Search results for: data Integrity
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 24758

Search results for: data Integrity

24548 Molecular Insights into the Genetic Integrity of Long-Term Micropropagated Clones Using Start Codon Targeted (SCoT) Markers: A Case Study with Ansellia africana, an Endangered, Medicinal Orchid

Authors: Paromik Bhattacharyya, Vijay Kumar, Johannes Van Staden

Abstract:

Micropropagation is an important tool for the conservation of threatened and commercially important plant species of which orchids deserve special attention. Ansellia africana is one such medicinally important orchid species having much commercial significance. Thus, development of regeneration protocols for producing clonally stable regenerates using axillary buds is of much importance. However, for large-scale micropropagation to become not only successful but also acceptable by end-users, somaclonal variations occurring in the plantlets need to be eliminated. In the light of the various factors (genotype, ploidy level, in vitro culture age, explant and culture type, etc.) that may account for the somaclonal variations of divergent genetic changes at the cellular and molecular levels, genetic analysis of micropropagated plants using a multidisciplinary approach is of utmost importance. In the present study, the clonal integrity of the long term micropropagated A. africana plants were assessed using advanced molecular marker system i.e. Start Codon Targeted Polymorphism (SCoT). Our studies recorded a clonally stable regeneration protocol for A. africana with a very high degree of clonal fidelity amongst the regenerates. The results obtained from these molecular analyses could help in modifying the regeneration protocols for obtaining clonally stable true to type plantlets for sustainable commercial use.

Keywords: medicinal orchid micropropagation, start codon targeted polymorphism (SCoT), RAP), traditional African pharmacopoeia, genetic fidelity

Procedia PDF Downloads 401
24547 Anti-Aging Effects of Retinol and Alpha Hydroxy Acid on Elastin Fibers of Artificially Photo-Aged Human Dermal Fibroblast Cell Lines

Authors: Mohammed Jarrar, Shalini Behl, Nadia Shaheen, Abeer Fatima, Reem Nasab

Abstract:

Skin aging is a slow multifactorial process influenced by both internal as well as external factors. Ultra-violet radiations (UV), diet, smoking and personal habits are the most common environmental factors that affect skin aging. Fat contents and fibrous proteins as collagen and elastin are core internal structural components. The direct influence of UV on elastin integrity and health is crucial on aging of skin by time. The deposition of abnormal elastic material is a major marker in a photo-aged skin. Searching for compounds that may protect against cutaneous photo-damage is highly valued. Retinoids and Alpha Hydroxy Acids protective and or repairing effects of UV have been endorsed by some researchers. For consolidating a better understanding of anti and protective effects of such anti-aging agents, we evaluated the combinatory effects of various dosages of lactic acid and retinol on the dermal fibroblasts elastin levels exposed to UV. The UV exposed cells showed significant reduction in the elastin levels. A combination of drugs with a higher concentration of lactic acid (30-35 mM) and a lower concentration of retinol (10-15mg/mL) showed to work better in enhancing elastin concentration in UV exposed cells. We assume this enhancement could be the result of increased tropo-elastin gene expression stimulated by retinol and lactic acid probably repaired the UV irradiated damage by enhancing the amount and integrity of the elastin fibers.

Keywords: alpha hydroxy acid, elastin, retinol, ultraviolet radiations

Procedia PDF Downloads 313
24546 Infused Mesenchymal Stem Cells Ameliorate Organs Morphology in Cerebral Malaria Infection

Authors: Reva Sharan Thakur, Mrinalini Tiwari, Jyoti das

Abstract:

Cerebral malaria-associated over expression of pro-inflammatory cytokines and chemokines ultimately results in the up-regulation of adhesion molecules in the brain endothelium leading to sequestration of mature parasitized RBCs in the brain. The high-parasitic load subsequently results in increased mortality or development of neurological symptoms within a week of infection. Studies in the human and experimental cerebral malaria have implicated the breakdown of the integrity of blood-brain barrier during the lethal course of infection, cerebral dysfunction, and fatal organ pathologies that result in multi-organ failure. In the present study, using Plasmodium berghei Anka as a mouse model and in vitro conditions, we have investigated the effect of MSCs to attenuate cerebral malaria pathogenesis by diminishing the effect of inflammation altered organ morphology, reduced parasitemia, and increased survival of the mice. MSCs are also validated for their role in preventing BBB dysfunction and reducing malarial toxins. It was observed that administration of MSCs significantly reduced parasitemia and increased survival in Pb A infected mice. It was further demonstrated that MSCs play a significant role in reversing neurological complexities associated with cerebral malaria. Infusion of MSCs in infected mice decreased hemozoin deposition; oedema, and haemorrhagic lesions in vascular organs. MSCs administration also preserved the integrity of the blood-brain barrier and reduced neural inflammation. Taken together, our results demonstrate the potential of MSCs as an emerging anti-malarial candidate.

Keywords: cerebral malaria, mesenchymal stem cells, erythropoesis, cell death

Procedia PDF Downloads 80
24545 Debating the Ethical Questions of the Super Soldier

Authors: Jean-François Caron

Abstract:

The current attempts to develop what we can call 'super soldiers' are problematic in many regards. This is what this text will try to explore by concentrating primarily on the repercussions of this technology and medical research on the physical and psychological integrity of soldiers. It argues that medicines or technologies may affect soldiers’ psychological and mental features and deprive them of their capacity to reflect upon their actions as autonomous subjects and that such a possibility entails serious moral as well as judicial consequences.

Keywords: military research, super soldiers, involuntary intoxication, criminal responsibility

Procedia PDF Downloads 323
24544 Recent Advances in Data Warehouse

Authors: Fahad Hanash Alzahrani

Abstract:

This paper describes some recent advances in a quickly developing area of data storing and processing based on Data Warehouses and Data Mining techniques, which are associated with software, hardware, data mining algorithms and visualisation techniques having common features for any specific problems and tasks of their implementation.

Keywords: data warehouse, data mining, knowledge discovery in databases, on-line analytical processing

Procedia PDF Downloads 372
24543 How to Use Big Data in Logistics Issues

Authors: Mehmet Akif Aslan, Mehmet Simsek, Eyup Sensoy

Abstract:

Big Data stands for today’s cutting-edge technology. As the technology becomes widespread, so does Data. Utilizing massive data sets enable companies to get competitive advantages over their adversaries. Out of many area of Big Data usage, logistics has significance role in both commercial sector and military. This paper lays out what big data is and how it is used in both military and commercial logistics.

Keywords: big data, logistics, operational efficiency, risk management

Procedia PDF Downloads 615
24542 Intrusion Detection In MANET Using Game Theory

Authors: S. B. Kumbalavati, J. D. Mallapur, K. Y. Bendigeri

Abstract:

A mobile Ad-hoc network (MANET) is a multihop wireless network where nodes communicate each other without any pre-deployed infrastructure. There is no central administrating unit. Hence, MANET is generally prone to many of the attacks. These attacks may alter, release or deny data. These attacks are nothing but intrusions. Intrusion is a set of actions that attempts to compromise integrity, confidentiality and availability of resources. A major issue in the design and operation of ad-hoc network is sharing the common spectrum or common channel bandwidth among all the nodes. We are performing intrusion detection using game theory approach. Game theory is a mathematical tool for analysing problems of competition and negotiation among the players in any field like marketing, e-commerce and networking. In this paper mathematical model is developed using game theory approach and intruders are detected and removed. Bandwidth utilization is estimated and comparison is made between bandwidth utilization with intrusion detection technique and without intrusion detection technique. Percentage of intruders and efficiency of the network is analysed.

Keywords: ad-hoc network, IDS, game theory, sensor networks

Procedia PDF Downloads 357
24541 Runtime Monitoring Using Policy-Based Approach to Control Information Flow for Mobile Apps

Authors: Mohamed Sarrab, Hadj Bourdoucen

Abstract:

Mobile applications are verified to check the correctness or evaluated to check the performance with respect to specific security properties such as availability, integrity, and confidentiality. Where they are made available to the end users of the mobile application is achievable only to a limited degree using software engineering static verification techniques. The more sensitive the information, such as credit card data, personal medical information or personal emails being processed by mobile application, the more important it is to ensure the confidentiality of this information. Monitoring non-trusted mobile application during execution in an environment where sensitive information is present is difficult and unnerving. The paper addresses the issue of monitoring and controlling the flow of confidential information during non-trusted mobile application execution. The approach concentrates on providing a dynamic and usable information security solution by interacting with the mobile users during the run-time of mobile application in response to information flow events.

Keywords: mobile application, run-time verification, usable security, direct information flow

Procedia PDF Downloads 358
24540 Using A Blockchain-Based, End-to-End Encrypted Communication System Between Mobile Terminals to Improve Organizational Privacy

Authors: Andrei Bogdan Stanescu, Robert Stana

Abstract:

Creating private and secure communication channels between employees has become a critical aspect in order to ensure organizational integrity and avoid leaks of sensitive information. With the widespread use of modern methods of disrupting communication between users, real use-cases of advanced encryption mechanisms have emerged to avoid cyber-attackers that are willing to intercept private conversations between critical employees in an organization. This paper aims to present a custom implementation of a messaging application named “Whisper” that uses end-to-end encryption (E2EE) mechanisms and blockchain-related components to protect sensitive conversations and mitigate the risks of information breaches inside organizations. The results of this research paper aim to expand the areas of applicability of E2EE algorithms and integrations with private blockchains in chat applications as a viable method of enhancing intra-organizational communication privacy.

Keywords: end-to-end encryption, mobile communication, cryptography, communication security, data privacy

Procedia PDF Downloads 58
24539 Studies on the Characterization and Machinability of Duplex Stainless Steel 2205 during Dry Turning

Authors: Gaurav D. Sonawane, Vikas G. Sargade

Abstract:

The present investigation is a study of the effect of advanced Physical Vapor Deposition (PVD) coatings on cutting temperature residual stresses and surface roughness during Duplex Stainless Steel (DSS) 2205 turning. Austenite stabilizers like nickel, manganese, and molybdenum reduced the cost of DSS. Surface Integrity (SI) plays an important role in determining corrosion resistance and fatigue life. Resistance to various types of corrosion makes DSS suitable for applications with critical environments like Heat exchangers, Desalination plants, Seawater pipes and Marine components. However, lower thermal conductivity, poor chip control and non-uniform tool wear make DSS very difficult to machine. Cemented carbide tools (M grade) were used to turn DSS in a dry environment. AlTiN and AlTiCrN coatings were deposited using advanced PVD High Pulse Impulse Magnetron Sputtering (HiPIMS) technique. Experiments were conducted with cutting speed of 100 m/min, 140 m/min and 180 m/min. A constant feed and depth of cut of 0.18 mm/rev and 0.8 mm were used, respectively. AlTiCrN coated tools followed by AlTiN coated tools outperformed uncoated tools due to properties like lower thermal conductivity, higher adhesion strength and hardness. Residual stresses were found to be compressive for all the tools used for dry turning, increasing the fatigue life of the machined component. Higher cutting temperatures were observed for coated tools due to its lower thermal conductivity, which results in very less tool wear than uncoated tools. Surface roughness with uncoated tools was found to be three times higher than coated tools due to lower coefficient of friction of coating used.

Keywords: cutting temperature, DSS2205, dry turning, HiPIMS, surface integrity

Procedia PDF Downloads 107
24538 Adoption and Use of an Electronic Voting System in Ghana

Authors: Isaac Kofi Mensah

Abstract:

The manual system of voting has been the most widely used system of electing representatives around the globe, particularly in Africa. Due to the known numerous problems and challenges associated with the manual system of voting, many countries are migrating to the electronic voting system as a suitable and credible means of electing representatives over the manual paper-based system. This research paper therefore investigated the factors influencing adoption and use of an electronic voting system in Ghana. A total of 400 Questionnaire Instruments (QI) were administered to potential respondents in Ghana, of which 387 responded representing a response rate of 96.75%. The Technology Acceptance Model was used as the theoretical framework for the study. The research model was tested using a simple linear regression analysis with SPSS. A little of over 71.1% of the respondents recommended the Electoral Commission (EC) of Ghana to adopt an electronic voting system in the conduct of public elections in Ghana. The results indicated that all the six predictors such as perceived usefulness (PU), perceived ease of use (PEOU), perceived free and fair elections (PFFF), perceived credible elections (PCE), perceived system integrity (PSI) and citizens trust in the election management body (CTEM) were all positively significant in predicting the readiness of citizens to adopt and use an electronic voting system in Ghana. However, jointly, the hypotheses tested revealed that apart from Perceived Free and Fair Elections and Perceived Credible and Transparent Elections, all the other factors such as PU, Perceived System Integrity and Security and Citizen Trust in the Election Management Body were found to be significant predictors of the Willingness of Ghanaians to use an electronic voting system. All the six factors considered in this study jointly account for about 53.1% of the reasons determining the readiness to adopt and use an electronic voting system in Ghana. The implications of this research finding on elections in Ghana are discussed.

Keywords: credible elections, Election Management Body (EMB), electronic voting, Ghana, Technology Acceptance Model (TAM)

Procedia PDF Downloads 367
24537 Substitution of Silver-Thiosulfate (STS) with Some Essential Oils on Vase-Life of Cut Carnation cv. Liberty

Authors: Mohammad Bagher Hassanpouraghdam, Mohammad Ali Aazami Mavaloo

Abstract:

Due to the huge side-effects of chemicals; essential oils have been considered as suitable alternatives for keeping the vase-life of cut flowers mainly owing to the availability and environment-friend nature of these bio-chemicals. In the present experiment, 50% substitution of STS was achieved and tested on cut carnation flowers cv. Liberty by using the essential oils from four plants; Satureja sahendica Bornm., Echinophora platyloba DC., Tanacetum balsamita L. and Cupressus arizonica Greene., as CRD with five treatments and 3 replications. Vase-life and flower diameter were affected with 50% substitution of STS by essential oils from C. arizonica and T. balsamita. Membrane stability index, Malondialdehyde (MDA) content and Hydrogen peroxide (H2O2) amounts were affected by the substitution treatments as well. The main preservative effect belonged to the substitution with C. arizonica. So that, 50% STS substitution with Cupressus oil holds the highest membrane integrity and the least data for MDA and H2O2 content.

Keywords: Carnation, essential oil, Membrane stability index (MSI), vase life

Procedia PDF Downloads 471
24536 Implementation of an IoT Sensor Data Collection and Analysis Library

Authors: Jihyun Song, Kyeongjoo Kim, Minsoo Lee

Abstract:

Due to the development of information technology and wireless Internet technology, various data are being generated in various fields. These data are advantageous in that they provide real-time information to the users themselves. However, when the data are accumulated and analyzed, more various information can be extracted. In addition, development and dissemination of boards such as Arduino and Raspberry Pie have made it possible to easily test various sensors, and it is possible to collect sensor data directly by using database application tools such as MySQL. These directly collected data can be used for various research and can be useful as data for data mining. However, there are many difficulties in using the board to collect data, and there are many difficulties in using it when the user is not a computer programmer, or when using it for the first time. Even if data are collected, lack of expert knowledge or experience may cause difficulties in data analysis and visualization. In this paper, we aim to construct a library for sensor data collection and analysis to overcome these problems.

Keywords: clustering, data mining, DBSCAN, k-means, k-medoids, sensor data

Procedia PDF Downloads 350
24535 Higher Education Leadership and Creating Sites of Institutional Belonging: A Global Case Study

Authors: Lisa M. Coleman

Abstract:

The focus on disability, LGBTQ+, and internationalization has certainly been the subject of much research and programmatic across higher education. Many universities have entered into global partnerships with varying success and challenges across the various areas, including laws and policies. Attentiveness to the specific nuances of global inclusion, diversity, equity, belonging, and access (GIDBEA) and the leadership to support these efforts is crucial to the development of longstanding success across the programs. There have been a number of shifts related to diversification across student and alumni bodies. These shifts include but are not limited to how people identify gender, race, and sexuality (and the intersections across such identities), as well as trends across emerging and diverse disability communities. NYU is the most international campus in the United States, with the most campuses and sites outside of its county of origin and the most international students and exchange programs than any other university. As a result, the ongoing work related to GIDEBA is at the center of much of the leadership, administrative, and research efforts. Climate assessment work across NYU’s diverse global campus landscape will serve as the foundation to exemplify best practices related to data collection and dissemination, community and stakeholder engagement, and effective implementation of innovative strategies to close gap areas as identified. The data (quantitative and qualitative) and related research findings represent data collected from close to 22,000 stakeholders across the NYU campuses. The case study centers on specific methodological considerations, data integrity, stakeholder engagement from across student-faculty, staff, and alumni constituencies, and tactics to advance specific GIDBEA initiatives related to navigating shifting landscapes. Design thinking, incubation, and co-creation strategies have been employed to expand, leverage, actualize, and implement GIDBEA strategies that are – concrete, measurable, differentiated, and specific to global sites and regions and emerging trends.

Keywords: disability, LGBTQ+, DEI, research, case studies

Procedia PDF Downloads 80
24534 Government (Big) Data Ecosystem: Definition, Classification of Actors, and Their Roles

Authors: Syed Iftikhar Hussain Shah, Vasilis Peristeras, Ioannis Magnisalis

Abstract:

Organizations, including governments, generate (big) data that are high in volume, velocity, veracity, and come from a variety of sources. Public Administrations are using (big) data, implementing base registries, and enforcing data sharing within the entire government to deliver (big) data related integrated services, provision of insights to users, and for good governance. Government (Big) data ecosystem actors represent distinct entities that provide data, consume data, manipulate data to offer paid services, and extend data services like data storage, hosting services to other actors. In this research work, we perform a systematic literature review. The key objectives of this paper are to propose a robust definition of government (big) data ecosystem and a classification of government (big) data ecosystem actors and their roles. We showcase a graphical view of actors, roles, and their relationship in the government (big) data ecosystem. We also discuss our research findings. We did not find too much published research articles about the government (big) data ecosystem, including its definition and classification of actors and their roles. Therefore, we lent ideas for the government (big) data ecosystem from numerous areas that include scientific research data, humanitarian data, open government data, industry data, in the literature.

Keywords: big data, big data ecosystem, classification of big data actors, big data actors roles, definition of government (big) data ecosystem, data-driven government, eGovernment, gaps in data ecosystems, government (big) data, public administration, systematic literature review

Procedia PDF Downloads 134
24533 Stakeholder Mapping and Requirements Identification for Improving Traceability in the Halal Food Supply Chain

Authors: Laila A. H. F. Dashti, Tom Jackson, Andrew West, Lisa Jackson

Abstract:

Traceability systems are important in the agri-food and halal food sectors for monitoring ingredient movements, tracking sources, and ensuring food integrity. However, designing a traceability system for the halal food supply chain is challenging due to diverse stakeholder requirements and complex needs. Existing literature on stakeholder mapping and identifying requirements for halal food supply chains is limited. To address this gap, a pilot study was conducted to identify the objectives, requirements, and recommendations of stakeholders in the Kuwaiti halal food industry. The study collected data through semi-structured interviews with an international halal food manufacturer based in Kuwait. The aim was to gain a deep understanding of stakeholders' objectives, requirements, processes, and concerns related to the design of a traceability system in the country's halal food sector. Traceability systems are being developed and tested in the agri-food and halal food sectors due to their ability to monitor ingredient movements, track sources, and detect potential issues related to food integrity. Designing a traceability system for the halal food supply chain poses significant challenges due to diverse stakeholder requirements and the complexity of their needs (including varying food ingredients, different sources, destinations, supplier processes, certifications, etc.). Achieving a halal food traceability solution tailored to stakeholders' requirements within the supply chain necessitates prior knowledge of these needs. Although attempts have been made to address design-related issues in traceability systems, literature on stakeholder mapping and identification of requirements specific to halal food supply chains is scarce. Thus, this pilot study aims to identify the objectives, requirements, and recommendations of stakeholders in the halal food industry. The paper presents insights gained from the pilot study, which utilized semi-structured interviews to collect data from a Kuwait-based international halal food manufacturer. The objective was to gain an in-depth understanding of stakeholders' objectives, requirements, processes, and concerns pertaining to the design of a traceability system in Kuwait's halal food sector. The stakeholder mapping results revealed that government entities, food manufacturers, retailers, and suppliers are key stakeholders in Kuwait's halal food supply chain. Lessons learned from this pilot study regarding requirement capture for traceability systems include the need to streamline communication, focus on communication at each level of the supply chain, leverage innovative technologies to enhance process structuring and operations and reduce halal certification costs. The findings also emphasized the limitations of existing traceability solutions, such as limited cooperation and collaboration among stakeholders, high costs of implementing traceability systems without government support, lack of clarity regarding product routes, and disrupted communication channels between stakeholders. These findings contribute to a broader research program aimed at developing a stakeholder requirements framework that utilizes "business process modelling" to establish a unified model for traceable stakeholder requirements.

Keywords: supply chain, traceability system, halal food, stakeholders’ requirements

Procedia PDF Downloads 81
24532 AI Applications in Accounting: Transforming Finance with Technology

Authors: Alireza Karimi

Abstract:

Artificial Intelligence (AI) is reshaping various industries, and accounting is no exception. With the ability to process vast amounts of data quickly and accurately, AI is revolutionizing how financial professionals manage, analyze, and report financial information. In this article, we will explore the diverse applications of AI in accounting and its profound impact on the field. Automation of Repetitive Tasks: One of the most significant contributions of AI in accounting is automating repetitive tasks. AI-powered software can handle data entry, invoice processing, and reconciliation with minimal human intervention. This not only saves time but also reduces the risk of errors, leading to more accurate financial records. Pattern Recognition and Anomaly Detection: AI algorithms excel at pattern recognition. In accounting, this capability is leveraged to identify unusual patterns in financial data that might indicate fraud or errors. AI can swiftly detect discrepancies, enabling auditors and accountants to focus on resolving issues rather than hunting for them. Real-Time Financial Insights: AI-driven tools, using natural language processing and computer vision, can process documents faster than ever. This enables organizations to have real-time insights into their financial status, empowering decision-makers with up-to-date information for strategic planning. Fraud Detection and Prevention: AI is a powerful tool in the fight against financial fraud. It can analyze vast transaction datasets, flagging suspicious activities and reducing the likelihood of financial misconduct going unnoticed. This proactive approach safeguards a company's financial integrity. Enhanced Data Analysis and Forecasting: Machine learning, a subset of AI, is used for data analysis and forecasting. By examining historical financial data, AI models can provide forecasts and insights, aiding businesses in making informed financial decisions and optimizing their financial strategies. Artificial Intelligence is fundamentally transforming the accounting profession. From automating mundane tasks to enhancing data analysis and fraud detection, AI is making financial processes more efficient, accurate, and insightful. As AI continues to evolve, its role in accounting will only become more significant, offering accountants and finance professionals powerful tools to navigate the complexities of modern finance. Embracing AI in accounting is not just a trend; it's a necessity for staying competitive in the evolving financial landscape.

Keywords: artificial intelligence, accounting automation, financial analysis, fraud detection, machine learning in finance

Procedia PDF Downloads 40
24531 Behaviour of RC Columns at Elevated Temperatures by NDT Techniques

Authors: D. Jagath Kumari, K. Srinivasa Rao

Abstract:

Reinforced concrete column is an important structural element in a building. Concrete usually performs well in building fires. However, when it is subjected to prolonged fire exposure or unusually high temperatures, and then it will suffer significant distress. Because concrete pre-fire compressive strength generally exceeds design requirements, therefore an average strength reduction can be tolerated. However high temperature reduces the compressive strength of concrete so much that the concrete retains no useful structural strength. Therefore the residual strength and its performance of structure can be assed by NDT testing. In this paper, rebound hammer test and the ultrasonic pulse velocity (UPV) are used to evaluate the residual compressive strength and material integrity of post-fire-curing concrete subjected to elevated temperatures. Also considering the large availability of fly ash in most of the countries, an attempt was made to study the effect of high volume fly ash concrete exposed to elevated temperatures. 32 RC column specimens were made with a M20 grade concrete mix. Out of 32 column specimens 16 column specimens were made with OPC concrete and other 16 column specimens were made with HVFA concrete. All specimens having similar cross-section details. Columns were exposed to fire for temperatures from 100oC to 800o C with increments of 100o C for duration of 3 hours. Then the specimens allowed cooling to room temperature by two methods natural air cooling method and immediate water quenching method. All the specimens were tested identically, for the compressive strengths and material integrity by rebound hammer and ultrasonic pulse velocity meter respectively for study. These two tests were carried out on preheating and post heating of the column specimens. The percentage variation of compressive strengths of RCC columns with the increase in temperature has been studied and compared the results for both OPC and HVFA concretes. Physical observations of the heated columns were observed.

Keywords: HVFA concrete, NDT testing, residual strength

Procedia PDF Downloads 365
24530 Ethical Artificial Intelligence: An Exploratory Study of Guidelines

Authors: Ahmad Haidar

Abstract:

The rapid adoption of Artificial Intelligence (AI) technology holds unforeseen risks like privacy violation, unemployment, and algorithmic bias, triggering research institutions, governments, and companies to develop principles of AI ethics. The extensive and diverse literature on AI lacks an analysis of the evolution of principles developed in recent years. There are two fundamental purposes of this paper. The first is to provide insights into how the principles of AI ethics have been changed recently, including concepts like risk management and public participation. In doing so, a NOISE (Needs, Opportunities, Improvements, Strengths, & Exceptions) analysis will be presented. Second, offering a framework for building Ethical AI linked to sustainability. This research adopts an explorative approach, more specifically, an inductive approach to address the theoretical gap. Consequently, this paper tracks the different efforts to have “trustworthy AI” and “ethical AI,” concluding a list of 12 documents released from 2017 to 2022. The analysis of this list unifies the different approaches toward trustworthy AI in two steps. First, splitting the principles into two categories, technical and net benefit, and second, testing the frequency of each principle, providing the different technical principles that may be useful for stakeholders considering the lifecycle of AI, or what is known as sustainable AI. Sustainable AI is the third wave of AI ethics and a movement to drive change throughout the entire lifecycle of AI products (i.e., idea generation, training, re-tuning, implementation, and governance) in the direction of greater ecological integrity and social fairness. In this vein, results suggest transparency, privacy, fairness, safety, autonomy, and accountability as recommended technical principles to include in the lifecycle of AI. Another contribution is to capture the different basis that aid the process of AI for sustainability (e.g., towards sustainable development goals). The results indicate data governance, do no harm, human well-being, and risk management as crucial AI for sustainability principles. This study’s last contribution clarifies how the principles evolved. To illustrate, in 2018, the Montreal declaration mentioned eight principles well-being, autonomy, privacy, solidarity, democratic participation, equity, and diversity. In 2021, notions emerged from the European Commission proposal, including public trust, public participation, scientific integrity, risk assessment, flexibility, benefit and cost, and interagency coordination. The study design will strengthen the validity of previous studies. Yet, we advance knowledge in trustworthy AI by considering recent documents, linking principles with sustainable AI and AI for sustainability, and shedding light on the evolution of guidelines over time.

Keywords: artificial intelligence, AI for sustainability, declarations, framework, regulations, risks, sustainable AI

Procedia PDF Downloads 69
24529 Microstructure and Mechanical Properties of Low Alloy Steel with Double Austenitizing Tempering Heat Treatment

Authors: Jae-Ho Jang, Jung-Soo Kim, Byung-Jun Kim, Dae-Geun Nam, Uoo-Chang Jung, Yoon-Suk Choi

Abstract:

Low alloy steels are widely used for pressure vessels, spent fuel storage, and steam generators required to withstand the internal pressure and prevent unexpected failure in nuclear power plants, which these may suffer embrittlement by high levels of radiation and heat for a long period. Therefore, it is important to improve mechanical properties of low alloy steels for the integrity of structure materials at an early stage of fabrication. Recently, it showed that a double austenitizing and tempering (DTA) process resulted in a significant improvement of strength and toughness by refinement of prior austenite grains. In this study, it was investigated that the mechanism of improving mechanical properties according to the change of microstructure by the second fully austenitizing temperature of the DAT process for low alloy steel required the structural integrity. Compared to conventional single austenitizing and tempering (SAT) process, the tensile elongation properties have improved about 5%, DBTTs have obtained result in reduction of about -65℃, and grain size has decreased by about 50% in the DAT process conditions. Grain refinement has crack propagation interference effect due to an increase of the grain boundaries and amount of energy absorption at low temperatures. The higher first austenitizing temperature in the DAT process, the more increase the spheroidized carbides and strengthening the effect of fine precipitates in the ferrite grain. The area ratio of the dimple in the transition area has increased by proportion to the effect of spheroidized carbides. This may the primary mechanisms that can improve low-temperature toughness and elongation while maintaining a similar hardness and strength.

Keywords: double austenitizing, Ductile Brittle transition temperature, grain refinement, heat treatment, low alloy steel, low-temperature toughness

Procedia PDF Downloads 490
24528 Oxidative Damage to Lipids, Proteins, and DNA during Differentiation of Mesenchymal Stem Cells Derived from Umbilical Cord into Biologically Active Hepatocytes

Authors: Abdolamir Allameh, Shahnaz Esmaeili, Mina Allameh, Safoura Khajeniazi

Abstract:

Stem cells with therapeutic applications can be isolated from human placenta/umblical cord blood (UCB) as well as the cord tissue (UC). Stem cells in culture are vulnerable to oxidative stress, particularly when subjected to differentiation process. The aim of this study was to examine the chnages in the rate of oxidation that occurs to cellular macromolecules during hepatic differentiation of mononuclear cells (MSCs). In addition, the impact of the hepatic differentiation process of MSC on cellular and biological activity of the cells will be undertaken. For this purpose, first mononuclear cells (MNCs) were isolated from human UCB which was obtained from a healthy full-term infant. The cells were cultured at a density of 3×10⁵ cells/cm² in DMEM- low-glucose culture media supplemented with 20% FBS, 2 mM L-glutamine, 100 μg/ml streptomycin and 100 U/ml penicillin. Cell cultures were then incubated at 37°C in a humidified 5% CO₂ incubator. After removing non-adherent cells by replacing culture medium, fibroblast-like adherent cells were resuspended in 0.25% trypsin-EDTA and plated in 25 cm² flasks (1×10⁴/ml). Characterization of the MSCs was routinely done by observing their morphology and growth curve. MSCs were subjected to a 2-step hepatocyte differentiation protocol in presence of hepatocyte growth factor (HGF), dexamethazone (DEX) and oncostatin M (OSM). The hepatocyte-like cells derived from MSCs were checked every week for 3 weeks for changes in lipid peroxidation, protein carbonyl formation and DNA oxidation i.e., 8-hydroxy-2'-deoxyguanosine (8-OH-dG) assay. During the 3-week differentiation process of MSCs to hepatocyte-like cells we found that expression liver-specific markers such as albumin, was associated with increased levels of lipid peroxidation and protein carbonyl formation. Whereas, undifferentiated MSCs has relatively low levels of lipid peroxidation products. There was a significant increase ( p < 0.05) in lipid peroxidation products in hepatocytes on days 7, 14, and 21 of differentiation. Likewise, the level of protein carbonyls in the cells was elevated during the differentiation. The level of protein carbonyls measured in hepatocyte-like cells obtained 3 weeks after differentiation induction was estimated to be ~6 fold higher compared to cells recovered on day 7 of differentiation. On the contrary, there was a small but significant decrease in DNA damage marker (8-OH-dG) in hepatocytes recovered 3 weeks after differentiation onset. The level of 8-OHdG which was in consistent with formation of reactive oxygen species (ROS). In conclusion, this data suggest that despite the elevation in oxidation of lipid and protein molecules during hepatocyte development, the cells were normal in terms of DNA integrity, morphology, and biologically activity.

Keywords: adult stem cells, DNA integrity, free radicals, hepatic differentiation

Procedia PDF Downloads 129
24527 Effects of Pre-Storage Invigoration Treatments on Ageing Dendrocalamus hamiltonii Seeds

Authors: Geetika Richa, M. L. Sharma

Abstract:

Bamboo as an ancient herbal medicine has been used for thousands of years in Asia and goes by many names such as tabashir, banslochan etc. It is often used for its tonic and astringent properties. Modern analysis of bamboos show high amount of vitamins and minerals which makes them valuable as a curative. Bamboo leaf decoction and young shoots are known as remedy for intestinal worms, healing of ulcers and stomach disorders. Bamboos are known to be propagated by large scale plantations but propagation through seeds occurs very limited as they have very short viability of few months. Seeds loses viability over a period of time even under controlled conditions and important factors that affect seed viability is the decline in reserve food material, decrease in membrane integrity and fall in endogenous level of growth hormones. Invigoration treatments that include hydration, dehydration, incorporation of bioactive chemicals such as growth regulators, nutrients and antioxidants etc. improve the seed performance. Our studies were aimed to determine the most effective invigoration treatments to enhance vigour and viability of seeds by following invigoration treatments, i.e., hardening. Treated seeds were stored at controlled temperature and humidity (in desiccators at 4°C). In hardening, chemicals were applied in 3 different concentrations to three replicates of 10 seeds. Hardening was done withGA3, IAA, (each with concentrations of 10 ppm, 20 ppm and 50 ppm), calcium oxychloride, neem leaf powder and clay (each with concentrations of 2%, 5% and 10%). Statistically all the hardening materials were effective but GA3 50 ppm was the most effective one in maintaining germination percentage and vigour index. Hardening treatments increased the germination percentage of seeds, i.e. 86.2%, over control which showed germination percentage of 80.2%. It was concluded that in order to maintain seed viability during storage for longer period of time, invigoration treatments have been found to be very effective.

Keywords: invigoration, seed quality, viability, hardening, membrane integrity, decoction

Procedia PDF Downloads 298
24526 Government Big Data Ecosystem: A Systematic Literature Review

Authors: Syed Iftikhar Hussain Shah, Vasilis Peristeras, Ioannis Magnisalis

Abstract:

Data that is high in volume, velocity, veracity and comes from a variety of sources is usually generated in all sectors including the government sector. Globally public administrations are pursuing (big) data as new technology and trying to adopt a data-centric architecture for hosting and sharing data. Properly executed, big data and data analytics in the government (big) data ecosystem can be led to data-driven government and have a direct impact on the way policymakers work and citizens interact with governments. In this research paper, we conduct a systematic literature review. The main aims of this paper are to highlight essential aspects of the government (big) data ecosystem and to explore the most critical socio-technical factors that contribute to the successful implementation of government (big) data ecosystem. The essential aspects of government (big) data ecosystem include definition, data types, data lifecycle models, and actors and their roles. We also discuss the potential impact of (big) data in public administration and gaps in the government data ecosystems literature. As this is a new topic, we did not find specific articles on government (big) data ecosystem and therefore focused our research on various relevant areas like humanitarian data, open government data, scientific research data, industry data, etc.

Keywords: applications of big data, big data, big data types. big data ecosystem, critical success factors, data-driven government, egovernment, gaps in data ecosystems, government (big) data, literature review, public administration, systematic review

Procedia PDF Downloads 195
24525 A Machine Learning Decision Support Framework for Industrial Engineering Purposes

Authors: Anli Du Preez, James Bekker

Abstract:

Data is currently one of the most critical and influential emerging technologies. However, the true potential of data is yet to be exploited since, currently, about 1% of generated data are ever actually analyzed for value creation. There is a data gap where data is not explored due to the lack of data analytics infrastructure and the required data analytics skills. This study developed a decision support framework for data analytics by following Jabareen’s framework development methodology. The study focused on machine learning algorithms, which is a subset of data analytics. The developed framework is designed to assist data analysts with little experience, in choosing the appropriate machine learning algorithm given the purpose of their application.

Keywords: Data analytics, Industrial engineering, Machine learning, Value creation

Procedia PDF Downloads 144
24524 Providing Security to Private Cloud Using Advanced Encryption Standard Algorithm

Authors: Annapureddy Srikant Reddy, Atthanti Mahendra, Samala Chinni Krishna, N. Neelima

Abstract:

In our present world, we are generating a lot of data and we, need a specific device to store all these data. Generally, we store data in pen drives, hard drives, etc. Sometimes we may loss the data due to the corruption of devices. To overcome all these issues, we implemented a cloud space for storing the data, and it provides more security to the data. We can access the data with just using the internet from anywhere in the world. We implemented all these with the java using Net beans IDE. Once user uploads the data, he does not have any rights to change the data. Users uploaded files are stored in the cloud with the file name as system time and the directory will be created with some random words. Cloud accepts the data only if the size of the file is less than 2MB.

Keywords: cloud space, AES, FTP, NetBeans IDE

Procedia PDF Downloads 179
24523 Implementation of Proof of Work Using Ganache

Authors: Sakshi Singh, Shampa Chakraverty

Abstract:

One of the essential characteristics of Blockchain is the ability to validate the integrity of new transactions added to the Blockchain. Moreover, one of the essential consensus algorithms, Proof of Work, performs this job. In this work, we implemented the Proof of Work consensus method on the block formed by performing the transaction using Ganache. The primary goal of this implementation is to understand the process and record how Proof of Work works in reality on newly created blocks.

Keywords: proof of work, blockchain, ganache, smart contract

Procedia PDF Downloads 130
24522 Business Intelligence for Profiling of Telecommunication Customer

Authors: Rokhmatul Insani, Hira Laksmiwati Soemitro

Abstract:

Business Intelligence is a methodology that exploits the data to produce information and knowledge systematically, business intelligence can support the decision-making process. Some methods in business intelligence are data warehouse and data mining. A data warehouse can store historical data from transactional data. For data modelling in data warehouse, we apply dimensional modelling by Kimball. While data mining is used to extracting patterns from the data and get insight from the data. Data mining has many techniques, one of which is segmentation. For profiling of telecommunication customer, we use customer segmentation according to customer’s usage of services, customer invoice and customer payment. Customers can be grouped according to their characteristics and can be identified the profitable customers. We apply K-Means Clustering Algorithm for segmentation. The input variable for that algorithm we use RFM (Recency, Frequency and Monetary) model. All process in data mining, we use tools IBM SPSS modeller.

Keywords: business intelligence, customer segmentation, data warehouse, data mining

Procedia PDF Downloads 451
24521 Validation of Mapping Historical Linked Data to International Committee for Documentation (CIDOC) Conceptual Reference Model Using Shapes Constraint Language

Authors: Ghazal Faraj, András Micsik

Abstract:

Shapes Constraint Language (SHACL), a World Wide Web Consortium (W3C) language, provides well-defined shapes and RDF graphs, named "shape graphs". These shape graphs validate other resource description framework (RDF) graphs which are called "data graphs". The structural features of SHACL permit generating a variety of conditions to evaluate string matching patterns, value type, and other constraints. Moreover, the framework of SHACL supports high-level validation by expressing more complex conditions in languages such as SPARQL protocol and RDF Query Language (SPARQL). SHACL includes two parts: SHACL Core and SHACL-SPARQL. SHACL Core includes all shapes that cover the most frequent constraint components. While SHACL-SPARQL is an extension that allows SHACL to express more complex customized constraints. Validating the efficacy of dataset mapping is an essential component of reconciled data mechanisms, as the enhancement of different datasets linking is a sustainable process. The conventional validation methods are the semantic reasoner and SPARQL queries. The former checks formalization errors and data type inconsistency, while the latter validates the data contradiction. After executing SPARQL queries, the retrieved information needs to be checked manually by an expert. However, this methodology is time-consuming and inaccurate as it does not test the mapping model comprehensively. Therefore, there is a serious need to expose a new methodology that covers the entire validation aspects for linking and mapping diverse datasets. Our goal is to conduct a new approach to achieve optimal validation outcomes. The first step towards this goal is implementing SHACL to validate the mapping between the International Committee for Documentation (CIDOC) conceptual reference model (CRM) and one of its ontologies. To initiate this project successfully, a thorough understanding of both source and target ontologies was required. Subsequently, the proper environment to run SHACL and its shape graphs were determined. As a case study, we performed SHACL over a CIDOC-CRM dataset after running a Pellet reasoner via the Protégé program. The applied validation falls under multiple categories: a) data type validation which constrains whether the source data is mapped to the correct data type. For instance, checking whether a birthdate is assigned to xsd:datetime and linked to Person entity via crm:P82a_begin_of_the_begin property. b) Data integrity validation which detects inconsistent data. For instance, inspecting whether a person's birthdate occurred before any of the linked event creation dates. The expected results of our work are: 1) highlighting validation techniques and categories, 2) selecting the most suitable techniques for those various categories of validation tasks. The next plan is to establish a comprehensive validation model and generate SHACL shapes automatically.

Keywords: SHACL, CIDOC-CRM, SPARQL, validation of ontology mapping

Procedia PDF Downloads 232
24520 "Exploring the Intersection of Accounting, Business, and Economics: Bridging Theory and Practice for Sustainable Growth

Authors: Stephen Acheampong Amoafoh

Abstract:

In today's dynamic economic landscape, businesses face multifaceted challenges that demand strategic foresight and informed decision-making. This abstract explores the pivotal role of financial analytics in driving business performance amidst evolving market conditions. By integrating accounting principles with economic insights, organizations can harness the power of data-driven strategies to optimize resource allocation, mitigate risks, and capitalize on emerging opportunities. This presentation will delve into the practical applications of financial analytics across various sectors, highlighting case studies and empirical evidence to underscore its efficacy in enhancing operational efficiency and fostering sustainable growth. From predictive modeling to performance benchmarking, attendees will gain invaluable insights into leveraging advanced analytics tools to drive profitability, streamline processes, and adapt to changing market dynamics. Moreover, this abstract will address the ethical considerations inherent in financial analytics, emphasizing the importance of transparency, integrity, and accountability in data-driven decision-making. By fostering a culture of ethical conduct and responsible stewardship, organizations can build trust with stakeholders and safeguard their long-term viability in an increasingly interconnected global economy. Ultimately, this abstract aims to stimulate dialogue and collaboration among scholars, practitioners, and policymakers, fostering knowledge exchange and innovation in the realms of accounting, business, and economics. Through interdisciplinary insights and actionable recommendations, participants will be equipped to navigate the complexities of today's business environment and seize opportunities for sustainable success.

Keywords: financial analytics, business performance, data-driven strategies, sustainable growth

Procedia PDF Downloads 24
24519 Biomechanical Perspectives on the Urinary Bladder: Insights from the Hydrostatic Skeleton Concept

Authors: Igor Vishnevskyi

Abstract:

Introduction: The urinary bladder undergoes repeated strain during its working cycle, suggesting the presence of an efficient support system, force transmission, and mechanical amplification. The concept of a "hydrostatic skeleton" (HS) could contribute to our understanding of the functional relationships among bladder constituents. Methods: A multidisciplinary literature review was conducted to identify key features of the HS and to gather evidence supporting its applicability in urinary bladder biomechanics. The collected evidence was synthesized to propose a framework for understanding the potential hydrostatic properties of the urinary bladder based on existing knowledge and HS principles. Results: Our analysis revealed similarities in biomechanical features between living fluid-filled structures and the urinary bladder. These similarities include the geodesic arrangement of fibres, the role of enclosed fluid (urine) in force transmission, prestress as a determinant of stiffness, and the ability to maintain shape integrity during various activities. From a biomechanical perspective, urine may be considered an essential component of the bladder. The hydrostatic skeleton, with its autonomy and flexibility, may provide insights for researchers involved in bladder engineering. Discussion: The concept of a hydrostatic skeleton offers a holistic perspective for understanding bladder function by considering multiple mechanical factors as a single structure with emergent properties. Incorporating viewpoints from various fields on HS can help identify how this concept applies to live fluid-filled structures or organs and reveal its broader relevance to biological systems, both natural and artificial. Conclusion: The hydrostatic skeleton (HS) design principle can be applied to the urinary bladder. Understanding the bladder as a structure with HS can be instrumental in biomechanical modelling and engineering. Further research is required to fully elucidate the cellular and molecular mechanisms underlying HS in the bladder.

Keywords: hydrostatic skeleton, urinary bladder morphology, shape integrity, prestress, biomechanical modelling

Procedia PDF Downloads 55