Search results for: discovery of misattributed paternity
454 RNA Interference Technology as a Veritable Tool for Crop Improvement and Breeding for Biotic Stress Resistance
Authors: M. Yusuf
Abstract:
The recent discovery of the phenomenon of RNA interference has led to its application in various aspects of plant improvement. Crops can be modified by engineering novel RNA interference pathways that create small RNA molecules to alter gene expression in crops or plant pests. RNA interference can generate new crop quality traits or provide protection against insects, nematodes and pathogens without introducing new proteins into food and feed products. This is an advantage in contrast with conventional procedures of gene transfer. RNA interference has been used to develop crop varieties resistant to diseases, pathogens and insects. Male sterility has been engineered in plants using RNA interference. Better quality crops have been developed through the application of RNA interference etc. The objective of this paper is to highlight the application of RNA interference in crop improvement and to project its potential future use to solve problems of agricultural production in relation to plant breeding.Keywords: RNA interference, application, crop Improvement, agricultural production
Procedia PDF Downloads 426453 A Review of the Parameters Used in Gateway Selection Schemes for Internet Connected MANETs
Authors: Zainab S. Mahmood, Aisha H. Hashim, Wan Haslina Hassan, Farhat Anwar
Abstract:
The wide use of the internet-based applications bring many challenges to the researchers to guarantee the continuity of the connections needed by the mobile hosts and provide reliable Internet access for them. One of proposed solutions by Internet Engineering Task Force (IETF) is to connect the local, multi-hop, and infrastructure-less Mobile Ad hoc Network (MANET) with Internet structure. This connection is done through multi-interface devices known as Internet Gateways. Many issues are related to this connection like gateway discovery, hand off, address auto-configuration and selecting the optimum gateway when multiple gateways exist. Many studies were done proposing gateway selection schemes with a single selection criterion or weighted multiple criteria. In this research, a review of some of these schemes is done showing the differences, the features, the challenges and the drawbacks of each of them.Keywords: Internet Gateway, MANET, mobility, selection criteria
Procedia PDF Downloads 423452 Testing Depression in Awareness Space: A Proposal to Evaluate Whether a Psychotherapeutic Method Based on Spatial Cognition and Imagination Therapy Cures Moderate Depression
Authors: Lucas Derks, Christine Beenhakker, Michiel Brandt, Gert Arts, Ruud van Langeveld
Abstract:
Background: The method Depression in Awareness Space (DAS) is a psychotherapeutic intervention technique based on the principles of spatial cognition and imagination therapy with spatial components. The basic assumptions are: mental space is the primary organizing principle in the mind, and all psychological issues can be treated by first locating and by next relocating the conceptualizations involved. The most clinical experience was gathered over the last 20 years in the area of social issues (with the social panorama model). The latter work led to the conclusion that a mental object (image) gains emotional impact when it is placed more central, closer and higher in the visual field – and vice versa. Changing the locations of mental objects in space thus alters the (socio-) emotional meaning of the relationships. The experience of depression seems always associated with darkness. Psychologists tend to see the link between depression and darkness as a metaphor. However, clinical practice hints to the existence of more literal forms of darkness. Aims: The aim of the method Depression in Awareness Space is to reduce the distress of clients with depression in the clinical counseling practice, as a reliable alternative method of psychological therapy for the treatment of depression. The method Depression in Awareness Space aims at making dark areas smaller, lighter and more transparent in order to identify the problem or the cause of the depression which lies behind the darkness. It was hypothesized that the darkness is a subjective side-effect of the neurological process of repression. After reducing the dark clouds the real problem behind the depression becomes more visible, allowing the client to work on it and in that way reduce their feelings of depression. This makes repression of the issue obsolete. Results: Clients could easily get into their 'sadness' when asked to do so and finding the location of the dark zones proved pretty easy as well. In a recent pilot study with five participants with mild depressive symptoms (measured on two different scales and tested against an untreated control group with similar symptoms), the first results were also very promising. If the mental spatial approach to depression can be proven to be really effective, this would be very good news. The Society of Mental Space Psychology is now looking for sponsoring of an up scaled experiment. Conclusions: For spatial cognition and the research into spatial psychological phenomena, the discovery of dark areas can be a step forward. Beside out of pure scientific interest, it is great to know that this discovery has a clinical implication: when darkness can be connected to depression. Also, darkness seems to be more than metaphorical expression. Progress can be monitored over measurement tools that quantify the level of depressive symptoms and by reviewing the areas of darkness.Keywords: depression, spatial cognition, spatial imagery, social panorama
Procedia PDF Downloads 169451 A Reactive Fast Inter-MAP Handover for Hierarchical Mobile IPv6
Authors: Pyung Soo Kim
Abstract:
This paper proposes an optimized reactive fast intermobility anchor point (MAP) handover scheme for Hierarchical Mobile IPv6, called the ORFH-HMIPv6, to minimize packet loss of the existing scheme. The key idea of the proposed ORFHHMIPv6 scheme is that the serving MAP buffers packets toward the mobile node (MN) as soon as the link layer between MN and serving base station is disconnected. To implement the proposed scheme, the MAP discovery message exchanged between MN and serving MAP is extended. In addition, the IEEE 802.21 Media Independent Handover Function (MIHF) event service message is defined newly. Through analytic performance evaluation, the proposed ORFH-HMIPv6 scheme can be shown to minimize packet loss much than the existing scheme.Keywords: hierarchical mobile IPv6 (HMIPv6), fast handover, reactive behavior, packet loss
Procedia PDF Downloads 213450 A Case Study: Beginning Teacher's Experiences of Mentoring in Secondary Education
Authors: Abdul Rofiq Badril Rizal M. Z.
Abstract:
This case study examines the experiences of four beginning teachers currently working in New South Wales secondary schools. Data were collected from semi-structured interviews conducted one on one over the period of one month. The data were coded with findings reported through key areas of discovery, which linked to the research presented in the literature review. The participants involved in the case study all reported positive experiences with mentoring, though none were given the opportunity to take part in a formal mentoring program, and all the mentors offered their time voluntarily. The mentoring took different forms, but the support most valued by the participants was the emotional and curriculum related supported received. All participants wished they had greater access to mentoring and felt it would have benefits for most beginning teachers. The study highlights ongoing issues around the lack of access to mentoring, which could be due to factors such as funding, time and training.Keywords: mentor, mentee, pre-service teacher, beginning teacher
Procedia PDF Downloads 108449 Hybrid Reliability-Similarity-Based Approach for Supervised Machine Learning
Authors: Walid Cherif
Abstract:
Data mining has, over recent years, seen big advances because of the spread of internet, which generates everyday a tremendous volume of data, and also the immense advances in technologies which facilitate the analysis of these data. In particular, classification techniques are a subdomain of Data Mining which determines in which group each data instance is related within a given dataset. It is used to classify data into different classes according to desired criteria. Generally, a classification technique is either statistical or machine learning. Each type of these techniques has its own limits. Nowadays, current data are becoming increasingly heterogeneous; consequently, current classification techniques are encountering many difficulties. This paper defines new measure functions to quantify the resemblance between instances and then combines them in a new approach which is different from actual algorithms by its reliability computations. Results of the proposed approach exceeded most common classification techniques with an f-measure exceeding 97% on the IRIS Dataset.Keywords: data mining, knowledge discovery, machine learning, similarity measurement, supervised classification
Procedia PDF Downloads 464448 Verification of the Effect of the Hazard-Perception Training Tool for Drivers Ported from a Tablet Device to a Smartphone
Authors: K. Shimazaki, M. Mishina, A. Fujii
Abstract:
In a previous study, we developed a hazard-perception training tool for drivers using a tablet device and verified its effectiveness. Accident movies recorded by drive recorders were separated into scenes before and after the collision. The scene before the collision is presented to the driver. The driver then touches the screen to point out where he/she feels danger. After the screen is touched, the tool presents the collision scene and tells the driver if what he/she pointed out is correct. Various effects were observed such as this tool increased the discovery rate of collision targets and reduced the reaction time. In this study, we optimized this tool for the smartphone and verified its effectiveness. Verifying in the same way as in the previous study on tablet devices clarified that the same effect can be obtained on the smartphone screen.Keywords: hazard perception, smartphone, tablet devices, driver education
Procedia PDF Downloads 218447 Heat Transfer Studies on CNT Nanofluids in a Turbulent Flow Heat Exchanger
Authors: W. Rashmi, M. Khalid, O. Seiksan, R. Saidur, A. F. Ismail
Abstract:
Nanofluids have received much more attention since its discovery. They are believed to be promising coolants in heat transfer applications due to their enhanced thermal conductivity and heat transfer characteristics. In this study, the enhancement in heat transfer of CNT-nanofluids under turbulent flow conditions is investigated experimentally. Carbon nanotube (CNTs) concentration was varied between 0.051-0.085 wt%. The nanofluid suspension was stabilized by gum arabic (GA) through a process of homogenisation and sonication. The flow rates of cold fluid (water) is varied from 1.7-3 L/min and flow rates of the hot fluid is varied between 2-3.5 L/min. Thermal conductivity, density and viscosity of the nanofluids were also measured as a function of temperature and CNT concentration. The experimental results are validated with theoretical correlations for turbulent flow available in the literature. Results showed an enhancement in heat transfer range between 9-67% as a function of temperature and CNT concentration.Keywords: nanofluids, carbon nanotubes (CNT), heat transfer enhancement, heat transfer
Procedia PDF Downloads 500446 A Taxonomy of Routing Protocols in Wireless Sensor Networks
Authors: A. Kardi, R. Zagrouba, M. Alqahtani
Abstract:
The Internet of Everything (IoE) presents today a very attractive and motivating field of research. It is basically based on Wireless Sensor Networks (WSNs) in which the routing task is the major analysis topic. In fact, it directly affects the effectiveness and the lifetime of the network. This paper, developed from recent works and based on extensive researches, proposes a taxonomy of routing protocols in WSNs. Our main contribution is that we propose a classification model based on nine classes namely application type, delivery mode, initiator of communication, network architecture, path establishment (route discovery), network topology (structure), protocol operation, next hop selection and latency-awareness and energy-efficient routing protocols. In order to provide a total classification pattern to serve as reference for network designers, each class is subdivided into possible subclasses, presented, and discussed using different parameters such as purposes and characteristics.Keywords: routing, sensor, survey, wireless sensor networks, WSNs
Procedia PDF Downloads 182445 The Molecular Biology Behind the Spread of Breast Cancer Inflammatory Breast Cancer: Symptoms and Genetic Factors
Authors: Fakhrosadat Sajjadian
Abstract:
In the USA, about 5% of women diagnosed with breast cancer annually are affected by Inflammatory Breast Cancer (IBC), which is a highly aggressive type of Locally Advanced Breast Cancer (LABC). It is a type of LABC that is clinically and pathologically different, known for its rapid growth, invasiveness, and ability to promote the growth of blood vessels. Almost all women are found to have lymph nodes affected upon diagnosis, while around 36% show obvious distant metastases. Even with the latest improvements in multimodality therapies, the outlook for patients with IBC remains bleak, as the average disease-free survival time is less than 2.5 years. Recent research on the genetic factors responsible for the IBC phenotype has resulted in the discovery of genes that play a role in the advancement of this illness. The development of primary human cell lines and animal models has assisted in this research. These advancements offer new possibilities for future actions in identifying and treating IBC.Keywords: breast cancer, inflammation, diagnosis, IBC, LABC
Procedia PDF Downloads 43444 The Constructivist Approach to Teaching Second Language Writing
Authors: Andreea Cervatiuc
Abstract:
This study focuses on teaching second language writing through a constructivist approach. Unlike traditional approaches to teaching second language writing, which were product-oriented and emphasized surface features of writing, such as spelling and grammar, the constructivist approach to teaching second language writing is process-oriented and fosters discovery of meaning, creativity, collaboration, and writing for an audience. Educators who take a constructivist approach to teaching second language writing create communities of writers in their classrooms, emphasize that the goal of writing is to share ideas with others, and engage their students in collaborative, creative, and authentic writing activities, such as writing conferences, group story writing, finish the story, and chain writing. The constructivist approach to teaching second language writing combines a focus on genres, scaffolding, and treating writing as a process. Through constructivist writing, students co-create knowledge and engage in meaningful dialogue with various texts and their peers. The findings of this study can have implications for applied linguists, teachers, and language learners.Keywords: constructivist second language, writing genres, process writing, scaffolding
Procedia PDF Downloads 10443 The Conservation of the Botanical Collar of Tutankhamun
Authors: Safwat Mohamed Sayed Ali, Hussein Kamal
Abstract:
This paper discusses the conservation procedures of the botanical collar of King Tutankhamun. It dates back to the new Kingdom. This collar was kept in a box but found in bad condition. Many parts of the collar were separated. The collar suffered from dryness and dust, so it needed to be cleaned mechanically and recollected together. Japanese paper was used to collect the separated parts of the collar on a linen thread. The linen thread was dyed with organic dye to match the color of the plant material. The guidance in collecting the different parts of the plant collar is the original photograph captured at the discovery of the tomb. Also, the optical microscope was used in collecting fractured parts. The weak parts of the collar were treated with a suitable consolidation material. Klucel G dissolved in Ethyl Alcohol 0.5% was used in the treatment and gave convenient results. Some investigations were executed in order to identify the plant types used in making the botanical collar. Scanning Electron microscope and optical microscope were used in plant identification.Keywords: sustainable, consolidation, plant, investigation
Procedia PDF Downloads 80442 Activation of Caspase 3 by Terpenoids and Flavonoids in Cancer Cell Lines
Authors: Nusrat Masood, Vijaya Dubey, Suaib Luqman
Abstract:
Caspase 3, a member of cysteine-aspartic acid protease family, is an imperative indicator for cell death particularly when substantiating apoptosis. Thus, caspase 3 is an interesting target for the discovery and development of anticancer agent. We adopted a four level assessment of both terpenoids and flavonoids and thus experimentally performed the enzymatic assay in cell free system as well as in cancer cell line which was validated through real time expression and molecular interaction studies. A significant difference was observed with both the class of natural products indicating terpenoids as better activators of caspase 3 compared to flavonoids both in the cell free system as well as in cell lines. The expression analysis, activation constant and binding energy also correlate well with the enzyme activity. Overall, terpenoids had an unswerving effect on caspase 3 in all the tested system while flavonoids indirectly affect enzyme activity.Keywords: Caspase 3, terpenoids, flavonoids, activation constant, binding energy
Procedia PDF Downloads 238441 Machine Learning Application in Shovel Maintenance
Authors: Amir Taghizadeh Vahed, Adithya Thaduri
Abstract:
Shovels are the main components in the mining transportation system. The productivity of the mines depends on the availability of shovels due to its high capital and operating costs. The unplanned failure/shutdowns of a shovel results in higher repair costs, increase in downtime, as well as increasing indirect cost (i.e. loss of production and company’s reputation). In order to mitigate these failures, predictive maintenance can be useful approach using failure prediction. The modern mining machinery or shovels collect huge datasets automatically; it consists of reliability and maintenance data. However, the gathered datasets are useless until the information and knowledge of data are extracted. Machine learning as well as data mining, which has a major role in recent studies, has been used for the knowledge discovery process. In this study, data mining and machine learning approaches are implemented to detect not only anomalies but also patterns from a dataset and further detection of failures.Keywords: maintenance, machine learning, shovel, conditional based monitoring
Procedia PDF Downloads 218440 Knowledge Discovery and Data Mining Techniques in Textile Industry
Authors: Filiz Ersoz, Taner Ersoz, Erkin Guler
Abstract:
This paper addresses the issues and technique for textile industry using data mining techniques. Data mining has been applied to the stitching of garments products that were obtained from a textile company. Data mining techniques were applied to the data obtained from the CHAID algorithm, CART algorithm, Regression Analysis and, Artificial Neural Networks. Classification technique based analyses were used while data mining and decision model about the production per person and variables affecting about production were found by this method. In the study, the results show that as the daily working time increases, the production per person also decreases. In addition, the relationship between total daily working and production per person shows a negative result and the production per person show the highest and negative relationship.Keywords: data mining, textile production, decision trees, classification
Procedia PDF Downloads 349439 Graph Planning Based Composition for Adaptable Semantic Web Services
Authors: Rihab Ben Lamine, Raoudha Ben Jemaa, Ikram Amous Ben Amor
Abstract:
This paper proposes a graph planning technique for semantic adaptable Web Services composition. First, we use an ontology based context model for extending Web Services descriptions with information about the most suitable context for its use. Then, we transform the composition problem into a semantic context aware graph planning problem to build the optimal service composition based on user's context. The construction of the planning graph is based on semantic context aware Web Service discovery that allows for each step to add most suitable Web Services in terms of semantic compatibility between the services parameters and their context similarity with the user's context. In the backward search step, semantic and contextual similarity scores are used to find best composed Web Services list. Finally, in the ranking step, a score is calculated for each best solution and a set of ranked solutions is returned to the user.Keywords: semantic web service, web service composition, adaptation, context, graph planning
Procedia PDF Downloads 520438 Maintaining the Tension between the Classic Seduction Theory and the Role of Unconscious Fantasies
Authors: Galit Harel
Abstract:
This article describes the long-term psychoanalytic psychotherapy of a young woman who had experienced trauma during her childhood. The details of the trauma were unknown, as all memory of the trauma had been repressed. Past trauma is analyzable through a prism of transference, dreaming and dreams, mental states, and thinking processes that offer an opportunity to explore and analyze the influence of both reality and fantasy on the patient. The presented case describes a therapeutic process that strives to discover hidden meanings through the unconscious system and illustrates the movement from unconscious to conscious during exploration of the patient’s personal trauma in treatment. The author discusses the importance of classical and contemporary psychoanalytic models of childhood sexual trauma through the discovery of manifest and latent content, unconscious fantasies, and actual events of trauma. It is suggested that the complexity of trauma is clarified by the tension between these models and by the inclusion of aspects of both of them for a complete understanding.Keywords: dreams, psychoanalytic psychotherapy, thinking processes, transference, trauma
Procedia PDF Downloads 91437 Genomic Analysis of Whole Genome Sequencing of Leishmania Major
Authors: Fatimazahrae Elbakri, Azeddine Ibrahimi, Meryem Lemrani, Dris Belghyti
Abstract:
Leishmaniasis represents a major public health problem because of the number of cases recorded each year and the wide distribution of the disease. It is a parasitic disease of flagellated protozoa transmitted by the bite of certain species of sandfly, causing a spectrum of clinical pathology in humans ranging from disfiguring skin lesions to fatal visceral leishmaniasis. Cutaneous leishmaniasis due to Leishmania major is a polymorphic disease; in fact, the infection can be asymptomatic, localized, or disseminated. The objective of this work is to determine the genomic diversity that contributes to clinical variability by trying to identify the variation in chromosome number and to extract SNPs and SNPs and InDels; it is based on four sequences (WGS) of Leishmania major available on NCBI in Fastq form, from three countries: Tunisia, Algeria, and Israel, the analysis is set up from a pipeline to facilitate the discovery of genetic diversity, in particular SNP and chromosomal somy.Keywords: Leshmania major, cutaneous Leishmania, NGS, genomic, somy, variant calling
Procedia PDF Downloads 79436 Analysis and Rule Extraction of Coronary Artery Disease Data Using Data Mining
Authors: Rezaei Hachesu Peyman, Oliyaee Azadeh, Salahzadeh Zahra, Alizadeh Somayyeh, Safaei Naser
Abstract:
Coronary Artery Disease (CAD) is one major cause of disability in adults and one main cause of death in developed. In this study, data mining techniques including Decision Trees, Artificial neural networks (ANNs), and Support Vector Machine (SVM) analyze CAD data. Data of 4948 patients who had suffered from heart diseases were included in the analysis. CAD is the target variable, and 24 inputs or predictor variables are used for the classification. The performance of these techniques is compared in terms of sensitivity, specificity, and accuracy. The most significant factor influencing CAD is chest pain. Elderly males (age > 53) have a high probability to be diagnosed with CAD. SVM algorithm is the most useful way for evaluation and prediction of CAD patients as compared to non-CAD ones. Application of data mining techniques in analyzing coronary artery diseases is a good method for investigating the existing relationships between variables.Keywords: classification, coronary artery disease, data-mining, knowledge discovery, extract
Procedia PDF Downloads 657435 Improving University Operations with Data Mining: Predicting Student Performance
Authors: Mladen Dragičević, Mirjana Pejić Bach, Vanja Šimičević
Abstract:
The purpose of this paper is to develop models that would enable predicting student success. These models could improve allocation of students among colleges and optimize the newly introduced model of government subsidies for higher education. For the purpose of collecting data, an anonymous survey was carried out in the last year of undergraduate degree student population using random sampling method. Decision trees were created of which two have been chosen that were most successful in predicting student success based on two criteria: Grade Point Average (GPA) and time that a student needs to finish the undergraduate program (time-to-degree). Decision trees have been shown as a good method of classification student success and they could be even more improved by increasing survey sample and developing specialized decision trees for each type of college. These types of methods have a big potential for use in decision support systems.Keywords: data mining, knowledge discovery in databases, prediction models, student success
Procedia PDF Downloads 406434 An Anthropological Perspective: Interaction with Extended Kinship in Saudi Arabia in the 21st Century
Authors: Alaa Alshehri
Abstract:
It has been thought that kinship in modernization is moving in a linear Western model; however, the literature shows that different cultures adjust to modernization by preserving its norms and values. Saudi Arabia is a young country experiencing rapid expansion from oil discovery until economic diversification. By conducting 10 interviews from different provinces of the country from the age of 27-47, these anthropological studies suggest that Saudi people adapted to modernization and globalization through unique interactions with extended families by asking the participants to give detailed descriptions of their interactions with their kinship. With almost all the participants noticing the changes within the last few years, this interaction is rooted in their religious beliefs, which they stressed, even with the free choice of life opportunities. They tried to find a balance between individuality and collectivity and connect the gap between the older and younger generations. This study adds to the anthropological debate on kinship definition and ties in modernization and provides a perspective on the social reality of one of the major Middle Eastern countries, Saudi Arabia.Keywords: collectivity, economic diversification, kinship, modernization theory, individuality
Procedia PDF Downloads 100433 Preparation of Gold Nanoparticles Stabilized in Acid-Activated Montmorillonite for Nitrophenol Reduction
Authors: Fatima Ammari, Meriem Chenouf
Abstract:
Synthesis of gold nanoparticles (AuNPs) has attracted much attention since the pioneering discovery of the high catalytic activity of supported gold nanoparticles in the reaction of CO oxidation at low temperature. In this research field, we used montmorillonite pre-acidified under gentle conditions for AuNPs stabilization; using different loading percentage 1, 2 and 5%. The gold nanoparticles were obtained using chemical reduction method using NaBH4 as reductant agent. The obtained gold nanoparticles stabilized in acid-activated montmorillonite were used as catalysts for reduction of 4-nitrophenol to aminophenol with sodium borohydride at room temperature The UV-Vis results confirm directly the gold nanaoparticles formation. The XRD N2 adsorption and MET results showed the formation of gold nanoparticles in the pores of preacidified montmorillonite with an average size of 5.7nm. The reduction reaction of 4-nitrophenol into 4-aminophenol with NaBH4 catalyzed by Au°-montmorillonite catalyst exhibits remarkably a high activity; the reaction was completed within 4.5min.Keywords: gold, acid-activated montmorillonite, nanoparticles, 4-nitrophenol
Procedia PDF Downloads 387432 An Efficient Mitigation Plan to Encounter Various Vulnerabilities in Internet of Things Enterprises
Authors: Umesh Kumar Singh, Abhishek Raghuvanshi, Suyash Kumar Singh
Abstract:
As IoT networks gain popularity, they are more susceptible to security breaches. As a result, it is crucial to analyze the IoT platform as a whole from the standpoint of core security concepts. The Internet of Things relies heavily on wireless networks, which are well-known for being susceptible to a wide variety of attacks. This article provides an analysis of many techniques that may be used to identify vulnerabilities in the software and hardware associated with the Internet of Things (IoT). In the current investigation, an experimental setup is built with the assistance of server computers, client PCs, Internet of Things development boards, sensors, and cloud subscriptions. Through the use of network host scanning methods and vulnerability scanning tools, raw data relating to IoT-based applications and devices may be collected. Shodan is a tool that is used for scanning, and it is also used for effective vulnerability discovery in IoT devices as well as penetration testing. This article presents an efficient mitigation plan for encountering vulnerabilities in the Internet of Things.Keywords: internet of things, security, privacy, vulnerability identification, mitigation plan
Procedia PDF Downloads 40431 2D Fingerprint Performance for PubChem Chemical Database
Authors: Fatimah Zawani Abdullah, Shereena Mohd Arif, Nurul Malim
Abstract:
The study of molecular similarity search in chemical database is increasingly widespread, especially in the area of drug discovery. Similarity search is an application in the field of Chemoinformatics to measure the similarity between the molecular structure which is known as the query and the structure of chemical compounds in the database. Similarity search is also one of the approaches in virtual screening which involves computational techniques and scoring the probabilities of activity. The main objective of this work is to determine the best fingerprint when compared to the other five fingerprints selected in this study using PubChem chemical dataset. This paper will discuss the similarity searching process conducted using 6 types of descriptors, which are ECFP4, ECFC4, FCFP4, FCFC4, SRECFC4 and SRFCFC4 on 15 activity classes of PubChem dataset using Tanimoto coefficient to calculate the similarity between the query structures and each of the database structure. The results suggest that ECFP4 performs the best to be used with Tanimoto coefficient in the PubChem dataset.Keywords: 2D fingerprints, Tanimoto, PubChem, similarity searching, chemoinformatics
Procedia PDF Downloads 293430 As a Secure Bridge Country about Oil and Gas Sources Transfer after Arab Spring: Turkey
Authors: Fatih Ercin Guney, Hami Karagol
Abstract:
Day by day, humanity's energy needs increase, to facilitate access to energy sources by energy importing countries is of great importance in terms of issues both in terms of economic security and political security. The geographical location of the oil exporting countries in the Middle East (Iran, Iraq, Kuwait, Libya, Saudi Arabia, United Arab Emirates, Qatar) today, it is observed that evaluated by emerging Arab Spring(from Tunisia to Egypt) and freedom battles(in Syria) with security issues arise sourced from terrorist activities(ISIS). Progresses related with limited natural resources, energy and it's transportation issues which worries the developing countries, the energy in the region is considered to how to transfer safely. North Region of the Black Sea , the beginning of the conflict in the regional nature formed between Russia and Ukraine (2010), followed by the relevant regions of the power transmission line (From Russia to Europe) the discovery is considered to be the east's hand began to strengthen in terms of both the economical and political sides. With the growing need for safe access to the west of the new energy transmission lines are followed by Turkey, re-interest is considered to be shifted to the Mediterranean and the Middle East by West. Also, Russia, Iran and China (three axis of east) are generally performing as carry out parallel policies about energy , economical side and security in both United Nations Security Council (Two of Five Permanent Members are Russia and China) and Shanghai Cooperation Organization. In addition, Eastern Mediterranean Region Tension are rapidly increasing about research new oil and natural gas sources by Israel, Egypt, Cyprus, Lebanon. This paper provides, new energy corridor(s) are needed to transfer sources (Oil&Natural Gas) by Europe from East to West. So The West needs either safe bridge country to transfer natural sources to Europe in region or is needed to discovery new natural sources in extraterritorial waters of Eastern Mediterranean Region. But in two opportunities are evaluated with secure transfer corridors form region to Europe in safely. Even if the natural sources can be discovered, they are considered to transfer in safe manner. This paper involved, Turkey’s importance as a leader country in region over both of political and safe energy transfer sides as bridge country between south and north of Turkey why natural sources shall be transferred over Turkey, Even if diplomatic issues-For Example; Cyprus membership in European Union, Turkey membership candidate duration, Israel-Cyprus- Egypt-Lebanon researches about new natural sources in Mediterranean - occurred. But politic balance in Middle-East is changing quickly because of lack of democratic governments in region. So it is evaluated that the alliance of natural sources researches may not be long-time relations due to share sources after discoveries. After evaluating over causes and reasons, aim to reach finding foresight about future of region for energy transfer periods in secure manner.Keywords: Middle East, natural gas, oil, Turkey
Procedia PDF Downloads 297429 A Ti₃C₂O₂ Supported Single Atom, Trifunctional Catalyst for Electrochemical Reactions
Authors: Zhanzhao Fu, Chongyi Ling, Jinlan Wang
Abstract:
Water splitting and rechargeable air-based batteries are emerging as new renewable energy storage and conversion technologies. However, the discovery of suitable catalysts with high activity and low cost remains a great challenge. In this work, we report a single-atom trifunctional catalyst, namely Ti₃C₂O₂ supported single Pd atom (Pd1@Ti₃C₂O₂), for the hydrogen evolution reaction (HER), oxygen evolution reaction (OER) and oxygen reduction reaction (ORR). This catalyst is selected from 12 candidates and possesses low overpotentials of 0.22 V, 0.31 V and 0.34 V for the HER, OER and ORR, respectively, making it an excellent electrocatalyst for both overall water splitting and rechargeable air-based batteries. The superior OER and ORR performance originates from the optimal d band center of the supported Pd atom. Moreover, the excellent activity can be maintained even if the single Pd atoms aggregate into small clusters. This work offers new opportunities for advancing the renewable energy storage and conversion technologies and paves a new way for the development of multifunctional electrocatalysts.Keywords: DFT, SACs, OER, ORR, HER
Procedia PDF Downloads 76428 Summarizing Data Sets for Data Mining by Using Statistical Methods in Coastal Engineering
Authors: Yunus Doğan, Ahmet Durap
Abstract:
Coastal regions are the one of the most commonly used places by the natural balance and the growing population. In coastal engineering, the most valuable data is wave behaviors. The amount of this data becomes very big because of observations that take place for periods of hours, days and months. In this study, some statistical methods such as the wave spectrum analysis methods and the standard statistical methods have been used. The goal of this study is the discovery profiles of the different coast areas by using these statistical methods, and thus, obtaining an instance based data set from the big data to analysis by using data mining algorithms. In the experimental studies, the six sample data sets about the wave behaviors obtained by 20 minutes of observations from Mersin Bay in Turkey and converted to an instance based form, while different clustering techniques in data mining algorithms were used to discover similar coastal places. Moreover, this study discusses that this summarization approach can be used in other branches collecting big data such as medicine.Keywords: clustering algorithms, coastal engineering, data mining, data summarization, statistical methods
Procedia PDF Downloads 361427 Evaluation of Fetal brain using Magnetic Resonance Imaging
Authors: Mahdi Farajzadeh Ajirlou
Abstract:
Ordinary fetal brain development can be considered by in vivo attractive reverberation imaging (MRI) from the 18th gestational week (GW) to term and depends fundamentally on T2-weighted and diffusion-weighted (DW) arrangements. The foremost commonly suspected brain pathologies alluded to fetal MRI for assist assessment are ventriculomegaly, lost corpus callosum, and anomalies of the posterior fossa. Brain division could be a crucial to begin with step in neuroimage examination. Within the case of fetal MRI it is especially challenging and critical due to the subjective introduction of the hatchling, organs that encompass the fetal head, and irregular fetal movement. A few promising strategies have been proposed but are constrained in their execution in challenging cases and in realtime division. Fetal MRI is routinely performed on a 1.5-Tesla scanner without maternal or fetal sedation. The mother lies recumbent amid the course of the examination, the length of which is ordinarily 45 to 60 minutes. The accessibility and continuous approval of standardizing fetal brain development directions will give critical devices for early discovery of impeded fetal brain development upon which to oversee high-risk pregnancies.Keywords: brain, fetal, MRI, imaging
Procedia PDF Downloads 79426 Heritage Value and Industrial Tourism Potential of the Urals, Russia
Authors: Anatoly V. Stepanov, Maria Y. Ilyushkina, Alexander S. Burnasov
Abstract:
Expansion of tourism, especially after WWII, has led to significant improvements in the regional infrastructure. The present study has revealed a lot of progress in the advancement of industrial heritage narrative in the Central Urals. The evidence comes from the general public’s increased fascination with some of Europe’s oldest mining and industrial sites, and the agreement of many stakeholders that the Urals industrial heritage should be preserved. The development of tourist sites in Nizhny Tagil and Nevyansk, gold-digging in Beryosovsky, gemstone search in Murzinka, and the progress with the Urals Gemstone Ring project are the examples showing the immense opportunities of industrial heritage tourism development in the region that are still to be realized. Regardless of the economic future of the Central Urals, whether it will remain an industrial region or experience a deeper deindustrialization, the sprouts of the industrial heritage tourism should be advanced and amplified for the benefit of local communities and the tourist community at large as it is hard to imagine a more suitable site for the discovery of industrial and mining heritage than the Central Urals Region of Russia.Keywords: industrial heritage, mining heritage, Central Urals, Russia
Procedia PDF Downloads 136425 Data Mining and Knowledge Management Application to Enhance Business Operations: An Exploratory Study
Authors: Zeba Mahmood
Abstract:
The modern business organizations are adopting technological advancement to achieve competitive edge and satisfy their consumer. The development in the field of Information technology systems has changed the way of conducting business today. Business operations today rely more on the data they obtained and this data is continuously increasing in volume. The data stored in different locations is difficult to find and use without the effective implementation of Data mining and Knowledge management techniques. Organizations who smartly identify, obtain and then convert data in useful formats for their decision making and operational improvements create additional value for their customers and enhance their operational capabilities. Marketers and Customer relationship departments of firm use Data mining techniques to make relevant decisions, this paper emphasizes on the identification of different data mining and Knowledge management techniques that are applied to different business industries. The challenges and issues of execution of these techniques are also discussed and critically analyzed in this paper.Keywords: knowledge, knowledge management, knowledge discovery in databases, business, operational, information, data mining
Procedia PDF Downloads 538