This study intends to present results that lead to better ways for use and adapt techniques that support the data treatment of brain signals for elevate the understanding and learning in neuroscience.Keywords: neuroinformatics, bioinformatics, network tools, brain mapping
Procedia PDF Downloads 1811310 From Abraham to Average Man: Game Theoretic Analysis of Divine Social Relationships
Authors: Elizabeth Latham
Abstract:
Billions of people worldwide profess some feeling of psychological or spiritual connection with the divine. The majority of them attribute this personal connection to the God of the Christian Bible. The objective of this research was to discover what could be known about the exact social nature of these relationships and to see if they mimic the interactions recounted in the bible; if a worldwide majority believes that the Christian Bible is a true account of God’s interactions with mankind, it is reasonable to assume that the interactions between God and the aforementioned people would be similar to the ones in the bible. This analysis required the employment of an unusual method of biblical analysis: Game Theory. Because the research focused on documented social interaction between God and man in scripture, it was important to go beyond text-analysis methods. We used stories from the New Revised Standard Version of the bible to set up “games” using economics-style matrices featuring each player’s motivations and possible courses of action, modeled after interactions in the Old and New Testaments between the Judeo-Christian God and some mortal person. We examined all relevant interactions for the objectives held by each party and their strategies for obtaining them. These findings were then compared to similar “games” created based on interviews with people subscribing to different levels of Christianity who ranged from barely-practicing to clergymen. The range was broad so as to look for a correlation between scriptural knowledge and game-similarity to the bible. Each interview described a personal experience someone believed they had with God and matrices were developed to describe each one as social interaction: a “game” to be analyzed quantitively. The data showed that in most cases, the social features of God-man interactions in the modern lives of people were like those present in the “games” between God and man in the bible. This similarity was referred to in the study as “biblical faith” and it alone was a fascinating finding with many implications. The even more notable finding, however, was that the amount of game-similarity present did not correlate with the amount of scriptural knowledge. Each participant was also surveyed on family background, political stances, general education, scriptural knowledge, and those who had biblical faith were not necessarily the ones that knew the bible best. Instead, there was a high degree of correlation between biblical faith and family religious observance. It seems that to have a biblical psychological relationship with God, it is more important to have a religious family than to have studied scripture, a surprising insight with massive implications on the practice and preservation of religion.Keywords: bible, Christianity, game theory, social psychology
Procedia PDF Downloads 1531309 A Method to Evaluate and Compare Web Information Extractors
Authors: Patricia Jiménez, Rafael Corchuelo, Hassan A. Sleiman
Abstract:
Web mining is gaining importance at an increasing pace. Currently, there are many complementary research topics under this umbrella. Their common theme is that they all focus on applying knowledge discovery techniques to data that is gathered from the Web. Sometimes, these data are relatively easy to gather, chiefly when it comes from server logs. Unfortunately, there are cases in which the data to be mined is the data that is displayed on a web document. In such cases, it is necessary to apply a pre-processing step to first extract the information of interest from the web documents. Such pre-processing steps are performed using so-called information extractors, which are software components that are typically configured by means of rules that are tailored to extracting the information of interest from a web page and structuring it according to a pre-defined schema. Paramount to getting good mining results is that the technique used to extract the source information is exact, which requires to evaluate and compare the different proposals in the literature from an empirical point of view. According to Google Scholar, about 4 200 papers on information extraction have been published during the last decade. Unfortunately, they were not evaluated within a homogeneous framework, which leads to difficulties to compare them empirically. In this paper, we report on an original information extraction evaluation method. Our contribution is three-fold: a) this is the first attempt to provide an evaluation method for proposals that work on semi-structured documents; the little existing work on this topic focuses on proposals that work on free text, which has little to do with extracting information from semi-structured documents. b) It provides a method that relies on statistically sound tests to support the conclusions drawn; the previous work does not provide clear guidelines or recommend statistically sound tests, but rather a survey that collects many features to take into account as well as related work; c) We provide a novel method to compute the performance measures regarding unsupervised proposals; otherwise they would require the intervention of a user to compute them by using the annotations on the evaluation sets and the information extracted. Our contributions will definitely help researchers in this area make sure that they have advanced the state of the art not only conceptually, but from an empirical point of view; it will also help practitioners make informed decisions on which proposal is the most adequate for a particular problem. This conference is a good forum to discuss on our ideas so that we can spread them to help improve the evaluation of information extraction proposals and gather valuable feedback from other researchers.Keywords: web information extractors, information extraction evaluation method, Google scholar, web
Procedia PDF Downloads 2471308 The Effect of Customs Commission Customer Satisfaction
Authors: Menelik Tilahun Alemu
Abstract:
Customs administrations are now increasingly regarded as the key border agencies responsible for all transactions related to issues arising from the border crossings of goods and people. Raising revenue has traditionally been high on the agenda of governments, represented by the Ministry of Finance (MOF), because of the critical importance of import duties as a source of budget revenue for many developing countries. Most of these functions are undertaken in close cooperation with other national agencies. Due to the need to make structural reforms that consider the nature of business activities in the world and the needs of consumers, the institution was previously divided into the Ministry of Revenue and the Customs Commission. Accordingly, the Ministry of Revenue is primarily responsible for administering and collecting local taxes, while the Customs Commission is responsible for administering customs matters; It supports exports and collects revenue from it. The National Import and Export Trade Service System is working to make the world more transparent and standardized and adapt to the current situation by formulating various guidelines, rules and procedures to provide a clear, simple, predictable and accessible service to customers. As a result, the commission will be able to streamline the business process by enabling Paperless customer service to support the service delivery technology and eliminate the customer iteration without having to incur unnecessary costs and inconveniences.Keywords: business, consumers, adapt, transparent
Procedia PDF Downloads 481307 Effect of TPA and HTLV-1 Tax on BRCA-1 and ERE Controlled Genes Expression
Authors: Azhar Jabareen, Mahmoud Huleihel
Abstract:
BRCA-1 is a multifunctional tumor suppressor, whose expression is activated by the estrogen (E2)-liganded ERα receptor. The activated ERα is a transcriptional factor which activates various genes either by direct binding to the DNA at E2-responsive elements (EREs) and indirectly associated with a range of alternative non-ERE elements. Interference with BRCA-1 expression and/or functions leads to high risk of breast or/and ovarian cancer. Our lab investigated the involvement of Human T-cell leukemia Virus Type 1 (HTLV-1) in breast cancer, since HTLV-1 Tax was found to strongly inhibit BRCA-1 expression. In addition, long exposure of 12-O-tetradecanoylphorbol-13-acetate (TPA), which is one of the stress-inducing agents activated the HTLV-1 promoter. So here the involvement of TPA in breast cancer had been examined by testing the effect of TPA on BRCA-1 and ERE expression. The results showed that TPA activated both BRCA-1 and ERE expression. In the 12 hours TPA activated the tow promoters more than others time, and after 24 hours the level of the tow promoters was decreased. Tax inhibited BRCA-1 expression but did not succeed to inhibit the effect of TPA. Then the activation of the two promoters was not through ERα pathway because TPA had no effect on ERα binding to the two promoters of the BRCA-1 and ERE. Also, the activation was not via nuclear factor kappa B (NF-κB) pathway because when the inhibitory of NF-κB had been added to the TPA, it still activated the tow promoters. However, it seems that 53BP1 may be involved in TPA activation of these promoters because ectopic high expression of 53BP1 significantly reduced the TPA activity. In addition, in the presence of Bisindolylmaleimide-I (BI)- the inhibitor of Protein Kinase C (PKC)- there was no activation for the two promoters, so the PKC is agonized BRCA-1 and ERE activation.Keywords: BRCA-1, ERE, HTLV-1, TPA
Procedia PDF Downloads 2461306 LncRNA NEAT1 Promotes NSCLC Progression through Acting as a ceRNA of miR-377-3p
Authors: Chengcao Sun, Shujun Li, Cuili Yang, Yongyong Xi, Liang Wang, Feng Zhang, Dejia Li
Abstract:
Recently, the long non-coding RNA (lncRNA) NEAT1 has been identified as an oncogenic gene in multiple cancer types and elevated expression of NEAT1 was tightly linked to tumorigenesis and cancer progression. However, the molecular basis for this observation has not been characterized in progression of non-small cell lung cancer (NSCLC). In our studies, we identified NEAT1 was highly expressed in NSCLC patients and was a novel regulator of NSCLC progression. Patients whose tumors had high NEAT1 expression had a shorter overall survival than patients whose tumors had low NEAT1 expression. Further, NEAT1 significantly accelerates NSCLC cell growth and metastasis in vitro and tumor growth in vivo. Additionally, by using bioinformatics study and RNA pull down combined with luciferase reporter assays, we demonstrated that NEAT1 functioned as a competing endogenous RNA (ceRNA) for has-miR-377-3p, antagonized its functions and led to the de-repression of its endogenous targets E2F3, which was a core oncogene in promoting NSCLC progression. Taken together, these observations imply that the NEAT1 modulated the expression of E2F3 gene by acting as a competing endogenous RNA, which may build up the missing link between the regulatory miRNA network and NSCLC progression.Keywords: long non-coding RNA NEAT1, hsa-miRNA-377-3p, E2F3, non-small cell lung cancer, tumorigenesis
Procedia PDF Downloads 3681305 First-Year Undergraduate Students' Dilemma with Kinematics Graphs
Authors: Itumeleng Phage
Abstract:
Students’ comprehension of graphs may be affected by the characteristics of the discipline in which the graph is used, the type of the task as well as the background of the students who are the readers or interpreters of the graph. This research study investigated these aspects of the graph comprehension of 152 first-year undergraduate physics students by comparing their responses to corresponding tasks in the mathematics and physics disciplines. The discipline characteristics were analysed for four task-related constructs namely coordinates, representations, area and slope. Students’ responses to corresponding visual decoding and judgement tasks set in mathematics and kinematics contexts were statistically compared. The effects of the participants’ gender, year of school completion and study course were determined as reader characteristics. The results of the empirical study indicated that participants generally transferred their mathematics knowledge on coordinates and representation of straight line graphs to the physics contexts, but not in the cases of parabolic and hyperbolic functions or area under graphs. Insufficient understanding of the slope concept contributed to weak performances on this construct in both mathematics and physics contexts. Discipline characteristics seem to play a vital role in students’ understanding, while reader characteristics had insignificant to medium effects on their responses.Keywords: kinematics graph, discipline characteristics, constructs, coordinates, representations, area and slope
Procedia PDF Downloads 2581304 Algorithms for Computing of Optimization Problems with a Common Minimum-Norm Fixed Point with Applications
Authors: Apirak Sombat, Teerapol Saleewong, Poom Kumam, Parin Chaipunya, Wiyada Kumam, Anantachai Padcharoen, Yeol Je Cho, Thana Sutthibutpong
Abstract:
This research is aimed to study a two-step iteration process defined over a finite family of σ-asymptotically quasi-nonexpansive nonself-mappings. The strong convergence is guaranteed under the framework of Banach spaces with some additional structural properties including strict and uniform convexity, reflexivity, and smoothness assumptions. With similar projection technique for nonself-mapping in Hilbert spaces, we hereby use the generalized projection to construct a point within the corresponding domain. Moreover, we have to introduce the use of duality mapping and its inverse to overcome the unavailability of duality representation that is exploit by Hilbert space theorists. We then apply our results for σ-asymptotically quasi-nonexpansive nonself-mappings to solve for ideal efficiency of vector optimization problems composed of finitely many objective functions. We also showed that the obtained solution from our process is the closest to the origin. Moreover, we also give an illustrative numerical example to support our results.Keywords: asymptotically quasi-nonexpansive nonself-mapping, strong convergence, fixed point, uniformly convex and uniformly smooth Banach space
Procedia PDF Downloads 2591303 A Data Driven Approach for the Degradation of a Lithium-Ion Battery Based on Accelerated Life Test
Authors: Alyaa M. Younes, Nermine Harraz, Mohammad H. Elwany
Abstract:
Lithium ion batteries are currently used for many applications including satellites, electric vehicles and mobile electronics. Their ability to store relatively large amount of energy in a limited space make them most appropriate for critical applications. Evaluation of the life of these batteries and their reliability becomes crucial to the systems they support. Reliability of Li-Ion batteries has been mainly considered based on its lifetime. However, another important factor that can be considered critical in many applications such as in electric vehicles is the cycle duration. The present work presents the results of an experimental investigation on the degradation behavior of a Laptop Li-ion battery (type TKV2V) and the effect of applied load on the battery cycle time. The reliability was evaluated using an accelerated life test. Least squares linear regression with median rank estimation was used to estimate the Weibull distribution parameters needed for the reliability functions estimation. The probability density function, failure rate and reliability function under each of the applied loads were evaluated and compared. An inverse power model is introduced that can predict cycle time at any stress level given.Keywords: accelerated life test, inverse power law, lithium-ion battery, reliability evaluation, Weibull distribution
Procedia PDF Downloads 1671302 Modeling of the Cellular Uptake of Rigid Nanoparticles: Investigating the Influence of the Adaptation of the Cell’s Mechanical Properties during Endocytosis
Authors: Sarah Iaquinta, Christophe Blanquart, Elena Ishow, Sylvain Freour, Frederic Jacquemin, Shahram Khazaie
Abstract:
Nanoparticles have recently emerged as a possible cancer treatment tool. Several formulations have been used to enhance the uptake of these nanoparticles by cancer cells and avoid their immediate clearance when administrated in vivo. Most of the previous studies focus on the investigation of the influence of the mechanical properties of the cell membrane and the particle. However, these studies do not account for the variation of adhesion and tension during the wrapping of the nanoparticle by the membrane. These couplings should be considered since the cell adapts to the interaction with the nanoparticle by, e.g., increasing the number of interactions (consequently leading to an increase of the cell membrane/nanoparticle adhesion) and by reorganizing its cytoskeleton, leading to the releasing of the tension of the cell membrane. The main contribution of this work is the proposal of a novel model for representing the cellular uptake of rigid circular nanoparticles based on an energetic model tailored to take into account the adaptation of the nanoparticle/cell membrane adhesion and of the membrane stress during wrapping. Several coupling models using sigmoidal functions are considered and compared. The study calculations revealed that the results considering constant parameters underestimated the final wrapping degree of the particle by up to 50%.Keywords: adhesion, cellular adaptation, cellular uptake, mechanical properties, tension
Procedia PDF Downloads 2101301 Analysis of Combined Heat Transfer through the Core Materials of VIPs with Various Scattering Properties
Authors: Jaehyug Lee, Tae-Ho Song
Abstract:
Vacuum insulation panel (VIP) can achieve very low thermal conductivity by evacuating its inner space. Heat transfer in the core materials of highly-evacuated VIP occurs by conduction through the solid structure and radiation through the pore. The effect of various scattering modes in combined conduction-radiation in VIP is investigated through numerical analysis. The discrete ordinates interpolation method (DOIM) incorporated with the commercial code FLUENT® is employed. It is found that backward scattering is more effective in reducing the total heat transfer while isotropic scattering is almost identical with pure absorbing/emitting case of the same optical thickness. For a purely scattering medium, the results agree well with additive solution with diffusion approximation, while a modified term is added in the effect of optical thickness to backward scattering is employed. For other scattering phase functions, it is also confirmed that backwardly scattering phase function gives a lower effective thermal conductivity. Thus, the materials with backward scattering properties, with radiation shields are desirable to lower the thermal conductivity of VIPs.Keywords: combined conduction and radiation, discrete ordinates interpolation method, scattering phase function, vacuum insulation panel
Procedia PDF Downloads 3641300 A Distributed Cryptographically Generated Address Computing Algorithm for Secure Neighbor Discovery Protocol in IPv6
Authors: M. Moslehpour, S. Khorsandi
Abstract:
Due to shortage in IPv4 addresses, transition to IPv6 has gained significant momentum in recent years. Like Address Resolution Protocol (ARP) in IPv4, Neighbor Discovery Protocol (NDP) provides some functions like address resolution in IPv6. Besides functionality of NDP, it is vulnerable to some attacks. To mitigate these attacks, Internet Protocol Security (IPsec) was introduced, but it was not efficient due to its limitation. Therefore, SEND protocol is proposed to automatic protection of auto-configuration process. It is secure neighbor discovery and address resolution process. To defend against threats on NDP’s integrity and identity, Cryptographically Generated Address (CGA) and asymmetric cryptography are used by SEND. Besides advantages of SEND, its disadvantages like the computation process of CGA algorithm and sequentially of CGA generation algorithm are considerable. In this paper, we parallel this process between network resources in order to improve it. In addition, we compare the CGA generation time in self-computing and distributed-computing process. We focus on the impact of the malicious nodes on the CGA generation time in the network. According to the result, although malicious nodes participate in the generation process, CGA generation time is less than when it is computed in a one-way. By Trust Management System, detecting and insulating malicious nodes is easier.Keywords: NDP, IPsec, SEND, CGA, modifier, malicious node, self-computing, distributed-computing
Procedia PDF Downloads 2771299 Estimation of Optimum Parameters of Non-Linear Muskingum Model of Routing Using Imperialist Competition Algorithm (ICA)
Authors: Davood Rajabi, Mojgan Yazdani
Abstract:
Non-linear Muskingum model is an efficient method for flood routing, however, the efficiency of this method is influenced by three applied parameters. Therefore, efficiency assessment of Imperialist Competition Algorithm (ICA) to evaluate optimum parameters of non-linear Muskingum model was addressed through this study. In addition to ICA, Genetic Algorithm (GA) and Particle Swarm Optimization (PSO) were also used aiming at an available criterion to verdict ICA. In this regard, ICA was applied for Wilson flood routing; then, routing of two flood events of DoAab Samsami River was investigated. In case of Wilson flood that the target function was considered as the sum of squared deviation (SSQ) of observed and calculated discharges. Routing two other floods, in addition to SSQ, another target function was also considered as the sum of absolute deviations of observed and calculated discharge. For the first floodwater based on SSQ, GA indicated the best performance, however, ICA was on first place, based on SAD. For the second floodwater, based on both target functions, ICA indicated a better operation. According to the obtained results, it can be said that ICA could be used as an appropriate method to evaluate the parameters of Muskingum non-linear model.Keywords: Doab Samsami river, genetic algorithm, imperialist competition algorithm, meta-exploratory algorithms, particle swarm optimization, Wilson flood
Procedia PDF Downloads 5021298 Skin Substitutes for Wound Healing: An Advanced Formulation
Authors: Pennisi Stefania, Giuffrida Graziella, Coppa Federica, Iannello Giulia, Cartelli Simone, Lo Faro Riccardo, Ferruggia Greta, Brundo Maria Violetta
Abstract:
Tissue engineering aims to develop advanced medical devices to restore normal functions of damaged tissue. These devices, even more effective than conventional methods, are called skin substitutes and are configured as drugs to be applied to the damaged area, to heal extensive and deep wounds which could otherwise lead to chronic wounds lasting over time. Among the variety of commercially available skin substitutes, those that have proven to be most effective are those consisting of a bilayer scaffold. The aim of our research was to design a skin substitute which can promote cell proliferation, cell migration and angiogenesis, and which can guarantee timely closure of the wound with satisfactory aesthetic results, in order to avoid the patient excessive pain, risk of contracting infections and long-term hospitalization. The product was tested in vitro using the Scratch Assay. The assay was carried out both on the matrix modified with hyaluronic acid and on the matrix based only on collagen. In both cases, after 48 hours of exposure the wound scratch was almost completely closed in treated cells compared to untreated control.Keywords: collagen, hyaluronic acid, scratch- wound-healing assay, tissue regeneration
Procedia PDF Downloads 231297 Performance Analysis of Domotics System as Real-Time Non-Intrusive Load Monitoring
Authors: Dauda A. Oladosu, Kamorudeen A Olaiya, Abdurahman Bello
Abstract:
The deployment of smart meters by utility providers to gather fine grained spatiotemporal consumption data has grossly influenced the consumers’ emotion and behavior towards energy utilization. The quest for reduction in power consumption is now a subject of concern and one the methods adopted by the consumers to achieve this is Non-intrusive Load (appliance) Monitoring. Hence, this work presents performance Analysis of Domotics System as a tool for load monitoring when integrated with Consumer Control Unit of residential building. The system was developed with basic elements which enhance remote sensing, DTMF (Dual Tone Multi-frequency) recognition and cryptic messaging when specific task was performed. To demonstrate its applicability and suitability, this prototype was used consistently for six months at different load demands and the utilities consumed were documented. The results obtained shows good response when phone dialed, and the packet delivery of feedback SMS was quite satisfactory, making the implemented system to be of good quality with affordable cost and performs the desired functions. Besides, comparative analysis showed notable reduction in energy consumption and invariably lessened electrical bill of the consumer.Keywords: automation, domotics, energy, load, remote, schedule
Procedia PDF Downloads 3171296 Immuno-field Effect Transistor Using Carbon Nanotubes Network – Based for Human Serum Albumin Highly Sensitive Detection
Authors: Muhamad Azuddin Hassan, Siti Shafura Karim, Ambri Mohamed, Iskandar Yahya
Abstract:
Human serum albumin plays a significant part in the physiological functions of the human body system (HSA).HSA level monitoring is critical for early detection of HSA-related illnesses. The goal of this study is to show that a field effect transistor (FET)-based immunosensor can assess HSA using high aspect ratio carbon nanotubes network (CNT) as a transducer. The CNT network were deposited using air brush technique, and the FET device was made using a shadow mask process. Field emission scanning electron microscopy and a current-voltage measurement system were used to examine the morphology and electrical properties of the CNT network, respectively. X-ray photoelectron spectroscopy and Fourier transform infrared spectroscopy were used to confirm the surface alteration of the CNT. The detection process is based on covalent binding interactions between an antibody and an HSA target, which resulted in a change in the manufactured biosensor's drain current (Id).In a linear range between 1 ng/ml and 10zg/ml, the biosensor has a high sensitivity of 0.826 mA (g/ml)-1 and a LOD value of 1.9zg/ml.HSA was also identified in a genuine serum despite interference from other biomolecules, demonstrating the CNT-FET immunosensor's ability to quantify HSA in a complex biological environment.Keywords: carbon nanotubes network, biosensor, human serum albumin
Procedia PDF Downloads 1351295 Parallel Gripper Modelling and Design Optimization Using Multi-Objective Grey Wolf Optimizer
Authors: Golak Bihari Mahanta, Bibhuti Bhusan Biswal, B. B. V. L. Deepak, Amruta Rout, Gunji Balamurali
Abstract:
Robots are widely used in the manufacturing industry for rapid production with higher accuracy and precision. With the help of End-of-Arm Tools (EOATs), robots are interacting with the environment. Robotic grippers are such EOATs which help to grasp the object in an automation system for improving the efficiency. As the robotic gripper directly influence the quality of the product due to the contact between the gripper surface and the object to be grasped, it is necessary to design and optimize the gripper mechanism configuration. In this study, geometric and kinematic modeling of the parallel gripper is proposed. Grey wolf optimizer algorithm is introduced for solving the proposed multiobjective gripper optimization problem. Two objective functions developed from the geometric and kinematic modeling along with several nonlinear constraints of the proposed gripper mechanism is used to optimize the design variables of the systems. Finally, the proposed methodology compared with a previously proposed method such as Teaching Learning Based Optimization (TLBO) algorithm, NSGA II, MODE and it was seen that the proposed method is more efficient compared to the earlier proposed methodology.Keywords: gripper optimization, metaheuristics, , teaching learning based algorithm, multi-objective optimization, optimal gripper design
Procedia PDF Downloads 1871294 Strict Stability of Fuzzy Differential Equations by Lyapunov Functions
Authors: Mustafa Bayram Gücen, Coşkun Yakar
Abstract:
In this study, we have investigated the strict stability of fuzzy differential systems and we compare the classical notion of strict stability criteria of ordinary differential equations and the notion of strict stability of fuzzy differential systems. In addition that, we present definitions of stability and strict stability of fuzzy differential equations and also we have some theorems and comparison results. Strict Stability is a different stability definition and this stability type can give us an information about the rate of decay of the solutions. Lyapunov’s second method is a standard technique used in the study of the qualitative behavior of fuzzy differential systems along with a comparison result that allows the prediction of behavior of a fuzzy differential system when the behavior of the null solution of a fuzzy comparison system is known. This method is a usefull for investigating strict stability of fuzzy systems. First of all, we present definitions and necessary background material. Secondly, we discuss and compare the differences between the classical notion of stability and the recent notion of strict stability. And then, we have a comparison result in which the stability properties of the null solution of the comparison system imply the corresponding stability properties of the fuzzy differential system. Consequently, we give the strict stability results and a comparison theorem. We have used Lyapunov second method and we have proved a comparison result with scalar differential equations.Keywords: fuzzy systems, fuzzy differential equations, fuzzy stability, strict stability
Procedia PDF Downloads 2481293 Effect of Downstream Pressure in Tuning the Flow Control Orifices of Pressure Fed Reaction Control System Thrusters
Authors: Prakash M.N, Mahesh G, Muhammed Rafi K.M, Shiju P. Nair
Abstract:
Introduction: In launch vehicle missions, Reaction Control thrusters are being used for the three-axis stabilization of the vehicle during the coasting phases. A pressure-fed propulsion system is used for the operation of these thrusters due to its less complexity. In liquid stages, these thrusters are designed to draw propellant from the same tank used for the main propulsion system. So in order to regulate the propellant flow rates of these thrusters, flow control orifices are used in feed lines. These orifices are calibrated separately as per the flow rate requirement of individual thrusters for the nominal operating conditions. In some missions, it was observed that the thrusters were operated at higher thrust than nominal. This point was addressed through a series of cold flow and hot tests carried out in-ground and this paper elaborates the details of the same. Discussion: In order to find out the exact reason for this phenomenon, two flight configuration thrusters were identified and hot tested in the ground with calibrated orifices and feed lines. During these tests, the chamber pressure, which is directly proportional to the thrust, is measured. In both cases, chamber pressures higher than the nominal by 0.32bar to 0.7bar were recorded. The increase in chamber pressure is due to an increase in the oxidizer flow rate of both the thrusters. Upon further investigation, it is observed that the calibration of the feed line is done with ambient pressure downstream. But in actual flight conditions, the orifices will be subjected to operate with 10 to 11bar pressure downstream. Due to this higher downstream pressure, the flow through the orifices increases and thereby, the thrusters operate with higher chamber pressure values. Conclusion: As part of further investigatory tests, two numbers of fresh thrusters were realized. Orifice tuning of these thrusters was carried out in three different ways. In the first trial, the orifice tuning was done by simulating 1bar pressure downstream. The second trial was done with the injector assembled downstream. In the third trial, the downstream pressure equal to the flight injection pressure was simulated downstream. Using these calibrated orifices, hot tests were carried out in simulated vacuum conditions. Chamber pressure and flow rate values were exactly matching with the prediction for the second and third trials. But for the first trial, the chamber pressure values obtained in the hot test were more than the prediction. This clearly shows that the flow is detached in the 1st trial and attached for the 2nd & 3rd trials. Hence, the error in tuning the flow control orifices is pinpointed as the reason for this higher chamber pressure observed in flight.Keywords: reaction control thruster, propellent, orifice, chamber pressure
Procedia PDF Downloads 1991292 Judicial Analysis of the Burden of Proof on the Perpetrator of Corruption Criminal Act
Authors: Rahmayanti, Theresia Simatupang, Ronald H. Sianturi
Abstract:
Corruption criminal act develops rapidly since in the transition era there is weakness in law. Consequently, there is an opportunity for a few people to do fraud and illegal acts and to misuse their positions and formal functions in order to make them rich, and the criminal acts are done systematically and sophisticatedly. Some people believe that legal provisions which specifically regulate the corruption criminal act; namely, Law No. 31/1999 in conjunction with Law No. 20/2001 on the Eradication of Corruption Criminal Act are not effective any more, especially in onus probandi (the burden of proof) on corruptors. The research was a descriptive analysis, a research method which is used to obtain description on a certain situation or condition by explaining the data, and the conclusion is drawn through some analyses. The research used judicial normative approach since it used secondary data as the main data by conducting library research. The system of the burden of proof, which follows the principles of reversal of the burden of proof stipulated in Article 12B, paragraph 1 a and b, Article 37A, and Article 38B of Law No. 20/2001 on the Amendment of Law No. 31/1999, is used only as supporting evidence when the principal case is proved. Meanwhile, how to maximize the implementation of the burden of proof on the perpetrators of corruption criminal act in which the public prosecutor brings a corruption case to Court, depends upon the nature of the case and the type of indictment. The system of burden of proof can be used to eradicate corruption in the Court if some policies and general principles of justice such as independency, impartiality, and legal certainty, are applied.Keywords: burden of proof, perpetrator, corruption criminal act
Procedia PDF Downloads 320