Search results for: protecting variant
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 734

Search results for: protecting variant

494 A Four-Year Study of Thyroid Carcinoma in Hail Region: Increased Incidence

Authors: Laila Seada, Hanan Oreiby, Fawaz Al Rashid, Ashraf Negm

Abstract:

Background and Objective: In most areas of the world, the incidence of thyroid cancer has been increasing over the last decade, mostly due to a combination of early detection of the neoplasm resulting from sensitive procedures and increased population exposure to radiation and unrecognized carcinogens. Methods: Cases of thyroid cancer have been retrieved from the cancer registry at King Khalid Hospital during the period from August 2012 to April 2016. Age, gender and histopathologic types have been recorded. Results: Thyroid carcinoma ranked as the second most common malignancy in females (25%) after breast cancer (31%). It constituted 20.8% of all newly diagnosed cancer cases. As for males, it ranked the 4th type of malignancy after gastrointestinal cancer, lymphomas and soft tissue sarcomas. Mean age for females and males was 38.7 +/- 13.2 and 60.25 +/- 11.5 years, respectively, and the difference between the two groups was statistically significant (p value = 0.0001). Fifty-five (82%) were papillary carcinomas including 10 follicular variant of papillary (FVPC), and eight papillary micro carcinomas (PMC) and two tall cell/oncocytic variants. Follicular carcinomas constituted two (3.1%), while two (3.1%) were anaplastic, and two (3.1%) were medullary. Conclusion: Thyroid cancer incidence in Hail is ranking as the 2nd most common female malignancy similar to other regions in the Kingdom. However, this high incidence contrasts with much lower rates worldwide.

Keywords: thyroid, hail, papillary, microcarcinoma

Procedia PDF Downloads 302
493 Experimental Measurements for the Effect of Dilution Procedure in Blood Esterases as Animals Biomarker for Exposure to Organophosphate Compounds

Authors: Kasim Sakran Abass

Abstract:

This main aim of this study was to confirm and extend our current knowledge about the effects of dilutions on esterases activities in the blood for birds with respect to protecting the enzyme from organophosphate inhibition. There were significantly higher esterases activities in dilution 1:10 in all blood samples from quail, duck, and chick compared to other dilutions (1:5, 1:15, 1:20, and 1:25). Furthermore, our results also pointed to the importance of estimating different dilutions effects prior to using in birds as biomarker tools of environmental exposure. Concentration–inhibition curves were determined for the inhibitor in the presence of dilutions 1:5, 1:10 plus 1:15 (to stimulate carboxylesterase). Point estimates (concentrations calculated to produce 20, 50, and 80% inhibition) were compared across conditions and served as a measure of esterase-mediated detoxification. Among the thiol esters (dilution 1:5) was observed to have the highest specificity constant (kcat/Km), and the Km and kcat values were 176 μM and 16,765 s−1, respectively for S-phenyl thioacetate ester, while detected in (dilution 1:15) the lowest specificity constant (kcat/Km), and the Km and kcat values were 943 μM and 1154 s−1, respectively for acetylthiocholine iodide ester.

Keywords: esterase, animal, dilution, pesticides

Procedia PDF Downloads 517
492 Pharmacogenetic Analysis of Inter-Ethnic Variability in the Uptake Transporter SLCO1B1 Gene in Colombian, Mozambican, and Portuguese Populations

Authors: Mulata Haile Nega, Derebew Fikadu Berhe, Vera Ribeiro Marques

Abstract:

There is no epidemiologic data on this gene polymorphism in several countries. Therefore, this study aimed to assess the genotype and allele frequencies of the gene variant in three countries. This study involved healthy individuals from Colombia, Mozambique, and Portugal. Genomic DNA was isolated from blood samples using the Qiamp DNA Extraction Kit (Qiagen). The isolated DNA was genotyped using Polymerase Chain Reaction (PCR) - Restriction Fragment Length Polymorphism. Microstat and GraphPad quick cal software were used for the Chi-square test and evaluation of Hardy-Weinberg equilibrium, respectively. A total of 181 individuals’ blood sample was analyzed. Overall, TT (74.0%) genotype was the highest, and CC (7.8%) was the lowest. Country wise genotypic frequencies were Colombia 47(70.2%) TT, 12(17.9%) TC and 8(11.9%) CC; Mozambique 47(88.7%) TT, 5(9.4%) TC, and 1(1.9%) CC; and Portugal 40(65.6%) TT, 16(26.2%) TC, and 5(8.2%) CC. The reference (T) allele was highest among Mozambicans (93.4%) compared to Colombians (79.1%) and Portuguese (78.7%). Mozambicans showed statistically significant genotypic and allelic frequency differences compared to Colombians (p<0.01) and Portuguese (p <0.01). Overall and country-wise, the CC genotype was less frequent and relatively high for Colombians and Portuguese populations. This finding may imply statins risk-benefit variability associated with CC genotype among these populations that needs further understanding.

Keywords: c.521T>C, polymorphism, SLCO1B1, SNP, statins

Procedia PDF Downloads 117
491 Use of Remote Sensing for Seasonal and Temporal Monitoring in Wetlands: A Case Study of Akyatan Lagoon

Authors: A. Cilek, S. Berberoglu, A. Akin Tanriover, C. Donmez

Abstract:

Wetlands are the areas which have important effects and functions on protecting human life, adjust to nature, and biological variety, besides being potential exploitation sources. Observing the changes in these sensitive areas is important to study for data collecting and correct planning for the future. Remote sensing and Geographic Information System are being increasingly used for environmental studies such as biotope mapping and habitat monitoring. Akyatan Lagoon, one of the most important wetlands in Turkey, has been facing serious threats from agricultural applications in recent years. In this study, seasonal and temporal monitoring in wetlands system are determined by using remotely sensed data and Geographic Information Systems (GIS) between 1985 and 2015. The research method is based on classifying and mapping biotopes in the study area. The natural biotope types were determined as coastal sand dunes, salt marshes, river beds, coastal woods, lakes, lagoons.

Keywords: biotope mapping, GIS, remote sensing, wetlands

Procedia PDF Downloads 382
490 Utilization of Multi-Criteria Evaluation in Forensic Engineering and the Expertise outside Wall Subsystem

Authors: Tomas Barnak, Libor Matejka

Abstract:

The aim of this study is to create a standard application using multi-criteria evaluation in the field of forensic engineering. This situation can occur in the professional assessment in several cases such as when it is necessary to consider more criteria variant of the structural subsystems, more variants according to several criteria based on a court claim, which requires expert advice. A problematic situation arises when it is necessary to clearly determine the ranking of the options according to established criteria, and reduce subjective evaluation. For the procurement in the field of construction which is based on the prepared text of the law not only economic criteria but also technical, technological and environmental criteria will be determined. This fact substantially changes the style of evaluation of individual bids. For the above-mentioned needs of procurement, the unification of expert’s decisions and the use of multi-criteria assessment seem to be a reasonable option. In the case of experimental verification when using multi-criteria evaluation of alternatives construction subsystem the economic, technical, technological and environmental criteria will be compared. The core of the solution is to compare a selected number of set criteria, application methods and evaluation weighting based on the weighted values assigned to each of the criteria to use multi-criteria evaluation methods. The sequence of individual variations is determined by the evaluation of the importance of the values of corresponding criteria concerning expertise in the problematic of outside wall constructional subsystems.

Keywords: criteria, expertise, multi-criteria evaluation, outside wall subsystems

Procedia PDF Downloads 318
489 Lessons Learnt from Industry: Achieving Net Gain Outcomes for Biodiversity

Authors: Julia Baker

Abstract:

Development plays a major role in stopping biodiversity loss. But the ‘silo species’ protection of legislation (where certain species are protected while many are not) means that development can be ‘legally compliant’ and result in biodiversity loss. ‘Net Gain’ (NG) policies can help overcome this by making it an absolute requirement that development causes no overall loss of biodiversity and brings a benefit. However, offsetting biodiversity losses in one location with gains elsewhere is controversial because people suspect ‘offsetting’ to be an easy way for developers to buy their way out of conservation requirements. Yet the good practice principles (GPP) of offsetting provide several advantages over existing legislation for protecting biodiversity from development. This presentation describes the learning from implementing NG approaches based on GPP. It regards major upgrades of the UK’s transport networks, which involved removing vegetation in order to construct and safely operate new infrastructure. While low-lying habitats were retained, trees and other habitats disrupting the running or safety of transport networks could not. Consequently, achieving NG within the transport corridor was not possible and offsetting was required. The first ‘lessons learnt’ were on obtaining a commitment from business leaders to go beyond legislative requirements and deliver NG, and on the institutional change necessary to embed GPP within daily operations. These issues can only be addressed when the challenges that biodiversity poses for business are overcome. These challenges included: biodiversity cannot be measured easily unlike other sustainability factors like carbon and water that have metrics for target-setting and measuring progress; and, the mindset that biodiversity costs money and does not generate cash in return, which is the opposite of carbon or waste for example, where people can see how ‘sustainability’ actions save money. The challenges were overcome by presenting the GPP of NG as a cost-efficient solution to specific, critical risks facing the business that also boost industry recognition, and by using government-issued NG metrics to develop business-specific toolkits charting their NG progress whilst ensuring that NG decision-making was based on rich ecological data. An institutional change was best achieved by supporting, mentoring and training sustainability/environmental managers for these ‘frontline’ staff to embed GPP within the business. The second learning was from implementing the GPP where business partnered with local governments, wildlife groups and land owners to support their priorities for nature conservation, and where these partners had a say in decisions about where and how best to achieve NG. From this inclusive approach, offsetting contributed towards conservation priorities when all collaborated to manage trade-offs between: -Delivering ecologically equivalent offsets or compensating for losses of one type of biodiversity by providing another. -Achieving NG locally to the development whilst contributing towards national conservation priorities through landscape-level planning. -Not just protecting the extent and condition of existing biodiversity but ‘doing more’. -The multi-sector collaborations identified practical, workable solutions to ‘in perpetuity’. But key was strengthening linkages between biodiversity measures implemented for development and conservation work undertaken by local organizations so that developers support NG initiatives that really count.

Keywords: biodiversity offsetting, development, nature conservation planning, net gain

Procedia PDF Downloads 182
488 Urban Heritage and Its Role in the Tourism Development in Yemen: Case Study of Historic Town of Zabid

Authors: Yasser Alhiagi, Moshalleh Almoraekhi, Sameh Refaat

Abstract:

Urban heritage has an important status in the process of developing the Yemeni tourism sector. Urban heritage in Yemen differs depending on the regions and historical cities such as City of Old Sana'a, Historic Town of Zabid, Shibam Hadhramout, Taiz, and others. Zabid is an old town with a long history, founded in the 9th century. It has been the capital of Yemen from the 13th to the 15th century and played, because of its Islamic university, an important role in the Arab and Muslim world for many centuries. The aim of this research is to promote the built heritage of Historic Town of Zabid and explore the possibilities of visiting the rehabilitated buildings and other heritage attractions through tourism. It examines the nature of the relationship exists between tourism and built heritage. The research is intended to contribute to the strategy development of national tourism for the purpose of protecting, developing, and utilizing cultural heritage. Also, the research depended chiefly on the results of a field work proposed to be carried out at Historic Town of Zabid.

Keywords: historic town of Zabid, strategy, tourism development, urban heritage

Procedia PDF Downloads 309
487 Female Frontline Health Workers in High-Risk Workplaces: Legal Protection in Bangladesh amid the Covid-19 Pandemic

Authors: Nabila Farhin, Israt Jahan

Abstract:

Despite the feminisation of the global health force, women mostly engage in nursing, midwifery and community health workers (HWs), and the posts like surgeons, doctors, and specialists are generally male-dominated. It is also prominent in Bangladesh, where female HWs witness systematic workplace inequalities, discrimination, and underpayment. The Covid-19 pandemic put unsurmountable pressure on HWs as they had to serve in high-risk workplaces as frontliners. The already disadvantaged female HWs shouldered the same burden, were overworked without adequate occupational health and safety measures (OSH) and risked their lives. Acknowledging their vulnerable workplace conditions, the World Health Organization (WHO) and International Labour Organization (ILO) circulated a few specialised guidelines amid the peril. Bangladesh tried to adhere to international guidelines while formulating pandemic management strategies. In reality, the already weak and understaffed health sector collapsed with the patient influx and many HWs got infected and died in the line of duty, exposing the high-risk nature of the work. Unfortunately, the gender-segregated data of infected HWs are absent. This qualitative research investigates whether the existing laws of Bangladesh are adequate in protecting female HWs as frontliners in high-risk workplaces during the Covid-19 pandemic. The paper first examines international labour laws safeguarding female frontline HWs. It also analyses the specialised Covid-19 pandemic guidelines protecting their interests. Finally, the research investigates the compliance of Bangladesh as per international legal guidance during the pandemic. In doing so, it explores the domestic laws, professional guidelines for HWs and pandemic response strategies. The paper critically examines the primary sources like international and national statutes, rules, regulations and guidelines. Secondary sources like authoritative journal articles, books and newspaper reports are contextually analysed in line with the objective of the paper. The definition of HW is ambiguous in the labour laws of Bangladesh. It leads to confusion regarding the extent of legal protection rendered to female HWs at private hospitals in high-risk situations. The labour laws are not applicable in Public hospitals, as the employees follow the public service rules. Unfortunately, the country has no specialised law to protect HWs in high-risk workplaces, and the professional guidelines for HWs also remain inadequate in this regard. Even though the pandemic management strategies highlight some protective measures in high-risk situations, they only deal with HWs who are pregnant or have underlying health issues. No specialised protective guidelines can be found for female HWs as frontliners. Therefore, the laws are insufficient and failed to render adequate legal protection to female frontline HWs during the pandemic. The country also lacks comprehensive health legislation and uniform institutional and professional guidelines, preventing them from accessing grievance mechanisms. Hence, the female HWs felt victimised while duty-bound to serve in high-risk workplaces without adequate safeguards. Bangladesh should clarify the definition of HWs and standardise the service rules for providing medical care in high-risk workplaces. The research also recommends adequate health legislation and specialised legal protection to safeguard female HWs in future emergencies.

Keywords: female health workers (HWs), high-risk workplaces, Covid-19 pandemic, Bangladesh

Procedia PDF Downloads 68
486 Realistic Testing Procedure of Power Swing Blocking Function in Distance Relay

Authors: Farzad Razavi, Behrooz Taheri, Mohammad Parpaei, Mehdi Mohammadi Ghalesefidi, Siamak Zarei

Abstract:

As one of the major problems in protecting large-dimension power systems, power swing and its effect on distance have caused a lot of damages to energy transfer systems in many parts of the world. Therefore, power swing has gained attentions of many researchers, which has led to invention of different methods for power swing detection. Power swing detection algorithm is highly important in distance relay, but protection relays should have general requirements such as correct fault detection, response rate, and minimization of disturbances in a power system. To ensure meeting the requirements, protection relays need different tests during development, setup, maintenance, configuration, and troubleshooting steps. This paper covers power swing scheme of the modern numerical relay protection, 7sa522 to address the effect of the different fault types on the function of the power swing blocking. In this study, it was shown that the different fault types during power swing cause different time for unblocking distance relay.

Keywords: power swing, distance relay, power system protection, relay test, transient in power system

Procedia PDF Downloads 368
485 Lessons Learned from Ransomware-as-a-Service (RaaS) Organized Campaigns

Authors: Vitali Kremez

Abstract:

The researcher monitored an organized ransomware campaign in order to gain significant visibility into the tactics, techniques, and procedures employed by a campaign boss operating a ransomware scheme out of Russia. As the Russian hacking community lowered the access requirements for unsophisticated Russian cybercriminals to engage in ransomware campaigns, corporations and individuals face a commensurately greater challenge of effectively protecting their data and operations from being held ransom. This report discusses two notorious ransomware campaigns. Though the loss of data can be devastating, the findings demonstrate that sending ransom payments does not always help obtain data. Key learnings: 1. From the ransomware affiliate perspective, such campaigns have significantly lowered the barriers for entry for low-tier cybercriminals. 2. Ransomware revenue amounts are not as glamorous and fruitful as they are often publicly reported. Average ransomware crime bosses make only $90K per year on average. 3. Data gathered indicates that sending ransom payments does not always help obtain data. 4. The talk provides the complete payout structure and Bitcoin laundering operation related to the ransomware-as-a-service campaign.

Keywords: bitcoin, cybercrime, ransomware, Russia

Procedia PDF Downloads 188
484 A Literature Review on Sexual Abuse Prevention for People with Intellectual Disability

Authors: Hanh Thi My Nguyen, Phuong Thu Dinh

Abstract:

People with intellectual disability are at high risk for sexual abuse. The reasons may originate from their communication skills deficits, lack of skills and knowledge to protect themselves from sexual abuse, or limited access to sexual abuse prevention programs. This article aims to present a systematic review about strategies for preventing sexual abuse for young people with intellectual disability. A range of articles in 10 years from 2009 to 2018 are searched by using online database. 5 papers are included for the final review. The results of this comprehensive literature review showed that there are two main strategies used: programs designed for people with intellectual, including evaluation on sex education programs; and sexual education program for parents of children with intellectual disability. However, none of the papers were conducted in low-and middle-income countries. Therefore, cautions should be taken when it comes to interpret these findings. The findings of studies showed that participants increased their awareness and skills for protecting themselves from sexual abuse after participating in the programs. It is also recommended that more effective evidence-based programs should be developed.

Keywords: intellectual disability, prevention, sexual abuse, sexual education program

Procedia PDF Downloads 202
483 An Inflammatory Mediated Hypothesis of COVID-19 Psychosis

Authors: Hilary P. Stevenson, Alexander J. Hayek, Amie Dereczyk

Abstract:

In this case report, we provide an example of an asymptomatic COVID-19 positive patient who presented with new-onset psychosis with severe paranoid delusions. He was seen in our ED after ingesting isopropyl alcohol which he reported was an attempt to escape presumed attackers, which at the time was logical to the patient. The patient’s family had COVID-19 symptoms that corresponded to those typically observed from the Omicron variant. The patient was treated successfully, within ten days, with Risperdal twice-daily dosing resulting in the resolution of the patient’s delusions and improved insight regarding the events that led to his hospitalization. In this work, we examine possible contributing factors to new-onset psychosis in the context of COVID-19, a phenomenon that is becoming increasingly notable in the literature. One area of importance is the already established inflammatory hypothesis of psychosis in which defects in the innate immune system, which result in its overactivation, may play a role in a typical first-episode psychosis, in addition to subsequent episodes. Given that COVID-19 is known to cause derangements in the innate immune system, such as cytokine storm reactions, this link may be critical in further understanding the etiologies of new-onset COVID-19 psychosis and its risk factors. Also included in this work is a brief review of antipsychotic interventions that have been described in the literature to date for the first episode of COVID-19-related psychosis. This will explore the potential of some antipsychotics to innately diminish the production of pro-inflammatory cytokines, further enhancing their usefulness in COVID-19 first-episode psychosis patients.

Keywords: COVID-19, first break psychosis, inflammatory hypothesis of psychosis, Risperdal

Procedia PDF Downloads 92
482 Enhance Security in XML Databases: XLog File for Severity-Aware Trust-Based Access Control

Authors: A: Asmawi, L. S. Affendey, N. I. Udzir, R. Mahmod

Abstract:

The topic of enhancing security in XML databases is important as it includes protecting sensitive data and providing a secure environment to users. In order to improve security and provide dynamic access control for XML databases, we presented XLog file to calculate user trust values by recording users’ bad transaction, errors and query severities. Severity-aware trust-based access control for XML databases manages the access policy depending on users' trust values and prevents unauthorized processes, malicious transactions and insider threats. Privileges are automatically modified and adjusted over time depending on user behaviour and query severity. Logging in database is an important process and is used for recovery and security purposes. In this paper, the Xlog file is presented as a dynamic and temporary log file for XML databases to enhance the level of security.

Keywords: XML database, trust-based access control, severity-aware, trust values, log file

Procedia PDF Downloads 290
481 DesignChain: Automated Design of Products Featuring a Large Number of Variants

Authors: Lars Rödel, Jonas Krebs, Gregor Müller

Abstract:

The growing price pressure due to the increasing number of global suppliers, the growing individualization of products and ever-shorter delivery times are upcoming challenges in the industry. In this context, Mass Personalization stands for the individualized production of customer products in batch size 1 at the price of standardized products. The possibilities of digitalization and automation of technical order processing open up the opportunity for companies to significantly reduce their cost of complexity and lead times and thus enhance their competitiveness. Many companies already use a range of CAx tools and configuration solutions today. Often, the expert knowledge of employees is hidden in "knowledge silos" and is rarely networked across processes. DesignChain describes the automated digital process from the recording of individual customer requirements, through design and technical preparation, to production. Configurators offer the possibility of mapping variant-rich products within the Design Chain. This transformation of customer requirements into product features makes it possible to generate even complex CAD models, such as those for large-scale plants, on a rule-based basis. With the aid of an automated CAx chain, production-relevant documents are thus transferred digitally to production. This process, which can be fully automated, allows variants to always be generated on the basis of current version statuses.

Keywords: automation, design, CAD, CAx

Procedia PDF Downloads 66
480 Wireless Transmission of Big Data Using Novel Secure Algorithm

Authors: K. Thiagarajan, K. Saranya, A. Veeraiah, B. Sudha

Abstract:

This paper presents a novel algorithm for secure, reliable and flexible transmission of big data in two hop wireless networks using cooperative jamming scheme. Two hop wireless networks consist of source, relay and destination nodes. Big data has to transmit from source to relay and from relay to destination by deploying security in physical layer. Cooperative jamming scheme determines transmission of big data in more secure manner by protecting it from eavesdroppers and malicious nodes of unknown location. The novel algorithm that ensures secure and energy balance transmission of big data, includes selection of data transmitting region, segmenting the selected region, determining probability ratio for each node (capture node, non-capture and eavesdropper node) in every segment, evaluating the probability using binary based evaluation. If it is secure transmission resume with the two- hop transmission of big data, otherwise prevent the attackers by cooperative jamming scheme and transmit the data in two-hop transmission.

Keywords: big data, two-hop transmission, physical layer wireless security, cooperative jamming, energy balance

Procedia PDF Downloads 475
479 Formal Implementation of Routing Information Protocol Using Event-B

Authors: Jawid Ahmad Baktash, Tadashi Shiroma, Tomokazu Nagata, Yuji Taniguchi, Morikazu Nakamura

Abstract:

The goal of this paper is to explore the use of formal methods for Dynamic Routing, The purpose of network communication with dynamic routing is sending a massage from one node to others by using pacific protocols. In dynamic routing connections are possible based on protocols of Distance vector (Routing Information Protocol, Border Gateway protocol), Link State (Open Shortest Path First, Intermediate system Intermediate System), Hybrid (Enhanced Interior Gateway Routing Protocol). The responsibility for proper verification becomes crucial with Dynamic Routing. Formal methods can play an essential role in the Routing, development of Networks and testing of distributed systems. Event-B is a formal technique consists of describing rigorously the problem; introduce solutions or details in the refinement steps to obtain more concrete specification, and verifying that proposed solutions are correct. The system is modeled in terms of an abstract state space using variables with set theoretic types and the events that modify state variables. Event-B is a variant of B, was designed for developing distributed systems. In Event-B, the events consist of guarded actions occurring spontaneously rather than being invoked. The invariant state properties must be satisfied by the variables and maintained by the activation of the events.

Keywords: dynamic rout RIP, formal method, event-B, pro-B

Procedia PDF Downloads 393
478 The Influence of Remuneration Committees, Directors' Shareholding and Institutional Ownership on the Remuneration of Directors in the Large Listed Companies in South Africa

Authors: Henriette Scholtz

Abstract:

Excessive executive directors’ remuneration remains a major concern for many stakeholders and are some of the factors to blame for the recent global financial crisis. The objective of this study was to examine whether certain firm characteristics are an effective way of protecting shareholders’ interests with respect to executive directors’ remuneration. To achieve this, an ordinary least squares model was used to test the relationship between the remuneration of executive directors and a number of firm and corporate governance characteristics to determine whether these characteristics have an influence on executive directors’ remuneration of large listed companies in South Africa. It was found that corporate governance reforms relating to institutional ownership, shareholder voting on the remuneration policy and the number of remuneration committee meetings acts as an effective governance tool to protect shareholder’s interests with regard to executive remuneration. There is no evidence that the number of non-executive directors on the remuneration committee has an influence on the executive directors’ remuneration.

Keywords: executive directors’ remuneration, agency theory, corporate governance, remuneration committee, directors’ shareholding, institutional ownership

Procedia PDF Downloads 194
477 Optimised Path Recommendation for a Real Time Process

Authors: Likewin Thomas, M. V. Manoj Kumar, B. Annappa

Abstract:

Traditional execution process follows the path of execution drawn by the process analyst without observing the behaviour of resource and other real-time constraints. Identifying process model, predicting the behaviour of resource and recommending the optimal path of execution for a real time process is challenging. The proposed AlfyMiner: αyM iner gives a new dimension in process execution with the novel techniques Process Model Analyser: PMAMiner and Resource behaviour Analyser: RBAMiner for recommending the probable path of execution. PMAMiner discovers next probable activity for currently executing activity in an online process using variant matching technique to identify the set of next probable activity, among which the next probable activity is discovered using decision tree model. RBAMiner identifies the resource suitable for performing the discovered next probable activity and observe the behaviour based on; load and performance using polynomial regression model, and waiting time using queueing theory. Based on the observed behaviour αyM iner recommend the probable path of execution with; next probable activity and the best suitable resource for performing it. Experiments were conducted on process logs of CoSeLoG Project1 and 72% of accuracy is obtained in identifying and recommending next probable activity and the efficiency of resource performance was optimised by 59% by decreasing their load.

Keywords: cross-organization process mining, process behaviour, path of execution, polynomial regression model

Procedia PDF Downloads 320
476 Using Bamboo Structures for Protecting Mangrove Ecosystems: A Nature-Based Approach

Authors: Sourabh Harihar, Henk Jan Verhagen

Abstract:

The nurturing of a mangrove ecosystem requires a protected coastal environment with adequate drainage of the soil substratum. In a conceptual design undertaken for a mangrove rejuvenation project along the eastern coast of Mumbai (India), various engineering alternatives have been thought of as a protective coastal structure and drainage system. One such design uses bamboo-pile walls in creating shielded compartments in the form of various layouts, coupled with bamboo drains. The bamboo-based design is found to be environmentally and economically advantageous over other designs like sand-dikes which are multiple times more expensive. Moreover, employing a natural material such as bamboo helps the structure naturally blend with the developing mangrove habitat, allaying concerns about dismantling the structure post mangrove growth. A cost-minimising and eco-friendly bamboo structure, therefore, promises to pave the way for large rehabilitation projects in future. As mangrove ecosystems in many parts of the world increasingly face the threat of destruction due to urban development and climate change, protective nature-based designs that can be built in a short duration are the need of the hour.

Keywords: bamboo, environment, mangrove, rehabilitation

Procedia PDF Downloads 270
475 Improving Security in Healthcare Applications Using Federated Learning System With Blockchain Technology

Authors: Aofan Liu, Qianqian Tan, Burra Venkata Durga Kumar

Abstract:

Data security is of the utmost importance in the healthcare area, as sensitive patient information is constantly sent around and analyzed by many different parties. The use of federated learning, which enables data to be evaluated locally on devices rather than being transferred to a central server, has emerged as a potential solution for protecting the privacy of user information. To protect against data breaches and unauthorized access, federated learning alone might not be adequate. In this context, the application of blockchain technology could provide the system extra protection. This study proposes a distributed federated learning system that is built on blockchain technology in order to enhance security in healthcare. This makes it possible for a wide variety of healthcare providers to work together on data analysis without raising concerns about the confidentiality of the data. The technical aspects of the system, including as the design and implementation of distributed learning algorithms, consensus mechanisms, and smart contracts, are also investigated as part of this process. The technique that was offered is a workable alternative that addresses concerns about the safety of healthcare while also fostering collaborative research and the interchange of data.

Keywords: data privacy, distributed system, federated learning, machine learning

Procedia PDF Downloads 108
474 Computational Prediction of the Effect of S477N Mutation on the RBD Binding Affinity and Structural Characteristic, A Molecular Dynamics Study

Authors: Mohammad Hossein Modarressi, Mozhgan Mondeali, Khabat Barkhordari, Ali Etemadi

Abstract:

The COVID-19 pandemic, caused by SARS-CoV-2, has led to significant concerns worldwide due to its catastrophic effects on public health. The SARS-CoV-2 infection is initiated with the binding of the receptor-binding domain (RBD) in its spike protein to the ACE2 receptor in the host cell membrane. Due to the error-prone entity of the viral RNA-dependent polymerase complex, the virus genome, including the coding region for the RBD, acquires new mutations, leading to the appearance of multiple variants. These variants can potentially impact transmission, virulence, antigenicity and evasive immune properties. S477N mutation located in the RBD has been observed in the SARS-CoV-2 omicron (B.1.1. 529) variant. In this study, we investigated the consequences of S477N mutation at the molecular level using computational approaches such as molecular dynamics simulation, protein-protein interaction analysis, immunoinformatics and free energy computation. We showed that displacement of Ser with Asn increases the stability of the spike protein and its affinity to ACE2 and thus increases the transmission potential of the virus. This mutation changes the folding and secondary structure of the spike protein. Also, it reduces antibody neutralization, raising concern about re-infection, vaccine breakthrough and therapeutic values.

Keywords: S477N, COVID-19, molecular dynamic, SARS-COV2 mutations

Procedia PDF Downloads 161
473 Experimental Study on Using the Aluminum Sacrificial Anode as a Cathodic Protection for Marine Structures

Authors: A. Radwan, A. Elbatran, A. Mehanna, M. Shehadeh

Abstract:

The corrosion is natural chemical phenomenon that is applied in many engineering structures. Hence, it is one of the important topics to study in the engineering research. Ship and offshore structures are most exposed to corrosion due to the presence of corrosive medium of air and the seawater. Consequently, investigation of the corrosion behavior and properties over ship and offshore hulls is one of the important topics to study in the marine engineering research. Using sacrificial anode is the most popular solution for protecting marine structures from corrosion. Hence, this research investigates the extent of corrosion between the composite ship model and relative velocity of water, along with the sacrificial aluminum anode consumption and its degree of protection in seawater. In this study, the consumption rate of sacrificial aluminum anode with respect to relative velocity at different Reynold’s numbers was studied experimentally, and it was found that, the degree of cathodic protection represented by the cathode potential at a given distance from the aluminum anode was decreased slightly with increment of the relative velocity.

Keywords: corrosion, Reynold's numbers, sacrificial anode, velocity

Procedia PDF Downloads 550
472 Small Farm Diversification Opportunities in Viticulture-Winemaking Sector of Georgia

Authors: E. Kharaishvili

Abstract:

The paper analyses the role of small farms in socio-economic development of agriculture in Georgia and evaluates modern concepts regarding the development of the farms of this size. The scale of farms in Georgia is studied and the major problems are revealed. Opportunities and directions of diversification are discussed from the point of increasing the share of Georgian grapes and wine both on domestic and international markets. It’s shown that the size of vineyard areas is directly reflected on the grape and wine production potential. Accordingly, vineyard area and grape production dynamics is discussed. Comparative analysis of small farms in Georgia and Italy is made and the major differences are identified. Diversification is evaluated based on cost-benefit analysis on the one hand and on the other hand, from the point of promoting economic activities, protecting nature and rural area development. The paper provides proofs for the outcomes of diversification. The key hindering factors for the development of small farms are identified and corresponding conclusions are made, based on which recommendations for diversification of the farms of this size are developed.

Keywords: small farms, scale of farms, diversification, Georgia

Procedia PDF Downloads 380
471 Turbulent Election History: An Appraisal of Triggering Issues in Nigeria

Authors: Olajumoke Tolulope Esan, Odunayo Stephen Faluse

Abstract:

Nigeria’s electoral politics from independence has been tumultuous. Violence has continued to damage the conduct of almost all general elections in Nigeria, Thereby making free and fair elections an event that seems to be unachievable in the history of the nation’s politics. Apparently, electoral violence has subjected the Nation into stereotyped electoral procedures that are always dictated through powerful political Godfathers. However, the shameful act of riotous and tumultuous election processes has led to a political, national instability festering irregularities that manifest at different stages of the election, thus subjecting almost all elections carried out in Nigeria below the minimum democracy standard. Hence the fact that an average Nigerian is being deprived of his or her individual electoral rights should be enough to attract Global political interventions from the western world as Nigeria is part of the commonwealth countries and every Nigerians have the right to demand for posterity to be ensured by protecting individual rightful votes. Basically for elections to be termed democratic, it must be free and fair. In view of this, A deep understanding of this paper is a reflection on the tides of electoral violence and the alarming precipitating factors that make free and fair election almost unreachable in Nigeria.

Keywords: democracy, election, electoral violence, political violence

Procedia PDF Downloads 411
470 Protecting the Privacy and Trust of VIP Users on Social Network Sites

Authors: Nidal F. Shilbayeh, Sameh T. Khuffash, Mohammad H. Allymoun, Reem Al-Saidi

Abstract:

There is a real threat on the VIPs personal pages on the Social Network Sites (SNS). The real threats to these pages is violation of privacy and theft of identity through creating fake pages that exploit their names and pictures to attract the victims and spread of lies. In this paper, we propose a new secure architecture that improves the trusting and finds an effective solution to reduce fake pages and possibility of recognizing VIP pages on SNS. The proposed architecture works as a third party that is added to Facebook to provide the trust service to personal pages for VIPs. Through this mechanism, it works to ensure the real identity of the applicant through the electronic authentication of personal information by storing this information within content of their website. As a result, the significance of the proposed architecture is that it secures and provides trust to the VIPs personal pages. Furthermore, it can help to discover fake page, protect the privacy, reduce crimes of personality-theft, and increase the sense of trust and satisfaction by friends and admirers in interacting with SNS.

Keywords: social network sites, online social network, privacy, trust, security and authentication

Procedia PDF Downloads 371
469 Genetic Variations of CYP2C9 in Thai Patients Taking Medical Cannabis

Authors: Naso Isaiah Thanavisuth

Abstract:

Medical cannabis can be used for treatment including pain, multiple sclerosis, Parkinson's disease, and cancer. However, medical cannabis leads to adverse effects (AEs), which is delta-9-tetrahydrocannabinol (THC). In previous studies, the major of THC metabolism enzymes are CYP2C9. Especially, the variation of CYP2C9 gene consist of CYP2C9*2 on exon 3 and CYP2C9*3 on exon 7 to decrease enzyme activity. Notwithstanding, there is no data describing whether the variant of CYP2C9 genes are apharmacogenetics marker for the prediction of THC-induced AEs in Thai patients. We want to investigate the association between CYP2C9 gene and THC-induced AEs in Thai patients. We enrolled 39 Thai patients with medical cannabis treatment who were classified by clinical data. The CYP2C9*2 and *3 genotyping were conducted using the TaqMan real time PCR assay. All Thai patients who received the medical cannabis consist of twenty-four (61.54%) patients were female, and fifteen (38.46%) were male, with age range 27- 87 years. Moreover, the most AEs in Thai patients who were treated with medical cannabis between cases and controls were tachycardia, arrhythmia, dry mouth, and nausea. Particularly, thirteen (72.22%) medical cannabis-induced AEs were female and age range 33 – 69 years. In this study, none of the medical cannabis groups carried CYP2C9*2 variants in Thai patients. The CYP2C9*3 variants (*1/*3, intermediate metabolizer, IM) and (*3/*3, poor metabolizer, PM) were found, three of thirty-nine (7.69%) and one of thirty-nine (2.56%), respectively. Although, our results indicate that there is no found the CYP2C9*2. However, the variation of CYP2C9 allele might serve as a pharmacogenetics marker for screening before initiating the therapy with medical cannabis for the prevention of medical cannabis-induced AEs.

Keywords: CYP2C9, medical cannabis, adverse effects, THC, P450

Procedia PDF Downloads 107
468 A Comparison of Energy Calculations for a Single-Family Detached Home with Two Energy Simulation Methods

Authors: Amir Sattari

Abstract:

For newly produced houses and energy renovations, an energy calculation needs to be conducted. This is done to verify whether the energy consumption criteria of the house -to reach the energy targets by 2020 and 2050- are in-line with the norms. The main purpose of this study is to confirm whether easy to use energy calculation software or hand calculations used by small companies or individuals give logical results compared to advanced energy simulation program used by researchers or bigger companies. There are different methods for calculating energy consumption. In this paper, two energy calculation programs are used and the relation of energy consumption with solar radiation is compared. A hand calculation is also done to validate whether the hand calculations are still reasonable. The two computer programs which have been used are TMF Energi (the easy energy calculation variant used by small companies or individuals) and IDA ICE - Indoor Climate and Energy (the advanced energy simulation program used by researchers or larger companies). The calculations are done for a standard house from the Swedish house supplier Fiskarhedenvillan. The method is based on having the same conditions and inputs in the different calculation forms so that the results can be compared and verified. The house has been faced differently to see how the orientation affects energy consumption in different methods. The results for the simulations are close to each other and the hand calculation differs from the computer programs by only 5%. Even if solar factors differ due to the orientation of the house, energy calculation results from different computer programs and even hand calculation methods are in line with each other.

Keywords: energy calculation, energy consumption, energy simulation, IDA ICE, TMF energi

Procedia PDF Downloads 106
467 Evaluation of the Construction of Terraces on a Family Farm in the Municipality of Jaboticabal (SP), Brazil

Authors: Anderson dos Santos Ananias, Matheus Yuji Shigueoka, Roberto Saverio Souza Costa

Abstract:

Soil and water conservation can be conceptualized as a combination of management and use methods, which have the function of protecting them against deterioration induced by anthropogenic or natural factors. Thus, the objective of this research was to evaluate the rural extension work in soil conservation carried out at Sítio do Alto in Jaboticabal-SP, through the analysis of planimetric data (latitude and longitude coordinates) and altimetric differences of the empirically constructed terraces by the rural producer and with technical guidance from CATI (Coordination of Integral Technical Assistance). A data collection procedure was carried out in the field, with GPS L1/L2, before the construction of five (5) terraces technically level and after their construction. The results showed that the greatest differences were found on terrace one (1), with a maximum latitude difference of 57 meters, the longitude of 23 m, and altitude of 2 m. These results corroborate the observations in the field, in which the presence of a great erosion caused by the incorrect construction of terrace 1 was verified rainwater to the side of the rural property, where the largest erosion furrows with the beginning of gully formation were found.

Keywords: GPS, mechanical pratice, surface runoff, erosion

Procedia PDF Downloads 110
466 Deep Reinforcement Learning Approach for Optimal Control of Industrial Smart Grids

Authors: Niklas Panten, Eberhard Abele

Abstract:

This paper presents a novel approach for real-time and near-optimal control of industrial smart grids by deep reinforcement learning (DRL). To achieve highly energy-efficient factory systems, the energetic linkage of machines, technical building equipment and the building itself is desirable. However, the increased complexity of the interacting sub-systems, multiple time-variant target values and stochastic influences by the production environment, weather and energy markets make it difficult to efficiently control the energy production, storage and consumption in the hybrid industrial smart grids. The studied deep reinforcement learning approach allows to explore the solution space for proper control policies which minimize a cost function. The deep neural network of the DRL agent is based on a multilayer perceptron (MLP), Long Short-Term Memory (LSTM) and convolutional layers. The agent is trained within multiple Modelica-based factory simulation environments by the Advantage Actor Critic algorithm (A2C). The DRL controller is evaluated by means of the simulation and then compared to a conventional, rule-based approach. Finally, the results indicate that the DRL approach is able to improve the control performance and significantly reduce energy respectively operating costs of industrial smart grids.

Keywords: industrial smart grids, energy efficiency, deep reinforcement learning, optimal control

Procedia PDF Downloads 181
465 Simulation of Reflection Loss for Carbon and Nickel-Carbon Thin Films

Authors: M. Emami, R. Tarighi, R. Goodarzi

Abstract:

Maximal radar wave absorbing cannot be achieved by shaping alone. We have to focus on the parameters of absorbing materials such as permittivity, permeability, and thickness so that best absorbing according to our necessity can happen. The real and imaginary parts of the relative complex permittivity (εr' and εr") and permeability (µr' and µr") were obtained by simulation. The microwave absorbing property of carbon and Ni(C) is simulated in this study by MATLAB software; the simulation was in the frequency range between 2 to 12 GHz for carbon black (C), and carbon coated nickel (Ni(C)) with different thicknesses. In fact, we draw reflection loss (RL) for C and Ni-C via frequency. We have compared their absorption for 3-mm thickness and predicted for other thicknesses by using of electromagnetic wave transmission theory. The results showed that reflection loss position changes in low frequency with increasing of thickness. We found out that, in all cases, using nanocomposites as absorbance cannot get better results relative to pure nanoparticles. The frequency where absorption is maximum can determine the best choice between nanocomposites and pure nanoparticles. Also, we could find an optimal thickness for long wavelength absorbing in order to utilize them in protecting shields and covering.

Keywords: absorbing, carbon, carbon nickel, frequency, thicknesses

Procedia PDF Downloads 177