Search results for: CPU intensive applications
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 7165

Search results for: CPU intensive applications

6895 Towards a Resources Provisioning for Dynamic Workflows in the Cloud

Authors: Fairouz Fakhfakh, Hatem Hadj Kacem, Ahmed Hadj Kacem

Abstract:

Cloud computing offers a new model of service provisioning for workflow applications, thanks to its elasticity and its paying model. However, it presents various challenges that need to be addressed in order to be efficiently utilized. The resources provisioning problem for workflow applications has been widely studied. Nevertheless, the existing works did not consider the change in workflow instances while they are being executed. This functionality has become a major requirement to deal with unusual situations and evolution. This paper presents a first step towards the resources provisioning for a dynamic workflow. In fact, we propose a provisioning algorithm which minimizes the overall workflow execution cost, while meeting a deadline constraint. Then, we extend it to support the dynamic adding of tasks. Experimental results show that our proposed heuristic demonstrates a significant reduction in resources cost by using a consolidation process.

Keywords: cloud computing, resources provisioning, dynamic workflow, workflow applications

Procedia PDF Downloads 255
6894 HBTOnto: An Ontology Model for Analyzing Human Behavior Trajectories

Authors: Heba M. Wagih, Hoda M. O. Mokhtar

Abstract:

Social Network has recently played a significant role in both scientific and social communities. The growing adoption of social network applications has been a relevant source of information nowadays. Due to its popularity, several research trends are emerged to service the huge volume of users including, Location-Based Social Networks (LBSN), Recommendation Systems, Sentiment Analysis Applications, and many others. LBSNs applications are among the highly demanded applications that do not focus only on analyzing the spatiotemporal positions in a given raw trajectory but also on understanding the semantics behind the dynamics of the moving object. LBSNs are possible means of predicting human mobility based on users social ties as well as their spatial preferences. LBSNs rely on the efficient representation of users’ trajectories. Hence, traditional raw trajectory information is no longer convenient. In our research, we focus on studying human behavior trajectory which is the major pillar in location recommendation systems. In this paper, we propose an ontology design patterns with their underlying description logics to efficiently annotate human behavior trajectories.

Keywords: human behavior trajectory, location-based social network, ontology, social network

Procedia PDF Downloads 425
6893 Human Kinetics Education and the Computer Operations, Effects and Merits

Authors: Kehinde Adeyeye Adelabu

Abstract:

Computer applications has completely revolutionized the way of life of people which does not exclude the field of sport education. There are computer technologies which help to enhance teaching in every field of education. Invention of computers has done great to the field of education. This study was therefore carried out to examine the effects and merits of computer operations in Human Kinetics Education and Sports. The study was able to identify the component of computer, uses of computer in Human Kinetics education (sports), computer applications in some branches of human kinetics education. A qualitative research method was employed by the author in gathering experts’ views and used to analyze the effects and merits of computer applications in the field of human kinetics education. No experiment was performed in the cause of carrying out the study. The source of information for the study was text-books, journal, articles, past project reports, internet i.e. Google search engine. Computer has significantly helped to improve Education (Human Kinetic), it has complemented the basic physical fitness testing and gave a more scientific basis to the testing. The use of the software and packages has made cost projections, database applications, inventory control, management of events, word processing, electronic mailing and record keeping easier than the pasts.

Keywords: application, computer operation, education, human kinetics

Procedia PDF Downloads 149
6892 A Study on the Microbilogical Profile and Antibiotic Sensitivity Pattern of Bacterial Isolates Causing Urinary Tract Infection in Intensive Care Unit Patients in a Tertiary Care Hospital in Eastern India

Authors: Pampita Chakraborty, Sukumar Mukherjee

Abstract:

The study was done to determine the microbiological profile and changing pattern of the pathogens causing UTI in the ICU patients. All the patients admitted to the ICU with urinary catheter insertion for more than 48hours were included in the study. Urine samples were collected in a sterile container with aseptic precaution using disposable syringe and was processed as per standards. Antimicrobial susceptibility test was done by Disc Diffusion method as per CLSI guidelines. A total of 100 urine samples were collected from ICU patients, out of which 30% showed significant bacterial growth and 7% showed growth of candida spp. Prevalence of UTI was more in female (73%) than male (27.%). Gram-negative bacilli 26(86.67%) were more common in our study followed by gram-positive cocci 4(13.33%). The most common uropathogens isolated were Escherichia coli 14 (46.67%), followed by Klebsiella spp 7(23.33%), Staphylococcus aureus 4(13.33%), Acinetobacter spp 3(10%), Enterococcus faecalis 1(3.33%) and Pseudomonas aeruginosa 1(3.33%). Most of the Gram-negative bacilli were sensitive to amikacin (80%) and nitrofurantoin (80%), where as all gram-positive organisms were sensitive to Vancomycin. A large number ESBL producers were also observed in this study. The study finding showed that E.coli is the predominant pathogen and has increasing resistance pattern to the commonly used antibiotics. The study proposes that the adherence to antibiotic policy is the key ingredients for successful outcome in ICU patients and also emphasizes that repeated evaluation of microbial characteristics and continuous surveillance of resistant bacteria is required for selection of appropriate antibiotic therapy.

Keywords: antimicrobial sensitivity, intensive care unit, nosocomial infection, urinary tract infection

Procedia PDF Downloads 244
6891 Preventive Interventions for Central Venous Catheter Infections in Intensive Care Units: A Systematic Literature Review

Authors: Jakob Renko, Deja Praprotnik, Kristina Martinovič, Igor Karnjuš

Abstract:

Introduction: Catheter-related bloodstream infections are a major burden for healthcare and patients. Although infections of this type cannot be completely avoided, they can be reduced by taking preventive measures. The aim of this study is to review and analyze the existing literature on preventive interventions to prevent central venous catheters (CVC) infections. Methods: A systematic literature review was carried out. The international databases CINAHL, Medline, PubMed, and Web of Science were searched using the search strategy: "catheter-related infections" AND "intensive care units" AND "prevention" AND "central venous catheter." Articles that met the inclusion and exclusion criteria were included in the study. The literature search flow is illustrated by the PRISMA diagram. The descriptive research method was used to analyze the data. Results: Out of 554 search results, 22 surveys were included in the final analysis. We identified seven relevant preventive measures to prevent CVC infections: washing the whole body with chlorhexidine gluconate (CHG) solution, disinfecting the CVC entry site with CHG solution, use of CHG or silver dressings, alcohol protective caps, CVC care education, selecting appropriate catheter and multicomponent care bundles. Discussion and conclusions: Both single interventions and multicomponent care bundles have been shown to be currently effective measures to prevent CVC infections in adult patients in the ICU. None of the measures identified stood out in terms of their effectiveness. Prevention work to reduce CVC infections in the ICU is a complex process that requires the simultaneous consideration of several factors.

Keywords: central venous access, critically ill patients, hospital-acquired complications, prevention

Procedia PDF Downloads 305
6890 The Impact of Hospital Intensive Care Unit Window Design on Daylighting and Energy Performance in Desert Climate

Authors: A. Sherif, H. Sabry, A. Elzafarany, M. Gadelhak, R. Arafa, M. Aly

Abstract:

This paper addresses the design of hospital Intensive Care Unit windows for the achievement of visual comfort and energy savings. The aim was to identify the window size and shading system configurations that could fulfill daylighting adequacy, avoid glare and reduce energy consumption. The study focused on addressing the effect of utilizing different shading systems in association with a range of Window-to-Wall Ratios (WWR) in different orientations under the desert clear-sky of Cairo, Egypt. The results of this study demonstrated that solar penetration is a critical concern affecting the design of ICU windows in desert locations, as in Cairo, Egypt. Use of shading systems was found to be essential in providing acceptable daylight performance and energy saving. Careful positioning of the ICU window towards a proper orientation can dramatically improve performance. It was observed that ICU windows facing the north direction enjoyed the widest range of successful window configuration possibilities at different WWRs. ICU windows facing south enjoyed a reasonable number of configuration options as well. By contrast, the ICU windows facing the east orientation had a very limited number of options that provide acceptable performance. These require additional local shading measures at certain times due to glare incidence. Moreover, use of horizontal sun breakers and solar screens to protect the ICU windows proved to be more successful than the other alternatives in a wide range of Window to Wall Ratios. By contrast, the use of light shelves and vertical shading devices seemed questionable.

Keywords: daylighting, desert, energy efficiency, shading

Procedia PDF Downloads 412
6889 Optimization of the Flexural Strength of Biocomposites Samples Reinforced with Resin for Engineering Applications

Authors: Stephen Akong Takim

Abstract:

This study focused on the optimization of the flexural strength of bio-composite samples of palm kernel, whelks, clams, periwinkles shells and bamboo fiber reinforced with resin for engineering applications. The aim of the study was to formulate different samples of bio-composite reinforced with resin for engineering applications and to evaluate the flexural strength of the fabricated composite. The hand lay-up technique was used for the composites produced by incorporating different percentage compositions of the shells/fiber (10%, 15%, 20%, 25% and 30%) into varied proportions of epoxy resin and catalyst. The cured samples, after 24 hours, were subjected to tensile, impact, flexural and water absorption tests. The experiments were conducted using the Taguchi optimization method L25 (5x5) with five design parameters and five level combinations in Minitab 18 statistical software. The results showed that the average value of flexural was 114.87MPa when compared to the unreinforced 72.33MPa bio-composite. The study recommended that agricultural waste, like palm kernel shells, whelk shells, clams, periwinkle shells and bamboo fiber, should be converted into important engineering applications.

Keywords: bio-composite, resin, palm kernel shells, welk shells, periwinkle shells, bamboo fiber, Taguchi techniques and engineering application

Procedia PDF Downloads 44
6888 Analyzing Medical Workflows Using Market Basket Analysis

Authors: Mohit Kumar, Mayur Betharia

Abstract:

Healthcare domain, with the emergence of Electronic Medical Record (EMR), collects a lot of data which have been attracting Data Mining expert’s interest. In the past, doctors have relied on their intuition while making critical clinical decisions. This paper presents the means to analyze the Medical workflows to get business insights out of huge dumped medical databases. Market Basket Analysis (MBA) which is a special data mining technique, has been widely used in marketing and e-commerce field to discover the association between products bought together by customers. It helps businesses in increasing their sales by analyzing the purchasing behavior of customers and pitching the right customer with the right product. This paper is an attempt to demonstrate Market Basket Analysis applications in healthcare. In particular, it discusses the Market Basket Analysis Algorithm ‘Apriori’ applications within healthcare in major areas such as analyzing the workflow of diagnostic procedures, Up-selling and Cross-selling of Healthcare Systems, designing healthcare systems more user-friendly. In the paper, we have demonstrated the MBA applications using Angiography Systems, but can be extrapolated to other modalities as well.

Keywords: data mining, market basket analysis, healthcare applications, knowledge discovery in healthcare databases, customer relationship management, healthcare systems

Procedia PDF Downloads 137
6887 A Bottleneck-Aware Power Management Scheme in Heterogeneous Processors for Web Apps

Authors: Inyoung Park, Youngjoo Woo, Euiseong Seo

Abstract:

With the advent of WebGL, Web apps are now able to provide high quality graphics by utilizing the underlying graphic processing units (GPUs). Despite that the Web apps are becoming common and popular, the current power management schemes, which were devised for the conventional native applications, are suboptimal for Web apps because of the additional layer, the Web browser, between OS and application. The Web browser running on a CPU issues GL commands, which are for rendering images to be displayed by the Web app currently running, to the GPU and the GPU processes them. The size and number of issued GL commands determine the processing load of the GPU. While the GPU is processing the GL commands, CPU simultaneously executes the other compute intensive threads. The actual user experience will be determined by either CPU processing or GPU processing depending on which of the two is the more demanded resource. For example, when the GPU work queue is saturated by the outstanding commands, lowering the performance level of the CPU does not affect the user experience because it is already deteriorated by the retarded execution of GPU commands. Consequently, it would be desirable to lower CPU or GPU performance level to save energy when the other resource is saturated and becomes a bottleneck in the execution flow. Based on this observation, we propose a power management scheme that is specialized for the Web app runtime environment. This approach incurs two technical challenges; identification of the bottleneck resource and determination of the appropriate performance level for unsaturated resource. The proposed power management scheme uses the CPU utilization level of the Window Manager to tell which one is the bottleneck if exists. The Window Manager draws the final screen using the processed results delivered from the GPU. Thus, the Window Manager is on the critical path that determines the quality of user experience and purely executed by the CPU. The proposed scheme uses the weighted average of the Window Manager utilization to prevent excessive sensitivity and fluctuation. We classified Web apps into three categories using the analysis results that measure frame-per-second (FPS) changes under diverse CPU/GPU clock combinations. The results showed that the capability of the CPU decides user experience when the Window Manager utilization is above 90% and consequently, the proposed scheme decreases the performance level of CPU by one step. On the contrary, when its utilization is less than 60%, the bottleneck usually lies in the GPU and it is desirable to decrease the performance of GPU. Even the processing unit that is not on critical path, excessive performance drop can occur and that may adversely affect the user experience. Therefore, our scheme lowers the frequency gradually, until it finds an appropriate level by periodically checking the CPU utilization. The proposed scheme reduced the energy consumption by 10.34% on average in comparison to the conventional Linux kernel, and it worsened their FPS by 1.07% only on average.

Keywords: interactive applications, power management, QoS, Web apps, WebGL

Procedia PDF Downloads 163
6886 Social Problems and Gender Wage Gap Faced by Working Women in Readymade Garment Sector of Pakistan

Authors: Narjis Kahtoon

Abstract:

The issue of the wage discrimination on the basis of gender and social problem has been a significant research problem for several decades. Whereas lots of have explored reasons for the persistence of an inequality in the wages of male and female, none has successfully explained away the entire differentiation. The wage discrimination on the basis of gender and social problem of working women is a global issue. Although inequality in political and economic and social make-up of countries all over the world, the gender wage discrimination, and social constraint is present. The aim of the research is to examine the gender wage discrimination and social constraint from an international perspective and to determine whether any pattern exists among cultural dimensions of a country and the man and women remuneration gap in Readymade Garment Sector of Pakistan. Population growth rate is significant indicator used to explain the change in population and play a crucial point in the economic development of a country. In Pakistan, readymade garment sector consists of small, medium and large sized firms. With an estimated 30 percent of the workforce in textile- Garment is females’. Readymade garment industry is a labor intensive industry and relies on the skills of individual workers and provides highest value addition in the textile sector. In the Garment sector, female workers are concentrated in poorly paid, labor-intensive down-stream production (readymade garments, linen, towels, etc.), while male workers dominate capital- intensive (ginning, spinning and weaving) processes. Gender wage discrimination and social constraint are reality in Pakistan Labor Market. This research allows us not only to properly detect the size of gender wage discrimination and social constraint but to also fully understand its consequences in readymade garment sector of Pakistan. Furthermore, research will evaluated this measure for the three main clusters like Lahore, Karachi, and Faisalabad. These data contain complete details of male and female workers and supervisors in the readymade garment sector of Pakistan. These sources of information provide a unique opportunity to reanalyze the previous finding in the literature. The regression analysis focused on the standard 'Mincerian' earning equation and estimates it separately by gender, the research will also imply the cultural dimensions developed by Hofstede (2001) to profile a country’s cultural status and compare those cultural dimensions to the wage inequalities. Readymade garment of Pakistan is one of the important sectors since its products have huge demand at home and abroad. These researches will a major influence on the measures undertaken to design a public policy regarding wage discrimination and social constraint in readymade garment sector of Pakistan.

Keywords: gender wage differentials, decomposition, garment, cultural

Procedia PDF Downloads 178
6885 Simulation of Non-Crimp 3D Orthogonal Carbon Fabric Composite for Aerospace Applications Using Finite Element Method

Authors: Sh. Minapoor, S. Ajeli, M. Javadi Toghchi

Abstract:

Non-crimp 3D orthogonal fabric composite is one of the textile-based composite materials that are rapidly developing light-weight engineering materials. The present paper focuses on geometric and micro mechanical modeling of non-crimp 3D orthogonal carbon fabric and composites reinforced with it for aerospace applications. In this research meso-finite element (FE) modeling employs for stress analysis in different load conditions. Since mechanical testing of expensive textile carbon composites with specific application isn't affordable, simulation composite in a virtual environment is a helpful way to investigate its mechanical properties in different conditions.

Keywords: woven composite, aerospace applications, finite element method, mechanical properties

Procedia PDF Downloads 434
6884 Instruction and Learning Design Consideration for the Development of Mobile Learning Application

Authors: M. Sarrab, M. Elbasir

Abstract:

Most of mobile learning applications currently available are developed for the formal education and learning environment. Those applications are characterized by the improvement of the interaction process between instructors and learners to provide more collaboration and flexibility in the learning process. Despite the long history and large amount of research on Instruction design model and mobile learning there is no complete and well defined set of steps to follow in designing mobile learning applications. Based on this scenario, this paper focuses on identifying instruction design phases considerations and influencing factors in developing mobile learning application. This set of instruction design steps includes analysis, design, development, implementation, evaluation and continuous has been built from a literature study with focus on standards for learning and mobile application software quality and guidelines. The effort is part of an Omani-funded research project investigating the development, adoption and dissemination of mobile learning in Oman.

Keywords: instruction design, mobile learning, mobile application

Procedia PDF Downloads 567
6883 Natural Language Processing; the Future of Clinical Record Management

Authors: Khaled M. Alhawiti

Abstract:

This paper investigates the future of medicine and the use of Natural language processing. The importance of having correct clinical information available online is remarkable; improving patient care at affordable costs could be achieved using automated applications to use the online clinical information. The major challenge towards the retrieval of such vital information is to have it appropriately coded. Majority of the online patient reports are not found to be coded and not accessible as its recorded in natural language text. The use of Natural Language processing provides a feasible solution by retrieving and organizing clinical information, available in text and transforming clinical data that is available for use. Systems used in NLP are rather complex to construct, as they entail considerable knowledge, however significant development has been made. Newly formed NLP systems have been tested and have established performance that is promising and considered as practical clinical applications.

Keywords: clinical information, information retrieval, natural language processing, automated applications

Procedia PDF Downloads 377
6882 Comparison of Clinical Profiles of Patients Seen in a Women and Children Protection Unit in a Local Government Hospital in Makati, Philippines Before and During the COVID-19 Pandemic Between January 2018 to February 2020 and March 2020 to December 2021

Authors: Margaret Denise P. Del Rosario, Geraldine Alcantara

Abstract:

Background: The declaration of the COVID-19 pandemic has impacted hospital visits of child abuse cases with less consults but more severe injuries. Objective: The study aims to identify the clinical profiles of patients seen in the hospital ng Makati Women and Children Protection Unit before and during the pandemic. Design: A cross-sectional analytic study design through review of records that underwent quantitative analysis. Results: 264 cases pre-pandemic and 208 cases during the pandemic were reviewed. Most reported cases were neglect comprising of 47% of the pre-pandemic cases and 68% of cases during the pandemic. Supervisory neglect was most commonly reported. An equal distribution between males and females were seen among victims and alleged perpetrators. The age group of both victims and alleged perpetrators during the pandemic was significantly younger compared to the pre-pandemic period. Children belonging to larger family groups were commonly encountered with most of them being the eldest amongst siblings. Alleged perpetrators were mostly secondary graduates for both time periods. A significant increase of cases during the pandemic occurred at home. More patients required hospitalization during the pandemic period with 37% compared to the 23% of admissions prior to the pandemic. Furthermore, a three-fold increase of injuries sustained during the pandemic required intensive care. Conclusion: The study reflects increased severity of injuries related to abuse during the pandemic compared to pre-pandemic times. A significant increase in injuries requiring intensive care were also seen despite less reported cases.

Keywords: child abuse, COVID-19, violence against children, WCPU, neglect

Procedia PDF Downloads 24
6881 Application of Nanoparticles in Biomedical and MRI

Authors: Raziyeh Mohammadi

Abstract:

At present, nanoparticles are used for various biomedical applications where they facilitate laboratory diagnostics and therapeutics. The performance of nanoparticles for biomedical applications is often assessed by their narrow size distribution, suitable magnetic saturation, and low toxicity effects. Superparamagnetic iron oxide nanoparticles have received great attention due to their applications as contrast agents for magnetic resonance imaging (MRI. (Processes in the tissue where the blood brain barrier is intact in this way shielded from the contact to this conventional contrast agent and will only reveal changes in the tissue if it involves an alteration in the vasculature. This technique is very useful for detecting tumors and can even be used for detecting metabolic functional alterations in the brain, such as epileptic activity.SPIONs have found application in Magnetic Resonance Imaging (MRI) and magnetic hyperthermia. Unlike bulk iron, SPIONs do not have remnant magnetization in the absence of the external magnetic field; therefore, a precise remote control over their action is possible.

Keywords: nanoparticles, MRI, biomedical, iron oxide, spions

Procedia PDF Downloads 183
6880 Algorithms for Run-Time Task Mapping in NoC-Based Heterogeneous MPSoCs

Authors: M. K. Benhaoua, A. K. Singh, A. E. Benyamina, P. Boulet

Abstract:

Mapping parallelized tasks of applications onto these MPSoCs can be done either at design time (static) or at run-time (dynamic). Static mapping strategies find the best placement of tasks at design-time, and hence, these are not suitable for dynamic workload and seem incapable of runtime resource management. The number of tasks or applications executing in MPSoC platform can exceed the available resources, requiring efficient run-time mapping strategies to meet these constraints. This paper describes a new Spiral Dynamic Task Mapping heuristic for mapping applications onto NoC-based Heterogeneous MPSoC. This heuristic is based on packing strategy and routing Algorithm proposed also in this paper. Heuristic try to map the tasks of an application in a clustering region to reduce the communication overhead between the communicating tasks. The heuristic proposed in this paper attempts to map the tasks of an application that are most related to each other in a spiral manner and to find the best possible path load that minimizes the communication overhead. In this context, we have realized a simulation environment for experimental evaluations to map applications with varying number of tasks onto an 8x8 NoC-based Heterogeneous MPSoCs platform, we demonstrate that the new mapping heuristics with the new modified dijkstra routing algorithm proposed are capable of reducing the total execution time and energy consumption of applications when compared to state-of-the-art run-time mapping heuristics reported in the literature.

Keywords: multiprocessor system on chip, MPSoC, network on chip, NoC, heterogeneous architectures, run-time mapping heuristics, routing algorithm

Procedia PDF Downloads 451
6879 Second Time’s a Charm: The Intervention of the European Patent Office on the Strategic Use of Divisional Applications

Authors: Alissa Lefebre

Abstract:

It might seem intuitive to hope for a fast decision on the patent grant. After all, a granted patent provides you with a monopoly position, which allows you to obstruct others from using your technology. However, this does not take into account the strategic advantages one can obtain from keeping their patent applications pending. First, you have the financial advantage of postponing certain fees, although many applicants would probably agree that this is not the main benefit. As the scope of the patent protection is only decided upon at the grant, the pendency period introduces uncertainty amongst rivals. This uncertainty entails not knowing whether the patent will actually get granted and what the scope of protection will be. Consequently, rivals can only depend upon limited and uncertain information when deciding what technology is worth pursuing. One way to keep patent applications pending, is the use of divisional applications. These applicants can be filed out of a parent application as long as that parent application is still pending. This allows the applicant to pursue (part of) the content of the parent application in another application, as the divisional application cannot exceed the scope of the parent application. In a fast-moving and complex market such as the tele- and digital communications, it might allow applicants to obtain an actual monopoly position as competitors are discouraged to pursue a certain technology. Nevertheless, this practice also has downsides to it. First of all, it has an impact on the workload of the examiners at the patent office. As the number of patent filings have been increasing over the last decades, using strategies that increase this number even more, is not desirable from the patent examiners point of view. Secondly, a pending patent does not provide you with the protection of a granted patent, thus not only create uncertainty for the rivals, but also for the applicant. Consequently, the European patent office (EPO) has come up with a “raising the bar initiative” in which they have decided to tackle the strategic use of divisional applications. Over the past years, two rules have been implemented. The first rule in 2010 introduced a time limit, upon which divisional applications could only be filed within a 24-month limit after the first communication with the patent office. However, after carrying-out a user feedback survey, the EPO abolished the rule again in 2014 and replaced it by a fee mechanism. The fee mechanism is still in place today, which might be an indication of a better result compared to the first rule change. This study tests the impact of these rules on the strategic use of divisional applications in the tele- and digital communication industry and provides empirical evidence on their success. Upon using three different survival models, we find overall evidence that divisional applications prolong the pendency time and that only the second rule is able to tackle the strategic patenting and thus decrease the pendency time.

Keywords: divisional applications, regulatory changes, strategic patenting, EPO

Procedia PDF Downloads 97
6878 Quantum Dot – DNA Conjugates for Biological Applications

Authors: A. Banerjee, C. Grazon, B. Nadal, T. Pons, Y. Krishnan, B. Dubertret

Abstract:

Quantum Dots (QDs) have emerged as novel fluorescent probes for biomedical applications. The photophysical properties of QDs such as broad absorption, narrow emission spectrum, reduced blinking, and enhanced photostability make them advantageous over organic fluorophores. However, for some biological applications, QDs need to be first targeted to specific intracellular locations. It parallel, base pairing properties and biocompatibility of DNA has been extensively used for biosensing, targetting and intracellular delivery of numerous bioactive agents. The combination of the photophysical properties of QDs and targettability of DNA has yielded fluorescent, stable and targetable nanosensors. QD-DNA conjugates have used in drug delivery, siRNA, intracellular pH sensing and several other applications; and continue to be an active area of research. In this project, a novel method to synthesise QD-DNA conjugates and their applications in bioimaging are investigated. QDs are first solubilized in water using a thiol based amphiphilic co-polymer and, then conjugated to amine functionalized DNA using a heterobifunctional linker. The conjugates are purified by size exclusion chromatography and characterized by UV-Vis absorption and fluorescence spectroscopy, electrophoresis and microscopy. Parameters that influence the conjugation yield such as reducing agents, the excess of salt and pH have been investigated in detail. In optimized reaction conditions, up to 12 single-stranded DNA (15 mer length) can be conjugated per QD. After conjugation, the QDs retain their colloidal stability and high quantum yield; and the DNA is available for hybridization. The reaction has also been successfully tested on QDs emitting different colors and on Gold nanoparticles and therefore highly generalizable. After extensive characterization and robust synthesis of QD-DNA conjugates in vitro, the physical properties of these conjugates in cellular milieu are being invistigated. Modification of QD surface with DNA appears to remarkably alter the fate of QD inside cells and can have potential implications in therapeutic applications.

Keywords: bioimaging, cellular targeting, drug delivery, photostability

Procedia PDF Downloads 398
6877 Applying Swanson's Theory of Caring to Manage Multiple Trauma Patient

Authors: Hsin-Yi Lo, Chia-Yu Hsu

Abstract:

This article is the nursing experience of a multiple trauma case using Swanson's theory of caring, the nursing period is from May 31 to June 4, 2021, collect data through observation, written talks, interviews, listening, direct care and physical assessment, established cases with health problems such as acute pain, impaired tissue integrity, and anxiety. Nursing process including, evaluate the pain index with the pain assessment scale, assist in acupoint massage, use a corset to fix the wound, and give the patient listening to favorite radio programs to divert attention and relieve pain problems; promote wound healing and avoid infection by assessing wound condition and exudation, changing dressings with aseptic technique, and providing appropriate dressings; encourage patients to express their feelings, provide companionship, and assist in self-care and participation in treatment plans, to enable the case to overcome the anxiety caused by being admitted to the intensive care unit for the first time and not knowing about the disease, and assist the case to overcome the injury caused by the accident and return to normal life. There is no video equipment in the intensive care unit during the nursing period. In response to the problem that family visits cannot be opened during the epidemic, it is a limitation this time. It is recommended that the hospital take this into consideration in the future. In the post-epidemic era, it can reduce the risk of various infections for patients and family members. Traveling between home and hospital, improving the quality of high-quality and technological care.

Keywords: swanson's theory of caring, multiple trauma, anxiety, nursing experience

Procedia PDF Downloads 37
6876 X-Ray Fluorescence Molecular Imaging with Improved Sensitivity for Biomedical Applications

Authors: Guohua Cao, Xu Dong

Abstract:

X-ray Fluorescence Molecular Imaging (XFMI) holds great promise as a low-cost molecular imaging modality for biomedical applications with high chemical sensitivity. However, for in vivo biomedical applications, a key technical bottleneck is the relatively low chemical sensitivity of XFMI, especially at a reasonably low radiation dose. In laboratory x-ray source based XFMI, one of the main factors that limits the chemical sensitivity of XFMI is the scattered x-rays. We will present our latest findings on improving the chemical sensitivity of XFMI using excitation beam spectrum optimization. XFMI imaging experiments on two mouse-sized phantoms were conducted at three different excitation beam spectra. Our results show that the minimum detectable concentration (MDC) of iodine can be readily increased by five times via excitation spectrum optimization. Findings from this investigation could find use for in vivo pre-clinical small-animal XFMI in the future.

Keywords: molecular imaging, X-ray fluorescence, chemical sensitivity, X-ray scattering

Procedia PDF Downloads 159
6875 Iontophoretic Drug Transport: An Non-Invasive Transdermal Approach

Authors: Ashish Jain, Shivam Tayal

Abstract:

There has been great interest in the field of Iontophoresis since few years due to its great applications in the field of controlled transdermal drug delivery system. It is an technique which is used to enhance the transdermal permeation of ionized high molecular weight molecules across the skin membrane especially Peptides & Proteins by the application of direct current of 1-4 mA for 20-40 minutes whereas chemical must be placed on electrodes with same charge. Iontophoresis enhanced the delivery of drug into the skin via pores like hair follicles, sweat gland ducts etc. rather than through stratum corneum. It has wide applications in the field of experimental, Therapeutic, Diagnostic, Dentistry etc. Medical science is using it to treat Hyperhidrosis (Excessive sweating) in hands and feet and to treat other ailments like hypertension, Migraine etc. Nowadays commercial transdermal iontophoretic patches are available in the market to treat different ailments. Researchers are keen to research in this field due to its vast applications and advantages.

Keywords: iontophoresis, novel drug delivery, transdermal, permeation enhancer

Procedia PDF Downloads 221
6874 A Review on Applications of Evolutionary Algorithms to Reservoir Operation for Hydropower Production

Authors: Nkechi Neboh, Josiah Adeyemo, Abimbola Enitan, Oludayo Olugbara

Abstract:

Evolutionary algorithms are techniques extensively used in the planning and management of water resources and systems. It is useful in finding optimal solutions to water resources problems considering the complexities involved in the analysis. River basin management is an essential area that involves the management of upstream, river inflow and outflow including downstream aspects of a reservoir. Water as a scarce resource is needed by human and the environment for survival and its management involve a lot of complexities. Management of this scarce resource is necessary for proper distribution to competing users in a river basin. This presents a lot of complexities involving many constraints and conflicting objectives. Evolutionary algorithms are very useful in solving this kind of complex problems with ease. Evolutionary algorithms are easy to use, fast and robust with many other advantages. Many applications of evolutionary algorithms, which are population based search algorithm, are discussed. Different methodologies involved in the modeling and simulation of water management problems in river basins are explained. It was found from this work that different evolutionary algorithms are suitable for different problems. Therefore, appropriate algorithms are suggested for different methodologies and applications based on results of previous studies reviewed. It is concluded that evolutionary algorithms, with wide applications in water resources management, are viable and easy algorithms for most of the applications. The results suggested that evolutionary algorithms, applied in the right application areas, can suggest superior solutions for river basin management especially in reservoir operations, irrigation planning and management, stream flow forecasting and real-time applications. The future directions in this work are suggested. This study will assist decision makers and stakeholders on the best evolutionary algorithm to use in varied optimization issues in water resources management.

Keywords: evolutionary algorithm, multi-objective, reservoir operation, river basin management

Procedia PDF Downloads 461
6873 Carbon Nanotubes and Novel Applications for Textile

Authors: Ezgi Ismar

Abstract:

Carbon nanotubes (CNTs) are different from other allotropes of carbon, such as graphite, diamond and fullerene. Replacement of metals in flexible textiles has an advantage. Particularly in the last decade, both their electrical and mechanical properties have become an area of interest for Li-ion battery applications where the conductivity has a major importance. While carbon nanotubes are conductive, they are also less in weight compared to convectional conductive materials. Carbon nanotubes can be used inside the fiber so they can offer to create 3-D structures. In this review, you can find some examples of how carbon nanotubes adapted to textile products.

Keywords: carbon nanotubes, conductive textiles, nanotechnology, nanotextiles

Procedia PDF Downloads 347
6872 The Impact of Large-Scale Wind Energy Development on Islands’ Interconnection to the Mainland System

Authors: Marina Kapsali, John S. Anagnostopoulos

Abstract:

Greek islands’ interconnection (IC) with larger power systems, such as the mainland grid, is a crucial issue that has attracted a lot of interest; however, the recent economic recession that the country undergoes together with the highly capital intensive nature of this kind of projects have stalled or sifted the development of many of those on a more long-term basis. On the other hand, most of Greek islands are still heavily dependent on the lengthy and costly supply chain of oil imports whilst the majority of them exhibit excellent potential for wind energy (WE) applications. In this respect, the main purpose of the present work is to investigate −through a parametric study which varies both in wind farm (WF) and submarine IC capacities− the impact of large-scale WE development on the IC of the third in size island of Greece (Lesbos) with the mainland system. The energy and economic performance of the system is simulated over a 25-year evaluation period assuming two possible scenarios, i.e. S(a): without the contribution of the local Thermal Power Plant (TPP) and S(b): the TPP is maintained to ensure electrification of the island. The economic feasibility of the two options is investigated in terms of determining their Levelized Cost of Energy (LCOE) including also a sensitivity analysis on the worst/reference/best Cases. According to the results, Lesbos island IC presents considerable economic interest for covering part of island’s future electrification needs with WE having a vital role in this challenging venture.

Keywords: electricity generation cost, levelized cost of energy, mainland grid, wind energy rejection

Procedia PDF Downloads 185
6871 Functionalized Nanoparticles for Biomedical Applications

Authors: Temesgen Geremew

Abstract:

Functionalized nanoparticles have emerged as a revolutionary class of materials with immense potential in various biomedical applications. These engineered nanoparticles possess unique properties tailored to interact with biological systems, offering unprecedented opportunities in drug delivery, imaging, diagnostics, and therapy. This research delves into the design, synthesis, and characterization of functionalized nanoparticles for targeted biomedical applications. The primary focus lies on developing nanoparticles with precisely controlled size, surface chemistry, and biocompatibility for specific medical purposes. The research will also explore the crucial interaction of these nanoparticles with biological systems, encompassing cellular uptake, biodistribution, and potential toxicity evaluation. The successful development of functionalized nanoparticles holds the promise to revolutionize various aspects of healthcare. This research aspires to contribute significantly to this advancement by providing valuable insights into the design and application of these versatile materials within the ever-evolving field of biomedicine.

Keywords: nanoparticles, biomedicals, cancer, biocompatibility

Procedia PDF Downloads 21
6870 Technological Applications in Automobile Manufacturing Sector - A Case Study Analysis

Authors: Raja Kannusamy

Abstract:

The research focuses on the applicable technologies in the automobile industry and their effects on the productivity and annual revenue of the industry. A study has been conducted on 6 major automobile manufacturing industries represented in this research as M1, M2, M3, M4, M5 and M6. The results indicate that M1, which is a pioneer in technological applications, remains the market leader, followed by M5 & M2 taking the second and third positions, respectively. M3, M6 and M4 are the followers and are placed next in positions. It has also been observed that M1 and M2 have entered into an agreement to share the basic structural technologies and they maintain long-term and trusted relationships with their suppliers through the Keiretsu system. With technological giants such as Apple, Microsoft, Uber and Google entering the automobile industry in recent years, an upward trend is expected in the futuristic market with self-driving cars to dominate the automobile sector. To keep up with the market trend, it is essential for automobile manufacturers to understand the importance of developing technological capabilities and skills to be competitive in the marketplace.

Keywords: automobile manufacturing industries, competitiveness, performance improvement, technological applications

Procedia PDF Downloads 153
6869 PEINS: A Generic Compression Scheme Using Probabilistic Encoding and Irrational Number Storage

Authors: P. Jayashree, S. Rajkumar

Abstract:

With social networks and smart devices generating a multitude of data, effective data management is the need of the hour for networks and cloud applications. Some applications need effective storage while some other applications need effective communication over networks and data reduction comes as a handy solution to meet out both requirements. Most of the data compression techniques are based on data statistics and may result in either lossy or lossless data reductions. Though lossy reductions produce better compression ratios compared to lossless methods, many applications require data accuracy and miniature details to be preserved. A variety of data compression algorithms does exist in the literature for different forms of data like text, image, and multimedia data. In the proposed work, a generic progressive compression algorithm, based on probabilistic encoding, called PEINS is projected as an enhancement over irrational number stored coding technique to cater to storage issues of increasing data volumes as a cost effective solution, which also offers data security as a secondary outcome to some extent. The proposed work reveals cost effectiveness in terms of better compression ratio with no deterioration in compression time.

Keywords: compression ratio, generic compression, irrational number storage, probabilistic encoding

Procedia PDF Downloads 259
6868 A Framework for Protecting Teenagers from Cyber Crimes and Cyberbullying

Authors: Sultan Alanazi, Adwan Alanazi

Abstract:

Social applications consist of powerful tools that allow people to connect and interact with each other. However, its negative use cannot be ignored. Cyberbullying is a new and serious Internet problem. Cyberbullying is one of the most common risks for teenagers to go online. More than half of young people report that they do not tell their parents when this will occur, which can have significant physiological consequences. Cyberbullying involves the deliberate use of digital media on the Internet to convey false or embarrassing information about others. Therefore, this article provides a way to detect cyber-bullying in social media applications for parents. The purpose of our work is to develop an architectural model for identifying and measuring the state of Cyberbullying faced by children on social media applications. For parents, this will be a good tool for monitoring their children without invading their privacy. Finally, some interesting open-ended questions were raised, suggesting promising ideas for starting new research in this new field.

Keywords: cyberbullying, cyber bullying, internet crimes, social media security, E-crimes

Procedia PDF Downloads 111
6867 Depiction of a Circulated Double Psi-Shaped Microstrip Antenna for Ku-Band Satellite Applications

Authors: M. Naimur Rahman, Mohammad Tariqul Islam, Mandeep Singh Jit Singh, Norbahiah Misran

Abstract:

This paper presents the architecture and exploration of a compact, circulated double Psi-shaped microstrip patch antenna for Ku-band satellite applications. The antenna is composed of the double Psi-shaped patch in opposite focus which is circulated with a ring. The antenna size is 24 mm × 18 mm and the prototype is imprinted on Rogers RT/duroid 5880 materials with the depth of 1.57 mm. The substrate has a relative permittivity of 2.2 and the dielectric constant of 0.0009. The excitation is supplied through a 50Ω microstrip line. The performance of the presented antenna has been simulated and verified with the High-Frequency Structural Simulator (HFSS). The results depict that the antenna covers the frequency spectrum 14.6 - 17.4 GHz (Ku-band) with 10 dB return loss. The antenna has a 4.40 dBi maximum gain with stable radiation patterns throughout the operating band which makes the proposed antenna compatible for the satellite application in Ku-band.

Keywords: Ku-band antenna, microstrip antenna, psi-shaped antenna, satellite applications

Procedia PDF Downloads 273
6866 Intrusion Detection Techniques in NaaS in the Cloud: A Review

Authors: Rashid Mahmood

Abstract:

The network as a service (NaaS) usage has been well-known from the last few years in the many applications, like mission critical applications. In the NaaS, prevention method is not adequate as the security concerned, so the detection method should be added to the security issues in NaaS. The authentication and encryption are considered the first solution of the NaaS problem whereas now these are not sufficient as NaaS use is increasing. In this paper, we are going to present the concept of intrusion detection and then survey some of major intrusion detection techniques in NaaS and aim to compare in some important fields.

Keywords: IDS, cloud, naas, detection

Procedia PDF Downloads 283