Search results for: high distress target
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 21662

Search results for: high distress target

21452 Auction Theory In Competitive Takeovers: Ideas For Regulators

Authors: Emanuele Peggi

Abstract:

The regulation of competitive takeover bids is one of the most problematic issues of any legislation on takeovers since it concerns a particular type of market, that of corporate control, whose peculiar characteristic is that companies represent "assets" unique of their kind, for each of which there will be a relevant market characterized by the presence of different subjects interested in acquiring control. Firstly, this work aims to analyze, from a comparative point of view, the regulation of takeover bids in competitive scenarios, characterized by the presence of multiple takeover bids for the same target company, and contribute to the debate on the impact that various solutions adopted in some legal systems examined (Italy, UK, and USA) have had on the efficiency of the market for corporate control. Secondly, the different auction models identified by the economic literature and their possible applications to corporate acquisitions in competitive scenarios will be examined, as well as the consequences that the application of each of them causes on the efficiency of the market for corporate control and the interests of the target shareholders. The scope is to study the possibility of attributing to the management of the target company the power to design the auction in order to better protect the interests of shareholders through the adoption of ad hoc models according to the specific context. and in particular on the ground of their assessment of the buyer's risk profile.

Keywords: takeovers, auction theory, shareholders, target company

Procedia PDF Downloads 152
21451 Modeling of Timing in a Cyber Conflict to Inform Critical Infrastructure Defense

Authors: Brian Connett, Bryan O'Halloran

Abstract:

Systems assets within critical infrastructures were seemingly safe from the exploitation or attack by nefarious cyberspace actors. Now, critical infrastructure is a target and the resources to exploit the cyber physical systems exist. These resources are characterized in terms of patience, stealth, replication-ability and extraordinary robustness. System owners are obligated to maintain a high level of protection measures. The difficulty lies in knowing when to fortify a critical infrastructure against an impending attack. Models currently exist that demonstrate the value of knowing the attacker’s capabilities in the cyber realm and the strength of the target. The shortcomings of these models are that they are not designed to respond to the inherent fast timing of an attack, an impetus that can be derived based on open-source reporting, common knowledge of exploits of and the physical architecture of the infrastructure. A useful model will inform systems owners how to align infrastructure architecture in a manner that is responsive to the capability, willingness and timing of the attacker. This research group has used an existing theoretical model for estimating parameters, and through analysis, to develop a decision tool for would-be target owners. The continuation of the research develops further this model by estimating the variable parameters. Understanding these parameter estimations will uniquely position the decision maker to posture having revealed the vulnerabilities of an attacker’s, persistence and stealth. This research explores different approaches to improve on current attacker-defender models that focus on cyber threats. An existing foundational model takes the point of view of an attacker who must decide what cyber resource to use and when to use it to exploit a system vulnerability. It is valuable for estimating parameters for the model, and through analysis, develop a decision tool for would-be target owners.

Keywords: critical infrastructure, cyber physical systems, modeling, exploitation

Procedia PDF Downloads 168
21450 Improved Super-Resolution Using Deep Denoising Convolutional Neural Network

Authors: Pawan Kumar Mishra, Ganesh Singh Bisht

Abstract:

Super-resolution is the technique that is being used in computer vision to construct high-resolution images from a single low-resolution image. It is used to increase the frequency component, recover the lost details and removing the down sampling and noises that caused by camera during image acquisition process. High-resolution images or videos are desired part of all image processing tasks and its analysis in most of digital imaging application. The target behind super-resolution is to combine non-repetition information inside single or multiple low-resolution frames to generate a high-resolution image. Many methods have been proposed where multiple images are used as low-resolution images of same scene with different variation in transformation. This is called multi-image super resolution. And another family of methods is single image super-resolution that tries to learn redundancy that presents in image and reconstruction the lost information from a single low-resolution image. Use of deep learning is one of state of art method at present for solving reconstruction high-resolution image. In this research, we proposed Deep Denoising Super Resolution (DDSR) that is a deep neural network for effectively reconstruct the high-resolution image from low-resolution image.

Keywords: resolution, deep-learning, neural network, de-blurring

Procedia PDF Downloads 486
21449 Event Related Potentials in Terms of Visual and Auditory Stimuli

Authors: Seokbeen Lim, KyeongSeok Sim, DaKyeong Shin, Gilwon Yoon

Abstract:

Event-related potential (ERP) is one of the useful tools for investigating cognitive reactions. In this study, the potential of ERP components detected after auditory and visual stimuli was examined. Subjects were asked to respond upon stimuli that were of three categories; Target, Non-Target and Standard stimuli. The ERP after stimulus was measured. In the experiment of visual evoked potentials (VEPs), the subjects were asked to gaze at a center point on the monitor screen where the stimuli were provided by the reversal pattern of the checkerboard. In consequence of the VEP experiments, we observed consistent reactions. Each peak voltage could be measured when the ensemble average was applied. Visual stimuli had smaller amplitude and a longer latency compared to that of auditory stimuli. The amplitude was the highest with Target and the smallest with Standard in both stimuli.

Keywords: auditory stimulus, EEG, event related potential, oddball task, visual stimulus

Procedia PDF Downloads 259
21448 Effectiveness of a Peer-Mediated Intervention on Writing Skills in Students with Autism Spectrum Disorder in the Inclusive Classroom

Authors: Siddiq Ahmed

Abstract:

The current study aimed to investigate the effectiveness of a Peer-Mediated Intervention (PMI) on writing skills for a student with autism spectrum disorders in inclusive classrooms. The participants in this study were two students, one as a tutor and another as a tutee who was diagnosed with autism spectrum disorder (ASD). The target participant struggled with writing skills and was paired with a student with high academic outcomes. The Tutor had a readiness to act as a tutor for his peer and was trained on how to assist his peer and how to identify and guide his peer’s writing mistakes. Multiple baseline design across behaviors was implemented to monitor the student’s progress in writing skills. The results of the present study showed that PMI yielded significant improvements in academic achievements for the target student. This study suggests that further studies should replicate the current study with an intensive focus on other academic skills such as reading comprehension, writing social stories, and math.

Keywords: peer tutoring, writing skills, autism, inclusion

Procedia PDF Downloads 85
21447 Jet Impingement Heat Transfer on a Rib-Roughened Flat Plate

Authors: A. H. Alenezi

Abstract:

Cooling by impingement jet is known to have a significant high local and average heat transfer coefficient which make it widely used in industrial cooling systems. The heat transfer characteristics of an impinging jet on rib-roughened flat plate has been investigated numerically. This paper was set out to investigate the effect of rib height on the heat transfer rate. Since the flow needs to have enough spacing after passing the rib to allow reattachment especially for high Reynolds numbers, this study focuses on finding the optimum rib height which would be the best to maximize the heat transfer rate downstream the plate. This investigation employs a round nozzle with hydraulic diameter (Dh) of 13.5 mm, Jet-to-target distance of (H/D) of 4, rib location=1.5D and and finally jet angels of 45˚ and 90˚ under the influence of Re =10,000.

Keywords: jet impingement, CFD, turbulence model, heat transfer

Procedia PDF Downloads 319
21446 Acoustic Characteristics of Ultrasonic Vocalizations in Rat Pups Prenatally Exposed to Ethanol

Authors: Mohd. Ashik Shahrier, Hiromi Wada

Abstract:

Prenatal ethanol exposure has potential to induce difficulties in the social behavior of rats and can alter pup-dam communication suggesting that deficits in pups could result in altered dam behavior, which in turn could result in more aberrant behavior in the pup. Ultrasonic vocalization (USV) is a sensitive tool for investigating social behavior between rat pups and their dam. Rat pups produce USVs on separation from their dam. This signals the dam to locate her pups and retrieve them back to the nest. In this study, it was predicted that prenatal ethanol exposure cause alterations on the acoustic characteristics of USVs in rat pups. Thirteen pregnant rats were purchased and randomly assigned into three groups: high-ethanol (n = 4), low-ethanol (n = 5), and control (n = 4) groups. Laboratory ethanol (purity = 99.5%) was dissolved in tap water and administered to the high- and low-ethanol groups as drinking water from gestational days (GD) 8-20. Ethanol-containing water was administered to the animals in three stages by gradually increasing the concentration between GDs 8–20. From GDs 8–10, 10% and 5%, from GDs 11–13, 20% and 10%, and from GDs 14–20, 30% and 15% ethanol-containing water (v/v) was administered to the high- and low-ethanol groups, respectively. Tap water without ethanol was given to the control group throughout the experiment. The day of birth of the pups was designated as postnatal day (PND) 0. On PND 4, each litter was culled to four male and four female pups. For the present study, two male and two female pups were randomly sampled from each litter as subjects. Thus, eight male and eight female pups from the high-ethanol and control groups and another 10 male and 10 female pups from the low-ethanol group, were sampled. An ultrasonic microphone and the Sonotrack system version 2.4.0 (Metris, Hoofddorp, The Netherlands) were used to record and analyze USVs of the pups. On postnatal days 4, 8, 12 and 16, the resultant pups were individually isolated from their dams and littermates, and USVs were recorded for 5 min in a sound-proof box. Pups in the high-ethanol group produced greater number of USVs compared with that in both low-ethanol and control groups on PND 12. Rat pups in the high-ethanol group also produced higher mean, minimum, and maximum fundamental frequencies of USVs compared with that in both low-ethanol and control groups. Male pups in the high-ethanol group had higher USV amplitudes than in those in low-ethanol and control groups on PND 12. These results suggest that pups in the high-ethanol group relatively experienced more negative emotionality due to the ethanol-induced neuronal activation in the core limbic system and tegmental structures and accordingly, produced altered USVs as distress calls.

Keywords: emotionality, ethanol, maternal separation, ultrasonic vocalization

Procedia PDF Downloads 106
21445 Design and Test a Robust Bearing-Only Target Motion Analysis Algorithm Based on Modified Gain Extended Kalman Filter

Authors: Mohammad Tarek Al Muallim, Ozhan Duzenli, Ceyhun Ilguy

Abstract:

Passive sonar is a method for detecting acoustic signals in the ocean. It detects the acoustic signals emanating from external sources. With passive sonar, we can determine the bearing of the target only, no information about the range of the target. Target Motion Analysis (TMA) is a process to estimate the position and speed of a target using passive sonar information. Since bearing is the only available information, the TMA technique called Bearing-only TMA. Many TMA techniques have been developed. However, until now, there is not a very effective method that could be used to always track an unknown target and extract its moving trace. In this work, a design of effective Bearing-only TMA Algorithm is done. The measured bearing angles are very noisy. Moreover, for multi-beam sonar, the measurements is quantized due to the sonar beam width. To deal with this, modified gain extended Kalman filter algorithm is used. The algorithm is fine-tuned, and many modules are added to improve the performance. A special validation gate module is used to insure stability of the algorithm. Many indicators of the performance and confidence level measurement are designed and tested. A new method to detect if the target is maneuvering is proposed. Moreover, a reactive optimal observer maneuver based on bearing measurements is proposed, which insure converging to the right solution all of the times. To test the performance of the proposed TMA algorithm a simulation is done with a MATLAB program. The simulator program tries to model a discrete scenario for an observer and a target. The simulator takes into consideration all the practical aspects of the problem such as a smooth transition in the speed, a circular turn of the ship, noisy measurements, and a quantized bearing measurement come for multi-beam sonar. The tests are done for a lot of given test scenarios. For all the tests, full tracking is achieved within 10 minutes with very little error. The range estimation error was less than 5%, speed error less than 5% and heading error less than 2 degree. For the online performance estimator, it is mostly aligned with the real performance. The range estimation confidence level gives a value equal to 90% when the range error less than 10%. The experiments show that the proposed TMA algorithm is very robust and has low estimation error. However, the converging time of the algorithm is needed to be improved.

Keywords: target motion analysis, Kalman filter, passive sonar, bearing-only tracking

Procedia PDF Downloads 369
21444 Explaining the Relationship between Religiosity and Resilience

Authors: Rita Phillips, Mark Burgess, Maga Berlinski

Abstract:

Although the positive impact of religiosity on well-being, health, and life-coping abilities is well known, up to date research has failed to provide scientific evidence for the relationship reasons. Therefore the present study took a qualitative approach by examining how religiosity interacts in coping with emotionally distressful situations, for which wedding preparations are an example. Wedding preparations, related to the experience of ambiguous emotions, can be the reason for phases of high distress. Although being per-se religious ceremonies, they are also socially-scripted and characterized by people’s striving for personally meaningful celebrations. The negotiation of these many influences can evoke conflicts. To reveal components of religiosity which contribute to stress-resolution, eight biographic-narrative interviews with recently married spouses were conducted. Participants were from different nationalities and Catholic deep-belief communities in order to determine factors independent from national-culture and social-subgroup. The audio-tape recorded, transcribed and translated interviews were analyzed by Interpretative Phenomenological Analysis. Opposing previous research on wedding-related conflicts but in-line with the quantitative account on the relation between stress-resilience and religiosity, the present study found participants reporting very low levels of distress and ambiguity. Although similar areas of potential conflicts were revealed, deep-belief Christians seemed to handle them in a different way. Participants freed themselves from own and others’ rigor mundane expectations by their spiritual preparation and the focus on a divine instance. This evoked a feeling of perceived closeness to God and of unconditional love, resulting in acceptance of oneself and others. Through relativizing mundane goods, participants perceived absolute freedom. Thus belief did not supplement coping strategies, previously defined in the literature, but substituted them. The paper implies that in explaining the connection between stress-resilience and religiosity, one’s perception and experience of unconditional love might outweigh other social or personal factors. However, further qualitative investigations are needed to fully explain the phenomenon.

Keywords: deep-belief, religiosity, resilience, wedding

Procedia PDF Downloads 225
21443 Synthesis and Tribological Properties of the Al-Cr-N/MoS₂ Self-Lubricating Coatings by Hybrid Magnetron Sputtering

Authors: Tie-Gang Wang, De-Qiang Meng, Yan-Mei Liu

Abstract:

Ternary AlCrN coatings were widely used to prolong cutting tool life because of their high hardness and excellent abrasion resistance. However, the friction between the workpiece and cutter surface was increased remarkably during machining difficult-to-cut materials (such as superalloy, titanium, etc.). As a result, a lot of cutting heat was generated and cutting tool life was shortened. In this work, an appropriate amount of solid lubricant MoS₂ was added into the AlCrN coating to reduce the friction between the tool and the workpiece. A series of Al-Cr-N/MoS₂ self-lubricating coatings with different MoS₂ contents were prepared by high power impulse magnetron sputtering (HiPIMS) and pulsed direct current magnetron sputtering (Pulsed DC) compound system. The MoS₂ content in the coatings was changed by adjusting the sputtering power of the MoS₂ target. The composition, structure and mechanical properties of the Al-Cr-N/MoS2 coatings were systematically evaluated by energy dispersive spectrometer, scanning electron microscopy, X-ray photoelectron spectroscopy, X-ray diffractometer, nano-indenter tester, scratch tester, and ball-on-disk tribometer. The results indicated the lubricant content played an important role in the coating properties. As the sputtering power of the MoS₂ target was 0.1 kW, the coating possessed the highest hardness 14.1GPa, the highest critical load 44.8 N, and the lowest wear rate 4.4×10−3μm2/N.

Keywords: self-lubricating coating, Al-Cr-N/MoS₂ coating, wear rate, friction coefficient

Procedia PDF Downloads 104
21442 Psychosocial Strategies Used by Individuals with Schizophrenia: An Analysis of Internet Forum Posts

Authors: Charisse H. Tay

Abstract:

Background: Schizophrenia is a severe chronic mental disorder that can result in hallucinations, delusions, reduced social engagement, and lack of motivation. While antipsychotic medications often provide the basis for treatment, psychosocial strategies complement the benefit of medications and can result in meaningful improvements in symptoms and functioning. The aim of the study was to investigate psychosocial strategies used by internet self-help forum participants to effectively manage symptoms caused by schizophrenia. Internet self-help forums are a resource for medical and psychological problems and are commonly used to share information about experiences with symptom management. Method: Three international self-help internet forums on schizophrenia were identified using a search engine. 1,181 threads regarding non-pharmacological, psychosocial self-management of schizophrenia symptoms underwent screening, resulting in the final identification and coding of 91 threads and 191 posts from 134 unique forum users that contained details on psychosocial strategies endorsed personally by users that allowed them to effectively manage symptoms of schizophrenia, including positive symptoms (e.g., auditory/visual/tactile hallucinations, delusions, paranoia), negative symptoms (e.g.., avolition, apathy, anhedonia), symptoms of distress, and cognitive symptoms (e.g., memory loss). Results: Effective symptom management strategies personally endorsed by online forum users were psychological skills (e.g., re-focusing, mindfulness/meditation, reality checking; n = 94), engaging in activities (e.g., exercise, working/volunteering, hobbies; n = 84), social/familial support (n = 48), psychotherapy (n = 33), diet (n = 18), and religion/spirituality (n = 14). 44.4% of users reported using more than one strategy to manage their symptoms. The most common symptoms targeted and effectively managed, as specified by users, were positive symptoms (n = 113), negative symptoms (n = 17), distress (n = 8), and memory loss (n = 6). 10.5% of users reported more than one symptom effectively targeted. 70.2% of users with positive symptoms reported that psychological skills were effective for symptom relief. 88% of users with negative symptoms and 75% with distress symptoms reported that engaging in activities was effective. Discussion: Individuals with schizophrenia rely on a variety of different psychosocial methods to manage their symptoms. Different symptomology appears to be more effectively targeted by different types of psychosocial strategies. This may help to inform treatment strategy and tailored for individuals with schizophrenia.

Keywords: psychosocial treatment, qualitative methods, schizophrenia, symptom management

Procedia PDF Downloads 102
21441 Integrated Target Tracking and Control for Automated Car-Following of Truck Platforms

Authors: Fadwa Alaskar, Fang-Chieh Chou, Carlos Flores, Xiao-Yun Lu, Alexandre M. Bayen

Abstract:

This article proposes a perception model for enhancing the accuracy and stability of car-following control of a longitudinally automated truck. We applied a fusion-based tracking algorithm on measurements of a single preceding vehicle needed for car-following control. This algorithm fuses two types of data, radar and LiDAR data, to obtain more accurate and robust longitudinal perception of the subject vehicle in various weather conditions. The filter’s resulting signals are fed to the gap control algorithm at every tracking loop composed by a high-level gap control and lower acceleration tracking system. Several highway tests have been performed with two trucks. The tests show accurate and fast tracking of the target, which impacts on the gap control loop positively. The experiments also show the fulfilment of control design requirements, such as fast speed variations tracking and robust time gap following.

Keywords: object tracking, perception, sensor fusion, adaptive cruise control, cooperative adaptive cruise control

Procedia PDF Downloads 206
21440 Factors Influencing Accidental Cyberbullying on Social Media: Healthcare Industry Perspective

Authors: Iram Malik, Mahrukh Shaukat, Abeer Malik, Hafiz Mushtaq Ahmad

Abstract:

There has been a lot of research on cyberbullying but there is limited research on the topic of accidental cyberbullying on social media with a special focus on healthcare industry. This study emphasizes to uncover the factors that contribute to accidental cyberbullying on social media and how it affects individuals, professionals’ and organizations in health care sector. Nowadays social media is becoming a necessary part of our daily life; there is a need to look into how it is shaping our social life and behaviors displayed online. Instances of cyber bullying can have long-term repercussions due to over-sharing of information. The study used simple random sampling and the instrument of data collection was survey. A sample size of 250 healthcare professionals was chosen from the twin cities of Rawalpindi and Islamabad, Pakistan to examine the relationship between their attitude towards internet use, psychological distress, verbal aggression, envy, frustration, self-compassion, personality traits and accidental cyberbullying on social media. The results of the study have been encouraging. The findings show that psychological distress, aggression, envy, frustration and personality traits had direct effect on accidental cyberbullying whereas compassion, altruism lessened the effect of accidental cyberbullying behavior. It is our intent that the findings of this study could help raise awareness regarding fair use of social media, help policy makers in developing appropriate policies for avoiding cyberbullying in future.

Keywords: accidental cyberbullying, aggression, cyberbullying, frustration, social media

Procedia PDF Downloads 263
21439 Gaussian Particle Flow Bernoulli Filter for Single Target Tracking

Authors: Hyeongbok Kim, Lingling Zhao, Xiaohong Su, Junjie Wang

Abstract:

The Bernoulli filter is a precise Bayesian filter for single target tracking based on the random finite set theory. The standard Bernoulli filter often underestimates the number of targets. This study proposes a Gaussian particle flow (GPF) Bernoulli filter employing particle flow to migrate particles from prior to posterior positions to improve the performance of the standard Bernoulli filter. By employing the particle flow filter, the computational speed of the Bernoulli filters is significantly improved. In addition, the GPF Bernoulli filter provides a more accurate estimation compared with that of the standard Bernoulli filter. Simulation results confirm the improved tracking performance and computational speed in two- and three-dimensional scenarios compared with other algorithms.

Keywords: Bernoulli filter, particle filter, particle flow filter, random finite sets, target tracking

Procedia PDF Downloads 60
21438 Coulomb-Explosion Driven Proton Focusing in an Arched CH Target

Authors: W. Q. Wang, Y. Yin, D. B. Zou, T. P. Yu, J. M. Ouyang, F. Q. Shao

Abstract:

High-energy-density state, i.e., matter and radiation at energy densities in excess of 10^11 J/m^3, is related to material, nuclear physics, astrophysics, and geophysics. Laser-driven particle beams are better suited to heat the matter as a trigger due to their unique properties of ultrashort duration and low emittance. Compared to X-ray and electron sources, it is easier to generate uniformly heated large-volume material for the proton and ion beams because of highly localized energy deposition. With the construction of state-of-art high power laser facilities, creating of extremely conditions of high-temperature and high-density in laboratories becomes possible. It has been demonstrated that on a picosecond time scale the solid density material can be isochorically heated to over 20 eV by the ultrafast proton beam generated from spherically shaped targets. For the above-mentioned technique, the proton energy density plays a crucial role in the formation of warm dense matter states. Recently, several methods have devoted to realize the focusing of the accelerated protons, involving externally exerted static-fields or specially designed targets interacting with a single or multi-pile laser pulses. In previous works, two co-propagating or opposite direction laser pulses are employed to strike a submicron plasma-shell. However, ultra-high pulse intensities, accurately temporal synchronization and undesirable transverse instabilities for a long time are still intractable for currently experimental implementations. A mechanism of the focusing of laser-driven proton beams from two-ion-species arched targets is investigated by multi-dimensional particle-in-cell simulations. When an intense linearly-polarized laser pulse impinges on the thin arched target, all electrons are completely evacuated, leading to a Coulomb-explosive electric-field mostly originated from the heavier carbon ions. The lighter protons in the moving reference frame by the ionic sound speed will be accelerated and effectively focused because of this radially isotropic field. At a 2.42×10^21 W/cm^2 laser intensity, a ballistic proton bunch with its energy-density as high as 2.15×10^17 J/m^3 is produced, and the highest proton energy and the focusing position agree well with that from the theory.

Keywords: Coulomb explosion, focusing, high-energy-density, ion acceleration

Procedia PDF Downloads 305
21437 Ambiguity Resolution for Ground-based Pulse Doppler Radars Using Multiple Medium Pulse Repetition Frequency

Authors: Khue Nguyen Dinh, Loi Nguyen Van, Thanh Nguyen Nhu

Abstract:

In this paper, we propose an adaptive method to resolve ambiguities and a ghost target removal process to extract targets detected by a ground-based pulse-Doppler radar using medium pulse repetition frequency (PRF) waveforms. The ambiguity resolution method is an adaptive implementation of the coincidence algorithm, which is implemented on a two-dimensional (2D) range-velocity matrix to resolve range and velocity ambiguities simultaneously, with a proposed clustering filter to enhance the anti-error ability of the system. Here we consider the scenario of multiple target environments. The ghost target removal process, which is based on the power after Doppler processing, is proposed to mitigate ghosting detections to enhance the performance of ground-based radars using a short PRF schedule in multiple target environments. Simulation results on a ground-based pulsed Doppler radar model will be presented to show the effectiveness of the proposed approach.

Keywords: ambiguity resolution, coincidence algorithm, medium PRF, ghosting removal

Procedia PDF Downloads 116
21436 In-silico Antimicrobial Activity of Bioactive Compounds of Ricinus communis against DNA Gyrase of Staphylococcus aureus as Molecular Target

Authors: S. Rajeswari

Abstract:

Medicinal Plant extracts and their bioactive compounds have been used for antimicrobial activities and have significant remedial properties. In the recent years, a wide range of investigations have been carried out throughout the world to confirm antimicrobial properties of different medicinally important plants. A number of plants showed efficient antimicrobial activities, which were comparable to that of synthetic standard drugs or antimicrobial agents. The large family Euphorbiaceae contains nearly about 300 genera and 7,500 speciesand one among is Ricinus communis or castor plant which has high traditional and medicinal value for disease free healthy life. Traditionally the plant is used as laxative, purgative, fertilizer and fungicide etc. whereas the plant possess beneficial effects such as anti-oxidant, antihistamine, antinociceptive, antiasthmatic, antiulcer, immunomodulatory anti diabetic, hepatoprotective, anti inflammatory, antimicrobial, and many other medicinal properties. This activity of the plant possess due to the important phytochemical constituents like flavonoids, saponins, glycosides, alkaloids and steroids. The presents study includes the phytochemical properties of Ricinus communis and to prediction of the anti-microbial activity of Ricinus communis using DNA gyrase of Staphylococcus aureus as molecular target. Docking results of varies chemicals compounds of Ricinus communis against DNA gyrase of Staphylococcus aureus by maestro 9.8 of Schrodinger show that the phytochemicals are effective against the target protein DNA gyrase. our studies suggest that the phytochemical from Ricinus communis such has INDICAN (G.Score 4.98) and SUPLOPIN-2(G.Score 5.74) can be used as lead molecule against Staphylococcus infections.

Keywords: euphorbiaceae, antimicrobial activity, Ricinus communis, Staphylococcus aureus

Procedia PDF Downloads 458
21435 Obstacle Avoidance Using Image-Based Visual Servoing Based on Deep Reinforcement Learning

Authors: Tong He, Long Chen, Irag Mantegh, Wen-Fang Xie

Abstract:

This paper proposes an image-based obstacle avoidance and tracking target identification strategy in GPS-degraded or GPS-denied environment for an Unmanned Aerial Vehicle (UAV). The traditional force algorithm for obstacle avoidance could produce local minima area, in which UAV cannot get away obstacle effectively. In order to eliminate it, an artificial potential approach based on harmonic potential is proposed to guide the UAV to avoid the obstacle by using the vision system. And image-based visual servoing scheme (IBVS) has been adopted to implement the proposed obstacle avoidance approach. In IBVS, the pixel accuracy is a key factor to realize the obstacle avoidance. In this paper, the deep reinforcement learning framework has been applied by reducing pixel errors through constant interaction between the environment and the agent. In addition, the combination of OpenTLD and Tensorflow based on neural network is used to identify the type of tracking target. Numerical simulation in Matlab and ROS GAZEBO show the satisfactory result in target identification and obstacle avoidance.

Keywords: image-based visual servoing, obstacle avoidance, tracking target identification, deep reinforcement learning, artificial potential approach, neural network

Procedia PDF Downloads 116
21434 Chipless RFID Capacity Enhancement Using the E-pulse Technique

Authors: Haythem H. Abdullah, Hesham Elkady

Abstract:

With the fast increase in radio frequency identification (RFID) applications such as medical recording, library management, etc., the limitation of active tags stems from its need to external batteries as well as passive or active chips. The chipless RFID tag reduces the cost to a large extent but at the expense of utilizing the spectrum. The reduction of the cost of chipless RFID is due to the absence of the chip itself. The identification is done by utilizing the spectrum in such a way that the frequency response of the tags consists of some resonance frequencies that represent the bits. The system capacity is decided by the number of resonators within the pre-specified band. It is important to find a solution to enhance the spectrum utilization when using chipless RFID. Target identification is a process that results in a decision that a specific target is present or not. Several target identification schemes are present, but one of the most successful techniques in radar target identification in the oscillatory region is the extinction pulse technique (E-Pulse). The E-Pulse technique is used to identify targets via its characteristics (natural) modes. By introducing an innovative solution for chipless RFID reader and tag designs, the spectrum utilization goes to the optimum case. In this paper, a novel capacity enhancement scheme based on the E-pulse technique is introduced to improve the performance of the chipless RFID system.

Keywords: chipless RFID, E-pulse, natural modes, resonators

Procedia PDF Downloads 47
21433 Cytotoxicological Evaluation of a Folate Receptor Targeting Drug Delivery System Based on Cyclodextrins

Authors: Caroline Mendes, Mary McNamara, Orla Howe

Abstract:

For chemotherapy, a drug delivery system should be able to specifically target cancer cells and deliver the therapeutic dose without affecting normal cells. Folate receptors (FR) can be considered key targets since they are commonly over-expressed in cancer cells and they are the molecular marker used in this study. Here, cyclodextrin (CD) has being studied as a vehicle for delivering the chemotherapeutic drug, methotrexate (MTX). CDs have the ability to form inclusion complexes, in which molecules of suitable dimensions are included within the CD cavity. In this study, β-CD has been modified using folic acid so as to specifically target the FR molecular marker. Thus, the system studied here for drug delivery consists of β-CD, folic acid and MTX (CDEnFA:MTX). Cellular uptake of folic acid is mediated with high affinity by folate receptors while the cellular uptake of antifolates, such as MTX, is mediated with high affinity by the reduced folate carriers (RFCs). This study addresses the gene (mRNA) and protein expression levels of FRs and RFCs in the cancer cell lines CaCo-2, SKOV-3, HeLa, MCF-7, A549 and the normal cell line BEAS-2B, quantified by real-time polymerase chain reaction (real-time PCR) and flow cytometry, respectively. From that, four cell lines with different levels of FRs, were chosen for cytotoxicity assays of MTX and CDEnFA:MTX using the MTT assay. Real-time PCR and flow cytometry data demonstrated that all cell lines ubiquitously express moderate levels of RFC. These experiments have also shown that levels of FR protein in CaCo-2 cells are high, while levels in SKOV-3, HeLa and MCF-7 cells are moderate. A549 and BEAS-2B cells express low levels of FR protein. FRs are highly expressed in all the cancer cell lines analysed when compared to the normal cell line BEAS-2B. The cell lines CaCo-2, MCF-7, A549 and BEAS-2B were used in the cell viability assays. 48 hours treatment with the free drug and the complex resulted in IC50 values of 93.9 µM ± 9.2 and 56.0 µM ± 4.0 for CaCo-2 for free MTX and CDEnFA:MTX respectively, 118.2 µM ± 10.8 and 97.8 µM ± 12.3 for MCF-7, 36.4 µM ± 6.9 and 75.0 µM ± 8.5 for A549 and 132.6 µM ± 12.1 and 288.1 µM ± 16.3 for BEAS-2B. These results demonstrate that MTX is more toxic towards cell lines expressing low levels of FR, such as the BEAS-2B. More importantly, these results demonstrate that the inclusion complex CDEnFA:MTX showed greater cytotoxicity than the free drug towards the high FR expressing CaCo-2 cells, indicating that it has potential to target this receptor, enhancing the specificity and the efficiency of the drug.

Keywords: cyclodextrins, cancer treatment, drug delivery, folate receptors, reduced folate carriers

Procedia PDF Downloads 280
21432 Intelligent Swarm-Finding in Formation Control of Multi-Robots to Track a Moving Target

Authors: Anh Duc Dang, Joachim Horn

Abstract:

This paper presents a new approach to control robots, which can quickly find their swarm while tracking a moving target through the obstacles of the environment. In this approach, an artificial potential field is generated between each free-robot and the virtual attractive point of the swarm. This artificial potential field will lead free-robots to their swarm. The swarm-finding of these free-robots dose not influence the general motion of their swarm and nor other robots. When one singular robot approaches the swarm then its swarm-search will finish, and it will further participate with its swarm to reach the position of the target. The connections between member-robots with their neighbours are controlled by the artificial attractive/repulsive force field between them to avoid collisions and keep the constant distances between them in ordered formation. The effectiveness of the proposed approach has been verified in simulations.

Keywords: formation control, potential field method, obstacle avoidance, swarm intelligence, multi-agent systems

Procedia PDF Downloads 412
21431 Surprise Fraudsters Before They Surprise You: A South African Telecommunications Case Study

Authors: Ansoné Human, Nantes Kirsten, Tanja Verster, Willem D. Schutte

Abstract:

Every year the telecommunications industry suffers huge losses due to fraud. Mobile fraud, or generally, telecommunications fraud is the utilisation of telecommunication products or services to acquire money illegally from or failing to pay a telecommunication company. A South African telecommunication operator developed two internal fraud scorecards to mitigate future risks of application fraud events. The scorecards aim to predict the likelihood of an application being fraudulent and surprise fraudsters before they surprise the telecommunication operator by identifying fraud at the time of application. The scorecards are utilised in the vetting process to evaluate the applicant in terms of the fraud risk the applicant would present to the telecommunication operator. Telecommunication providers can utilise these scorecards to profile customers, as well as isolate fraudulent and/or high-risk applicants. We provide the complete methodology utilised in the development of the scorecards. Furthermore, a Determination and Discrimination (DD) ratio is provided in the methodology to select the most influential variables from a group of related variables. Throughout the development of these scorecards, the following was revealed regarding fraudulent cases and fraudster behaviour within the telecommunications industry: Fraudsters typically target high-value handsets. Furthermore, debit order dates scheduled for the end of the month have the highest fraud probability. The fraudsters target specific stores. Applicants who acquire an expensive package and receive a medium-income, as well as applicants who obtain an expensive package and receive a high income, have higher fraud percentages. If one month prior to application, the status of an account is already in arrears (two months or more), the applicant has a high probability of fraud. The applicants with the highest average spend on calls have a higher probability of fraud. If the amount collected changes from month to month, the likelihood of fraud is higher. Lastly, young and middle-aged applicants have an increased probability of being targeted by fraudsters than other ages.

Keywords: application fraud scorecard, predictive modeling, regression, telecommunications

Procedia PDF Downloads 88
21430 Algorithmic Approach to Management of Complications of Permanent Facial Filler: A Saudi Experience

Authors: Luay Alsalmi

Abstract:

Background: Facial filler is the most common type of cosmetic surgery next to botox. Permanent filler is preferred nowadays due to the low cost brought about by non-recurring injection appointments. However, such fillers pose a higher risk for complications, with even greater adverse effects when the procedure is done using unknown dermal filler injections. AIM: This study aimed to establish an algorithm to categorize and manage patients that receive permanent fillers. Materials and Methods: Twelve participants were presented to the service through emergency or as outpatient from November 2015 to May 2021. Demographics such as age, sex, date of injection, time of onset, and types of complications were collected. After examination, all cases were managed based on an algorithm established. FACE-Q was used to measure overall satisfaction and psychological well-being. Results: The algorithm to diagnose and manage these patients effectively with a high satisfaction rate was established in this study. All participants were non-smoker females with no known medical comorbidities. The algorithm presented determined the treatment plan when faced with complications. Results revealed high appearance-related psychosocial distress was observed prior to surgery, while it significantly dropped after surgery. FACE-Q was able to establish evidence of satisfactory ratings among patients prior to and after surgery. Conclusion: This treatment algorithm can guide the surgeon in formulating a suitable plan with fewer complications and a high satisfaction rate.

Keywords: facial filler, FACE-Q, psycho-social stress, botox, treatment algorithm

Procedia PDF Downloads 61
21429 Code Refactoring Using Slice-Based Cohesion Metrics and AOP

Authors: Jagannath Singh, Durga Prasad Mohapatra

Abstract:

Software refactoring is very essential for maintaining the software quality. It is an usual practice that we first design the software and then go for coding. But after coding is completed, if the requirement changes slightly or our expected output is not achieved, then we change the codes. For each small code change, we cannot change the design. In course of time, due to these small changes made to the code, the software design decays. Software refactoring is used to restructure the code in order to improve the design and quality of the software. In this paper, we propose an approach for performing code refactoring. We use slice-based cohesion metrics to identify the target methods which requires refactoring. After identifying the target methods, we use program slicing to divide the target method into two parts. Finally, we have used the concepts of Aspects to adjust the code structure so that the external behaviour of the original module does not change.

Keywords: software refactoring, program slicing, AOP, cohesion metrics, code restructure, AspectJ

Procedia PDF Downloads 480
21428 Identification of miRNA-miRNA Interactions between Virus and Host in Human Cytomegalovirus Infection

Authors: Kai-Yao Huang, Tzong-Yi Lee, Pin-Hao Ho, Tzu-Hao Chang, Cheng-Wei Chang

Abstract:

Background: Human cytomegalovirus (HCMV) infects much people around the world, and there were many researches mention that many diseases were caused by HCMV. To understand the mechanism of HCMV lead to diseases during infection. We observe a microRNA (miRNA) – miRNA interaction between HCMV and host during infection. We found HCMV miRNA sequence component complementary with host miRNA precursors, and we also found that the host miRNA abundances were decrease in HCMV infection. Hence, we focus on the host miRNA which may target by the other HCMV miRNA to find theirs target mRNAs expression and analysis these mRNAs affect what kind of signaling pathway. Interestingly, we found the affected mRNA play an important role in some diseases related pathways, and these diseases had been annotated by HCMV infection. Results: From our analysis procedure, we found 464 human miRNAs might be targeted by 26 HCMV miRNAs and there were 291 human miRNAs shows the concordant decrease trend during HCMV infection. For case study, we found hcmv-miR-US22-5p may regulate hsa-mir-877 and we analysis the KEGG pathway which built by hsa-mir-877 validate target mRNA. Additionally, through survey KEGG Disease database found that these mRNA co-regulate some disease related pathway for instance cancer, nerve disease. However, there were studies annotated that HCMV infection casuse cancer and Alzheimer. Conclusions: This work supply a different scenario of miRNA target interactions(MTIs). In previous study assume miRNA only target to other mRNA. Here we wonder there is possibility that miRNAs might regulate non-mRNA targets, like other miRNAs. In this study, we not only consider the sequence similarity with HCMV miRNAs and human miRNA precursors but also the expression trend of these miRNAs. Then we analysis the human miRNAs validate target mRNAs and its associated KEGG pathway. Finally, we survey related works to validate our investigation.

Keywords: human cytomegalovirus, HCMV, microRNA, miRNA

Procedia PDF Downloads 407
21427 Self-Attention Mechanism for Target Hiding Based on Satellite Images

Authors: Hao Yuan, Yongjian Shen, Xiangjun He, Yuheng Li, Zhouzhou Zhang, Pengyu Zhang, Minkang Cai

Abstract:

Remote sensing data can provide support for decision-making in disaster assessment or disaster relief. The traditional processing methods of sensitive targets in remote sensing mapping are mainly based on manual retrieval and image editing tools, which are inefficient. Methods based on deep learning for sensitive target hiding are faster and more flexible. But these methods have disadvantages in training time and cost of calculation. This paper proposed a target hiding model Self Attention (SA) Deepfill, which used self-attention modules to replace part of gated convolution layers in image inpainting. By this operation, the calculation amount of the model becomes smaller, and the performance is improved. And this paper adds free-form masks to the model’s training to enhance the model’s universal. The experiment on an open remote sensing dataset proved the efficiency of our method. Moreover, through experimental comparison, the proposed method can train for a longer time without over-fitting. Finally, compared with the existing methods, the proposed model has lower computational weight and better performance.

Keywords: remote sensing mapping, image inpainting, self-attention mechanism, target hiding

Procedia PDF Downloads 95
21426 Capex Planning with and without Additional Spectrum

Authors: Koirala Abarodh, Maghaiya Ujjwal, Guragain Phani Raj

Abstract:

This analysis focuses on defining the spectrum evaluation model for telecom operators in terms of total cost of ownership (TCO). A quantitative approach for specific case analysis research methodology was used for identifying the results. Specific input parameters like target User experience, year on year traffic growth, capacity site limit per year, target additional spectrum type, bandwidth, spectrum efficiency, UE penetration have been used for the spectrum evaluation process and desired outputs in terms of the number of sites, capex in USD and required spectrum bandwidth have been calculated. Furthermore, this study gives a comparison of capex investment for target growth with and without addition spectrum. As a result, the combination of additional spectrum bands of 700 and 2600 MHz has a better evaluation in terms of TCO and performance. It is our recommendation to use these bands for expansion rather than expansion in the current 1800 and 2100 bands.

Keywords: spectrum, capex planning, case study methodology, TCO

Procedia PDF Downloads 26
21425 Molecular Detection and Characterization of Infectious Bronchitis Virus from Libya

Authors: Abdulwahab Kammon, Tan Sheau Wei, Abdul Rahman Omar, Abdunaser Dayhum, Ibrahim Eldghayes, Monier Sharif

Abstract:

Infectious bronchitis virus (IBV) is a very dynamic and evolving virus which causing major economic losses to the global poultry industry. Recently, the Libyan poultry industry faced severe outbreak of respiratory distress associated with high mortality and dramatic drop in egg production. Tracheal and cloacal swabs were analyzed for several poultry viruses. IBV was detected using SYBR Green I real-time PCR detection based on the nucleocapsid (N) gene. Sequence analysis of the partial N gene indicated high similarity (~ 94%) to IBV strain 3382/06 that was isolated from Taiwan. Even though the IBV strain 3382/06 is more similar to that of the Mass type H120, the isolate has been implicated associated with intertypic recombinant of 3 putative parental IBV strains namely H120, Taiwan strain 1171/92 and China strain CK/CH/LDL/97I. Complete sequencing and antigenicity studies of the Libya IBV strains are currently underway to determine the evolution of the virus and its importance in vaccine induced immunity. In this paper, we documented for the first time the presence of possibly variant IBV strain from Libya which required a dramatic change in the vaccination program.

Keywords: Libya, infectious bronchitis, molecular characterization, viruses, vaccine

Procedia PDF Downloads 442
21424 A New Multi-Target, Multi-Agent Search and Rescue Path Planning Approach

Authors: Jean Berger, Nassirou Lo, Martin Noel

Abstract:

Perfectly suited for natural or man-made emergency and disaster management situations such as flood, earthquakes, tornadoes, or tsunami, multi-target search path planning for a team of rescue agents is known to be computationally hard, and most techniques developed so far come short to successfully estimate optimality gap. A novel mixed-integer linear programming (MIP) formulation is proposed to optimally solve the multi-target multi-agent discrete search and rescue (SAR) path planning problem. Aimed at maximizing cumulative probability of successful target detection, it captures anticipated feedback information associated with possible observation outcomes resulting from projected path execution, while modeling agent discrete actions over all possible moving directions. Problem modeling further takes advantage of network representation to encompass decision variables, expedite compact constraint specification, and lead to substantial problem-solving speed-up. The proposed MIP approach uses CPLEX optimization machinery, efficiently computing near-optimal solutions for practical size problems, while giving a robust upper bound obtained from Lagrangean integrality constraint relaxation. Should eventually a target be positively detected during plan execution, a new problem instance would simply be reformulated from the current state, and then solved over the next decision cycle. A computational experiment shows the feasibility and the value of the proposed approach.

Keywords: search path planning, search and rescue, multi-agent, mixed-integer linear programming, optimization

Procedia PDF Downloads 346
21423 Measuring Banking Systemic Risk Conditional Value-At-Risk and Conditional Coherent Expected Shortfall in Taiwan Using Vector Quantile GARCH Model

Authors: Ender Su, Kai Wen Wong, I-Ling Ju, Ya-Ling Wang

Abstract:

In this study, the systemic risk change of Taiwan’s banking sector is analyzed during the financial crisis. The risk expose of each financial institutions to the whole Taiwan banking systemic risk or vice versa under financial distress are measured by conditional Value-at-Risk (CoVaR) and conditional coherent expected shortfall (CoES). The CoVaR and CoES are estimated by using vector quantile autoregression (MVMQ-CaViaR) with the daily stock returns of each banks included domestic and foreign banks in Taiwan. The daily in-sample data covered the period from 05/20/2002 to 07/31/2007 and the out-of-sample period until 12/31/2013 spanning the 2008 U.S. subprime crisis, 2010 Greek debt crisis, and post risk duration. All banks in Taiwan are categorised into several groups according to their size of market capital, leverage and domestic/foreign to find out what the extent of changes of the systemic risk as the risk changes between the individuals in the bank groups and vice versa. The final results can provide a guidance to financial supervisory commission of Taiwan to gauge the downside risk in the system of financial institutions and determine the minimum capital requirement hold by financial institutions due to the sensibility changes in CoVaR and CoES of each banks.

Keywords: bank financial distress, vector quantile autoregression, CoVaR, CoES

Procedia PDF Downloads 352